1.于長禧,張秀珍,高春輝,2004。ADSL服務品質,顧客滿意度與購後行為意向之研究-以中華電信為例,中華民國品質學會第10屆全國品質管理研討會論文集,86-102。
2.中華電信公司(http://www.cht.com.tw).
3.中華電信公司企業網站(http://web.cht.com.tw).
4.台灣網路資訊中心(2007/06/01 viewed) (http://www.twnic.net.tw)
5.交通部電信總局(2007/04/01 viewed) (http://www.dgt.gov.tw/)
6.全球寬頻服務市場分析資料庫 (2007/06/01 viewed) (http://point-topic.com)
7.何文斌,2001,國小行政人員網路素養對行政網路資訊系統接受度之研究~以台南市為例,台南師院國民教育研究所碩士論文。8.何丞世,2005,WDM光網路之動態保護與可存活性設計,臺灣大學電機工程學研究所博士論文。9.余泰魁、楊淑裴,2005,線上學習系統使用意向之模式建構與比較分析研究,台灣管理學刊,第五卷,第二期,311-338。
10.吳明隆,2006,結構方程模式SIMPLIS的應用,五南圖書出版股份有限公司。
11.吳肇銘,1998,影響網站使用意向之因素研究— 以入門網站為例,國立中央大學資訊管理研究所博士論文。12.李墾典,2004,消費者使用不動產銷售網站認知與態度之研究,逢甲大學土地管理所碩士論文。13.周家慧、張善斌、范垂仁、顧為元,2004,綜合所得稅網路結算申報系統的接受度研究,電子商務研究,第二卷,第四期,359-380。14.周素華,1993,電子通訊科技使用行為之研究,交通大學土木工程研究所碩士論文。15.周景弘,1996,「網路銀行安全性對使用者知覺風險與使用意願之研究」,台灣大學會計研究所未出版碩士論文。16.周鴻志,2004,科技接受模式在遠距教學網站之應用,政治大學資管所碩士論文。17.林鈴玉,2001,“國內網路銀行現況發展及交易安全之研究”,碩士論文,國立交通大學。18.林甘敏、陳年興,2001,網路大學學習問題探討,全球華人學習科技研討會論文集。
19.林師模、陳苑欽,2003,多變量分析,雙葉書廊有限公司。
20.林清山,1984,線性結構關係(LISREL)電腦程式的理論與應用,測驗年刊,第31輯,149-164。21.洪明洲,1999,網路教學課程設計對學習成效的影響研究,遠距教學系統化教材設計國際研討會論文集。
22.紀雅惠,2003,影響使用網站因素之研究-以寬頻使用者為例,台灣科技大學資管所碩士論文。23.胡凱傑,2003,應用服務品質量表與知覺價值模式探討旅客在消費意願之影響因素:以汽車客運業為例,交通大學運輸科技與管理學系博士論文。24.耿慶瑞、黃增隆、汪志堅,2006,互動性對科技接受模式的影響-以政府入口網站為例,商管科技季刊,第七卷,第三期,509-530。25.馬信行,1999,線性結構模式在教育上的應用及所遭遇之問題,教育與心理研究,第二十二卷,第一期, 1-13。26.張淑敏,2005,從行為理論探討消費者對芳香精油之認知與行為模式,經營管理論叢,第一屆管理與決策2005年學術研討會特刊,149-163。27.張朝旭 ,2003,寬頻衛星網際網路動態尋徑策略之研究,中央大學資訊工程研究所博士論文。28.梁世安、余國瑋,2005,以科技接受模式探討二輪式電動代步車消費者接受程度,行銷評論,第二卷,第二期,135-148。29.陳焜元,1996,行政管理資訊系統使用者參與效果之研究- - 技術接受性模式檢証,國立政治大學公共行政學系碩士論文。30.陳雲龍,2003,中華電信股份公司電信訓練園地。
31.陳毓璋,1998,在有線電視系統上建立可保證品質的高頻寬網路 ,中山大學資訊工程研究所博士論文。32.焦金強,1997,非同步傳輸模式網路上資源規劃及控制架構之設計與分析 ,中正大學電機工程學系博士論文。33.黃宇寰,劉忠陽,2004。應用科技接受模型對行動上網服務使用者行為之研究,傳播管理學刊,第五卷,第二期,96-109。34.楊玉霜,2003,非同步模式網路最佳化及模糊適應預估之流量控制,交通大學電信工程系博士論文。35.資策會網站(2007/04/01 viewed) (http://www.find.org.tw)
36.劉台順,2004,,醫院網路掛號接受度之研究—以某醫學中心為例,銘傳大學資管系碩士論文。37.Agarwal, R. and Prasad, J. (1999) “Are individual differences germane to the acceptance of new information technologies?” Decision Sciences, 30(2), 361-391.
38.Agarwal, R., Sambamurthy, V., and Stair, R. M. (2000) “Research report: The evolving relationship between general and specific computer self-efficacy – An empirical assessment,” Information Systems Research, 11(4), 418–430.
39.Ajzen, I. (1985) “From intention to actions: A theory of planned behavior,” In J. Kuhland J. Beckmann (Eds), Action control: From cognition to behavior, Berlin Heidelberg Springer-Verlag , 11-39.
40.Ajzen, I. and Madden , T. J. (1986) “Prediction of goal–directed behavior: attitudes,intention and perceived behavioral control,” Journal of Experimental Social Psychology, 22 , 453-474.
41.Anderson, J. C. and Gerbing, D. W. (1988) “Structural equation modeling in practice: A review and recommende, Two-Step Approach,” Psychological Bulletin, 103(3), 411-423.
42.Bandura, A. (1986) Social Fundations of Thought and Action: A Social Cognitive Theory, Englewood, Cliffs NJ: Prentice-Hall.
43.Bandura, A. (1982) “Self-efficacy mechanism in human agency,” American Psychologist, 37(2), 122-147.
44.Benveniste, J. (2000) “IP technology clearinghouse: Feeding the VoIP frenzy,” Telecommunications, 34(11), 95-96.
45.Busselle, R., Reagan, J., Pinkleton, B., and Jackson, K. (1999) “Factors affecting internet use in a saturated-access population,” Telematics and Informatics, 16, 45-58.
46.Chau, P. Y. K. and Hu, P. J. (2002) “Examining a model of information technology acceptance by individual professionals: An exploratory study,” Journal of Management Information Systems, 18(4), 191-229.
47.Collins, D. (2001) Carrier Grade Voice over IP, McGraw-Hill.
48.Compeau, D. R. and Higgins C.A. (1995a) “Application of social cognitive theory to training for computer skill,” Information Systems Research, 6(2), 118-143.
49.Compeau, D. R., and Higgins, C. A. (1995b) “Computer self-efficacy: development of a measure and initial test,” MIS Quarterly, 19, 189-211.
50.Compeau, D. R., Higgins, C. A. and Huff, S. (1999) “Social cognitive theory and individual reactions to computing technology: A longitudinal study,” MIS Quarterly, 23(2), 145-158.
51.Cronbach, L. J. (1951) “Coefficient alpha and the internal structure of tests,” Psychometrika, 16, 297-334.
52.Davies, F., Goode, M., Mazance, J. and Moutinho, L. (1999) “LISREL and neural network modeling: Two comparison studies,” Journal of Retailing and Consumer Services, 6(4), 249-261.
53.Davis, F. D. (1989) “Perceived usefulness, perceived ease of use, and user acceptance of information technology,” MIS Quarterly, 13(3), 319-340.
54.Davis, F. D., Bagozzi, R. P. and Warshaw, P. R. (1989) “User acceptance of computer technology: A comparison of two theoretical models,” Management Science, 35(8), 982-1002.
55.Davis, F. D., Bagozzi, R. P. and Warshaw P. R. (1992) “Extrinsic and intrinsic motivation to use computers in the workplace,” Journal of Applied Social Psychology, 22, 1111-1132.
56.Delone, W. H. and McLean, E. R. (2003) “The DeLone and McLean model of information system success: A ten-year update”, Journal of Management Information System, 19(4), 9-30.
57.DeLone, W. H. and McLean, E. R. (1992) “Information systems success: The quest for the dependent variable, information systems requirements, media richness and structural design,” Management Science, 3(1), 60-95.
58.Dishaw, T. and Strong, M. (1999) “Extending the technology acceptance model withtask-technology fit constructs,” Information and Management, 36, 9-21.
59.Dratva, R. (1995) “WWW-based home banking services in Switzerland: A case study,” Computer Networks and ISDN System, 28, 199-208.
60.Fishbein, M. and Ajzen, I. (1975) Belief, Attitude, Intention and Behavior: An Introduction to Theory and Research, Addsion-Wesley, Reading MA..
61.FTTx & PLC產業交流會(2007/04/01 viewed) (http://www.fttx.org.tw)
62.Gefen, D., Karahanna, E. and Straub, D.W. (2003) “Trust and TAM in online shopping: An integrated model,” MIS Quarterly, 27(1), 51-90.
63.Gist, M., Schwoerer, C. and Rosen, B. (1989) “Effects of alternative training methods on self-efficacy and performance in computer software training,” Journal of Applied Psychology, 74(6), 884–891.
64.Hair Jr., J. F., Anderson, R. E., Tatham, R. L. and Black, W. C. (1998) Multivariate Data Analysis, 5th ed., Prentice Hall College Div.
65.Hatcher, L. (1998) A Step-by-Step Approach to Using the SAS System for Factor Analysis and Structural Equation Modeling, 3rd Printing, SAS Institute Inc.
66.Hartwick, J. and Barki, H. (1994) “Explaining the role of user participation in information system use,” Management Science, 40(4), 440-465.
67.Hoffman, D. L. and Novak, T. P. (1996) “Marketing in hypermedia computer-mediated environments: Conceptual foundations,” Journal of Marketing, 60(7), 50-68.
68.Hoffman, D. L., Novak, T. P. and Peralta, M. (1999) “Building consumer trust online,” Communication of the ACM, 42(4), 80-85
69.Hollenbeck, J. R., O’Leary, A. M., Klein, H. J., and Patrick, M. W. (1989) “Investigation of the construct validity of a self-report measure of goal commitment,” Journal of Applied Psychology, 74(6), 951-956.
70.Hoyle, R. H. (1995) Structural Equation Modeling: Concepts, Issues, and Applications, Newbury Park: Stage.
71.Hu, P. J., Chau, P. Y. K., Sheng, O. R. L. and Tam, K. Y. (1999) “Examining the technology acceptance model using physician acceptance of telemedicine technology,” Journal of Management Information Systems, 16(2), 91-112.
72.Igbaria, M., Guimaraes, T. and Davis G. B. (1995) “Testing the determinants of microcomputer usage via a structural equation model,” Journal of Management Information Systems, 11(4), 87-114.
73.Igbaria, M. and Iivari, J. (1995) “The Effects of Self-Efficacy on Computer Usage,” Omega, 23(6), 587-605.
74.Jackson, C. M., Chow, S. and Leitch, R, A. (1997) “Toward an understanding of the behavioral intention to use an information system,” Decision Sciences, 28(2), 357-389.
75.Janda, S., Trocchia, P. J. and Gwinner, K. P. (2002) “Consumer perceptions of Internetretail service quality,” International Journal of Service Industry Management, 13(5), 412-431.
76.Jöreskog, K. G. and Sörbom, D. (1993) LISREL8: User’s Reference Guide, Chicago, IL: Scientific Software Internationl.
77.Kuppam, A. R., Pendyala, R. M. (2001) “A structural equation analysis of commuters’ activity and travel patterns,” Transportation, 28(1), 33-54.
78.Lanford, D. (1996) “Ethics and the internet: Appropriate behavior in electronic communication,” Ethics & Behavior, 6, 91-106.
79.Lederer, A. L., Maupin, D. J., Sena, M. P. and Zhuang, Y. (2000) “The technology acceptance model and the world wide web,” Decision Support Systems, 29(3), 269-282.
80.Lin, J. C. C. and Lu, H. (2000) “Towards an understanding of the behavioural intention to use a web site,” International Journal of Information Management, 20, 197-208.
81.Locke, E. A., Fredrick, E., Bobko, P. and Lee, C. (1984) “Effect of self-efficacy, goals, and task strategies on task performances,” Journal of Applied Psychology, 69, 241-251.
82.Loh, L. and Ong, Y. (1998) “The adoption of internet-based stock trading: a conceptual framework and empirical results,” Journal of Information Technology, 13, 81-94.
83.Marakas, M. M., Yi, M. Y. and Johnson, R. D. (1998) “The multilevel and multifaceted character of computer self-efficacy: Toward clarification of the construct and an intergrative framework of research,” Information Systems Research, 9(2), 126-163.
84.Mathieson, K. (1991) “Predicting user intensions: Comparing the technology acceptance model with the theory of planned behavior,” Information Systems Research, 2(3), 173-191.
85.Miyazaki, A. D. and Fernandez, A. (2001) “Consumer perceptions of privacy and security risks foronline shopping,” The journal of Consumer Affairs, 35(1), 27-44.
86.Moore, G. C. and Benbasat, I. (1991) “Development of an instrument to measure the perceptions of adopting an information technology innovation,” Information Systems Research, 2(3), 192-222.
87.Padmanabhan, V. N. and Mogul, J. C. (1996) “Using predictive prefetching to improve world wide web latency,” ACM SIGCOMM Computer Communication Review Archive, 26(3), 22-36.
88.Petrus, G. and Nelson, O. N. (2006) “Borneo online banking: evaluating customer perceptions and behavioural intention,” Management Research News, 29(1/2), 6-15.
89.Rogers, E. M. (1983) Diffusion of Innovations, 3rd, New York Free Press.
90.Ron, T., Deborah, C. and Chris, H. (2006) “Intentions to use information technologies: An integrative model,” Journal of Organizational and End User Computing, 18(3), 25-46.
91.Seddon, P. B. and Kiew, M. Y. (1994) “A partial test and development of DeLone and McLean’s model of IS success,” Proceedings of the International Conference on Information Systems, Vancouver, Canada (ICIS 94), 99-110.
92.Steven John Simon and David Paper (2007) “User acceptance of voice recognition technology: An empirical extension of the technology acceptance model,” Journal of Organizational and End User Computing, 19(1), 24-50.
93.Szajna, B. (1996) “Empirical evaluation of the revised technology acceptance model,” Management Science, 42(1), 85-92.
94.Tabachnick, B. G. and Fidell, L. S. (1996) Using m ultivariate statistics, 3rd ed., New York, NY: HarperCollins.
95.Tanaka, J. S. and Huba, G. J. (1984) “Confirmatory hierarchical factor analysis of psychological distress measures,” Journal of Personality and Social Psychology, 46, 621-635
96.Taylor, S. and Todd, P. A. (1995) “Assessing IT usage: The role of prior experience,” MIS Quarterly, 19(4), 561-570.
97.Thompson, R. L., Higgins, C. A. and Howell, J. M. (1991) “Personal computing: Toward a conceptual model of utilization,” MIS Quarterly, 15(1), 124-143.
98.Venkatesh, V. (2000) “Determinants of perceived ease of use: Integrating control, intrinsic motivation and emotion into the technology acceptance model,” Information Systems Research, 11(4), 342–365.
99.Venkatesh, V. and Davis, F. D. (1996) “A model of the antecedents of perceived ease of use: Development and test,” Decision Sciences, 27(3), 451–482.
100.Venkatesh, V., Morris, M. G., Davis, G. B. and Davis, F. D. (2003) “User acceptance of information technology: Toward a unified view,” MIS Quarterly, 27(3), 425-478.
101.Vessey, I. and Galletta, D. (1991) “Cognitive fit: An empirical study of information acquisition,” Information Systems Research, 2(1), 63-86.
102.Wang, H., Lee, M. K. O. and Wang, C. (1998) “Consumer privacy concerns about internet marketing,” Communication of the ACM, 41(3), 63-70.
103.Wendy, A. R., Kristen, G. and Elizabeth, F. (1997) “An analysis of automaticteller machine usage by older adults: A structured interview approach,” Applied Ergonomics, 28, 173-180.
104.Wilinsky, C. and Sylvester, J. (1992) “Privacy in the telecommunication age,” Communication of the Acm, 35(2), 23-25.
105.Wood, R. and Bandura, A. (1989a) “Impact of conceptions of ability on self-regulatory mechanisms and complex decision making,” Journal of Personality and Social Psychology, 56(3), 407-415.
106.Wood, R. and Bandura, A. (1989b) “Social Cognitive Theory of Organizational Management,” Academy of Management Review, 14(3), 361-384.