Anderson, J. C., & Narus, J. A. (1990). A model of distributor firm and manufacturer firm working partnerships. the Journal of Marketing, 54(1), 42-58.
Bowers, K. D., Juels, A., & Oprea, A. (2009). Hail: A high-availability and integrity layer for cloud storage. Paper presented at the Proceedings of the 16th ACM conference on Computer and communications security.
Brodkin, J. (2008, August). Loss of customer data spurs closure of online storage service “The Linkup”. Network World. August 11, 2008.
Cachin, C., Keidar, I., & Shraer, A. (2009). Trusting the cloud. ACM SIGACT News, 40(2), 81-86.
Carnevale, D. G., & Wechsler, B. (1992). Trust in the public sector individual and organizational determinants. Administration & Society, 23(4), 471-494.
Cheung, C., & Lee, M. K. (2000). Trust in internet shopping: A proposed model and measurement instrument. AMCIS 2000 Proceedings. 406.
Corbitt, B. J., Thanasankit, T., & Yi, H. (2003). Trust and e-commerce: A study of consumer perceptions. Electronic Commerce Research and Applications, 2(3), 203-215.
Cunningham, S. M. (1967). The major dimensions of perceived risk. Risk taking and information handling in consumer behavior, 82-108. Boston: Harvard University Press .
Currall, S. C., & Judge, T. A. (1995). Measuring trust between organizational boundary role persons. Organizational behavior and Human Decision processes, 64(2), 151-170.
Das, T. K., & Teng, B.-S. (1998). Between trust and control: Developing confidence in partner cooperation in alliances. Academy of Management review, 23(3), 491-512.
Deutsch, M. (1962). Cooperation and trust: Some theoretical notes.
Dibben, M. R. (2001).Trust as process: A study in the application of Whiteheadian thinking to emotional experiences. Concrescence: The Australasian Journal of Process Thought, 2. Retrieved March 20, 2013, from http://organicism.org/ojs/index.php/ajpt/article/view/141/95
Dowling, G. R., & Staelin, R. (1994). A model of perceived risk and intended risk-handling activity. Journal of Consumer Research, 21(1), 119-134.
Durkee, D. (2010). Why cloud computing will never be free. Queue, 8(4), 20.
Featherman, M. S., & Pavlou, P. A. (2003, 10//). Predicting e-services adoption: A perceived risk facets perspective. International Journal of Human-Computer Studies, 59(4), 451-474.
Gefen, D., Karahanna, E., & Straub, D. W. (2003). Trust and tam in online shopping: An integrated model. MIS Quarterly, 27(1), 51-90.
Google. (2012). Google 服務條款. Retrieved March 18, 2013, from http://www.google.com/policies/terms/
Google (2013). Apps Status Dashboard. Retrieved March 19 , 2013, form http://www.google.com/appsstatus#hl=zh-TW&v=status&ts=1364107620934
Gulati, R. (1995). Does familiarity breed trust? The implications of repeated ties for contractual choice in alliances. Academy of Management Journal, 38(1) 85-112.
Hagen, J. M., & Choe, S. (1998). Trust in japanese interfirm relations: Institutional sanctions matter. The Academy of Management Review, 23(3), 589-600.
Hu, W., Yang, T., & Matthews, J. N. (2010). The good, the bad and the ugly of consumer cloud storage. ACM SIGOPS Operating Systems Review, 44(3), 110-115.
Jacoby, J., & Kaplan, L. B. (1972). The components of perceived risk. Advances in Consumer Research, 3(3), 382-383.
Kim, D. J., Ferrin, D. L., & Rao, H. R. (2008). A trust-based consumer decision-making model in electronic commerce: The role of trust, perceived risk, and their antecedents. Decision Support Systems, 44(2), 544-564.
Kim, K., & Prabhakar, B. (2000, December). Initial trust, perceived risk, and the adoption of internet banking. In Proceedings of the twenty first international conference on Information systems (pp. 537-543). Association for Information Systems.
Lewicki, R. J., & Bunker, B. B. (1995). Trust in relationships: A model of development and decline: San Francisco, CA : Jossey-Bass.
Lim, N. (2003). Consumers’ perceived risk: Sources versus consequences. Electronic Commerce Research and Applications, 2(3), 216-228.
Low, M., & Srivatsan, V. (1995). What does it mean to trust an entrepreneur? In S. Birley & I.C. MacMillan (Eds.), International entrepreneurship (pp. 59-78). London: Routledge.
Madsen, M., & Gregor, S. (2000, December). Measuring human-computer trust. In Proceedings of Eleventh Australasian Conference on Information Systems (pp. 6-8).
Marsh, S., & Dibben, M. R. (2003). The role of trust in information science and technology. Annual Review of Information Science and Technology, 37(1), 465-498.
Mayer, R. C., Davis, J. H., & Schoorman, F. D. (1995). An integrative model of organizational trust. The Academy of Management Review, 20(3), 709-734.
McKnight, D. H., Choudhury, V., & Kacmar, C. (2002). The impact of initial consumer trust on intentions to transact with a web site: A trust building model. The Journal of Strategic Information Systems, 11(3), 297-323.
Mell, P., & Grance, T. (2011). The nist definition of cloud computing (draft). NIST special publication, 800, 145.
Mitchell, V.W. (1999). Consumer perceived risk: Conceptualisations and models. European Journal of marketing, 33(1/2), 163-195.
Noorderhaven, N. (1995). Trust and transactions: Toward transaction cost analysis with a differential behavioral assumption. Tijdschrift voor Economie en Management, 15(1), 5-18.
Roselius, T. (1971). Consumer rankings of risk reduction methods. The Journal of Marketing, 56-61.
Rotter, J. B. (1980). Interpersonal trust, trustworthiness, and gullibility. American Psychologist, 35(1), 1.
Stewart, K. J. (1999, January). Transference as a means of building trust in World Wide Web sites. In Proceedings of the 20th international conference on Information Systems (pp. 459-464). Association for Information Systems.
Stone, R. N., & Winter, F. W. (1987). Risk: is it still uncertainty times consequences?. In Proceedings of the American Marketing Association (pp. 261-265). Southern Marketing Association.
Vann, J. W. (1983). A multi-distributional, conceptual framework for the study of perceived risk: Provo, UT: University of Missouri-Columbia.
Wang, C., Wang, Q., Ren, K., & Lou, W. (2010). Privacy-preserving public auditing for data storage security in cloud computing. Paper presented at the INFOCOM, 2010 Proceedings IEEE.
Yousafzai, S. Y., Pallister, J., & Foxall, G. R. (2005). Strategies for building and communicating trust in electronic banking: A field experiment. Psychology & Marketing, 22(2), 181-201.
Zand, D. E. (1972). Trust and managerial problem solving. Administrative Science Quarterly, 17(2), 229-239.
王貞驊 (2012)。 企業採用雲端科技意圖之探討。 碩士論文,國立中山大學,高雄市。吳宗霖 (2013)。 影響雲端運算技術使用意願之關鍵因素探討-以雲端硬碟服務為例。碩士論文,聖約翰科技大學,新北市。林孟勳 (2011)。 探討信任與信任的前因會如何地影響使用網路銀行的意圖。碩士論文,實踐大學,台北市。是方電訊 (2013)。 是方電訊idc大樓服務異常狀況說明。2013年3月19日取自http://www.chief.com.tw/telecom_big5/front/bin/ptdetail.phtml?Part =n130225&Rcg=10
柯毓麟 (2004)。 整合性電子市集信任模式之研究。碩士論文,國立暨南國際大學,南投縣。.柯嘉珍 (2009)。 「分時度假產品」產品知識、知覺風險與降低風險策略關係之研究。碩士論文,靜宜大學,台中市。洪偉倩 (2011)。 網路安全性、知覺易用、知覺價值與使用態度對於使用意願之影響-以雲端運算服務為例。碩士論文,南華大學,嘉義縣。張碩陽、陳毅文、王二平 (2004)。 消費心理學中的風險認知。 心理科學進展, 12(2), 256-263。
陳海嵩 (2009)。科技風險認知的差異及其解釋 - 從心理學到社會。 東北大學學報(社會科學版), 11(5), 389-393。
童世鑫 (2012)。 雲端儲存空間服務使用意願之研究。碩士論文,淡江大學,新北市。劉文全 (2005)。 風險知覺、風險傾向影響飛機維修人為失誤因素之探討—個案研究。碩士論文,國立中正大學,嘉義縣。