|
一、中文文獻 1.工研院IEK(2009),Smart Phone用PCB 發展趨勢。 2.工研院IEK(2012a),從App成長趨勢看行動應用程式投入策略。 3.工研院IEK(2012b),全球行動通訊迎向酷智慧時代。 4.王英裕(2012),重塑產業與生活形貌的智慧型手機,工研院IEK。 5.李茂能(2006),結構方程模式軟體Amos之簡介及其在測驗編制上之應用,台北市:心理出版社股份有限公司。 6.吳明隆(2007),結構方程模式:AMOS的操作與應用,台北市:五南圖書出版股份有限公司。 7.吳萬益(2011),企業研究方法,台北市:華泰書局。 8.邱皓政(2003),結構方程模式,台北市:雙葉書廊。 9.拓墣產業研究所(2004),鎖定智慧型手機功能需求表、產品趨勢與未來發展關鍵-以手機為主要切入角度。 10.拓墣產業研究所(2012),Windows Phone的王子復仇記。 11.張紹勳(2004),研究方法,台中市:滄海書局。 12.侯鈞元(2008),從使用需求觀點剖析智慧型手機設計趨勢,工研院IEK。 13.陳冠名(2007),智慧型行動電話裝置發展現況暨產品趨勢探索,資策會MIC。 14.陳順宇(2004),多變量分析,台北市:華泰書局。 15.黃芳銘(2003),結構方程模式-理論與應用,台北市:五南圖書出版股份有 限公司。 16.黃俊英(2000),多變量分析,台北市:華泰書局。 17.商業周刊(2011),獨家深入憤怒鳥基地。 18.商業週刊(2013),糖果射倒憤怒鳥 四個月稱霸臉書。 19.資策會FIND(2011),行動網路市場指標解析報告。 20.資策會FIND(2012),科技化服務價值鏈研究與推動計畫報告。 21.資策會MIC(2002),Smart Phone的發展現況與趨勢分析。 22.資策會MIC(2011a),行動應用程式商店商機探討。 23.資策會MIC(2011b),行動裝置應用軟體類型消費者偏好分析。 24.資策會MIC(2011c),應用軟體商店發展現況與商機評估。 25.資策會MIC(2011d),Android、iPhone作業系統消費者行動載具使用行為比 較分析。 26.資策會MIC(2012a),數位媒體創新應用趨勢。 27.資策會MIC(2012b),apple迷與Google迷行動生活初探。 28.資策會MIC(2013), 智慧型手機App下載偏好分析報告。 29.電腦王(2009),掛網專家10強×30招,第56期。 30.數位時代(2010),App狂潮‧域名經濟學。 31.數位時代(2011),人氣買家100強。 32.數位時代(2012),3秒放大智慧型手機螢幕。 33.數位時代(2013),僵局完結?台灣Android應用商店Google Play恢復付費下載。 34.數位匯流發展協會(2012),2012台灣智慧型手機使用行為大調查。 35.Rana(2011),App這樣賣最賺,台北市:寶鼎出版社有限公司。 二、英文文獻 1.Adams, D. A., Nelson, R. P., and Todd, P. A. (1992), “Perceived usefulness, ease of use, and usage of information technology: a replication”, MIS Quarterly, 16(2), 227-247. 2.Ahn, T., Ryu, S., and Han, I. (2007), “The impact of Web quality and playfulness on user acceptance of online retailing”, Information &; Management, 44, 263-275. 3.Ajzen, I. and Fishbein, M. (1975), “Belief, attitude, intention, and behavior: an introduction to theory and research”, MA: Addison-Wesley. 4.Ajzen, I. and Fishbein, M. (1980), “Understanding attitudes and predicting social behavior” , MA: Addison-Wesley. 5.Akturan, U. and Tezcan, N. (2012), “Mobile banking adoption of the youth market Perceptions and intentions”, Marketing Intelligence &; Planning, 30(4), 444-459. 6.Bagozzi, R. P. and Yi, Y. (1988), “On the Evaluation of Structural Equation Models”, Journal of the Academy of Marketing Science, 16(1), 74-94. 7.Bagozzi, R. P. (1993), “Assessing Construct Validity in Personality Research:Applications to Measures of Self-esteem”, Journal of Research in Personality,27(1), 49-87. 8.Bajaj, A. and Nidumolu, S.R. (1998), “A feedback model to understand information system usage”, Information &; Management, 33(4), 213-24. 9.Barnes, S. B. (2003), “Computer-Mediated Communication”, Boston: Allyn and Bacon. 10.Barry, B. and Marek, B. (2004),“Social interaction in There”, Computer Human Interaction. Vienna, Austria, ACM. 11.Bauer, R. A.(1960), “Consumer behavior as risk taking”, In: Cox, Donald F. (Ed.), Risk Taking and Information Handling in Consumer Behavior, Harvard Business Press, Boston, MA, 23-33. 12.Bentler, P. M. and Bonett, D. G. (1980), “Significance Tests and Goodness of Fit in the Analysis of Covariance Structures”, Psychological Bulletin, 88(3), 588-606. 13.Bentler, P. M. and Hu, L. (1999), “Cutoff Criteria for Fit Indexes in Covariance Structure Analysis: Conventional Criteria Versus New Altematives”, Structural Equation Modeling, 6(1), 1-55. 14.Bloch, P.H. (1995), “Seeking the ideal form: product design and consumer response”, Journal of Marketing, 59, 16-29. 15.Browen, M. W., and Cudeck, R. (1993), “Alternative Ways of Assessing Model Fit”, In K. A. Bollen and J. S. Long (Eds.) , Testing Structural Equation Models, Newsbury Park, CA: Sage. 16.Camarero, C., Rodriguez, J., and San J. R. (2012), “An exploratory study of online forums as a collaborative learning tool”, Online Information Review, 36(4), 568-586. 17.Cases, A. S. (2002) ,“Perceived risk and risk-reduction strategies in internet shopping” , The International Review of Retail, 12(4), 375-394. 18.Chang, Y. F., Chen, C.S., and Zhou, H. (2009), “Smart phone for mobile commerce”, Computer Standards and Interfaces, 31(4), 740-747. 19.Chang, Y. H. and Park, D. W. (2011), “A Study on Smartphone APP Authoring Solution Design for Enhancing Developer Productivity”, Communications in Computer and Information ScienceVolume, 206, 160-166. 20.Chapin, J. (2007), “Third-person perception about domestic violence among experts”, North american journal of psychology, 9(3), 463-474. 21.Chen, K., Chen, J.V., and Yen, D.C. (2011), “Dimensions of self-efficacy in the study of smart phone acceptance”, Computer Standards &; Interfaces, 33, 422-431. 22.Cheong, J.H., and Park, M.C. (2005), “Mobile Internet Acceptance in Korea”, Internet Research, 15(2), 125-140. 23.Chin, W.W. and Gopal, A. (1995), “Adoption intention in GSS: relative importance of beliefs”, The Database for Advances in Information Systems, 26(2), 42-63. 24.Chung, J. and Tan, F.B. (2004), “Antecedents of perceived playfulness: an exploratory study on user acceptance of general information-searching websites” , Information &; Management, 41(3), 869-881. 25.Cox, D. F. (1967), “Risk Handling in Consumer Behavior–an Intensive Study of Two Cases”, In: Cox, Donald F. (Ed.), Risk Taking and Information Handling in Consumer Behavior, Harvard Business Press, Boston, MA, 34-81. 26.Csikszentmihalyi, M. (1975), “ Beyond Boredom and Anxiety”, Jossey-Bass, San Francisco. 27.Cunningham, S. M. (1967), “The Major Dimensions of Perceived Risk”, In: Cox, Donald F. (Ed.), Risk Taking and Information Handling in Consumer Behavior, Harvard Business Press, Boston, MA, 82-264. 28.Cudeck, R. (1989), “Analysis of Correlation Matrices Using Covariance Models”, Psychological Bulletin, 105, 317-327. 29.Cyr, D., Head, M., and Ivanov, A. (2006), “Design aesthetics leading to m-loyalty in mobile commerce”, Information &; Management, 43(8), 950-963. 30.Dahlberg, T., Mallet, N. and Oorni, A. (2003), “A trust enhanced technology acceptance model - consumer acceptance of mobile payment solutions”, Proceedings of the CIC roundtable. 31.Davis, F. D. (1986), “A technology acceptance model for empirically testing new end-user information systems: Theory and results,” Ph.D. dissertation, MIT Sloan School of management, Cambridge, MA. 32.Davis, F. D. (1989), “Perceived usefulness, perceived ease of use and user acceptance of information technology,” MIS Quarterly, 13(3), 319-342. 33.Davis, F. D., Bagozzi, R. P., and Warshaw, P. R. (1989), “User acceptance of computer technology: a comparison of two theoretical models,” Management science, 35(8), 982-1003. 34.Deci, E.L. (1975), “ Intrinsic Motivation”, PlenumPress, New York. 35.Dion, K., Berscheid, E., and Walster, E. (1972), “What is beautiful is good” , Journal of Personality and Social Psychology, 24(3), 285-290. 36.Dowling, G. R. and Stealin, R. (1994), “A Model of Perceived Risk and Intended Risk-handling Activity”, Journal of Consumer Research, 21, 29-37. 37.Eagly, A.E., Ashmore, R.D., Makhijani, M.G., and Longo, L.C. (1991), “What is beautiful is good, but . . .: a meta-analytic review of research on the physical attractiveness stereotype”, Psychological Bulletin, 110(1), 109-128. 38.Engel, J.F., Blackwell, R.D., and Miniard, P.W. (1995), “Consumer Behavior”, 8th ed,Fort Worth. 39.Fang, X., Chan, S., Brzezinski, J. and Xu, S. (2006), “Moderating effects of task type on wireless technology acceptance”, Journal of Management Information Systems, 22(3), 123-157. 40.Featherman, M. S. and Pavlou, P. A. (2003), “Predicting e-services Adoption: A Perceived Risk Facets Perspective”, International Journal of Human-Computer Studies, 59, 451-474. 41.Fogarty, J., Forlizzi, J. and Hudson, S.E. (2001), “Aesthetic information collages: generating decorative displays that contain information”, Proc. UIST 2001, ACM Press, 141-150. 42.Forsythe, S. M. and Shi, B. (2003), “Consumer Patronage and Risk Perceptions in Internet Shopping”, Journal of Business Research, 56, 867-875. 43.Fornell, C. and Larcker, F. (1981), “Evaluating Structural Equation Models with Unobservable Variables and Measurement Error,” Journal of Marketing Research, 18(1), 39-50. 44.Gao, Q., Dai, Y., Fan, Z. and Kang, R. (2010), “Understanding factors affecting Perceived sociability of social software”, Computers in Human Behavior, 26 (6), 1846-1861. 45.Gefen, D. (2000), “E-Commerce: The Role of Familiarity and Trust”, Omega: The International Journal of Management Science, 28(6), 725-737. 46.Ha, I., Yoon, Y., and Choi, M. (2007), “Determinants of adoption of mobile games under mobile broadband wireless access environment”, Information &; Management, 44(3), 276-286. 47.Hair, J. F., Black, B., Babin, B., Anderson, R. E., and Tatham, R. L. (2005), “Multivariate Data Analysis”, 6th ed., Prentice Hal. 48.Hair, J. F., Black, W.C., Babin, B. J., Anderson, R. E.A and Tatham, R. L. (2006), “Multivariate Data Analysis” , NJ: Pearson Education. 49.Hair, J. F., Black, B., Babin, B., and Anderson, R. E. (2010), “Multivariate Data Analysis: A Global Perspective (7th ed.)”, Prentice Hall. 50.Hasan, B. (2006), “Delineating the effects of general and system-specific computer self-efficacy beliefs on IS acceptance”, Information &; Management, 43 (5), 565-571. 51.Heijden, H.V.D. (2003), “Factors influencing the usage of websites: the case of a generic portal in The Netherlands”, Information &; Management, 40(6), 541-549. 52.Hofacker, C.F. (1998), Internet Marketing , NY: John Wiley &; Sons Inc. 53.Hoffman, D. L. and Novak, T. P. (1996), “Marketing in Hypermedia Computer-Mediated Environments: Conceptual Foundations”, Journal of Marketing, 60(3), 50-68. 54.Holzer, A. and Ondrus, J. (2011), “Mobile application market: A developer’s perspective”, Telematics and Informatics, 28, 22-31. 55.Hsu, C.L. and Lu, H.P. (2004), “Why do people play on-line games? An extended TAM with social influences and flow experience”, Inform management, 41(7), 853-868. 56.Hsu, C.L. and Lu, H.P. (2007), “Consumer Behavior in Online Game Communites: A Motivational Factor Perspective”, Computers in Human Behavior, 23, 1642-1659. 57.Hsu, C.L., Hsu, H.Y. and Lu, H.P. (2005), “An empirical study of the effect of perceived risk upon intention to use online applications”, Information Management &;Computer Security, 13(2), 106-120. 58.Hu, P.J., Chau, P.Y.K., Sheng, O.R.L. and Tam, K.Y. (1999), “Examining the Technology Acceptance Model Using Physician Acceptance of Telemedicine Technology”, Journal of Management Information Systems, 16(2), 91-112. 59.Igbaria, M., Iivari, J., and Maragahh, H. (1995), “Why do individuals use computer technology? A Finnish Case Study”, Information and Management, 29(5), 227-238. 60.Jacoby, J. and Kaplan, L. B. (1972), “The Components of Perceived Risk”, Proceedings of the Third Annual Conference, Ann Arbour, MI, Association for Consumer Research, 382-393. 61.Jarvenpaa, S. L. and Todd, P. A. (1996), “Consumer Reactions to Electronic Shopping on the World Wide Web”, International Journal of Electronic Commerce, 1(2), 59-88. 62.Jordan, P.W. (1998), “Human factors for pleasure in product use”, Applied Ergonomics, 29(1), 25-33. 63.Jöreskog, K. G. and Sörbom, D. (1993), “Structural Equation Modeling with the SIMPLIS Command Language”, New Jersey: Lawrence Erlbaum Associat. 64.Jőreskog, K. G. and Sőrbom, D. (1996), “LISREL 8 user reference guide”, Chicago, IL: Scientific Software International. 65.Kreijns, K., Kirschner, P. A., Jochems, W. and Buuren, H.V. (2007),“Measuring perceived sociability of computer-supported collaborative learning environments”, Computers &; Education, 49, 176-192. 66.Kurosu, M. and Kashimura, K. (1995),“Apparent usability vs. inherent usability” , CHI ’95 Conference Companion, 292-293. 67.Lai, J.Y. and Ulhas, K.R. (2012), “Understanding acceptance of dedicated e-textbook applications for learning”, The Electronic Library, 30(3),321-338. 68.Lederer, A.L., Maupin, D.J., Sena, M.P., and Zhuang, Y. (2000), “The Technology Acceptance Model and the world wide web”, Decision Support Systems, 29(3), 269-82. 69.Lee, J.S., Cho, H., Gay, G., Davidson, B., and Ingraffea, A. (2003), “Technology Acceptance and Social Networking in Distance Learning”, Educational Technology &; Society, 6(2), 50-61. 70.Lee, M.C. (2009), “Factors influencing the adoption of internet banking: An integration of TAM and TPB with perceived risk and perceived benefit”, Electronic Commerce Research and Applications, 8, 130-141. 71.Li, D.C. (2011), “Online social network acceptance: a social perspective”, Internet Research, 21(5), 562-580. 72.Liao, C., To, P.L., Liu, C.C., Kuo, P.Y., and Chuang, S.H. (2011), “Factors influencing the intended use of web portals”, Online Information Review, 35(2), 237-254. 73.Lim, Y., Kim, H. M., Kang, S., and Kim, T. H. (2011), “Recommendation Algorithm of the App Store by UsingSemantic Relations between Apps ” ,Communications in Computer and Information ScienceVolume ,151, 139-144. 74.Lin, J. C. C. and Lu, H. (2000), “Towards an understanding of the behavioral intention to use a Web Site”, International Journal of Information Management, 20 (3), 197-208. 75.Lopez-Nicolas, C., Molina-Castillo, F.J., and Bouwman, H. (2008), “An assessment of advanced mobile services acceptance: Contributions from TAM and diffusion theory models”, Information &;Management, 45(6), 359-364. 76.Lu, H. and Yeh, D.C. (1998), “Enterprise’s perceptions on business process re-engineering: a path-analytic model”, OMEGA International Journal of Management Science, 26(1), 17-27. 77.Luo, W. and Strong, D. (2000), “Perceived critical mass effect on groupware acceptance”, European Journal of Information Systems, 9(2), 91-103. 78.Magee, A. (2002), “Attitude-behaviour relationship”, 27. 79.Mattias E., Oskar J. and Mattias Ö. (2003), “Motorcycling and Social Interaction: Design for the Enjoyment of Brief Traffic Encounters”, in Proceedings of the 2003 International ACM SIGGROUP Conference on Supporting Group Work, Sanibel Island, Florida, 85-94. 80.Mak, B. L., and Sockel, H. (2001), “A Confirmatory Factor Analysis of IS Employee Motivation and Retention”, Information and Management, 38(5), 265-276. 81.Meharia, P. (2012), “Assurance on the reliability of mobile payment system and its effects on its use: an empirical examination”, Accounting and Management Information Systems, 11(1), 97-111. 82.Miyazaki, A. D. and Fernandez ,A. (2001), “Consumer Perceptions of Privacy and Security Risks for Online Shopping”, Journal of Consumer Affairs, 35(1), 27-44. 83.Moon, J.W. and Kim, Y.G. (2001), “Extending the TAM for a world-wide-web context”, Information &; Management, 38(4), 217-30. 84.Müller, R. M., Björn , K., and Martens, J. K. (2011), “A Comparison of Inter-Organizational Business Models of Mobile App Stores: There is more than Open vs. Closed”, Journal of Theoretical and Applied Electronic Commerce Research, 6,63-76. 85.Mulaik, S. A., James, L. R., Van Altine, J., Bennett, N., Lind, S. and Stilwell C.D. (1989), “Evaluation of Goodness-of-Fit Indices for Structural Equation Models”, Psychological Bulletin, 105, 430-445. 86.Nasri, W. and Charfeddine, L. (2012), “Factors affecting the adoption of Internet banking in Tunisia: An integration theory of acceptance model and theory of planned behavior”, The Journal of High Technology Management Research, 23 (1), 1-14. 87.Nunnally, J. C. (1978), “Psychometric Theory,” New York: Mcgraw-Hill. 88.Pathak, A., Hu, Y. C., and Zhang, M. (2012), “Where is the energy spent inside my app”? , Proceedings of the 7th ACM european conference on Computer Systems, 29-42. 89.Pence, H. E. (2011), “Smartphones, Smart Objects, and Augmented Reality”, The Reference Librarian, 52(1/2), 136-145. 90.Peter, J. P. and Tarpey, L. X. (1975), “Comparative Analysis of Three Consumers Decision Strategies”, Journal of Consumer Research, 2, 29-37. 91.Preece, J. (2001), “Sociability and usability in online communities: Determinants and measuring success”, Behaviour &; Information technology, 20(5), 347-356. 92.Preece, J. and Maloney, D. (2003), “Online communities: Focusing on sociability and usability”, The Human-Computer Interaction Handbook, 1,596-620. 93.Roselius, T. (1971), “Consumer Rankings of Risk Reduction Methods”, Journal of Marketing, 35, 56-61. 94.Rourke, L., Anderson, T., and Garrison, D. R. (1999), “Assessing Social Presence in Asynchronous Text-Based Computer Conferencing”, Journal of Distance Education, 14(2), 50-71. 95.Ryu, S., Ho, S.H., and Han, I. (2003), “Knowledge Sharing Behavior of Physicians in Hospitals”, Expert Systems with Applications, 25(1), 113-122. 96.Salisbury, W. D., Pearson, R. A., Pearson, A.W. and Miller, D.W. (2001), “Perceived Security and World Wide Web Purchase Intention”, Industrial Management &; Data Systems, 101, 165-176. 97.Schenkman, B.N. and Jonsson, F.U. (2000), “Aesthetics and preferences of web pages”, Behavior and Information Technology, 19(5), 367-377. 98.Sellers, M. (2006), “Designing the experience of interactive play”. In P. Vorderer &; J.Bryant (Eds), Playing video games—Motives, responses, and consequences (9-22). Mahwah, NJ: Lawrence Erlbaum Associates, Inc. 99.Segars, A.H. and Grover, V. (1993), “Re-examining Perceived Ease of Useand Usefulness: A Confirmatory Factor Analysis,” MIS Quarterly, 17(4), 17-25. 100.Shaoyi, L., Yuan, P.S., Huaiqing, W., and Ada, C. (1999), “The Adoption of Virtual Banking: an Empirical Study?” , International Journal of Information Management, 19, 63-74. 101.Shih, H.P. (2004), “Extended technology acceptance model of internet utilization behavior”, Information &; Management, 41(6), 719-729. 102.Shyu, S. H. P. and Huang, J. H. (2011), “Elucidating usage of e-government learning: a perspective of the extended technology acceptance model”, Government Information Quarterly, 28(4), 491-502. 103.Simmel, G. (1949), “The sociology of sociability”, American Journal of Sociology, 55,254-261. 104.Sledgianowski, D. and Kulviwat, S. (2009),“Using Social Network Sites: The Effects of Playfulness, Critical Mass and Trust in A Hedonic Context” , Journal of Computer Information Systems, 49(4),74-83. 105.Stone, R. N. and Gronhaug, K. (1993), “Perceived Risk: Further Considerations for the Marketing Discipline”, European Journal of Marketing, 27(3), 39-50. 106.Swaminathan, V., Elzbieta, L.W. and Bharat, P.R. (1999), “Browsers and Buyers in Cyberspace an Investigation of Factors Influencing Electronic Exchange” , Journal of Computer-Mediated Communication, 5(2). 107.Sztompka, P. (1999), “Trust A Sociological Theory”, Cambridge: Cambridge University Press. 108.Tan, S. J. (1999), “Strategies for reducing consumers’ risk aversion in Internet shopping”, Journal of Consumer Marketing, 16(2), 163-180. 109.Tao, Y.H., Cheng, C.J. and Sun, S. Y. (2009), “What Influences College Students to Continue Using Business Simulation Games? The Taiwan Experience”, Computers &;Education, 53(3), 929-939. 110.Teo, T.S.H., Lim, V.K.G. and Lai, R.Y.C. (1999), “Intrinsic and extrinsic motivation in internet usage”, OMEGA International Journal of Management Science, 27(1), 25-37. 111.Tractinsky, N. (1997), “Aesthetics and apparent usability: empirically assessing cultural and methodological issues”, ACM CHI Conference Proceedings on Human Factors in Computing Systems, 115-122. 112.Tractinsky, N., Katz, A.S., and Ikar, D. (2000), “What is beautiful is usable”, Interacting with Computers, 13(2), 127-145. 113.Tsou, C.W. and Liao, H. (2009), “Understanding computer-mediated communication usage: A perspective MSN services”, Advances in Consumer Research, VIII, 267-282. 114.Venkatesh, V. (2000), “Determinants of perceived ease of use: Integrating control, intrinsic motivation and emotion into the technology acceptance model”, Information Systems Research, 11(4), 342-365. 115.Venkatesh, V. and Davis, F. D. (2000), “A theoretical extension of the technology acceptance model: four longitudinal field studies”, Management Sciences, 46(2), 186-204. 116.Venkatesh, V., Morris, M.G., Davis, G. B. and Davis, F. D. (2003), “User Acceptance of Information Technology: Toward A Unified View”, MIS Quarterly, 27, 425-478. 117.Verhagen, T., Feldberg, F., Hooff, B. and Meents, S. (2009), “Understanding Virtual World Usage: A multipurpose model and empirical testing”, European Conference on Information Systems,17, 761-775. 118.Veryzer, R.W. and Hutchinson, J.W. (1998), “The influence of unity and prototypicality on aesthetic responses to new product designs”, Journal of Consumer Research, 24, 374-394. 119.Vijayasarathy, L. R. (2004),“Predicting Consumer Intentions to Use On-Line Shopping: The Case for an Augmented Technology Acceptance Model” , Information &; Management, 41(6), 747-762. 120.Wang, K. and Lin C.L.(2012),“The adoption of mobile value-added services: Investigating the influence of IS quality and perceived playful¬ness”, Managing Service Quality, 22, 184-208. 121.Wellman, B., Boase, J., Chen, W., Hampton, K., Diaz, I. and Miyata, K. (2003), “The social affordances of the Internet for networked individualism”, Journal of Computer Mediated Communication, 8(3), 222-228. 122.Wu, I. (2003), “Understanding senior management’s behavior in promoting the strategic role of IT in process reengineering: use of the theory of reasoned action”, Journal of information and management, 41, 1-11. 123.Wu, J.H. and Wang, S.C. (2005), “What Drives Mobile Commerce?: An Empirical Evaluation of the Revised Technology Acceptance Model”, Information &; Management, 42(5), 719-729. 124.Yang, K. (2012), “Consumer technology traits in determining mobile shopping adoption: An application of the extended theory of planned behavior”, Journal of Retailing and Consumer Services,19, 484-491. 125.Yu, J., Ha, I., Choi, M., and Rho, J. (2005), “Extending the TAM for a t-commerce”, Information &; Management, 42, 965-976. 三、參考網站 (一) 中文網站 1.104調查中心(2012),App熱潮不退 消費者最愛哪些App?,取自 http://www.104survey.com/faces/newportal/viewPoint.xhtml 2.APPS跨界交流協會(2012),什麼是App,取自 http://www.xapps.tw/whats-app 3.ETtoday新聞雲(2012),免費Apps暗藏大量隱私外洩陷阱會被跟蹤甚至截聽電話,取自 http://www.ettoday.net/news/20120229/28192.htm#ixzz2DEbeXdCo 4.中央社(2012),憂洩隱私 美手機用戶拒APP,取自: http://www.cna.com.tw/News/aOPL/201209060011.aspx 5.中央社(2013),App淘金樂風團隊圓夢,取自: http://www.cna.com.tw/News/aFE/201302160038-1.aspx 6.今日新聞網(2013),蘋果iPhone更注重性能而非「大螢幕」,取自: http://www.nownews.com/2013/04/24/12930203.htm#ixzz2VFR58ygA. 7.香港文匯報(2011),全民玩App成熟潮程式開發力潛無窮,取自: http://paper.wenweipo.com/2011/10/18/OT1110180012.htm 8.鉅亨網(2013),鉅亨看世界-手機攝影,取自: http://news.cnyes.com/Content/20130605/KH7Z0YXAKOVCY.shtml
9.新頭殼 Newtalk(2012),知名繪畫App 紅得快脫手也快,取自: http://tw.news.yahoo.com/%E7%9F%A5%E5%90%8D%E7%B9%AA%E7%95%ABapp-%E7%B4%85%E5%BE%97%E5%BF%AB%E8%84%AB%E6%89%8B%E4%B9%9F%E5%BF%AB-085149630.html 10.新浪網(2012),為什麼iOS應用比Android應用更好看,取自: http://m.digital.sina.com.hk/news/7/1227754.html 11.聯合報(2011),新聞辭典,App微型應用程式,取自http://udn.com/NEWS/NATIONAL/NATS2/6540934.shtml#ixzz1Vi9B7x00 12.聯合報(2012),App企劃,不可不知的App icon吸睛術,取自 http://mag.udn.com/mag/digital/storypage.jsp?f_MAIN_ID=320&;f_SUB_ID=2943&;f_ART_ID=427014 13.聯合新聞網(2013),憤怒鳥不玩了 Rovio推解謎新作Tiny Thief,取自: http://mag.udn.com/mag/digital/storypage.jsp?f_ ART_ID=454929#ixzz2VB7eY beB (二) 英文網站 1.American Dialect Society(2010),“App” 2010 Word of the Year, as voted by American Dialect Society, Available: http://www.americandialect.org/app-voted-2010-word-of-the-year-by-the-american-dialect-society-updated 2.ABI Research (2007), Apple iPhone is not a Smartphone ,Available: http://www.abiresearch.com/press/early-success-of-windows-based-tablets-has-everyth 3.BBC NEWS(2010), Symbian phone operating system goes open source, Available: http://news.bbc.co.uk/2/hi/technology/8496263.stm 4.Bloomberg Businessweek(2012),Before IPhone and Android Came Simon, the First Smartphone ,Available: http://www.businessweek.com/articles/2012-06-29/before-iphone-and-android-came-simon-the-first-smartphone 5.Gartner (2012a),IT Glossary Defining The IT Industry, Available: http://www.gartner.com/it-glossary/smartphone/
6.Gartner (2012b),The top 10 strategic technology trends for 2012, Available: http://www.gartner.com/it/page.jsp?id=1826214 7.Google blogs(2012), Google Play hits 25 billion downloads, Available: http://officialandroid.blogspot.tw/2012/09/google-play-hits-25-billion-downloads.html#!/2012/09/google-play-hits-25-billion-downloads.html 8.IDC(2012),Worldwide Mobile Phone Tracker, Available: http://www.idc.com/getdoc.jsp?containerId=prUS23771812 9.IHS iSuppli (2012), Smartphones to Take Over Lead in Cellphone Market Faster Than Expected, Available: http://www.isuppli.com/Mobile-and-Wireless-Communications/MarketWatch/pages/Smartphones-to-Take-Over-Lead-in-Cellphone-Market-Faster-Than-Expected.aspx 10.In-Stat (2011), There’s an App for That: Smartphone Application Market Overcrowded but Downloads Continue to Rise, Available: http://gadgets.tmcnet.com/topics/gadgets/articles/202230-in-stat-report-revenue-mobile-app-downloads-surpass.htm 11.Lightspeed(2012), Smartphone users a big difference,Available: http://www.brain.com.tw/Famous/FamousContent.aspx?ID=938 12.Localytics(2012), App Retention Increasing; iPhone Ahead of Android ,Available: http://www.localytics.com/blog/2012/app-user-loyalty-increasing-ios-beats-android/ 13.Malykhina, E. (2007) “Analysis: How Smartphone Platforms Compare: Business-technology buyer’s guide to the BlackBerry, Linux , Mac OS X, Palm, Symbian and Windows Mobile platforms” ,InformationWeek, Available: http://www.informationweek.com/analysis-how-smartphone-platforms-compar/196902226 14.research2guidance (2011), Android Market Insights Vol. 6, Available: http://www.biztechday.com/wp-content/uploads/2011/10/Android_Market_Insights_Sept2011.pdf 15.Wikipedia(2012a),Mobile app, Available: http://en.wikipedia.org/wiki/Mobile_app
16.Wikipedia(2012b),Mobile operating system, Available: http://en.wikipedia.org/wiki/Mobile_operating_system 17.Wikipedia(2012c),Android, Available: http://zh.wikipedia.org/wiki/Android 18.Wikipedia(2012d),IOS, Available: http://zh.wikipedia.org/wiki/IOS 19.Wikipedia(2012e),BlackBerry OS, Available: http://zh.wikipedia.org/wiki/BlackBerry_OS 20.Wikipedia(2012f),Symbian, Available: http://zh.wikipedia.org/wiki/Symbian 21.Wikipedia(2012g),Windows Phone, Available: http://zh.wikipedia.org/wiki/Windows_Phone
|