中文部分
PChome(2012)。PChome買網址入門教學。上網日期:2013年5月25日。檢自:http://myname.pchome.com.tw/learn/teach.htm#2
Openfind(2013)。2013 第二季 Openfind 郵件威脅分析報告。上網日期:2013年9月29日。檢自:http://www.openfind.com/taiwan/download/report/2013_Q2_Openfind_Email_Threats_Report.pdf
中央社(2013a)。行動裝置夯 普及率近 5成。上網日期:2013年7月19日。檢自:http://news.chinatimes.com/realtime/110111/112013071700757.html
中央社(2013b)。【暑假怎麼過?】3c當電子保母 易影響腦部發展。上網日期:2013年7月19日。檢自:http://www.lihpao.com/?action-viewnews-itemid-130414
中國大陸互聯網絡訊息中心(2013)。第31次中國互聯網絡發展狀況統計調查報告。上網日期:2013年10月5日。檢自:http://www.cnnic.cn/hlwfzyj/hlwxzbg/hlwtjbg/201301/P020130122600399530412.pdf
王旭正、林曾祥、林宜萱(2006)。社交工程式網路釣魚之數位鑑識與證據保存研究。上網日期:2013年7月17日。檢自:http://www.docin.com/p-470541328.html
王秀園(2010)。習慣這件事。上網日期:2013年7月24日。檢自:http://www.mdnkids.com.tw/family_edition/detail.asp?sn=511
王淑楨、黃志成(2012)。人類行為與社會環境。新北市:揚智文化事業股份有限公司。
王皓昀(2010)。媒介使用與媒介依賴對運動博弈資訊可信度的影響-電視, 報紙, 網路的比較。運動傳播學刊(3),70-90。
王衛華、王長杰(2007)。網路釣魚的危害及防範措施。洛陽工業高等專科學校學報,17(2),36-37。
台灣大哥大基金會(2012)。2012台灣青少兒網路使用與自我形象調查報告。台北市:台灣大哥大基金會。
台灣微軟新聞室(2011)。兒少網安調查結果出爐:一成學童可能網路成癮 五成愛玩超齡遊戲。上網日期:2013年7月4日。檢自:http://www.microsoft.com/taiwan/press/2011/07/0712.mspx
安聖慧(2011)。消費者行為學。北京市:對外經濟貿易大學出版社。
余民寧(2002)。教育測驗與評量:成就測驗與教學評量(二版)。台北市:心理。
吳文進(2007)。網路釣魚騙術之解析與防治。上網日期:2013年7月17日。檢自:http://www.mjib.gov.tw/mojnbi.php?pg=d2/9608/3-3.htm
吳明隆(2007)。Spss操作與應用: 問卷統計分析實務。台北市:五南。
巫博瀚、賴英娟(2007)。人類動力的基礎—自我效能兼論自我效能對學習者自我調整學習行為與成就表現之影響。教育與發展,24(3),49-56。
李尹暘、林曉佩、林君怡(2007)。自我效能理論之分析與應用。澄清醫護管理雜誌,3(2),46-52。李冠賢(2013)。反釣魚教學策略:平板電腦融入概念構圖以提升學習動機之可行性評估。國立交通大學理學院科技與數位學習學程碩士論文,新竹市。周倩、吳歡鵲、陳茵嵐、王美鴻(2009)。「資訊素養與倫理」大學通識教育課程-理念, 主題, 教學策略與執行成效。大學圖書館,13(2),24-44。林羿妏(2012)。大專院校學生的facebook使用特性、批判思考與資訊驗證行為的關係。國立交通大學教育研究所碩士論文,新竹市。林順傑(2010)。漫談網路釣魚問題常見手法與分析。上網日期:2013年7月17日。檢自:http://security.twnic.tw/201009/tech1_1.html
林順傑(2011)。台灣反網路釣魚通報機制與平台介紹。上網日期:2013年10月16日。檢自:http://security.twnic.tw/201102/images/oct/tech1.pdf
林碧珍、蔡文煥(2003)。四年級學生在國際教育成就調查試測的數學成就表現。科學教育月刊,258,2-20。林靈宏、張魁峯(2006)。消費者行為學。台北市:五南圖書出版股份有限公司。
財團法人台灣網路資訊中心(2012a)。台灣無線上網使用狀況調查摘要分析。上網日期:2013年7月5日。檢自:http://www.twnic.net.tw/download/200307/20121226c.pdf
財團法人台灣網路資訊中心(2012b)。歷次個人及家庭上網行為調查趨勢分析。上網日期:2013年7月5日。檢自:http://www.twnic.net.tw/download/200307/20120709f.pdf
馬廣惠(2005)。學習動機和努力程度對外與學習成績的影響。解放軍外國語學院學報,28(4),37-41。
國家域名安全中心、APAC、APWG(2013)。全球中文釣魚網站現狀統計報告(2012年下半年)。上網日期:2013年10月9日。檢自:http://www.cnnic.net.cn/gywm/xwzx/rdxw/rdxx/201305/W020130531616450956373.pdf
張春興(1996)。教育心理學-三化取向的理論與實踐 (修訂版)。台北市:東華。
張偉豪(2011)。Sem論文寫作不求人。高雄市:三星統計。
教育部(2008)。教育部中小學資訊教育白皮書。上網日期:2013年7月5日。檢自:http://www.edu.tw/userfiles/url/20120920154137/97.08教育部中小學資訊教育白皮書.pdf
教育部(2012)。辨識網路詐騙學習手冊。台北市:教育部。
郭本禹、姜飛月(2008)。自我效能理論及其應用。上海:上海教育出版社。
陳嘉玫(2011)。網路安全的社交工程。科學發展,461,16-23。
游師柔、孫之元(2014)。工學院學生的反釣魚自我效能、行為和表現與其網路自我效能之相關性研究,GCCCE2014全球華人計算機教育應用大會。中國,上海。
硬是要學(2013)。Facebook詐騙手法又翻新,這次盜走你個資和信用卡完整資料。上網日期:2013年7月1日。檢自:http://www.soft4fun.net/social-networks/facebook/facebook-trick-catch-your-id-and-credit-card-info.htm
華南銀行(2012)。網路銀行安全小秘訣手冊。上網日期:2012年11月6日。檢自:http://www.hncb.com.tw/personal/images/tips.pdf
鈕文英、鍾儀潔、陳佩玉、王慧婷、彭雅真(2012)。應用行為分析。台北市:美國展望教育中心。
黃芳銘(2007)。結構方程式-理論與應用(第五版)。台北市:五南。
黃國禎、蘇俊銘、陳年興(2012)。數位學習導論與實務。新北市: 博碩文化。
黃淑貞、劉翠薇、洪文綺(2002)。影響大學生運動習慣之社會心理因素研究。健康促進暨衛生教育雜誌(22),55-66。黃葳威、林紀慧、呂傑華(2007)。2007 台灣青少兒網路使用調查報告。上網日期:2013年7月5日。檢自:http://123.50.36.35/mediaguide/uploads/conference/20100324170140.pdf
瑞士商業銀行(2012)。通信詐騙 (網路釣魚)。上網日期:2013年7月5日。檢自:http://www.ubs.com/tw/tc/legalinfo2/phishing.html
經濟部(2011)。網路交易買家必備的防詐自保寶典。台北市:經濟部商業司。
葉亭均(2013)。Google將定期公布惡意程式、網路釣魚資訊。上網日期:上網日期:2013年7月5日。檢自:http://udn.com/NEWS/BREAKINGNEWS/BREAKINGNEWS5/7989348.shtml
資策會FIND(2013)。2012年6月底止台灣上網人口。上網日期:上網日期:2013年7月4日。檢自:http://www.find.org.tw/find/home.aspx?page=many&;id=340
劉濱、吳燕、陳琦、曹樹貴、劉振宇(2008)。網路釣魚及其防範技術。河北工業科技,25(6),379-381。
歐陽誾(2007)。網路世界不設防─ 淺談兒童及青少年網路安全的重要性。上網日期: 2013年7月5日。檢自:http://www2.nutn.edu.tw/gac500/webservice/96/book/p5/584/歐陽誾.pdf
鄭秀月、李茹萍(2009)。戒菸門診個案持續戒菸行為與自我效能之研究。臺灣醫學,13(3),223-230。鄭紹成、陳鉦達、黃仁俊(2006)。服務保證、價格與企業可信度對消費者購買意願之影響-以團體套裝旅遊業為例。旅遊管理研究,6(1),83-100。鄭照順、鄒浮安(2011)。大學生網路使用行為與網路影響之研究-以高苑科技大學為例 。高苑學報,17(2),119-134。諾頓(2011)。魚叉式網路釣魚:這是詐騙,無關運動。上網日期:2013年5月5日。檢自:http://tw.norton.com/spear-phishing-scam-not-sport/article
賴英娟(2006)。創意自我效能—概念分析與理論應用。教育與發展,23(3),123-129。
謝子樵(2009)。台灣線上遊戲玩家行為分析。上網日期:2013年7月19日。檢自:http://mic.iii.org.tw/aisp/reports/reportdetail_register.asp?docid=2667
蘋果日報(2013)。按讚送LINE貼圖 疑騙個資。上網日期:2013年7月19日。檢自:http://www.appledaily.com.tw/appledaily/article/headline/20130212/34829082/
英文部分
Agarwal, R., Sambamurthy, V., &; Stair, R.M. (2000). Research report: The evolving relationship between general and specific computer self-efficacy—an empirical assessment. Information Systems Research, 11(4), 418-430.
Ambient Insigh. (2013). The worldwide market for self-paced elearning products and services: 2011-2016 forecast and analysis. Retrieved Sep 1, 2013, from http://www.ambientinsight.com/Resources/Documents/AmbientInsight-2011-2016-Worldwide-Self-paced-eLearning-Market-Premium-Overview.pdf
American Academy of Pediatrics. (2011). Babies and toddlers should learn from play, not screens. Retrieved July 19, 2013, from http://www2.aap.org/pressroom/mediaunder2.pdf
APWG. (2013a). Global phishing survey: Trends and domain name use in 1h2013. Retrieved Oct 9, 2013, from http://docs.apwg.org/reports/APWG_GlobalPhishingSurvey_1H2013.pdf
APWG. (2013b). Phishing activity trends report 4th quarter. Retrieved July 1, 2013, from http://docs.apwg.org/reports/apwg_trends_report_Q4_2012.pdf
Bagozzi, R.P., &; Yi, Y. (1988). On the evaluation of structural equation models. Journal of the academy of marketing science, 16(1), 74-94.
Bandura, A. (1977). Self-efficacy: Toward a unifying theory of behavioral change. Psychological Review, 84(2), 191-215.
Bandura, A. (1982). Self-efficacy mechanism in human agency. American psychologist, 37(2), 122-147.
Bandura, A. (1989). Regulation of cognitive processes through perceived self-efficacy. Developmental psychology, 25(5), 729-735.
Bandura, A. (1997). Self-efficacy:The exercise of control. NewYork: Freeman.
Bandura, A. (2006). Guide for constructing self-efficacy scales. Self-efficacy beliefs of adolescents, 5, 307-337.
Baron, R.M., &; Kenny, D.A. (1986). The moderator–mediator variable distinction in social psychological research: Conceptual, strategic, and statistical considerations. Journal of personality and social psychology, 51(6), 1173-1182.
Brody, R.G., Mulig, E., &; Kimball, V. (2007). Phishing, pharming and identity theft. Academy of Accounting and Financial Studies Journal, 11(3), 43-56.
Busch, T. (1995). Gender differences in self-efficacy and attitudes toward computers. Journal of educational computing research, 12(2), 147-158.
Chiu, Y.-L., &; Tsai, C.-C. (2014). The roles of social factor and internet self-efficacy in nurses' web-based continuing learning. Nurse education today, 34(3), 446-450.
Chu, R.J.-c. (2010). How family support and internet self-efficacy influence the effects of e-learning among higher aged adults–analyses of gender and age differences. Computers &; Education, 55(1), 255-264.
Cohen, J. (1988). Statistical power analysis for the behavioral sciencies(2nd ed.). Hillsdale, NJ: Erlbaum.
Compeau, D.R., &; Higgins, C.A. (1995a). Application of social cognitive theory to training for computer skills. Information systems research, 6(2), 118-143.
Compeau, D.R., &; Higgins, C.A. (1995b). Computer self-efficacy: Development of a measure and initial test. MIS Quarterly, 19(2), 189-211.
Cooper, M.D., &; Phillips, R.A. (2004). Exploratory analysis of the safety climate and safety behavior relationship. Journal of safety research, 35(5), 497-512.
Dermitzaki, I., Leondari, A., &; Goudas, M. (2009). Relations between young students' strategic behaviours, domain-specific self-concept, and performance in a problem-solving situation. Learning and Instruction, 19(2), 144-157.
Dhamija, R., Tygar, J.D., &; Hearst, M. (2006, April). Why phishing works. Paper presented at the SIGCHI conference on Human Factors in computing systems, Montreal, Canada.
Downs, J.S., Holbrook, M., &; Cranor, L.F. (2007, October). Behavioral response to phishing risk. Paper presented at the APWG eCrime Researchers Summit, Pittsburgh, PA.
Earley, P.C., &; Lituchy, T.R. (1991). Delineating goal and efficacy effects: A test of three models. Journal of Applied Psychology, 76(1), 81-98.
Eastin, M.S., &; LaRose, R. (2000). Internet self‐efficacy and the psychology of the digital divide. Journal of Computer‐Mediated Communication, 6(1).
Egelman, S., Cranor, L.F., &; Hong, J. (2008, April). You've been warned: An empirical study of the effectiveness of web browser phishing warnings. Paper presented at the SIGCHI Conference on Human Factors in Computing Systems, Florence, Italy.
Frye, D.W. (2007). Email, instant messaging and phishing Network security policies and procedures (pp. 131-152). New York: Springer US.
Glendon, A.I., &; Litherland, D.K. (2001). Safety climate factors, group differences and safety behaviour in road construction. Safety Science, 39(3), 157-188.
Hasan, B. (2006). Delineating the effects of general and system-specific computer self-efficacy beliefs on is acceptance. Information &; Management, 43(5), 565-571.
Herley, C., &; Florêncio, D. (2008, September). A profitless endeavor: Phishing as tragedy of the commons. Paper presented at the 2008 workshop on New security paradigms, Lake Tahoe, CA.
Hirvonen, R., Tolvanen, A., Aunola, K., &; Nurmi, J.-E. (2012). The developmental dynamics of task-avoidant behavior and math performance in kindergarten and elementary school. Learning and Individual Differences, 22(6), 715–723.
Hristidis, V., &; Papakonstantinou, Y. (2002, August). Discover: Keyword search in relational databases. Paper presented at the 28th international conference on Very Large Data Bases, Hong Kong, China.
Hsu, M.-H., &; Chiu, C.-M. (2004). Internet self-efficacy and electronic service acceptance. Decision support systems, 38(3), 369-381.
Hsu, T., &; Huang, L.C. (2006 , October). Developing an internet self-efficacy scale of 2006 (ise06). Paper presented at the World Conference on E-Learning in Corporate, Government, Healthcare, and Higher Education , Hawaii, USA.
International Telecommunication Union. (2013a). ICT Facts and Figures. Retrieved Sep 1, 2013, from http://www.itu.int/en/ITU-D/Statistics/Documents/facts/ICTFactsFigures2013.pdf
International Telecommunication Union. (2013b). Measuring the information society. Retrieved Dec 30, 2013, from http://www.itu.int/en/ITU-D/Statistics/Documents/publications/mis2013/MIS2013_without_Annex_4.pdf
Internet Society. (2012). Global Internet User Survey Summary Report. Retrieved July 24, 2013, from https://www.internetsociety.org/sites/default/files/rep-GIUS2012global-201211-en.pdf
Internet World Stats. (2012). Top 50 countries with the highest internet penetration rate. Retrieved 4, 2013, from http://www.internetworldstats.com/top25.htm
Kaspersky. (2010). Spam evolution: January-march 2010. Retrieved July 5, 2013, from http://www.securelist.com/en/analysis/204792117/Spam_evolution_January_March_2010
Kaspersky. (2013). The evolution of phishing attacks:2011-2013. Retrieved July 5, 2013, from http://media.kaspersky.com/pdf/Kaspersky_Lab_KSN_report_The_Evolution_of_Phishing_Attacks_2011-2013.pdf
Kim, Y., &; Glassman, M. (2013). Beyond search and communication: Development and validation of the internet self-efficacy scale (iss). Computers in Human Behavior, 29(4), 1421-1429.
Klein, P.S., Nir-Gal, O., &; Darom, E. (2000). The use of computers in kindergarten, with or without adult mediation; effects on children's cognitive performance and behavior. Computers in Human Behavior, 16(6), 591-608.
Klien, F., &; Strohmaier, M. (2012, June). Short links under attack: Geographical analysis of spam in a url shortener network. Paper presented at the 23rd ACM conference on Hypertext and social media, WI, USA.
Kline, R. (2005). Principles and practice of structural equation modeling. New York: The Guilford Press.
Krebs, B. (2012). Who's behind the worlds largest spam botnet? Retrieved Sep 29, 2013, from http://krebsonsecurity.com/2012/02/whos-behind-the-worlds-largest-spam-botnet/
Kumaraguru, P., Cranshaw, J., Acquisti, A., Cranor, L.F., Hong, J., Blair, M.A., &; Pham, T. (2009, July). School of phish: A real-word evaluation of anti-phishing training Paper presented at the 5th Symposium On Usable Privacy and Security, Menlo Park, CA.
Kumaraguru, P., Rhee, Y., Acquisti, A., Cranor, L.F., Hong, J., &; Nunge, E. (2007, April). Protecting people from phishing: The design and evaluation of an embedded training email system. Paper presented at the SIGCHI conference on Human factors in computing systems, San Jose, CA.
Laird, S. (2012). How tech is changing college life[infographic]. Retrieved Sep 1, 2013, from http://mashable.com/2012/05/06/tech-college-infographic/
Landis, J.R., &; Koch, G.G. (1977). The measurement of observer agreement for categorical data. biometrics, 33(1), 159-174.
Lawton, R., Parker, D., Manstead, A.S., &; Stradling, S.G. (1997). The role of affect in predicting social behaviors: The case of road traffic violations. Journal of Applied Social Psychology, 27(14), 1258-1276.
Leavitt, N. (2005). Instant messaging: A new target for hackers. Computer, 38(7), 20-23.
Lee, Y.-H., Salman, A., &; Fitzpatrick, J.J. (2009). Hiv/aids preventive self-efficacy, depressive symptoms, and risky sexual behavior in adolescents: A cross-sectional questionnaire survey. International journal of nursing studies, 46(5), 653-660.
Li, L., Helenius, M., &; Berki, E. (2012, October). A usability test of whitelist and blacklist-based anti-phishing application. Paper presented at the 16th International Academic MindTrek Conference, Tampere, Finland.
Liang, J.-C., Wu, S.-H., &; Tsai, C.-C. (2011). Nurses' internet self-efficacy and attitudes toward web-based continuing learning. Nurse education today, 31(8), 768-773.
Liang, J.-C., &; Wu, S.H. (2010). Nurses’ motivations for web‐based learning and the role of internet self‐efficacy. Innovations in Education and Teaching International, 47(1), 25-37.
Lubbers, M.J., Van Der Werf, M.P., Kuyper, H., &; Hendriks, A. (2010). Does homework behavior mediate the relation between personality and academic performance? Learning and Individual differences, 20(3), 203-208.
Marakas, G.M., Mun, Y.Y., &; Johnson, R.D. (1998). The multilevel and multifaceted character of computer self-efficacy: Toward clarification of the construct and an integrative framework for research. Information systems research, 9(2), 126-163.
McVeigh, H. (2009). Factors influencing the utilisation of e-learning in post-registration nursing students. Nurse Education Today, 29(1), 91-99.
Meghan Neal. (2013). Why we think the internet is a human right. Retrieved Sep 1, 2013, from http://motherboard.vice.com/blog/is-internet-the-next-fundamental-human-right
Mitnick, K.D., &; Simon, W.L. (2002). The art of deception: Controlling the human element of security. New York: John Wiley &; Sons.
Nahl, D. (1996). Affective monitoring of internet learners: Perceived self-efficacy and success. Journal of American Society for Informantion Sciences, 33, 100-109.
NCL. (2012). Top scams of 2011. Retrieved Sep 1, 2013, from http://fraudresearchcenter.org/wp-content/uploads/2012/02/National-Consumers-League-2011-Top-Scams-of-2011.pdf
Nora, W.L.Y., &; Zhang, K.C. (2010). Motives of cheating among secondary students: The role of self-efficacy and peer influence. Asia Pacific Education Review, 11(4), 573-584.
O'Leary, A. (1985). Self-efficacy and health. Behaviour research and therapy, 23(4), 437-451.
Odacı, H. (2012). Risk-taking behavior and academic self-efficacy as variables accounting for problematic internet use in adolescent university students. Children and Youth Services Review, 183-187.
Öz, B., Özkan, T., &; Lajunen, T. (2013). An investigation of professional drivers: Organizational safety climate, driver behaviours and performance. Transportation Research Part F: Traffic Psychology and Behaviour, 16, 81-91.
Pajares, F., &; Miller, M.D. (1995). Mathematics self-efficacy and mathematics performances: The need for specificity of assessment. Journal of counseling psychology, 42, 190-190.
Peng, H., Tsai, C.C., &; Wu, Y.T. (2006). University students' self‐efficacy and their attitudes toward the internet: The role of students' perceptions of the internet. Educational Studies, 32(1), 73-86.
Perkins, S., &; Jenkins, L.S. (1998). Self-efficacy expectation, behavior performance, and mood status in early recovery from percutaneous transluminal coronary angioplasty. Heart &; Lung: The Journal of Acute and Critical Care, 27(1), 37-46.
Piercy, N.F., Cravens, D.W., Lane, N., &; Vorhies, D.W. (2006). Driving organizational citizenship behaviors and salesperson in-role behavior performance: The role of management control and perceived organizational support. Journal of the Academy of Marketing Science, 34(2), 244-262.
Polakis, I., Kontaxis, G., Antonatos, S., Gessiou, E., Petsas, T., &; Markatos, E.P. (2010, October). Using social networks to harvest email addresses. Paper presented at the Proceedings of the 9th Annual ACM Workshop on Privacy in the Electronic Society, Chicago, IL, USA.
Pousette, A., Larsson, S., &; Törner, M. (2008). Safety climate cross-validation, strength and prediction of safety behaviour. Safety Science, 46(3), 398-404.
Robila, S.A., &; Ragucci, J.W. (2006, June). Don't be a phish: Steps in user education. Paper presented at the 11th annual SIGCSE conference on innovation and technology in computer science education, Bologna, Italy.
Schumacher, P., &; Morahan-Martin, J. (2001). Gender, internet and computer attitudes and experiences. Computers in human behavior, 17(1), 95-110.
Sheng, S., Magnien, B., Kumaraguru, P., Acquisti, A., Cranor, L.F., Hong, J., &; Nunge, E. (2007, July). Anti-phishing phil:The design and evaluation of a game that teaches people not to fall for phish. Paper presented at the 3rd symposium on Usable privacy and security, PA, USA.
Shi, P., Xu, H., &; Zhang, X.L. (2011, June). Informing security indicator design in web browsers. Paper presented at the PACIS 2013, Jeju island,Korea.
Sun, J.C.-Y., &; Rueda, R. (2012). Situational interest, computer self-efficacy and self-regulation: Their impact on student engagement in distance education. British Journal of Educational Technology, 43(2), 191-204.
Svenson, O. (1981). Are we all less risky and more skillful than our fellow drivers? Acta Psychologica, 47(2), 143-148.
Szilagyi, A.D. (1980). Causal inferences between leader reward behaviour and subordinate performance, absenteeism, and work satisfaction. Journal of Occupational Psychology, 53(3), 195-204.
Tanneeru, M. (2005). A convicted hacker debunks some myths. Retrieved Sep 26, 2013, from http://edition.cnn.com/2005/TECH/internet/10/07/kevin.mitnick.cnna/index.html
The Radicati Group. (2013). The radicati group releases “instant messaging market, 2013-2017”. Retrieved Oct 5, 2013, from http://www.radicati.com/?p=10154
Torkzadeh, G., &; Van Dyke, T.P. (2001). Development and validation of an internet self-efficacy scale. Behaviour &; information technology, 20(4), 275-280.
Tsai, C.-C., &; Tsai, M.-J. (2003). Information searching strategies in web-based science learning: The role of internet self-efficacy. Innovations in Education and Teaching International, 40(1), 43-50.
Tsai, Y.H., Lin, C.-P., Chiu, C.-K., &; Joe, S.-W. (2009). Understanding learning behavior using location and prior performance as moderators. The Social Science Journal, 46(4), 787-799.
Wang, C.-Y., Chang, H.-C., Chou, S.-C.T., &; Chen, F.-F. (2013, June). Acceptance and willingness to pay for mobile tv apps. Paper presented at the PACIS 2013, Jeju Island,Korea.
Wolters, C.A. (2003). Understanding procrastination from a self-regulated learning perspective. Journal of Educational Psychology, 95(1), 179-187.
日文部分
Cereja Technology. (2013). セレージャテクノロジー、アジア各国のFacebook推定ユーザ数を発表. Retrieved July 1, 2013, from http://www.cereja.co.jp/press_release20130408.pdf