參考文獻 |
〔1〕 Abedniya, A. and Mahmouei, S.S. 2010. “The impact of social networking websites to facilitate the effectiveness of viral marketing,” International Journal of Advanced Computer Science and Applications (1:6), pp. 139-146.
〔2〕 Adams, D. A. and Nelson, R. R. 1992. “Perceived usefulness, ease of use, and usage of information technology: a replication,” MIS Quarterly (16:2), pp. 227-247.
〔3〕 Ajzen, I. 1985. “From intentions to action: A theory of planned behavior,” in J. Kuhl, J. Beckmann (Eds.), Action Control: Form Cognition to Behavior, Springer Veriag, New York, pp. 11-39.
〔4〕 Ajzen, I. 1991. “The theory of planned behavior,” Organization Behavior and Human Decision Processes (50:2), pp. 179-211.
〔5〕 Anandarajan, M., Zaman, M., Dai, Q. and Arinze, B. 2010. “Generation Y adoption of instant messaging: An examination of the impact of social usefulness and media richness on use richness,” IEEE Transactions on Professional Communication (53:2), pp. 132-143.
〔6〕 Anderson, J. C. and Gerbing, D. W. 1988. “Structural equation modeling in practice: A review and recommended two step approach,” Psychological Bulletin, (103:3), pp. 411-423.
〔7〕 Aral, S. and Walker, D. 2011. “Creating social contagion through viral product design: A randomized trial of peer influence in networks,” Management Science (57:9), pp. 1623-1639.
〔8〕 Armstrong, J. S. and Overton, T. S. 1977, “Estimating non-response bias in mail surveys”, Journal of Marketing Research (14:3), pp. 396-402.
〔9〕 Arndt, J. 1967. “Role of product-related conversations in the diffusion of a new product,” Journal of Marketing Research (4:3), pp. 291-295.
〔10〕 Bagozzi, R. P. and Dholakia, U. M. 2002. “Intentional social action in virtual communities,” Journal of Interactive Marketing (16:2), pp. 2-21.
〔11〕 Barnes, N. and Lescault, A. 2011. “The 2011 Inc. 500 social media update: blogging declines as newer tools rule,” Available at http://www.umassd.edu/cmr/studiesresearch/blogstudy5.pdf (access date: 22 March, 2015).
〔12〕 Baron, R.M. and Kenny, D.A. 1986. “The moderator-mediator variable distinction in social psychological research: Conceptual, strategic, and statistical considerations,” Journal of Personality and Social Psychology (51:6), pp. 1173-1182.
〔13〕 Berthon, P. R., Pitt, L. F., Plangger, K. and Shapiro, D. 2012. “Marketing meets Web 2.0, social media, and creative consumers: implications for international marketing strategy,” Business Horizons (55:3), pp. 261-271.
〔14〕 Bollen, K.A. 1989. Structural Equations with Latent Variables, Wiley-Interscience, New York, NY.
〔15〕 Browne, M. W., and Cudeck, R. 1992. “Alternative ways of assessing model fit,” Sociological Methods Research (21:2), pp. 230-258.
〔16〕 Buffardi, L. E. and Campbell, W. K. 2008. “Narcissism and social networking web sites,” Personality and Social Psychology Bulletin (34:10), pp. 1303-1314.
〔17〕 Chan, K. K. and Misra, S. 1990. “Characteristics of the opinion leader: A new dimension,” Journal of Advertising (19:3), pp. 53-60.
〔18〕 Chang, C.C., Hung, S.W., Cheng, M.J. and Wu, C.Y. 2014. “Exploring the intention to continue using social networking sites: The case of Facebook,” Technology Forecasting & Social Change (In Press), Available online 9 May 2014.
〔19〕 Chang, H.H. and Chung, S.S. 2011. “Social capital and individual motivations on knowledge sharing: participant involvement as a moderator,” Information & Management (48:1), pp. 9-18.
〔20〕 Cheung, C. M. K. and Lee, M. K. O. 2010. “A theoretical model of intentional social action in online social networks,” Decision Support System (49:1), pp. 24-30.
〔21〕 Cheung, C. M. K., Chiu, P.Y. and Lee, M. K. O. 2011. “Online social networks: Why do students use facebook?” Computer in Human Behavior (27:4), pp.1337-1343.
〔22〕 Chiu, H.C., Hsieh, Y.C., Kao, Y.H. and Lee, M. 2007. “The determinants of email receivers’ disseminating behaviors on the Internet,” Journal of Advertising Research (47:4), pp. 524-534.
〔23〕 Cho, H., Chen, M. H. and Chung, S. 2010. “Testing an integrative theoretical model of knowledge sharing behavior in the context of Wikipedia,” Journal of the American Society for Information Science and Technology (61:6), pp. 1198-1212.
〔24〕 Choi, M., Panek, E. T., Nardis, Y. and Toma, C. L. 2015. “When social media isn’t social: Friends’ responsiveness to narcissists on Facebook,” Personality and Individual Differences (77), pp.209-214.
〔25〕 Colliander, J. and Dahlén, M. 2011. “Following the fashionable friend: the power of social media,” Journal of Advertising Research (51:1), pp. 313–320.
〔26〕 Cortina, J. M. 1993. “Interaction, nonlinearity, and multicollinearity: Implications for multiple regression,” Journal of Management (19:4), pp.915-922.
〔27〕 Cress, U. (2005). “Ambivalent effect of member portraits in virtual groups,” Journal of Computer Assisted Learning, (21:4), pp. 281-291.
〔28〕 Datta, P., Chowdhury, D. and Chakraborty, B. 2005. “Viral marketing: new form of word of mouth through Internet,” The Business Review (3:2), pp. 69-75.
〔29〕 Davis, F. D. 1989. “Perceived usefulness, perceived ease of use, and user acceptance of information technology,” MIS Quarterly (13:3), pp. 319-340.
〔30〕 Davis, F. D., Bagozzi, R. P. and Warshaw, P. R. 1989. “User acceptance of computer technology: A comparison of two theoretical models,” Management Science (35:8), pp. 982-1003.
〔31〕 Davis, F. D., Bagozzi, R. P. and Warshaw, P. R. 1992. “Extrinsic and intrinsic motivations to use computer in the workplace,” Journal of Applied Social Psychology (22:14), pp. 1111-1132.
〔32〕 Deci, E. L. and Ryan, R. M. 2002. Handbook of Self-Determination, Rochester, NY: University of Rochester Press.
〔33〕 Dholakia, U. M., Bagozzi, R. P. and Pearo, L. K. 2004. “A social influence model of consumer participation in network- and small-group-based virtual communities,” International Journal of Research in Marketing (21:30), pp. 21-263.
〔34〕 Dichter, E. 1966. “How word-of-mouth advertising works,” Harvard Business Review (44:6), pp. 147-166.
〔35〕 Dickinger, A., Arami, M. and Meyer, D. 2008. “The role of perceived enjoyment and social norm in the adoption of technology with network externalities,” European Journal of Information Systems (17:1), pp. 4-11.
〔36〕 Dishaw, M. T. and strong, D. M. 1999. “Extending the technology acceptance model with task-technology fit constructs,” Information & Management (36:1), pp. 9-21.
〔37〕 Dobele, A., Toleman, D. and Beverland, M. 2005. “Controlled infection! Spreading the brand message through viral marketing,” Business Horizons (48:2), pp. 143-149.
〔38〕 Ellemers, N., Kortekaas, P. and Ouwerkerk, J.W. 1999. “Self-categorization, commitment to the group and group self-esteem as related but distinct aspects of social identity,” European Journal of Social Psychology (29:2-3), pp. 371-389.
〔39〕 Ellison, N. B., Steinfield, C. and Lampe, C. 2007. “The benefits of Facebook ‘friends’: Social capital and college students’ use of online social network sites,” Journal of Computer-Mediated Communication (12:4), pp. 1143-1168.
〔40〕 Fishbein, M. and Ajzen, I. 1975. Belief, Attitude, Intentions and Behavior: An Introduction to Theory and Research, Reading MA: Addison-Wesley.
〔41〕 Fornell, C., and Larcker, D. F. 1981. “Evaluating structural equation models with unobservable variables and measurement error,” Journal of Marketing Research (18:1), pp. 39-50.
〔42〕 Fox, J. and Rooney, M. C. 2015. “The Dark Triad and trait self-objectification as predictors of men’s use and self-presentation behaviors on social networking sites,” Personality and Individual Differences (76), pp. 161-165.
〔43〕 Gau, D. H., Cheng, H. F., Chiang, C. T. and Yang, M. H. 2014. “Factors affecting the intention of message forwarding in the social networking sites,” Journal of Information Management (21:4), pp. 365-390.
〔44〕 Gavish, B. and Gerdes Jr., J. H. 1998. “Anonymous mechanisms in group decision support systems communication,” Decision Support Systems (23:4), pp. 297-328.
〔45〕 Godes, D., Mayzlin, D., Chen, Y., Das, S., Dellarocas, C., Pfeiffer, B., Libai, B., Sen, S., Shi, M. and Verleghl, P. 2005. “The firm’s management of social interactions,” Marketing Letters (16:3-4), pp. 415-428.
〔46〕 Hair, J., Black, W., Babin, B., and Anderson, R. 2010. Multivariate Data Analysis (7th ed.): Prentice-Hall, Inc. Upper Saddle River, NJ, USA.
〔47〕 Hendrickson, A. R. and Collins, M. R. 1996. “An assessment of structure and causation of IS usage,” The DATA BASE for Advances in Information Systems (27:2), pp. 61-67.
〔48〕 Hennig-Thurau, T., Gwinner, K.P., Walsh, G. and Gremler, D.D. 2004. “Electronic word-of-mouth via consumer-opinion platforms: What motivates consumers to articulate themselves on the internet,” Journal of Interactive Marketing (18:1), pp. 38-52.
〔49〕 Hinz, O., Skiera, B., Barrot, C. and Becker, J. U. 2011. “Seeding strategies for viral marketing: an empirical comparison,” Journal of Marketing (75:6), pp. 55-71.
〔50〕 Hite, D. M., Voelker, T. and Rober, A. 2014. “Measuring perceived anonymity: The development of as context independent instrument,” Journal of Methods and Measurement in the Social Sciences (5:1), pp. 22-39.
〔51〕 Ho, J. Y.C. and Dempsey, M. 2010. “Viral marketing: motivations to forward online content,” Journal of Business Research (63:9-10), pp. 1000-1006.
〔52〕 Hogg, M. A. and Abrams, D. 1990. Social Identifications: A Social Psychology of Intergroup Relations and Group Processes, London, Routledge.
〔53〕 Hsu, C.-L. and Lin, C.-C. 2008. “Acceptance of blog usage: The roles of technology acceptance, social influence and knowledge sharing motivations,” Information & Management (45:1), pp. 65-74.
〔54〕 Huang, Z. and Benyoucef, M. 2013. “From e-commerce to social commerce: A close look at design features,” Electronic Commerce Research and Applications (12:4), pp. 246-259.
〔55〕 Ip, R.K.F. and Wagner, C. 2008. “Weblogging: A study of social computing and its impact on
organizations,” Decision Support Systems (45:2), pp. 242-250.
〔56〕 Ispareh, M. and Ladani, B. T. 2009. “A conceptual framework for specification, analysis, and design of anonymity services,” in Proceedings of the 2009 EDBT/ICDT Workshops, Saint-Petersburg, Russia, 23-26 March, pp. 131-138.
〔57〕 Jiang, Z., Heng, C. S. and Choi, B. C. F. 2013. “Privacy concerns and privacy-protective behavior in synchronous online social interactions,” Information System Research (24:3), pp. 579-595.
〔58〕 Kaikati, A., and, Kaikati, J. 2004. “Stealth marketing: How to reach consumers surreptitiously,” California Management Review (46:4), pp.6-22.
〔59〕 Kaplan, A. M. and Haenlein, M. 2010. “Users of the world, united! The challenges and opportunities of social media,” Business Horizons (53:1), pp. 59-68.
〔60〕 Kelman, H. C. 1958. “Compliance, identification, and internalization three processes of attitude change,” The Journal of Conflict Resolution (2:1), pp. 51-60.
〔61〕 Kietzman, J. H., Hermkens, K., McCarthy, I. P. and Silvestre, B. S. 2011. “Social media? Get serious! Understanding the functional building blocks of social media,” Business Horizons (54:3), pp.241-251.
〔62〕 Kline, R. B. 1998. Principles and Practices of Structural Equation Modeling. New York: Guilford Press.
〔63〕 Koo, C., Wati, Y., and Jung, J. J. 2011. “Examination of how social aspects moderate the relationship between task characteristics and usage of social communication technologies (SCTs),” International Journal of Information Management (31:5), pp. 445-459.
〔64〕 Korsgaard, M.A. and Roberson, L. 1995. “Procedural justice in performance evaluation: The role of instrumental and non-instrumental voice in performance appraisal discussions,” Journal of Management (21:4), pp. 657-669.
〔65〕 Kwon, O. and Wen, Y. 2010. “An empirical study of the factors affecting social network service use,” Computers in Human Behavior (26:2), pp. 254-263.
〔66〕 Lamb, R. and Kling, R. 2003. “Reconceptualizing users as social actors in information systems research,” MIS Quarterly (27:2), pp. 197-235
〔67〕 Lampe, C., Ellison, N. and Steinfield, C. 2007. “A familiar face(book): Profile elements as signals in an online social network,” in Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, San Jose, California, USA, 28 April - 3 May, pp. 435-444.
〔68〕 Larson, R. J. 2009. “The rise of viral marketing through the new media of social media,” Available at: http://works.bepress.com/rebecca_lingley/2 (access date: 22 March, 2015).
〔69〕 Lee, C. S. and Ma, L. 2012. “News sharing in social media: The effect of uses and gratifications and prior experience,” Computer in Human Behavior (28:2), pp. 331-339.
〔70〕 Lee, E.-J. and Jang, J.-W. 2010. “Profiling good Samaritans in online knowledge forums: Effects of affiliative tendency, self-esteem, and public individuation on knowledge sharing,” Computers in Human Behavior (26:6), pp. 1336-1344.
〔71〕 Lee, J., Lee J.-H. and Lee, D. 2009. “Impacts of tie characteristics on online viral diffusion,” Communications of the Association for Information Systems (24), pp. 545-546.
〔72〕 Li, J. and Zhan, L. J. 2011. “Online persuasion: How the written word drives WOM evidence from consumer-generated product reviews,” Journal of Advertising Research (51:1), pp. 239-257.
〔73〕 Li, X. 2011. “Factors influencing the willingness to contribute information to online communities,” New Media & Society (13:2), pp. 279-296.
〔74〕 Liang, H., Saraf, N., Hu, Q. and Xue, Y. 2007. “Assimilation of enterprise systems: The effect of institutional pressures and the mediating role of top management,” MIS Quarterly (31:1), pp. 59-87.
〔75〕 Lin, H.-F. 2007. “Effects of extrinsic and intrinsic motivation on employee knowledge sharing intentions,” Journal of Information Science (33:2), pp. 135-149.
〔76〕 Lin, K.-Y. and Lu, H.-P. 2011. “Why people use social networking sites: An empirical study integrating network externalities and motivation theory,” Computer in Human Behavior (27:3), pp. 1152-1161.
〔77〕 Lin, K.-Y. and Lu, H.-P. 2015. “Predicting mobile social network acceptance based on mobile value and social influence,” Internet Research (25:1), pp. 107-130.
〔78〕 Liu, S.-H., Chou, C.-H. and Liao, H.-L. 2015 “An exploratory study of product placement in social media,” Internet Research (25:2), pp. 300-316.
〔79〕 Mardia, K. V. and Foster, K. 1983. “Omnibus test of multi-normality base on skewness and kurtosis,” Communication in Statistics (12:2), pp. 207-221.
〔80〕 Maslach, C., Stapp, J. and Santee, R. T. 1985. “Individuation: Conceptual analysis and assessment,” Journal of Personality and Social Psychology (49:3), pp. 729-738.
〔81〕 Montgomery, A. L. 2001. “Applying quantitative marketing techniques to the Internet,” Interfaces (31:2), pp. 90-108.
〔82〕 Moon J.-W. and Kim, Y.-G. 2001. “Extending the TAM for a World-Wide-Web context,” Information & Management (38:4), pp.217-230.
〔83〕 Mühlenfeld, H. U. 2005. “Differences between ‘talking about’ and ‘admitting’ sensitive behavior in anonymous and non-anonymous we-based interviews,” Computers in Human Behavior (21:6), pp. 993-1003.
〔84〕 Ngai, E. W.T., Tao, S. S.C. and Moon, K. K.L. 2015. “Social media research: Theories, constructs, and conceptual frameworks,” International Journal of Information Management (35:1), pp. 33-44.
〔85〕 Nissenbaum, H. 1999. “The meaning of anonymity in an information age,” The Information Society (15:2), pp. 141-144.
〔86〕 Osatuyi, B. 2013. “Information sharing on social media sites,” Computers in Human Behavior (29:6), pp. 2622-2631.
〔87〕 Palka, W., Pousttchi, K. and Wiedemann, D. G. 2009. “Mobile word-of-mouth – A grounded theory of mobile viral marketing,” Journal of Information Technology (24:2), pp. 172-185.
〔88〕 Papadopoulos, T., Stamati, T. and Nopparuch, P. 2013. “Exploring the determinants of knowledge sharing via employee weblogs,” International Journal of Information Management (33:1), pp. 133-146.
〔89〕 Park, J. H., Gu, B., Leung, A. C. M. and Konana, P. 2014. “An investigation of information sharing and seeking behaviors in online investment communities,” Computer in Human Behavior (31:Febuary), pp. 1-12.
〔90〕 Pescher, C., Reichhart, P. and Spann, M. 2014. “Consumer decision-making process in mobile viral marketing campaigns,” Journal of Interactive Marketing (28:1), pp. 43-54.
〔91〕 Pi, S.-M., Chou, C.-H. and Liao, H.-L. 2013. “A study of Facebook Groups members’ knowledge sharing,” Computers in Human Behavior (29:5), pp. 1971-1979.
〔92〕 Pinsonneault, A.and Heppel, N. 1997. “Anonymity in group support systems research: A new conceptualization, measure, and contingency framework,” Journal of Management Information Systems (14:3), pp. 89-108.
〔93〕 Podsakoff, P., MacKenzie, S., Lee, J., and Podsakoff, N. 2003. “Common method biases in behavioral research: A critical review of the literature and recommended remedies,” Journal of Applied Psychology (88:5), pp. 879-903.
〔94〕 Podsakoff, P. and Organ, D. 1986. “Self-reports in organizational research: Problems and prospects,” Journal of Management (12:4), pp. 531-544.
〔95〕 Postmes, T., Spears, R., Sakhel, K. and de Groot, D. 2001. “Social influence in computer-mediated communication: the effects of anonymity on group behavior,” Personality and Social Psychology Bulletin (27:10), pp. 1243-1254.
〔96〕 Price L. L., Feick, L. F. and Guskey, A. 1995. “Everyday market helping behavior,” Journal of Public Policy & Marketing (14:2), pp. 255-266.
〔97〕 Reinig, B. A. and Mejias, R. J. 2004. “The effects of national culture and anonymity on flaming and criticalness in GSS-supported discussions,” Small Group Research (35:6), pp. 698-723.
〔98〕 Schulze, C., Schöler, L. and Skiera, B. 2014. “Not all fun and games: viral marketing for utilitarian products,” Journal of Marketing (78:1), pp. 1-19.
〔99〕 Schutz, W. C. 1966. FIRO: A Three Dimensional Theory of Interpersonal Behavior, New York: Holt, Rinehart, & Winston.
〔100〕 Scott, C. R. 1998. “Reveal or not to reveal: A theoretical model of anonymous communication,” Communication Theory (8:4), pp. 381-407.
〔101〕 Scott, J. E. 1995. “The measurement of information systems effectiveness: Evaluating a measuring instrument,” ACM SIGMIS Database (26:1), pp. 43-61.
〔102〕 Scott, A. V. and Orlikowski, W. J. 2014. “Entanglements in practice: Performing anonymity through social media,” MIS Quarterly (38:3), pp. 873-893.
〔103〕 Spinello, R.A. 2001. “Code and moral values in cyberspace,” Ethics and Information (3: 2), pp. 137-150.
〔104〕 Subramanian, G. H. 1994. “A replication of perceived usefulness and perceived ease of use measurement,” Decision Sciences (25:5-6), pp.863-874.
〔105〕 Sundaram, D.S., Mitra, K. and Webster, C. 1998. “Word-of-mouth communications: A motivational analysis,” Advances in Consumer Research (25:1), pp. 527-531.
〔106〕 Tajfel, H. 1978. Differentiation between Groups: Studies in the Social Psychology of Intergroup Relation, London: Academic Press.
〔107〕 Teo, T. S. H., Lim V. K. G. and Lai, R. Y. C. 1999. “Intrinsic and extrinsic motivations in Internet usage,” Omega (27:1), pp. 25-37.
〔108〕 Thong, J. Y.L., Hong, S.-J. and Tam, K. Y. 2006. “The effects of post-adoption beliefs on the expectation-confirmation model for information technology continuance,” International Journal of Human-Computer Studies (64:9), pp. 799-810.
〔109〕 Tillwick, H. and Olivier, M. S. 2008. “Bridging the gap between anonymous e-mail and anonymous web browsing,” Online Information Review (32:1), pp. 22-34.
〔110〕 Tornatzky, L. G. and Klein, K. J. 1982. “Innovation characteristics and innovation adoption-implementation: A meta-analysis of findings,” IEEE Transactions on Engineering Management (EM-29:1), pp. 28-45.
〔111〕 Ullman, J. B. 2006. “Structural equation modeling: Reviewing the basics and moving forward,” Journal of Personality Assessment (87:1), pp. 35-50.
〔112〕 Van der Heijden, H. 2004. “User acceptance of hedonic information systems,” MIS Quarterly (28:4), pp. 695-704.
〔113〕 Venkatesh, V. and Davis, F. D. 2000. “A theoretical extension of the technology acceptance model: Four longitudinal field studies,” Management Science (46:2), pp. 186-204.
〔114〕 Venkatesh, V., Speier, C. and Morris, M. 2002. “User acceptance enablers in individual decision making about technology toward an integrated model,” Decision Science (33:2), pp. 297-316.
〔115〕 Wallace, K. A. 1999. “Anonymity,” Ethics and Information Technology (1:1), pp. 23-35.
〔116〕 Washaw, P. R. 1980. “A new model for predicating behavioral intentions: An alternative to Fishbein,” Journal of Marketing Research (17:2), pp. 153-172.
〔117〕 Wiedemann, D. G., Haunstetter, T. and Pousttchi, K. 2008. “Analyzing the basic elements of mobile viral marketing-An empirical study,” in Proceedings of the 7th International Conference on Mobile Business, IEEE, Barcelona,7-8 July, pp. 75-85.
〔118〕 Wilson, R.F. 2000. “The six simple principles of viral marketing,” Available at http://webmarketingtoday.com/articles/viral-principles/ (access date: 22 March, 2015).
〔119〕 Zhou, T. 2011. “Understanding online community user participation: A social influence perspective,” Internet Research (21:1), pp. 67-81.
|