| 期刊論文1. | 徐綺憶、王存國(20010100)。資訊系統委外程度之影響因素探討。資訊管理研究. 中央大學,3(1),105-128。 延伸查詢 | 2. | Bergen, Mark E.、Dutta, Shantanu、Walker, Orville C. Jr.(1992)。Agency Relationships in Marketing: A Review of the Implications and Applications of Agency Related Theories。Journal of Marketing,56(3),1-24。 | 3. | Mao, J. Y.、Lee, J. N.、Deng, C. P.(2008)。Vendors' perspectives on trust and control in offshore information systems outsourcing。Information & Management,45(7),482-492。 | 4. | Kotulic, A. G.、Clark, J. G.(2004)。Why there aren't more information security research studies?。Information and Management,41(5),597-607。 | 5. | Kettinger, W. J.、Lee, C. C.(1997)。Pragmatic Perspectives on the Measurement of Information Systems Service Quality。MIS Quarterly,21(2),223-240。 | 6. | Aubert, B. A.、Patry, M.、Rivard, S.(1996)。A Transaction Cost Approach to Outsourcing Behavior: Some Empirical Evidence。Information & Management,30(2),51-64。 | 7. | Loh, L.、Venkatraman, N.(1992)。Determinants of information technology outsourcing: A cross-sectional analysis。Journal of Management Information Systems,9(1),7-24。 | 8. | Williamson, Oliver E.(1981)。The Modern Corporation: Origins, Evolution, Attributes。Journal of Economic Literature,19(4),1537-1568。 | 9. | Williamson, Oliver E.(1979)。Transaction-Cost Economics: The Governance of Contractual Relations。The Journal of Law and Economics,22(2),233-261。 | 10. | Williamson, Oliver E.(1991)。Comparative Economic Organization: The Analysis of Discrete Structural Alternatives。Administrative Science Quarterly,36(2),269-296。 | 11. | Jensen, Michael C.、Meckling, William H.(1976)。Theory of the firm: Managerial behavior, agency costs and ownership structure。Journal of Financial Economics,3(4),305-360。 | 12. | 趙琪、林正士(2002)。廣告管理決策前因之研究:整合代理理論與交易成本。管理學報,19(5),927-948。 延伸查詢 | 13. | 林晉寬、陳奇修(2007)。交易理論是解釋組織統治決策的有效理論嗎?--台灣之實證研究觀察。中華管理評論國際學報,10(3),1-21。 延伸查詢 | 14. | 洪國興、季延平、趙榮耀(2006)。影響資訊安全關鍵因素之研究。資訊管理研究,6,1-29。 延伸查詢 | 15. | 樊國禎、方仁威、鐘乃業、林勤經(2002)。適當保護個人隱私的金鑰代管/回復式密碼系統初探。電腦與通訊,99,28-36。 延伸查詢 | 16. | 陳志萍、陳志賢、何玲玲(2010)。電子化政府品牌關係發展之初探性研究。資訊傳播研究,1(1),67-87。 延伸查詢 | 17. | Albrechtsen, E.(2007)。A qualitative study of users' view on information security。Computers & Security,26(4),276-289。 | 18. | Anderson, J. M.(2003)。Why we need a new definition of information security。Computers & Security,22(4),308-313。 | 19. | Aubert, B. A.、Rivard, S.、Patry, M.(2004)。A transaction cost model of IT outsourcing。Information & Management,41,921-932。 | 20. | Blumenberga, S.、Wagner, H. T.、Beimborn, D.(2009)。Knowledge transfer processes in IT outsourcing relationships and their impact on shared knowledge and outsourcing performance。International Journal of Information Management,9(5),342-352。 | 21. | Bouchaib, B.、Suzanne, R.(2003)。The information technology outsourcing risk: a transaction cost and agency theory-based perspective。Journal of Information Technology,18,211-221。 | 22. | Chow, T.、Cao, D. B.(2008)。A survey study of critical success factors m agile software projects。The Journal of Systems and Software,81(6),96l-971。 | 23. | Chow, W. S.(2004)。An exploratory study of the success factors for extranet adoption in e-supply chain。Journal of Global Information Management,12(1),60-67。 | 24. | Fenn, C.、Shooter, R.、Allan, K.(2002)。IT security outsourcing: How safe is your IT security?。Computer Law & Security Report,18(2),109-111。 | 25. | Ferreira, A. M. D.、Laurindo, F. J. B.(2009)。Outsourcing decision-making aspects considered by IT departments in Brazilian companies。International Journal of Production Economics,122,305-311。 | 26. | Finne, T.(2000)。Key concepts and business processes, computers & security。Information Systems Risk Management,19(3),234-242。 | 27. | Kahraman, Cengiz、Engin, Orhan、Kabak, Ozgur、Kaya, Ihsan(2009)。Information systems outsourcing decisions using a group decision-making approach。Engineering Applications of Artificial Intelligence,22(6),832-841。 | 28. | Khalfan, A. M.(2004)。Information security considerations in IS&IT outsourcing projects-a descriptive case study of two sectors。International Journal of information Management,24,29-42。 | 29. | Lai, I. K. W., Tong, V. W. L.、Lai, D. C. F.(2010)。Trust factors influencing the adoption of internet-based interorganizational systems。Electronic Commerce Research and Applications,10(1),85-93。 | 30. | Lee, J. N.、Kim, Y. G.(1997)。Information systems outsourcing strategies for affiliated firms of the Korean conglomerate groups。Journal of Strategic Information Systems,6(3),203-229。 | 31. | Leyden, J.(2004)。Clueless office workers help spread computer viruses。The Register,6,17-21。 | 32. | Ng, Boon-Yuen、Kankanhalli, Atreyi、Xu, Yunjie(2009)。Studying users' computer security behavior: A health belief perspective。Decision Support Systems,46(4),815-825。 | 33. | Tiwana, A.、Bush, A. A.(2007)。A Comparison of Transaction Cost, Agency, and Knowledge-Based Predictors of IT Outsourcing Decisions: A U.S.-Japan Cross-Cultural Field Study。Journal of Management Information Systems,24(1),259-300。 | 34. | Walker, G.、Poppo, R.(1991)。Profit centers, single-source suppliers, and transaction costs。Administrative Science Quarterly,36,66-87。 | 35. | Walt, V. D. A.(2003)。Managed Security Services-Who Needs it?。Computer Fraud and Security,8,15-17。 | 36. | Whitten, D.、Leidner, D.(2006)。Bringing IT back: an analysis of the decision to back source or switch vendors。Decision Sciences,37(4),605-621。 | 37. | Willers, R.(2002)。Managed Security Services-A Buyer's Guide。Network Security,2002(9),12-15。 | 38. | Workman, M.(2008)。Wisecrackers: A Theory-Grounded Investigation of Phishing and Pretext Social Engineering Threats to Information Security。Journal of the American Society for Information Science and Technology,59(4),662-674。 | 39. | Workman, M.、William, H. B.、Straub, D.(2008)。Security lapses and the omission of information security measures: A threat control model and empirical test。Computers in Human Behavior,24,2799-2816。 | 40. | Yeh, Q. J.、Chang, A. J. T.(2007)。Threats and countermeasures for information system security: A cross-industry study。Information & Management,44,480-491。 | 會議論文1. | 張俊陽、郭嘉偉、許鳳君(2008)。以延伸委外接受模式與交易成本理論探討影響員工接受資安委外服務。 延伸查詢 | 2. | Choi, Y. S.、Seo, D. I.(2005)。An analysis of ISP's role as managed security service providers(MSSPs)624-626。 | 3. | Deshpande, D.(2005)。Managed security services: an emerging solution to security107-111。 | 4. | Acquisti, A.、Grossklas, J.(2003)。Losses, gains, and hyperbolic discounting: An experimental approach to information security attitudes and behavior。Berkeley: CA.。 | 學位論文1. | 李雅雯(2004)。中小企業資訊委外流程評估指標之研究(碩士論文)。銘傳大學。 延伸查詢 | 2. | 陳正坤(1997)。資訊系統發展之委外管理研究(碩士論文)。台灣大學。 延伸查詢 | 3. | 張登裕(2007)。資訊安全業務委外關鍵成功因素之研究--以國軍司令部(指揮部)層級為例。國防大學。 延伸查詢 | 4. | 許通安(2006)。政府機關資訊科技委外關鍵因素。中原大學。 延伸查詢 | 5. | 林群國(2008)。資訊委外成功因素之研究。世新大學。 延伸查詢 | 6. | Straub, D.(1986)。Deterring Computer Abuse: The Effectiveness of Deterrent Countermeasures in the Computer Security Environment。 | 圖書1. | Glaser, B. G.、Strauss, A. L.(1967)。Grounded Theory。New York:Aldine。 | 2. | Laudon, K. C.、Laudon, J. P.(2003)。Management information systems: Managing the digital firm。Prentice Hall。 | 3. | 林東清(2002)。資訊管理--e化企業的核心競爭能力。台北市:智勝文化事業有限公司。 延伸查詢 | 4. | 黃俊英(1994)。企業研究方法。臺北:東華書局。 延伸查詢 | 5. | 林震岩(2006)。多變量分析:SPSS的操作與應用。臺北:智勝文化事業有限公司。 延伸查詢 | 6. | Williamson, Oliver E.(1985)。The Economic Institutions of Capitalism: Firms Markets, Relational Contracting。Macmillan, Ltd:Free Press。 | 7. | Strauss, Anselm、Corbin, Juliet(1998)。Basics of Qualitative Research: Techniques and Procedures for Developing Grounder Theory。Sage。 | 8. | Kvale, Steinar(1996)。Inter Views: An introduction to qualitative research interviewing。Sage。 | 9. | 財團法人資訊工業資策會(2008)。2008年台灣資訊委外市場將挑戰300億大關。台北。 延伸查詢 | 10. | Schneier, B.(2000)。Secret and Lies, Digital Security in a Networked World。New York。 | 其他1. | ISO27001(2005)。Information security management systems-Requirements。 | 2. | Peters, S.(2009)。14th CSI Computer Crime and Security Survey。 | 3. | Richardson, R.(2008)。13th CSI Computer Crime and Security Survey。 | 圖書論文1. | Ding, W.、Yurcik, W.、Yin, X.(2005)。Outsourcing Internet Security: Economic Analysis of Incentives for Managed Security Service Providers。International Workshop on Internet and Network Economics (WINE)。Berlin, Heidelberg:Springer。 | |
| |