中文部分
一、書籍、期刊與研究論文
[1]孔令芳、蔣鏡明,1997,角色扮演遊戲新手上路篇暨名詞解釋,電腦玩家,第71期,122-128頁。
[2]李青蓉、魏丕信、施郁芬、邱昭彰,1998,人機介面設計,空中大學出版社。
[3]林靜兒、卓俊伶、張智惠、謝扶成,2003,兒童在相對時宜工作的參數學習:檢驗練習變異假說,臺灣運動心理學報,第2期,47-59頁。[4]胡幼慧,1996,質性研究:理論、方法及本土女性主義研究實例,台北:巨流出版社。
[5]張欣戊、徐嘉宏、程小危、雷庚玲、郭靜晃,2004,發展心理學,台北:國立空中大學。
[6]莊雅茹、黃俊傑,2005,線上遊戲心流經驗與沉迷行為相關因素之探討,輔仁大學資訊管理學系碩士論文。
[7]陳淑惠、翁儷禎、蘇逸人、吳和懋、楊品鳳,2003,中文網路成癮量表之編製與心理計量特性研究,中華心理學刊 ,45卷3期,279-294頁。[8]溫世頌,2000,心理學,台北市:三民出版社。
[9]葉匡時、周德光,1995,企業倫理之形成與維持:回顧與探索,台大管理論叢,第六卷第一期; 1-24頁。
[10]劉建人、柯菁菁、陳協志,2004,資訊倫理與社會,台北:普林斯頓國際出版社。
[11]鄭麗玉,1993,認知心理學-理論與應用,台北:五南出版社。
[12]蘇建文、程小危、柯華葳、林美珍、吳敏而、幸曼玲、陳李綢、林惠雅、陳淑美,1995,發展心理學,台北:心理出版社。
二、網際網路資料
[1]中廣新聞, 2008,人在家中坐-惡煞打上門-兩嫌犯落網,檢索:民國98年3月25日,取自:http://news.pchome.com.tw/society/bcc/20080504/index-12098931014320821002.html
[2]北方網,2008,負面新聞不斷 歷數勁舞團的七宗罪,檢索:民國98年4月15日,取自:http://tjgame.big5.enorth.com.cn/system/2008/06/03/003351265.shtml
[3]台灣區電子機電子工業同業公會電子報,2009,瘋休閒、本土、外商競爭激烈,檢索:民國98年4月5日,取自:http://www.teema.org.tw/epaper/20090311/disquisition.html
[4]行政院主計處,1995,電腦處理個人資料保護法,取自:http://www.dgbas.gov.tw/
[5]經濟部智慧財產局, 2008,貫徹保護智慧財產權行動計畫,檢索:民國98年3月24日,取自:http://www.tipo.gov.tw/ch/
[6]資策會,2008a,2008年9月底止台灣上網人口,檢索:民國98年4月11日,取自:http://www.find.org.tw/find/home.aspx?page=many&id=210
[7]資策會,2008b,台灣網友最常進行的網路娛樂活動,檢索:民國98年4月11日,取自:http://mic.iii.org.tw/intelligence/pressroom/pop_pressfull.asp?sno=459
[8]資策會,2008c,2008年線上玩家娛樂行為調查,檢索:民國98年4月11日,取自: http://mic.iii.org.tw/intelligence/pressroom/pop_pressfull.asp?sno=501
[9]資策會,2009,線上遊戲兩大影響力-口碑效應、熟識玩伴,檢索:民國98年4月12日,取自:http://mic.iii.org.tw/pop/micnews4_op_new.asp?sno=516&cred=2009/2/13
[10]蘋果日報,2009,宅女劈10男 誕嬰「父不詳」,檢索:民國98年4月24日,取自:http://1-apple.com.tw/index.cfm?Fuseaction=Article&IssueID=20090305&art_id=31443153
英文部分
一、書籍
[1]Altman, I. & Taylor, D. 1973, Social Penetration: The Development of Interpersonal Relationships, New York: Rinehart & Winston.
[2]Anderson, J. R. 1980, Cognition Psychology and its Implications, San Francisco: W. H. Freeman.
[3]Baddeley, A. D. 1990, Human Memory: Theory and Practice, Boston, MA: Allyn and Bacon.
[4]Bandura, A. 1977, Social Learning Theory, Prentice-Hall, Englewood Cliffs, New Jersey: Prentice Hall.
[5Bandura, A. 1986, Social Fundations of Thought and Action, Prentice Hall, Englewood Cliffs, New Jersey.
[6]Bandura, A. 1991, The Social Cognition Theory of Moral Thought and Action, New York.
[7]Bartlett, F. C. 1932, Remembering: A study in Experimental and Social Psychology, New York & London: Cambridge University Press.
[8]Bratter, T. E. & Forrest, G. G. 1985, Alcoholism and Substance Abuse: Strategies for Clinical Intervention, New York: Free Press.
[9]Briggs, C. L. 1986, Learning How to Ask: A Socio-linguistic Appraisal of the Role of the Interview in Social Science Research, New York: Cambridge University Press.
[10]Brocker, J. 1983, Low Self-Esteem and Behavioral Plasticity: Some Implications, in L.Wheeler & P. R. Shaver (Eds), Review of Personality and Social Psychology, 4. Beverly Hill, CA: Sage.
[11]Campbell, J. P. 1990, Modeling the performance prediction problem in industrialand organizational psychology. In M.D. Dunnette & L.M. Hough (Eds.), Handbook of Industrial and Organizational Psychology, PaloAlto, CA: Consulting Psychologists Press.
[12]Cardy, R. L., & Dobbins, G. H. 1994, Performance Appraisal: Alternative Perspective, Cincinnati: Sourth-Western Publishing.
[13]Coopersmith, J. 1967, The Antecedent of Self-Esteem, San Francisco: Freeman.
[14]Csikszentmihalyi, M. 1975, Beyond Boredom and Anxiety, San Francisco, CA: Jossey-Bass.
[15]Csikszentmihalyi, M. 1990, Flow: The Psychology of Optimal Experience, New York: Harper and Row.
[16]Csikszentmihalyi, M., & Rathunde, K. 1993. The measurement of flow in everyday life: Toward a theory of emergent motivation. In J. E. Jacobs (Ed.), Developmental Perspectives on Motivation. Lincoln: University of Nebraska Press.
[17]Cumming, J. G., & Worly, C. G. 1997, Organizational Development and Change, Cincinnati: South-Western.
[18]Denzin, N. K. 1989, A Theoretical Introduction to Sociological Methods, 3rd ed., Englewood Cliffs: Prentice Hall.
[19]Derlega, V. J., Metts, S., Petronio, S., & Margulis, S. T. 1993, Self-disclosure, London: Sage.
[20]Devito, J. A. 2003, Human Communication: The Basic Course (9th ed.), Boston, Allyn & Bacon.
[21]Drucker, P. F. 1974, Management: Tasks, Responsibilities, Practices, London: Heinemann.
[22]Eco, U. 1986, Semiotics and the Philosophy of Language, Bloomington: Indiana University Press.
[23]Fiske, S. T. & Taylor, S. 1991, Social Cognition (2nd Edition), New York: McGraw-Hill.
[24]Fontela, E. & Gabus, A. 1974, DEMATEL, Innovative Methods, Report no. 2, Structural analysis of the world problematique, Battelle Geneva Research Institute.
[25]Fontela, E. & Gabus, A. 1976, The DEMATEL Observer, Battelle Institute, Geneva Research Center.
[26]Forester, T. & Morrison, P. 1994, Computer Ethics: Cautionary Tales and Ethical Dilemmas in Computing, MIT Press.
[27]Frankena, W.K. 1963, Ethics, Englewood Cliffs, New Jersey: Prentice Hall.
[28]Gabus, A. & Fontela, E. 1973, Perceptions of the World Problematique: Communication Procedure, Communicating with those Bearing Collective Responsibility, DEMATEL report no. 1, Geneva, Switzerland: Battelle Geneva Research Centre.
[29]Glaser, B. G. 1978, Theoretical Sensitivity: Advances in the Methodology of Grounded Theory, Mill Valley, Ca: Sociology Press.
[30]Glaser, B. G. 1992, Basics of Grounded Theory Analysis, Mill Valley, CA: Sociology Press.
[31]Glaser, B. G. & Strauss, A. 1967, The discovery of grounded theory and applying grounded theory. In N. K. Denzin & Y. S. Lincoln Eds., The American Tradition in Qualitative Research 2nd, Sage publications.
[32]Graber, D. A. 1988, Processing the News, N Y: Longman.
[33]Greenfield, D. N. 1999, Virtual Addiction, New York: New Harbinger Publication.
[34]Griffiths, M. D. 1998, Internet addiction: Does it really exist?, In J. Gackenbached., Psychology and the Internet: Intrapersonal, Interpersonal, and Transpersonal Implications, New York: Academic Press.
[35]Hatterer, L. J. 1994, Addictive Process, Encyclopedia of Psychology, New York: John Wiley & Sons.
[36]Hattie, J. 1992, Self-concept, Hillsdale, New Jersey: Erlbaum.
[37]Hawkins, D., Best, R. J. & Coney, K. 2001, Consumer Behavior: Building Marketing Strategy, McGraw-Hill, Boston, MA.
[38]Hoffner, C. 2008, Parasocial and online social relationships. In S. L. Calvert & B. J. Wilson Eds., Handbook of Children, Media, and Development, Boston, MA: WileyBlackwell.
[39]Howe, N., Assee, J. A. & Bukowski, W. M. 1994, Self-disclosure and the Sibling Relationship: What did Romulus Tell Remus?, Cambridge, New York: Cambridge.
[40]Huff, A. S. 1990, Mapping Strategic Thought, Chiehester, New York:John Wiley&Sons.
[41]Inness, J. C. 1992, Privacy, Intimacy and Isolation, Oxford, Oxford University Press.
[42]Kant, I. 1963, Critique of Pure reason (N.Kemp Smith, Trans.), London: Macmillan.
[43]Kintsch, W. 1977, “On comprehending stories”, In P. Carpenter & M. Just(Eds.), Cognitive Process in Comprehension, Hillsdale, New Jersey: Erlbaum.
[44]Kuzel A. J. 1992, Sampling in qualitative inquiry, In: B.F. Crabtree &W.L. Miller, Editors, Doing Qualitative Research, Sage, Newbury Park, CA.
[45]Laudon, K. C. & Laudon, J. P. 1998, Management Information Systems: New Approach to Organization and Technology, Prentice Hall.
[46]Leenes, R. 2008, Privacy in the metaverse - Regulating a complex social construct in a Virtual World. In S. Fischer-Huebner, P. Duquenoy, A. Zuccato & L. Martucci (Eds.), Proceedings of the IFIP/FIDIS Summer School on The Future of Identity in the Information Society, Karlstad: Springer.
[47]Lincoln, Y. S. & Guba, E. G. 1985, Establishing trustworthiness. In Naturalistic Inquiry, Beverly Hills, CA: Sage
[48]Marshall, C. & Rossman, G. B. 1995, Designing Qualitative Research, 2nd ed., Sage, Thousand Oaks, CA.
[49]Massimini, F. & Carli, M. 1988, The Systematic assessment of flow in daily experience, In M. Csikszentmihalyi & I. Csikszentmihalyi Eds., Optimal Experience: Psychological Studies of Flow in Consciousness, New York: Cambridge University Press.
[50]Miller, K. 2002, Communication Theories: Perspectives, Processes, and Contexts, Boston: McGraw-Hill.
[51]Miller, W. L. & Crabtree, B. F. 1992, Primary care research: A multimethod typology and qualitative road map, in Crabtree & Millereds., Doing Qualitative Research, Newbury Park CA: Sage.
[52]Minichiello, V., Aroni, R., Timewell, E., & Alexander, L. 1996, In Depth Interviewing, South Melbourne: Addison Wesley Longman Australia Pty Limited.
[53]Mulligan, J. & Patrovsky, B. 2003, Developing Online game: An Insiders Guide, Indiana: New Riders Publishing.
[54]Namenwirth, J. & Weber, R. P. 1990, Dynamics of Cultures, Winchester, MA: Allen & Unwin.
[55]Parker, D., Swope, D., & Baker, B. 1990, Ethical Conflicts in Information and Computer Science, Technology, and Business, Wellesley, MA: QED Information Sciences.
[56]Patton, M. Q. 1987, How to Use Qualitative Methods in Evaluation, Newbury Park, CA: Sage.
[57]Patton, M. Q. 1990, Qualitative Evaluation and Research Methods, Newbury Park.CA: Sage.
[58]Piaget, J. 1952, The Origins of Intelligence in Children, New York: International University Press.
[59]Platt, J. 2002, The history of the interview, In Jaber F.Gubrium & James A. Holsteineds: Handbook of Interview Reserch: Context and Method, London: Sage Publication.
[60]Putnam, R. D. 1993, Making Democracy Work: Civic Traditions in Modern Italy, N.J.: Princeton Univ. Press.
[61]Rumelhart, D. E. 1980, Schemata: The Building Blocks of Cognition, In Ed. Rand J. Spiro, Bertram C. Bruce, & William F. Brewer. Theoretical Issues in Reading Comprehension, Hillsdale, NJ: Erlbaum.
[62]Rumelhart, D. E. 1984, Schemata and the cognitive system, In Robert S. Wyer, Jr. & Srull, Thomas K. 1984, Handbook of Social Cognition, Hillsdale, New Jersey: Lawrence Erlbaum.
[63]Shaw, W. H. 1999, Business Ethics, Wadsworth, Belmont CA.
[64]Siisiäinen, M. 2000, Social capital, power and the third sector. In: Martti Siisiäinen &Petri Kinnunen & Elina Hietanen (eds.): The Third Sector in Finland. Helsinki:STKL.
[65]Solomon, R. C. 1984, Morality and the Good Life, McGraw-Hill, New York.
[66]Strauss, A. 1987, Qualitative Analysis for Social Scientists, Cambridge: Cambridge University Press.
[67]Strauss, A. & Cobin, J. 1990, Basics of Qualitative Research, Thousands Oaks, CA: Sage Publications.
[68]Strauss, A. L. 1994, Qualitative Analysis for Social Scientists, Milbourne, Australia: Cambridge University Press.
[69]Taylor, S. E. & Crocker, J. 1981, Shematic bases of social information processing, In Higgins, E. T., Herman, C. A., & Zanna, M. P (Eds.), Social Cognition: The Ontario Symposium on Personality and Social Psychology, Hillsdale, New Jersey: Erlbaum.
[70]Taylor, S. J. & Bogdan, R. 1984, Introduction to Qualitative Research Methods: the Search for Meaning, John Wiley & Sons, brookes pubilishing company.
[71]Tesch R. 1990, Qualitative Research: Analysis Types and Software Tools, New York, Philadelphia, London: The Falmer Press.
[72]Turkle, S. 1984, The Second Self: Computers and the Human Spirit, New York: Simon & Schuster.
[73]Walther, J. B. & Parks, M. R. 2002. Cues filtered out, cues filtered in: Computer-mediated communication and relationships, In M. L. Knapp, & J. A. Daly Eds., Handbook of Interpersonal Communication 3rd. Ed., Thousand Oaks, CA : Sage.
[74]Westin, A.F. 1967, Privacy and Freedom, Anatheum Press, New York.
[75]Williams, B. K., Sawyer, S. C. & Hutchinson, S. E. 1999, Using Information Technology: A Practical Introduction to Computer and Communication 3rd ed., New York: McGraw-Hill.
[76]Young, K. S. 1998a, Caught in the Net: How to Recognize the Signs of Internet Addiction and a Winning Strategy for Recovery, New York: John Wiley & Sons, Inc.
二、期刊
[1]Abrahamson, E. & Hambrick, D. C. 1997, “Attentional homogeneity in industries: The effect of discretion”, Journal of Organizational Behavior, vol. 18(s1), pp. 513-532.
[2]Akdeniz, Y. 2002, “Anonymity, democracy, and cyberspace”, Social Research, vol. 69(1), pp. 223-237.
[3]Altman, I. & Taylor, D. 1975, “Self-disclosure as a function of reward-cost outcomes”, Sociometry, vol. 38(1), pp. 18-31.
[4]Anderson, R.E., Johnson, D.G., Gotterbarn, D. & Perrole J. 1993, “Using the new ACM code of ethics in decision making”, Communication of ACM, vol. 36(2), pp. 98-107.
[5]Baack, D., Fogliasso, C. & Harris. J. 2000, “The personal impact of ethical decision: A social penetration theory”, Journal of Business Ethics, vol. 24 (1), pp. 39-49.
[6]Bandura, A. 1982, “Self-efficacy mechanism in human agency”, American Psychologist, vol. 37(2), pp. 122-147.
[7]Bandura, A. & Jordan, F. J. 1991, “Self-regulatory mechanism governing the impact of social comparison on complex decision making, Journal of Personality and Social Psychology, vol. 60(1), pp. 941-951.
[8]Bartle, R. 1996, “Hearts, clubs, diamonds, spades: players who suit MUDs”, Journal of MUD Research, vol. 1(1), pp. 1-26.
[9]Bem, S. L. 1983, “Gender schema theory and its implications for child development: Raising gender-aschematic children in a gender-schematic society”, Journal of Women in Culture and Society, vol. 8(4), pp. 598-616.
[10]Benkler, Y. 2000, Internet regulation: A case study in the problem of unilateralism, European Journal of International Law, vol. 11(1), pp. 171-185.
[11]Bostrom, R. P., Olfman, L., & Sein, M. K. 1990, “The important of learning style in end-user training”, MIS Quarterly, vol. 12(6), pp. 101-119.
[12]Brancheau, J. C., Janz, B. D. & Wetherbe, J. C. 1996, “Key issues in information systems management: 1994-95 SIM delphi results”, MIS Quarterly, vol. 20(2), pp. 225-242.
[13]Brenner, V. 1997, “Psychology of computer use: XLVII. Parameters of Internet use, abuse and addiction: The first 90 days of Internet usage survey”, Psychological Reports, vol. 80(3), pp. 879-882.
[14]Bynum, T. W. 2001, “Computer ethics: Its birth and its future”, Ethics and Information Technology, vol. 3(2), pp. 109-112.
[15]Cao, F. & Su, L. 2007, “Internet addiction among Chinese adolescents: prevalence and psychological features”, Child: Care, Health & Development, vol. 33(3), pp. 275-281.
[16]Carbo, T. & Almagno, S. 2001, “Information ethics: The duty, privilege and challenge of educating information professionals”, Library Trends, vol. 49(3), pp. 510-518.
[17]Carbonell, X., Guardiola, E., Beranuy, M. & Bellés, A., 2009, “A bibliometric analysis of the scientific literature on Internet, video games, and cell phone addiction”, Journal of the Medical Library Association, vol. 97(2), pp. 102-107.
[18]Chaney, L. H. & Simon, J. C. 1994, “Strategies for teaching computer ethics”, Journal of Computer Information Systems, vol. 31(1), pp. 19-22.
[19]Charlton, J. P., & Danforth, I. D. W. 2007, “Distinguishing addiction and high engagement in the context of online game playing”, Computers in Human Behavior, vol. 23(3), pp. 1531-1548.
[20]Chen, H., Wigand, T. R. & Nilan, S. M. 1999, “Optimal experience of web activities”, Computers in Human Behavior, vol. 15(5), pp. 585-608.
[21]Chen, Y-C, Chen, P-S, Hwang, J-J, Korba, L., Song, R. & Yee, G. 2005, “An analysis of online gaming crime characteristics”, Internet Research: Electronic Networking Applications and Policy, vol. 15(3), pp.246-261.
[22]Choi, D. S., & Kim, J. W. 2004, “Why people continue to play online games: In search of critical design factors to increase customer loyalty to online contents”, CyberPsychology & Behavior, vol. 7(1), pp. 11-24.
[23]Christopherson, K. M. 2007, “The positive and negative implications of anonymity in Internet social interactions: ‘‘On the Internet, nobody knows you’re a dog’’”, Computers in Human Behavior, vol. 23(6), pp. 3038-3056.
[24]Chuang, Y-C. 2006, “Massively multiplayer online role-playing game-induced seizures: Aneglected health problem in Internet addiction”, CyberPsychology & Behavior, vol. 9(4), pp. 451-456.
[25]Coffey, B. & Woolworth, S. 2004, “Destroy the scum, and then neuter their families: the web forum as a vehicle for community discourse?”, The Social Science Journal, vol. 41(1), pp. 1-14.
[26]Collins, A. 1994, “An experience in authentic assessment”, Journal of Science Teacher Education, vol. 5(3), pp. 110-112.
[27]Compeau, D. R. & Higgins, C. A. 1995, “Application of social cognitive theory to training for computer skill”, Information System Research, vol. 6(2), pp.118–143.
[28]Conger, S. & Loch, K. D. 1995, “Ethics and computer use”, Communications of the ACM, vol. 38(12), pp. 31-32.
[29]Connors, G. J., O’Farrell, T. J., Cutter, H. S., & Thompson, D. L. 1986, “Alcohol expectancies among male alcoholics, problem drinkers, and nonproblem drinkers”, Alcoholism: Clinical and Experimental Research, vol. 10(6), pp. 667-671.
[30]Csikszentmihalyi, M. & LeFevre, J. 1989, Optimal experience in work and Leisure,Journal of Personality and Social Psychology, vol. 56 (5), pp. 815-822.
[31]Csikszentmihalyi, M. & Massimini, F. 1985, “On the psychological selection of bio-cultural information”, New Ideas Psychology, vol. 3(2), pp. 115-138.
[32]Culnan, M. J. 2000, “''Protecting privacy online: Is self-regulation working”, Journal of Public Policy & Marketing, vol. 19(1), pp. 20-26.
[33]Curtis, P. 1992, “Mudding: Social phenomena in text-based virtual realities”, Intertek, vol. 3(3), pp. 26-34.
[34]Dennis, A. R., George, J. F., Jessup, L. M., Nunamaker Jr, J. F. & Vogel, D. R. 1988, “Information technology to support electronic meetings”, MIS Quarterly, vol. 12(4), pp.591-624.
[35]Ducheneaut, N., Yee, N., Nickell, E., Moore, R. 2006a, “Building an MMO with mass appeal: A look at gameplay in world of warcraft”, Games and Culture, vol. 1(4), pp. 281-317.
[36]Emmans, C. 2000, “Internet ethics won’t go away”, The Education Digest, vol. 66(1), pp. 24-26.
[37]Fattah, H. & Paul, P. 2002, “Gaming gets serious”, American Demographics, vol. 24(5), pp. 38-43.
[38]Festinger, L., Pepitone, A., & Newcomb, T. 1952, “Some consequences of deindividuation in a group”, Journal of Abnormal and Social Psychology, vol. 47(1), pp. 382-389.
[39]Gardner, D. G., & Pierce, J. L. 1998, “Self-esteem and self-efficacy within theorganizational context: An empirical examination”, Group and Organization Management, vol. 23(1), pp. 48-70.
[40]Gephart, R. P. 1993, “The textual approach: Risk and blame is disaster sensemaking”, Academy of Management Journal, vol. 36(6), pp. 1465-1514.
[41]Goldsmith, J. 2000, Unilateral regulation of the Internet: A modest defense, European Journal of International Law, vol. 11(1), pp. 135-148.
[42]Gollwitzer, P. M., Heckhausen, H., & Ratajczak, H. 1990, “From weighing to willing: Approaching a change decision through pre- or postdecisional mentation”,Organizational Behavior and Human Decision Processes, vol. 45(1), pp. 41-65.
[43]Griffiths, M. D, Davies, M. N. & Chappell, D. 2003, “Breaking the Stereotype: The case of online gaming”, CyberPsychology & Behavior, vol. 6(1), pp. 81-91.
[44]Griffiths, M. D, Davies, M. N. & Chappell, D. 2004a, “Online computer gaming: A comparison of adolescent and adult gamers”, Journal of Adolescence, vol. 27(1), pp. 87-96.
[45]Griffiths, M. D, Davies, M. N. & Chappell, D. 2004b, “Demographic factors and playing variables in online computer gaming”, CyberPsychology & Behavior, vol. 7(4), pp. 479-487.
[46]Grijpink, J. & Prins, C. 2001, “Digital anonymity on the Internet”, Computer Law and Security Report, vol. 17(6), pp. 379-389.
[47]Hannabuss, S. 1998, “Information ethics: A contemporary challenge for professionals and the community”, Library Review, vol. 47(1-2), pp. 91-98.
[48]Hauptman, R., Motin, S. 1994, “The Internet, cyberethics, and virtual morality”, Online, vol. 18 No.2, pp. 8-9.
[49]Hayne, S.C. & Rice, R.E. 1997, “Attribution accuracy when using anonymity in group support systems”, International Journal of Human-Computer Studies, vol. 47(3), pp. 429-452.
[50]Heino, R. K., Lintonen, T. & Rimela, A. 2004, “Internet addiction? Potentially problematic use of the internet in a population of 12-18 year-old adolescents”, Addiction Research and Theory ,vol. 12, pp. 89-96.
[51]Hill, C. E. 1992, “An overview of four measures developed to test the Hill Process Model: Therapist intentions, therapist response modes, client reactions, and client behaviors”, Journal of Counseling and Development, vol. 70(6), pp. 728-739.[52]Hoffman, D. & Novak, P. T. 1996, Marketing in hypermedia computer-mediated environments conceptual foundations, Journal of Marketing, vol. 60(3), pp. 50-68.
[53]Hsu, C. Y., Chen, K. T. & Tzeng, G. H. 2008, “FMCDM with fuzzy DEMATEL approach for customers’ choice behavior model”, International Journal of Fuzzy Systems, Vol. 9(4), pp. 236-246.
[54]Hsu, C-L. & Lu, H-P. 2004, “Why do people play on-line games? An extended TAM with social influences and flow experience”, Information & Management, vol. 41(7), pp. 853-868.
[55]Hsu, C-L. & Lu, H-P. 2007, “Consumer behavior in online game communities: A motivational factor perspective”, Computers in Human Behavior, vol. 23(3), pp. 1642-1659.
[56]Hsu, C-Y., Chen, K-T. & Tzeng, G-H. 2007, “FMCDM with fuzzy DEMATEL approach for customers’ choice behavior model”, International Journal of Fuzzy Systems, vol. 9(4), pp. 236-246.
[57]Hsu, M-H & Kuo, F-Y. 2003a, “An investigation of volitional control in information ethics”, Behavior And Information Technology, vol. 22(1), pp. 53-62.
[58]Hsu, M-H. & Kuo, F-Y. 2003b, “The effect of organization-based self-esteem and deindividuation in protecting personal information privacy”, Journal of Business Ethics, vol. 42(4), pp. 305-320.
[59]Hsu, M-H., Chiu, C-M. & Ju, T-L. 2004, “Determinants of continued use of the WWW: An integration of two theoretical models”, Industrial Management and Data Systems, vol. 104(9), pp. 766-775.
[60]Hsu, S. H., Wen, M. H. & Wu, M. C. 2009, “Exploring user experiences as predictors of MMORPG addiction”, Computers & Education, vol. 53(3), pp. 990-999.
[61]Huff, C., & Martin, C. D. 1995, “Computing consequences: A framework for teaching ethical computing”, Communications of the ACM, vol. 38(12), pp. 75-84.
[62]Jitendra, A. & DiPipi, C. M. 2002, “An exploratory study of schema-based word-problem-solving instruction for middle school students with learning disabilities”, The Journal of Special Education, vol. 36(1), pp. 23-38.
[63]Joinson, A. 1999, “Social desirability, anonymity, and Internet-based questionnaires”, Behavior Research Methods, Instruments & Computers, vol. 31(3), pp. 433-438.
[64]Joinson, A. N. 2001, “Self-disclosure in computer-mediated communication: The role of self-awareness and visual anonymity”, European Journal of Social Psychology, vol. 31(2), pp. 177-192.
[65]Jourard, S. M. 1959, “Healthy personality and self-disclosure”, Mental Hygiene, vol. 43 (4), pp. 499-507.
[66]Knight, D., Durham, C. C. & Locke E. A. 2001, “The relationship of teamgoals, incentives, and efficacy to strategic risk, tactical implementation, and performance”, Academy of Management Journal, vol. 44(2), pp. 326-338.
[67]Ko, C-H., Liu, G-C., Hsiao, S., Yen, J-Y., Yang, M-J., Lin, W-C., Yen, C-F. & Chen, C-S., 2009a, “Brain activities associated with gaming urge of online gaming addiction”, Journal of Psychiatric Research, vol. 43(7), pp. 739-747.
[68]Ko, C-H., Yen, J-Y., Chen, C-C., Chen, S-H. & Yen, C-F. 2005, “Gender differences and related factors affecting online gaming addiction among taiwanese adolescents”, The Journal of Nervous and Mental Disease, vol. 193(4), pp. 273-277.
[69]Ko, C-H., Yen, J-Y., Chen, C-C., Chen, S-H., & Yen, C-F., 2005b, “Gender differences and related factors affecting online gaming addiction among taiwanese adolescents”, Journal of Nervous and Mental Disease, vol. 193(4), pp. 273-277.
[70]Ko, C-H., Yen, J-Y., Chen, S-H., Yang, M-J., Lin, H-C. & Yen, C-F., 2009b, “Proposed diagnostic criteria and the screening and diagnosing tool of Internet addiction in college students”, Comprehensive psychiatry, vol. 50(4), pp. 378-84.
[71]Ko, C-H., Yen, J-Y., Yen, C-F., Chen, C-C., Yen, C-N. & Chen, S-H, 2005c, “Screening for Internet addiction: An empirical study on cut-off points for the Chen Internet addiction scale”, The Kaohsiung Journal of Medical Sciences,vol. 21(11),pp. 545-551.
[72]Ko, C-H., Yen, J-Y., Yen, C-F., Chen, C-S., & Wang, S-Y. 2008, “The association between Internet addiction and belief of frustration intolerance: The gender difference”, CyberPsychology & Behavior, vol. 11(3), pp. 273-278.
[73]Ko, C-H., Yen, J-Y., Yen, C-F., Lin, H-C., & Yang, M-J., 2007, “Factors predictive for incidence and remission of internet addiction in young adolescents: A prospective study”, Cyber Psychology & Behavior, vol. 10(4), pp. 545-551.
[74]Ladany, N. & Walker, J. A. 2003, “Supervisor self-disclosure: Balancing the uncontrollable narcissist with the indomitable altruist”, Journal of Clinical Psychology, vol. 59(5), pp. 611-621.
[75]Landis, T. Y. 1982, “Interactions between text and prior knowledge in children’s memory for prose”, Child Development, vol. 53(3), pp. 811-814.
[76]Laudon, M., & Smither, J. W. 1995, “Can multi-Source feedback change perceptions of goal accomplishment, self-evaluations, and performance-related outcomes? Theory-based applications and directions for research”, Personal Psychology, vol. 48(4), pp. 803-839.
[77]Lee, M., Ko, Y., Song, H., Kwon, K., Lee, H., Nam, M., & Jung, I. 2007, “Characteristics of Internet use in relation to game genre in Korean adolescents”, CyberPsychology & Behavior, vol. 10(2), pp. 278-285.
[78]Leith, K. P. & Baumeister, R. F. 1996, “Why do bad moods increase self-defeating behavior? Emotion, risking-taking, and self-regulation”, Journal of Personality and Social Psychology, 71, pp. 1250-1267.
[79]Li, S-M. & Chung, T-M., 2006, “Internet function and Internet addictive behavior”, Computers in Human Behavior, vol. 22(6), pp. 1067-1071.
[80]Lin, M-P., Ko, H-C. & Wu, Y-W., 2008, “The role of positive/negative outcome expectancy and refusal self-efficacy of Internet use on Internet addiction among college students in Taiwan”, CyberPsychology & Behavior, vol 11 (4), pp. 451-457.
[81]Liou, James J-H., Yen. Leon & Tzeng, G-H. 2008, “Building an effective safety management system for airlines”, Journal of Air Transport Management, vol. 14(1), pp. 20-26.
[82]Loch, K. D. & Conger, S. 1996, “Evaluating ethical decision making and computer use”, Communications of The ACM, vol 39(7), pp. 74-83.
[83]Locke, E.A. 1991, “The motivation sequence, the motivation hub, and the motivation core”, Organizational Behavior and Human Decision Process, vol. 50(22), pp.288-299.
[84]Lu, H-P. & Wang, S-M. 2008, “The role of Internet addiction in online game loyalty: An exploratory study”, Internet Research: Electronic Networking Applications and Policy, vol. 18(5), pp. 499-519.
[85]Manninen, T. & Kujanpää, T. 2007, “The value of virtual assets - The role of game characters in MMOGs”, International Journal of Business Science and Applied Management, vol. 2(1), pp. 21-33.
[86]Mason, R. O. 1986, “Four ethical issues of the information age”, Management Information Systems Quarterly, vol. 10(1), pp. 5-12.
[87]McCroskey, J. C. 1977, “Oral communication apprehension: A summary of recent theory and research”, Human Communication Research, vol. 4(1), pp. 78-96.
[88]Moor, J.H. 1997, “Towards a theory of privacy in the information age”, Computers and Society, vol. 27(3), pp. 27-32.
[89]Morahan-Martin, J. & Schumacher, P. 2003, “Loneliness and social users of the Internet”, Computers in Human Behavior, vol. 19(6), pp. 659-671.
[90]Ng, B. D. & Wiemer-Hastings, P. 2005, “Addiction to the Internet and online gaming”, CyberPsychology & Behavior, vol. 8(2), pp. 110-113.
[91]Nkomo, S. M. 1987, “Human resource planning and organization performance: An exploratory analysis”, Strategic Management Journal, vol. 8(1), pp. 387-392.
[92]Novak, T. P., Hoffman, D. L. & Yung, Y. F. 2000, “Measuring the customer experience in online environments: A structural modeling approach”, Marketing Science, vol. 19(1), pp. 22-43.
[93]Peng, S. Y., Rau, P. L. P. & Yang, C. C. 2004, “Developing Internet addiction relation model (I - ARM) and cases study”, Journal of National Taiwan Normal University, vol. 49(2), pp.67-84.
[94]Prussia, G. E. & Kinicki, A. J. 1996, “A motivational investigation of group effectiveness using social-cognitive theory”, Journal of Applied Psychology, vol. 81( 2), pp.187-198.
[95]Ridings, C., Gefen, D. & Arinze, B. 2002, Some antecedents and effects of trust in virtual communities, Journal of Strategic Information Systems, vol. 11(3-4), pp. 271-295.
[96]Rudall, B. H. 1996, Internet addiction syndrome, Robotica, vol. 14(1), pp. 510-511.
[97]Sapir, E. 1944, “Grading: A study in semantic”, Philosophy of Science, vol.11, pp. 93-116.
[98]Schmitt, B. H., Leclerc, F. & Dubé-Rioux, L. 1988, “Sex typing and consumer behavior: A test of gender schema theory”, Journal of Consumer Research, vol. 15 (1), pp. 122-128.[99]Seo, M., Kang, H. S. & Yom, Y. H. 2009, “Internet addiction and interpersonal problems in korean adolescents”, Computers Informatics Nursing, vol. 27(4), pp. 226-233.
[100]Seyed-Hosseini, S.M., Safaei, N. & Asgharpour, M.J. 2006, “Reprioritization of failures in a system failure mode and effects analysis by decision making trial and evaluation laboratory technique”, Reliability Engineering and System Safety, vol. 91(8), pp. 872-881.
[101]Sherer, K. 1997, “College life on-line: Healthy and unhealthy internet use”, Journal of College Student Development, vol. 38(6), pp. 655-665.
[102]Shotten, M. A. 1991, “The costs and benefits of computer addiction”, Behavior and Information Technology, vol. 10(3), pp. 219-230.
[103]Smith, H. J. & Milberg, S. J. 1996, “Information privacy: Measuring individuals’ concerns about organizational practices”, MIS Quarterly, vol. 20(2), pp. 167-196.
[104]Snyder, M., & Gangestad, S. 1986, “On the nature of self-monitoring: Matters of assessment, matters of validity”, Journal of Personality and Social Psychology, vol. 51(1), pp. 125-139.
[105]Steinkuehler, C. & Williams, D. 2006, “Where everybody knows your (screen) name: online games as ‘third places’”, Journal of Computer-mediated Communication, vol. 11(4), pp. 885-909.
[106]Stern, P. N. 1980, “Grounded theory methodology: Its uses and processes”, Image, vol. 12(1), pp. 20-23.
[107]Suh, K., Kim, S. & Lee, J. 1994, “End-user computing abilities and the use of information systems”, ACM SIGCPR Computer Personnel, vol. 15(1), pp. 3-14.
[108]Tamura, H. & Akazawa, K. 2005, “Stochastic DEMATEL for structural modeling of a complex problematique for realizing safe, secure and reliable society”, Journal of Telecommunication and Information Technology, vol. 4, pp. 139-146.
[109]Tamura, H., Okanishi, H. & Akazawa, K. 2006, “Decision support for extracting and dissolving consumers’ uneasiness over foods using stochastic DEMATEL”, Journal of Telecommunications and Information Technology, vol. 48(4), pp. 91-95.
[110]Tavani, H.T. 1999, “Informational privacy, data mining, and the Internet”, Ethics and Information Technology, vol. 1(2), pp. 137-145.
[111]Tsai, H-F., Cheng, S-H., Yeh, T-L., Shih, C-C., Chen, K-C., Yang, Y-C. & Yang Y. K., 2009, “The risk factors of Internet addiction - A survey of university freshmen”, Psychiatry Research, vol. 167(3), pp. 294-299.
[112]Tseng, M. L. 2009, “Using the extension of DEMATEL to integrate hotel service quality perceptions into a cause-effect model in uncertainty”, Expert Systems with Applications,Vol. 36(5), pp. 9015-9023.
[113]Tzeng, G-H., Chiang, C-H. & Li, C-W. 2007, “Evaluating intertwined effects in e-learning programs: A novel hybrid MCDM model based on factor analysis and DEMATEL”, Expert Systems with Applications, vol. 32(4), pp. 1028-1044.
[114]Vanlear, C. A. 1991, Testing a cyclical model of communicative openness in relationship development: Two longitudinal studies, Communication Monographs, vol. 58(4), pp. 337-361.
[115]Wallace, K. A. 1999, “Anonymity”, Ethics and Information Technology, vol. 1(1), pp. 23-35.
[116]Walther, J. B. 1992, “Interpersonal effects in computer-mediated interaction: A relational perspective”, Communication Research, vol. 19(1), pp.52-90.
[117]Walther, J. B. 1996, “Computer-mediated communication: Impersonal, interpersonal and hyperpersonal interaction”, Communication Research, vol. 23(1), pp. 3-43.
[118]Wan, C-S & Chiou, W-B. 2006a, “Why are adolescents addicted to online gaming? An interview study in Taiwan”, CyberPsychology & Behavior, vol. 9(6), pp. 762-766.
[119]Wan, C-S & Chiou, W-B. 2006b, “Psychological motives and online games addiction: A test of flow theory and humanistic needs theory for taiwanese”, CyberPsychology & Behaviour, vol. 9(3), pp. 317-324.[120]Wang, H., Lee, K. O., & Chen, E. 1998, “Consumer privacy concerns about marketing”, Communications of the ACM, vol. 41(3), pp.63-70.
[121]Warren, S., & Brandeis, L. D. 1890, “The right of privacy”, Harvard Law Review, vol. 4(5), pp. 193-220.
[122]Webster, K. L. Trevino, & Ryan, L. 1993, “The dimensionality and correlates of flow in human computer interactions”, Computer in Human Behavior, vol. 9(4), pp. 411-426.
[123]Williams, D., Caplan, S. & Xiong, L. 2007, “Can you hear me now? The impact of voice in an online gaming community”, Human Communication Research, vol.33(4), pp. 427-449.
[124]Woodrum, E. 1984, “Mainstreaming content analysis in the social science: Methodological advantages, obstacles, and solutions”, Social Science Research, vol. 13(1), pp. 1-19.
[125]Wu, C-S. & Cheng, F-F., 2007, “Internet café addiction of taiwanese adolescents”, CyberPsychology & Behavior, vol. 10(2), pp. 220-225.
[126]Wu, W-W. & Lee, Y-T. 2007, “Developing global managers’ competencies using the fuzzy DEMATEL method”, Expert Systems with Applications, vol. 32(2), pp. 499-507.
[127]Wysocki, D. K. 1998, “Let your fingers do the talking: Sex on an adult chat-line”, Sexualities, vol. 1(4), pp. 425-452.
[128]Yan, J. J. & Choi, H. J. 2002, “Security issues in online games”, The Electronic Library, vol. 20(2), pp. 125-133.
[129]Yee, N. 2006a, “Motivations of play in online games”, Journal of Cyber Psychology and Behavior, vol. 9(6), pp. 772-775.
[130]Yee, N. 2006b, “The demographics, motivations, and derived experiences of users of massively multi-user online graphical environments”, Presence, vol. 15(3), pp. 309-329.
[131]Yen, J-Y., Ko, C-H., Yen, C-F., Chen, S-H., Chung, W-L. & Chen, C-C. 2008, “Psychiatric symptoms in adolescents with Internet addiction: Comparison with substance use”, Psychiatry and clinical neurosciences, vol. 62(1), pp. 9-16.
[132]Yen, J-Y., Yen, C-F., Chen, C-C., Chen, S-H. & Ko, C-H., 2007, “Family factors of Internet addiction and substance use experience in taiwanese adolescents”, CyberPsychology & Behavior, vol. 10(3), pp. 323-329.
[133]Yen, J-Y., Yen, C-F., Chen, C-S., Tang, T-C. & Ko, C-H. 2009, “The association between adult ADHD symptoms and internet addiction among college students: The gender difference”, CyberPsychology & Behavior, vol. 12(2), pp. 187-91.
[134]Young, K. S. 1998b, “Internet addiction: The emergence of a new clinical disorder”, CyberPsychology & Behavior, vol. 1(3), pp. 237-244.
[135]Zirkel, S., & Cantor, N. 1990, “Personal construal of life tasks: Those who struggle for independence”, Journal of Personality and Social Psychology, vol. 58(1), pp. 172-185.
三、研討會
[1]Chen, V. H. H. & Duh, H. B. L. 2007, “Understanding social interaction in world of warcraft”, To appear in Proceedings of ACM International Conference on Advances in Computer Entertainment Technology ACM ACE 2007, pp. 21-24.
[2]Davis, J. P., Farnham, S. & Jensen, C. 2002, “Decreasing online ‘bad’ behavior”, CHI ’02 extended abstracts on Human factors in computing systems, pp. 718-719.
[3]Ducheneaut, N. & Moore, R. J. 2004, “The social side of gaming: A study of interaction patterns in a massively multiplayer online game”, Proceedings of the ACM Conference on Computer-Supported Cooperative Work CSCW 2004, pp. 360-369.
[4]Ducheneaut, N., Yee, N., Nickell, E. & Moore, R. J. 2006b, “‘Alone together?’ exploring the social dynamics of massively multiplayer online games”, ACM Conference on Human Factors in Computing Systems CHI 2006, pp. 407-416.
[5]Elaine, M. R. 1997, “Computer game design:New directions for intercultural simulation game designers”, Developments in Business Simulation and Experiential Exercises, pp. 144-145.
[6]Ginsburg, M. & Weisband, S. 2002, “Social capital and volunteerism in virtual communities: the case of the Internet chess club”, Proceedings of the 35th Hawaii International Conference on System Sciences, pp. 2225-2234.
[7]Jyri, N. & Olli, M. 2006, “Defining cyberethics”, ICEB + eBRF 2006 Conference, pp. 1-6.
[8]Kwong, T. C. H. & Lee, M. K. O. 2002, “Behavioral intention model for the exchange mode Internet music piracy”, 35th Annual Hawaii International Conference on System Sciences (HICSS’02), pp. 191-201.
[9]Qin, H., Rau, P. P. & Zhong, H. Q. 2007, “Construction of online game addiction based on player experience”, Industrial Engineering and Engineering Management IEEE 2007, pp. 432-436.
[10]Steinkuehler, C. 2004, “Learning in massively multiplayer online games”, Proceedings of the 6th international conference on Learning sciences, pp. 521-528.
[11]Weisband, S. & Kiesler, S. 1996, “Self disclosure on computer forms: Meta-analysis and implications”, Proceedings of the CHI ’96 Conference on Human-Computer Interaction, pp. 14-22.
[12]Yamada, R., Tuyen, N. Q. & Dung, L. C. 2000, “Analysis of the problems relationship in farming systems by demated-method”, DEVELOPMENT AND EVALUATION OF SUSTAINABLE FARMING SYSTEMS, The 2000 Annual Workshop of JIRCAS, pp.1-6.
四、網際網路資料
[1]Bartle, R. 1990, Interactive multi-user computer games, Technical report, British Telecom, Retrieved on March 18, 2009, From: http://www.mud.co.uk/richard/imucg.htm
[2]Clarke, R. 1997, Introduction to dataveillance and information privacy, and definitions of terms, Retrieved on March 20, 2009, From: http://www.anu.edu.au/people/Roger.Clarke/DV/Intro.html
[3]DFC Intelligence, 2008, Online game market Forecasts 2008, Retrieved on April 7, 2009, From:http://www.researchandmarkets.com/reports/612954/online_game_market_forecasts_2008
[4]Goldberg, I. 1996, Internet addiction disorder, Retrieved on May 20, 2009, From: http://www.webs.ulpgc.es/aeps/JR/Documentos/ciberadictos.doc
[5]GVU, 1998, GVU’s WWW user surveys, Retrieved on April 10, 2009, From: http://www.cc.gatech.edu/gvu/user_surveys/
[6]Law Reform Commission of Australia 1983, Privacy Report No. 22, 121, Retrieved on March 27, 2009, From: http://www.aph.gov.au/house/committee/LACA/lawreform.pdf
[7]Netaddiction, 2006, Are you an obsessive online gamer?, Retrieved on May 17, 2009, From: http://www.netaddiction.com/resources/online_trading.htm
[8]Pfitzmann, A. & Hansen, M. 2008, Anonymity, unlinkability, undetectability, unobservability, pseudonymity, and identity management - A consolidated proposal for terminology, Retrieved on March 30, 2009, From: http://dud.inf.tu-dresden.de/literaturAnon_Terminology_v0.31.pdf
[9]Rinaldi, A. H. 1998, The Net: User guidelines and netiquette, Retrieved on March 26, 2009, From: http://computerethicsinstitute.org/
[10]Rywczyoska, A. & Thumann, M. 2008, Security and privacy in massively-multiplayer online games and social and corporate virtual worlds, Technical report, ENISA Position Paper, Retrieved on April 2, 2009, From: http://www.ifap.ru/library/book388.pdf
[11]Wong, W. S. W. 2008, “Online communication and real-life friendship quality: An interaction between reality and virtual world”, ph.d thesis of CITY university of HONG KONG, Retrieved on April 15, 2009, From: http://lbms03.cityu.edu.hk/oaps/ss2008-4708-wsw650.pdf
[12]Yee, N. 2002, Ariadne: Understanding MMORPG addiction, Retrieved on July 31, 2009, From: http://www.nickyee.com/hub/addiction/home.html
[13]Yee, N. 2005 , Introduction: The RL demographics of world of warcraft, Retrieved on March 24, 2009, From: http://www.nickyee.com/daedalus/archives/001364.php
[14]Yoo, H. 1996, The gratifications of the Internet: A Pilot Study, Retrieved on March 30, 2009, From: http://www.tc.msu.edu/tc960/yoofinal.html