:::

詳目顯示

回上一頁
題名:資訊隱私侵害行為意圖之研究
書刊名:資訊、科技與社會學報
作者:任文瑗 引用關係范錚強 引用關係許通安
出版日期:2006
卷期:6:2=11
頁次:頁77-99
主題關鍵詞:理性選擇理論計畫行為理論資訊隱私權資訊隱私侵害行為Rational choice theoryTheory of planned behaviorInformation privacyInformation privacy intrusion
原始連結:連回原系統網址new window
相關次數:
  • 被引用次數被引用次數:期刊(4) 博士論文(0) 專書(0) 專書論文(0)
  • 排除自我引用排除自我引用:4
  • 共同引用共同引用:21
  • 點閱點閱:40
期刊論文
1.林雅惠(20040400)。資訊隱私權之重塑--以行動商務為例。科技法學評論,1(1),93-122。new window  延伸查詢new window
2.Marsh, H. W.(1994)。Confirmatory Factor Analysis Models of Factorial Invariance: A Multifaceted Approach。Structural Equation Modeling: A Multidisciplinary Journal,1(1),5-34。  new window
3.Clarke, R.(1999)。Internet privacy concerns confirm the case for intervention。Communications of the ACM,42(2),60-67。  new window
4.Bock, G. W.、Zmud, R. W.、Kim, Y. G.、Lee, J. N.(2005)。Behavioral intention formation knowledge sharing: Examining roles of extrinsic motivators, social-psychological forces, and organizational climate。MIS Quarterly,29(1),87-111。  new window
5.DeConinck, J. B.、Lewis, W. F.(1997)。The influence of deontological and teleological considerations and ethical climate on sales managers' intentions to reward or punish sales force behavior。Journal of Business Ethics,16(5),497-506。  new window
6.Bommer, M.、Gratto, C.、Gravander, J.、Tuttle, M.(1987)。A behavioral model of ethicaland unethical decision making。Journal of Business Ethics,6(4),265-280。  new window
7.Shepherd, G. J.、O'Keefe, D. J.(1984)。Separability of attitudinal and normative influences on behavioral intentions in the Fishbein-Ajzen model。The Journal of Social Psychology,122(2),278-288。  new window
8.Vallerand, R. J.、Deshaies, P.、Cuerrier, J. P.、Pelletier, L. G.、Mongeau, C.(1992)。Ajzen and Fishbein's theory of reasoned action as applied to moral behavior: A confirmatory analysis。Journal of Personality and Social Psychology,62(1),98-109。  new window
9.Peace, A. G.、Galletta, D. F.、Thong, J. Y. L.(2003)。Software piracy in the workplace: a model and empirical test。Journal of Management Information Systems,20(1),153-177。  new window
10.Bandura, A.、Jourden, Forest J.(1991)。Self-regulatory mechanisms governing the impact of social comparison on complex decision making。Journal of Personality and Social Psychology,60(6),941-951。  new window
11.Cornish, D. B.、Clarke, R. V.(1987)。Understanding crime displacement: an application of rational choice theory。Criminology,25,933-947。  new window
12.Loch, K. D.、Conger, S.(1996)。Evaluating Ethical Decision Making and Computer Use。Communications of the ACM,39(7),74-83。  new window
13.Hsu, M. H.、Kuo, F. Y.(2003)。The Effect of Organization-Based Self-Esteem and Deindividuation on Protecting Personal Information Privacy。Journal of Business Ethics,42(4),305-321。  new window
14.Leonard, L. N. K.、Cronan, T. P.、Kreie, J.(2004)。What Influences IT Ethical Behavior Intentions-planned Behavior, Reasoned Action, Perceived Importance, or Individual Characteristics?。Information and Management,42(1),143-158。  new window
15.Sethi, V.、Carraher, S.(1993)。Developing Measures for Assessing the Organizational Impact of Information Technology: A Comment on Mahmood and Soon's Paper。Decision Sciences,24(4),867-877。  new window
16.Ajzen, Icek(1991)。The Theory of Planned Behavior。Organizational Behavior and Human Decision Processes,50(2),179-211。  new window
17.Shimp, Terence A.、Kavas, Alican(1984)。The theory of reasoned action applied to coupon usage。Journal of Consumer Research,11(3),795-809。  new window
18.Hansen, Torben、Jensen, Jan Moller、Solgaard, Hans Stubbe(2004)。Predicting online grocery buying intention: a comparison of the theory of reasoned action and the theory of planned behavior。International Journal of Information Management,24(6),539-550。  new window
19.Hill, Thomas、Smith, Nancy D.、Mann, Millard F.(1987)。Role of Efficacy Expectations in Predicting the Decision to Use Advanced Technologies: The Case of Computers。Journal of Applied Psychology,72(2),307-313。  new window
20.Hunt, Shelby D.、Vitell, Scott J.(1986)。A general theory of marketing ethics。Journal of Macromarketing,6(1),5-16。  new window
21.Compeau, Deborah R.、Higgins, Christopher A.(1995)。Computer self-efficacy: development of a measure and initial test。MIS Quarterly,19(2),189-211。  new window
22.Kettinger, William J.、Lee, Choong C.(1994)。Perceived Service Quality and User Satisfaction with the Information Services Function。Decision Sciences,25(5/6),737-766。  new window
23.朱柏松(19890400)。隱私權概念之衍變及其損害防止立法之動向。法學叢刊,34(2)=134,89-102。new window  延伸查詢new window
24.Warren, Samuel D.、Brandeis, Louis D.(1890)。The Right to Privacy。Harvard Law Review,4(5),193-220。  new window
25.Chang, Man Kit(1998)。Predicting Unethical Behavior: A Comparison of the Theory of Reasoned Action and the Theory of Planned Behavior。Journal of Business Ethics,17(16),1825-1834。  new window
26.許孟祥、郭峰淵、林杏子、朱彩馨、游佳萍(2001)。個人資訊隱私:倫理效能之量表的發展與驗證。中山管理評論,9(3),373-394。  延伸查詢new window
27.Agranoff, M. H.(1991)。Controlling the Threat to Personal Privacy: Corporate Policies Must Be Created。Journal of Information Systems Management,8,48-52。  new window
28.Bachman, R.、Paternoster, R.、Ward, S.(1982)。The Rationality of Sexual Offending: Testing A Deterrence/Rational Choice Conception of Sexual Assault。Law and Society Review,26,343-372。  new window
29.Banerjee, D.、Cronan, T. P.、Jones, T. W.(1998)。Modeling IT Ethics: A Study Of Situational Ethics。MIS Quarterly,22(1),31-60。  new window
30.Christensen, A.、Eining, M.(1991)。Factors Influencing Software Piracy: Implications for Accountants。Journal of Information Systems,5(1),67-80。  new window
31.Gattiker, Urs E.、Kelley, Helen(1999)。Morality and Computers: Attitudes and Differences in Moral Judgments。Information Systems Research,10(3),233-254。  new window
32.Gormley, K.(1992)。One Hundred Years of Privacy。Wisconsin Law Review,Sep.-Oct.,1335-1408。  new window
33.Gowthorpe, C.、Blake, J.、Dowds, J.(2002)。Testing the Bases of Ethical Decision-Making: A Study of the New Zealand Auditing Profession。Business Ethics: A European Review,11(2),143-156。  new window
34.Grasmick, H. G.、Bursik, R. J.(1990)。Conscience, Significant Others, and Rational Choice: Extending the Deterrence Model。Law and Society Review,24,835-861。  new window
35.Hsu, M. H.、Kuo, F. Y.(2003)。An Investigation of Volitional Control in Information Ethics。Behavior and Information Technology,22(1),53-63。  new window
36.Hunt, S. D.、Vasquez-Parraga, A. Z.(1993)。Organization Consequences, Marketing Ethics, and Sales Forces Supervision。Journal of Marketing Research,30,78-90。  new window
37.Kreie, J.、Cronan, T. P.(1998)。Judging What Is Ethical or Unethical: There Are Differences Between Men and Women。Communications of the ACM,41(9),70-76。  new window
38.Lwin, M. O.、Williams, J. D.(2003)。A Model Integrating the Multidimensional Developmental Theory of Privacy and Theory of Planned Behavior to Examine Fabrication of Information Online。Marketing Letters,14(4),257-272。  new window
39.Manstead, A. S. R.、Eekelen, S. A. M. van(1998)。Distinguishing Between Perceived Behavioral Control and Self-Efficacy in the Domain of Academic Achievement Intentions and Behaviors。Journal of Applied Social Psychology,28(15),1375-1392。  new window
40.Martocchio, J. J.(1994)。Effect of Conceptions of Ability on Anxiety, Self-Efficacy, and Learning in Training。Journal of Applied Psychology,79(6),819-825。  new window
41.Moores, T. T.、Dhaliwal, J.(2004)。A Reversed Context Analysis of Software Piracy Issues in Singapore。Information and Management,41(8),1037-1042。  new window
42.Nunes, J. C.、Hsee, C. K.、Weber, E. U.(2004)。Why Are People So Prone to Steal Software? The Effect of Cost Structure on Consumer Purchase and Payment Intentions。Journal of Public Policy and Marketing,23(1),43-53。  new window
43.Paternoster, R.、Nagin, D. S.(1993)。Enduring Individual Difference and Rational Choice Theories of Crime。Law and Society Review,27(3),476-495。  new window
44.Piliavin, I.、Gartner, R.、Thornton, C.、Matsueda, R.(1986)。Crime, Deterrence and Rational Choice。American Sociological Review,51,101-119。  new window
45.Reidenbach, R. E.、Robin, D. P.(1988)。Some Initial Steps Toward Improving the Measurement of Ethic。Journal of Business Ethics,7(11),871-881。  new window
46.Wood, R.、Bandura, A.(1989)。Task, Domain, and General Efficacy: A Reexamination of the Self-Efficacy Scale。Psychological Reports,72,423-432。  new window
學位論文
1.邱惠雯(2002)。網際網路使用行為之限制--從隱私權保護觀之探討。國立中正大學。  延伸查詢new window
2.簡榮宗(1998)。網路上資訊隱私權保護問題之研究。東吳大學。  延伸查詢new window
圖書
1.Dejoie, Roy、Fowler, George、Paradice, David(1991)。Ethical Issues in Information Systems。Boston, MA:Boyd & Fraser。  new window
2.Williams III, Frank P.、McShane, Marilyn D.(1988)。Criminological Theory。N.J.:Prentice Hall。  new window
3.Fishbein, M.、Ajzen, I.(1980)。Belief, Attitude, Intention, and Behavior: An Introduction to Theory and Research。Addison-Wesley。  new window
4.Sutherland, Edwin H.、Cressey, Donald R.(1978)。Criminology。Philadelphia:J. B. Lippincott。  new window
5.Cornish, Derek B.、Clarke, Ronald V. G.(1986)。The reasoning criminal: rational choice perspectives on offending。Springer-Verlag。  new window
6.Gottfredson, Michael R.、Hirschi, Travis(1990)。A General Theory of Crime。Stanford University Press。  new window
7.邱皓政(2003)。結構方程模式--LISREL的理論、技術與應用。雙葉書廊。  延伸查詢new window
8.Bandura, A.、Wessels, S.(1997)。Self-efficacy: The exercise of self-control。New York:Freeman。  new window
9.Alan, F. W.(1967)。Privacy and Freedom。New York:Atheneum。  new window
10.Clarke, R.、Cornish, D.(2000)。Rational Choice。Explaining Crime and Criminals: Essays in Contemporary Criminological Theory \\ R. Paternoster and R. Bachman (Eds.)。LA。  new window
11.Cullen, F. T.、Agnew, R.(2000)。Criminological Theory: Past to Present。LA。  new window
其他
1.自由電子新聞網。轉寄郵件遭開除 聯電寒蟬效起。  延伸查詢new window
2.Association of British Insurers(2000)。Future Crime Trends in the United Kingdom。  new window
3.Gordon, S.,Ma, Q.(2003)。Convergence of Virus Writers and Hackers: Fact or Fantasy?。  new window
4.Newman, G. R.(2004)。Check and Card Fraud。  new window
5.Willison, R.(2000)。Considering the Offender: Addressing the Procedural Stages of Computer Crime in an Organizational Context。  new window
6.Willison, R.(2001)。The Unaddressed Problem of Criminal Motivation in IS Security: Expanding the Preventive Scope Through the Concept of Readying,London。  new window
圖書論文
1.Eining, M. M.、Christensen, A. L.(1991)。A Psycho-Social Model of Software Piracy: The Development and Test of A Model。Ethical Issues in Information Systems。Boston, MA:Boyd and Fraser。  new window
2.Ajzen, Icek(1989)。Attitude Structure and Behavior。Attitude Structure and Function。Lawrence Erlbaum Associates, Inc.。  new window
3.Ajzen, Icek(1985)。From intentions to actions: A theory of planned behavior。Action Control: From Cognition to Behavior。Springer-Verlag。  new window
4.Browne, Michael W.、Cudeck, Robert(1993)。Alternative ways of assessing model fit。Testing Structural Equation Models。Sage。  new window
 
 
 
 
第一頁 上一頁 下一頁 最後一頁 top
:::
無相關著作
 
QR Code
QRCODE