一、中文部分
1.丁介棡 (2001),「高雄港電子商務市場區隔與服務滿意度之研究」,國立成功大學交通管理科學研究所碩士論文2.田宜遜 (2004),「C-TPAT/SST先導系統推動計畫介紹」,機械工業雜誌261期,頁107-116。3.吳明隆、涂金堂(2006),SPSS與統計應用分析(二版),台北市:五南出版社。
4.呂錦隆、凌珮娟 (2007),「航空旅客對自助報到服務之接受行為研究」,第五屆十校聯盟航運學術研討會論文集
5.李佳育 (2005),「導入無線射頻識別系統行為意圖之研究-以台灣物流業為例」,大同大學事業經營研究所碩士論文6.李珮如(2003),「影響國內中小企業採用企業資源規劃系統之關鍵因素」,國立中正大學資訊管理學系碩士論文。7.李敏正(2003),「延伸計劃行為理論以預測WWW持續使用之研究」,未出版之碩士論文,國立高雄第一科技大學資訊管理研究所。8.林秋芬 (2007),「旅遊電子商務網站消費者使用意圖影響因素之研究」,國立東華大學企業管理研究所碩士論文9.邱皓政(2006),量化研究與統計分析(三版)。台北市:五南出版社。
10.洪新原、梁定澎、張嘉銘 (2005),「科技接受模式之彙總研究」,資訊管理學報,第12卷,第4期,頁211-23411.美國海關及邊境保衛局(Customs and Border Protection, CBP)網站 (http://www.cbp.org)。
12.陳李逸 (2001),「定期航商電子商務市場區隔與使用意願之研究」,國立成功大學交通管理科學研究所碩士論文13.陳順宇(2004),多變量分析(3 版)。台北市:華泰。
14.陳順宇(2007),結構方程模式 Amos操作。台北市:心理出版社。
15.馮翊庭 (2005),「無線射頻辨識系統(RFID)接受模式之研究-從高科技製造觀點」,國立成功大學電信管理研究所碩士論文16.黃芳銘(2003),結構方程模式理論與應用。台北市:五南。
17.黃俊英(2000),多變量分析(七版)。中國經濟企業管理研究所。
18.黃炳錫(1993),「企業採用EDI 系統及使用效益之研究-以報關行為例」,淡江大學資訊管理研究所碩士論文。19.黃智強 (2000),「影響採用網路購物因素之研究-以網路書店為例」,國立中央大學資訊管理研究所碩士論文20.溫嘉瑜 (2004),「射頻識別在台灣」,商品條碼報導,頁6-9。
21.經濟部工業技術研究院 (2007),「國際供應鏈安全準則與趨勢說明會」
22.經濟部商業司 (2005),「台灣物流年鑑」,工研院產經中心
23.葉陳輝,趙時樑 (2005),「RFID應用於海運貨櫃管理之探討」,第三屆十校聯盟航運學術研討會論文集,頁295-301
24.廖御超 (2006),「影響採用創新產品之相關因素探討-以3G手機為例」,國立東華大學企業管理研究所碩士論文25.謝銘仁 (2005),「智慧型手機在物流業營業司機之接受度研究-以新竹貨運為例」,國立成功大學交通管理科學研究所碩士論文二、英文部分
1.Agarwal, R., Prasad, J., (1998), “A conceptual and operational definition of personal innovativeness in the domain of information technology”,Information Systems Research, Vol. 9, No. 2, pp204–215.
2.Agarwal, R., Prasad, J., (1999), “Are individual differences germane to the acceptance of new information technologies?”, Decision Sciences, 30 pp361–391.
3.Ajzen, I., (1985), From intentions to actions: a theory of planned behavior, action-control: from cognition to behavior. Heidelerg: Springer.
4.Ajzen, I., Fishbein M., (1980), Understanding Attitudes and Predicting Social Behavior. Englewood Cliffs, NJ: Prentice-Hall.
5.Amin H., (2007), “An analysis of mobile credit card usage intentions”, Information Management & Computer Security, Vol. 15, No. 4 ,pp260-269.
6.Arbuckle, J.L., (1997), “Amos Users’ Guide Version 3.6. SmallWaters Corporation”, Chicago, IL.
7.Bergeron, F., Gingras, L., Hadaya, P., Caron, C., (2005), A framework for evaluating strategic location-based applications in business. In: Proceedings of the 38th Hawaii International Conference on System Sciences, pp. 1–8.
8.Bhuptani, M., Moradpour, S., (2005), RFID Field Guide: Deploying Radio Frequency Identification Systems. Sun Microsystems Press, NJ: Prentice Hall.
9.Bingi, P., Sharma, M.K. and Godla, J., (1999), “Critical issues affecting an ERP implementation”, Information Systems Management, pp7-14.
10.Brown I., Cajee Z., Davies D., Stroebel S., (2003), “Cell phone banking: predictors of adoption in South Africa-an exploratory study”, International Journal of Information Management, 23, pp381-394.
11.Brown I., Cajee Z., Davies D., Stroebel S., (2003), “Cell phone banking: predictors of adoption in South Africa—an exploratory study”, Information management, pp381–394.
12.Chau, Y.K., (1996), “An empirical assessment of a modified technology acceptance model”, Journal of Management Information Systems, 13, pp185-204.
13.Cheng, C.H., Cheung, W., Chang, M.K., (2002), “The use of the Internet in Hong Kong: Manufacturing vs. service”, International Journal of Production Economics, 75, pp33–45.
14.Churchill GA., (1979), “A paradigm for developing better measures of marketing constructs”, Journal of Marketing Research ,Vol. 25, No.1, pp170-84.
15.Cunningham, L.F., Gerlach, J.H., Harper, M.D., Young, C.E., (2005), “Perceived risk and the consumer buying process: internet airline reservations”, International Journal of Service Industry Management, Vol. 16, No.4, pp357-372.
16.Curran F.M., Meuter Matthew L., (2005), “Self-service technology adoption: comparing three technologies”, Journal of Services Marketing, Vol. 19, No.2, pp103-113.
17.Davis Fred D., (1989), “Perceived Usefulness, Perceived Ease of Use, and User Acceptance of Information Technology”, MIS Quarterly, Vol.13, No.3, pp319-340.
18.Davis, F.D., Venkatesh, V., (1996), “A critical assessment of potential measurement biases in the technology acceptance model: three experiments”, International Journal of Human-Computer Studies, 45, pp19–45.
19.DeLone, W. H., (1988). “Determinants of success for computer usage in small business”, MIS Quarterly, Vol. 12, No.1, pp51-61.
20.Doerr, K.H., Gates, W.R., Mutty, J.E., (2006). “A hybrid approach to the valuation of RFID/MEMS technology applied to ordnance inventory”, International Journal of Production Economics, 103, pp726–741.
21.Dowling, G. R., Staelin, R., (1994), “A model of perceived risk and intended risk-handling activity”, Journal of Consumer Research, Vol. 21, No.1, pp119-134.
22.Eastin Matthew S., (2002), “Diffusion of e-commerce: an analysis of the adoption of four e-commerce activities”, Telematics and Informatics, 19, pp251–267.
23.Fano, A., Gershman, A., (2002), “The future of business services in the age of ubiquitous computing”, Communications of the ACM, Vol. 45 No.12, pp83–87.
24.Featherman, M.S., Pavlou, P. A., (2003), “Predicting e-services adoption: a perceived risk facets perspective”, International Journal of Human-Computer Studies, Vol. 59, No.4, pp451-475.
25.Fink, D., (1998), “Guidelines for the successful adoption of information technology in small and medium enterprises”, International Journal of Information Management, Vol. 18, No.4, pp243-253.
26.Fishbein, M. and Ajzen, I., (1975), Belief, Attitude, Intention, and Behavior: An Introduction to Theory and Research, MA: Addison-Wesley.
27.Fornell, C., Larcker, D.F., (1981b), “Evaluating structural equation models with unoberservable variables and measurement error”, Journal of Marketing Research, 18, pp186–192.
28.Grandon, E.E., Pearson, J.M., (2004), “Electronic commerce adoption: An empirical study of small and medium US businesses”, Information & Management, Vol. 42, No.1, pp197–216.
29.Grover, V. and Goslar, M.D., (1993), “The initiation, adoption and implementation of telecommunications theory in US rrganizations”, Journal of Management Information Systems, Vol. 10, No.1, pp 141-163.
30.Hair, J., Anderson, R., Tatham, R., Black, W., (1998), Multivariate Data Analysis with Readings, fifth ed. Prentice Hall International, NJ: Upper Saddle River.
31.Hsu M.H., Chiu C.M., (2004), “Predicting electronic service continuance with a decomposed theory of planned behavior”, Behaviour & Information Technology, Vol. 23, No. 5, pp359–373.
32.Hsu, C.L., and H.P., Lu, (2004), “Why do people play on-line games? An extended TAM with social influences and flow experience”, Information & Management, 41, pp853-868.
33.Igbaria, M., Zinatelli, N., Cragg, P., Cavaye, A.L.M., (1997), “Personal computing acceptance factors in small firms: A structural equation model”, MIS Quarterly, Vol. 21, No.3, pp279–305.
34.Joglekar, N., Rosenthal, S., (2005), “Experimentation with RFID usage in supply chains”, POMS Chronicle, Vol. 12, No.1, pp10–11.
35.Joreskog, K.G., Sorbom, D., (1993), LISREL8: Structural equation modeling with the SIMPLIS command language. Hillsdale, NJ: Erlbaum.
36.Knospe, H., Pohl, H., (2004), “RFID security”, Information Security Technical Report, Vol. 9, No.4, pp39–50.
37.Koufteros, X.A., (1999), “Testing a model of pull production: A paradigm for manufacturing research using structural equation modeling”, Journal of Operations Management, 17, pp467–488.
38.Lee Lorraine S., Fiedler Kirk D. and Smith Jeffery S., (2008), “Radio frequency identification (RFID) implementation in the service sector: A customer-facing diffusion model”, International Journal of Production Economics, 112, pp587-600.
39.Lees, J.D., (1987). “Successful development of small business information systems”, Journal of Systems Management, Vol. 38, No.8, pp32-39.
40.Lim, N., (2003), “Consumers’ perceived risk: sources versus consequences”, Electronic Commerce Research & Applications, Vol. 2, No.3, pp216-228.
41.Lu C.S., Lai K.H., Cheng T.C.E., (2007), “Application of structural equation modeling to evaluate the intention of shippers to use Internet services in liner shipping”, European Journal of Operational Research, 180, pp845-867.
42.Lu J., Yao J.E., Yu C.S., (2005), “Personal innovativeness, social influences and adoption of wireless Internet services via mobile technology”, Journal of Strategic Information Systems, 14 , pp245–268.
43.Lu, H.P. and Gustafson, D.H., (1994), “An empirical study of perceived usefulness and perceived ease of use on computerized support system use over time”, International Journal of Information Management, 14, pp317-329.
44.Mattila, A., (2001), “The impact of product category risk on service satisfaction evaluations”, International Journal of Hospitality Management, Vol. 20, No.1, pp 29-43
45.Moon J.W., and Kim Y.G., (2001), “Extending the TAM for a World-Wide-Web context”, Information & Management, 38, pp217-230.
46.Ngai E.W.T., Moon K.K.L., Riggins F.J. and Yi C.Y., (2008). “RFID research: An academic literature review (1995–2005) and future research directions”, International Journal of Production Economics . 112, pp510-520.
47.Nunnally, J.C., (1978), Psychometric Theory, 2nd ed. McGraw-Hill, NY: New York.
48.Olson J.R. and Boyer K.K., (2003), “Factors influencing the utilization of Internet purchasing in small organizations”, Journal of Operations Management, 21, pp225-245.
49.Premkumar G. and Roberts M., (1999), “Adoption of new information technologies in rural small businesses”, The International Journal of Management Science, 27, pp467-484.
50.Premkumar, G. Ramamurthy, K., and Nilakanta, S., 1994, “Implementation of electronic data interchange: an innovation”, Journal of Management Information Systems, Vol. 11, No.2, pp157-186.
51.Roca J.C., Chiu C.M. and Martinez F.J., (2006), “Understanding e-learning continuance intention: An extension of the Technology Acceptance Model”, International Journal of Human-Computer Studies, 64, pp683-696.
52.Taylor S. and Todd P., (1995), “Assessing IT Usage: The Role of Prior Experience”, MIS Quarterly, Vol.19, No.4, pp561-570.
53.Thong J.Y.L, (1999), “An integrated model of information systems adoption in small businesses”, Journal of Management Information Systems, Vol. 15, No.4, pp187-214.
54.Tornatzky, L.G. and K.J. Klein (1982), “Innovation Characteristics and Innovation Adoption- Implementation: A Meta-Analysis of Findings.” IEEE Transactions on Engineering Management, 29, pp.28-45.
55.Tzeng S.F., Chen W.H. and Pai F.Y., (2008), “Evaluating the business value of RFID: Evidence from five case studies”, International Journal of Production Economics, 112, pp601-613.
56.Venkatesh V. and Davis F.D., (2000), “A Theoretical Extension of the Technology Acceptance Model: Four Longitudinal Field Studies”, Management Science, Vol.46, No.2, pp186-204.
57.Vijayasarathey L.R., (2004), “Prediction consumer intentions to use on-line shopping: the case for an augmented technology acceptance model”, Information & Management, 41, pp747-762.
58.Yap, C.S., Soh, C.P.P., and Raman, K.S. (1992), “Information systems success factors in small business,” International Journal of Information Management, Vol.20, No.5, pp.597-609.
59.Yi Y., Wu Z. & Tung L.L., (2005), “How Individual Differences Influence Technology Usage Behavior? Toward an Integrated Framework”, The Journal of Computer Information System, Vol. 46, No.2, pp52-63.