參考文獻 |
英文文獻部份
[1] Ajzen, I. (1985). From intentions to actions: A theory of planned behavior. New York, Springer.
[2] Akgun, A. E., G. S. Lynn, et al. (2006). "Learning process in new product development teams and effects on product success: A socio-cognitive perspective." Industrial Marketing Management 35(2): 210-224.
[3] Anderson, C. A. and D. L. Jennings (1980). "When experiences of failure promote expectations of success: The impact of attribution failure to ineffective strategies1." Journal of Personality 48(3): 393-407.
[4] Ardichvili, A., V. Page, et al. (2003). "Motivation and barriers to participation in virtual knowledge-sharing communities of practice." Journal of knowledge management 7(1): 64-77.
[5] Bagozzi, R. P. and Y. Yi (1988). "On the evaluation of structural equation models." Journal of the academy of marketing science 16(1): 74-94.
[6] Baker, W. E. (1990). "Market networks and corporate behavior." The American Journal of Sociology 96(3): 589-625.
[7] Bandura, A. (1977). "Self-efficacy: Toward a unifying theory of behavioral change." Psychological review 84(2): 191-215.
[8] Bandura, A. (1982). "Self-efficacy mechanism in human agency." American psychologist 37(2): 122-147.
[9] Bandura, A. (1986). "Social foundations of thought and action." Englewood Cliffs, NJ.
[10] Bandura, A. (1994). Self-efficacy. Encyclopedia of human behavior. V. S. Ranachaudran: 71-81.
[11] Bandura, A. (1997). Self-efficacy: The exercise of control, New York: W.H. Freeman.
[12] Bandura, A., N. E. Adams, et al. (1977). "Cognitive processes mediating behavioral change." Journal of personality and social psychology 35(3): 125-139.
[13] Bandura, A., N. E. Adams, et al. (1980). "Tests of the generality of self-efficacy theory." Cognitive Therapy and Research 4(1): 39-66.
[14] Bandura, A. and D. Cervone (1983). "Self-evaluative and self-efficacy mechanisms governing the motivational effects of goal systems." Journal of personality and social psychology 45(5): 1017.
[15] Beale. (2009). "Advertising: in the l-shaped gloom, pr and adland must wed." from http://www.independent.co.uk/news/media/advertising/claire-beale-on-advertising-in-the-lshaped-gloom-pr-and-adland-must-wed-1651593.html.
[16] Berger, P. L. and T. Luckmann (1966). The social construction of reality. London, Penguin Press.
[17] Bhattacherjee, A. (2001). "Understanding information systems continuance: An expectation-confirmation model." MIS quarterly: 351-370.
[18] Bhattacherjee, A., J. Perols, et al. (2008). "Information technology continuance: a theoretic extension and empirical test." The Journal of Computer Information Systems 49(1): 17-26.
[19] Biocca, F., C. Harms, et al. (2003). "Toward a more robust theory and measure of social presence: Review and suggested criteria." Presence: Teleoperators & Virtual Environments 12(5): 456-480.
[20] Biran, M. and G. T. Wilson (1981). "Treatment of phobic disorders using cognitive and exposure methods: A self-efficacy analysis." Journal of Consulting and Clinical Psychology 49(6): 886.
[21] Blau, P. M. (1964). Exchange and power in social life. New York, Wiley.
[22] Bock, G. W. and Y. Kim (2002). "Breaking the myths of rewards: an exploratory study of attitudes about knowledge sharing." Information Resources Management Journal 15(2): 14-21.
[23] Boisot, M. (1995). Information space: A framework for learning in organizations, institutions and culture, London: Routledge.
[24] Boland Jr, R. J. and R. V. Tenkasi (1995). "Perspective making and perspective taking in communities of knowing." Organization Science 6: 350-372.
[25] Bourdieu, P. (1986). The forms of social capital, Westport Connecticut: Greenwood press.
[26] Boyd, D. (2006). "Friends, Friendsters, and MySpace Top 8: Writing Community Into Being on Social Network Sites." First Monday 11(12).
[27] Boyd, D. (2008). "Facebook's privacy trainwreck: Exposure, invasion, and social convergence." Convergence: The International Journal of Research into New Media Technologies 14(1): 13-20.
[28] Boyd, D. M. and N. B. Ellison (2008). "Social network sites: Definition, history, and scholarship." Journal of Computer Mediated Communication 13(1): 210-230.
[29] Brockman, B. K. and R. M. Morgan (2003). "The role of existing knowledge in new product innovativeness and performance." Decision Sciences 34(2): 385-419.
[30] Brown, I. and D. K. Inouye (1978). "Learned helplessness through modeling: The role of perceived similarity in competence." Journal of personality and social psychology 36(8): 900.
[31] Bruner, J. S. (1990). Acts of meaning. MA, Harvard University Press.
[32] Burt, R. S. (1992). Structural holes: The social structure of competition. Cambridge, MA, Harvard University Press.
[33] Campbell, D. T. (1969). Ethnocentrism of disciplines and the fish-scale model of omniscience. Interdisciplinary relationships in the social sciences. M. Sherif and C. Sherif(Eds.). Chicago, Aldine: 328-348.
[34] Chattopadhyay, P. (1999). "Beyond direct and symmetrical effects: The influence of demographic dissimilarity on organizational citizenship behavior." The Academy of Management Journal 42(3): 273-287.
[35] Chiu, C. M., M. H. Hsu, et al. (2006). "Understanding knowledge sharing in virtual communities: an integration of social capital and social cognitive theories." Decision Support Systems 42(3): 1872-1888.
[36] Chiu, H. C., Y. C. Hsieh, et al. (2007). "The determinants of email receivers' disseminating behaviors on the Internet." Journal of Advertising Research 47(4).
[37] Clark, B. R. (1972). "The occupational saga in higher education." Administrative Science Quarterly 17: 178-184.
[38] Coleman, J. S. (1990). Foundations of Social Theory. Cambridge, MA, The Belknap Press of Harvard University Press.
[39] Compeau, D., C. A. Higgins, et al. (1999). "Social cognitive theory and individual reactions to computing technology: A longitudinal study." MIS quarterly: 145-158.
[40] Compeau, D. R. and C. A. Higgins (1995). "Computer self-efficacy: Development of a measure and initial test." MIS quarterly: 189-211.
[41] Davis, F. D. (1989). "Perceived usefulness, perceived ease of use, and user acceptance of information technology." MIS quarterly: 319-340.
[42] Davis, F. D., R. P. Bagozzi, et al. (1989). "User acceptance of computer technology: a comparison of two theoretical models." Management science 35(8): 982-1003.
[43] Davis, F. D., R. P. Bagozzi, et al. (1992). "Extrinsic and Intrinsic Motivation to Use Computers in the Workplace1." Journal of Applied Social Psychology 22(14): 1111-1132.
[44] Deci, E. L. (1971). "Effects of externally mediated rewards on intrinsic motivation." Journal of personality and social psychology 18(1): 105-115.
[45] Dellarocas, C. (2003). "The digitization of word of mouth: Promise and challenges of online feedback mechanisms." Management science 49(10): 1407-1424.
[46] Dichter, E. (1966). "How word-of-mouth advertising works." Harvard Business Review 44(6): 147-160.
[47] Dominick, J. R. (1999). "Who Do You Think You Are? Personal Home Pages and Self-Presentation on the World Wide Web." Journalism and Mass Communication Quarterly 76(4): 646-58.
[48] Dougherty, D. (1996). Interpretive barriers to successful product innovation in large firms. Cognitive within and between organizations. Thounsand Oaks, CA: Sage: 307-340.
[49] Eisenberg, L. (2009). Shoptimism: why the American consumer will keep on buying no matter what. London, Free Press.
[50] Elliott. (2010). "Do-it-yourself super ads, The New York Times, Media & Advertising." from http://www.nytimes.com/2010/02/09/business/media/09adco.html
[51] Finkelstein, M. A., L. A. Penner, et al. (2005). "Motive, role identity, and prosocial personality as predictors of volunteer activity." Social Behavior and Personality: an international journal 33(4): 403-418.
[52] Fishbein, M. and I. Ajzen (1975). Belief, attitude, intention, and behavior: An introduction to theory and research. MA, Addison-Wesley.
[53] Fornell, C. and D. F. Larcker (1981). "Structural equation models with unobservable variables and measurement error: Algebra and statistics." Journal of Marketing Research 18(3): 382-388.
[54] Fukuyama, F. (1995). Trust: The social virtues and the creation of prosperity, Lodon: Hamish Hamilton.
[55] Goffman, E. (1959). The presentation of self in everyday life Garden City. NY, Doubleday.
[56] Goffman, E. (1967). Interaction ritual: Essays on face-to-face behavior. Garden City, NY., Doubleday.
[57] Granovetter, M. (1992). Problems of explanation in economic sociology. Networks and organizations: Structure, form, and action. N. N. R. E. (Eds.). Boston, Harvard Business School Press: 25-26.
[58] Granovetter, M. S. (1973). "The strength of weak ties." The American Journal of Sociology 78(6): 1360-1380.
[59] Grewal, D., G. R. Iyer, et al. (2003). "The Internet and the price-value-loyalty chain." Journal of Business Research 56(5): 391-398.
[60] Gruen, T. W., T. Osmonbekov, et al. (2006). "eWOM: The impact of customer-to-customer online know-how exchange on customer value and loyalty." Journal of Business Research 59(4): 449-456.
[61] Hair, J. F., W. C. Black, et al. (1998). Multivariate data analysis, Prentice hall Upper Saddle River, NJ.
[62] Haythornthwaite, C. (2005). "Social networks and Internet connectivity effects." Information, Communication & Society 8(2): 125-147.
[63] Hedberg, B. (1981). How organizations learn and unlearn. Handbook of Organizational Design. P. C. Nystrom and W. H. S. (eds.). Oxford, UK, Oxford University Press. 1: 3-27.
[64] Hennig-Thurau, T., K. P. Gwinner, et al. (2004). "Electronic word of mouth via consumer opinion platforms: What motivates consumers to articulate themselves on the Internet?" Journal of Interactive Marketing 18(1): 38-52.
[65] Ho, J. Y. C. and M. Dempsey (2010). "Viral marketing: Motivations to forward online content." Journal of Business Research 63(9-10): 1000-1006.
[66] Holzner, S. (2008). Facebook marketing: leverage social media to grow your business. New York, Que Publishing.
[67] Howe, J. (2009). Crowdsourcing: Why the power of the crowd is driving the future of business. London, Random House Books.
[68] Hsu, C. L. and J. C. C. Lin (2008). "Acceptance of blog usage: The roles of technology acceptance, social influence and knowledge sharing motivation." Information & Management 45(1): 65-74.
[69] Hsu, M. H., C. M. Chiu, et al. (2004). "Determinants of continued use of the WWW: an integration of two theoretical models." Industrial management & data systems 104(9): 766-775.
[70] Huang, C. C., T. C. Lin, et al. (2009). "Factors affecting pass-along email intentions (PAEIs): Integrating the social capital and social cognition theories." Electronic Commerce Research and Applications 8(3): 160-169.
[71] Huang, C. Y., Y. Z. Shen, et al. (2007). "Bloggers' motivations and behaviors: A model." Journal of Advertising Research.
[72] Ibarra, H. (1992). Structural alignments, individual strategies, and managerial action: Elements toward a network theory of getting things done. Networks and organizations: Structure, form, and action. Boston: Harvard Business School Press. 165-188.
[73] Jacobs, J. (1965). The death and life of great American cities, London: Penguin Books.
[74] Kaiser, H. F. (1974). "An index of factorial simplicity." Psychometrika 39(1): 31-36.
[75] Kankanhalli, A., B. C. Y. Tan, et al. (2005). "Contributing knowledge to electronic knowledge repositories: An empirical investigation." MIS quarterly: 113-143.
[76] Krackhardt, D. (1989). Graph theoretical dimensions of informal organizations. Paper presented at the annual meeting of the Academy of Managment. Washington, DC.
[77] Kramer, R. M., M. B. Brewer, et al. (1996). "Collective trust and collective action." Trust in organizations: Frontiers of theory and research: 357–389.
[78] Kurijdsijk, J. V. (2007). Technolographics Survey Highlights: European Technographics Online Media, Marketing, and Retail Survey, Amsterdam.
[79] Litvin, S. W., R. E. Goldsmith, et al. (2008). "Electronic word-of-mouth in hospitality and tourism management." Tourism management 29(3): 458-468.
[80] Ma, M. and R. Agarwal (2007). "Through a glass darkly: Information technology design, identity verification, and knowledge contribution in online communities." Information Systems Research 18(1): 42-67.
[81] Madden, T. J., P. S. Ellen, et al. (1992). "A comparison of the theory of planned behavior and the theory of reasoned action." Personality and social psychology Bulletin 18(1): 3-9.
[82] Mael, F. A. and L. E. Tetrick (1992). "Identifying organizational identification." Educational and Psychological Measurement 52(4): 813-824.
[83] Matz, D. C. and W. Wood (2005). "Cognitive dissonance in groups: The consequences of disagreement." Journal of personality and social psychology 88(1): 22-37.
[84] Milgram, S. (1967). "The small world problem." Psychology today 2(1): 60-67.
[85] Mishra, A. K. (1996). Organizational responses to crisis. The centrality of trust. Trust in organizations. R. M. Kramer and T. M. Tyler(Eds.). Thousand Oaks, CA, Sage: 261-287.
[86] Misztal, B. A. (1996). Trust in modern societies: The search for the bases of social order. Cambridge England, Polity Press.
[87] Mooradian, T. A. and K. S. Swan (2006). "Personality-and-culture: The case of national extraversion and word-of-mouth." Journal of Business Research 59(6): 778-785.
[88] Nahapiet, J. and S. Ghoshal (1998). "Social capital, intellectual capital, and the organizational advantage." The academy of management review 23(2): 242-266.
[89] Nisbet, R. A. (1969). Social change and history: Aspects of the western theory of development. London, Oxford University Press.
[90] Nonaka, I. and H. Takeuchi (1995). The Knowledge Creating Company. New York, Oxford University Press.
[91] Nunnally, J. C. (1978). Psychometric Theory. New York, McGraw-Hill.
[92] Papacharissi, Z. (2002). "The presentation of self in virtual life: Characteristics of personal home pages." Journalism and Mass Communication Quarterly 79(3): 643-660.
[93] Phelps, J. E., R. Lewis, et al. (2004). "Viral marketing or electronic word-of-mouth advertising: Examining consumer responses and motivations to pass along email." Journal of Advertising Research 44(04): 333-348.
[94] Pierce, R. A. (1975). Measure of Values. ETS Test Collection-Tests in Microfiche #07684. Princeton, New Jersey: ETS.
[95] Pondy, L. R. and I. I. Mitroff (1979). "Beyond open system models of organization." Research in organizational behavior 1(1): 3-39.
[96] Price, L. L., L. F. Feick, et al. (1995). "Everyday market helping behavior." Journal of Public Policy & Marketing: 255-266.
[97] Rubin, R. B., E. M. Perse, et al. (1988). "Conceptualization and measurement of interpersonal communication motives." Human Communication Research 14(4): 602-628.
[98] Rushton, J. P., R. D. Chrisjohn, et al. (1981). "The altruistic personality and the self-report altruism scale." Personality and Individual Differences 2(4): 293-302.
[99] Schadler, T. (2007). Technolographics Survey Highlights: North-American Technographics Consumer Technology Onlie Survey. Cambridge, MA.
[100] Schau, H. J. and M. C. Gilly (2003). "We are what we post? Self-presentation in personal web space." Journal of Consumer Research: 385-404.
[101] Schroeder, R., A. Steed, et al. (2001). "Collaborating in networked immersive spaces: as good as being there together?" Computers & Graphics 25(5): 781-788.
[102] Schunk, D. H. (1984). "Self-efficacy perspective on achievement behavior." Educational Psychologist 19(1): 48-58.
[103] Schwartz, S. H. (1977). "Normative Influences on Altruism1." Advances in experimental social psychology 10: 221-279.
[104] Shin, D. H. (2009). "The evaluation of user experience of the virtual world in relation to extrinsic and intrinsic motivation." International Journal of Human-Computer Interaction 25(6): 530-553.
[105] Smith, J. D. and D. R. Shaffer (1986). "Self-consciousness, self-reported altruism, and helping behaviour." Social Behavior and Personality: an international journal 14(2): 215-220.
[106] Sundaram, D. S., K. Mitra, et al. (1998). "Word-of-mouth communications: A motivational analysis." Advances in Consumer Research 25(1): 527-531.
[107] Sunden, J. (2003). "Material Virtualities: Approaching online textual embodiment."
[108] Swann Jr, W. B., B. W. Pelham, et al. (1989). "Agreeable fancy or disagreeable truth? Reconciling self-enhancement and self-verification." Journal of personality and social psychology 57(5): 782-791.
[109] Szulanski, G. (1996). "Exploring internal stickiness: Impediments to the transfer of best practice within the firm." Strategic management journal 17: 27-43.
[110] Taylor, S. and P. A. Todd (1995). "Understanding information technology usage: A test of competing models." Information Systems Research 6(2): 144-176.
[111] Thompson, R. L., C. A. Higgins, et al. (1991). "Personal computing: toward a conceptual model of utilization." MIS quarterly: 125-143.
[112] Thong, J. Y. L., S. J. Hong, et al. (2006). "The effects of post-adoption beliefs on the expectation-confirmation model for information technology continuance." International Journal of Human-Computer Studies 64(9): 799-810.
[113] Tsai, W. and S. Ghoshal (1998). "Social capital and value creation: The role of intrafirm networks." The Academy of Management Journal 41(4): 464-476.
[114] Vallerand, R. J. (1997). "Toward a hierarchical model of intrinsic and extrinsic motivation." Advances in experimental social psychology 29: 271-360.
[115] Van der Heijden, H. (2004). "User acceptance of hedonic information systems." MIS quarterly 28(4): 695-704.
[116] Venkatesh, V. and F. D. Davis (2000). "A theoretical extension of the technology acceptance model: four longitudinal field studies." Management science: 186-204.
[117] Venkatesh, V., M. G. Morris, et al. (2003). "User acceptance of information technology: Toward a unified view." MIS quarterly: 425-478.
[118] Walker, K. (2000). "“It's Difficult to Hide It”: The Presentation of Self on Internet Home Pages." Qualitative Sociology 23(1): 99-120.
[119] Wasko, M. M. L. and S. Faraj (2005). "Why should I share? Examining social capital and knowledge contribution in electronic networks of practice." MIS quarterly: 35-57.
[120] Watts, D. J. and J. Peretti (2007). Viral marketing for the real world, Harvard Business Review. May: 22-23.
[121] Webster, J. and J. J. Martocchio (1993). "Turning work into play: Implications for microcomputer software training." Journal of Management 19(1): 127-146.
中文文獻部份
[1] BloggerAds. (2010). "【2010部落格回顧】九成部落格格主,樂在臉書塗鴉牆分享好康." from http://www.cna.com.tw/postwrite/cvpread.aspx?ID=73445.
|