博碩士論文 994201003 詳細資訊




以作者查詢圖書館館藏 以作者查詢臺灣博碩士 以作者查詢全國書目 勘誤回報 、線上人數:60 、訪客IP:18.219.241.99
姓名 林哲如(Che-Ju Lin)  查詢紙本館藏   畢業系所 企業管理學系
論文名稱 社群網站使用用途與隱私政策對用戶持續使用意圖影響之研究
(The influence of social networking sites use and privacy policy on the continued use of intent: A case study of Facebook)
相關論文
★ 證券公司財務比率與股價關係之探討—以三家證券公司為例★ 二氧化鈦技術生命週期之研究
★ 整體後勤業參與同步工程於產品開發績效關係之研究—以中科院為例★ 主管與部屬交換關係品質、心理賦能對員工工作滿足之影響─內外控人格干擾效果之探討
★ 轉換型領導、團隊凝聚力、信任與組織公民行為之相關研究-以研發人員為例★ 筆記型電腦之IFA/PIFA天線技術生命週期分析
★ 國籍航空公司經營績效分析-以資料包絡分析方法分析★ 從專利分析看3D IC技術與市場發展
★ 影響企業導入電子發票系統成效之因素探討★ 影響企業導入數位學習成功因素之探討-以個案公司為例
★ 跨國企業之供應商評選與管理–以A公司為例★ 產品生命週期管理系統導入成功要素之探討--以S科技公司為例--
★ 組織創新能力影響因素研究★ 新產品開發流程及績效評估 – 以某電感製造廠M公司為例
★ 製 造 業 閒 置 資 產 轉 售 平 台 製造業閒置資產轉售平台-以廣達電腦股份有限公司為例★ 主管與部屬交換關係對員工工作績效與組織公民行為之影響—以員工心理賦能為中介效果
檔案 [Endnote RIS 格式]    [Bibtex 格式]    [相關文章]   [文章引用]   [完整記錄]   [館藏目錄]   至系統瀏覽論文 ( 永不開放)
摘要(中) 隨著網路使用率的普及,社群網站正漸漸成為許多人即時搜索資訊與交流互動的工具。對社群網站業者來說,找出用戶持續使用社群網站的主要用途並進一步吸引用戶造訪該網站是個重要的議題。另一方陎,儘管社群網站已隨著網際網路技術而日漸普遍,但同時社群網站也衍生了不少隱私相關議題,導致用戶對社群網站的信任產生疑慮,而要如何讓用戶對社群網站產生信任以及如何在隱私開放程度與持續使用該網站的意圖中找到一個帄衡便顯得相當重要。因此本研究目的即找出影響社群網站用戶持續使用的主要用途,並以隱私-信任-行為意向理論模型為基礎,在原有的隱私四項次構陎 (通知、選擇、存取、安全) 之外,多加入了這些隱私政策是否確實「執行」來做為隱私的衡量構陎,探討影響社群網站持續使用意圖的各個因素,以 Facebook 網站用戶做為研究對象共回收 425份有效問卷,使用 STATISTICAS 6.0 軟體進行結構方程模式資料分析,研究結果發現主要影響社群網站用戶持續使用之用途為「社會搜索」與「近況動態」,也發現用戶會透過隱私政策的「安全」保護及是否徹底「執行」來提高社群網站的信任程度,進而增加持續使用意圖,本研究結果可使社群網站業者得以藉由發展這些因素的相關功能,進而有效地留住龐大用戶以產生更大的商機。
摘要(英) As the internet becomes popular, social network has become a tool for people to do research and communicate. For the social networking site companies, it is important issues for them to find the purpose which keeps the users using and attracts them to visit the website continuously. On the other hand, even though social networking site is more popular by the Internet techniques, it also made lots of privacy issues which cause the users losing confidence in those websites. These are the reason why it is very important to know how to build the confidence between users and websites and find the balance between the privacy open extent and the intention of continuously using the website. Therefore, the purpose of this study is to find out the main purpose of the users which impact them continued to use. Based on the privacy-trust-behavioral intentions theoretical model, we added the privacy policy which confirm whether “Enforcement” for privacy measurement beside the old four privacy (notice, choose, access, and safe). We use the additional policy to determent the influence for every factor that affects the social network usage. We use Facebook website user as our study object that we got 425 valid questionnaires, and then we use STATISTICAS 6.0 to analysis these information. The result is that the main purpose which affect social network users are “Social searching” and “Status updates.” Also, users use “safe” and “Enforcement” in privacy setting to raise the trust level of social website then increase the usage intent. Our conclusion can make social website company develop these functions in order to keep these huge users for enormous business opportunity.
關鍵字(中) ★ 社群網站
★ 社群網站使用用途
★ 線上隱私政策
★ 持續使用意圖
關鍵字(英) ★ social networking sites
★ uses of social networking sites
★ online privacy policy
★ the continued use of intent
論文目次 摘要 I
Abstract II
誌謝 III
目錄 IV
圖目錄 VII
表目錄 VIII
一、緒論 1
1-1研究背景與動機 1
1-2研究目的 3
1-3研究流程 4
二、文獻回顧 5
2-1社群網站 5
2-2使用用途 12
 2-2-1社群網站之使用用途 12
 2-2-2持續使用意圖 16
2-3隱私 18
 2-3-1隱私與社群網站 18
 2-3-2線上隱私政策遵守之相關法規 21
 2-3-3隱私與社群網站相關研究 24
2-4信任 27
 2-4-1信任之定義 27
 2-4-2信任中介 29
三、研究方法 31
3-1研究架構 31
3-2研究對象與抽樣方法 32
 3-2-1研究對象 32
 3-2-2抽樣方法 32
3-3研究假設 32
3-4研究變數操作型定義與問卷設計 41
 3-4-1使用用途 41
 3-4-2隱私政策 43
 3-4-3信任 44
 3-4-4持續使用意圖 44
3-5資料分析與統計方法 46
 3-5-1敘述性統計 46
 3-5-2信效度分析 46
 3-5-3線性結構關係模式 46
四、實證結果 49
4-1有效樣本與敘述性統計 49
 4-1-1樣本基本特徵 49
 4-1-2一般使用狀況 50
 4-1-3隱私使用狀況 52
4-2信度與效度 53
 4-2-1信度分析 53
 4-2-2效度分析 54
4-3 結構模式分析 60
 4-3-1結構方程式 60
 4-3-2模型適合度檢定 62
 4-3-3假設檢定 63
五、討論與建議 66
5-1研究結論 66
5-2管理意涵 68
5-3研究限制 70
5-4未來研究建議 71
六、參考文獻 72
6-1中文文獻 72
6-2英文文獻 72
6-3其他來源 82
附錄 84
圖目錄
圖1-1 研究流程 4
圖2-1 世界重要社群網站發展時間軸 8
圖2-2 全球Facebook使用人數成長 10
圖2-3 台灣Facebook使用人數成長 10
圖2-4 虛擬社群會員發展四階段 12
圖2-5 隱私-信任-行為意向模型 30
圖3-1 本研究架構 31
圖4-1 整體模式路徑 61
圖4-2 整體線性模式關係路徑 65
表目錄
表2-1 社群網站之定義 6
表2-2 Facebook大事記 9
表2-3 各網路社群主要使用用途相關研究 14
表2-4 信任之定義 28
表3-1 使用用途的操作型定義及衡量問項 42
表3-2 隱私政策的操作型定義及衡量問項 43
表3-3 信任的操作型定義及衡量問項 44
表3-4 持續使用意圖的操作型定義及衡量問項 45
表3-5 整體模型適配度指標理想值與可接受值 48
表4-1 樣本基本資料整理 50
表4-2 一般使用行為統計表 51
表4-3 隱私使用行為統計表 52
表4-4 各構面之平均數與標準差 53
表4-5 各構面之Cronbach’s α係數值 54
表4-6 整體模式的一階驗證性因素分析 55
表4-7 各構面的平均萃取變異AVE與結構信度CR 58
表4-8 各潛在變項配對相關信賴區間檢定法結果 59
表4-9 整體模型適配度指標與實際數值 62
表4-10 潛在變數之因果關係估計值與研究假說驗證彙整 63
參考文獻 6-1 中文文獻
1.田育菁 (2011) 社群網站於我國隱私權保障之研究 國立東華大學財經法律研究所 碩士論文
2.江嘉軒 (2004) 虛擬社群網站使用動機與社會臨場感研究 國立中山大學傳播管理研究所 碩士論文
3.林嘉容 (2010) 社群網站使用者行為模式之研究-以臉書為例 國立東華大學全球運籌管理研究所 碩士論文
4.岳鵬雲 (2011) 網頁遊戲及網路外部性對於社群網站會員忠誠度之影響-以FACEBOOK 為例 德明財經科技大學資訊科技與管理研究所 碩士論文
5.陳映儒 (2011) 社群網站特性與使用者忠誠度、持續參與意圖之關係研究 東吳大學商學院企業管理研究所 碩士論文
6.劉丹迪 (2011) 移动社會網络服務(Social Network Service, SNS)持續使用行為研究 清華大學經濟管理學院 碩士論文
7.愛麗娜 (2009) 網站隱私保護政策與信任之研究:比較俄羅斯與台灣的差異逢甲大學國際貿易學系 碩士論文
6-2 英文文獻
8.Acquisti, A. and Gross, R. (2005). Information revelation and privacy in online social networks. Wpes’’05, VA p. 71-80.
9.Acquisti, A. and Gross, R. (2006). Imagined communities: Awareness, information sharing, and privacy on the facebook. Privacy Enhancing Technologies 4258, 36-5855
10.Anderson, J. and Gerbing, D. (1988). Structural equation modeling in practice: A review and recommended two-step approach. Psychological bulletin 103(3), 411-423.
11.Andrew D Smock, Nicole B Ellison, Cliff Lampe and Donghee Yvette Wohn (2011). Facebook as a toolkit: A uses and gratification approach to unbundling feature use. Computers in Human Behavior.
12.Asimina Vasalou, Adam N. Joinson and Delphine Courvoisier (2010). Cultural differences, experience with social networks and the nature of ‘‘true commitment’’ in Facebook . Int. J. Human-Computer Studies 68719–728
13.Bernhard Debatin, Jennette P. Lovejoy, Ann-Kathrin Horn, M.A., Brittany N. Hughes (2009). Facebook and Online Privacy: Attitudes, Behaviors, and Unintended Consequences. Journal of Computer-Mediated Communication 15 83–108
14.Bhattacher jee, A. (2001). Understanding information systems continuance: An expectation-confirmation model. Mis Quarterly 25(3), 351-70.
15.Blumler J.G. & Katz, E. (1974). The uses of mass communications: Current perspectives on gratifications research. Beverly Hills, CA: Sage.
16.Boyd, D. (2004). Friendster and publicly articulated social networks. Conference on Human Factors and Computing Systems Vienna.
17.Boyd, D. (2008). Facebook’’s Privacy Trainwreck: Exposure, Invasion, and Social Convergence. Convergence 14, 1
18.Boyd, D. M., and Ellison, N. B. (2007). Social network sites: Definition, history, and scholarship. Journal of Computer-Mediated Communication 13(1), 210-30 article 11. http://jcmc.indiana.edu/vol13/issue1/boyd.ellison.html
19.Buchanan, D.A., Fitzgerald, L. and Ketley, D. (2007). The sustainability and spread of organizational change: Modernizing healthcare. London: Routledge.
20.Bulgurcu, B. Burcu Bulgurcu (2010). Antecedents and Outcomes of Information Privacy Concerns in Online Social Networking: A Theoretical Perspective Working Papers on Information Systems 10(81). http://sprouts.aisnet.org/10-81
21.Chen, S. and Mary-Anne, W. (2009). Privacy in social networks: A comparative study. PACIS p. 81.
22.Chih-Hsiung Tu (2002). The relationship between social presence and online privacy. Internet and Higher Education 5 293–318
23.Craig Ross , Emily S. Orr, Mia Sisic, Jaime M. Arseneault, Mary G. Simmering, R. Robert Orr (2009). Personality and motivations associated with Facebook use. Computers in Human Behavior 25578–586
24.Dwyer, C., Hiltz, S. and Passerini, K. (2007). Trust and privacy concern within social networking sites: A comparison of facebook and mySpace. Americas Conference on Information Systems.
25.Ellison, Nicole B., Charles Steinfield, and Cliff Lampe (2007). The Benefits of Facebook Friends: Social Capital and College Students Use of Online Social 28 Network Sites, Journal of Computer-Mediated Communication, 12(4), article 1. http://jcmc.indiana.edu/vol12/issue4/ellison.html.
26.Ellison, N., Heino, R. and Gibbs, J. (2006). Managing Impressions Online: Self-Presentation Processes in the Online Dating Environment. Journal of Computer-Mediated Communication 11, 2
27.Ellison, N., Steinfield, C. and Lampe, C. (2006). Spatially Bounded Online Social Networks and Social Capital: The Role of Facebook. Paper presented at the annual meeting of the International Communication Association.
28.Flavelle, D. (2007). Worries follow rise of Facebook: Employers not happy with time spent on site. Toronto Star, May 04. Available at: http://www.thestar.com/Business/article/210313
29.Fornell, C. and Larcker, D. (1981). Evaluating structural equation models with unobservable variables and measurement error. Journal of marketing researc, 18, 39-50.
30.Frederick, E.C., Clarke, T.E. and Hamill, C.L. (1984). The effect of running shoe design on shock attenuation. In: Sport Shoes and Playing Surfaces. Ed: Frederick, E.C. Champaign: Human Kinetics. 190-198.
31.Garramone, G. M., Harris, A. C. and Anderson, R. (1986). Uses of political computer bulletin boards. Journal of Broadcasting and Electronic Media 30(3), 325–339.
32.Gefen, D., Karahanna, E., and Straub, D. W. (2003) Inexperience and experience with online stores: The importance of TAM and trust. IEEE Transactions on Engineering Management 50(3), 307-321.
33.Golder, D. Wilkinson and Huberman, (2007). Rhythms of social interaction: Messaging within a massive online network. Third International Conference on Communities and Technologies, at http://www.hpl.hp.com/research/idl/papers/facebook/facebook.pdf, accessed 21 December 2008.
34.Gordon Hull , Heather Richter Lipford, Celine Latulipe.(2007) Contextual gaps: privacy issues on Facebook. Ethics Inf Technol. DOI 10.1007/s10676-010-9224-8
35.Gross, R. and Acquisti, A. (2005). Information Revelation and Privacy in Online Social Networks. In Workshop on Privacy in the Electronic Society, ACM Press.
36.Guo, C. and Yu, J. (2009). Socializing Online in Various Cultural Contexts: A Cross Nation Study of Social Network Service Development. AMCIS, p. 514.
37.Hann, R., Y. Lu and K.R. Subramanyam. (2007). Uniformity versus Flexibility: Evidence from Pricing of the Pension Obligation. The Accounting Review 82(1): 107-137.
38.Ho, A., Maiga, A. and Aimeur, E. (2009). Privacy protection issues in social networking sites. IEEE/Acs International Conference on Computer Systems and Applications. 1 and 2, 271-8
39.Hoffman, D. L., T. P. Novak, M. Peralta (1999). Building consumer trust online. Comm. ACM 42(4) 80–85.
40.Hong, S. J., Thong, J. Y. L. and Tam, K. Y. (2006). Understanding continued informationtechnology usage behavior: A comparison of three models in the context of mobile internet.Decision Support Systems. 42(3), 1819-34.
41.Humphreys, L. (2007). Mobile social networks and social practice: A case study of dodgeball. Journal of Computer-Mediated Communication. 13(1), 341-60.
42.Heijden, T. Verhagen (2002). Measuring and assessing online store image: a study of two online bookshops in the Benelux. In: Proceedings of the 35th Annual Hawali International Conference on System Sciences, Hawali, USA, 7–10.
43.Joinson, A.N. and Paine, C.B. (2007) Self-Disclosure, Privacy and the Internet. Oxford Handbook of Internet Psychology (pp. 237-252). Oxford University Press.
44. Joinson Adam N. (2008). Looking at, Looking up or Keeping up with People? Motives and Uses of Facebook ACM. In CHI ’’08: Proceeding of the twenty-sixth annual SIGCHI conference
45.Katz, J.E., and Aakhus, M.A. (2002). Perpetual contact: mobile communication, private talk, public performance. New York: Cambridge University Press.
46.Kim, B. (2010). An empirical investigation of mobile data service continuance: Incorporatingthe theory of planned behavior into the expectation-confirmation model. Expert Systems with Applications. 37(10), 7033-9.
47.Kolko, B. E., Johnson, E. and Rose, E. (2007). Mobile social software for the developing world. Online Communities and Social Computing, Proceedings. 4564, 385-94
48.Korzaan, M., Brooks, N., and Greer, T. (2009). Demystifying Personality and Privacy: An Empirical Investigation into Antecedents of Concerns for Information Privacy. Journal of Behavioral Studies in Business (1), pp. 1-17.
49.Krasnova, H., Kolesnikova, E. and Guenther, O. (2010). Leveraging trust and privacy concerns in online social networks: An empirical study. ECIS, p. 160.
50.Lampe, C., Ellison, N. and Steinfield, C. (2006). A Face(book) in the Crowd: Social Searching vs. Social Browsing. In proceedings of ACM Special Interest Group on Computer-Supported Cooperative Work, ACM Press , 167 – 170.
51.Lampe, C., Ellison, N. and Steinfield, C. (2007). A Familiar Face(book): Profile Elements as Signals in an Online Social Network. In Proc. CHI 2007, ACM Press 435-444.
52.Lee, M. C. (2010). Explaining and predicting users’’ continuance intention toward e-learning: An extension of the expectation-confirmation model. Computers & Education. 54(2), 506-16.
53.Lee, Y. and Kwon, O. (2010). Intimacy, familiarity and continuance intention: An extended expectation-confirmation model in web-based services. Electronic Commerce Research and Applications.
54.Li, Q., Yongbeom, K., Xin, T. and Jeffrey, H. (2009). The effects of privacy concern and social influence on user acceptance of online social networks. AMCIS, p. 321.
55.Limayem, M., Hirt, S. G. and Cheung, C. M. K. (2007). How habit limits the predictive power of intention: The case of information systems continuance. Mis Quarterly. 31(4), 705-37.
56.Limayem, M. and Cheung, C. M. K. (2008). Understanding information systems continuance: The case of Internet-based learning technologies. Information & Management. 45(4), 227-32.
57.Lin, C. S., Wu, S. and Tsai, R. J. (2005). Integrating perceived playfulness into expectation-confirmation model for web portal context. Information and Management. 42(5),683-93.
58.Liu Chang, Marchewka Jack T., Lu June, Yu Chun-Sheng (2005). Beyond concern—a privacy-trust-behavioral intention model of electronic commerce Information and Management 42289–304
59.Lu, H. and Lin, K. (2011). Why people use social networking sites: An empirical study integrating network externalities and motivation theory. Computers in Human Behavior 27, 1152-1161.
60.Lwin, M., Wirtz, J., and Williams, J. D. (2007). Consumer online privacy concerns and responses: a power-responsibility equilibrium perspective. Journal of the Academy of Marketing Science (35:4), pp. 572-585.
61.Matteo Turilli A Luciano Floridi (2009). The ethics of information transparency. Ethics Inf Technol 11:105–112 DOI 10.1007/s10676-009-9187-9
62.McGuire, W.J.(1974). Psychological Motives and Communication Gratification. The Uses of Mass Communications: Current Perspectives on Gratifications Research. J. G. Blumler and E. Katz, eds.Beverly Hills, CA: Sage Publications,.
63.Metzer, J. (2004). Privacy, trust and disclousure: exploring barriers to electronic commerce. Journal of Computer-mediated Commnication. 9(4).
64.Okazaki, S., Li, H., and Hirose, M. (2009). Consumer Privacy Concerns and Preference for Degree of Regulatory Control. Journal of Advertising (38:4), pp. 63-77.
65.Rempel, J. K., Holmes, J. G., Zanna, M. P. (1985). Trust in close relationships. Journal of Personality and Social Psychology 49, 95 – 122.
66.Ridings, C., Gefen, D., and Arinze, B. (2002). Some Antecedents and Effects of Trust in Virtual Communities. Journal of Strategic Information Systems 11(3-4), 271-295.
67.Roca, J. C., Chiu, C. M. and Martinez, F. J. (2006). Understanding e-learning continuance intention: An extension of the Technology Acceptance Model. International Journal of Human-Computer Studies. 64(8), 683-96.
68.Samantha L. Miller, (2008). The Facebook Frontier: Responding to the Changing Face of Privacy on the Internet. 97 Ky. L. J. 541, 559
69.Shin, D. H. (2010). The effects of trust, security and privacy in social networking: A security-based approach to understand the pattern of adoption. Interacting with Computers. 22(5), 428-38.
70.Sledgianowski, D. and Kulviwat, S. (2008). Social Network Sites: Antecedents of User Adoption and Usage. AMCIS, p. 83.
71.Taylor, S. and Todd, P. A. (1995). Understanding information technology usage: A test of competing models. Information Systems Research. 6(2), 144-76.
72.Thong, J. Y. L., Hong, S. J. and Tam, K. Y. (2006). The effects of post-adoption beliefs on the expectation-confirmation model for information technology continuance. International Journal of Human-Computer Studies. 64(9), 799-810.
73.Tom Buchanan, Carina Paine and Adam N. Joinson (2007). Ulf-Dietrich Reips Development of Measures of Online Privacy Concern and Protection for Use on the Internet, journal of the american society for information science and technology—January 15, DOI: 10.1002/asi
74. Vasaloa, Joinson and Courvoisier (2010). Cultural differences, experience with social networks and the nature of ‘‘true commitment’’ in Facebook. Int. J. Human-Computer Studies 68 (2010) 719–728
75.Venkatesh, V. and Davis, F. D. (2000). A theory extension of the technology acceptance model:four longitudinal field study. Management Science. 45(2), 186-204.
76.Venkatesh, V., Morris, M. G., Davis, G. B. and Davis, F. D. (2003). User acceptance of information technology: Toward a unified view. Mis Quarterly. 27(3), 425-78.
77. Vijayasarathy Leo R. (2004) Predicting consumer intentions to use on-line shopping: the case for an augmented technology acceptance model. Information & Management 41 747–762
78.Warren, S. D. and Harv, L. (1890). The right to privacy. Harvard Law Review. 4(5).
79.Wellman, B., Salaff, J. and Dimitrova, D. (1996). Computer networks as social networks: collaborative work, telework, and virtual community. Annual Review of Sociology, 22, 213-238
80.Zhong, H., Bi, L., Feng, Z. and Li, N. (2008). Research on the Design Method of Mobile Social Network Services. International Conference of Information Management, Innovation Management and Industrial Engineering, p. 458 - 61.
81.Zhou, T. (2011). An empirical examination of users’’ post-adoption behaviour of mobile services. Behaviour & Information Technology. 30(2), 241-50.
82.Ziv, N. and Mulloth, B. (2011). An Exploration on Mobile Social Networking: Dodgeball as a Case in Point. the International Conference on Mobile Business.
6-3 其他來源
83.CRM2顧客是核心股份有限公司 -[臉書] 台灣 Facebook 使用人數 1000 萬 http://crm2.tw/?p=944
84.Inside 網路趨勢觀察 http://www.inside.com.tw/2010/02/21/social_privacy
85.InsightXplorer 創市際市場研究顧問電子報, 創市際月刊報告書2011.07 http://news.ixresearch.com/?p=4299
86.John HagelⅢ & Arthur G. Armstrong著,朱道凱 譯(1998) 網路商機:如何經營虛擬社群?(Net Gain -Expanding Markets through Virtual Communities)
87.udn數位資訊,社群網站掀起隱私大戰http://mag.udn.com/mag/digital/storypage.jsp?f_MAIN_ID=319&f_SUB_ID=2941&f_ART_ID=320194#ixzz1q6ZKTA67
88.周冠中/郭美懿(資料來源:E-Business時代風潮,博碩出版社) http://www.anan1.webnow.biz/it/b11.htm
89.美國聯邦貿易委員會 (US Federal Trade Commission–FTC)公平資訊使用原則 http://www.ftc.gov/reports/privacy3/fairinfo.shtm
90.聯意製作股份有限公司-TVBS網路新聞 ©2002-2010 TVBS TV NETWORK‧All Rights Reserved‧ TVBS.COM.TW網站使用協定
91.電子商務時報 (2007/8/23) 探索資訊時代的網路經濟法則(十二) 解析網路社群的種類和型態 http://www.ectimes.org.tw/shownews.aspx?id=10026
92.電子商務時報 Electronic Commerce Times all right reserved http://www.ectimes.org.tw/Shownews.aspx?id=120227064319
指導教授 洪秀婉、陳春希
(Shiu-Wan Hung、Chun-Hsi Chen)
審核日期 2012-6-26
推文 facebook   plurk   twitter   funp   google   live   udn   HD   myshare   reddit   netvibes   friend   youpush   delicious   baidu   
網路書籤 Google bookmarks   del.icio.us   hemidemi   myshare   

若有論文相關問題,請聯絡國立中央大學圖書館推廣服務組 TEL:(03)422-7151轉57407,或E-mail聯絡  - 隱私權政策聲明