References
Chinese reference
[1]林怡辰,2006,臺灣300大企業即時通訊使用政策大調查,2006,iThome周刊。http://www.ithome.com.tw/itadm/article.php?c=36226&s=1
[2]張鈞垣,2005,影響組織內工作者採用即時通訊軟體因素之研究,國立中
正大學資訊管理研究所碩士論文。
[3]蘇伯方,2004,即時傳訊軟體採用模式之研究,國立中山大學傳播管理研究所碩士論文。
English reference
[1] Agarwal, R.A. and Prasad, J, 1999, “Are individual’s differences germane to the acceptance of new information technologies?”, Decision Sciences, Vol.30 no.2, p361-391.
[2] Ajzen, I. & Fishbein, M., 1980, “Understanding attitudes and predicting social
Behavior”, NJ : Prentice-Hall, Inc.
[3] Ajzen, I., 1985, “From intentions to actions: A theory of planned behavior”, In J.-
Kuhl & J Beckmann (Eds.), Action Control: From Cognition to Behavior, 11–39.
New York: Springer.
[4] Ajzen, I., 1991, “The theory of planned behavior”, Organizational Behavior and
Human Decision Process, 50(2), 179-211.
[5] Albert H. Huang, Shin-Yuan Hung & David C. Yen, 2007, “An exploratory
Investigation of two internet-based communication modes”, Computer Standards
& Interfaces, Volume 29, Issue 2, 238-243.
[6] Anderson, J. C., and Gerbing, D. W., 1988, “Structural equation modeling in practice: A review and recommended two-step approach”, Psychological Bulletin, Vol.103, No.3, PP. 411-423.
[7] Baytos, K. and Kleiner, B. H., 1995, “New developments in job design”, Business Credit, 97 (2), pp.22-28.
[8] Beer, S., 2003, Instant mayhem, SMH, 18 February.
[9] Borman, W. C., and Motowidlo S. J., 1997, “Task performance and contextual
performance: The Meaning for Personnel Selection Research”, Human Performance 10 (2), pp.99-109.
[10] Bradbury, 2001, “Pigeon post for the 21st century”, Computer Weekly (October 18) 1 – 6.
[11] Byrd, T.A. and Turner, D.E., 2000, “Measuring the flexibility of information technology infrastructure”, Journal of Management Information Systems (17:1), pp. 167–208.
[12] Campbell, J., 1990, “Modeling the performance prediction problem in industrial and organizational psychology”, Chicago: Consulting Psychologists press.
[13] Campbell, J. P., Dunnette, M. D., Lawler, E. E., and Weick, K. E., 1970,
“Managerial behavior, performance, and effectiveness”, McGraw-Hill.
[14] Cameron, A. F., & Webster, J., 2005, “Unintended consequences of emerging
communication technologies: Instant messaging in the work place”, Computers in Human Behavior, 21(1), 85−103.
[15] Chakravarthy, B. S., 1986, “Measuring strategic performance”, Strategic
Management Journal, 7 (5) Sep-Oct, pp.437-458.
[16] Chen K., Yen D.C., Huang A.H., 2004, “Media selection to meet communications
contexts: comparing e-mail and instant messaging in an undergraduate population”, Communications of the Association for Information Systems 14, 387–405.
[17] Compeau, D., & Higgins, C. A., 1995, “Computer self-efficacy: Development of a measure and initial test”, MIS Quarterly, 19, 189-211.
[18] Compeau, D., Higgins, C. A. & Huff, S., 1999, “Social cognitive theory and
individual reactions to computing technology A longitudinal study”, MIS Quarterly,23(2), 145-158.
[19] Daft, R. L.,& Lengel, R. H., 1984, “Information richness: A new approach to
managerial behavior and organizational design”, Research in Organizational
Behavior, 6, 191–233.
[20] Daft, R. L.,& Lengel, R. H., 1986, “Organizational information requirements, media richness, and structural design”. Management Science, 32, 554–571.
[21] Davis, F.D., 1986, “A technology acceptance model for empirically testing new
end-user information system:Theory and results, doctoral dissertation”, MA: MIT Sloan School of Management Cambridge.
[22] Davis, F.D., 1989, “Perceived usefulness, perceived ease of use, and user
acceptance of information technology”. MIS Quarterly, 13(3), 319-339.
[23] Davis, F.D., Bagozzi, R. P., & Warshaw, P. R., 1989, “User acceptance of computer technology: A comparison of two theoretical model”, Management Science, 5(8):982-1003
[24] Dishaw, Mark T. & D.M. Strong, 1999, “Extending the technology acceptance
model with task-technology fit construct''s”, Information & Management, 36, 9-21.
[25] Donal Casey, 2007, “Building a secure instant messaging environment”, Network security, January.
[26] Downs, T. M., 1992, “Superior and subordinate perceptions of communication
during performance appraisal interviews”, Communication Research Reports, 9
(2), 147-158.
[27] Ellingson, L. L. and Buzzanell, P. M, 1999, “Listening to women’s narratives
of breast cancer treatment: A feminist approach to patient satisfaction with
physician patient communication”, Health Communication, 11, 347-351.
[28] Erlend B., Per H., Eva H. &Thomas S., 2007, “Risk analysis of information security in a mobile instant messaging and presence system for healthcare”, International Journal of Medical Informatics, Volume 76, Issue 9,677-687.
[29] Fishbein, M. & Ajzen, I., 1975, “Belief, attitude, intention and behavior: An
introduction to theory and research”, MA: Addison-Wesle.
[30] Fornell. C., and Larcker, F., 1981, “Evaluating structural equation models with unobservable variables and measurement error”, Journal of Marketing Research, PP. 39-50.
[31] Gerald Faulhaber, 2002, “Network effects and merger analysis: instant messaging and the AOL–Time Warner case”, Telecommunications Policy, Volume 26, Issues 5-6, 311-333.
[32] Goldsborough, R., 2001, “Instant messaging for instant communications”, Link-Up, 18(May–June), 7.
[33] Grinter, R. & Palen, L., 2002, “Instant Messaging in teen Life”, Proceedings of
CSCW ‘02, New Orleans, LA.
[34] Hair, Joseph F.,JR, Rolph E. Anderson, Ronald L. Tatham, William C. Black ,1988, Multivariate data analysis, Prentice Hall.
[35] Igbaria, M., & Iivari, J., 1995, “The effects of self-efficacy on computer usage”,
Omega, 23(6), 587-605.
[36] Igbaria, M., Zinatelli, P., & Cragg, N.; Cavaye, A., 1997, “Personal computing acceptance factors in small firms: A structural equation model”, MIS Quarterly, 21(3):279-306
[37] Isaacs, E. A., Walendowski, A., Whittaker, S., Schiano, D. J., & Kamm, C., 2002, “The character, functions, and styles of instant messaging in the workplace”, Computer supported cooperative work, New Orleans, LA.
[38] Kessler, M., 2002, “Instant messaging at work can open door to hackers”, USA Today, Retrieved June 21, 2002 from http://www.usatoday.com/money/tech/2002-05-29-im-security.htm
[39] Koufteros, X.A., and Vonderembse, M.A., and Doll, W.J., 2002, “Examining the
competitive capabilities of manufacturing firms”, Structural equation modeling,
(9:2), pp. 256-282
[40] Lim, K.H., Benbasat, I., & Ward, L.M., 2000, “The role of multimedia in
changing first impression bias”, Information Systems Research (11:2), 115-136.
[41] Langa, 2001, “More Instant-Messaging security holes”, Information Week, TechWeb, http://www.informationweek.com/story/IWK20010927S0021
[42] Mark Brenda L., Hy Sockel, 2001, “A confirmatory factor analysis of IS employee motivation and retention”, Information & Management, 38(5), PP.265-276.
[43] Mathieson, K., 1991, “Predicting User Intentions: Comparing the technology
acceptance model with the theory of planned behavior”, Information Systems
Research, 2(3), pp. 173-191.
[44] Michael McClea, David C. Yen & Albert Huang, 2004, “An analytical study
towards the development of a standardized IM application”, Computer Standards
& Interfaces, Volume 26, Issue 4.
[45] Microsoft (2007) Microsoft Security Bulletin MS07-054 http://www.microsoft.com/technet/security/bulletin/MS07-054.mspx
[46] Mingail, S., 2001, “Instant Messaging: Next best thing since e-mail? “ Retrieved January 22, 2003. Available:http://www.canadalawbook.ca/headline128_ar.html.
[47] Moon, J.W. & Kim, Y.G., 2001, “Extending the TAM for a world-wide-web
Context”, Information & Management, 38(4), 217-230.
[48] Murphy, C. A., Coover, D., & Owen, S. V., 1989, “Development and validation
of the computer self-efficacy scale”, Educational and Psychological Measurement, 49, 893-899.
[49] Nardi, B., Whittaker, S., Bradner, E., 2000, “Interaction and Outeraction: Instant
Messaging in Action”, Proc. CSCW’00, 79-88.
[50] Nunnally, 1978, J.L., Psychometric Theory 2th, New York: McGraw Hill Publishers.
[51] Pfeffer, J., 1982, Organizations and organization theory. Boston, MA: Pitman
[52] Pitt, L.F., Watson, R.T. & Kavan, C.B, 1995, “Service quality: A measure of
information systems effectiveness”, MIS Quarterly, 19(2), 173-187.
[53] Radicati Group, Instant Messaging Market 2005-2009, Available:
http://www.radicati.com/reports/single.asp#18
[54] Robey, Daniel, 1979, “User attitudes and management information system use”,
Academy of Management Journal, Vol.22, No.3.
[55] Robbins, S. P., 2001, Organizational Behavior, Upper saddle river, New
Jersey: Prentice Hall Inc.
[56] Rohlfs, J., 1974, “A theory of interdependent demand for a communications service”, Bell Journal of Economics and Management Science, 5(1), 16–37.
[57] Scott Nicholson, 2002, “Socialization in the "Virtual Hallway": Instant Messaging in the asynchronous Web-Based distance education classroom”, Internet and Higher Education, v5 n4 p363-72 2002
[58] Schein, E.H., 1980, Organizational psychology. Englewood Cliffs, NJ:
Prentice-Hall Inc.
[59] Segerstad, Y. H., & Ljungstrand, P., 2002, “Instant messaging with WebWho”,
International Journal of Human–Computer Studies, 56, 147–171.
[60] Shin-Yuan Hung, Albert H. Huang, David C. Yen and Chia-Ming Chang, 2007,
“Comparing the task effectiveness of instant messaging and electronic mail for
geographically dispersed teams in Taiwan”, Computer Standards & Interfaces,
Volume 29, Issue 6, September 2007, Pages 626-634
[61] Siegel, L. and Lane, I. M., 1982, Personnel and Organizational Psychology,
Richard D .Irwin .INC
[62] Soe, L.L. & Markus, M.L., 1993, “Technological or social utility? Unraveling
explanations of e-mail, v-mail, and fax use”, The Information Society, 9, 213–236.
[63] Stone, J. and Merrion, S., 2004, “Features: Instant messaging or Instant headache? ” ACM Queue, 2(2), April.
[64] Szajna, B., 1996, “Empirical evaluation of the revised technology acceptance model”, Management Science, 42(1), 85-99.
[65] Teo, C., Dornhoffer, J., Hanna, E., & Bower, C., 1999, “Application of skill base techniques to pediatric neurosurgery”, Child Nervous System, 15: 103-109
[66] “Top Five Security Risks for Instant Messaging in 2005”, IMlogic, 2005,
http://www.imlogic.com/pdf/Top5IMSecurity2005.pdf .
[67] Torkzadeh, G., & Koufteros, X., 1994, “Factorial validity of a computer self-
efficacy scale and the impact of computer training”, Educational and
Psychological Measurement, 54(3), 813-821.
[68] Trevino, L. K., Lengel, R. H., & Daft, R. L., 1987, “Media symbolism, media
richness, and media choice in organizations: A symbolic interactionist
perspective”, Communication Research, 14, 553–574.
[69] Venkatraman, N. and Ramanujam, V., 1986, “Measurement of business performance on strategy research: A comparison of approach”, Academy of Management Review, 11 (4), pp.801-814.
[70] Venkatesh, V. & F. D. Davis, 1994, “Modeling the determinants of perceived
ease of use”, Proceedings of International Conference on Information System,
213-227, Vancouver, Canada, 227.
[71] Vroom, V.H., 1964, “Work and motivation”, New York, NY: Wiley.
[72] Wallén, J., 2004, “Tva miljoner svenskar chattar”, Computer Sweden, 8.