一、中文資料:
王文科,教育研究法,五南書局,台北市,民國八十五年。
王尊仕,「供應鏈架構下整合規劃排程系統之問題解析」,中原大學,碩士論文,民國九十年。史其李維(David Simchi-Levi, Philip Kaminsky, and Edith Simchi-Levi)等著,蘇雄義譯,供應鏈之設計與管理:觀念、策略與個案,三版,麥格羅希爾,台北市,民國九十三年。
布萊恩史提德(Brain Steed)著; 陳孝燮譯,武裝衝突-現代戰爭的啟示,國防部譯印,民國九十五年。
石正平,「供應鏈管理實務、關鍵因素之分析及與績效間關係之探討─鋼鐵製造公司實證研究」,中山大學,碩士論文,民國九十六年。托夫勒-艾文、海蒂(Toffler, Alvin & Heidi)著,傅凌譯,新戰爭論,時報文化,臺北市,民國八十三年。
邱天嵩、陳勁甫及王健民,「以Petri Nets 網分析方法建構戰場決策模式」,台灣作業研究學會2007年學術研討會論文集,民國九十六年。
寇克(Christopher Coker)著,張台航譯,沒有戰士的戰爭,國防部譯印,台北市,民國九十五年。
張君龍,「扭轉企業變革之策略轉折時代」,中衛簡訊第138期,12-21頁,民國八十八年。梁小民,寓言中的經濟學,商務出版社,香港,民國九十四年。
郭志法,「資訊超載與媒介素養教育」,中國社會科學研究院學報,民國九十五年。下載自 http://202.119.101.65/Article_Show.asp?ArticleID=972.
陳崇銘,「供應鏈成員資訊生態模式之研究」,元智大學,碩士論文,民國八十九年。
湯馬士及馬丁(Philip R. Thomas, and Kenneth R. Martin,)著,連雅慧、王強森譯,超時間競爭力,中國生產力中心,台北市,民國八十七年。
賀佐(Thomas Herzog)著,朱柔若譯,社會研究方法:質化與量化研究取向,揚智出版社,台北市,民國八十九年。
黃志泰,「戰場覺知-戰場即時共通圖像」,2005年台灣地理資訊學會年會暨學術研討會論文集,台北市,8篇,民國九十四年。
黃志鵬,易逸波,「警報管理系統概述」, e-safety工安簡訊電子報第3期,台北市,民國九十年。
黃宗麟,「野戰防空作戰指管之研究」,砲兵學術季刊第118期,國防部,台北市,47-50頁,民國九十一年。
黃惠民、謝志光、楊伯中,物料管理與供應鏈導論,滄海書局,台北市,民國九十三年。
葉至誠、葉立誠,研究方法與論文寫作,商鼎文化出版社,台北市,民國九十一年。
趙明義,國際區域研究,黎明書局,台北市,民國八十三年。
黎漢林,供應鏈管理與決策,儒林書局,台北市,民國九十三年。
龍冠海主編 ,社會學辭典,台灣商務印書館,台北市,民國八十八年。
韓復華,「供應鏈的『推』與『拉』及其策略意涵」,運輸人通訊第33期,台北市,頁4-5,民國九十三年。
CNET,「資訊超載影響效率-美經濟損失6500億」,民國九十六年。下載自:http://www.jmnews.com.cn.
中時電子報,「7大新武器10天內撂倒哈珊」,民國九十二年。下載自:http://forums.chinatimes.com/report/Gulfwar/Dispose/htm/920319n7.htm.
二、西文資料:
Akita, R.M., “User Based Data Fusion Approaches”, Information Fusion Proceedings of the Fifth International Conference, Vol. 2, pp. 1457-1462 , 8-11 July 2002.
Alberts, D.S. and Hayes, R.E., Understanding Command and Control, CCRP Publication Series, Washington D.C., 2006.
Alberts, D.S., Defensive Information Warfare, NDU Press Publication Washington, DC., August 1996.
Alberts, D.S., Garstka, J.J. and Stein, F.P., Network Centric Warfare: Developing and Leveraging Information Superiority, 2nd Edition(Revised), CCRP Publication Series, Washington D.C., 1999.
Alberts, D.S., Garstka, J.J., Hayes, R.E. and Signori, D.A., Understanding Information Age Warfare, ASD for C3I, US DoD, Washington DC, August 01, 2001.
Alberts, D.S., The Future of Command and Control with Dominant Battlespace Knowledge(DBK) , National Defense University Press, Washington, DC., 1995.
Alford, L.D., “Cyber Warfare: Protecting Military Systems”, Acquisition Review Quarterly, pp. 99-120, Spring 2000.
Allard, K., Somalia Operations: Lessons Learned, NDU Press Publication, Washington DC., January 1995.
Barry, J. and Thomas, E., ”The Kosovo Cover-Up”, Newsweek online, May 15,2000, Retrieved from: http://www.newsweek.com/id/84044?tid=relatedcl.
Bechtel, C. and Jayaram, J., “Supply Chain Management: A Strategic Perspective”, The International Journal of Logistics Management, Vol. 8, No. 1, pp.15-34, 1997.
Bethel, S.A., Chew, N.R., Nostrand, P.M., Whitehead,Y.G. and Osborne, W.B., “Information Operations: A New War-Fighting Capability”, Air Force 2025 Study Final Report, Vol. 3 Ch 2, USAF, August 1996.
Booz Allen Hamilto Inc., “Network Centric Warfare Metrics”, Presentation for OSD Force Transformation, Booz Allen Hamilto Inc., Arlington, VA, 21 August 2002, Retrieved from: http://www.dodccrp.org/events/2002_ncw_workshop/IntroductoryBriefs/CatanzanoNetworkCentricWarfareMetrics.ppt.
Bowden, M., “Blackhawk Down: An American War Story”, Philadelphia Inquirer, 16 November~14 December 1997.
Bredenkamp, M.H., ”How Can the U.S. Army Overcome Intelligence Sharing Challenges Between Conventional and Special Operations Forces?”, US Army Command and General Staff College, Fort Leavenworth, Kansas, 22 May 2003.
Butler, J.C., Mayo, D.R. and Weiler, J., Succeeding with Component-Based Architecture in e-Government, Concept Level Whiter Paper by Enterprise Architecture (EA) Shared Interest Group (SIG) of the Industry Advisory Council (IAC), April 2003.
Carey, S.A., Kleiner, M., Hieb, M.R. and Brown, R., “Development of a C2 Standard of Task Representation for C4ISR Systems, Simulations and Robotics: Battle Management Language”, 2002 CCRTS, CCRP, US DOD, Washington DC., 2002.
CBO Study, The Army’s Bandwidth Bottleneck, Congressional Budget Office, Washington DC., August 2003.
Cebrowski, A.K. and Garstka, J.J., “Network Centric Warfare: Its Origin and Future”, Naval Institute: Proceedings, Vol.124, No.1, pp. 28-35, January 1998.
Cebrowski, A.K., “The Small, the Fast, and the Many”, NetDefense, p.10, 15 January 2004.
Cohen, E.A. and Keaney, T.A., Gulf War Air Power Survey:Summary Report, GPO Press, Washington D C., 1993
Cooper, M.C., Lambert, D.M. and Pagh, J.D., “Supply Chain Management More Than a New Name for Logistic”, The Internal Journal of Logistic Management , Vol.8, No.1, pp.1-14, 1997.
Cooper, M.C., Lambert, D.M. and Pagh, J.D., ”Supply Chain Management: Implementation Issues and Research Opportunities”, The International Journal of Logistics Management, Vol. 9, Issue 2, pp.1-20, 1998.
Cummings, M.L., Mitchell, P.J. and Sheridan, T.B., “Human Supervisory Control Issues in Network Centric Warfare”, Prepared for Boeing, Phantom Works, Humans and Automation Laboratory of MIT, Mass., September 2004.
Edwards, S.J.A., Swarming on the Battlefield: Past, Present, and Future, RAND Publication, 2000.
Ellram, L.M., ” Supply Chain Management-The Industrial Organization Perspective”, International Journal of Physical Distribution &Logistics Management , Vol. 21, No. 1, pp13-33, 1991.
Eppler, M. and Mengis, J., “The Concept of Information Overload: A Review of Literature from Organization Science, Accounting, Marketing, MIS, and Related Disciplines”, The Information Society, Vol. 20, Issue 5, pp. 325-340, Nov/Dec2004.
Evidence Based Research, Inc., Network Centric Operations Conceptual Framework: Version 1.0, prepared for John Garstka, Office of Force Transformation by Evidence Based Research, Inc., US DoD, Washington, D.C., 2003.
Ferris, J.R. and Handel, M.I., "Clausewitz, Intelligence, Uncertainty and the Art of Command in Modern War", Intelligence and National Security, vol. 10, No. 1, pp.1-58, January 1995.
Foraker III, J.C., Operational Command and Control: Lessons for Today’s Joint Force from Grenada, Somalia, NAVAL War College, p.5, December 2007.
Forrester, J.W., Industrial Dynamics, The M.I.T Press, Cambridge, Mass.; Wiley, New York, 1961.
Frank, R., "Hitting the Beach in Mogadishu", The New Leader, Vol. 76 Issue 1, pp. 22-23, 11 January 1993.
Frank, T., “Impact of Network Operations on Iraqi Freedom”, 22 January 2004.
Garstka, J., “Network Centric Warfare: An Overview of Emerging Theory”, December 2000, Retrieved from: http://www.mors.org/Pubs/phalanx/dec00/feature.htm.
Ghoshal, S. and Kim, S.K., “Building Effective Intelligence Systems for Competitive Advantage”, Sloan Management Review, pp.49-58, Autumn 1986.
Glazer, R., Steckel, J.H. and Winer, R.S., "Locally Rational Decision Making: The Distracting Effect of Information on Managerial Performance", Management Science, Vol. 38, No. 2, pp. 212-226, February 1992.
Goldratt, E.M. and Cox, J., The Goal: A Process of Ongoing Improvement, North River Press MA, 1992.
Gorbachev, Yu.E., “Network Centric War: Myth or Reality?”, Military Thought, Articles: 22, Jan 1, 2006.
Haeni, R.E., “Information Warfare: an Introduction”, Cyberspace Policy Institute of the George Washington University, Washington DC., January 1997.
Haines, L., “Patriot Missile: Friend or FOE? RAF Tornado downed, Questions Unanswered”, 20 May 2004, Retrieved from: http://www.theregister.co.uk/2004/05/20/patriot_missile/
Hallowell, E.M., “Overloaded Circuits: Why Smart People Underperform”, Harvard Business Review, Vol. 55, pp. 54-62, January 2005.
Hiltz, S.R. and Turoff, M., "Structuring Computer-Mediated Communication Systems to Avoid Information Overload", Communications of the ACM, Vol. 28, Issue 7, New York, pp.680-689, July 1985.
Howland, P., Lewingdon, A. and Douglas, J., ” Spectrum Management in the acquisition of equipment”, 10th ICCRTS, CCRP, US DoD, Washington DC., June 2005.
HSE Information, “Better alarm handling”, Chemicals Sheet, No. 6, 2000, Retrieved from: http:// www.hse.gov.uk/pubns
Hurst, L., “Terror Plots and Information Overload -How Canada, Britain and the U.S. all Fail to Digest the Heaps of Security Data they Gather”, TheStar.com, 06 May 2007, Retrieved from: http://www.thestar.com/comment/columnists/article/210947
Johnson, S.E., "After Kosovo: Implications for U.S. Strategy & Coalition Warfare", Presented at Institute for National Strategic Studies Conference, NDU, Fort McNair, Washington DC., 16-17November 1999.
Keggler, J., “Pathways to Enlightenment”, Armada International, Vol. 29, Issue 5, p10-15, Oct./Nov. 2005.
Kiley, K., “The Cyber Space Database Information Overload”, Catalog Age, Vol. 13, Issue 9, p 56-59, 1 September 1995.
Kirov, G. and Stoyanov, V., ” Architectures in the Analysis of Requirements and Design of Simulation Systems”, Information & Security, Vol. 16, pp. 104-114, 2005.
Klapp, O.E., In Overload and Boredom: Essays on the Quality of Life in the Information Society, Greenwood Press, Connecticut, 1986.
Kock, N., “Information Overload and Worker Performance: A Process-Centered View”, Knowledge and Process Management, Vol. 7, No. 4, pp. 256-264, 2000.
Lurie, N.H. and Swaminathan, J.M., “Is Timely Information Always Better? The Effect of Feedback Frequency on Decision Making”, Presented at 1st Behavioral Research in Operations Management Conference and the 10th Behavioral Research in Management Conference, 17 March 2008, Retrieved from: http://www.prism.gatech.edu/~nl42/lurie_and_swaminathan_feedback.pdf.
Lyman, P. and Varian, H.R., How Much Information? 2003, Study Report by School of Information Management and Systems at the University of California at Berkeley 28 June 2002.
Maddrell, D.O., “Quiet Transformation: The Role of the Office Net Assessment”, RMA, War College NDU, Washington DC., 2003.
Miller, G.A., “The Magical Number Seven Plus Or Minus Two: Some Limits On Our Capacity For Processing Information”, Psychological Review, Vol. 63, No. 2, p 81-97, 1956.
Money, A.L., Report on Network Centric Warfare: Sense of the Report, US DOD Submitted to the Congress in partial fulfillment of Section 934 of the Defense Authorization Act for FY01, March 2001.
Moseley, T.M., Operation Iraqi Freedom-By The Numbers, Report by USAF, 30 April 2003.
Naef, W.E., “Information Operations Interview with Professor Dan Kuehl, London, July 2003”, Infocon Magazine, Issue 1, October 2003, Retrieve from: http://www.iwar.org.uk/infocon/io-kuehl.htm
National Institute of Standards and Technology, Integration Definition for Function Modeling (IDEF0), FIPS-183 by NIST, 21 December 1993.
Ntuen1 C.A. and Leedom, D., “Sensemaking Training Requirements for the Adaptive Battlestaff”, 12th ICCRTS, CCRP, US DoD, Washington DC., June 2007.
Oyen, E. ed. Comparative Methodology: Theory and Practice in International Social Research. Sage, London, 1990.
Postol,T., ” Friendly Fire Shootdown”, CommonDreams.com , 19 September 2004, Retrieved from: http://www.commondreams.org/views04/0919-05.htm.
Rochlin, G.I., Trapped in the Net: The Unanticipated Consequences of Computerization, Princeton University Press, 1997.
Rogers, E.M. and Agarwala-Rogers, R., “Organizational Communication”, Communication Behaviour, Addision Wesley, MA, pp. 218–236, 1975.
Romanych, M., “Applying the Domains of Conflict to Information Operations Information operation/Assurance”, 10th ICCRTS by CCRP, US DOD, Washington DC., 2005.
Rosenberg, D., “Early Modern Information Overload”, Journal of the History of Ideas, Vol. 64, No. 1, pp. 1-9, Jan 2003.
Ross, A., “Transformation: What Is It? What Does It Mean for Industry? “, Presentation at conference on “Defense Transformation in the Asia-Pacific Region: Meeting the Challenge” by PACOM''s Asia-Pacific Center for Security Studies, Honolulu, HI., p 2, March/April 2004, Retrieved from: http://www.carlisle.army.mil/library/bibs/transf04.htm.
Ross, K., “Creating Value from Business to Business Integration", ASCET, Vol. 1 No.15 April 1999, Retrieved from: http://www.ascet.com/documents.asp?d_ID=218.
Salkever, A., ”Friendly Fire: Still a Deadly Foe”, Business Week Online, 16 April 2003, Retrieved from: http://www.businessweek.com/technology/content/apr2003/tc20030416_5204_tc047.htm
Scales, R.H., “Future Combat Systems: Its Origin and Operational Concept”, Presented by Boeing, 27 Mar 2006, Retrieved from: http:// www.boeing.com/defense-space/ic/fcs/bia/060327_brief_scales.pdf
Shenk, D., Data Smog-Surviving the Information Glut, Harper Collins, San Francisco, 1997.
Smith, E.A. Jr., “Network Centric Warfare: Where’s the Beef ?”, Naval War College Review , February 2000, Retrieved from: http://www.iwar.org.uk/rma/resources/ncw
Smith, E.R., Effects Based Operations: Applying Network Centric Warfare in Peace, Conflict, and War, CCPR Publication Series, Washington DC., 2002.
Smith, K.B.,” The Practical Challenges of Realizing Toffler’s Third Wave”, 12th ICCRTS by CCPR, US DOD, Washington DC., 5 Feb 2006.
Sterman, J.D., “Modeling Managerial Behavior: Misperceptions of Feedback in a Dynamic Decision Making Experiment”, Management Science, Vol. 35, No. 3, pp. 321-339, March 1989.
Talbot, D., “We Got Nothing until They Slammed into Us”, Technology Review, Vol. 107, Issue 9, pp. 36-45, November 2004.
Tapscott, D., Lowy, A. and Ticoll, D., Blueprint to the Digital Economy: Creating Wealth in the Era of E-Business, McGraw-Hill, 1998.
Taw. J.M., Operation Just Cause Lessons for Operations Other Than War, RAND Publication, Washington DC., 1996.
Toffler, A. and Toffler, H., “Preparing for Conflict in the Information Age”, The Futurist, Volume 22, Issue 5, pp. 26-29, June-July 1998.
US Army, Army Field Manual No. 3-01.7: Air Defense Artillery Brigade Operations, US Army, Washington, DC., 31 October 2000.
US Army, Army Field Manual No. 5-0: Army Planning and Orders Production, US Army, Washington, DC., January 2005.
US Army, Army Field Manual No. 6.0: Mission Command-Command and Control of Army Forces, US Army, Washington, DC, 11 August 2003.
US DoD Global Security, “Fallujah”, US DoD Global Security on line report, http://www.globalsecurity.org/military/world/iraq/fallujah.htm.
US DoD Global Security, “Patriot Missile, Tornado Friendly Fire Investigation Completed” US DoD Global Security on line report, 14 May 2004, Retrieved from: http://www.globalsecurity.org/space/library/news/2004/space-040514-centcom03a.htm.
US DoD, C4ISR Architecture Framework: Version 2.0, C4ISR Architecture Working Group(AWG), US DoD, Washington D.C., 18 December 1997.
US DoD, C4ISR Architecture Working Group Final Report, C4ISR Architecture Framework Working Group, US DoD, Washington DC, 1998.
US DoD, DODAF Architecture Framework Version 1.0: Vol. I/ II/ III, C4ISR Architecture Framework Working Group(AWG), US DoD, Washington D.C., 9 Feb 1996
US DoD, Information Superiority: Making the Joint Vision Happen, ASD for C3I, US DoD, Washington, D.C., November 2000.
US DoD, Network-centric Warfare: Creating a Decisive Warfighting Advantage, Office of Defense Transformation, US DoD Washington, D.C., 2003, Retrieved from: http://www.oft.osd.mil/library/library_files/document_318_NCW_GateFold-Pages.pdf
US DoD, Network-Centric Warfare: Department of Defense Report to Congress, ASD for C3I, US DoD, Washington, D.C., 27 July 2001.
USMC, Field Manual No100-6: Information Operations, USMC, August 1999.
Waddington, P., “Dying For Information? A report on the effects of information overload in the UK and Worldwide”, Reuters, London, 1996, Retrieved from: http://www.cni.org/regconfs/1997/ukoln-content/repor~13.html#34.
Wentz, L., Lessons from Kosovo: the KFOR Experience, CCRP Publication Series, US DOD, Washington DC., July 2002.
Whittaker, S., Terveen, L., Hill, W., and Cherny, L., “The Dynamics of Mass Interaction”, CSCW ''98. ACM, New York, NY, pp. 257-264, 14-18 November 1998.
Wilson, C., Information Operations, Electronic Warfare and Cyberwar: Capabilities and Related Policy Issues, RL32787-CRS Report for Congress, 20 March 2007.
Wilson, C., Network Centric Warfare: Background and Oversight Issues for Congress, RL32411-CRS Report for Congress, 2 June 2004.
Wisnosky, D., Vogel, J. and Ring, S., “The Road to Executable Architectures”, Wizdom Systems Inc., Nov 2004, Retrieved from: http://www.wizdom.com/roadtoexecutablearch.ppt
Wurman, R.S., Information Anxiety, Doubleday, New York, 1989.