參考文獻 |
Al-Shibly, H. (2011). Human resources information systems success assessment: An integrative model. Australian Journal of Basic and Applied Sciences, 5(5), 157-169.
Alshibly, H. H. (2014). Evaluating E-HRM success: A validation of the information systems success model. International Journal of Human Resource Studies, 4(3), 107.
Aldous, K. K., An, J., & Jansen, B. J. (2019, July). View, like, comment, post: Analyzing user engagement by topic at 4 levels across 5 social media platforms for 53 news organizations. In Proceedings of the International AAAI Conference on Web and Social Media, 13, 47-57.
Balaban, I., Mu, E., & Divjak, B. (2013). Development of an electronic Portfolio system success model: An information systems approach. Computers & Education, 60(1), 396-411.
Bailey, J. E., & Pearson, S. W. (1983). Development of a tool for measuring and analyzing computer user satisfaction. Management science, 29(5), 530-545.
Beneki, C., Koulis, A., Kyriazis, N. A., & Papadamou, S. (2019). Investigating volatility transmission and hedging properties between Bitcoin and Ethereum. Research in International Business and Finance, 48, 219-227.
Bhosale, J., & Mavale, S. (2018). Volatility of select Crypto-currencies: A comparison of Bitcoin, Ethereum and Litecoin. Annual Research Journal of SCMS, Pune, 6.
Bordo, M. D., & Kydland, F. E. (1995). The gold standard as a rule: An essay in exploration. Explorations in Economic History, 32(4), 423-464.
Brembs, B., Button, K., & Munafò, M. (2013). Deep impact: unintended consequences of journal rank. Frontiers in human Neuroscience, 7, 291.
Brorsen, B. W. (1987). Observations on the journal publication process. North Central Journal of Agricultural Economics, 9(2), 315-321.
Buterin, V. (2014). A next-generation smart contract and decentralized application platform. white paper, 3(37).
46
運用區塊鏈技術於學術論文協同審稿服務
Chang, H. H., Wang, Y. H., & Yang, W. Y. (2009). The impact of e-service quality, customer satisfaction and loyalty on e-marketing: Moderating effect of perceived value. Total quality management, 20(4), 423-443.
Chuen, D. L. K., Guo, L., & Wang, Y. (2017). Cryptocurrency: A new investment opportunity?. The Journal of Alternative Investments, 20(3), 16-40.
Cronbach, L. J. (1951). Coefficient alpha and the internal structure of tests. psychometrika, 16(3), 297-334.
Crosby, M., Pattanayak, P., Verma, S., & Kalyanaraman, V. (2016). Blockchain technology: Beyond bitcoin. Applied Innovation, 2(6-10), 71.
DeLone, W. H., & McLean, E. R. (2003). The DeLone and McLean model of information systems success: a ten-year update. Journal of management information systems, 19(4), 9-30.
DeLone, W. H., & McLean, E. R. (2004). Measuring e-commerce success: Applying the DeLone & McLean information systems success model. International Journal of electronic commerce, 9(1), 31-47.
Dixon, N. (2001). Writing for publication–a guide for new authors. International Journal for Quality in Health Care, 13(5), 417-421.
Gliem, J. A., & Gliem, R. R. (2003). Calculating, interpreting, and reporting Cronbach’s alpha reliability coefficient for Likert-type scales. Midwest Research-to-Practice Conference in Adult, Continuing, and Community Education.
Gusmeroli, S., Piccione, S., & Rotondi, D. (2013). A capability-based security approach to manage access control in the internet of things. Mathematical and Computer Modelling, 58(5-6), 1189-1205.
Hanafizadeh, P., Ghandchi, S., & Asgarimehr, M. (2017). Impact of Information Technology on Lifestyle: A Literature Review and Classification. International Journal of Virtual Communities and Social Networking (IJVCSN), 9(2), 1-23.
47
運用區塊鏈技術於學術論文協同審稿服務
Hayek, F. A. V. (1943). A commodity reserve currency. The Economic Journal, 53(210/211), 176-184.
Herzberg, F., Mausner, B., & Snyderman, B. B. (1959). The motivation to work. New York: John Wiley & Sons.
Hu, V. C., Kuhn, D. R., Ferraiolo, D. F., & Voas, J. (2015). Attribute-based access control. Computer, 48(2), 85-88.
Hu, Y. C., Lee, T. T., Chatzopoulos, D., & Hui, P. (2018, June). Hierarchical interactions between ethereum smart contracts across testnets. In Proceedings of the 1st Workshop on Cryptocurrencies and Blockchains for Distributed Systems, 7-12.
Iyer, K., & Dannen, C. (2018). The ethereum development environment. In Building games with ethereum smart contracts, Apress, Berkeley, CA., 19-36.
Jesus, E. F., Chicarino, V. R., de Albuquerque, C. V., & Rocha, A. A. D. A. (2018). A survey of how to use blockchain to secure internet of things and the stalker attack. Security and Communication Networks, 2018.
Joshi, A., Kale, S., Chandel, S., & Pal, D. K. (2015). Likert scale: Explored and explained. Current Journal of Applied Science and Technology, 7(4), 396-403.
Kapoor, K. K., Dwivedi, Y. K., & Williams, M. D. (2014). Rogers’ innovation adoption attributes: A systematic review and synthesis of existing research. Information Systems Management, 31(1), 74-91.
Keister, T., & Sanches, D. (2018). Should Central Banks Issue Digital Currency?. Manuscript, Rutgers University.
Khan, K. M., Arshad, J., & Khan, M. M. (2018). Secure digital voting system based on blockchain technology. International Journal of Electronic Government Research (IJEGR), 14(1), 53-62.
Lamport, L. (2019). Time, clocks, and the ordering of events in a distributed system. In Concurrency: the Works of Leslie Lamport, 179-196.
48
運用區塊鏈技術於學術論文協同審稿服務
Larivière, V., Haustein, S., & Mongeon, P. (2015). The oligopoly of academic publishers in the digital era. PloS one, 10(6).
Latif, R. M. A., Hussain, K., Jhanjhi, N. Z., Nayyar, A., & Rizwan, O. (2020). A remix IDE: smart contract-based framework for the healthcare sector by using Blockchain technology. Multimedia Tools and Applications, 1-24.
Mahalle, P. N., Anggorojati, B., Prasad, N. R., & Prasad, R. (2013). Identity authentication and capability based access control (iacac) for the internet of things. Journal of Cyber Security and Mobility, 1(4), 309-348.
Makhdoom, I., Abolhasan, M., Abbas, H., & Ni, W. (2019). Blockchain′s adoption in IoT: The challenges, and a way forward. Journal of Network and Computer Applications, 125, 251- 279.
Mingxiao, D., Xiaofeng, M., Zhe, Z., Xiangwei, W., & Qijun, C. (2017, October). A review on consensus algorithm of blockchain. In 2017 IEEE International Conference on Systems, Man, and Cybernetics (SMC), 2567-2572.
Nakamoto, S. (2008). Bitcoin: A peer-to-peer electronic cash system. white paper.
Oberdorf, V. (2016). Blockchain and Development. Utrecht University. Researchgate, draft.
Rana, N. P., Dwivedi, Y. K., Williams, M. D., & Weerakkody, V. (2015). Investigating success of an e-government initiative: Validation of an integrated IS success model. Information Systems Frontiers, 17(1), 127-142.
Ranganthan, V. P., Dantu, R., Paul, A., Mears, P., & Morozov, K. (2018, October). A decentralized marketplace application on the ethereum blockchain. In 2018 IEEE 4th International Conference on Collaboration and Internet Computing (CIC), 90-97.
Rinkeby: Authenticated Faucet. Rinkeby: Authenticated Faucet. Retrieved May 25, 2021, from https://faucet.rinkeby.io/
Rogers, E. M., Singhal, A., & Quinlan, M. M. (2014). Diffusion of innovations, 432-448. 49
運用區塊鏈技術於學術論文協同審稿服務
Saha, S., Saint, S., & Christakis, D. A. (2003). Impact factor: a valid measure of journal quality?. Journal of the Medical Library Association, 91(1), 42.
Sandhu, R. S., Coyne, E. J., Feinstein, H. L., & Youman, C. E. (1996). Role-based access control models. Computer, 29(2), 38-47.
Santos, J. R. A. (1999). Cronbach’s alpha: A tool for assessing the reliability of scales. Journal of extension, 37(2), 1-5.
Seddon, P., & Yip, S. K. (1992). An empirical evaluation of user information satisfaction (UIS) measures for use with general ledger account software. Journal of Information Systems, 6(1), 75-92.
Seligman, L. (2006). Sensemaking throughout adoption and the innovation‐decision process. European Journal of Innovation Management, 9(1), 108-120.
Singh, S., & Remenyi, D. (2016). Plagiarism and ghostwriting: The rise in academic misconduct. South African Journal of Science, 112(5-6), 1-7.
Taherdoost, H. (2016). Validity and reliability of the research instrument; how to test the validation of a questionnaire/survey in a research. How to test the validation of a questionnaire/survey in a research (August 10, 2016).
Teller, A. (1994, June). Turing completeness in the language of genetic programming with indexed memory. In Proceedings of the First IEEE Conference on Evolutionary Computation. IEEE World Congress on Computational Intelligence, 136-141.
Trading View. Trading View. Retrieved May 25, 2021, from https://www.tradingview.com/symbols/BTCUSD/?exchange=BITBAY
Wang, S., Yuan, Y., Wang, X., Li, J., Qin, R., & Wang, F. Y. (2018, June). An overview of smart contract: architecture, applications, and future trends. In 2018 IEEE Intelligent Vehicles Symposium (IV), 108-113.
Wöhrer, M., & Zdun, U. (2018, March). Smart contracts: security patterns in the ethereum ecosystem and solidity. In 2018 International Workshop on Blockchain Oriented Software
50
運用區塊鏈技術於學術論文協同審稿服務
Engineering (IWBOSE), 2-8.
Wood, G. (2014). Ethereum: A secure decentralised generalised transaction
ledger. Ethereum project yellow paper, 1-32.
Zhang, Y., Kasahara, S., Shen, Y., Jiang, X., & Wan, J. (2018). Smart contract-based access
control for the internet of things. IEEE Internet of Things Journal, 6(2), 1594-1605.
Zheng, Z., Xie, S., Dai, H. N., Chen, X., & Wang, H. (2018). Blockchain challenges and
opportunities: A survey. International Journal of Web and Grid Services, 14(4), 352-375. |