| 期刊論文1. | 林雅惠(20040400)。資訊隱私權之重塑--以行動商務為例。科技法學評論,1(1),93-122。 延伸查詢 | 2. | Marsh, H. W.(1994)。Confirmatory Factor Analysis Models of Factorial Invariance: A Multifaceted Approach。Structural Equation Modeling: A Multidisciplinary Journal,1(1),5-34。 | 3. | Clarke, R.(1999)。Internet privacy concerns confirm the case for intervention。Communications of the ACM,42(2),60-67。 | 4. | Bock, G. W.、Zmud, R. W.、Kim, Y. G.、Lee, J. N.(2005)。Behavioral intention formation knowledge sharing: Examining roles of extrinsic motivators, social-psychological forces, and organizational climate。MIS Quarterly,29(1),87-111。 | 5. | DeConinck, J. B.、Lewis, W. F.(1997)。The influence of deontological and teleological considerations and ethical climate on sales managers' intentions to reward or punish sales force behavior。Journal of Business Ethics,16(5),497-506。 | 6. | Bommer, M.、Gratto, C.、Gravander, J.、Tuttle, M.(1987)。A behavioral model of ethicaland unethical decision making。Journal of Business Ethics,6(4),265-280。 | 7. | Shepherd, G. J.、O'Keefe, D. J.(1984)。Separability of attitudinal and normative influences on behavioral intentions in the Fishbein-Ajzen model。The Journal of Social Psychology,122(2),278-288。 | 8. | Vallerand, R. J.、Deshaies, P.、Cuerrier, J. P.、Pelletier, L. G.、Mongeau, C.(1992)。Ajzen and Fishbein's theory of reasoned action as applied to moral behavior: A confirmatory analysis。Journal of Personality and Social Psychology,62(1),98-109。 | 9. | Peace, A. G.、Galletta, D. F.、Thong, J. Y. L.(2003)。Software piracy in the workplace: a model and empirical test。Journal of Management Information Systems,20(1),153-177。 | 10. | Bandura, A.、Jourden, Forest J.(1991)。Self-regulatory mechanisms governing the impact of social comparison on complex decision making。Journal of Personality and Social Psychology,60(6),941-951。 | 11. | Cornish, D. B.、Clarke, R. V.(1987)。Understanding crime displacement: an application of rational choice theory。Criminology,25,933-947。 | 12. | Loch, K. D.、Conger, S.(1996)。Evaluating Ethical Decision Making and Computer Use。Communications of the ACM,39(7),74-83。 | 13. | Hsu, M. H.、Kuo, F. Y.(2003)。The Effect of Organization-Based Self-Esteem and Deindividuation on Protecting Personal Information Privacy。Journal of Business Ethics,42(4),305-321。 | 14. | Leonard, L. N. K.、Cronan, T. P.、Kreie, J.(2004)。What Influences IT Ethical Behavior Intentions-planned Behavior, Reasoned Action, Perceived Importance, or Individual Characteristics?。Information and Management,42(1),143-158。 | 15. | Sethi, V.、Carraher, S.(1993)。Developing Measures for Assessing the Organizational Impact of Information Technology: A Comment on Mahmood and Soon's Paper。Decision Sciences,24(4),867-877。 | 16. | Ajzen, Icek(1991)。The Theory of Planned Behavior。Organizational Behavior and Human Decision Processes,50(2),179-211。 | 17. | Shimp, Terence A.、Kavas, Alican(1984)。The theory of reasoned action applied to coupon usage。Journal of Consumer Research,11(3),795-809。 | 18. | Hansen, Torben、Jensen, Jan Moller、Solgaard, Hans Stubbe(2004)。Predicting online grocery buying intention: a comparison of the theory of reasoned action and the theory of planned behavior。International Journal of Information Management,24(6),539-550。 | 19. | Hill, Thomas、Smith, Nancy D.、Mann, Millard F.(1987)。Role of Efficacy Expectations in Predicting the Decision to Use Advanced Technologies: The Case of Computers。Journal of Applied Psychology,72(2),307-313。 | 20. | Hunt, Shelby D.、Vitell, Scott J.(1986)。A general theory of marketing ethics。Journal of Macromarketing,6(1),5-16。 | 21. | Compeau, Deborah R.、Higgins, Christopher A.(1995)。Computer self-efficacy: development of a measure and initial test。MIS Quarterly,19(2),189-211。 | 22. | Kettinger, William J.、Lee, Choong C.(1994)。Perceived Service Quality and User Satisfaction with the Information Services Function。Decision Sciences,25(5/6),737-766。 | 23. | 朱柏松(19890400)。隱私權概念之衍變及其損害防止立法之動向。法學叢刊,34(2)=134,89-102。 延伸查詢 | 24. | Warren, Samuel D.、Brandeis, Louis D.(1890)。The Right to Privacy。Harvard Law Review,4(5),193-220。 | 25. | Chang, Man Kit(1998)。Predicting Unethical Behavior: A Comparison of the Theory of Reasoned Action and the Theory of Planned Behavior。Journal of Business Ethics,17(16),1825-1834。 | 26. | 許孟祥、郭峰淵、林杏子、朱彩馨、游佳萍(2001)。個人資訊隱私:倫理效能之量表的發展與驗證。中山管理評論,9(3),373-394。 延伸查詢 | 27. | Agranoff, M. H.(1991)。Controlling the Threat to Personal Privacy: Corporate Policies Must Be Created。Journal of Information Systems Management,8,48-52。 | 28. | Bachman, R.、Paternoster, R.、Ward, S.(1982)。The Rationality of Sexual Offending: Testing A Deterrence/Rational Choice Conception of Sexual Assault。Law and Society Review,26,343-372。 | 29. | Banerjee, D.、Cronan, T. P.、Jones, T. W.(1998)。Modeling IT Ethics: A Study Of Situational Ethics。MIS Quarterly,22(1),31-60。 | 30. | Christensen, A.、Eining, M.(1991)。Factors Influencing Software Piracy: Implications for Accountants。Journal of Information Systems,5(1),67-80。 | 31. | Gattiker, Urs E.、Kelley, Helen(1999)。Morality and Computers: Attitudes and Differences in Moral Judgments。Information Systems Research,10(3),233-254。 | 32. | Gormley, K.(1992)。One Hundred Years of Privacy。Wisconsin Law Review,Sep.-Oct.,1335-1408。 | 33. | Gowthorpe, C.、Blake, J.、Dowds, J.(2002)。Testing the Bases of Ethical Decision-Making: A Study of the New Zealand Auditing Profession。Business Ethics: A European Review,11(2),143-156。 | 34. | Grasmick, H. G.、Bursik, R. J.(1990)。Conscience, Significant Others, and Rational Choice: Extending the Deterrence Model。Law and Society Review,24,835-861。 | 35. | Hsu, M. H.、Kuo, F. Y.(2003)。An Investigation of Volitional Control in Information Ethics。Behavior and Information Technology,22(1),53-63。 | 36. | Hunt, S. D.、Vasquez-Parraga, A. Z.(1993)。Organization Consequences, Marketing Ethics, and Sales Forces Supervision。Journal of Marketing Research,30,78-90。 | 37. | Kreie, J.、Cronan, T. P.(1998)。Judging What Is Ethical or Unethical: There Are Differences Between Men and Women。Communications of the ACM,41(9),70-76。 | 38. | Lwin, M. O.、Williams, J. D.(2003)。A Model Integrating the Multidimensional Developmental Theory of Privacy and Theory of Planned Behavior to Examine Fabrication of Information Online。Marketing Letters,14(4),257-272。 | 39. | Manstead, A. S. R.、Eekelen, S. A. M. van(1998)。Distinguishing Between Perceived Behavioral Control and Self-Efficacy in the Domain of Academic Achievement Intentions and Behaviors。Journal of Applied Social Psychology,28(15),1375-1392。 | 40. | Martocchio, J. J.(1994)。Effect of Conceptions of Ability on Anxiety, Self-Efficacy, and Learning in Training。Journal of Applied Psychology,79(6),819-825。 | 41. | Moores, T. T.、Dhaliwal, J.(2004)。A Reversed Context Analysis of Software Piracy Issues in Singapore。Information and Management,41(8),1037-1042。 | 42. | Nunes, J. C.、Hsee, C. K.、Weber, E. U.(2004)。Why Are People So Prone to Steal Software? The Effect of Cost Structure on Consumer Purchase and Payment Intentions。Journal of Public Policy and Marketing,23(1),43-53。 | 43. | Paternoster, R.、Nagin, D. S.(1993)。Enduring Individual Difference and Rational Choice Theories of Crime。Law and Society Review,27(3),476-495。 | 44. | Piliavin, I.、Gartner, R.、Thornton, C.、Matsueda, R.(1986)。Crime, Deterrence and Rational Choice。American Sociological Review,51,101-119。 | 45. | Reidenbach, R. E.、Robin, D. P.(1988)。Some Initial Steps Toward Improving the Measurement of Ethic。Journal of Business Ethics,7(11),871-881。 | 46. | Wood, R.、Bandura, A.(1989)。Task, Domain, and General Efficacy: A Reexamination of the Self-Efficacy Scale。Psychological Reports,72,423-432。 | 學位論文1. | 邱惠雯(2002)。網際網路使用行為之限制--從隱私權保護觀之探討。國立中正大學。 延伸查詢 | 2. | 簡榮宗(1998)。網路上資訊隱私權保護問題之研究。東吳大學。 延伸查詢 | 圖書1. | Dejoie, Roy、Fowler, George、Paradice, David(1991)。Ethical Issues in Information Systems。Boston, MA:Boyd & Fraser。 | 2. | Williams III, Frank P.、McShane, Marilyn D.(1988)。Criminological Theory。N.J.:Prentice Hall。 | 3. | Fishbein, M.、Ajzen, I.(1980)。Belief, Attitude, Intention, and Behavior: An Introduction to Theory and Research。Addison-Wesley。 | 4. | Sutherland, Edwin H.、Cressey, Donald R.(1978)。Criminology。Philadelphia:J. B. Lippincott。 | 5. | Cornish, Derek B.、Clarke, Ronald V. G.(1986)。The reasoning criminal: rational choice perspectives on offending。Springer-Verlag。 | 6. | Gottfredson, Michael R.、Hirschi, Travis(1990)。A General Theory of Crime。Stanford University Press。 | 7. | 邱皓政(2003)。結構方程模式--LISREL的理論、技術與應用。雙葉書廊。 延伸查詢 | 8. | Bandura, A.、Wessels, S.(1997)。Self-efficacy: The exercise of self-control。New York:Freeman。 | 9. | Alan, F. W.(1967)。Privacy and Freedom。New York:Atheneum。 | 10. | Clarke, R.、Cornish, D.(2000)。Rational Choice。Explaining Crime and Criminals: Essays in Contemporary Criminological Theory \\ R. Paternoster and R. Bachman (Eds.)。LA。 | 11. | Cullen, F. T.、Agnew, R.(2000)。Criminological Theory: Past to Present。LA。 | 其他1. | 自由電子新聞網。轉寄郵件遭開除 聯電寒蟬效起。 延伸查詢 | 2. | Association of British Insurers(2000)。Future Crime Trends in the United Kingdom。 | 3. | Gordon, S.,Ma, Q.(2003)。Convergence of Virus Writers and Hackers: Fact or Fantasy?。 | 4. | Newman, G. R.(2004)。Check and Card Fraud。 | 5. | Willison, R.(2000)。Considering the Offender: Addressing the Procedural Stages of Computer Crime in an Organizational Context。 | 6. | Willison, R.(2001)。The Unaddressed Problem of Criminal Motivation in IS Security: Expanding the Preventive Scope Through the Concept of Readying,London。 | 圖書論文1. | Eining, M. M.、Christensen, A. L.(1991)。A Psycho-Social Model of Software Piracy: The Development and Test of A Model。Ethical Issues in Information Systems。Boston, MA:Boyd and Fraser。 | 2. | Ajzen, Icek(1989)。Attitude Structure and Behavior。Attitude Structure and Function。Lawrence Erlbaum Associates, Inc.。 | 3. | Ajzen, Icek(1985)。From intentions to actions: A theory of planned behavior。Action Control: From Cognition to Behavior。Springer-Verlag。 | 4. | Browne, Michael W.、Cudeck, Robert(1993)。Alternative ways of assessing model fit。Testing Structural Equation Models。Sage。 | |