一、中文部份:
1.王志鈞,數位時代雙週,第149期,2007年。
2.王振浩,影響消費者採用網路銀行行為意向之因素研究,國立中央大學資訊管理研究所碩士論文,2001年。3.江怡慧、陳怡樺,「網路銀行使用者之行為分析」,產業金融,第107期,2000年6月。
4.卓慶龍,「網際網路之金融服務-以美國網路銀行為例」,台灣大學商學研究所碩士論文,1999年。5.周景弘,「網路銀行安全對使用者知覺風險與使用意願之影響」,台灣大學會研所碩士論文,1997年。6.林師模、陳苑欽,"多變量分析-管理上的應用",初版,2004年,雙業書廊。
7.柯憲榮、王秋丁,「銀行資訊系統之定位與發展」,台北銀行月刊,第二十九卷,第一期,1999年。
8.張仕明,網路銀行特性、知覺風險及使用意願之研究,文化大學國際企業管理研究所,2000年。9.曹嘉興、張秀華與黃申在,「台灣地區銀行業對電子商務的認知與採行現況研究」,第八屆國際資訊管理學術研討會論文集,1997年。
10.馮炫竣,消費者使用電子銀行之行為研究─以ATM、電話銀行與網路銀行為例,元智大學管理研究所碩士論文,2000年。11.葉其葳,網際網路對電子銀行服務影響之研究,中正大學財務金融研究所,1997年。二、英文部份:
1.Ajzen, I. (1985), “From Intention to Action: A Theory of Planned Behavior,” in Julius Kuhl and Jurgen Beckmann, ed., Action Control: From Cognition to Behavior, Heidelberg: Springer-Verlag.
2.Bandura, A. (1986), Social Foundations of Thought and Action: A Social Cognitive Theory, Prentice Hall, Englewood Cliffs, NJ.
3.Bauer, Raymond A. (1960), “Consumer Behavior as Risk Taking,” in R. S. Hancock, ed., Dynamic Marketing for a Changing World, Chicago: American Marketing Association, p. 389-393.
4.Compeau, D. R., and Higgins, C. A. (1995), “Computer Self-Efficacy: Development of a Measure and Initial Test,” MIS Quarterly, 19(2), pp. 189-211.
5.Cox, Donald F. ( 1967), “Risk Handling in Consumer Behavior — An Intensive Study of Two Cases,” in Donald F. Cox, ed., Risk Taking and Information Handling in Consumer Behavior, Boston: Harvard University Press, p. 34-81.
6.Cunningham, S. M. (1967), “The Major Dimension of Perceived Risk,” in Donald F. Cox, ed., Risk Taking and Information Handling in Consumer Behavior, Boston: Harvard University Press, p. 82-108.
7.Davis, Fred D., Richard P. Bagozzi and Paul R. Warshaw (1989), “User Acceptance of Computer Technology: A Comparison of Two Theoretical Model,” Management Science, 35(8), p. 982-1003.
8.Davis, F. D., Bagozzi, R. P., and Warshaw, P. R. (1992),“Extrinsic and Intrinsic Motivation to Use Computers in the Workplace,” Journal of Applied Social Psychology, 22(14), pp. 1111-1132.
9.Dowling, Grahame R. and Richard Staelin (1994), “A Model of Perceived Risk and Intended Risk-Handling Activity,” Journal of Consumer Research, 21(1), p. 119-134.
10.Fishbein, Martin and Ajzen, I. (1975), Belief, Attitude, Intention, and Behavior: An Introduction to Theory and Research, Reading, MA: Addison-Wesley.
11.Herbert, T. T. (1976). Dimensions of organizational behavior, New York: CollierMacmillan.
12.Kaiser, H. F. and Rice, J. (1974), “Little Jiffy Mark IV,” Educational and Psychological Measurement, 34 (Spring), 111-117.
13.Mitchell, V. W., and Greatorex, M. (1993) “Risk perception and reduction in the purchase of consumer services,” The Service Industries Journal (13:4), pp.179-200.
14.Moore, Gary C. and Izak Benbasat (1991), “Developmetn of an Instrument to Measure the Perceptions of Adoption an Information Technology Innovation,” Information Systems Research, 2(3), p. 192-222.
15.Nunnally, J. C.(1978), Psychometric Theory, New York: Mcgraw-Hill.
16.Rogers, Everett M. (1983), Diffusion of Innovations: Third Edition, New York: Free Press.
17.Rothman, J. L. (1989), Using Multivariate Statistics, 2nd ed, Harper & Row Inc..
18.Sathye, Milind (1999), “Adoption of Internet Banking by Australian Consumers: An Empirical Investigation,” International Journal of Bank Marketing, 17(7), p. 324-334.
19.Sneddon, Mark (1997), “Cyberbanking: Remote Banking Using the Internet,” Australian Business Law Review, 25(1), p. 64-67.
20.Taylor, Shirley and Peter A. Todd (1995a), “Decomposition and Crossover Effect in the Theory of Planned Behavior: A Study of Consumer Adoption Intentions,” International Journal of Research in Marketing, 12(2), p. 137-155.
21.Swaminathan, Vanitha, Elzbieta Lepkowska-White and Bharat P. Rao (1999), “Browsers or Buyers in Cyberspace? An Investigation of Factors Influencing Electronic Exchange,” Journal of Computer-Mediated Communication, 5(2), Accessed April 6, 2001.
22.Thompson, R. L., Higgins, C. A., and Howell, J. M.(1991) "Personal Computing: Toward a Conceptual Model of Utilization," MIS Quarterly (15:1), pp. 124-143.
23.Triandis, H. C.(1977), Interpersonal Behavior, Brooke/ Cole, Monterey, CA.
24.Vallerand, R. J.(1997), “Toward a Hierarchical Model of Intrinsic and Extrinsic Motivation,” in Advances in Experimental Social Psychology (29), M. Zanna (ed.), Academic Press, New York, pp. 271-360.
25.Venkatesh, V. , And Davis, F.D. (2000), “A Theoretical Extension of the Technology Acceptance Model: Four Longitudinal Field Studies,” Management Science, 46(2), pp. 184-204.
26.Venkatesh, V., M.G., Morris, G.. B. Davis and F. D. Davis(2003), "User Acceptance of Information Technology: Toward A Unified View," MIS Quarterly,27,425-478.
27.Venkatesh, V., and Morris, M. G., “Why Don’t Men Ever Stop to Ask For Directions? Gender, Social Influence, and Their Role in Technology Acceptance and Usage Behavior,” MIS Quarterly, 24(1), 2000, pp. 115-139.
三、網站部份:
1.104市調中心,「網路銀行使用行為調查」, http://www.104survey.com/,2007年。
2.財團法人台灣網路資訊中心,「台灣寬頻網路使用調查」報告,http://www.twnic.net.tw/,2008年。
3.創市際市場研究顧問公司,「台灣地區金融服務使用行為調查」,http://www.insightxplorer.com/index.html,2007年。
4.資策會資訊市場情報中心,「資策會MIC研究報告」,http://mic.iii.org.tw/intelligence/,2006年。
5.優仕網,http://www.youthwant.com.tw/。