參考文獻
中文文獻
朱柏松(1989),「隱私權概念之衍變及其損害防止立法之動向」,法學叢刊,34卷2期,89-102頁。余德正(1999),「不法使用網際網路之刑事責任」,東海大學法律學研究所碩士論文。吳懿婷譯(2001),隱私的權利(The Right to Privacy),商周出版,206-207頁。
沙依仁(1993),人類行為與社會環境,台北:五南書局。
李茂興、徐偉傑譯(1998),社會學:全球性的觀點,台北:弘智書局。(Joan Ferrante 原著)
李震山(1997),「論資訊自決權」,現代國家與憲法一李鴻禧教授六秩華誕祝壽論文集,715頁。
林雅惠(2004),「資訊隱私權之重塑-以行動商務為例」,科技法律評論,一卷一期,93-122頁。
羅豐良(2001),「社會控制對兒童偏差行為影響之研究」,中國文化大學兒童福利研究所碩士論文。邱皓政(2003),結構方程模式:LISREL的理論、技術與應用,台北:雙葉書廊。
邱惠雯(2002),「網際網路使用行為之限制─從隱私權保護觀之探討」,國立中正大學犯罪防治研究所碩士論文。
紀佳伶(1999),「電子化/網路化政府資訊內容隱私權之研究」,國立政治大學公共行政研究所碩士論文。翁岳生等(1985),「資訊立法之研究」,行政院研究發展考核委員會編印。
張柏東、劉明岩(2005),「介聘電腦遭入侵案 關心女友調動 國小教師扮駭客」,聯合報,2005/6/4。
許孟祥、郭峰淵(2001),「電腦倫理效能對電腦偏差行為之影響:以盜版軟體為例」,管理學報,十八卷一期,23-47頁。許孟祥、郭峰淵、林杏子、朱彩馨、游佳萍(2001),「個人資訊隱私:倫理效能之量表的發展與驗證」,中山管理評論,九卷三期,373-394頁。費孝通(1948),鄉土中國,上海:觀察社(香港鳳凰出版社重印)
馮震宇、劉志豪(1998),「我國網路犯罪類型及案例探討」,月旦法雜誌,41期,84頁。
楊國樞(1992),「中國人的社會取向:社會互動的觀點」,中國人的心理與行為1992-理念與方法篇,台北:桂冠圖書公司。
廖緯民(1996),「論資訊時代的隱私權保護--以資訊隱私權為中心」,資訊法務透析,22頁。郭石城,「廿萬筆考生資料外流 買賣資料者五萬元交保 蘇犯案時未成年 移少年法庭」,中國時報,2005/04/26。
劉靜怡(2001),「網路上資訊隱私權保障問題之研究」,二十一世紀,63期,17-27頁。
蕭美惠譯(1999),透明社會—個人隱私vs 資訊自由,先覺出版社出版,16頁。(David Brin著)
蕭愛貞(1999),「網際網路犯罪之責任內涵-兼論網路服務業者之責任」,輔仁大學法律學研究所碩士論文。簡榮宗(1998),網路上資訊隱私權保護問題之研究,東吳大學法律研究所碩士論文。英文文獻
Adams, J.S.(1965), “Inequity in Social Exchange,” Advances in Experimental Social Psychology, 2, 267-299.
Aday, D.P.(1990), Social Control at the Margin, NY: A Division of Wadsworth, Inc.
Agranoff, M.H.(1991), “Controlling the Threat to Personal Privacy: Corporate Policies Must Be Created,” Journal of Information Systems Management, 8, 48-52.
Ajzen, I.(2002), “Perceived Behavioral Control, Self-Efficacy, Locus of Control, and the Theory of Planned Behavior,” Journal of Applied Social Psychology, 32, 665-683.
Ajzen, I.(1991), “The Theory of Planned Behavior,” Organizational Behavior and Human Decision Process, 50, 179-211.
Ajzen, I.(1989), “Attitude Structure and Behavior,” in Attitude Structure and Function, A.R. Pratkanis, S.J. Breckler, and A.G. Greenwald (Ed.), NJ: Lawrence Erlbaum Associates.
Ajzen, I., and Madden, T.J. (1986), “Prediction of Goal-Directed Behavior: Attitudes, Intentions and Perceived Behavioral Control,” Journal of Experimental Social Psychology, 42, 426-435.
Ajzen, I.(1985), “From Intentions to Actions: A Theory of Planned Behavior.” in Action-Control: from Cognition to Behavior, Heidelberg: Springer.
Ajzen, I. and Fishbein, M.(1980), Understanding Attitudes and Predicting Social Behavior, NJ: Prentice-Hall.
Ajzen, I. and Fishbein, M., (1977), “Attitude-Behavior Relations: A Theoretical Analysis and Review of Empirical Research,” Psychological Bulletin, 84(5), 888-918.
Akers, R.L.(1994), Criminological Theories: Introduction and Evaluation, LA: Roxbury.
Akers, R.L.(1985), Deviant Behavior: A Social Learning Approach, 3rd(Ed), CA: Wadsworth.
Akers, R.L.(1973), Deviant Behavior: A Social Learning Approach, CA: Wadsworth.
Anderson, J.C., and Gerbing, D.W.(1988), “Structural Equation Modeling in Practice: A Review and Recommended Two-Step Approach,” Psychological Bulletin, 103, 453-60.
Association of British Insurers(2000), “Future Crime Trends in the United Kingdom,” General Insurance Research Report No.7, <http://www.abl.org.uk>,
(Accessed April 10, 2005).
Bagozzi, R.P., and Yi, Y. (1988), “On the Evaluation of Structural Equation Models,” Academy of Marketing Science, 16(1), 74-94.
Bandura, A.(1997), Self-Efficacy: the Exercise of Control, NY: W. H. Freeman.
Bandura, A. and Jourden, F.G.(1991), “Self-Regulatory Mechanisms Governing the Impact of Social Comparison on Complex Decision Making,” Journal of Personality and Social Psychology, 60(6), 941-951.
Bandura, A.(1986), Social Foundations of Thought and Action: A Social Cognitive Theory, NY: Prentice-Hall.
Bandura, A.(1982), “Self-Efficacy Mechanism in Human Agency,” American Psychologist, 37(2), 122-147.
Bandura, A.(1977), Social Learning Theory, NJ: Prentice-Hall.
Bachman, R., Paternoster, R. and Ward, S.(1982), “The Rationality of Sexual Offending: Testing A Deterrence/Rational Choice Conception of Sexual Assault,” Law and Society Review, 26, 343-372.
Banerjee, D., T.P. Cronan, and T.W. Jones(1998), “Modeling IT Ethics: A Study Of Situational Ethics,” MIS Quarterly, 22(1), 31–60.
Baumgartner, H., and Homburg, C.(1996), “Applications of Structural Equation Modeling in Marketing and Consumer Research: A Review,” International Journal of Research in Marketing, 13, 139-61.
Becker, H. S. (1963), Outsiders: Study in the Sociology of Deviance, NY: Free Press.
Benda, B.B. and Corwyn, R.F.(1996), “Testing a Theoretical Model of Adolescent Sexual Behavior Among Rural Families in Poverty,” Child and Adolescent Social Work Journal, 13, 469-494.
Bock, G.W., R.W. Zmud, Y.G. Kim, and J.N. Lee(2005), “Behavioral Intention Formation in Knowledge Sharing: Examining the Roles of Extrinsic Motivators, Social-Psychological Forces, and Organizational Climate,” MIS Quarterly, 29(1), 87-111.
Bommer, M., C. Gratto, J. Gravander, and M. Tuttle(1987), “A Behavioral Model of Ethical and Unethical Decision Making,” Journal of Business Ethics, 6(4), 265–281.
Browne, M. W. and Cudeck, R. (1993) “Alternative Ways of Assessing Model Fit,” in Testing Structural Equation Models, Kenneth Bollen and J. Scott Long, (Eds.), Sage Publications, Newbury Park, CA, 136-192.
Chang, M.K.(1998), “Predicting Unethical Behavior: A Comparison of the Theory of Reasoned Action and the Theory of Planned Behavior,” Journal of Business Ethics, 7(16), 1825-1834.
Chin, W.W.(1998), “Issues and Opinion on Structural Equation Modeling,” MIS Quarterly, 22(1), 7-16.
Christensen, A. and Eining, M.(1991), “Factors Influencing Software Piracy: Implications for Accountants,” Journal of Information Systems, 5(1), 67-80.
Clarke, R.(1999), “International Privacy Concerns Confirm the Case for Intervention,” Communications of the ACM, 42, 60-67.
Clarke, R. and Cornish, D.(2000), “Rational Choice,” in R. Paternoster and R. Bachman (Ed), Explaining Crime and Criminals: Essays in Contemporary Criminological Theory, LA: Roxbury Publishing Company.
Cloward, R.A., and Ohlin, L.E.(1960). Delinquency and opportunity, NY: The Free Press.
Cohen, L.E. and Kleugel, J.R.(1978), “Determinants of Juvenile Court Dispositions,” American Sociological Review, 43, 162-177.
Cohen, S., and Scull, A.(1983), “Social Control in History and Sociology,” Social control and the state, Martin Robertson and Company Ltd.
Compeau, D.R. and Higgins, C.A.(1995), “Computer Self-Efficacy: Development of A Measure and Initial Test,” MIS Quarterly, 19(2), 189-211.
Cornish, D.B. and Clarke, R.V.(1986), The Reasoning Criminal: Rational Choice Perspectives on Offending, NY: Springer-Verlag.
Cornish, D. and Clarke. R.(1987), “Understanding Crime Displacement: An application of Rational Choice Theory,” Criminology, 25, 933-947.
Cortese, A. (1990), Ethnic Ethics: The Restructuring of Moral Theory, NY: State University of New York Press.
Cullen, F.T. and Agnew, R.(2002), Criminological Theory: Past to Present, 2nd(Ed), LA: Roxbury Publishing Company.
DeConick, J.B. and Lewis, W.F. (1997), “The Influence of Deontological and Teleological Considerations and Ethical Climate on Sales Managers’ Intentions to Reward or Punish Sales Force Behavior,” Journal of Business Ethical, 16, 497-506.
Dejoie, R., G. Fowler, and D. Paradice(1991), Ethical Issues in Information Systems, MA: Boyd and Fraser publishing company.
Durkeim, E.(1893), The Division of Labor in Society, NY: Free Press. (Reprinted and translated, 1933)
Empey, L.T.(1983), American Delinquency: Its meaning and construction, IL: Dorsey.
Eining, M.M. and Christensen, A.L.(1991), “A Psycho-Social Model of Software Piracy: The Development and Test of A Model,” in: R. Dejoie, G. Fowler, D. Paradice (Eds.), Ethical Issues in Information Systems, MA: Boyd and Fraser.
Fishbein, M. and Ajzen, I.(1975), Beliefs, Attitude, Intentions and Behavior: An Introduction to theory and Research, MA: Addition-Wesley.
Flannery, B. L. and May, D. R. (2000), “Environmental Ethical Decision Making in the U.S. Metal-Finishing Industry,” Academy of Management Journal, 43(4), 642-663.
Gattiker, U. E. and Kelley, H. (1999), “Morality and Computers: Attitudes and Differences in Moral Judgments,” Information Systems Research, 10(3), 233-254.
Goodman, M.(2001), “Making Computer Crime Count,” FBI Law Enforcement Bulletin, 70(8), 10-17.
Gordon, S. and Ma, Q.(2003), “Convergence of Virus Writers and Hackers: Fact or Fantasy?” Symantec Security Response, http://www.symantec.com, (Accessed March 28, 2005).
Gormley, K. (1992), One Hundred Years of Privacy, Wisconsin Law Review, 1335-1408.
Gottfredson, M.R. and Hirschi, T.(1990). A general theory of crime, CA: Stanford University Press.
Gowthorpe, C., J. Blake, and J. Dowds(2002), “Testing the Bases of Ethical Decision-Making: A Study of the New Zealand Auditing Profession,” Business Ethics: A European Review, 11(2), 143-156.
Grasmick, H.G. and Bursik, R.J.(1990), “Conscience, Significant Others, and Rational Choice: Extending the Deterrence Model,” Law and Society Review, 24, 835-861.
Greenberg, J.(1989), “Cognitive Re-Evaluation of Outcomes in Response to Underpayment Inequity,” Academy of Management Journal, 32, 174-184.
Hansen, T., J.M. Jensen, and H.S. Solgaard(2004), “Predicting Online Grocery Buying Intention: A Comparison of the Theory of Reasoned Action and the Theory of Planned Behavior,” International Journal of Information Management, 24(6), 539-550.
Hair, J.F., Anderson, R.E., Thatham, R.L., and Black, W.C. (1998), Multivariate Data Analysis, Fifth Edition, NJ: Prentice-Hall.
Hatcher M., J. McDannell, and S. Ostfeld(1999), “Computer Crimes,” The American Criminal Law Review, 36(3), 397-444.
Hill, T., N.D. Smith, and M.F. Mann(1987), “Role of Efficacy Expectations in Predicting the Decision to Use Advanced Technologies: The Case of Computers,” Journal of Management, (16), 337-313.
Ho, M. K. (1987). Family Therapy with Ethnic Minorities. CA: Sage.
Hsu, M.H. and Kuo, F.Y.(2003a), “An Investigation of Volitional Control in Information Ethics,” Behavior and Information Technology, 22(1), 53-63.
Hsu, M.H. and Kuo, F.Y.(2003b), “The Effect of Organization-Based Self-Esteem and Deindividuation on Protecting Personal Information Privacy,” Journal of Business Ethics, 42(4), 305-321.
Hsu, F.L.K.(1971), “Psychological Homeostasis and Jen: Conceptual Tools for Advancing Psychological Anthropology,” American Anthropologist, 73, 23-44.
Hirschi, T.(1969), American Delinquency: Its Meaning and Construction, IL: Dorsey.
Hunt, S. D. and Vitell, S. J., (1986), “A General Theory of Marketing Ethics,” Journal of Macromarketing, 6(1), 5-16.
Hunt, S.D. and Vasquez-Parraga, A.Z. (1993), “Organization Consequences, Marketing Ethics, and Sales Forces Supervision,” Journal of Marketing Research, 30, 78-90.
Huseman, R.C., Hatfied, J.D., and Miles, E.D.(1987), “A New Perspective on Equity Theory: the Equity Sensitivity Construct,” Academy of Management Review, 20, 222-234.
Hwang, K.K. (1987), “Face and Favor: the Chinese Power Game,” American Journal of Sociology, 92, 944-974.
Inness, J.C.(1992), Privacy, Intimacy, and Isolation, Oxford University Press.
Jeffery, C.C.(1972), “The Historical Development of Criminology,” in H. Mannheim,(Ed.), Pioneers in Criminology, NJ: Patterson Smith, 458-498.
Jeffery, C.C.(1956), “The Structure of American Criminological Thinking,” Journal of Criminal Law, Criminology, and Police Science, 46, 658-672.
Jöreskog, K.G. and Sörbom, D. (1989), LISREL 7: A Guide to the Program and Applications. Chicago: SPSS Inc.
Kohlberg, L. (1984), Essays on Moral Development, II: The Psychology of Moral Development, San Francisco: Harper & Row.
Kreie, J. and Cronan, T.P.(1998), “Judging What Is Ethical or Unethical: There Are Differences Between Men and Women,” Communications of the ACM, 41 (9), 70–76.
Laudon, K.C. and Laudon, J.P.(2000), Management Information Systems: New Approaches to Organization and Technology, NJ: Prentice-Hall.
Lemert, E.(1951), Social pathology, NY: McGraw-Hill.
Leonard, L.N.K., T.P. Cronanb, and J. Kreiec(2004), “What Influences IT Ethical Behavior Intentions-Planned Behavior, Reasoned Action, Perceived Importance, or Individual Characteristics?” Information and Management, 42, 143–158.
Liska, A.E.(1992), “Social Control,” in Borgatta, E.F. and Borgatta, M.L. (Eds.), Encyclopedia of Sociology. NY: Macmillan Publishing Company.
Little, C.B.(1995), Deviance and control, IL: F.E. Peacock.
Loch, K.D. and Conger, S.(1996), “Evaluating Ethical Decision Making and Computer Use,” Communications of the ACM., 39(7), 74-83.
Lwin, M.O. and Williams, J.D.(2003), “A Model Integrating the Multidimensional Developmental Theory of Privacy and Theory of Planned Behavior to Examine Fabrication of Information Online,”.Marketing Letters, 14(4), 257-272.
Manstead, A.S.R. and Eekelen, S.A.M. van(1998), “Distinguishing Between Perceived Behavioral Control and Self-Efficacy in the Domain of Academic Achievement Intentions and Behaviors,” Journal of Applied Social Psychology, 28(15), 1375-1392.
Marsh, H. W.(1994), “Confirmatory Factor Analysis Models of Factorial Invariance: A Multifaceted Approach,” Structural Equation Modelling, 1(1), 5-34.
Martocchio, J.J.(1994), “Effect of Conceptions of Ability on Anxiety, Self-Efficacy, and Learning in Training,” Journal of Applied Psychology, 79(6), 819-825.
Matza, D.(1964), Delinquency and Drift, NY: John Wiley.
Moores, T. T. and Dhaliwal, J.(2004), “A Reversed Context Analysis of Software Piracy Issues in Singapore,” Information and Management, 41(8), 1037-1042.
Newman, G.R.(2004), “Check and Card Fraud,” Problem-Oriented Guides for Police Problem-Specific Guides Series No. 21, U.S. Department of Justice.
<http:// www.cops.usdoj.gov>, (Accessed April 08, 2005).
Nisbet, R. A. (1966). The Sociological Tradition. NY: Basic Books.
Nunes, J.C., C.K. Hsee, and E.U. Weber(2004), “Why Are People So Prone to Steal Software? The Effect of Cost Structure on Consumer Purchase and Payment Intentions,” Journal of Public Policy and Marketing, 23(1), 43-53.
Paternoster, R. and Nagin, D.S.(1993), “Enduring Individual Difference and Rational Choice Theories of Crime,” Law and Society Review, 27(3), 476-495.
Peace, A.G., D.F. Galletta, and J.Y.L. Thong(2003), “Software Piracy in the Workplace: A Model and Empirical Test,” Journal of Management Information Systems, 20(1), 153-178.
Piliavin, I., R. Gartner, C. Thornton, and R. Matsueda(1986), “Crime, Deterrence and Rational Choice,” American Sociological Review, 51, 101-119.
Reckless, W.C.(1955), The Crime Problem. NY: Appleton Century Crofts.
Reidenbach, R.E. and Robin, D.P.(1988), “Some Initial Steps Toward Improving the Measurement of Ethic,” Journal of Business Ethics, 7(11), 871-881.
Reiss, A.J. Jr.(1951). “Delinquency as the Failure of Personal and Social Controls,” American Sociological Review, 16, 196-207.
Robbins, S.P.(1996), Organizational Behavior: Concepts Controversies and Applications, NJ: Prentice-Hall.
Ross, E.A.(1901), Social Control, NY: The Macmillan.
Schultz, E.E. (2002), “A Framework for Understanding and Predicting Insider Attacks,” Computers & Security, 21(6), 526-531.
Schwendinger, H. and Schwendinger, J. S. (1985), Adolescent Subcultures and Delinquency, NY: Praeger.
Sethi, V. and Carraher, S. (1993), “Developing Measures for Assessing the Organizational Impact of Information Technology: A Comment on Mahmood and Soon’s Paper,” Decision Science, 24(4), 867-877.
Shepherd, G.J. and O’ Keefe, D.J. (1984), “Separability of Attitudinal and Normative Influences on Behavioral Intentions in the Fishbein-Ajzen Model,” The Journal of Social Psychology, 122, 287-288.
Shimp, T.A. and Kavas, A. (1984), “The Theory of Reasoned Action Applied to Coupon Usage,” Journal of Consumer Research, 11, 795-809.
Siegel, L.J.(1992), Criminology, West Publishing.
Simpson, P.M., Banerjee, D. S. and Claude, L. Jr. (1994), “Softlifting: A Model of Motivating Factors,” Journal of Business Ethics, 13(6), 431-438.
Smedinghoff, T. J. (1996), Online Law: The SPA's Legal Guide to Doing Business on the Internet, MA: Addison-Wesley.
Starr (1998), Special Counsel Kenneth Starr's Report, White House Rebuttal to Starr's Report, <http://starbulletin.com/specials/starr/narrative.html>, (Accessed April 14, 2005).
Sutherland, E.H.(1929). Principles of Criminology, PA: Lippincott.
Sue, D.W. and Sue, D.(1990). Counseling the Culturally Different: Theory and Practice, NY: Wiley.
Swartz, N.(2002), “Cybercrime Soars,” The Information Management Journal, 36(3), 6.
Tittle, C. R.(1969), “Crime Rates and Legal Sanctions,” Social Problem, 16, 409-423.
Vallerand, R.D., Deshaies, P., Cuerrier, J., Pelletier, J.G., and Mongeau, C. (1992), “Ajzen and Fishbein’s Theory of Reasoned Action as Applied to Moral Behavior: A Confirmatory analysis,” Journal of Personality and Social Psychology, 62, 98-109.
Wang, C.C.(2005), “Factors that Influence the Piracy of DVD/VCD Motion Pictures,” Journal of American Academy of Business, 6(1), 231-237.
Warren, S. D. and Brandeis, L. D. (1890), “The Right to Privacy,” Harvard Law Review, 5, 193. (轉引自林雅惠, 2004)
Westin, A.F.(1967), Privacy and Freedom, NY: Atheneum.
William, L.(1960), “Privacy: A Legal Analysis,” California. Law Review, 48, 389-407.
Williams, F.P. III, and McShanee, M.D.(1988), Criminological Theory. NJ: Prentice-Hall.
Willison, R.(2000), “Considering the Offender: Addressing the Procedural Stages of Computer Crime in an Organizational Context,” Working Paper Series. Department of Informatics of Copenhagen Business School, <http://web.cbs.dk>,
(Accessed April 10, 2005).
Willison, R.(2001), “The Unaddressed Problem of Criminal Motivation in IS Security: Expanding the Preventive Scope Through the Concept of Readying,” Working Paper Series. London: London School of Economics. <http://w3.msi.vxu.se>, (Accessed April 10, 2005).
Wood, R. and Bandura, A.(1989), “Task, Domain, and General Efficacy: A Reexamination of the Self-Efficacy Scale,” Psychological Reports, 72, 423-432.