1.張春興,青年的認同與迷失,台北:東華書局,1987。
2.張煜麟,台灣監視系統作為集體逃避自由的機制?一種自由主義的觀點,資訊社會研究,2004。 3.張定宇,當前導師制之檢討與改進,教育研究,民64。
4.畢恆達,電眼之城:台灣都市公共空間中電眼之興起與影響,行政院國家科學委員會專題討論研究計畫成果報告,2004。
5.黃光國,《中國人的權力遊戲》,巨流出版,台北,1988。
6.黃光國,《儒家關係主義:文化反思與典範重建》,國立台灣大學出版中心,台北,2005。
7.黃厚銘,網路人際關係的親疏遠近,台大社會學期刊,第28期,國立台灣大學社會學系,2000。
8.黃方銘,結構方程模式理論與應用,五南圖書出版股份有限公司,台北,2002。
9.黃貝玲。虛擬社群的發展現況與趨勢分析。電子化企業:經理人報告,1990。
10.黃萬成,臺北市中小學教師之專業角色期望與角色踐行研究,國立台北科技大學技術及職業教育研究所,2002。
11.黃慧妮,國民小學導師角色期望與角色實踐之調查研究,國立高雄師範大學工業科技教育學系碩士論文,2003。 12.周美伶、何友暉:〈從跨文化的觀點分析面子內涵及騎在社會交往中的運作〉,楊國樞(編),《中國人的心理與行為—理念及方法篇》,頁205-254。桂冠,台北,1992。
13.朱美慧,《我國大專學生個人特性、網路使用行為與網路成癮關係之研究》,私立大葉大學資訊管理研究所碩士論文,2000。 14.陳冠名,青少年網路行為及網路沈迷的因素之研究。國立高雄師範大學教育學研究所博士論文,2004。 15.陳坤虎、雷庚玲、吳英璋,不同階段青少年之自我認同內容及危機探索之發展差異,中華心理學刊,1995。 16.林柏伶、陳美紀、陳文義,影響教師實施資訊科技融入教學行為意願研究,國立彰化師範大學商教系,2006。
17.林傑毓、曾慈君,知識管理架構中虛擬社群應用之研究。2000年科技管理研討會論文集,民89。
18.陳順宇,「多變量分析」,華泰出版,台北市,民94。
19.陳怡汝,日常生活的監視─以埔里鎮與日月潭國家風景區之監視器應用為例,暨南國際大學公共行政與政策學系碩士論文,2005。 20.陳慧珍,治安與隱私的平衡:探討台中市公共空間中錄影監視系統之設置,東海大學公共行政研究碩士論文,2004。 21.吳姝蒨:《電子仲介傳播人際情感親密關係之研究探訪電子佈告欄(BBS)中的「虛擬人際關係」》,國立政治大學新聞研究所碩士論文,1996。 22.徐江敏、李姚軍譯,「日常生活中自我表演(原Goffman著)」,桂冠出版,台北,1992。
23.傅宏譯,「認同社會(THE IDENTITY SOCIETY)(原William Glasser著)」,桂冠出版,台北,1994。
24.柯朝欽、鄭祖邦譯,「社會學理論(上)(原Ritzer, George、Goodman, Douglas著)」,巨流圖書,台北,2004。
25.鄭時宜,影響環保團體成員三種環境行為意向之因素比較,博士論文,國立中山大學公共事務管理研究所,2003。 26.曾妍,由圓形監獄理論透視博客話語權,中國新聞研究中心,2007。
27.郭恬如,「虛擬社區顧客輪廓資料、關係行銷及其隱私權議題」,國立政治大學企業管理學系碩士論文,民1999。 28.洪明洲,網路教學,華彩軟體,台北市,1999。
29.潘欣宜,以網路外部性觀點思考網際網路上資訊中介商之經營策略。國立台灣大學資訊管理研究所碩士論文,台北市,1999。 30.沈夢燕,面子話•話面子-沉默螺旋中的面子因素初探,政治大學新聞研究所,中華傳播學年會, 2007。
31.董娟娟,從監視社會理論看新加坡抗SARS戰役,國立暨南大學公共行政與政策學系,台灣社會學會年會會議論文,2003。
32.董娟娟,威權政治與之試經濟並進下的監視社會發展:以新加坡體制為例,東南亞學刊,第一卷第二期,頁85-136,2004。 33.邱皓政,結構方程模式:LISREL的理論、技術與應用,雙葉書廊,台北,2003。
34.邱憶惠,教師認同之敘說探究:以一位幼教教師為例,屏東教育大學學報,第二十九期-教育類,2007。
35.葉香麟,品牌形象、品牌關係與知覺品質關係之研究-以美白化妝品業為例,銘傳大學,碩士論文。 36.李國屏,路口監視器選址之研究:以台中市何安派出所轄區為例,台灣地理資訊學會年會暨學術研討會,逢甲大學地理資訊系統研究中心,2005。
37.劉素琴,從關係價值與關係品質探討顧客忠誠度-銀行業之實證研究,國立雲林科技大學企業管理研究所碩士論文(未出版) ,2000。 38.蔣美惠,探討保全人員生涯管理、人格特質及組織氣候對工作滿足、自我效能與工作績效之關聯性研究-以台北市保全公司為例。南華大學管理科學系碩士論文,2003。 39.賴文魁,人格特質、台灣金控經營績效對股票投資人投資型態及投資績效之研究,大葉大學會計資訊學研究所碩士班,2003。
40.Fishbein, M., & Ajzen, I. Belief, Attitude, Intention, and Behavior: An Introduction to Theory and Research. Reading, MA: Addison-Wesley, 1975.
41.Ajzen, I., & Fishbein, M., Understanding attitudes and predicting social behavior, Englewood Cliffs, NJ: Prentice-Hall, Inc, 1980.
42.Ajzen, I. "From intentions to actions: A theory of planned behavior," in: Springer series in social psychology, J. Kuhl and J. Beckmann (eds.), Springer, Berlin, 1985, pp. 11-39.
43.Ajzen, I. "The Theory of Planned Behavior," Organizational Behavior and Human Decision Processes, Dec 1991, pp 179-211.
44.Ajzen, I. "Perceived behavioral control, self-efficacy, locus of control, and the theory of planned behavior," Journal of Applied Social Psychology, 2002, pp 665-683.
45.Armitage, C.J. and Conner, M., Loach, J. and Willetts, D. Different perceptions of control: applying extended theory of planned behaviour to legal and illegal drug use. Basic and Applied Social Psychology, 1999, 21, 301-316.
46.Anderson, J. C., & Gerbing, D. W. “Structural equation modeling in practice: a review and recommended two-step approach,” Psychological Bulletin,1988, Vol.103, 411-423.
47.Armstrong & John Hagel,”The real value of on-line communities”, Harvard Business Review, 1996.
48.Bagozzi, R. P. and Yi, Y., “On the Evaluation of Structural Equation Models,” Journal of Academy of Marketing Science, 1988, 16(1), pp.74-94.
49.Bandura, A. Self-efficacy: Toward a unifying theory of behavior change. Psychological Review, 84(2), 191-215, 1977.
50.Bandura, A. Social Foundation of thoughts and action. Englewood Cliffs, NJ: Prentice Hill, 1986, 92-113.
51.Bandura, A. Self-Efficacy: The Exercise of Control, W. H. Freeman, New York, 1997.
52.Bhattacherjee, A. Acceptance of e-commerce services: The case of electronic brokerages. IEEE Transaction on Systems, Man, and Cybernetics-Part A: , 2000, 30(4): 411-420. Systems and Humans
53.Bock,G.W.,& Kim,Y.G. Breaking the myths of rewards: an exploratory study of attitudes about knowledge sharing. Information Resource Management Journal, 2002, 15(2):14-21.
54.Bohl, J. V. & Van Zoest, L. R. Mathematics teacher identity: A framework for understanding teacher development and action across multiple communities, 2002.
55.Claus Elmholdt, ”Knowledge management and the practice of knowledge sharing and learning at work: a case study,” Studies in Continuing Education, Vol. 26, No. 2, 2004.
56.Craig, C. J., & Olson, M. R. The development of teachers’ narrative authority in knowledge communities: A narrative approach to teacher learning. In N. Lyons and V. K. LaBoskey (Eds.), Narrative inquiry in practice: Advancing the knowledge of teaching (pp.1-10. New York: Teachers College Press, 2002.
57.David Engberg,”The Virtual Panopticon,” Impact of New Media Technologies, 1996.
58.Davis, F.D., “Perceived usefulness, perceved ease of use, and user acceptance of information technology,” MIS Quarterly, 1989.
59.David Lyon,”From Big Brother to Electronic Panopticion,” The Rise of Surveillance Society, 1994, 57-80.
60.David Lyon, “Buckingham: Open University Press,” Surveillance Society: Monitoring Everyday Life, 2001.University Press.
61.David Yau-fai Ho,”On the Concept of Face,” The American Journal of Sociology, Vol. 81, No.4, 1994, 867-884.
62.Feng-Yang Kuo, Mei-Lien Young, ”A Study of the Intention- Action Gap in Knowledge Sharing Practices,” Journal of The American Society for Information Science and Technology, Vol. 59, No. 8, 2008, 1224-1237.
63.Feng-Yang Kuo, Mei-Lien Young,”Predicting knowledge sharing practices through intention: A test of competing models,” Computers in Human Behavior, Vol. 24, 2008, 2697-2722.
64.Fishbein, M., and Ajzen, I. Belief, attitude, intention, and behavior: An introduction to theory and research Addison-Wesley Pub. Co., Don Mills, Ontario, 1975.
65.Foucault, Michel, The Essential works of Michel Foucault, 1954-1984, vol.1: Ethics: Subjectivity and Truth, edited by Paul Rabinow. New York: The New Press, 1997.
66.Foucault, Michel, Power/Knowledge: Selected Interviews & Other Writings, 1972-1977,edited by Colin Gordon. New York: Pantheon Books , 1980.
67.George, J., Mohammed, J. & Quamina-Aiyejina, L. Teacher identity in an era of educational reform: the case of Trinidad and Tobago. Compare, 33(2), 191-206, 2003.
68.Giddens, Anthony. Modernity and Self-Identity. Cambridge: Polity Press, 1991.
69.Goffman, E. The Presentation of the Self in Everyday Life, New York:Doubleday, 1995.
70.Goffman,E..Interaction ritual: Essays on face-to-face behavior. New York: Doubleday Anchor, 1967.
71.Hair, J.F.Jr., Anderson, R.E., Tatham, R.L. and Black, W.C., Multivariate Data Analysis. Upper Saddle River, NJ: Prentice Hall, 1998.
72.Hendriks, P. Why share knowledge? The Influence of ICT on motivation of knowledge sharing. Knowledge and Process Management, 1999, 6(2), 91—100.
73.Hopf, Ted. The Promise of Constructivism in International Relations Theory. In-ternational Security, 1998.
74.Hoyle, R. H., & Panter, A. T. Writing about structural equation models. In R. H. Hoyle (Ed.), Structural equation modeling (pp. 158-176), 1995.
75.Hsien Chin Hu, “The Chinese Concepts of “Face”,” American Anthropologies, Vol. 46, No. 1, 1944.
76.Hu,L., & Bentler,P.M. Cutoff criteria for fit indexes in covariance structure analysis: Conventional criteria versus new alternatives. Structural Equation Modeling, 1999, 6 , 1-55.
77.Joreskog, K. G., & Sorbom, D. LISREL 8: Structural equation modeling with the SIMPLIS command language. Chicago: Scientific Software International, 1993.
78.King, A. Y., & Myers, J. T. Shame as an incomplete conception of Chinese culture: A study of face. Hong Kong: Social Research Center , the Chinese University of Hong Kong, 1977.
79.Kline, R. B. Principles and practice of structural equation modeling. New York: Guilford Press.Ch. 11. Software for SEM: Amos, EQS, and LISREL, 1998.
80.Lyon, David, The Electronic Eye: the Rise of Surveillance Society. Cambridge: Polity Press, 1994.
81.Lyon, David, Surveillance Society: Monitoring Everyday Life. Buckingham: Open University Press, 2001.
82.Marsh, H. W., & Hocevar, D. A new, more powerful approach to multitrait-multimethod analy-ses: Application of second-order confirmatory factor analysis. Journal of Applied Psychology, 1988.
83.Miller Marsh, M. The shaping of Ms. Nicholi: The discursive fashioning of teacher identities. Qualitative studies in Education, 2002, 15(3), 333-347.
84.Mougayar, W. Opening digital markets: Battle plans and business strategies for internet commerce. New York: McGraw-Hill, 1998.
85.Nias, J. Primary Teachers Talking: A Study of Teaching As Work. London: Routledge, 1989.
86.Nunnlly, J., Psychometric Theory, 2ndEdition, New York: McGraw-Hill, 1978.
87.Oscar H. Gandy, Jr. “The Surveillance Society: Information Technology and Bureaucratic Social Control” Journal of Communication, Vol. 39, No. 3, 1989.
88.Paolo Bussotti and Maria Chiara Pettenati,”Functional model of a sense-emerging assistant for knowledge construction and management,” Journal of Knowledge Management, Vol. 9, No. 6, 2005, pp.92-103...
89.Ritzer, George and Douglas J. Goodman. "Structural Functionalism, Neofunctionalism, and Conflict Theory," in Sociological Theory, sixth edition., 2004.
90.Rogers, Everett M., Diffusion of Innovation New York: Free Press, 1983, 3rd ed.
91.Sablo-Sutton, S. A. Writing our selves: An investigation of literacy, identity and poetry in an urban high school. Unpublished Doctoral Dissertation, University of California, Berkeley, 2003.
92.Suppiah, Haymalatha, The Intelligent Island: Surveillance and Social Control in Singapore, Master’s Thesis. Ontario: Queen’s University Kingston, 1996.
93.Sven C. Voelpel and Zheng Han,”Managing Knowledge sharing in China: the case of Siemens ShareNet,” Journal of Knowledge Management, Vol. 9, No. 3, 2004, pp.51-63.
94.Tabachnick, B. G., & Fidell, L. S. Using Multivariate Statistics (5th Ed.), 2007.
95.Tajfel, H. Human groups and social categories: Studies in social psychology. Cambridge, England: Cambridge University Press, 1981.
96.Taylor, S., and Todd, P.A. "Understanding Information Technology Usage: A Test of Competing Models," Information Systems Research (6:2), Jun 1995, p 144.
97.Tesser, A. Some effects of self-evaluation maintenance on cognition and action. In R. M. Sorrentino & E. T. Higgins(Eds.), Handbook of motivation and cognition: Foundations of social behavior (pp.435-464).NewYork:Guilford, 1986.
98.Tesser, A. Towards a self-evaluation maintenance model of social behavior. In L. Berkowitz (Ed.), advances in experimental social psychology (Vol.21, pp.181-227). San Diego: Academic Press, 1988.
99.Travers, K. A. Exploring the development of teacher identity: A study of prospective teachers learning to teach. Unpublished dissertation of University of Wisconsin-Madison, 2000.
100.Walther, J. B. Interpersonal effects in computer - mediated interaction: A relational perspective. Communication Research, 1992, 19(1), 52-90.
101.Walther, J. B. Computer-mediated communication: Impersonal, interpersonal and hyper personal interaction. Communication Research. 1996, 23, pp.3-43.
102.Wellman B. et al., COMPUTER NETWORKS AS SOCIAL NETWORKS: Collaborative Work, Telework, and Virtual Community, Annual. Review of. Sociology, 1996, 22, 213–38.
103.Williams, L. I., and Hazer, J. T., Antecedents and consequences of satisfaction and commitment in turnover models: A reanalysis using latent variable structural equation methods, Journal of Applied Psychology, 1986, 71(2), 219-231.
104.Zembylas, M. Interrogating "teacher identity": Emotion, resistance, and self-formation. Educational Theory, 2003, 53(1), 107-127.