一、中文部分
李小梅,黃世儒(2010),部落格行銷中的信任形成因素,電子商務學報,12(2),201-220。李惠晴(2010),電子郵件使用者的轉寄行為研究,淡江大學大眾傳播研究所未出版之碩士論文。丘宏昌(2009),部落格資訊分享行為之研究,中興大學科技管理研究所未出版之碩士論文。
吳佳純(2001),購物網站隱私權政策、聲譽與信任對消費者購買意圖影響之研究,實踐大學企業管理研究所未出版之碩士論文。吳佳靜(2002),影響使用者信任網站的因素之探討-以入口網站為例,東吳大學資訊科學系未出版之碩士論文。洪煜昌(2002),網站信任及其影響因素評估模式,台灣科技大學企業管理系未出版之碩士論文。陳彥邦(2000),網路使用者之資訊隱私顧慮探討-採用行為意向模式,中山大學資訊管理研究所未出版之碩士論文。李令儀,羅慧雯,許家馨譯(1998),白宮與微軟都在聆聽的數位生活主張,台北:大塊文化出版,(原書Esther Dyson. Release 2.0: A Design for Living in the Digital Age)。
吳懿婷譯(2001),隱私的權利,台北:商周出版。
陳順宇(1988),多變量分析,台北:華泰書局。
榮泰生(2009),AMOS與研究方法,台北:五南圖書出版。
吳明隆(2009),結構方程模式:AMOS 的操作與應用,台北:五南圖書出版股份有限公司。
林傑斌,張太平,張一岑(2009),Amos 結構方程模式概論與實作,台北:松岡資產管理股份有限公司。
劉家儀,余泰魁,王怡舜與王育民(2011),SEM課程教材,統計研究方法SPSS研討會。
二、網路資料
中正E報(2009),臉書發燒,隱私非重視不可[線上資料],來源: http://www.peopo.org/enews/post/45449 [2009, November 4]。
陳品先(2010),手機適地性服務規模仍小,企業投入行銷預算前三思[線上資料],來源:http://www.bnext.com.tw/article/view/tag/LBS/id/15640 [2010, July 28]。
陳品先(2011),消費者用不用適地性服務,由什麼決定?[線上資料],來源:http://www.bnext.com.tw/article/view/cid/0/id/18073 [2011, April 20]。
數位時代(2009),Facebook的分享力量開始超越E-mail[線上資料],來源:http://www.bnext.com.tw/article/view/cid/0/id/2147 [2009,July 28]。
創市際市場研究顧問(2011),ARO觀察:社群網站服務發展概況[線上資料],來源:http://www.iama.org.tw/upload/ResourceReport/20110830105124836.pdf [2011, August 30]。
Facebook(2010),Facebook的隱私導覽與說明[線上資料],來源:http://www.facebook.com/privacy/explanation.php [2010, July 8]。
Facebook(2010),Facebook的隱私權政策[線上資料],來源:http://www.facebook.com/help/?ref=drop#!/privacy/explanation.php [2010, July 8]。
CheckFacebook(2011),台灣使用Facebook人數統計資料 [線上資料],來源:http://www.checkfacebook.com [2011, April 20]。
三、英文部分
Ajzen, I., Fishbein, M., & Heilbroner, R. (1980). Understanding attitudes and predicting social behavior (Vol.278): Prentice-Hall Eng¬lewood Cliffs, NJ.
Ajzen, I. (1991). The theory of planned behavior. Organizational behavior and human decision processes, 50(2), 179-211.
Altman, I. (1975). The environment and social behavior : Privacy, personal space, territory, crowding. Monterey, Calif. : Brooks/Cole Pub. Co.
Anderson, J., & Gerbing, D. (1988). Structural equation modeling in practice: A review and recommended two-step approach. Psychologi¬cal Bulletin, 103(3), 411-423.
Bagozzi, R. P., & Yi, Y. (1988). On the evaluation of structural equation models. Journal of the Academy of Marketing Sci¬ence, 16(1), 74-94.
Bentler, P. M. (1990). Comparative fit indexes in structural mod-els.Psychological Bulletin, 17(2), 238-246.
Charles Fried (1968). Privacy, Yale law Journal, 89(3), 475-477.
Chin, W. W., & Todd, P. A. (1995). On the use, usefulness, and ease of use of structural equation modeling in MIS Research : A note of caution, MIS Quality, 19(2), 237-246.
Davis, F. (1989). Perceived usefulness, perceived ease of use, and user acceptance of information technology. MIS quarterly, 13(3), 319-340.
Dayal, S., Landesberg, H., & Zeisser, M. (1999). How to build trust online Marketing & Technology, 8(3), 64-69.
Doll, W. J., & Torkzadeh, G. (1994). A confirmatory factor analysis of the end-user computing satisfaction instrument. MIS Qual¬ity, 18(4), 453-461.
Doney, P. M., & Cannon, J. P. (1997). An examination of the nature of trust in buyer-seller relationships, Journal of Marketing, 61(2), 35-51.
Emaketer. (2010). Email Still Tops Facebook for Keeping in Touch [Online],Available:http://www.emarketer.com/Article.aspx?R=1007982 [2011, January 2].
Fishbein, M., & Ajzen, I. (1975). Belief, attitude, intention, and behavior:an introduction to theory and research. Boston:Addi-tion-Wesley.
Fornell, C. R., & Larcker, F. F. (1981). Structural Equation Modelswith Unobservable Variables and Measurement Error, Journal of Marketing Research, 18(2), 39-50.
Guilford, J. P. (1954). Psychometric methods. New York: McGraw-Hill.
Hoffman, D. L., Novak, T. P., & Peralta, M. (1999). Building consumer trust online,Communications of The ACM, 42(4), 80-85.
Huaiqing, W., Lee, M. K. O., & Chen, W. (1998). Consmer Privacy Concerns about Marketing, Communications of the ACM 41(3), 63-70.
Hulland, J. (1999). Use of partial least squares (PLS) in strategic management research: A review of four recent studies. Strategic Man¬agement Journal, 20 (2), 195-204.
Hu, P. J., Chau, P. Y. K., Liu, S. R., & Tam, K. Y. (1999).Examining the technology acceptance model using physician acceptance of telemedicine technology. Journal of Management Information Systems, 16(2), 91-112.
Kini, A., & Choobineh, J. (1998). Trust in electronic commerce: definition and theoretical considerations. IEEE, System Sciences,Proceedings of the Thirty-First Hawaii International Conference, 4, 51-61.
Kuan, H., & Bock, G. (2007). Trust transference in brick and click retailers: An investigation of the before-online-visit phase. Infor¬mation & Management, 44(2), 175-187.
Lin, H., & Lee, G. (2004). Perceptions of senior managers toward knowledge-sharing behaviour. Management Decision, 42(1), 108-125.
Linows, D. F. (1989). Privacy in America: Is your life in the public eyes.66 Colum.L. Rev.
Loch, K. D., & Conger, S. (1996). Evaluating Ethical Decision Making and Computer Use. Communications of the ACM, 39(7), 74-83.
Mohr, J., & Spekman, R. (1994). Characteristics of partnership success: partnership attributes,communication behavior, and conflict reso¬lution techniques, Strategic Management Journal, 15(2), 135-149.
Nunnally, J. C. (1978). Psychometric theory (2nd ed.). New York: McGraw-Hill.
Rubio, D. M., Berg-Weger, M., & Tebb, S. S. (2001). Using structural equation modeling to test for multidimensionality. Struc¬tural Equation Modeling, 8(4), 613-626.
Ryu, S., Ho, S., & Han, I. (2003). Knowledge sharing behavior of physicians in hospitals.Expert Systems with Applications, 25(1),113-122.
Schoeman, F., D. (1984). Philosophical Dimensions of Privacy: An Anthology. Cambridge:Cambridge University Press.
Seeman, M. (1959). On the meaning of alienation. American Sociological Review 24(1), 783-791.
Sheppard, B., Hartwick, J., & Warshaw, P. (1988). The theory of rea-soned action: A meta-analysis of past research with recommenda¬tions for modifications and future research. Journal of con¬sumer research, 15(3), 325-343.
Smith, H. J., & Milberg, S. J. (1996). Information privacy: measuring individuals' concerns about organizational practices. MIS Quality, 20(2), 167-196.
Taylor, S., & Todd, P. (1995). Understanding information technology usage: A test of competing models. Information systems re-search, 6(2), 144-176.
Walther, J. B., Van der Heide, B., Kim, S. Y., Westerman, D., & Tong, S. T. (2008). The role of friends' appearance and behav-ior on evaluations of individuals on facebook: Are we known by the company we keep?. Human Communication Re¬search, 34(1), 28-49.
Wang, Y., & Fesenmaier, D. R. (2004). Modeling Participation in an Online Travel Community, Journal of Travel Research, 42(3), 261-270.
Warren, S., & Barandeis, L. (1890). The Right to Privacy, Harvard Law Review, 4(5), 193-207.
Wu, J., & Tsang, A. (2008). Factors affecting members' trust belief and behaviour intention in virtual communities. Behaviour & Infor¬mation Technology, 27(2), 115-125.