[1]林傳敏,「電腦稽核─網路世代不能沒有電腦稽核觀念(上) 」,企銀報導,第十八卷,第六期,第44-55頁,民國八十九年六月。[2]沈榮華,「網路犯罪相關問題之研究」,國防管理學院法律研究所碩士論文,民國九十一年五月。[3]洪國興,「資訊安全影響因素與評估模式之研究」,國立政治大學資訊管理研究所博士論文,民國九十二年。[4]黃耀輝,「電子商務之資訊不對稱與因應機制---以網路書店」,國立台灣大學商學研究所碩士論文,民國八十六年。[5]陳進成,「電子商務顧客價值、滿意度與忠誠度之研究 -以電子商店為例」,中原大學資訊管理研究所碩士論文,民國九十一年。[6]尤婷靜,「影響網路報稅接受意向之關鍵因素:三種理論模式之比較」,國立中正大學資訊管理研究所碩士論文,民國九十二年七月。[7]溫素真,「消費者使用簡訊折價劵之行為意圖」,國立高雄第一科技大學行銷與流通管理研究所碩士論文,民國九十三年六月。[8]邱顯貴、楊亨利 ,「線上購物網站值得消費者信任的因素之研究」,資訊社會研究,第五期, 第139-174頁,民國九十二年七月。[9]徐承鍇,「電子商務中信任及互動對使用意願的驗證-以心流為中介變數」,靜宜大學企業管理研究所研究所碩士論文,民國九十一年。[10]簡廷印,「消費者參與線上拍賣行為意圖之實證研究—整合計劃行為理論與社會認知理論」,樹德科技大學經營管理研究所碩士論文,民國九十四年。[11]黃芳銘,社會科學統計方法學--結構方程模式,初版,五南圖書出版股份有限公司,台北,民國九十三年。
[12]邱皓政,結構方程模式-LISREL的理論、技術與應用,初版,雙葉書廊有限公司,台北,民國九十二年。
[13]施又瑄,「影響購物網站使用意願之關鍵因素:”科技接受模式”和”使用與滿足理論”之比較」,第十六屆國際資訊管理理論研討會(ICIM2005),輔仁大學,台北,民國九十四年五月。
[14]Dayal , “How to Build Trust online,” Marketing Management,Vol. 3, No. 8, pp. 64-69, 1999.
[15]Kalakota and Whinston,”Electronic Commerce:A Manager’s Guide,”Addison Wesley,1997.
[16]Gefen, David, “Customer loyalty in e-commerce,” Journal of the Association of Information Systems, Vol. 3,pp. 319-340,2002.
[17]Davis, F.D., “Perceived Usefulness, Perceived Ease of Use,and User Acceptance of Information Technology,” MIS Quarterly,pp. 319-340,1989.
[18]Bhattacherjee, A., “Acceptance of E-Commerce Services: The Case of Electronic Brokerages,” IEEE Transactions on Systems, Man, and Cybernetics-Part A:System and Humans,Vol. 30,No. 4,pp. 411-420,2000.
[19]Bandura, A., “Self-efficacy: Toward a Unifying Theory of Behavioral Change, “ Psychological Review,Vol. 84, No. 2, pp. 191-215, 1977.
[20]Furby, L., Fischhoff B., and Morgan,M., “Rape prevention and self-defense: At what price, “Women’s Studies International Forum,Vol. 14,pp. 49-62,1991.
[21]Rousseau, D.M., Sitkin, S.B., Burt, R.S. Camerer, C., “Not so different after all: A cross-discipline view of trust,” Academy of Management Review, Vol. 23,No. 3,pp. 393-404, 1998.
[22]Kini, A. and Choobineh, “Trust in Electronic Commerce: Definition and Theoretical Considerations,” Thirty-First Annual Hawaii International Conference on System Sciences,Volume 4, pp.51-61, 1998.
[23]Nicholson, C.Y., Compeau, L.F. and Sethi,R, “The Role of Interpersonal Liking in Building Trust in Long-term Channel relationships,” Journal of the Academy of Marketing Science,Vol. 29,No. 1,pp. 3-15,2001.
[24]Jarvenpaa, S.L., N. Tractinsky, L. Saarinen, and M.Vitale, “Consumer Trust in an Internet Store: across-cultural validation,” Journal of Computer-Mediated Communication, 5(2), pp. 44-71,1999.
[25]David, G., Trust and TAM in oneline shopping: An integrated model, MIS Quarterly, Vol. 27, No.1,pp.51-90,2003.
[26]Daignault et al., “enabling trust online, Proceedings of the 3rd International Symposium on Electronic Commerce (ISEC‘02),” 2002.
[27]Mcknight, D.H., Choudhury, V., and Kacmar, C., “Developing and Validating Trust Measures for E-Commerce: A integrative Typology,” Information System Reseach,Vol. 13, No. 3,pp. 334-359, 2002.
[28]Gunter Ollmann, “The Phishing Guide:Understanding & Preventing Phishing Attacks,” NGSSoftware Insight Security Research, 2004.
[29]Aaron Emigh, “Online Identity Theft: Phishing Technology, Chokepoints and Countermeasures, ” ITTC Report on Online Identity Theft Technology and Countermeasures, 2005.
[30]Avivah Litan , “Increased Phishing and Online Attacks Cause Dip in Consumer Confidence,” Gartner reports,pp.1-6, 2005.
[31]Unknown, “Phishing Attacks On Bank Customers Are On the Rise”, Gartner reports,pp. 1-1 ,2005.
[32]Engin Kirda and Christopher Kruegel, “Protecting Users Against Phishing Attacks with AntiPhish,” Proceedings of the 29th Annual International Computer Software and Applications Conference, 2005.
[33]Davis, S.M., “The Power of the Brand,” Strategy and Leadership,Vol. 28,No.4,pp. 4-11,2000.
[34]Deshpande and Zaltman, “Factors affecting trust in market research relationships, “Journal of Marketing. Chicago, Vol. 57,No.1,pp. 81-102,1993.
[35]Sonja Grabner-Kraeuter, “The role of consumers' trust in online-shopping, “ Journal of Business Ethics, pp.43-50,2002.
[36]Bentler P. M. and Chou C. P., “Practical Issues in Structural Modeling”, Sociological Methods and Research, Vol.16, pp.78-117,1987.
[37]Hair et al., “Multivariate Data Analysis,” Prentice Hall, New Jersey,1998.
[38]Tanaka, J., “How Big is Enough? Sample Size and Goodness-of-Fit in Structural Equation Models with Latent Variables,” Child Development,Vol.58, pp.134-146,1987.
網站資料
[39]資策會電子商務研究所,http:// www.find.org.tw/
[40]中華民國刑事警察局,http://www.cib.gov.tw/
[41]Sophos資訊安全業者,http://www.sophos.com/
[42]Anti-Phishing Working Group,http://www.antiphishing.org/
[43]Truste網路隱私觀察組織,http://www.truste.org/