中文文獻:
吳俊毅,科技接受模型之實徵研究―從動機角度,國立中央大學資訊管理研究所碩士論文,2000年。林嵩荃,使用者對網站中間商付費意願知研究-以拍賣網站為例,國立彰化師範大學資訊管理學系碩士論文。2009年。孫思源、趙佩儒與詹淑敏。顧客對行動商務購物意願之影響因素-由安全及風險觀點探討。2009年。
張德祥、葉耕榕,行動商務之資訊科技服務品質探討,2016年。
張憶萍,遊客人格特質、從眾行為與旅遊紀念品消費決策型態關係之研究,南華大學旅遊事業管理研究所碩士論文,2012年。莊豐州,以科技接受模式探討國小教師使用多功能 e 化數位教室於教學之意向研究,國立屏東教育大學數位學習教學碩士學位學程,2011年國際電子商務發展趨勢,產業情報研究所(MIC)。2014年。
黃天佑、陳佩綺,以科技接受模式探討企業部落格品質與使用者參與行為之研究,國立屏東教育大學資訊科學系,2012年。
童淑冠,網路口碑影響從眾行為之研究,逢甲大學經營管理系碩士論文,2011年。馮炫竣,消費者使用電子銀行之行為研究—以ATM、電話銀行及網路銀行為例,元智大學管理研究所碩士論文,2000年。
蕭銘雄、鄭曉平,“以延伸式科技接受模型探討消費者線上投保人壽保險之意願”,電子商務,10(1),1-12,2008年。
LIFE,網址:https://life.tw/?app=view&no=315733,取自:(2018/5/6)
芋傳媒,網址:https://taronews.tw/2018/03/15/16407/,取自:(2018/5/7)
鉅亨網,網址:https://news.cnyes.com/news/id/3572753,取自:(2018/5/6)
中時電子報,網址:http://www.chinatimes.com/newspapers/20150303000216-260210,取自:(2018/6/19)
stock-ai,網址:https://stock-ai.com/eom-1-twB03C10.php,取自:(2018/6/11)
英文文獻:
Allsopp, L. and Hey, J. D. (2000), “Two Experiments to Test a Model of Herd Behaviour”, Experimental Economics, Vol.3, pp.121-136.
Anderson, L. R. (2001), “Payoff Effects in Information Cascade Experiments”, Economic Inquiry, Vol.39, No.4, pp.609-615.
Anderson, L. R. and Holt, C. A. (1996), “Classroom Games-Information Cascades”, Journal of Economic Perspectives, Vol.10, No.4, pp.187-193.
Asch, S. E. (1951), “Effects of Group Pressure upon the Modification and Distortion of Judgment”, In Guetzkow, H. ed., Groups, Leadership and Men, Pittsburgh, PA:Carnegie Press.
Assael, H. (1998), Consumer Behavior and Marketing Action (6th ed.), US: South-Western College Publishing.
Baird, I. S. & Thomas, H. (1985), “Toward a Contingency Model of Strategic Risk Taking”, The Academy of Management Review, Vol.10, No.2, pp.230-243.
Banerjee, A. (1992), “A Simple Model of Herd Behaviour,” Quarterly Journal of
Economics, CVII, pp.797-817.
Bauer, R. A. (1960), Consumer Behavior as Risk Taking, In Risk Taking and Information Handling in Consumer Behavior, Cambridge: Harvard University Press, pp.389-398.
Bettmen, J. R. (1973), “Perceived Risk and Its Components: A Model and Empirical Test”, Journal of Marketing Research, Vol.10, pp.184-190.
Bikhchandani, S., Hirshleifer, D. and Welch, I. (1992), “A Theory of Fads, Fashion, Custom, and Cultural Change as Informational Cascades,” Journal of Political Economy, Vol.100, No.5, pp.992-1026.
Cheong, J. H., & Park, M. C. (2005). “Mobile internet acceptance in Korea. Internet Research: Electronic Networking Applications and Policy”, Vol.15, No.2, pp.125-140
Clarke, I. (2001), “Emerging value propositions for M-commerce”, Journal of Business Strategies, Vol.18, No.2, pp.133-149.
Davis, F.D. (1986), A Technology Acceptance Model for Empirically Testing New End-User Information System: Theory and Results, Doctoral Dissertation, MIT Sloan School of Management, Cambridge, MA.
Davis, Fred D., Bagozzi, Richard P. and Warshaw, Paul R.(1989) , “User acceptance of computer technology: a comparison of two theoretical models”, Management Science, Vol.35, No.8, pp.982-1003.
Deutsch, M., & Gerard, H. B. (1955), “A study of normative and informational social influences upon individual judgment”, The journal of abnormal and social psychology, Vol.51, No.3, pp.629.
Dowling, G. R. & Staelin, R. (1994), “A Model of Perceived Risk and Intended Risk-handling Activity”, Journal of Consumer Research, Vol.21, pp.119-133
Forsythe, M. & Shi, W. (2003), “Understanding Consumers’ Behavior”, Journal of Business Research, Vol.56, pp.867-875.
Gunasekaran, A. and E. Ngai(2003), “Special Issue on Mobility Commerce(M-Commerce):Strategies, Technologies and Appliocations(MCSTA)”, Decision Support System.
Henderson, R. & Divett, M. J. (2003), Perceived Usefulness, Ease of Use and Electronic Supermarket Use, International Journal of Human-Computer Studies, Vol.59, pp.383-395.
Hsiao, C. H. & Hung, Y. C. (2004), The Study of Behavior Intention to Accept Mobile Commerce in Technology Acceptance Model, Unpublished master thesis, Tatung University.
Huck, S. and Oechssler, J. (2000), “Informational Cascades in the Laboratory: Do They Occur for the Right Reasons?”, Journal of Economic Psychology, Vol.21, pp.661-671.
Hung, A. A. and Plott, C. R. (2001), “Information Cascades: Replication and an Extension to Majority Rule and Conformity-rewarding Institutions”, American Economic Review, Vol.91, No.5, pp.1508-1520.
Jacoby, J. & Kaplan, L. B. (1972), The Components of Perceived Risk, in Advance in Consumer Research, Proceedings of 3ed Annual Conference, Association for Consumer Research, pp.382-393.
Kaplan, L. B. (1974), “Components of Perceived Risk in Product Purchase: A Cross-Validation”, Journal of Applied Psychology, Vol.59, No.3, pp.287-291
Kim, D. J., Ferrin, D. L., & Rao, H. R. (2009). “Trust and satisfaction, two stepping stones for successful e-commerce relationships: A longitudinal exploration”, Information Systems Research, Vol.20, No.2, pp.237-257.
Mitchell, V. W. & Greatorex, M. (1993), “Risk Perception And Reduction in The Purchase of Consumer Services”, Service Industries Journal, Vol.13, No.4, pp.179-200.
Peter, J. P. & Ryan, M. J. (1976), “An Investigation of Perceived Risk at the Brand Level”, Journal of Marketing Research, Vol.13, No.2, pp.184-188.
Sathye, M. (1999), “Adoption of Internet Banking by Australian Consumers: An Empirical Investigation”, International Journal of Bank Marketing, Vol.17, No.7, pp.324-334.
Siau, K., Ee-Peng Lim and Zixing Shen(2001), “Mobile Commerce: Promises, Challenges , and Research Agenda”, Journal od Database Management, pp.88-99.
Snyder, A. F., Mischel, W., & Lott, B. E. (1960), “Value, information, and conformity behavior1”, Journal of Personality, Vol.28, No.3, pp.333-341.
Stone, R. N. & Gronhaug, K. (1993), “Perceived Risk: Further Considerations for The Marketing Discipline”, European Journal of Marketing, Vol.27, Iss.3, pp.39-50.
Swaminathan, Vanitha, Elzbieta, L-W., & Bharat, P. R. (1999), “Browsers or Buyers in Cyberspace? An Investigation of Factors Influencing Electronic Exchange”, Journal of Computer-Mediated Communication, Vol.5, No.2
Tarasewich P., R. C. Nickerson and M. Warkentin(2002), “Issues in Mobile E-Commerce”, Communication of the Association for Information System, Vol.8, pp.41-64
Taylor, S. & Todd, P.A. (1995), “Understanding Information Technology Usage: A Test of Competing Models”, Information Systems Research, Vol.6, No.2, pp.144-176.
Vaidynathan, R. (2002), “Wireless and Mobility Enterprise Application Deployments”, eAI Journal, September, pp.26-28.