|
參考文獻 1.朱建民,2003年1月,知識論,台北:國立空中大學,初版:頁205-222。 2.吳景源,1999年10月,談營業秘密法關於營業秘密之保護,台北:萬國法律,第107期:頁19-24。 3.李旦,1999年1月,營業秘密之保護-關於客戶名單,台北:智慧財產權月刊,創刊第1期:頁117-128。 4.胡均立、邱永和、陳季倫,1998年11月,廠商智慧財產權種類之選擇:專利權或營業秘密?:1998年全國智慧財產權研討會,新竹市:國立交通大學:頁225-240。 5.徐玉玲,1993年11月,營業秘密的保護,台北:三民書局:頁19-42。 6.徐盛國,2004年3月,客戶資訊與營業秘密之芻議,台北:智慧財產權月刊,第63期:頁103-117。 7.耿筠,2002年10月,美國營業秘密判例所產生的管理含意,台北:管理學報,第19卷,第5期:頁949-978。 8.耿筠,2004年4月,影響研究機構選擇專利或營業秘密保護研發成果之因素研究,台北:管理學報,第21卷,第2期:頁199-211。 9.高宣揚,1990年4月,結構主義,台北:遠流出版事業股份有限公司,初版:頁85-197、241-274。 10.張維迎,2000年1月,賽局理論與信息經濟學,台北:茂昌圖書有限公司,一版:頁47-54。 11.許牧彥,2001年6月,從知識的經濟特質談台灣專利制度的演進,知識資本在台灣,台北:遠流出版公司,第4期:頁297-352。 12.程法彰,2005年3月,美國對營業秘密的保護及發展趨勢,台北:智慧財產權月刊,第75期:頁74-93。 13.榮泰生,2000年12月,企業研究方法,台北:五南圖書出版有限公司,初版:頁27-54。 14.蔡玉玲,1997a年4月,IBM營業秘密管理(上),台北:智慧財產權管理季刊,第13期:頁36-37。 15.蔡玉玲,1997b年7月,IBM公司的營業秘密管理(下),台北:智慧財產權管理季刊,第14期:頁23-27。 16.賴文智,2004年12月,營業秘密法制之研究,台北:智慧財產權月刊,第72期:頁75-109。 17.蘇宏文,1993a年5月,企業致勝利器-營業秘密,台北:法律與你雜誌,第67期:頁60-63。 18.蘇宏文,1993b年6月,企業致勝利器-營業秘密(下),台北:法律與你雜誌,第68期:頁64-66。 19.Ajzen, I. and M. Fishbein, 1974. Factors Influencing Intentions and the Intention-Behavior Relation, Human Relations, 27, pp.1-15. 20.Ajzen, I., 1985. From Intentions to Actions: A Theory of Planned Behavior. In J. Kuhl and J. Beckmann (Eds.) Action-Control: From Cognition to Behavior, Heidelberg: Springer, pp. 11-39. 21.Apke, Thomas M., 2003. International Protection of Trade Secrets when Using the Internet, Management Decision, 41(1), pp. 43-47. 22.Asaravala, Amit, 2005. Decision–Making Tactics, Software Development, 13(8), p. 62, August. 23.Barrier, Michael, 2004. Protecting Trade Secrets, HR Magazine, 49(5), pp.52-57, May. 24.Berstein, Fernando and Awi Federgruen, 2003. Pricing and Replenishment Strategies in a Distribution system with Competing Retailers, Operations Research, 51(3), pp. 409-426, May/June. 25.Berthon, Pierre, Leyland Pitt, Michael Ewing, and Christopher L. Carr, 2002. Potential Research Space in MIS: A Framework for Envisioning and Evaluating Research Replication, Extension, and Generation, Information Systems Research, 13(4), pp. 416-427, December. 26.Betz, Frederick, 1998. Managing Technological Innovation, John Wiley and Sons, Inc., New York, pp. 50-51. 27.Biger, Nahum and Steven E. Plaut, 2000. Trade Secrets, Firm-Specific Human Capital, and Optimal Contracting, European Journal of Law and Economics, 9, pp. 49-71. 28.Blair, Roger D. and Jeffrey L. Harrison, 1999. Airline Price Wars: Competition or Predation, Antitrust Bulletin, 44(2), pp. 489-518, summer. 29.Buchignani, Antony, 2004. Protecting Trade Secrets and Confidential Information: A Quick Reference, Franchising World, 36(9), pp. 59-69, October. 30.Budden, Michael Craig, 1997. Safeguarding Trade Secrets, Security Management, 41(3), pp. 87-89, March. 31.Byrne, Noel, 2001. Legal Protection for Inventions, Designs and Other Information, Journal of Commercial Biotechnology, 8(2), pp. 124-129, autumn. 32.Camardella, Matthew J., 2004. Restrictive Covenants, Employment Relations Today, 31(1), pp. 109-115. 33.Chally, Jonathan, 2004. The Law of Trade Secrets: Toward a More Efficient Approach, Vanderbilt Law Review, 57(4), pp. 1269-1311, May. 34.Church, Judith L., 2001. Intellectual Property Issues in Mergers and Acquisitions, Insight, 15(3), pp. 12-19, March.. 35.Cogger, K. O., O. M. Joy, W. Ruland, and P. L. Yu, 1983. A Goal Seeking Investment Model, Management Science, 29(9), pp. 1027-1036. 36.Daellenbach, Hans G. and Donald C. McNikle, 2005. Management Science Decision Making through Systems Thinking, Palgrave Macmillan Ltd., first published, pp. 121-122; 439 and 586. 37.Day, G. S. and R. Wensely, 1988. Assessing Advantage: A Framework for Diagnosing Competitive Superiority, Journal of Marketing, 52, pp. 1-20, April. 38.Epstein, Richard A., 2004. The Constitutional Protection of Trade Secrets under the Taking Clause, The University of Chicago Law Review, 71(1), pp. 57-73, winter. 39.Fitzpatrick, William M., Samuel A. DiLullo, and Donald R. Burke, 2004. Trade Secret Piracy and Protection: Corporate Espionage, Corporate Security and the Law, Advances in Competitiveness Research, 12(1), pp. 57-71. 40.Ford, David, 2002. The Business Marketing Course Managing in Complex Networks, John Wiley and Sons, Ltd, New York, pp. 36-49. 41.Frankfort-Nachmias, Chava and David Nachmias, 2000. Research Methods in the Social Sciences, Worth Publishers, New York, 6th ed., pp. 2-43. 42.Fraumann, Edwin and Joseph Koletar, 1999. Trade Secret Safeguards, Security Management, 43(3), pp. 63-66, March. 43.Gabaix, Xavier and David Laibson, 2000. A Boundedly Rational Decision Algorithm, The American Economic Review, 90(2), pp. 433-438, May. 44.Geiser, Willie and Bob Johnson, 2002. A Brave New World, Information Management Journal, 36(6), pp. 47-53, November/December. 45.Goodwin, Paul and George Wright, 2004. Decision Analysis for Management Judgment, John Wiley & Sons, Ltd., England, p. 343. 46.Grazio, Jeanne Andrea Di, 2001. Professional Responsibility Considerations of Advising the Corporate Client on the Patent/Trade Secret Interface, Intellectual Property & Technology Law Journal, 13(5), pp. 5-10, May. 47.Halan, John M., 2004. Protecting Trade Secrets: Steps Every Trade Secret Owner Should Know, Employee Relations Law Journal, 30(3), pp. 22-28, winter. 48.Halijan, Douglas F., 2001. The Past, Present, and Future of Trade Secrets Law in Tennessee: A Practitioner’s Guide Following the Enactment of the Uniform Trade Secrets Act, The University of Memphis Law Review, 32(1), pp. 1-32, Fall. 49.Hofmann, Ekkehard and Georg von Wangenheim, 2003. Trade secrets versus Cost Benefit Analysis, International Review of Law and Economics, 22, pp. 511-526. 50.Hotchkiss, Anita and Diane M. Fleming, 2004. Protecting and Enforcing Protective Orders: Easier Said than Done, Defense Counsel Journal, 71(2), pp. 161-171, April. 51.Kimes, Sheryl E. and Paul E. Wagner, 2001. Preserving Your Revenue-management System as a Trade Secret, Cornell Hotel and Restaurant Administration Quarterly, 42(5), pp. 8-15, October/November. 52.Kovach, Kenneth A., Mark Pruett, Linda B. Samuels, and Christopher F. Duvall, 2004. Protecting Trade Secret During Employee Migration: What You Don’t Know Can Hurt You, Labor Law Journal, 55(2), pp. 69-84, summer. 53.Kuhlik, Bruce N., 2004. The Assault on Pharmaceutical Intellectual Property, The University of Chicago Law Review, 71(1), pp. 93-109, winter. 54.Lapin, Lawrence L., 1976. Quantitative Methods for Business Decisions, Harcourt Brace Jovanovich, Inc., New York, pp. 121-127 and 480-482. 55.Li, Kening, 2005. How to Protect Trade Secrets, The China Business Review, 32(3), pp. 36-40, May/June. 56.Liebman, Kenneth A., Randall E. Kahnke, and Kerry L. Bundy, 2005. Inevitable Disclosure: Dealing with Trade Secret Issues When Hiring a New Employee, Intellectual Property & Technology Law Journal, 17(2), pp. 21-22, February. 57.Maurer, Steven D. and Michael T. Zugelder, 2000. Trade Secret Management in High Technology: A Legal Review and Research Agenda, Journal of High Technology Management Research, 11(2), pp. 155-174. 58.Mohr, Jakki, 2001. Marketing of High-Technology Products and Innovations, Prentice-Hall, Inc., New Jersey, pp. 195-204. 59.Mokhtari, Amirhossein and H. Christopher Frey, 2005. Recommended Practice Regarding Selection of Sensitivity Analysis Methods Applied to Microbial Food Safety Process Risk Models, Human and Ecological Risk Assessment, 11(3), pp.591-605, June. 60.Moore, Laurence J., Sang M. Lee, and Bernard W. Taylor, III. 1993. Management Science, Allyn and Bacon, a Division of Simon and Schuster, Inc., pp. 5-8 and 843. 61.Murray, Kathleen, 1994. HR Takes Steps to Protect Trade Secrets, Personnel Journal, pp. 99-109, June. 62.Norton, John D., 2004. On Thought Experiments: Is There More to the Argument?, Philosophy of Science, 71(5), pp. 1139-1151, December. 63.Oppold, Thomas J., 2003. Top 10 Ways to Help Protect Your Franchise’s Trade Secrets, Franchising World, 35(1), pp. 57-58, January. 64.Phillips, Owen R. and Charles F. Mason, 1997. Wars of Attrition in Experimental Duopoly Markets, Southern Economic Journal, 63(3), pp. 489-518, January. 65.Porter, William G. II. and Michael C. Griffaton, 2001. Identifying and Protecting Employers’ Interests in Trade Secrets and Proprietary Information, Defense Counsel Journal, 68(4), pp. 439-448, October. 66.Porter, William G. II. and Michael C. Griffaton, 2002. Using Noncompete Agreements to Protect Legitimate Business Interests, Defense Counsel Journal, 69(2), pp. 194-202, April. 67.Reichheld, F. and W. R. Sasser Jr., 1990. Zero Defections: Quality Comes to Services, Harvard Business Review, pp. 105-113, September-October. 68.Render, Barry, M. Ralph, and Jr. Stair, 2000. Quantitative Analysis for Management, Prentice-Hall, Inc. New Jersey, 7th ed., pp. 118-154 and 618-638. 69.Render, Barry, M.Ralph, Jr. Stair, and Nagrai (Raiu) Balakrishnan, 2003. Managerial Decision Modeling with Spreadsheets, Prentice-Hall Inc., New Jersey, p. 9. 70.Richmond, Rick and Brent Caslin, 2004. Can You Keep a Secret? Pharmaceutical Executive, 24(4), pp. 58-64, April. 71.Samules, Linda B., 1989. Protecting Confidential Business Information Supplied to State Governments: Exempting Trade Secrets From State Open Records Laws, American Business Law Journal (1986-1998), 27(3): ABI/INFORM Archive Complete, p. 467. 72.Saulino, Jennifer L., 2002. Locating Inevitable Disclosure’s Place in Trade Secret Analysis, Michigan Law Review, 100(5), pp. 1184-1214, March. 73.Saunders, Kurt M., 2004. Can You Keep a (Trade) Secret? , The Pennsylvania Uniform Trade Secrets Act, Social Science Research Network SSRN Electronic Paper Collection, pp. 1-26, July. 74.Scott, Matthew A., Richard F. Deckro, and James W. Chrissis, 2005. Modeling and Analysis of Multicommodity Network Flows Via Goal Programming, INFOR, 43(2), pp. 93-109, May. 75.Sheremata, Willow A., 1997. Barriers to innovation: a monopoly, network externalities, and the speed of innovation, Antitrust Bulletin, 42(4), pp. 937-972, winter. 76.Solomon, Paul, 2004. Financial Accounting A New Perspective, McGraw-Hill Companies, Inc., New York, p. 16. 77.Spiro, R. L. and B. A. Weitz, 1990. Adaptive Selling: Conceptionalization, Measurement, and Nomological Validity, Journal of Marketing Research, 27, pp. 61-69. 78.Sutton, John, 1998. Technology and Market Structure: Theory and History, Cambridge, MA: MIT Press, pp. 63-71. 79.Vahaly, John, 2000. Technology and Market Structure: Theory and History, Southern Economic Journal, 67(2), p. 490, October. 80.Walsh, Marguerite S., 2003. The Top Ten Reasons Employers Lose Trade Secret Cases--- And How to Prevent Them, Intellectual Property & Technology Law Journal, 15(10), pp. 1-4, October. 81.Weitz, B. A. and K. D. Bradford, 1999. Personal Selling and Sales management: A Relationship Marketing Perspective, Journal of the Academy of Marketing Science, 27(2), pp. 241-254. 82.Weitz, B., A. H. Sujan, and M. Sujan, 1986. Knowledge, Motivation, and Adaptive Behavior: A Framework for Improving Selling Effectiveness, Journal of Marketing, 50, pp. 174-191, October. 83.Wendell, Richard E., 2004. Tolerance Sensitivity and Optimality Bounds in Linear Programming, Management Science, 50(6), pp. 797-803. 84.Wilson, D. T., 1995. an Integrated Model of Buyer-Seller Relationships, Journal of the Academy of Marketing Science, 23(4), pp. 335-345. 85.Winterton, Neil, 2003. Science and Sustainability: Who Knows Best? Clean Techn Environ Policy, 5, pp. 154-166.
|