| 期刊論文1. | Gu, J.-C.、Lee, S.-C.、Suh, Y.-H.(2009)。Determinants of behavioral intention to mobile banking。Expert Systems with Applications,36(9),11605-11616。 | 2. | Milne, S.、Orbell, S.、Sheeran, P.(2002)。Combining motivational and volitional interventions to promote exercise participation: Protection motivation theory and implementation intentions。British Journal of Health Psychology,7(2),163-184。 | 3. | McKnight, D. H.、Carter, M.、Thatcher, J. B.、Clay, P. F.(2011)。Trust in a specific technology: An investigation of its components and measures。ACM Transactions on Management Information Systems,2(2),(12)1-(12)25。 | 4. | Bahmanziari, T.、Pearson, M. J.、Crosby, L.(2003)。Is trust important in technology adoption? A policy capturing approach。Journal of Computer Information Systems,43(4),46-54。 | 5. | Liang, H.、Xue, Y.(2010)。Understanding security behaviors in personal computer usage: A threat avoidance perspective。Journal of the Association for Information Systems,11(7),394-413。 | 6. | Hosmer, D. W.、Hosmer, T.、Le Cessie, S.、Lemeshow, S.(1997)。A comparison of goodness-of-fit tests for the logistic regression model。Statistics in Medicine,16(9),965-980。 | 7. | Lee, Younghwa、Kozar, Kenneth A.、Larsen, Kai R. T.(2003)。The technology acceptance model: Past, present, and future。Communications of the Association for Information Systems,12(50),752-780。 | 8. | Santos, J. R. A.(1999)。Cronbach's alpha: A tool for assessing the reliability of scales。Journal of Extension,37(2),1-5。 | 9. | Rogers, Ronald W.(1975)。A protection motivation theory of fear appeals and attitude change。The Journal of Psychology,91(1),93-114。 | 10. | Malaquias, R. F.、Hwang, Y.(2016)。An empirical study on trust in mobile banking: a developing country perspective。Computers in Human Behavior,54,453-461。 | 11. | Marangunić, N.、Granić, A.(2015)。Technology acceptance model: a literature review from 1986 to 2013。Universal Access in the Information Society,14(1),81-95。 | 12. | Yu, P. L.、Balaji, M. S.、Khong, K. W.(2015)。Building trust in internet banking: a trustworthiness perspective。Industrial Management & Data Systems,115(2),235-252。 | 13. | Ong, Chorng-shyong、Lin, Yi-luen(20151200)。Security, Risk, and Trust in Individuals' Internet Banking Adoption: An Integrated Model。International Journal of Electronic Commerce Studies,6(2),343-354。 | 14. | Yang, Yann-jy、Wang, Chih-chien、Chen, Chien-chang(20170600)。Recent Development Trend of Electronic Commerce Research: 2000 to 2016。Contemporary Management Research,13(2),131-142。 | 15. | Crossler, R.、Belanger, F.(2014)。An Extended Perspective on Individual Security Behaviors: Protection Motivation Theory and a Unified Security Practices (USP) Instrument。SIGMIS Database,45(4),51-71。 | 16. | Boss, S.、Galletta, D.、Lowry, P. B.、Moody, G. D.、Polak, P.(2015)。What do systems users have to fear? Using fear appeals to engender threats and fear that motivate protective security behaviors。MIS Quarterly,39(4),837-864。 | 17. | Duggan, G. B.、Johnson, H.、Grawemeyer, B.(2012)。Rational security: Modelling everyday password use。International Journal of Human-Computer Studies,70(6),415-431。 | 18. | Gurung, A.、Luo, X.、Liao, Q.(2009)。Consumer motivations in taking action against spyware: an empirical investigation。Information Management & Computer Security,17(3),276-289。 | 19. | Happ, C.、Melzer, A.、Steffgen, G.(2016)。Trick with treat--reciprocity increases the willingness to communicate personal data。Computers in Human Behavior,61,372-377。 | 20. | Herley, C.、Oorschot, P. V.(2012)。A research agenda acknowledging the persistence of passwords。IEEE Security & Privacy,10(1),28-36。 | 21. | Hess, T. J.、McNab, A. L.、Basoglu, K. A.(2014)。Reliability generalization of perceived ease of use, perceived usefulness, and behavioral intentions。MIS Quarterly,38(1),1-28。 | 22. | Hillman, S.、Neustaedter, C.(2017)。Trust and mobile commerce in North America。Computers in Human Behavior,70,10-21。 | 23. | Kneidinger-Müller, B.(2017)。Mobile communication as invader in face-to-face interactions: An analysis of predictors for parallel communication habits。Computers in Human Behavior,73,328-335。 | 24. | Keith, M.、Shao, B.、Steinbart, P. J.(2007)。The usability of passphrases for authentication: An empirical field study。International Journal of Human-Computer Studies,65(1),17-28。 | 25. | Lau, Mei Mei、Lam, Aris Y. C.、Cheung, Ronnie(20160600)。Examining the Factors Influencing Purchase Intention of Smartphones in Hong Kong。Contemporary Management Research,12(2),213-223。 | 26. | Lejeune, R.、Alex, N.(1973)。On being mugged: The event and its aftermath。Urban Life and Culture,2(3),259-287。 | 27. | Martens, M.、De Wolf, R.、De Marez, L.(2019)。Investigating and comparing the predictors of the intention towards taking security measures against malware, scams and cybercrime in general。Computers in Human Behavior,92,139-150。 | 28. | Nelson, D.、Vu, K.-P. L.(2010)。Effectiveness of image-based mnemonic techniques for enhancing the memorability and security of user-generated passwords。Computers in Human Behavior,26(4),705-715。 | 29. | Roe-Burning, S.、Straker, G.(1997)。The association between illusions of invulnerability and exposure to trauma。Journal of Traumatic Stress,10(2),319-327。 | 30. | Thompson, N.、McGill, T. J.、Wang, X.(2017)。"Security begins at home": Determinants of home computer and mobile device security behavior。Computers & Security,70,376-391。 | 31. | Zhao, R.、Yue, C.(2014)。Toward a secure and usable cloud-based password manager for web browsers。Computers & Security,46,32-47。 | 32. | West, R.(2008)。The psychology of security。Communications of the ACM,51(4),34-40。 | 33. | Yan, Q.、Han, J.、Li, Y.、Zhou, J.、Deng, R. H.(2015)。Leakage-resilient password entry: challenges, design, and evaluation。Computers & Security,48,196-211。 | 34. | Luarn, Pin、Lin, Hsin-Hui(2005)。Toward An Understanding of The Behavioral Intention Use Mobile Banking。Computers in Human Behavior,21(6),873-891。 | 35. | Davis, Fred D.(1989)。Perceived Usefulness, Perceived Ease of Use, & User Acceptance of Information Technology。MIS Quarterly,13(3),319-340。 | 會議論文1. | Alkaldi, N.、Renaud, K.(2016)。Why do people adopt, or reject, smartphone password managers?。The EuroUSEC 2016: The 1st European Workshop on Usable Security。 | 2. | Alkaldi, N.、Renaud, K.(2019)。Encouraging password manager adoption by meeting adopter self-determination needs。 | 3. | Allison, P. D.(2014)。Measures of fit for logistic regression。 | 4. | Chenoweth, T.、Minch, R.、Gattiker, T.(2009)。Application of protection motivation theory to adoption of protective technologies。The 2009 42nd Hawaii International Conference on System Sciences,(會議日期: 5-8 Jan. 2009)。 | 5. | Chiasson, S.、van Oorschot, P. C.、Biddle, R.(2006)。A usability study and critique of two password managers。 | 6. | Egelman, S.、Harbach, M.、Peer, E.(2016)。Behavior ever follows intention?: A validation of the security behavior intentions scale (SeBIS)。 | 7. | Karole, A.、Saxena, N.、Christin, N.(2010)。A comparative usability evaluation of traditional password managers。13th the International Conference on Information Security and Cryptology。 | 8. | Komanduri, S.、Shay, R.、Kelley, P. G.、Mazurek, M. L.、Bauer, L.、Christin, N.、Egelman, S.(2011)。Of passwords and people: Measuring the effect of password-composition policies。 | 9. | Li, Z.、He, W.、Akhawe, D.、Song, D.(2014)。The emperor's new password manager: security analysis of web-based password managers。The USENIX Security Symposium。 | 10. | McCarney, D.、Barrera, D.、Clark, J.、Chiasson, S.、van Oorschot, P. C.(2012)。Tapas: design, implementation, and usability evaluation of a password manager。 | 11. | Stobert, E.、Biddle, R.(2014)。The password life cycle: User behaviour in managing passwords。The 10th Symposium On Usable Privacy and Security。 | 12. | Ur, B.、Bees, J.、Segreti, S. M.、Bauer, L.、Christin, N.、Cranor, L. F.(2016)。Do users' perceptions of password security match reality?。 | 13. | Tari, F.、Ozok, A.、Holden, S. H.(2006)。A comparison of perceived and real shoulder-surfing risks between alphanumeric and graphical passwords。The second Symposium On Usable Privacy and Security。 | 14. | Wash, R.、Rader, E.、Berman, R.、Wellmer, Z.(2016)。Understanding password choices: How frequently entered passwords are re-used across websites。The Symposium on Usable Privacy and Security。 | 學位論文1. | Davis, F. D.(1985)。A Technology Acceptance Model for Empirically Testing New End User Information Systems: Theory and Results(博士論文)。Massachusetts Institute of Technology。 | 圖書1. | Cohen, Jacob、Cohen, Patricia、West, Stephen G.、Aiken, Leona S.(2014)。Applied Multiple Regression/Correlation Analysis for the Behavioral Sciences。Psychology Press。 | 其他1. | Bogard, M.(2011)。Logit models: R-square and the percentage of correct predictions,http://econometricsense.blogspot.com/2011/03/logit-models-r-square-and-percentage-。 | 2. | Huth, A.,Orlando, M.,Pesante, L.(2012)。Password security, protection, and management,http://aahuth.com/wp-content/uploads/sites/44/ 2014/02/PasswordMgmt2012-2.pdf。 | 3. | Smith, Aaron(20170126)。Americans and cybersecurity,http://www.pewinternet.org/2017/01/26/americans-and-cybersecurity/。 | 4. | Vance, A.(20100120)。If Your password is 123456, Just make it hackme,https://www.nytimes.com/2010/01/21/technology/21password.html。 | |
| |