| 期刊論文1. | Juels, A.(2006)。RFID Security and Privacy: A Research Survey。IEEE Journal on Selected Areas in Communications,24(2),381-394。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) | 2. | Ohkubo, M.、Suzuki, K.、Kinoshita, S.(2005)。RFID Privacy Issues and Technical Challenges。Communications of the ACM,48(9),66-71。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) | 3. | Gauld, R.、Ikegami, N.、Barr, M. D.、Chiang, T. L.、Gould, D.、Kwon, S.(2006)。Advanced Asia's Health Systems in Comparison。Health Policy,79(2),325-336。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) | 4. | Treasure, T.、Valencia, O.、Sherlaw-Johnson, C.、Gallivan, S.(2002)。Surgical Performance Measurement。Health Care Management Science,5(4),243-248。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) | 5. | Tzeng, S.、Chen, W.、Pai, F.(2008)。Evaluating the Business Value of RFID: Evidence from Five Case Studies。International Journal of Production Economics,112,601-613。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) | 6. | Goel, R.(2007)。Managing RFID Consumer Privacy and Implementation Barriers。Information Systems Security,16,217-223。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) | 7. | Lee, S. M.、Park, S.、Yoon, S. N.、Yeon, S.(2007)。RFID Based Ubiquitous Commerce and Consumer Trust。Industrial Management & Data Systems,107(5),605-617。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) | 8. | Hamblen, M.(20071015)。Privacy Concerns Dog IT Efforts to Implement RFID。Computerworld,26。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) | 9. | Stein, S. G..(2007)。Where Will Consumers Find Privacy Protection from RFIDs?: A Case for Federal Legislation。Duke Law & Technology Review,3。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) | 10. | Eliasson, A.、Poropatich, R.(1998)。Performance Improvement in Telemedicine: The Essential Elements。Military Medicine,163(8),530-535。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) | 11. | Hines, M.(2007)。Black Hat Exposes RFID Security Risk。InfoWorld Mar,5,9。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) | 12. | Yu, C.、Chen, C.、Liao, P.、Lee, Y.(2008)。RFID-Based Operation Room and Medicare System for Patient Safety Enhancement-A Case Study of Keelung Branch, Chang Gung Memorial Hospital。Journal of Information Management,15(1),97-122。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) | 13. | Yao, M. Z.、Rice, R. E.、Wallis, K.(2007)。Predicting User Concerns About Online Privacy。Journal of the American Society for Information Science and Technology,58(5),710-722。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) | 14. | Parrott, R.、Burgoon, J.、Burgoon, M.、LePoire, B.(1989)。Privacy Between Physicians and Patients: More than a Matter of Confidentiality。Social Science and Medicine,29(12),1381-1385。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) | 15. | Milne, G. R.、Rohm, A. J.(2000)。Consumer Privacy and Name Removal Across Direct Marketing Channels: Exploring Opt-In and Opt-Out Alternatives。Journal of Public Policy & Marketing,19(2),238-249。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) | 16. | Dommeyer, C. J.、Gross, B. L.(2003)。What Consumers Know and What They Do: An Investigation of Consumer Knowledge, Awarenesss, and Use of Privacy Protection Strategies。Journal of Interactive Marketing,17(2),34-51。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) | 17. | Culnan, M. J.(1995)。Consumer Awareness of Name Removal Procedures: Implications for Direct Marketing。Journal of Direct Marketing,9(2),10-19。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) | 18. | Wang, P.、Petrison, L. A.(1993)。Direct Marketing Activities and Personal Privacy: A Consumer Survey。Journal of Direct Marketing,7(1),7-19。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) | 19. | Abratt, R.、Penman, N.(2002)。Understanding Factors Affecting Salespeople's Perceptions of Ethical Behavior in South Africa。Journal of Business Ethics,35,269-280。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) | 20. | Bodin, L. D.、Gordon, L. A.、Loeb, M. P.(2005)。Evaluating Information Security Investments Using the Analytic Hierarchy Process。Communications of the ACM,48(2),79-83。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) | 21. | Ngaia, E. W. T.、Suk, F. F. C.、Lo, S. Y. Y.(2008)。Development of an RFID-Based Sushi Management System: The Case of a Conveyor-Belt Sushi Restaurant。International Journal of Production Economics,112(2),630-645。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) | 22. | Dabholkar, P. A.、Kellaris, J. J.(1992)。Towards Understanding Marketing Students' Ethical Judgement of Controversial Personal Selling Practices。Journal of Business Research,24(4),313-329。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) | 23. | Adams, K.、Hean, S.、Sturgis, P.、Clark, J. M.(2006)。Investigating the Factors Influencing Professional Identity of First-Year Health and Social Care Students。Learning in Health and Social Care,5(2),55-68。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) | 24. | Lillywhite, T. P.(2004)。Implementing BS7799 in the UK National Health Service。Computer Fraud & Security,2004(2),4-8。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) | 25. | Harmsena, J. A. M.、Bernsenb, R. M. D.、Meeuwesenc, L.、Pintod, D.、Bruijnzeels, M. A.(2005)。Assessment of Mutual Understanding of Physician Patient Encounters: Development and Validation of a Mutual Understanding Scale (MUS) in a Multicultural General Practice Setting。Patient Education and Counseling,59(2),171-181。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) | 26. | Marshalla, A. M.、Tompsett, B. C.(2005)。Identity Theft in an Online World。Computer Law & Security Report,21(2),128-137。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) | 27. | Kelly, E. P.、Erickson, G. S.(2005)。RFID Tags: Commercial Applications v. Privacy Rights。Industrial Management & Data Systems,105(6),703-713。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) | 28. | Reid, A. S.(2007)。Is Society Smart Enough to Deal with Smart Cards?。Computer Law & Security Report,23,53-61。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) | 29. | Moehr, J.(1998)。Informatics in the Service of Health, a Look to the Future。Methods of Information in Medicine,37(2),165-170。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) | 30. | Glasser, D. J.、Goodman, K. W.、Einspruch, N. G.(2007)。Chips, Tags, and Scanners: Ethical Challenges for Radio Frequency Identification。Ethics and Information Technology,9,101-109。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) | 31. | Sjöberg, L.、Drottz-Sjöberg, B.(1991)。Knowledge and Risk Perception Among Nuclear Power Plant Employees。Risk Analysis,11(4),607-618。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) | 32. | Cobb, M. D.、Macoubrie, J.(2004)。Public Perceptions About Nanotechnology: Risks, Benefits and Trust。Journal of Nanoparticle Research,6(4),395-405。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) | 33. | Leino-Kilpi, Helena、Välimäki, Maritta、Dassen, Theo、Gasull, Maria、Lemonidou, Chryssola、Scott, Anne、Arndt, Marianne(2001)。Privacy: A Review of the Literature。International Journal of Nursing Studies,38(6),663-671。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) | 34. | Frewer, L.(2004)。The Public and Effective Risk Communication。Toxicology Letters,149(1-3),391-397。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) | 35. | Leimeister, J. M.、Ebner, W.、Krcmar, H.(2005)。Design, implementation, and evaluation of trust-supporting components in virtual communities for patients。Journal of Management Information Systems,21(4),101-135。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) | 36. | Babakus, E.、Mangold, W. G.(1992)。Adapting the SERVQUAL Scale to Hospital Services: An Empirical Investigation。Health Services Research,26(6),767-786。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) | 37. | Garfinkel, S. L.、Juels, A.、Pappu, R.(2005)。RFID Privacy: An Overview of Problems and Proposed Solutions。IEEE Security and Privacy Magazine,3(3),34-43。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) | 38. | Duke, J. M.、Aull-Hyde, R.(2002)。Identifying public preferences for land preservation using the analytic hierarchy process。Ecological Economics,42(1/2),131-145。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) | 39. | Thiesse, F.(2007)。RFID, privacy and the perception of risk: a strategic framework。Journal of Strategic Information Systems,16(2),214-232。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) | 40. | Phelps, J.、Nowak, G.、Ferrell, E.(2000)。Privacy Concerns and Consumer Willingness to Provide Personal Information。Journal of Public Policy & Marketing,19(1),27-41。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) | 41. | Malhotra, Naresh K.、Kim, Sung S.、Agarwal, James(2004)。Internet users' information privacy concerns (IUIP): the construct, the scale, and a causal model。Information Systems Research,15(4),336-355。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) | 42. | Brown, Stephen W.、Swartz, Teresa A.(1989)。A GAP analysis of professional service quality。Journal of Marketing,53(2),92-98。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) | 43. | Saaty, Thomas L.(1990)。How to make a decision: the analytic hierarchy process。European Journal of Operational Research,48(1),9-26。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) | 44. | Warren, Samuel D.、Brandeis, Louis D.(1890)。The Right to Privacy。Harvard Law Review,4(5),193-220。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) | 45. | Vaidya, Omkarprasad S.、Kumar, Sushil(2006)。Analytic Hierarchy Process: An Overview of Applications。European Journal of Operational Research,169(1),1-29。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) | 46. | Parasuraman, Ananthanarayanan Parsu、Zeithaml, Valarie A.、Berry, Leonard L.(1988)。SERVQUAL: A Multiple-Item Scale for Measuring Consumer Perceptions of Service quality。Journal of Retailing,64(1),12-40。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) | 會議論文1. | Haywood-Farmer, J.、Stuart, F. I.(1988)。Measuring the Quality of Professional Services。3rd Annual International Conference of the UK Operation Management Association,336-347。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) | 2. | Juels, A.、Rivest, R. L.、Szydlo, M.(2003)。The blocker tag: selective blocking of RFID tags for consumer privacy。8th ACM Conference on Computer and Communications Security,(會議日期: 2003/10/27-10/30)。Washington:Association for Computing Machinery。103-111。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) | 圖書1. | PriceWaterhouseCoopers(2002)。The Factors Fueling Rising Healthcare Costs。Washington:American Association of Health Plans。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) | 2. | Thompson, I.、Melia, K.、Boyd, K.(1994)。Nursing Ethics, 3rd edition。Singapore:Churchill Livingstone。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) | 3. | Bandman, E.、Bandman, B.(1995)。Nursing Ethics Through the Life Span。Englewood Cliffs:Prentice-Hall。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) | 4. | American Medical Association(2007)。Code of Medical Ethics: Current Opinions with Annotations。American Medical Association。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) | 5. | Wilcox, R. R.(1987)。New Statistical Procedures for the Social Sciences: Modern Solutions to Basic Problems。Hillsdale, New Jersey:Lawrence Erlbaum。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) | 6. | Cohen, H. A.(1981)。The Nurse's Quest for a Professional Identity。California:Addison-Wesley。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) | 7. | Bedford T.、Cooke, R.(2001)。Probabilistic Risk Analysis: Foundations and Methods。Cambridge University Press。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) | 8. | Westin, A.(1970)。Privacy and Freedom。New York:Atheneum Press。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) | 9. | Saaty, T. L.(1998)。The Analytic Hierarchy Process: Planning, Priority Setting, Resource Allocation。New York:McGraw-Hill International Book Co.。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) | 10. | Christensen, L. B.(2004)。Experimental Methodology。Pearson Education, Inc.。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) | 11. | Beauchamp, Tom L.、Childress, James F.(1994)。Principles of Biomedical Ethics。Oxford University Press。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) | 其他1. | Kaiser Family Foundation(2005)。Trends and Indicators in the Changing Health Care Marketplace,http://www.kff.org/insurance/7031/index.cfm。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) | 2. | Williams, D.(2004)。The Strategic Implications of Wal-Mart's RFID Mandate,http://www.directionsmag.com/article.php?article_id=629&trv=1, 2004/07/29。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) | 3. | EPCglobal(2005)。Radio-Frequency Identity Protocols Class-1 Generation-2 UHF RFID Protocol for Communications at 860 MHz-960 MHz,http://www.epcglobalinc.org/standards/uhfc1g2/, 2005/12/17。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) | 4. | Wong, C.(2006)。PolyU Develops Intelligent Dressing Mirror and Fitting Room,http://www1.polyu.edu.hk/hotnews/details_e.php?year=all&news_id=1005。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) | 圖書論文1. | Slovic, Paul、Fischhoff, Baeuch、Lichtenstein, Sarach(1980)。Facts and Fears: Understanding Perceived Risk。Societal Risk Assessment: How Safe Is Safe Enough?。New York, NY:Plenum Press。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) | 2. | Floerkemeier, C.、Schneider, R.、Langheinrich, M.(2004)。Scanning with a Purpose: Supporting the Fair Information Principles in RFID Protocols。Ubiquitous Computing Systems 2004。Berlin:Springer-Verlag。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) | 3. | Huang, D. L.、Rau, P. P.、Salvendy, G.(2007)。A Survey of Factors Influencing People's Perception of Information Security。Human-Computer Interaction. HCI Applications and Services。Heidelberg:Springer。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) | |
| |