[1]Abad Peiro, J.L., Asokan, N., Steiner, M., & Waidner, M. (1998). Designing a generic payment service. IBM Systems Journal, 37 (1), 72-88.
[2]Ainsworth, K. (2000, November 8). Non-repudiation: simple to understand - difficult to implement. Information Security Reading Room, SANS Institute. Retrieved December 2, 2001, from the World Wide Web: http://rr.sans.org/covertchannels/non-repudiation.php
[3]Asokan, N., Herreweghen, E.V., & Steiner, M. (1998, September 3). Towards a framework for handling disputes in payment systems. Third Usenix Workshop on Electronic Commerce, Boston, Mass., 187-202.
[4]Asokan, N., Schunter, M., & Waidner, M. (1997) Optimistic protocols for fair exchange. In T. Matsumoto (Ed.), 4th ACM Conference on Computer and Communications Security, 6, ACM Press, Zurich, Switzerland, 8-17.
[5]Baker, C.R. (1999). An analysis of fraud on the Internet. Internet Research, 9 (5), 348-359.
[6]Ben-Or, M., Goldreich, O., Micali, S., & Rivest, R. (1990). A fair protocol for signing contracts, IEEE Transaction on Information Theory, 36 (1), 40-46.
[7]Burdett, D. (2000, April). Internet Open Trading Protocol (V1.0) (RFC 2801). IETF, Network Working Group.
[8]Coffee, T., & Saidha, P. (1996). Non-repudiation with mandatory proof of receipt. Computer Communication Review, 26 (1), 6-17.
[9]Coppel, J. (2000, June 30) E-Commerce: Impacts and challenges. Economics Department Working Papers No. 252, OECD.
[10]Cowie, A.P. (chief editor) (1989). Oxford Advanced Learner’s Dictionary. Oxford University Press.
[11]Dierks, T., & Allen, C. (1999, January). The TLS protocol (V1.0) (RFC 2246). IETF, Network Working Group.
[12]Eurostat. (2002, July). E-Commerce in Europe: Results of the pilot surveys carried out in 2001. European Commission.
[13]Freier, A.O., Karlton, P., & Kocher, P.C. (1996, November 18). The SSL protocol (V3.0). Netscape Communications Corporation.
[14]Gärtner, F., Pagnia, H., & Vogt, H. (1999). Approaching a formal definition of fairness in electronic commerce. Proceeding of the 18th IEEE Symposium, 354-359.
[15]Herreweghen, E.V. (2000, February). Non-repudiation in SET: Open issues. Proceedings of the 4th Conference on Financial Cryptography, Anguilla, British West Indies, 140-156.
[16]ISO/IEC JTC 1. (1996). Information technology—open systems interconnection—security frameworks for open system: Overview (ISO/IEC 10181-1).
[17]ISO/IEC JTC 1. (1997a). Information technology—open systems interconnection—security frameworks for open system: Non-repudiation framework (ISO/IEC 10181-4).
[18]ISO/IEC JTC 1. (1997b). Information technology—security techniques—Non-repudiation—Part 1: General (ISO/IEC 13888-1).
[19]ISO/IEC JTC 1. (1998). Information technology—security techniques—Non-repudiation—Part 2: Mechanisms using symmetric techniques ( ISO/IEC 13888-2).
[20]ISO/IEC JTC 1. (1997c). Information technology—security techniques—Non-repudiation—Part 3: Mechanisms using asymmetric techniques (ISO/IEC 13888-3).
[21]Hwang, J.J., Shao, M.H., & Wu, S. (2003, May 26-28). Establishing Chain of Evidence as a Base for Non-repudiation Services. In P. Samarati & S. Katsikas (Eds.), Information Security and Privacy in the Age of Uncertainty, 18th IFIP International Information Security Conference, Athens, Greece, Kluwer.
[22]Kremer, S., & Markowitch, O. (2000). Optimistic non-repudiable information exchange. In J. Biemond (Ed.), 21st Symposium on Information Theory in the Benelux, Werkgemeenschap Informatie-en Communicatietheorie, Enschede, Wassenaar, 139-146.
[23]Liang, T.P., & Lai, H.J. (2002). Effect of store design on consumer purchases: An empirical study of on-line bookstores. Information & Management, 39 (6), 431-444.
[24]Markowitch, O., & Roggeman, Y. (1999). Probabilistic non-repudiation without trusted third party, Second Conference on Security in Communication Networks ’99, Amalfi, Italy.
[25]Min-Hua Shao, Jing-Jang Hwang, & Soushan Wu. A transactional-cycle approach to evidence management for disputes resolution. Information & Management, to appear.
[26]Ngai, E.W.T., & Wat, F.K.T. (2002). A literature review and classification of electronic commerce research. Information & Management, 39 (5), 415-429.
[27]Pfitzmann, B., & Waidner, M. (1996, June 5). Properties of payment systems: general definition sketch and classification. IBM Research Report RZ 2823 (#90126), 1-28.
[28]Ranganathan, C., & Ganapathy, Shobha. (2002). Key dimensions of business-to-consumer web sites. Information & Management, 39 (6), 457-465.
[29]Sherif, M.H. (2000). Protocols for secure electronic commerce. CRC Press, United States of America.
[30]Tedrick, T. (1983-1984). How to exchange half a bit. In D. Chaum (Ed.), Advances in Cryptology: Proceedings of Crypto 83, Plenum Press, New York, 147-151.
[31]Tedrick, T. (1985). Fair exchange of secrets. In G.R. Blakley & D.C. Chaum (Ed.), Advances in Cryptology: Proceedings of Crypto 84, Lecture Notes in Computer Science, 196, 434-438.
[32]The Nando Times. (2001, March 6). Technology: Amazon.com shares soar on report of Wal-Mart alliance. Nando Media. Retrieved March 7, 2001, from the World Wide Web: http://archive.nandotimes.com/technology/story/ 0,1643,500460069-500700675-503812310-0,00.html
[33]Thomas, S.A. (2000). SSL & TLS essentials: Securing the web. John Wiley & Sons, Inc., United States of America.
[34]Tygar, T.D. (1998, April/May). Atomicity in electronic commerce. Mixed Media, 32-43.
[35]van den Heuvel, E. (2001, June 12). Online dispute resolution as a solution to cross-border e-disputes: an introduction to ODR. Public comments and articles related to online ADR, OECD. Retrieved Nonvember 1, 2001, from the World Wide Web: http://www.oecd.org/pdf/M00001000/M00001592.pdf
[36]Visa International and MasterCard International. (eds.). (1997, May 31). SET Secure Electronic Transaction Specification: Business Description, V. 1.0, Book 1. Retrieved March 10, 1999, from the World Wide Web: http://www.setco.org/download.html#spec
[37]Visa International and MasterCard International. (eds.). (1997, May 31). SET Secure Electronic Transaction Specification: Programmer's Guide-System Design Considerations, V.1.0, Part 1, Book 2. Retrieved March 10, 1999, from the World Wide Web: http://www.setco.org/download.html#spec
[38]Visa International and MasterCard International. (eds.). (1997, May 31). SET Secure Electronic Transaction Specification: Programmer's Guide-Payment System, v.1.0, Part 3, Book 2. Retrieved March 10, 1999, from the World Wide Web: http://www.setco.org/download.html#spec
[39]Visa International and MasterCard International. (eds.). (1997, May 31). SET Secure Electronic Transaction Specification: Programmer's Guide Appendices, v.1.0, Part 4, Book 2. Retrieved March 10, 1999, from the World Wide Web: http://www.setco.org/download.html#spec
[40]Welch, T. (1999). Handbook of information security management. In M. Krause and H.F. Tipton (Eds.), Boca Raton, Fla.: Auerbach.
[41]Wolverton, T. (2001, March 5). Hack at Amazon-owned service exposes thousands. CNET News.com. Retrieved November 21, 2002, from the World Wide Web: http://news.com.com/2100-1017-253601.html?legacy=cnet&tag=lh
[42]You, C.H., Zhou, J., & Lam, K.Y. (1998). On the efficient implementation of fair non-repudiation. Computer Communication Review, 28 (5), 50-60.
[43]Zhang, N., & Shi, Q. (1996). Achieving non-repudiation of receipt. The Computer Journal, 39 (10), 844-853.
[44]Zhou, J., Deng, R., & Bao, F. (1999). Evolution of fair non-repudiation protocol. Australasian Conference of Information Security and Privacy, Lecture Notes in Computer Science, 1587, Springer, Berlin, 258-269.
[45]Zhou, J., & Gollmann, D. (1996). A fair non-repudiation protocol. Proceedings of 1996 IEEE Symposium on Security and Privacy, 51-61.
[46]Zhou J., & Gollmann, D. (1997). An efficient non-repudiation protocol. Proceedings of 10th IEEE Computer Security Foundations Workshop, 126-132.
[47]賴香菊,(民89年),網路行銷。在電子商務理論與實務(梁定澎主編,頁273-323)。臺北市:華泰。
[48]聯合信用卡中心,(民89年4月5日),電子商務市場報導:網際網路信用卡交易。於民國89年6月30日,由http://www.nccc.com.tw/plan/news/ newsg3.htm取得
[49]李宜玲,(民89年5月31日),網路購物糾紛頻傳 發卡銀行吃不消,電子商務時報。於民國89年7月18日,由http://www.ectimes.org.tw/searchshow.asp?id=1367&freetext=&subject=網路購物糾紛 取得。
[50]陳世運,(民89年11月14日),我國B2C電子商務發展的障礙,資策會電子商務應用推廣中心。
[51]黃景彰、邵敏華、吳壽山,(民92年1月),解析及建立電子商務中價值移轉週期的證據責任鏈,資訊管理學報,9 (2),109-128。[52]黃景彰、沈曉芸,(民91年1月), 電子商業交易的爭議解決機制,資訊管理學報,8 (2),107-119。