:::

詳目顯示

回上一頁
題名:我國大學生資訊隱私偏差行為意圖之研究
作者:任文瑗
作者(外文):Wen-Yuan Jen
校院名稱:國立中央大學
系所名稱:資訊管理研究所
指導教授:范錚強許通安
學位類別:博士
出版日期:2005
主題關鍵詞:計畫行為理論理性選擇理論抑制理論資訊隱私權資訊隱私偏差行為。information deviant behaviorinformation privacycontainment theoryRational Choice TheoryTheory of Planned Behavior
原始連結:連回原系統網址new window
相關次數:
  • 被引用次數被引用次數:期刊(0) 博士論文(1) 專書(0) 專書論文(0)
  • 排除自我引用排除自我引用:0
  • 共同引用共同引用:0
  • 點閱點閱:43
本研究根據社會心理學理論與犯罪學理論,主旨在於探討國內大專學生對資訊隱私偏差行為的意圖與親疏關係對該行為意圖的影響。透過競爭模型方式,試圖以二個研究模型探索資訊隱私偏差行為意圖如何受到成本評估、利益評估、對資訊隱私偏差行為的態度、主觀規範與資訊隱私自我效能等因素的影響。此外,探索華人社會親疏關是否對資訊隱私偏差行為意圖之因素產生影響效果。
本研究屬實徵性研究,研究方法與設計以隨機抽樣方式對我國大學生進行問卷調查。測量問卷根據二種侵權行為(個人資料商業、洩漏他人資料)與二種親疏關係(關係親密、關係疏離),共設計四種不同的情境故事。受訪對象分佈北、中、南大學院校,問卷總共發送出762 份問卷,有效樣本回收率達 83 %。
經資料分析,資訊隱私偏差行為意圖的研究結果顯示:研究模型一的卡方自由度比值較低、疊代次數較少、契合度指標值表現較佳等,證實模型一是契合度較佳的研究模型。模型一的假說檢定說明,利益的評估越高,資訊隱私自我效能越弱;成本的評估越高,個人對資訊隱私偏差行為的態度越負向;主觀規範越強,對資訊隱私偏差行為的態度越負向;對資訊隱私偏差行為的態度越負向,資訊隱私偏差行為意圖越弱;資訊隱私自我效能越強,資訊隱私偏差行為意圖越弱;資訊隱私自我效能越強,資訊隱私偏差行為意圖越弱。其次,實徵資料顯示對資訊隱私偏差行為的態度、資訊隱私自我效能、成本評估、利益評估等因素,受到親疏關係的影響而有顯著的差異。根據上述實徵資料的分析結果,本研究提出實務上的意涵以及對後續研究方向的建議。
This study is based the theory of planned behavior and rational choice theory. This study tends to explore college students’ information deviant behavioral intention and the impact caused by different relationships. Based on competing model, the study picks up the better model, which presents the impact factor among cost evaluation, benefit evaluation, the attitudes of information deviant behavior, subjective norm and information self-efficacy factors. For understanding the information deviant behavioral intention caused by various social relationship, this study explores the impacts as well.
參考文獻
中文文獻
朱柏松(1989),「隱私權概念之衍變及其損害防止立法之動向」,法學叢刊,34卷2期,89-102頁。new window
余德正(1999),「不法使用網際網路之刑事責任」,東海大學法律學研究所碩士論文。
吳懿婷譯(2001),隱私的權利(The Right to Privacy),商周出版,206-207頁。
沙依仁(1993),人類行為與社會環境,台北:五南書局。
李茂興、徐偉傑譯(1998),社會學:全球性的觀點,台北:弘智書局。(Joan Ferrante 原著)
李震山(1997),「論資訊自決權」,現代國家與憲法一李鴻禧教授六秩華誕祝壽論文集,715頁。
林雅惠(2004),「資訊隱私權之重塑-以行動商務為例」,科技法律評論,一卷一期,93-122頁。new window
羅豐良(2001),「社會控制對兒童偏差行為影響之研究」,中國文化大學兒童福利研究所碩士論文。
邱皓政(2003),結構方程模式:LISREL的理論、技術與應用,台北:雙葉書廊。
邱惠雯(2002),「網際網路使用行為之限制─從隱私權保護觀之探討」,國立中正大學犯罪防治研究所碩士論文。
紀佳伶(1999),「電子化/網路化政府資訊內容隱私權之研究」,國立政治大學公共行政研究所碩士論文。
翁岳生等(1985),「資訊立法之研究」,行政院研究發展考核委員會編印。
張柏東、劉明岩(2005),「介聘電腦遭入侵案 關心女友調動 國小教師扮駭客」,聯合報,2005/6/4。
許孟祥、郭峰淵(2001),「電腦倫理效能對電腦偏差行為之影響:以盜版軟體為例」,管理學報,十八卷一期,23-47頁。new window
許孟祥、郭峰淵、林杏子、朱彩馨、游佳萍(2001),「個人資訊隱私:倫理效能之量表的發展與驗證」,中山管理評論,九卷三期,373-394頁。new window
費孝通(1948),鄉土中國,上海:觀察社(香港鳳凰出版社重印)
馮震宇、劉志豪(1998),「我國網路犯罪類型及案例探討」,月旦法雜誌,41期,84頁。
楊國樞(1992),「中國人的社會取向:社會互動的觀點」,中國人的心理與行為1992-理念與方法篇,台北:桂冠圖書公司。new window
廖緯民(1996),「論資訊時代的隱私權保護--以資訊隱私權為中心」,資訊法務透析,22頁。new window
郭石城,「廿萬筆考生資料外流 買賣資料者五萬元交保 蘇犯案時未成年 移少年法庭」,中國時報,2005/04/26。
劉靜怡(2001),「網路上資訊隱私權保障問題之研究」,二十一世紀,63期,17-27頁。
蕭美惠譯(1999),透明社會—個人隱私vs 資訊自由,先覺出版社出版,16頁。(David Brin著)
蕭愛貞(1999),「網際網路犯罪之責任內涵-兼論網路服務業者之責任」,輔仁大學法律學研究所碩士論文。
簡榮宗(1998),網路上資訊隱私權保護問題之研究,東吳大學法律研究所碩士論文。


英文文獻
Adams, J.S.(1965), “Inequity in Social Exchange,” Advances in Experimental Social Psychology, 2, 267-299.
Aday, D.P.(1990), Social Control at the Margin, NY: A Division of Wadsworth, Inc.
Agranoff, M.H.(1991), “Controlling the Threat to Personal Privacy: Corporate Policies Must Be Created,” Journal of Information Systems Management, 8, 48-52.
Ajzen, I.(2002), “Perceived Behavioral Control, Self-Efficacy, Locus of Control, and the Theory of Planned Behavior,” Journal of Applied Social Psychology, 32, 665-683.
Ajzen, I.(1991), “The Theory of Planned Behavior,” Organizational Behavior and Human Decision Process, 50, 179-211.
Ajzen, I.(1989), “Attitude Structure and Behavior,” in Attitude Structure and Function, A.R. Pratkanis, S.J. Breckler, and A.G. Greenwald (Ed.), NJ: Lawrence Erlbaum Associates.
Ajzen, I., and Madden, T.J. (1986), “Prediction of Goal-Directed Behavior: Attitudes, Intentions and Perceived Behavioral Control,” Journal of Experimental Social Psychology, 42, 426-435.
Ajzen, I.(1985), “From Intentions to Actions: A Theory of Planned Behavior.” in Action-Control: from Cognition to Behavior, Heidelberg: Springer.
Ajzen, I. and Fishbein, M.(1980), Understanding Attitudes and Predicting Social Behavior, NJ: Prentice-Hall.
Ajzen, I. and Fishbein, M., (1977), “Attitude-Behavior Relations: A Theoretical Analysis and Review of Empirical Research,” Psychological Bulletin, 84(5), 888-918.
Akers, R.L.(1994), Criminological Theories: Introduction and Evaluation, LA: Roxbury.
Akers, R.L.(1985), Deviant Behavior: A Social Learning Approach, 3rd(Ed), CA: Wadsworth.
Akers, R.L.(1973), Deviant Behavior: A Social Learning Approach, CA: Wadsworth.
Anderson, J.C., and Gerbing, D.W.(1988), “Structural Equation Modeling in Practice: A Review and Recommended Two-Step Approach,” Psychological Bulletin, 103, 453-60.
Association of British Insurers(2000), “Future Crime Trends in the United Kingdom,” General Insurance Research Report No.7, ,
(Accessed April 10, 2005).
Bagozzi, R.P., and Yi, Y. (1988), “On the Evaluation of Structural Equation Models,” Academy of Marketing Science, 16(1), 74-94.
Bandura, A.(1997), Self-Efficacy: the Exercise of Control, NY: W. H. Freeman.
Bandura, A. and Jourden, F.G.(1991), “Self-Regulatory Mechanisms Governing the Impact of Social Comparison on Complex Decision Making,” Journal of Personality and Social Psychology, 60(6), 941-951.
Bandura, A.(1986), Social Foundations of Thought and Action: A Social Cognitive Theory, NY: Prentice-Hall.
Bandura, A.(1982), “Self-Efficacy Mechanism in Human Agency,” American Psychologist, 37(2), 122-147.
Bandura, A.(1977), Social Learning Theory, NJ: Prentice-Hall.
Bachman, R., Paternoster, R. and Ward, S.(1982), “The Rationality of Sexual Offending: Testing A Deterrence/Rational Choice Conception of Sexual Assault,” Law and Society Review, 26, 343-372.
Banerjee, D., T.P. Cronan, and T.W. Jones(1998), “Modeling IT Ethics: A Study Of Situational Ethics,” MIS Quarterly, 22(1), 31–60.
Baumgartner, H., and Homburg, C.(1996), “Applications of Structural Equation Modeling in Marketing and Consumer Research: A Review,” International Journal of Research in Marketing, 13, 139-61.
Becker, H. S. (1963), Outsiders: Study in the Sociology of Deviance, NY: Free Press.
Benda, B.B. and Corwyn, R.F.(1996), “Testing a Theoretical Model of Adolescent Sexual Behavior Among Rural Families in Poverty,” Child and Adolescent Social Work Journal, 13, 469-494.
Bock, G.W., R.W. Zmud, Y.G. Kim, and J.N. Lee(2005), “Behavioral Intention Formation in Knowledge Sharing: Examining the Roles of Extrinsic Motivators, Social-Psychological Forces, and Organizational Climate,” MIS Quarterly, 29(1), 87-111.
Bommer, M., C. Gratto, J. Gravander, and M. Tuttle(1987), “A Behavioral Model of Ethical and Unethical Decision Making,” Journal of Business Ethics, 6(4), 265–281.
Browne, M. W. and Cudeck, R. (1993) “Alternative Ways of Assessing Model Fit,” in Testing Structural Equation Models, Kenneth Bollen and J. Scott Long, (Eds.), Sage Publications, Newbury Park, CA, 136-192.
Chang, M.K.(1998), “Predicting Unethical Behavior: A Comparison of the Theory of Reasoned Action and the Theory of Planned Behavior,” Journal of Business Ethics, 7(16), 1825-1834.
Chin, W.W.(1998), “Issues and Opinion on Structural Equation Modeling,” MIS Quarterly, 22(1), 7-16.
Christensen, A. and Eining, M.(1991), “Factors Influencing Software Piracy: Implications for Accountants,” Journal of Information Systems, 5(1), 67-80.
Clarke, R.(1999), “International Privacy Concerns Confirm the Case for Intervention,” Communications of the ACM, 42, 60-67.
Clarke, R. and Cornish, D.(2000), “Rational Choice,” in R. Paternoster and R. Bachman (Ed), Explaining Crime and Criminals: Essays in Contemporary Criminological Theory, LA: Roxbury Publishing Company.
Cloward, R.A., and Ohlin, L.E.(1960). Delinquency and opportunity, NY: The Free Press.
Cohen, L.E. and Kleugel, J.R.(1978), “Determinants of Juvenile Court Dispositions,” American Sociological Review, 43, 162-177.
Cohen, S., and Scull, A.(1983), “Social Control in History and Sociology,” Social control and the state, Martin Robertson and Company Ltd.
Compeau, D.R. and Higgins, C.A.(1995), “Computer Self-Efficacy: Development of A Measure and Initial Test,” MIS Quarterly, 19(2), 189-211.
Cornish, D.B. and Clarke, R.V.(1986), The Reasoning Criminal: Rational Choice Perspectives on Offending, NY: Springer-Verlag.
Cornish, D. and Clarke. R.(1987), “Understanding Crime Displacement: An application of Rational Choice Theory,” Criminology, 25, 933-947.
Cortese, A. (1990), Ethnic Ethics: The Restructuring of Moral Theory, NY: State University of New York Press.
Cullen, F.T. and Agnew, R.(2002), Criminological Theory: Past to Present, 2nd(Ed), LA: Roxbury Publishing Company.
DeConick, J.B. and Lewis, W.F. (1997), “The Influence of Deontological and Teleological Considerations and Ethical Climate on Sales Managers’ Intentions to Reward or Punish Sales Force Behavior,” Journal of Business Ethical, 16, 497-506.
Dejoie, R., G. Fowler, and D. Paradice(1991), Ethical Issues in Information Systems, MA: Boyd and Fraser publishing company.
Durkeim, E.(1893), The Division of Labor in Society, NY: Free Press. (Reprinted and translated, 1933)
Empey, L.T.(1983), American Delinquency: Its meaning and construction, IL: Dorsey.
Eining, M.M. and Christensen, A.L.(1991), “A Psycho-Social Model of Software Piracy: The Development and Test of A Model,” in: R. Dejoie, G. Fowler, D. Paradice (Eds.), Ethical Issues in Information Systems, MA: Boyd and Fraser.
Fishbein, M. and Ajzen, I.(1975), Beliefs, Attitude, Intentions and Behavior: An Introduction to theory and Research, MA: Addition-Wesley.
Flannery, B. L. and May, D. R. (2000), “Environmental Ethical Decision Making in the U.S. Metal-Finishing Industry,” Academy of Management Journal, 43(4), 642-663.
Gattiker, U. E. and Kelley, H. (1999), “Morality and Computers: Attitudes and Differences in Moral Judgments,” Information Systems Research, 10(3), 233-254.
Goodman, M.(2001), “Making Computer Crime Count,” FBI Law Enforcement Bulletin, 70(8), 10-17.
Gordon, S. and Ma, Q.(2003), “Convergence of Virus Writers and Hackers: Fact or Fantasy?” Symantec Security Response, http://www.symantec.com, (Accessed March 28, 2005).
Gormley, K. (1992), One Hundred Years of Privacy, Wisconsin Law Review, 1335-1408.
Gottfredson, M.R. and Hirschi, T.(1990). A general theory of crime, CA: Stanford University Press.
Gowthorpe, C., J. Blake, and J. Dowds(2002), “Testing the Bases of Ethical Decision-Making: A Study of the New Zealand Auditing Profession,” Business Ethics: A European Review, 11(2), 143-156.
Grasmick, H.G. and Bursik, R.J.(1990), “Conscience, Significant Others, and Rational Choice: Extending the Deterrence Model,” Law and Society Review, 24, 835-861.
Greenberg, J.(1989), “Cognitive Re-Evaluation of Outcomes in Response to Underpayment Inequity,” Academy of Management Journal, 32, 174-184.
Hansen, T., J.M. Jensen, and H.S. Solgaard(2004), “Predicting Online Grocery Buying Intention: A Comparison of the Theory of Reasoned Action and the Theory of Planned Behavior,” International Journal of Information Management, 24(6), 539-550.
Hair, J.F., Anderson, R.E., Thatham, R.L., and Black, W.C. (1998), Multivariate Data Analysis, Fifth Edition, NJ: Prentice-Hall.
Hatcher M., J. McDannell, and S. Ostfeld(1999), “Computer Crimes,” The American Criminal Law Review, 36(3), 397-444.
Hill, T., N.D. Smith, and M.F. Mann(1987), “Role of Efficacy Expectations in Predicting the Decision to Use Advanced Technologies: The Case of Computers,” Journal of Management, (16), 337-313.
Ho, M. K. (1987). Family Therapy with Ethnic Minorities. CA: Sage.
Hsu, M.H. and Kuo, F.Y.(2003a), “An Investigation of Volitional Control in Information Ethics,” Behavior and Information Technology, 22(1), 53-63.
Hsu, M.H. and Kuo, F.Y.(2003b), “The Effect of Organization-Based Self-Esteem and Deindividuation on Protecting Personal Information Privacy,” Journal of Business Ethics, 42(4), 305-321.
Hsu, F.L.K.(1971), “Psychological Homeostasis and Jen: Conceptual Tools for Advancing Psychological Anthropology,” American Anthropologist, 73, 23-44.
Hirschi, T.(1969), American Delinquency: Its Meaning and Construction, IL: Dorsey.
Hunt, S. D. and Vitell, S. J., (1986), “A General Theory of Marketing Ethics,” Journal of Macromarketing, 6(1), 5-16.
Hunt, S.D. and Vasquez-Parraga, A.Z. (1993), “Organization Consequences, Marketing Ethics, and Sales Forces Supervision,” Journal of Marketing Research, 30, 78-90.
Huseman, R.C., Hatfied, J.D., and Miles, E.D.(1987), “A New Perspective on Equity Theory: the Equity Sensitivity Construct,” Academy of Management Review, 20, 222-234.
Hwang, K.K. (1987), “Face and Favor: the Chinese Power Game,” American Journal of Sociology, 92, 944-974.
Inness, J.C.(1992), Privacy, Intimacy, and Isolation, Oxford University Press.
Jeffery, C.C.(1972), “The Historical Development of Criminology,” in H. Mannheim,(Ed.), Pioneers in Criminology, NJ: Patterson Smith, 458-498.
Jeffery, C.C.(1956), “The Structure of American Criminological Thinking,” Journal of Criminal Law, Criminology, and Police Science, 46, 658-672.
Jöreskog, K.G. and Sörbom, D. (1989), LISREL 7: A Guide to the Program and Applications. Chicago: SPSS Inc.
Kohlberg, L. (1984), Essays on Moral Development, II: The Psychology of Moral Development, San Francisco: Harper & Row. 
Kreie, J. and Cronan, T.P.(1998), “Judging What Is Ethical or Unethical: There Are Differences Between Men and Women,” Communications of the ACM, 41 (9), 70–76.
Laudon, K.C. and Laudon, J.P.(2000), Management Information Systems: New Approaches to Organization and Technology, NJ: Prentice-Hall.
Lemert, E.(1951), Social pathology, NY: McGraw-Hill.
Leonard, L.N.K., T.P. Cronanb, and J. Kreiec(2004), “What Influences IT Ethical Behavior Intentions-Planned Behavior, Reasoned Action, Perceived Importance, or Individual Characteristics?” Information and Management, 42, 143–158.
Liska, A.E.(1992), “Social Control,” in Borgatta, E.F. and Borgatta, M.L. (Eds.), Encyclopedia of Sociology. NY: Macmillan Publishing Company.
Little, C.B.(1995), Deviance and control, IL: F.E. Peacock.
Loch, K.D. and Conger, S.(1996), “Evaluating Ethical Decision Making and Computer Use,” Communications of the ACM., 39(7), 74-83.
Lwin, M.O. and Williams, J.D.(2003), “A Model Integrating the Multidimensional Developmental Theory of Privacy and Theory of Planned Behavior to Examine Fabrication of Information Online,”.Marketing Letters, 14(4), 257-272.
Manstead, A.S.R. and Eekelen, S.A.M. van(1998), “Distinguishing Between Perceived Behavioral Control and Self-Efficacy in the Domain of Academic Achievement Intentions and Behaviors,” Journal of Applied Social Psychology, 28(15), 1375-1392.
Marsh, H. W.(1994), “Confirmatory Factor Analysis Models of Factorial Invariance: A Multifaceted Approach,” Structural Equation Modelling, 1(1), 5-34.
Martocchio, J.J.(1994), “Effect of Conceptions of Ability on Anxiety, Self-Efficacy, and Learning in Training,” Journal of Applied Psychology, 79(6), 819-825.
Matza, D.(1964), Delinquency and Drift, NY: John Wiley.
Moores, T. T. and Dhaliwal, J.(2004), “A Reversed Context Analysis of Software Piracy Issues in Singapore,” Information and Management, 41(8), 1037-1042.
Newman, G.R.(2004), “Check and Card Fraud,” Problem-Oriented Guides for Police Problem-Specific Guides Series No. 21, U.S. Department of Justice.
, (Accessed April 08, 2005).
Nisbet, R. A. (1966). The Sociological Tradition. NY: Basic Books.
Nunes, J.C., C.K. Hsee, and E.U. Weber(2004), “Why Are People So Prone to Steal Software? The Effect of Cost Structure on Consumer Purchase and Payment Intentions,” Journal of Public Policy and Marketing, 23(1), 43-53.
Paternoster, R. and Nagin, D.S.(1993), “Enduring Individual Difference and Rational Choice Theories of Crime,” Law and Society Review, 27(3), 476-495.
Peace, A.G., D.F. Galletta, and J.Y.L. Thong(2003), “Software Piracy in the Workplace: A Model and Empirical Test,” Journal of Management Information Systems, 20(1), 153-178.
Piliavin, I., R. Gartner, C. Thornton, and R. Matsueda(1986), “Crime, Deterrence and Rational Choice,” American Sociological Review, 51, 101-119.
Reckless, W.C.(1955), The Crime Problem. NY: Appleton Century Crofts.
Reidenbach, R.E. and Robin, D.P.(1988), “Some Initial Steps Toward Improving the Measurement of Ethic,” Journal of Business Ethics, 7(11), 871-881.
Reiss, A.J. Jr.(1951). “Delinquency as the Failure of Personal and Social Controls,” American Sociological Review, 16, 196-207.
Robbins, S.P.(1996), Organizational Behavior: Concepts Controversies and Applications, NJ: Prentice-Hall.
Ross, E.A.(1901), Social Control, NY: The Macmillan.
Schultz, E.E. (2002), “A Framework for Understanding and Predicting Insider Attacks,” Computers & Security, 21(6), 526-531.
Schwendinger, H. and Schwendinger, J. S. (1985), Adolescent Subcultures and Delinquency, NY: Praeger.
Sethi, V. and Carraher, S. (1993), “Developing Measures for Assessing the Organizational Impact of Information Technology: A Comment on Mahmood and Soon’s Paper,” Decision Science, 24(4), 867-877.
Shepherd, G.J. and O’ Keefe, D.J. (1984), “Separability of Attitudinal and Normative Influences on Behavioral Intentions in the Fishbein-Ajzen Model,” The Journal of Social Psychology, 122, 287-288.
Shimp, T.A. and Kavas, A. (1984), “The Theory of Reasoned Action Applied to Coupon Usage,” Journal of Consumer Research, 11, 795-809.
Siegel, L.J.(1992), Criminology, West Publishing.
Simpson, P.M., Banerjee, D. S. and Claude, L. Jr. (1994), “Softlifting: A Model of Motivating Factors,” Journal of Business Ethics, 13(6), 431-438.
Smedinghoff, T. J. (1996), Online Law: The SPA's Legal Guide to Doing Business on the Internet, MA: Addison-Wesley.
Starr (1998), Special Counsel Kenneth Starr's Report, White House Rebuttal to Starr's Report, , (Accessed April 14, 2005).
Sutherland, E.H.(1929). Principles of Criminology, PA: Lippincott.
Sue, D.W. and Sue, D.(1990). Counseling the Culturally Different: Theory and Practice, NY: Wiley.
Swartz, N.(2002), “Cybercrime Soars,” The Information Management Journal, 36(3), 6.
Tittle, C. R.(1969), “Crime Rates and Legal Sanctions,” Social Problem, 16, 409-423.
Vallerand, R.D., Deshaies, P., Cuerrier, J., Pelletier, J.G., and Mongeau, C. (1992), “Ajzen and Fishbein’s Theory of Reasoned Action as Applied to Moral Behavior: A Confirmatory analysis,” Journal of Personality and Social Psychology, 62, 98-109.
Wang, C.C.(2005), “Factors that Influence the Piracy of DVD/VCD Motion Pictures,” Journal of American Academy of Business, 6(1), 231-237.
Warren, S. D. and Brandeis, L. D. (1890), “The Right to Privacy,” Harvard Law Review, 5, 193. (轉引自林雅惠, 2004)
Westin, A.F.(1967), Privacy and Freedom, NY: Atheneum.
William, L.(1960), “Privacy: A Legal Analysis,” California. Law Review, 48, 389-407.
Williams, F.P. III, and McShanee, M.D.(1988), Criminological Theory. NJ: Prentice-Hall.
Willison, R.(2000), “Considering the Offender: Addressing the Procedural Stages of Computer Crime in an Organizational Context,” Working Paper Series. Department of Informatics of Copenhagen Business School, ,
(Accessed April 10, 2005).
Willison, R.(2001), “The Unaddressed Problem of Criminal Motivation in IS Security: Expanding the Preventive Scope Through the Concept of Readying,” Working Paper Series. London: London School of Economics. , (Accessed April 10, 2005). 
Wood, R. and Bandura, A.(1989), “Task, Domain, and General Efficacy: A Reexamination of the Self-Efficacy Scale,” Psychological Reports, 72, 423-432.
 
 
 
 
第一頁 上一頁 下一頁 最後一頁 top
:::
無相關著作
 
QR Code
QRCODE