參考文獻
中文部分
吳懿婷 (譯) (2001)。隱私的權利 (原作者:Alderman, E., & Kennedy, C.)。臺北:商周。(原著出版年:1995年)
吳庚 (2003)。憲法的解釋與適用。台北:三民書局。
邱皓政 (2000)。量化研究與統計分析。台北:五南。
邱秋雲 (2003)。網路戀情者個人特質與其網戀經驗之初探。國立交通大學傳播所碩士論文。邱聖斐 (2009)。資訊社會下隱私權保護之研究─以RFID應用於機場自動查驗通關系統為中心。東吳大學法律學系碩士在職專班科技法律組碩士論文。李美枝 (2000)。社會心理學──理論研究與應用。台北:大洋出版社。
林子儀 (2003)。基因資訊與基因隱私權―從保障隱私權的觀點論基因資訊的利用與法的規制。基因技術挑戰與法律回應—基因科技與法律研討會論文集,239-296。台北,學林文化。
林曉芳 (2008)。統計學─SPSS之應用。臺北市:鼎茂圖書。
林錚顗 (譯) (2011)。隱私不保的年代:網路的流言蜚語、人肉搜索、網路霸凌和私密窺探 (原作者:Solove, D. J.)。台北市:博雅書屋。(原著出版年:2007)
范姜真媺 (2004)。企業內電子郵件之監看與員工隱私權。台灣本土法學,60,7-21。
郭恬如 (1999)。虛擬社區顧客輪廓資料、關係行銷及其隱私權議題。國立政治大學企業管理學系碩士學位論文。徐新隆 (2005)。數位時代下資訊隱私權問題之研究—以個人資料保護為中心。國立台北大學法律學院法學系研究所碩士論文。陸啟超 (2006)。科技發展與資訊隱私權的保護—以RFID與資訊隱私權的衝突為例。私立東海大學法律研究所碩士論文。張春興 (2004)。心理學概要。台北市:臺灣東華書局。
傅仰止 (2000)。電子郵件聯繫的抽樣方法比較:網際網路調查與個人網絡抽樣。第三屆「調查研究方法與應用」學術研討會論文集,3-25。
黃琪瑜 (1986)。青少女的月經態度及其相關因素之探討。政治大學心理研究所碩士論文。黃厚銘 (2000)。網路人際關係的親疏遠近。國立台灣大學社會學刊,28,117-154。
游康婷 (2001)。網路友誼的形成與維繫:電子佈告欄使用者交友行為研究。國立台灣師範大學大眾傳播研究所碩士論文。楊牧貞、黃光國 (1980)。自我揭露的楔型模式及其相關變項。中華心理學刊,22(1),51-70。鄭伯壎 (1994)。消費者心理學 。臺北:大洋出版社。
鄭郁欣、林佳誼、蔡貝侖 (譯) (2008)。探究新聞倫理 (原作者:Sanders, K.)。臺北:韋伯文化。(原著出版年:2003年)
錢玉芬 (2007)。傳播心理學。臺北縣深坑鄉:威仕曼文化。
賴冠名 (2010)。使用者資訊隱私顧慮和網路隱私機制對信任的影響—以Facebook台灣使用者為例。國立中央大學資訊管理研究所碩士論文。薛怡青 (2001)。台灣BBS使用者之自我揭露、名片檔自我呈現意願與暱稱認知之初探。國立交通大學傳播所碩士論文。簡榮宗 (2000)。網路上資訊隱私權保護問題之研究。私立東吳大學法律學系研究所碩士論文。英文部分
Agranoff, M. H. (1991). Controlling the threat to personal privacy: Corporate policies must be created. Journal of Information Systems Management, 8, 48-52.
Allen, A. L. (1997). Genetic privacy:Emerging concepts and values. In M. A. Rothstein (Eds.), Genetic Secrets: Protecting Privacy and Confidentialityin the Genetic Era (pp. 31-35). CT: Yale University Press.
Altman, I., & Taylor, D. A. (1973). Social penetration: The development of interpersonal relationships, New York: Holt, Rinehart & Winston.
Archard, D. (1998). Privacy, the public interest and a prurient public. In M. Kieran (Eds.), Media Ethics (pp. 82-96). New York: Routledge.
Berger, C. R., & Calabrese, R. J. (1975). Some explorations in initial interaction and beyond: Toward a developmental theory of interpersonal communication. Human Communication Research, 1, 99-112.
Clarke, R. (1999). Internet privacy concerns confirm the case for intervention. Communications of the ACM, 42(2), 60-67. Association for Computing Machinery.
Derlega, V. J., & Grzelak, J. (1979). Appropriateness of self-disclosure. In G. J. Chelune (Eds.), Self-disclosure: Origins, patterns, and implications of openness in interpersonal relationships (pp.151-176). San Francisco: Jossey-Bass.
Derlega, V. J., Margulis, S. T., Metts S., & Petronio, S. (1993). Self-disclosure. Newbury Park: Sage.
DeVito, J. A. (2003). Human communication: The basic course (9th ed.). Boston: Allyn & Bacon.
Jourard, S. M. (1971). Self-disclosure: An experimental analysis of the transparent self. New York: Wiley-Interscience.
Kaiser, H. F. (1974). An index of factorial simplicity. Psychometrika, 39(1), 31-36.
Kelman, H. C. (1961). Processes of opinion change. Public Opinion Quarterly, 25, 57-78.
Kim, M. S. & Hunter, J. E. (1993). Relationships among attitudes, behavioral intentions, and behavior: a meta-analysis of past research, Part 2. Communication Research, 20(3), 331-364.
Krech, D., Crutchfield, R. S., & Ballachey, E. L. (1962). Individaul in society: a textbook of social psychology. New York: McGraw-Hill.
Lutz, R. J. (1991). The role of attitude theory in marketing. In Perspectives in Consumer Behavior, eds. Harold H. Kassarjian and Thomas S. Robertson (4th ed.), Upper Saddle River, NJ: Prentice Hall, 317-390.
Mann, J. H. (1960). The differential nature of prejudice rduction. Journal of Social Psycology. 52, 339-343.
Nunnally, J. C. (1978). Psychometric theory (2nd ed.). New York: McGraw-Hill.
Warren, S. D., & Brandeis, L. D. (1890). The right to privacy. Harvard Law Review, 4, 193.
Westin, A. F. (1967). Privacy and freedom. Atheneum Publishers, New York.
Wrightsman, L. S. (1962). Dimensionalization of attitudes toward the negro. Psychological Reports, 11, 439-448.
網路資料
中央社即時新聞 (2010年5月31日)。響應者寡 戒臉書日活動不如預期。上網日期:2010.6.20,取自http://www.cna.com.tw/SearchNews/doDetail.aspx?id=201005310207&q
全國法規資料庫 (2010)。個人資料保護法。上網日期:2011.2.16,取自http://law.moj.gov.tw/LawClass/LawAll.aspx?PCode=I0050021
維基百科 Wikipedia (2011)。Facebook。上網日期:2011.2.16,取自http://zh.wikipedia.org/zh-tw/Facebook#_note-64
盧心怡 (2009年9月21日)。社群網站席捲全台 Facebook成功關鍵報告。電子商務時報。上網日期:2011.2.14,取自http://www.ectimes.org.tw/Shownews.aspx?id=090921054030
Ajzen, I. (1991). The theory of planned behavior. Organizational Behavior and Human Decision Processes, 50, 179-211. Retrieved April 25, from http://courses.umass.edu/psyc661/pdf/tpb.obhdp.pdf
Alexa (2011). facebook.com. Retrieved July 25, from http://www.alexa.com/siteinfo/facebook.com
CheckFacebook.com (2011). Facebook Taiwan user distribution. Retrieved February 16, from http://www.checkfacebook.com/
Dwyer, C., Hiltz, S., & Passerini, K. (2007). Trust and privacy concern within social networking sites: A comparison of Facebook and MySpace. Retrieved February 19, from http://csis.pace.edu/~dwyer/research/DwyerAMCIS2007.pdf
Facebook隱私導覽與說明 (2011)。自己掌控分享程度的多寡。上網日期:2010.6.20,取自http://www.facebook.com/privacy/explanation.php
Govani, T., & Pashley, H. (2007). Student awareness of the privacy implications when using Facebook. Retrieved February 19, from http://lorrie.cranor.org/courses/fa05/tubzhlp.pdf
Hardey, M. (2008). The value of social media for business. Retrieved February 16, from http://www.slideshare.net/mazphd/the-value-of-social-media-for-business-presentation
Homans, G. C. (1958). Social behavior as exchange. American Journal of Sociology, 63, 597-606. Retrieved July 8, from http://www.gigusa.org/resources/gt/31.pdf
Kincaid, J. (2010, April 21). Hacking the graph: Live from Facebook’s f8 conference. TechCrunch. Retrieved June 4, from http://techcrunch.com/2010/04/21/hacking-the-graph-live-from-facebooks-f8-conference/
Kirkpatrick, M. (2010). Facebook's Zuckerberg says the age of privacy is over. Retrieved February 16, from http://www.readwriteweb.com/archives/facebooks_zuckerberg_says_the_age_of_privacy_is_ov.php
McCarthy, C. (2009, February 18). Facebook’s about-face: Change we can believe in?. CNET News. Retrieved June 14, from http://news.cnet.com/8301-13577_3-10166663-36.html
McCarthy, C. (2009, September 18). Facebook Beacon has poked its last. CNET News. Retrieved June 9, from http://news.cnet.com/8301-13577_3-10357107-36.html
MMDays (2007)。當聖杯出現裂痕:Facebook的政策大轉彎與Social Network的極限是?。上網日期:2011.6.7,取自http://mmdays.com/2007/12/01/facebook_revamp_its_policy/
Nick burcher (2011). Facebook usage statistics Dec 31st 2010 vs. Dec 31st 2009 vs. Dec 31st 2008. Retrieved February 19, from http://www.nickburcher.com/2011/01/facebook-usage-statistics-dec-31st-2010.html
Poletti, T. (2007, November 28). Facebook users: Watch out when shopping online. MarketWatch. Retrieved June 9, from http://www.marketwatch.com/story/correct-facebook-may-become-the-grinch-who-stole-christmas
Prosser, W. L. (1960). Privacy. California Law Review, 48(3), 383-423. Retrieved January 8, from http://www.californialawreview.org/assets/pdfs/misc/prosser_privacy.pdf
Schneier, B. (2006). Lessons from the Facebook riots. Retrieved February 19, from http://www.wired.com/politics/security/commentary/securitymatters/2006/09/71815
Smith, A. (2010, May 2). Ways for Facebook to improve user privacy. Top Tech Reviews. Retrieved June 4, from http://www.toptechreviews.net/tech-news/ways-for-facebook-to-improve-user-privacy/
TechCrunch (2010). Facebook overthrows Yahoo to become the world’s third largest website. Retrieved February 16, from http://techcrunch.com/2010/12/24/facebook-yahoo-third-largest-website/
Whelan, B. (2005). Facebook, a fun resource or invasion of privacy. Retrieved February 16, from http://athennews.com/issue/article.php3?story_id=21491
Whitworth, D. (2009, May 18). Hackers ‘launch attack’ on Facebook. BBC News. Retrieved June 14, from http://news.bbc.co.uk/newsbeat/hi/technology/newsid_8055000/8055644.stm