中文部分
1.王育民,2004,知識管理系統成功模式建構與驗證之研究,國立中山大學資訊管理學系博士論文。2.王保進,2002,視窗版SPSS與行為科學研究,台北:心理出版社。
3.王學亮、陳郁青,1999,知識管理系統分析模式之探討-以信用卡風險管理之個案經驗知識庫為例,中華民國科技管理論文集。
4.吳佳純,2004,不同策略型態對於知識管理系統特徵與績效之關聯性探討-以高科技產業為例,立德管理學院科技管理研究所碩士論文。5.吳明隆,2000,「SPSS統計應用實務」,松崗書局。
6.吳明隆,2006,「SPSS統計應用學習實務問卷分析與統計應用」,第三版,知城數位科技股份有限公司。
7.李敏正,2003,延伸計劃行為理論以預測WWW持續使用之研究,高雄第一科技大學資訊管理研究所碩士論文。8.卓秋季,1998,工模式與創新能力之研究-知識管理觀點,政治大學科技管理研究所碩士論文。9.林淳一,1999,建立知識管理資料庫以提昇企業競爭力之研究,大業大學事業經營研究所碩士論文。10.邱皓政, 2005,「量化研究與統計分析:spss中文視窗版資料分析範例解析」,第二版,五南圖書出版股份有限公司。
11.炬見工作室,2005,知識管理-企業核心競爭力和永續發展的關鍵報告,博碩文化股份有限公司。
12.高啟文,2003,以網路經濟學及複雜理論探討行動商務成長模式之研究,實踐大學企業管理所碩士論文。13.張紹勳,2000,研究方法,滄海書局。
14.陳立邦,2004,運用知識庫模式輔助GPS測量指派作業之研究逢甲大學土地管理學系碩士論文15.陳泳成,2003,以修正科技接受模式探討影響「使用者自建系統接受」之因素,國立中山大學資訊管理研究所碩士論文。16.陳淑華,2003,知識管理資訊系統服務品質之研究-以某資訊科技為例,銘傳大學資訊管理系碩士論文。17.陳順宇,2005,「多變量分析」,第四版,華泰書局。
18.黃智強,2000,影響採用網路購物因素之研究-以網路書店為例,中央大學資訊管鋰學系碩士論文。19.溫素真,2004,消費者使用簡訊折價卷之行為意圖,高雄第一科技大學行銷與流通系碩士論文。20.詹定邦,2002,知識管理在顧問業發展加盟連鎖之應用探討,大葉大學事業經營研究所碩士論文。21.劉文欽、馬芳資、張孟元,1999,知識管理之理論與實務討,第十屆國際資訊管理學術研討會論文集,25-32
22.蔡采芳,1999,顧問業知識管理系統架構之研究,大業大學資訊管理研究所碩士論文。23.盧希鵬,2005,網路行銷電子化企業經營策略,雙葉書廊有限公司。
24.謝政益,2003,網路電話接受度之研究,台灣科技大學資訊管理所碩士論文。25.謝政勳,2004,應用分解式計劃行為理論探討消費者採用第三代行動通訊服務意願之研究,樹德科技大學資訊管理所碩士論文。26.iThome電腦報,http://www.ithome.com.tw/
英文部分
1.Adams, D. A., Nelson, R. R., & Todd, P. A. (1992). “Perceived usefulness, ease of use and usage of information technology: a replication.” MIS Quarterly, 16, 227-247.
2.Ajzen, Icek, & Thomas J.Madden (1985).“Predction of Goal-Directed Behavior.Attitudes,Intentions,and Perceived Behavioral Control.” Journal of Experimental Social Psychology, 22, 453-474.
3.Bandura, A. (1977). “Self-efficacy: toward a unifying theory of behavioral change. ”Psychological Review, 84, 191-215.
4.Bansler, J. P. & Havn, E. C. (2003). “Building community knowledge systems: an empirical study of IT-support for sharing best practices among managers.” Knowledge and Process Management, 10, 156.
5.Bansler, J. P. & Havn, E.(2004).“Exploring the role of network effects in IT implementation:The case of Knowledge repositories.”Information Technology and People,17,268-283.
6.Bart van den Hooff & Jan A.de Ridder (2004).“Knowledge sharing in context:the influence of organizational commitment,communication climate and CMC use on knowledge sharing.”Journal of Knowledge Management, 8,6, 117.
7.Barth, S. (2000).“KM Horror Stories.” Knowledge Management, 3, 36-40.
8.Bhattancherjee, A. (2000).“ Acceptance of E-Commerce Services: The Case of Electronic Brokerages. ”IEEE Transactions on Systems, Man, and Cybernetics- PartA: Systems and Humans, 30, 411-420.
9.Chau, Y. K. & Hu, J. H. (2001).“ Information technology acceptance by individual professionals: a model comparison approach. ”Decision Sciences, 32, 699-718.
10.Constant, D., Kiesler, S.,& Sproull, L.(1994).“What's mine is ours,or is it? A study of attitudes about information sharing.”Information System Research,5,400-421.
11.Davenport, T. H. & L.Prusak (1998). “Working Knowledge.” Boston:Harvard Business School Press.
12.Davis, F. D. (1986). “A Technology Acceptance Model for Empirically Testing New End-User Information Systems:Technology and Results.” Doctoral dissertation,Sloan School of Management.Massachusetts Institute of Technolohy.
13.Davis, F. D. (1989). “Perceived usefulness, perceived ease of use, and user acceptance of information technology.” MIS Quarterly, 13, 319.
14.DeLone, W. H. & McLean, E. R. (1992).“ Information Systems Success:The Quest for the Dependent Variable.” Information Systems Research, 3,1, 60-95.
15.DeLone, W. H. & McLean, E. R. (2003).“The DeLone and McLean Model of Information System Success:A Ten-Year Update.”Journal of Management Information Systems,19, 9-30.
16.Dixon, N. M. (2000).“Common Knowledge.”, Boston, MA.: Harvard Business School Press.
17.Fishbein, M. & Ajzen, I. (1975). “Belief, attitude intention and behavior: an introduction to theory and research.”, MA: Addision-Wesley.
18.Gay, L.R.(1992).“Educational Research Competencies for Analysis and Application ”.New York:Macmillan.
19.Gold, A. H., Malhotra, A., & Segars, A. H. (2001). “Knowledge management: An organizational capabilities perspective. ”Journal of Management Information Systems, 18, 185.
20.Harris, D.B. (1998).“Creating a Knowledge Centric Information Technology Environment.”, Sep.15,http://www.htcs.com/ckc.html.
21.Housel, T. & Bell, A. H. (2001). “Measuring and Managing Knowledge.” Macmillan/McGraw-Hill,New York.
22.Hu, P. J., Chau, P. Y. K. , Sheng, O.R.L, & Tam, K.Y.(1999).“Examining the Technology Acceptance Model Using Physician Acceptance of Telemedicine Technology.”Journal of Management Information Systems,16,91-112.
23.Huber, G. P. (2001). “Transfer of knowledge in knowledge management systems: Unexplored issues and suggested studies.” European Journal of Information Systems, 10, 72.
24.Kaiser, H.F.(1974).“An index of factorial simplicity .”Psychometrika,39,31-36.
25.Katz, M. L. & C. Shapiro (1985).“Network Externalities, Competition and Compatibility.”American Economic Review, 75,424-440.
26.Kristen, B. D., Gibb, D., Charlotte, H., & Stephen, H. (2004).“ Toward a Model of Effective Knowledge Management and Directions for Future Research: Culture, Leadership, and CKOs.” Journal of Leadership & Organizational Studies, 10, 26.
27.Leitch, A., Robert, K., & Davis, R. (1992).” Accounting Information System.” Prentice-Hall.
28.Lin, C.C & Lu, H.(2000). “Towards an understanding of the behavioural intention to use a web site. ”International Journal of Information Management, 20, 197-208.
29.Lou, H., Luo, W., & Strong, D. (2000). “Perceived critical mass effect on groupware acceptance. ”European Journal of Information Systems, 9, 91.
30.Lu, H. P. & Gustafson, D. H. (1994).“ An empirical study of perceived usefulness and perceived ease of use on computerized support system use over time.”International Journal of Information management, 14, 317-329.
31.Marchand, D. (1990). “Managing Information Quality.” In Book Information Quality:Definitions and Dimensions.,Edited by Wormel,I.,Taylor G,Los A., 7-17.
32.Markus, M. L. & Connolly, T. (1990). “Why CSCW applications fail: problems in the adoption of interdependent work tools.” In Los Angeles,California..
33.Markus, M. L. (2001).“ Toward a theory of knowledge reuse: Types of knowledge reuse situations and factors in reuse success. ”Journal of Management Information Systems, 18, 57.
34.Mathieson, K. (1991).“ Predicting user intentions: comparing the technology acceptance model with the theory of planned behavior.” Information Systems Research, 2, 173-191.
35.Mckinney, V., Yoon, K., & Zahedi, F. M. (2002). “The measurement of web-customer satisfaction:an expectation and disconfirmation approach.” Information System Research, 13, 296-315.
36.Gong, M., Xu, Y. & Yu, Y. (2004). “An Enhanced Technology Acceptance Model for Web-Based Learning. ”Journal of Information Systems Education, 15, 365.
37.Mockler R.J. (1992). “Developing Knowledge-based Systems Using an Expert System Shell. ”New York,Macmillan Publishing Company.
38.Moon, J. W. & Kim, Y. G. (2001).“ Extending the TAM for a world-wide-web context. ”Information and Management, 38, 217-230.
39.Nonaka, I. & H.Takeuchi (1995). “The Knowledge Creating Company:How Japanese Companies Create the Dynamics of Innovation.” Oxford University Press.
40.Oliver, P.E., Marwell,G.. & Teixeira, R.(1985).“A theory of the critical mass:interdependence,group heterogeneity,and the production of collective action.”American Journal of Sociology,91,522-556.
41.Oren, S.S. , S.A.Smith & R.B.Wilson(1982)“Competitive nonlinear tariffs.”Journal of Economic Theory,129,49-71.
42.Pae, J. H. & Hyun, J. S. (2002). “The impact of technology advancement strategies on consumer's patronage decisions.” Information and Management, 40, 191-204.
43.Paul, L. & John, I. (2003). “Why do people use information technology? a critical review of the technology acceptance model.” Information and Management, 40, 191-204.
44.Polanyi, M. (1966). “The tacit dimension.” Doubleday Anchor, Garden City, NY.
45.Rai, A., Lang, S. S., & Welker, R. B.(2002). “Assessing the Validity of IS Success Models:An Empirical Test and Theoretical Analysis,“Information Systems Research,13,50-69.
46.Rogers, E. M. & Allbritton, M. M.(1995).“Interactive Communication Technologies in Business Organization.”Journal of Business Communication,32,175-195.
47.Rohlfs, J.(1974).“A theory of interdepdndent demand for a communication service.”The Bell Journal of Economics and Management Science,5,16-37.
48.Ruggles, R. (1998).“ The state of the notion: Knowledge management in practice. ”California Management Review, 40, 80.
49.Sarvary, M. (1999).“ Knowledge management and competition in the consulting industry. ”California Management Review, 41, 95-107.
50.Sedden, P. B. (1997).“A Respecification and Extension of the DeLone and McLean Model of IS Success.”Information System Research,8,240-253.
51.Seddon, P. B. & Kiew, M. Y. (1994).“ A Partial Test and Development of the DeLone and McLean Model of IS Success. ”The Internaltional Conference on Information System,Vancouver,Canada, 99-110.
52.Spek, R. & Spijkervet, A.(1997)“Knowledge Management:dealing intelligently with knowledge.”
53.Susan, S. & Demetrius, P. (2005).“ Questionnaire Development to Predict Mammorgraphy Intertion Among Women in Southern Louisiana.” Journal of Nursing Measurement, 13, 23.
54.Taylor, S. & Todd, P. A. (1995). “Decomposition and crossover effects in the theory of planned behavior :A study of consumer adoption intention.” International Journal of Research in Marketing, 12, 137-155.
55.Taylor, S. & Todd, P. A. (1995).“ Understanding information technology usage: a test of competing models.” Information Systems Research, 6, 144-176.
56.Teo, Thompson S.H., Vivien K.G. Lim and Raye Y.C. Lai(1999),“Intrinsic and Extrinsic Motivation in Internet Usage,”The International Journal of Management Science,27,25-37.
57.Tiwana, A. (2002).“ The Knowledge Management Toolkit:Orchestrating IT,Strategy,and Knowledge Platform.” Prentice Hall,New Jersey.
58.Triandis, H. C. (1977). “Interpersonal Behavior.”, CA: Brooks/Cole.
59.Venkatesh, V. (2000).“ Determinants of perceived ease of use: Integrating control, intrinsic motivation, and emotion into the technology acceptance model.” Information Systems Research, 11, 342-365.
60.Venkatesh, V., Morris, M. G., & David, G. B. (2003).“ User acceptance of information technology: toward a unified view. ”MIS Quarterly, 27, 425-478.
61.Shih, Y.Y. & Fang, K. (2004). “The use of a decomposed theory of planned behavior to study Internet banking in Taiwan.” Ineternet Research, 14, 213.