中文部分
1.王瑞堂(2000),「安全電子公文之設計」,國立成功大學資訊工程研究所碩士論文。2.毛隆慶(2004),「電子公文導入關鍵成功因素─以我國大專院校為例」,世新大學資訊管理學研究所(含碩專班) 碩士論文。3.江燕美(2003),「知識管理與電子化政府之研究-以K市公文電子化作業為例」,國立中山大學企業管理學系研究所碩士論文。4.行政院研究發展考核委員會(2008),「96年度電子化政府報告書」。
5.杜怡莉(2002),「電子簽章法及技術應用於大學校院校務系統之探討與研究」,靜宜大學資訊管理學系碩士論文。6.吳秀光、廖洲棚(2003),「運用資訊科技再造政府:以臺北市政府線上服務的推行為例」,國家政策季刊2卷1期, 151-176頁。7.吳彩鳳(2006),「公文電子交換系統使用滿意度之調查研究─以臺南縣市國民小學為例」,國立臺南大學教育經營與管理研究所碩士論文。8.沈誼中(2001),「電子公文系統安全評估方法之研究與設計」,國立成功大學資訊工程學系碩博士班碩士論文。9.宋餘俠(2000),「機關公文電子交換開啟數位行政新紀元」,研考雙月刊24卷4期, 61-69頁。10.宋餘俠、林輝誼(2008),「擴大公文線上簽核落實節能減紙資安」,研考雙月刊32卷5期,96-102頁。11.林大舜(2002),「建構電子化政府資訊推動計畫的風險管理制度之研究─以某大學電子公文計畫推動為例」,元智大學工業工程與管理學系碩士論文。12.林克偉(2002),「影響政府機關電子公文實施績效之研究-以地方政府為例」,國立中正大學資訊管理學系碩士論文。13.孫和翊(2007),「以科技接受模式探討享樂型網站之縱貫研究」,國立中山大學資訊管理學系研究所碩士論文。14.黃朝盟、吳濟安(2007),「電子化政府影響評估」,研考雙月刊31卷1期,76-85頁。15.國家通訊傳播委員會(2008),「國家通訊傳播委員會『公文線上簽核系統』介紹」。
16.陳富益(2003),「我國現行[公文電子交換]政策實施情況之探討---以台中市政府及所屬機關為例」,東海大學公共行政學系碩士論文。17.陳碧玉(2004),「公文電子化系統效能之研究-以屏東縣機關為例」,國立高雄第一科技大學資訊管理所碩士論文。18.陳政益(2000),「我國大學電子公文系統架構及其內容之研究」,國立政治大學圖書資訊研究所碩士論文。19.陳昱欣(2003),「圖書館自助借書系統使用行為之研究-以TAM 模式縱向時間調查」,國立台北科技大學商業自動化與管理研究所碩士論文。20.陳珮華(2008),「線上德爾菲系統於技術前瞻之研究」,國立交通大學科技管理研究所碩士論文。21.張靜雯(2009),「國中小教師部落格使用者呈現教學歷程檔案之接受度及影響因素之研究」,國立嘉義大學教育科技研究所碩士論文。22.張鴻昌(2004),「員工對企業內部網路的接受度之研究-以中鋼公司為例」,國立中山大學企業管理學系研究所碩士論文。23.曹金成(2007),「物業管理系統使用行為之研究-UTAUT模型之應用」,國立台北大學企業管理系碩士論文。24.彭文美(2001),「大學公文電子化之發展與問題探討--以靜宜大學為例」,中華大學工業工程與管理研究所碩士論文。25.雲信翔(2008),「網路教學系統接受度與滿意度之研究-以南台科技大學Blackboard 系統為例」,南台科技大學工業管理研究所碩士論文。26.楊培祺(2007),「高雄市國民小學教師電子化教學檔案之接受度研究」,國立高雄師範大學工業科技教育學系碩士論文。27.楊朝祥(1998),「邁向二十一世紀電子化政府」,研考雙月刊22卷1期,3-9頁。28.楊國樞等(1989),社會及行為科學研究方法(上)(下),十三版,中華東華書局,台北。
29.塗義勳(2000),「公文無紙化系統---以銀行金融業為個案」,國立台北科技大學生產系統工程與管理研究所碩士論文。30.劉昌鈞(2007),「以延伸科技接受模式探討學務系統使用行為之研究」,大葉大學資訊管理學系碩士在職專班碩士論文。31.劉文龍(2005),「電子公文線上簽核系統的規劃與設計」,中興大學資訊科學系所碩士論文。32.劉文龍(2004),「從規劃面、發展面與系統安全面淺談本署『電子公文線上簽核系統』」,經濟部水利署第14期水利期刊,137-142頁。33.劉柏廷(2006),「科技接受模式,結合計劃行為理論與科技接受模式,科技接受與使用統一理論之實證分析與比較:以台北市停車收費採用PDA為例」,國立交通大學運輸科技與管理學系碩士論文。34.蕭乃沂(2001),「電子化政府便民應用服務的評估架構」,研考雙月刊25卷1期, 75-81頁。35.簡素娟(2009),「推動公文線上簽核系統關鍵成功因素之研究-以行政機關為例」,東海大學管理碩士在職專班碩士論文。英文部分
1.Al-Gahtani, S. S., Hubona, G. S., & Wang, J. (2007), “Information Technology (IT) in Saudi Arabia:Culture and the Acceptance and Use of IT,” Information and Management ,44 (8), 681-691.
2.Agarwal, R. & Prasad, J. (1998), “A Conceptual and Operational Definition of Personal Innovativeness in the Domain of Information Technology,” Information Systems Research, 9 (2), 204-215.
3.Agarwal, R. & Prasad, J. (1997), “The Role of Innovation Characteristics and Perceived Voluntariness in the Acceptance of Information Technologies,” Decision Sciences, 28 (3), 557-582.
4.Agarwal, R. & Karahanna, E. (2000), “Time Flies When you’re Having Fun Cognitive Absorption and Beliefs about Information Technology Usage,” MIS Quarterly, 24 (4), pp.665-694.
5.Ajzen, I. (1991), “The Theory of Planned Behavior,” Organizational Behavior and Human Decision Processes, 50, 179-211.
6.Ajzen, I. (1985), “From Intentions to Actions: A Theory of Planned Behavior, In Action Control from Cognition to Behavior,” Kuhl Julius and Bechmann Jurgen, 11-39.
7.Armitage, C. J. & Conner, M. (2001), “Efficacy of the Theory of Planned Behavior: a Meta-analytic Review,” British journal of Social Psychology, 40, 471-499.
8.Abu Shanab, E. A. (2005), “Internet Banking and Customer’s Acceptance in The Unified Model’s Perspective,” A Dissertation Submitted in Partial Fulfillment of The Requirements of The Doctor of Philosophy Degree, Southern Illinois University Carbondale, Carbondale, Southern Illinois.
9.Bandura, A. (1986), “Social foundations of thought and action. Englewood Cliffs,” NJ:Prentice-Hall.
10.Bem, D. J. & Allen, A. (1974), “On Predicting Some of the People Some of the Time: The Search for Cross-Situational Consistencies in Behavior,” Psychological Review, 81 (6), 506-520.
11.Benbasat, I., Dexter, A. S., & Todd, P. (1986), “An Experimental Program Investigating Color-Enhanced and Graphical Information Presentation: An Integration of the Findings,” Communications of the ACM, 29 (11), 1094-1105.
12.Bergeron, F., Rivard, S., & De Serre, L. (1990), “Investigating the Support Role of the Information Center,” MIS Quarterly, 14 (3), 247- 259.
13.Bozionelos, N. (1996), “Psychology of Computer Use: Prevalence of Computer Anxiety in British Managers and Professionals,” Psychological Reports, 78 (3), 995-1002.
14.Cuieford, J. P. (1965), “Fundamental Statistics in Psychology and Education, 4thed.”, New York: McGraw-Hill.
15.Compeau, D. & Higgins, C. A. (l995a), “Application of Social Cognitive Theory to Training for Computer Skills,” Information Systems research, 6 (2), 118-143.
16.Compeau, D. & Higgins, C. A. (1995b), “Computer Self-efficacy: Development of A Measure and Initial Test,” MIS Quarterly, 19 (2), 189-211.
17.Davis, F. D. (1989), “Perceived Usefulness, Perceived Ease of Use, and User Acceptance of Information Technology,” MIS Quarterly, 13 (3), 319-339.
18.Davis, F. D., Bagozzi, R. P., & Warshaw, P. R. (1989), “User Acceptance of Computer Technology: A Comparison of Two Theoretical Models,” Management Science, 35 (8), 982–1003.
19.Davis, F. D., Bagozzi, R. P., & Warshaw, P. R. (1992), “Extrinsic and Intrinsic Motivation to Use Computers in the Workplace,” Journal of Applied Social Psychology, 22 (14), 1111-1132.
20.Deci, E. L. & Ryan, R. M. (1985), “Intrinsic Motivation and Self Determination in Human Behavior,” New York: Plenum.
21.Deci, E. L., Vallerand, R. J., Pulletier, L. G., & Ryan R. M. (1991), “Motivation and Education: The Self-determination Perspective,” Educational Psychologist, 26 (3&4), 325-346.
22.Fishbein, M. & Ajzen, I. (1975), “Belief, Attitude, Intention and Behavior: An Introduction to Theory and Research,” Reading, MA: Addison-Wesley.
23.Herbert, T. T. (1976), “Dimensions of Organizational Behavior,” New York: Collier Macmillan.
24.Hung, S. Y., Tang, K. Z., Chang, C. M., & Ke, C. D. (2009), “User acceptance of intergovernmental services: An example of electronic document management system,” Government Information Quarterly, 26 (2), 387-397.
25.Hung, S. Y., Chang, C. M., & Yu, T. J. (2006), “Determinants of user acceptance of the e-Government services: The case of online tax filing and payment system,” Government Information Quarterly, 23 (1), 97-122.
26.Hu, P. J. H., Clark, T. H. K., & Ma, W. W. K. (2003), “Examining Technology Acceptance by School Teachers: A Longitudinal Study,” Information and Management, 41, 227-241.
27.Hsu, M. H., Yen, C. H., Chiu, C. M., & Chang, C. M. (2006), “A Longitudinal Investigation of Continued Online Shopping Behavior: An Extension of The Theory of Planned Behavior,” International Journal of Human Computer Studies, 64, 889-904.
28.Horton, R. P., Buck T., Waterson, P. E., & Clegg, C. W. (2001), “Explaining Intranet Use with The Technology Acceptance Model,” Journal of Information Technology, 16 (4), 237-249.
29.Jelinek, Ronald, Ahearne, M., Mathieu, J., & Schillewaert, N. (2006), “A Longitudinal Examination of Individual, Organizational, and Contextual Factors on Sales Technology Adoption and Job Performance,” Journal of Marketing Theory and Practice, 14 (1), 7-23.
30.Kim, S. S. & Malhotra, N. K. (2005), “A Longitudinal Model of Continued IS Use: An Integrative View of Four Mechanisms Underlying Post-adoption Phenomena,” Management Science, 51 (5), 741-755.
31.Kaiser, H. F. (1966), “The Varimax Criterion for Analysis Rotation in Factor Analysis,” Psychometrika, 189.
32.Kaiser, H. F. (1974), “An Index of Factorial Simplicity,” Psychometrika, 39 (1), 31-36.
33.Kwon, O., Choi, K., & Kim, M (2007), “User Acceptance of Context-aware Services: Self-efficacy, User Innovativeness and Perceived Sensitivity on Contextual Pressure,” Behaviour and Information Technology, 26 (6), 483-498
34.Lennon, S. J., Kim, M., Johnson, K. K. P., Jolly, L. D., Damhorst, M. L., & Jasper, C. R. (2007), “A Longitudinal Look at Rural Consumer Adoption of Online Shopping,” Psychology and Marketing, 24 (4), 375-401.
35.Levy, J. A. (1988), “Intersections of Gender and Aging,” The Sociological Quarterly, 24 (4), 479-486.
36.Lu, J., Yao, J. E., & Yu, C. S. (2005), “Personal Innovativeness, Social Influences and Adoption of Wireless Internet Services via Mobile Technology,” Journal of Strategic Information Systems, 14, 245-268.
37.Lucas, H. (1981), “The Analysis, Design, and Implementation of Information Systems,” McGraw-Hill, New York.
38.Marchewka, J., Liu, C., & Kostiwa, K. (2007), “An Application of the UTAUT Model for Understanding Student Perceptions. Using Course Management Software. Communications of the IIMA. 7(2), 93-104.
39.Miller, J. B. (1976), “Toward a New Psychology of Women,” Beacon Press, Boston.
40.Minton, H. L. & Schneider, F. W. (1980), “Differential Psychology,” Waveland Press, Prospect Heights, IL.
41.Morris, M. G. & Venkatesh, V. (2000), “Age Differences in Technology Adoption Decisions: Implications for a Changing Workforce,” Personnel Psychology, 53 (2), 375-403.
42.Moore, G. C. & Benbasat, I. (1991), “Development of an Instrument to Measure the Perceptions of Adopting an Information Technology Innovation,” Information Systems Research, 2 (3), 192-222.
43.Moore, G. C. & Benbasat, I. (1992), “An Empirical Examination of a Model of the Factors Affecting Utilization of Information Technology by End Users,” Working paper, University of British Columbia, Vancouver, B. C.
44.Patrick, R., Rohan, J., & Peter, C. (2000), “Issues in Predicting and Explaining Usage Behaviors with the Technology Acceptance Model and the Theory of Planned Behavior when Usage is Mandatory,” Proceedings of the twenty first international conference on Information systems, 35-44.
45.Plude, D. & Hoyer, W. (1985), “Attention and Performance: Identifying and Localizing Age Deficits,” in Aging and Human Performance, N. Charness (ed.), John Wiley & Sons, New York, 47-99.
46.Rigby, M. (2006), “Essential Prerequisites to the Safe and Effective Widespread roll out of e-working in Healthcare,” International Journal of Medical Informatics, 75 (2), 138-147.
47.Rogers, E. M. (1983), “The Diffusion of Innovations,” 3rd., New York Free Press.
48.Taylor, S. & Todd, P. A. (1995a), “Understanding information technology usage: A test of competing models,” Information Systems Research, 6 (2), 144-176.
49.Taylor, S. & Todd, P. A. (1995b), “Decomposition and Crossover Effects in the Theory of Planned Behavior: A Study of Consumer Adoption Intentions,” International Journal of Business in Marketing, 12 (2), 137-155.
50.Thompson, R. L., Higgins, C. A., & Howell, J. M. (1991), “Personal Computing: Toward a Conceptual Model of Utilization,” MIS Quarterly, 15 (1), 124-143.
51.Triandis, H. (1977), “Interpersonal Behavior. Belmont,” California: Wadsworth Publishing Company, Inc.
52.Triandis, H. C. (1979), “Values, Attitudes and Interpersonal Behavior,” in Nebraska Symposium on Motivation, 1979: Beliefs, Attitudes and Values, H. E. Howe (ed.), University of Nebraska Press, Lincoln, NE, 1980, 195:259.
53.Venkatesh, V., Morris, M. G., & Ackerman, P. L. (2000), “A Longitudinal Field Investigation of Gender Differences in Individual Technology Adoption Decision Making Processes,” Organizational Behavior and Human Decision Processes, 83 (1), 33-60.
54.Venkatesh, V., Morris, M. G., Davis, G. B., & Davis, F. D. (2003), “User acceptance of information technology: Toward a unified view,” MIS Quarterly, 27 (3), 425-478.
55.Venkatesh, V. & Davis, F. D. (2000), “A Theoretical Extension of the Technology Acceptance Model: Four Longitudinal Field Studies,” Management Science, 46 (2), 186-204.
56.Venkatesh, V. (2000), “Determinants of perceived Ease of Use: Integrating Control, Intrinsic Motivation, and Emotion into the Technology Acceptance Model,” Information System Research, 11 (4), 342-365.
57.Venkatesh, V., & Morris M. G. (2000), “Why Don’t Men Ever Stop to Ask for Directions? Gender, Social Influence, and Their Role in Technology Acceptance and usage Behavior,” MIS Quarterly, 24 (1), 115-139.
58.Wu, I. L. & Chen, J. L. (2005), “An Extension of Trust and TAM model with TPB in the Initial Adoption of On-line Tax: An Empirical Study,” International Journal of Human Computer Studies, 62 (6), 784-808.