|
一 中文部分 1王璨槐、羅惠筠(1997):”我國大學生BBS族的人際關係初探”,《第二屆當前台灣社會與文化變遷學術研討會論文集》,頁19-62。 2江姿慧,1999,”使用者參與虛擬社群之行為研究”,國立台灣科技大學,碩士論文。 3李郁菁,2000,”影響虛擬社群成員忠誠度產生之因素探討”,國立中山大學,碩士論文。 4楊堤雅,1999,”網際網路虛擬成員之角色與溝通互動之探討”,國立中正大學,碩士論文。 5潘佳慧,1999,” 虛擬社群之經營模式-以美國線上公司為例”,國立台灣大學,碩士論文。 6黃俊英(2000),行銷研究,第八版,華泰書局。 7黃俊英(1998),多變量分析,第六版,華泰書局。 8黃厚銘(2001) ,〈真實的謊言:虛擬社區中的身分認同與信任〉,《第四屆資訊科技與社會轉型研討會論文》,南港:中央研究院社會學研究所。 9張紹勳(2000),研究方法,滄海書局。 10施能義、施純楨、柴雲清(1999),當代統計方法與應用,高立書局。 11陳怡珍譯(2001),社會科學的研究方法,台灣西書出版社。 12楊國樞、文崇一、吳聰賢、李亦園(1997),社會及行為科學研究法上下冊,東華,台北。 13吳明隆(2000),SPSS統計應用實務,松崗,台北。 14黃俊英(2000),行銷研究,第八版,華泰書局 二 英文部分 1.Amy Jo Kim .(2000). Community Building on the wes: secret stragogies for Successful pm-line Communities PEACHPIT press. 2.Anonymous.(1997). Keys to establishing trust in cyberspace; Business Review - Federal Reserve Bank of Philadelphia, Philadelphia; pg. 8, 2 pgs . 3.Armstrong, A., J. Hagel.(1995). “Real Profits From Virtual Communities”, The McKinsey Quarterly, Iss. 3, pp. 126-141 4.Armstrong, A., J. Hagel .(1996). “The Real Value Of On-Line Communities”, Harvard Business Review, Vol. 74, Iss. 3, pp. 134-141. 5.Beverly Goldberg.(1998). Is trust different in Cyberspace?; Executive Excellence, Provo; Vol. 15, Iss. 11; pg. 15, 2 pgs. 6.Bigley, G. A., and Pearce, J. L.(1999). “Straining for Shared Meaning in Organization Science: Problems of Trust and Distrust,” Academy of Management Journal, Vol. 23, No. 3, pp. 405-421. 7.Butler, J. K. (1991). "Toward understanding and measuring conditions of trust: Evolution of a conditions of trust inventory," Journal of Management, Vol. 17, No. 3, pp. 643-663. 8.Chaudhury, A., D. N. Mallick, H. R. Rao.(2001). “Web Channel In E-Commerce”,Association For Computing Machinery, Vol. 44, Iss. 1, pp. 99-104. 9.Cheryl Greenhouse.(1998). Trust in cyberspace; News Report - National Research Council (U.S.), Washington; Fall; Vol. 48, Iss. 3; pg. 5, 1 pgs 10.Comrey,A.L.(1973).A first course in factor analysis.New York :Academic Press. 11.Friedman, Batya, Kahn, Peter H, Howe, Daniel C.(2000). Trust Online. Communications of the ACM, December, Vol. 43, No. 12, pp. 34-40 12.Gorsuch,R,L.(1983).Factoranalysis.Hillsdale,NJ:Lawrence Erlbaum. 13.Couch, Laurie L and Jones, Warren H.(1997). Measuring Levels of Trust, Journal of Research in Personality, 31, pp. 319-336. 14.Graphics, Visualization, and Utilization Center.(1998). GVU’s WWW User Surveys,(www.gvu.gatech.edu) 15.Hafner, K. (1997). “Look Who’s Talking,” Newsweek, vol.129, iss.7, pp.44-45. 16.Halperin, Max, Blackwelder, William C., and Verter, Joel I.(1971).”Estimation of the Multivariate Logistic Risk Function:A Comparison of the Discriminant Function and Maximum Likelihood Approaches,”Journal of Chronic Diseases,24 pp125-158. 17.Handy, C. (1995). Trust and the virtual organization. Harvard Business Review, 73 (3), 40-50. 18.Hoffman, Donna L, Novak, Thomas P, and Peralta, Marcos.(1999) .Building Consumer Trust Online. Communications of the ACM, April, Vol. 42, No. 4 pp. 80-85. 19.Jarvenpaa, S. L., Knoll, K., & Leidner, D. E. (1998). Is anybody out there?: The implications of trust in global virtual teams. Journal of Management Information Systems, forthcoming. 20.Jarvenpaa, Sirkka L, Tractinsky , Noam.(1999). Consumer Trust in an Internet Store: A Cross-Cultural Validation. JCMC 5 (2),. http://www.ascusc.org/jcmc/vol5/issue2/jarvenpaa.html. 21.Joseph F. Hair, JR. et. Al.(1998).MULTIVARIATE DATA ANALYSIS(5th ed)New Jersey,Prentice-Hall. 22.Kaiser,H.F.(1974).An index of factorial simplicity. Psychometrika,39,31-36. 23.Karvonen, Kristiina.(1999).Enhancing Trust Online, Proceedings of PhDIT''99: Ethics in Information Technology Design. Second International Workshop on Philosophy of Design and Information Technology, 16-17 December, Saint-Ferréol, Toulouse, France 24.Ketelaar, Eric.(1997).Can We Trust Information? Intl. Inform. & Litr. Rev., 29, pp. 333-338 25.Lia Tung et al.(2001). An Empirical Investigation of Virtual communities and Trust.Twenty-Second International Conference on Information Systems. 26.Lewicki,R.J.and B.B.Bunker.(1995).Trust in relationships:A model of development and decline. In.B.B.Bunker , J.Z.Rubin,& Associates(Eds.),Conflict,Cooperation,and Justice:Essay Inspired by the Work of Morton Deutsch,pp.133-174,San Francisco:Jossey-Bass. 27.Mayer, R. C., Davis, J. H., and Schoorman, F. D.,(1995) “An Integrative Model of Organizational Trust,” Academy of Management Review, Vol. 20, No. 3, ,pp. 709-734. 28.Meyer, J. P., and Allen, N. J.(1984). “Testing A side Bet Theory of Organizational Commitment: Some Methodological Considerations,” Journal of Applied Psychology, Vol. 69, pp. 372-378. 29.McKnight, D.Harrison, Choudhury, Vivek, Kacmar, Charles.(1997). Trust in E-Commerce Vendors: A Two-Stage Model., pp. 532-536Nelson, Michael: Building Trust in Cyberspace, Intl.Inform. & Libr. Rev., 29, pp. 153-157 30.Mishra,A.k.(1996).Organizational responses to crisis:The centrality of trust. In R.M.Kramer and T.R.Tylar(Eds.),Trust in Organizations:Frontiers of Theory and Research,pp.261-287,Thousand Oaks,CA:Sage. 31.Nikander, Pekka, Karvonen, Kristiina.(2000). Users and Trust in Cyberspace, Cambridge Security Protocols Workshop, April 3-5, Cambridge University. To be published in the workshop proceedings at the Lecture Notes in Computer Science series, Springer. 32.Novak, T. P., D. L. Hoffman, Yiu-Fai Yung.(2000).“Measuring The Customer Experience In Online Environments: A Structural Modeling Approach”, Marketing Science, Vol. 19, Iss. 1, pp. 22-42 33.Palmer, J.W. et.al.(2000). The Role of Intermediaries in the Development of Trust on the WWW: The Use and Prominence of Trusted Third Parties and Privacy Statements. JCMC 5 (3) http://www.ascusc.org/jcmc/vol5/issue3/palmer.html 34.Parks, M. R., & Floyd, K. (1996). Making friends in cyperspace. Journal of Communication, 46, 80-97. Published simultaneously as Parks, M. R., and Floyd, K. (1996). Making friends in cyperspace [Online]. Journal of Computer-Mediated Communication,1(4).Available http://www.ascusc.org/jcmc/vol1/issue4/parks.html 35.Pearce, W. B. (1974). Trust in interpersonal communication. Speech Monographs, 41, August, 236-244. 36.Press S.J.and Wilson,s.(1978).Choosing Between Logistic Regression and Discriminant Analysis,Journal of American Statistical Association 73:364 699-705. 37.Rheingold, H.(1993).Virtual Community: Homesteading on the Electronic Frontier, Addison-Wesley, . 38.Rocco Elena.(1998). Trust Breaks Down in Electronic Contexts but Can be Repaired by Some Initial Face-to-Face Contact. Proceedings of CHI’98, April 18-23, pp. 496-502 39.Schoder, Detlef, Yin, Pai-Lin.(2000). Building firm trust online. Communications of the ACM, December, Vol. 43, No.12. 40.Shneiderman, Ben.(2000).Designing trust into online experiences. Communications of the ACM, December, Vol. 43, No. 12. 41.Stewart, Katherine J: Transference as a means of building trust in world wide web sites. 42.Truett, Jeanne, Cornfield, Jerome, and Kannel, William (1967).A Multivariate Analysis of the Risk of Coronary Heart Disease in Framingham, Journal of Chronic Diseases,20,511-524. 43.Williams,B. (1988).Formal structures and social reality.In D.Gambetta(Ed.),Trust:Making and Breaking of Cooperative Realtions,pp.3-13,Oxford,England:Blackwell. 三 網站部分 1.第一屆網路虛擬社區研討會 http://cindy.cis.nctu.edu.tw/MUD/96/index.html 2.第二屆網路虛擬社區研討會 http://cindy.cis.nctu.edu.tw/MUD/97/index.html 3.第三屆網路虛擬社區研討會 http://cindy.cis.nctu.edu.tw/MUD/99/papers/index.html 4.NUA Internet how many online www.nua.ie/surveys/how_many_online/index.html 5.番薯藤2001年台灣網路使用調查 http://survey.yam.com/ 6.http://www.netvalue.com
|