:::

詳目顯示

回上一頁
題名:Exploring Privacy Perception of Customers on RFID-Enabled Healthcare
書刊名:醫療資訊雜誌
作者:廖耕億 引用關係胡雅舜馮啟彥
作者(外文):Liao, Gen-yihHu, Ya-shuenFeng, Chi-yen
出版日期:2010
卷期:19:4
頁次:頁17-33
主題關鍵詞:隱私健康照護無線射頻識別技術實驗設計PrivacyHealthcareRFIDExperimental design
原始連結:連回原系統網址new window
相關次數:
  • 被引用次數被引用次數:期刊(0) 博士論文(0) 專書(0) 專書論文(0)
  • 排除自我引用排除自我引用:0
  • 共同引用共同引用:0
  • 點閱點閱:44
期刊論文
1.Juels, A.(2006)。RFID Security and Privacy: A Research Survey。IEEE Journal on Selected Areas in Communications,24(2),381-394。  new window
2.Ohkubo, M.、Suzuki, K.、Kinoshita, S.(2005)。RFID Privacy Issues and Technical Challenges。Communications of the ACM,48(9),66-71。  new window
3.Gauld, R.、Ikegami, N.、Barr, M. D.、Chiang, T. L.、Gould, D.、Kwon, S.(2006)。Advanced Asia's Health Systems in Comparison。Health Policy,79(2),325-336。  new window
4.Treasure, T.、Valencia, O.、Sherlaw-Johnson, C.、Gallivan, S.(2002)。Surgical Performance Measurement。Health Care Management Science,5(4),243-248。  new window
5.Tzeng, S.、Chen, W.、Pai, F.(2008)。Evaluating the Business Value of RFID: Evidence from Five Case Studies。International Journal of Production Economics,112,601-613。  new window
6.Goel, R.(2007)。Managing RFID Consumer Privacy and Implementation Barriers。Information Systems Security,16,217-223。  new window
7.Lee, S. M.、Park, S.、Yoon, S. N.、Yeon, S.(2007)。RFID Based Ubiquitous Commerce and Consumer Trust。Industrial Management & Data Systems,107(5),605-617。  new window
8.Hamblen, M.(20071015)。Privacy Concerns Dog IT Efforts to Implement RFID。Computerworld,26。  new window
9.Stein, S. G..(2007)。Where Will Consumers Find Privacy Protection from RFIDs?: A Case for Federal Legislation。Duke Law & Technology Review,3。  new window
10.Eliasson, A.、Poropatich, R.(1998)。Performance Improvement in Telemedicine: The Essential Elements。Military Medicine,163(8),530-535。  new window
11.Hines, M.(2007)。Black Hat Exposes RFID Security Risk。InfoWorld Mar,5,9。  new window
12.Yu, C.、Chen, C.、Liao, P.、Lee, Y.(2008)。RFID-Based Operation Room and Medicare System for Patient Safety Enhancement-A Case Study of Keelung Branch, Chang Gung Memorial Hospital。Journal of Information Management,15(1),97-122。  new window
13.Yao, M. Z.、Rice, R. E.、Wallis, K.(2007)。Predicting User Concerns About Online Privacy。Journal of the American Society for Information Science and Technology,58(5),710-722。  new window
14.Parrott, R.、Burgoon, J.、Burgoon, M.、LePoire, B.(1989)。Privacy Between Physicians and Patients: More than a Matter of Confidentiality。Social Science and Medicine,29(12),1381-1385。  new window
15.Milne, G. R.、Rohm, A. J.(2000)。Consumer Privacy and Name Removal Across Direct Marketing Channels: Exploring Opt-In and Opt-Out Alternatives。Journal of Public Policy & Marketing,19(2),238-249。  new window
16.Dommeyer, C. J.、Gross, B. L.(2003)。What Consumers Know and What They Do: An Investigation of Consumer Knowledge, Awarenesss, and Use of Privacy Protection Strategies。Journal of Interactive Marketing,17(2),34-51。  new window
17.Culnan, M. J.(1995)。Consumer Awareness of Name Removal Procedures: Implications for Direct Marketing。Journal of Direct Marketing,9(2),10-19。  new window
18.Wang, P.、Petrison, L. A.(1993)。Direct Marketing Activities and Personal Privacy: A Consumer Survey。Journal of Direct Marketing,7(1),7-19。  new window
19.Abratt, R.、Penman, N.(2002)。Understanding Factors Affecting Salespeople's Perceptions of Ethical Behavior in South Africa。Journal of Business Ethics,35,269-280。  new window
20.Bodin, L. D.、Gordon, L. A.、Loeb, M. P.(2005)。Evaluating Information Security Investments Using the Analytic Hierarchy Process。Communications of the ACM,48(2),79-83。  new window
21.Ngaia, E. W. T.、Suk, F. F. C.、Lo, S. Y. Y.(2008)。Development of an RFID-Based Sushi Management System: The Case of a Conveyor-Belt Sushi Restaurant。International Journal of Production Economics,112(2),630-645。  new window
22.Dabholkar, P. A.、Kellaris, J. J.(1992)。Towards Understanding Marketing Students' Ethical Judgement of Controversial Personal Selling Practices。Journal of Business Research,24(4),313-329。  new window
23.Adams, K.、Hean, S.、Sturgis, P.、Clark, J. M.(2006)。Investigating the Factors Influencing Professional Identity of First-Year Health and Social Care Students。Learning in Health and Social Care,5(2),55-68。  new window
24.Lillywhite, T. P.(2004)。Implementing BS7799 in the UK National Health Service。Computer Fraud & Security,2004(2),4-8。  new window
25.Harmsena, J. A. M.、Bernsenb, R. M. D.、Meeuwesenc, L.、Pintod, D.、Bruijnzeels, M. A.(2005)。Assessment of Mutual Understanding of Physician Patient Encounters: Development and Validation of a Mutual Understanding Scale (MUS) in a Multicultural General Practice Setting。Patient Education and Counseling,59(2),171-181。  new window
26.Marshalla, A. M.、Tompsett, B. C.(2005)。Identity Theft in an Online World。Computer Law & Security Report,21(2),128-137。  new window
27.Kelly, E. P.、Erickson, G. S.(2005)。RFID Tags: Commercial Applications v. Privacy Rights。Industrial Management & Data Systems,105(6),703-713。  new window
28.Reid, A. S.(2007)。Is Society Smart Enough to Deal with Smart Cards?。Computer Law & Security Report,23,53-61。  new window
29.Moehr, J.(1998)。Informatics in the Service of Health, a Look to the Future。Methods of Information in Medicine,37(2),165-170。  new window
30.Glasser, D. J.、Goodman, K. W.、Einspruch, N. G.(2007)。Chips, Tags, and Scanners: Ethical Challenges for Radio Frequency Identification。Ethics and Information Technology,9,101-109。  new window
31.Sjöberg, L.、Drottz-Sjöberg, B.(1991)。Knowledge and Risk Perception Among Nuclear Power Plant Employees。Risk Analysis,11(4),607-618。  new window
32.Cobb, M. D.、Macoubrie, J.(2004)。Public Perceptions About Nanotechnology: Risks, Benefits and Trust。Journal of Nanoparticle Research,6(4),395-405。  new window
33.Leino-Kilpi, Helena、Välimäki, Maritta、Dassen, Theo、Gasull, Maria、Lemonidou, Chryssola、Scott, Anne、Arndt, Marianne(2001)。Privacy: A Review of the Literature。International Journal of Nursing Studies,38(6),663-671。  new window
34.Frewer, L.(2004)。The Public and Effective Risk Communication。Toxicology Letters,149(1-3),391-397。  new window
35.Leimeister, J. M.、Ebner, W.、Krcmar, H.(2005)。Design, implementation, and evaluation of trust-supporting components in virtual communities for patients。Journal of Management Information Systems,21(4),101-135。  new window
36.Babakus, E.、Mangold, W. G.(1992)。Adapting the SERVQUAL Scale to Hospital Services: An Empirical Investigation。Health Services Research,26(6),767-786。  new window
37.Garfinkel, S. L.、Juels, A.、Pappu, R.(2005)。RFID Privacy: An Overview of Problems and Proposed Solutions。IEEE Security and Privacy Magazine,3(3),34-43。  new window
38.Duke, J. M.、Aull-Hyde, R.(2002)。Identifying public preferences for land preservation using the analytic hierarchy process。Ecological Economics,42(1/2),131-145。  new window
39.Thiesse, F.(2007)。RFID, privacy and the perception of risk: a strategic framework。Journal of Strategic Information Systems,16(2),214-232。  new window
40.Phelps, J.、Nowak, G.、Ferrell, E.(2000)。Privacy Concerns and Consumer Willingness to Provide Personal Information。Journal of Public Policy & Marketing,19(1),27-41。  new window
41.Malhotra, Naresh K.、Kim, Sung S.、Agarwal, James(2004)。Internet users' information privacy concerns (IUIP): the construct, the scale, and a causal model。Information Systems Research,15(4),336-355。  new window
42.Brown, Stephen W.、Swartz, Teresa A.(1989)。A GAP analysis of professional service quality。Journal of Marketing,53(2),92-98。  new window
43.Saaty, Thomas L.(1990)。How to make a decision: the analytic hierarchy process。European Journal of Operational Research,48(1),9-26。  new window
44.Warren, Samuel D.、Brandeis, Louis D.(1890)。The Right to Privacy。Harvard Law Review,4(5),193-220。  new window
45.Vaidya, Omkarprasad S.、Kumar, Sushil(2006)。Analytic Hierarchy Process: An Overview of Applications。European Journal of Operational Research,169(1),1-29。  new window
46.Parasuraman, Ananthanarayanan Parsu、Zeithaml, Valarie A.、Berry, Leonard L.(1988)。SERVQUAL: A Multiple-Item Scale for Measuring Consumer Perceptions of Service quality。Journal of Retailing,64(1),12-40。  new window
會議論文
1.Haywood-Farmer, J.、Stuart, F. I.(1988)。Measuring the Quality of Professional Services。3rd Annual International Conference of the UK Operation Management Association,336-347。  new window
2.Juels, A.、Rivest, R. L.、Szydlo, M.(2003)。The blocker tag: selective blocking of RFID tags for consumer privacy。8th ACM Conference on Computer and Communications Security,(會議日期: 2003/10/27-10/30)。Washington:Association for Computing Machinery。103-111。  new window
圖書
1.PriceWaterhouseCoopers(2002)。The Factors Fueling Rising Healthcare Costs。Washington:American Association of Health Plans。  new window
2.Thompson, I.、Melia, K.、Boyd, K.(1994)。Nursing Ethics, 3rd edition。Singapore:Churchill Livingstone。  new window
3.Bandman, E.、Bandman, B.(1995)。Nursing Ethics Through the Life Span。Englewood Cliffs:Prentice-Hall。  new window
4.American Medical Association(2007)。Code of Medical Ethics: Current Opinions with Annotations。American Medical Association。  new window
5.Wilcox, R. R.(1987)。New Statistical Procedures for the Social Sciences: Modern Solutions to Basic Problems。Hillsdale, New Jersey:Lawrence Erlbaum。  new window
6.Cohen, H. A.(1981)。The Nurse's Quest for a Professional Identity。California:Addison-Wesley。  new window
7.Bedford T.、Cooke, R.(2001)。Probabilistic Risk Analysis: Foundations and Methods。Cambridge University Press。  new window
8.Westin, A.(1970)。Privacy and Freedom。New York:Atheneum Press。  new window
9.Saaty, T. L.(1998)。The Analytic Hierarchy Process: Planning, Priority Setting, Resource Allocation。New York:McGraw-Hill International Book Co.。  new window
10.Christensen, L. B.(2004)。Experimental Methodology。Pearson Education, Inc.。  new window
11.Beauchamp, Tom L.、Childress, James F.(1994)。Principles of Biomedical Ethics。Oxford University Press。  new window
其他
1.Kaiser Family Foundation(2005)。Trends and Indicators in the Changing Health Care Marketplace,http://www.kff.org/insurance/7031/index.cfm。  new window
2.Williams, D.(2004)。The Strategic Implications of Wal-Mart's RFID Mandate,http://www.directionsmag.com/article.php?article_id=629&trv=1, 2004/07/29。  new window
3.EPCglobal(2005)。Radio-Frequency Identity Protocols Class-1 Generation-2 UHF RFID Protocol for Communications at 860 MHz-960 MHz,http://www.epcglobalinc.org/standards/uhfc1g2/, 2005/12/17。  new window
4.Wong, C.(2006)。PolyU Develops Intelligent Dressing Mirror and Fitting Room,http://www1.polyu.edu.hk/hotnews/details_e.php?year=all&news_id=1005。  new window
圖書論文
1.Slovic, Paul、Fischhoff, Baeuch、Lichtenstein, Sarach(1980)。Facts and Fears: Understanding Perceived Risk。Societal Risk Assessment: How Safe Is Safe Enough?。New York, NY:Plenum Press。  new window
2.Floerkemeier, C.、Schneider, R.、Langheinrich, M.(2004)。Scanning with a Purpose: Supporting the Fair Information Principles in RFID Protocols。Ubiquitous Computing Systems 2004。Berlin:Springer-Verlag。  new window
3.Huang, D. L.、Rau, P. P.、Salvendy, G.(2007)。A Survey of Factors Influencing People's Perception of Information Security。Human-Computer Interaction. HCI Applications and Services。Heidelberg:Springer。  new window
 
 
 
 
第一頁 上一頁 下一頁 最後一頁 top