中文部份
1.王保進,多變量分析-套裝程式與資料分析,台北:高等教育文化
事業公司,2004。
2.周子敬,結構方程模式(SEM)-精通LISREL,台北:全華科技圖書
公司,2006。
3.邱皓政,結構方程模式,台北:雙葉書廊公司,2003。
4.蕭文龍,多變量分析最佳入門實用書SPSS+LISREL,2007
5.吳明隆,結構方程模式-Simplis的應用,2006。
6.吳明隆,結構方程模式-Amos的操作與應用,2007。
7.湧井良幸,湧井貞美,圖解AMOS共變異數結構分析方法與應用。
8.小塩真司,管理暨社會科學研究案例-SPSS.AMOS 使用手冊。
9.周宣光,管理資訊系統,台北:東華書局,2000。
10.林東清、孫培真、徐景智,「影響資訊系統使用者抗拒行為之原
因:以計劃行為理論為基礎之整合研究」,資訊管理研究,2
(2),2000,頁1-26。
11.邱家淮,影響非營利組織捐款人行為關鍵因素之研究 -從計劃行
為理論(TPB)之觀點探討,中原大學企業管理研究所碩士論文,
2005。
12.邱皓政,結構方程模式,台北:雙葉書廊公司,2003。
13.許孟祥,以意向模式研究資訊人員之專業倫理行為,國立中山大
學資訊管理研究所博士論文,1998。
14.黃正德,台灣中小製造業高階主管對企業e化意向之研究-以TPB
模式來探討,中山大學高階經營研究所碩士論文,2001。
15.黃芳銘,結構方程模式理論與應用,台北:五南書局,2002。
16.黃智強,影響採用網路購物因素之研究-以網路書店為例,中央
大學資訊管理研究所碩士論文,2000。
17.尤婷靜, 影響網路報稅接受意向之關鍵因素:三種理論模式之比
較,國立中正大學資訊管理研究所碩士論文,2003
18.李敏正,延伸計劃行為理論以預測WWW持續使用之研究,國立高
雄第一科技大學資訊管理系碩士論文,2003。
19.吳盛,以計劃行為理論探討資訊人員的知識分享行為國立中山大學資訊管理研究所博士,2003。
20.葉美春,使用者採用知識管理系統之影響因素研究─理論模型的
比較取向 ,世新大學資訊傳播學系碩士論文,2007。
21.廖銘珠,醫療院所資訊系統成功模式之研究,國立東華大學企業
管理學系研究所碩士論文,2007。
英文部份
1.Ajzen, I., “The Theory of Planned Behavior,”
Organizational Behavior and Human Decision Processes,
50, 1991, pp. 179-211.
2.Agarwal, R. and P. Jayesh, “A Conceptual and
Operational Definition of Personal Innovativeness in the
Domain of Information Technology,” Information Systems
Research, 9(2), 1998, pp. 204-215.
3.Bagozzi, R. P., “Attitudes, Intentions and Behavior: A
Test of Some Key Hypothesis,” Journal of Personality
and Social Psychology, 41, 1981, pp. 607-627.
4.Bandura, A., “Self-efficacy: Toward a Unifying Theory
of Behavioral Change,” Psychological Review, 84(2),
1977, pp. 191-215.
5.Bollen, K. A., Structural Equations with Latent
Variables, New York: Wiley, 1989.
6.Byrne, B. M., Structural Equation Modeling with Lisrel,
Prelis, and Simplis. Basic concepts, applications, and
programming, Mahwah, New Jersey: Lawrence Erlbaum
Associates, 1998.
7.Davis F. D., “Perceived Usefulness, Perceived Ease of
Use, and User Acceptance of Information Technology,”
MIS Quarterly, 31(3), 1989, pp. 319-340.
8.Davis, F. D., Bagozzi, R. P., and P. R. Warshaw, “User
Acceptance of Computer Technology: A Comparison of Two
Theoretical Models,” Management Science, 35(8), 1989,
pp. 982-1003.
9.DeLone, W. H. and McLean, E. R. (1992), “Information
systems success: The quest for the dependent variable,”
Information Systems Research, Vol. 3, No. 1, pp. 60-95.
111
10.DeLone, W. H. and McLean, E. R. (2002), “Information
systems success revisited,” In Sprague, R. H. Jr.
(Ed.), Proceedings of the Thirty-fifth Hawaii
International Conference on System Science (CD-ROM),
IEEE Computer Society Press, Los Alamitos, CA.
11.DeLone, W. H. and McLean, E. R. (2003), “The DeLone
and McLean model of information systems success: A ten-
years update,” Journal of Management Information
Systems, Vol. 19, No. 4, pp. 9-30.
12.DeLone, W. H. and McLean, E. R. (2004), “Measuring e-
commerce success: Aapplying the DeLone and McLean
information systems success model,” International
Journal of Electronic Commerce , Vol. 9, No. 1, pp. 31-
47.
13.Fishbein, M. and I. Ajzen., Belief, Attitude,
Iintention, and Behavior: An Introduction to Theory and
Research, Reading, MA: Addison-Wesley, 1975.
14.Fornell, C. and D. F. Larcker, “Evaluating Structural
Equation Models with Unobservables and Measurement
Error,” Journal of Marketing Research, 18, 1981, pp.
39-50.
15.Hair, J. F., Anderson, R. E., Tatham, R. L. and W. C.
Black, Multivariate Mutlivariate Data Analysis, 5th
ed., New Jersey: Prentice Hall, 1998.
16.Hsu, Chin-Lung and Hsi-Peng Lu, “Why Do People Play On-
line Games? An Extended TAM with Social Influences and
Flow Experience,” Information and Management, 41(7),
2004, pp. 853-868.
17.Hu, L. and P. M. Bentler, “Cutoff Criteria for Fit
Index In Covariance Structural Analysis: Conventional
Criteria Versus New Alternatives,” Structural Equation
Modeling, 6, 1999, pp. 1-55.
18.Joreskog, K. G. and D. Sorbom, LISREL 8: Structural
Equation Modeling with the S1MPL1S Command Language,
Chicago: Scientific Software, 1993.
19.Lee, S. M., Lee, S., and S. Yoo, “Integrative Model of
Computer Abuse Based on Social Control and General
Deterrence Theories,” Information & Management, 41,
2004, pp. 707–718.
20.Lee, Y. and K. A. Kozar, “Investigating Factors
Affecting Adoption of Anti- Spyware Systems,”
Communications of the ACM, 48(8), 2005, pp. 41-45.
21.Lewis, B. R., Snyder, C. A., and R. K. Rainer, “An
Empirical Assessment of the Information Resource
Management Construct,” Journal of Management
Information Systems, 12(1), 1995, pp. 199-223.
22.Limayem, M., Khalifa, M., and A. Frini, “What Makes
Consumers Buy from Internet? A Longitudinal Study of
Online Shopping,” IEEE Transactions on Systems, Man,
and Cybernetics—Part a: Systems and Humans, 30(4),
2000, pp. 421-432.
23.Mathieson, K., “Predicting User Intentions: Comparing
the Technology Acceptance Model with the Theory of
Planned Behavior,” Information Systems Research, 2(3),
1991, pp. 173-191.
24.Medley, F. and D. R. Larochelle, “Transformational
Leadership and Job Satisfaction,” Nursing Management,
26(9), 1995, pp. 64-68.
25.Preece, J., Rogers, Y., Sharp, H., Benyon, D., Holland,
S. and T. Carey, Human-Computer Interaction, Wokingham,
England: AddisonWesley, 1994.
26.Rogers, E. M., Diffusion of Innovations, 3rd ed., New
York: Free Press, 1995.
27.Seyal, A. H., Rahman, M. N., and M. M. Rahim,
“Determinants of Academic Use of the Internet: A
Structural Equation Model,” Taylor & Francis, 2002,
pp. 71-96.
28.Steiger, J. H., “Structural Model Evaluation and
Modification: An Interval Estimation Approach,”
Multivariate Behavioral Research, 25(2), 1990, pp. 173-
180.
29.Straub, D. W. and R. J. Welke, “Coping with Systems
Risk: Security Planning Models for Management Decision
Marking,” MIS Quarterly, 22 (4), 1998, pp. 441-469.
30.Styffe, E. J., “Privacy, Confidentiality, and Security
in Clinical Information Systems: Dilemmas and
Opportunities for the Nurse Executive,” Nursing
Administration Quarterly, 21(3), 1997, pp. 21-28.
31.Taylor, S. and P. A. Todd, “Decomposition and
Crossover Effects in the Theory of Planned Behavior: A
study of Consumer Adoption Intentions,” International
Journal of Research in Marketing, 12, 1995a, pp. 137-
155.
32.Taylor, S., and P. A. Todd, “Understanding Information
Technology Usage: A Test of Competing Models,”
Information System Research, 6(2), 1995b, pp. 144-176.
33.Wixom, H. B. and Todd, A. P. (2005), “A theoretical
integration of user satisfaction and technology
acceptance,” Information Systems Research, Vol. 16,
No. 1, pp 85-102.459.