跳到主要內容

臺灣博碩士論文加值系統

(44.221.70.232) 您好!臺灣時間:2024/05/29 05:20
字體大小: 字級放大   字級縮小   預設字形  
回查詢結果 :::

詳目顯示

: 
twitterline
研究生:游師柔
研究生(外文):Yu, Shih-Jou
論文名稱:大專院校學生的網路自我效能對反釣魚的行為與表現之影響
論文名稱(外文):The Effect of College Students' Internet Self-Efficacy on Their Anti-Phishing Behavior and Performance
指導教授:孫之元孫之元引用關係
指導教授(外文):Sun, Jerry Chih-Yuan
學位類別:碩士
校院名稱:國立交通大學
系所名稱:教育研究所
學門:教育學門
學類:綜合教育學類
論文種類:學術論文
論文出版年:2014
畢業學年度:102
語文別:中文
論文頁數:113
中文關鍵詞:網路自我效能網路釣魚反釣魚自我效能反釣魚行為反釣魚表現
外文關鍵詞:Internet self-efficacyPhishingAnti-phishing self-efficacyAnti-phishing behaviorAnti-phishing performance
相關次數:
  • 被引用被引用:3
  • 點閱點閱:1171
  • 評分評分:
  • 下載下載:109
  • 收藏至我的研究室書目清單書目收藏:0
  網路科技普及,人們使用網路時間逐漸延長,也正面臨網路詐騙-網路釣魚的威脅,反釣魚方法更顯重要。目前反釣魚相關研究多注重系統開發或統計報告,但相關學者指出,網路釣魚最重要的因素是「人」本身,可透過教育進行改善。因此,本研究以人類內在動機的自我效能領域為出發點,以網路釣魚活動相關條件「網路」與「反釣魚」為主題,了解不同自我效能者,所遭受網路釣魚迫害的原因、行為與表現,提供未來反釣魚的相關教材設計之參考,並以減少網路釣魚受害者為最終目的。
  本研究以台灣地區有網路使用經驗之大專院校學生為研究對象,透過網路自我效能量表、反釣魚自我效能量表、反釣魚行為量表以及反釣魚表現測驗進行施測,同時比較不同性別與不同學院之大專院校學生在反釣魚行為與反釣魚表現上的差異。本研究採便利取樣與問卷調查法,回收434份問卷,411份為有效問卷,研究結果發現:大專院校學生大多依據網址的正確與否辨別網路釣魚,對於網頁型式的網路釣魚之反釣魚訓練需加強。此外,不同性別的大專院校學生在反釣魚行為上有顯著差異,不同性別與不同學院之大專院校學生在反釣魚表現上無顯著差異。經結構方程模型分析,反釣魚表現不會受到網路自我效能、反釣魚自我效能與反釣魚行為影響;反釣魚行為會受到網路自我效能與反釣魚自我效能正向影響;網路自我效能會正向影響反釣魚自我效能。經修正模型後得知,反釣魚自我效能為網路自我效能與反釣魚行為的中介變項。
  本研究建議,未來在教學現場,可嘗試運用提升網路自我效能與反釣魚自我效能的方式,協助學習者建立反釣魚的自信與經驗,或透過網路自我效能量表與反釣魚自我效能量表的測量結果,作為適性教材設計參考。若在有限資源情況下,則可優先採用反釣魚自我效能量表的結果,或針對網路自我效能子構面反應/生產力自我效能分數較高者加強反釣魚訓練。

Rapid technological developments along with the popularity of the Internet in recent years has led to an increase in Internet usage, and in turn the Internet users have to face the threat of the Internet fraud or phishing. Therefore, research related to anti-phishing becomes more important. Most of the recent anti-phishing research focused on system development or statistical reports. However, because prior studies indicated that the most important factor resulting in phishing scam is human’s psychological characteristics, which could be improved by training or education, this study sought to look into the human motivational factor of self-efficacy as well as the conditions related to phishing, such as “Internet”’ and “anti-phishing”. To understand the reasons why Internet users get phishing attacks as well as their behavior and performance, users with different levels of self-efficacy were included. The goal of this study was to provide suggestions and implications for anti-phishing education and ultimately decrease the number of victims of phishing attacks.
Participants were 434 Taiwanese university students who had experiences of using the Internet. The Internet self-efficacy scale, anti-phishing self-efficacy scale, anti-phishing behavior scale, and anti-phishing performance were used in this study. Gender and college differences in participants’ anti-phishing behaviors and performance were compared. The study used convenient sampling to conduct the survey, resulting in 411 valid responses. Results showed that most university students identified phishing attacks based on the correctness of the URLs, indicating a need of the training for this type of phishing. In addition, there were statistically significant differences in anti-phishing behavior between female and male university students. No statistically significant differences were found in anti-phishing performance between females and males and among students from different colleges. The analysis of SEM showed that anti-phishing performance was not affected by the Internet self-efficacy, anti-phishing self-efficacy and anti-phishing behavior; anti-phishing behaviors were positively affected by the Internet self-efficacy and anti-phishing self-efficacy; and Internet self-efficacy positively influences anti-phishing self-efficacy. Results of model modification showed that anti-phishing self-efficacy is a mediator between Internet self-efficacy and anti-phishing behavior.
The research suggests that educators could use strategies to improve Internet self-efficacy and anti-phishing self-efficacy in order to enhance learners’ self-efficacy and experience in anti-phishing. The Internet self-efficacy scale and anti-phishing self-efficacy scale may be used as a reference for adaptive teaching materials. In the condition of limited resources, educators may choose to use the result of anti-phishing self-efficacy scale, or provide anti-phishing training to those with higher levels of reactive/generative self-efficacy of the Internet self-efficacy.

第一章 緒論 1
第一節 研究背景與動機 1
第二節 研究目的與重要性 4
第三節 研究架構與研究問題 6
第四節 研究範圍與限制 7
第五節 名詞解釋 8
第二章 文獻探討 10
第一節 自我效能 10
第二節 網路釣魚 24
第三節 反釣魚行為與反釣魚表現 39
第三章 研究方法 44
第一節 研究對象 44
第二節 研究流程 45
第三節 研究架構與研究假設 46
第四節 研究工具 47
第五節 資料處理與分析 50
第四章 研究結果 55
第一節 描述性統計分析結果 55
第二節 反釣魚行為量表探索性因素分析 56
第三節 驗證性因素分析結果 57
第四節 反釣魚表現測驗分析結果 67
第五節 皮爾森積差相關分析結果 72
第六節 樣本背景變項在反釣魚行為與反釣魚表現分析結果 74
第七節 結構方程式分析結果 77
第五章 結論與建議 83
第一節 結論 83
第二節 研究限制與未來研究建議 89
參考文獻 90
中文部分 90
英文部分 94
附錄一 大專院校學生的網路自我效能對反釣魚的行為與表現之影響問卷 100
附錄二 網路自我效能題項與題目內容對照表 111
附錄三 反釣魚自我效能題項與題目內容對照表 112
附錄四 反釣魚行為題項與題目內容對照表 113

中文部分
PChome(2012)。PChome買網址入門教學。上網日期:2013年5月25日。檢自:http://myname.pchome.com.tw/learn/teach.htm#2
Openfind(2013)。2013 第二季 Openfind 郵件威脅分析報告。上網日期:2013年9月29日。檢自:http://www.openfind.com/taiwan/download/report/2013_Q2_Openfind_Email_Threats_Report.pdf
中央社(2013a)。行動裝置夯 普及率近 5成。上網日期:2013年7月19日。檢自:http://news.chinatimes.com/realtime/110111/112013071700757.html
中央社(2013b)。【暑假怎麼過?】3c當電子保母 易影響腦部發展。上網日期:2013年7月19日。檢自:http://www.lihpao.com/?action-viewnews-itemid-130414
中國大陸互聯網絡訊息中心(2013)。第31次中國互聯網絡發展狀況統計調查報告。上網日期:2013年10月5日。檢自:http://www.cnnic.cn/hlwfzyj/hlwxzbg/hlwtjbg/201301/P020130122600399530412.pdf
王旭正、林曾祥、林宜萱(2006)。社交工程式網路釣魚之數位鑑識與證據保存研究。上網日期:2013年7月17日。檢自:http://www.docin.com/p-470541328.html
王秀園(2010)。習慣這件事。上網日期:2013年7月24日。檢自:http://www.mdnkids.com.tw/family_edition/detail.asp?sn=511
王淑楨、黃志成(2012)。人類行為與社會環境。新北市:揚智文化事業股份有限公司。
王皓昀(2010)。媒介使用與媒介依賴對運動博弈資訊可信度的影響-電視, 報紙, 網路的比較。運動傳播學刊(3),70-90。
王衛華、王長杰(2007)。網路釣魚的危害及防範措施。洛陽工業高等專科學校學報,17(2),36-37。
台灣大哥大基金會(2012)。2012台灣青少兒網路使用與自我形象調查報告。台北市:台灣大哥大基金會。
台灣微軟新聞室(2011)。兒少網安調查結果出爐:一成學童可能網路成癮 五成愛玩超齡遊戲。上網日期:2013年7月4日。檢自:http://www.microsoft.com/taiwan/press/2011/07/0712.mspx
安聖慧(2011)。消費者行為學。北京市:對外經濟貿易大學出版社。
余民寧(2002)。教育測驗與評量:成就測驗與教學評量(二版)。台北市:心理。
吳文進(2007)。網路釣魚騙術之解析與防治。上網日期:2013年7月17日。檢自:http://www.mjib.gov.tw/mojnbi.php?pg=d2/9608/3-3.htm
吳明隆(2007)。Spss操作與應用: 問卷統計分析實務。台北市:五南。
巫博瀚、賴英娟(2007)。人類動力的基礎—自我效能兼論自我效能對學習者自我調整學習行為與成就表現之影響。教育與發展,24(3),49-56。
李尹暘、林曉佩、林君怡(2007)。自我效能理論之分析與應用。澄清醫護管理雜誌,3(2),46-52。
李冠賢(2013)。反釣魚教學策略:平板電腦融入概念構圖以提升學習動機之可行性評估。國立交通大學理學院科技與數位學習學程碩士論文,新竹市。
周倩、吳歡鵲、陳茵嵐、王美鴻(2009)。「資訊素養與倫理」大學通識教育課程-理念, 主題, 教學策略與執行成效。大學圖書館,13(2),24-44。
林羿妏(2012)。大專院校學生的facebook使用特性、批判思考與資訊驗證行為的關係。國立交通大學教育研究所碩士論文,新竹市。
林順傑(2010)。漫談網路釣魚問題常見手法與分析。上網日期:2013年7月17日。檢自:http://security.twnic.tw/201009/tech1_1.html
林順傑(2011)。台灣反網路釣魚通報機制與平台介紹。上網日期:2013年10月16日。檢自:http://security.twnic.tw/201102/images/oct/tech1.pdf
林碧珍、蔡文煥(2003)。四年級學生在國際教育成就調查試測的數學成就表現。科學教育月刊,258,2-20。
林靈宏、張魁峯(2006)。消費者行為學。台北市:五南圖書出版股份有限公司。
財團法人台灣網路資訊中心(2012a)。台灣無線上網使用狀況調查摘要分析。上網日期:2013年7月5日。檢自:http://www.twnic.net.tw/download/200307/20121226c.pdf
財團法人台灣網路資訊中心(2012b)。歷次個人及家庭上網行為調查趨勢分析。上網日期:2013年7月5日。檢自:http://www.twnic.net.tw/download/200307/20120709f.pdf
馬廣惠(2005)。學習動機和努力程度對外與學習成績的影響。解放軍外國語學院學報,28(4),37-41。
國家域名安全中心、APAC、APWG(2013)。全球中文釣魚網站現狀統計報告(2012年下半年)。上網日期:2013年10月9日。檢自:http://www.cnnic.net.cn/gywm/xwzx/rdxw/rdxx/201305/W020130531616450956373.pdf
張春興(1996)。教育心理學-三化取向的理論與實踐 (修訂版)。台北市:東華。
張偉豪(2011)。Sem論文寫作不求人。高雄市:三星統計。
教育部(2008)。教育部中小學資訊教育白皮書。上網日期:2013年7月5日。檢自:http://www.edu.tw/userfiles/url/20120920154137/97.08教育部中小學資訊教育白皮書.pdf
教育部(2012)。辨識網路詐騙學習手冊。台北市:教育部。
郭本禹、姜飛月(2008)。自我效能理論及其應用。上海:上海教育出版社。
陳嘉玫(2011)。網路安全的社交工程。科學發展,461,16-23。
游師柔、孫之元(2014)。工學院學生的反釣魚自我效能、行為和表現與其網路自我效能之相關性研究,GCCCE2014全球華人計算機教育應用大會。中國,上海。
硬是要學(2013)。Facebook詐騙手法又翻新,這次盜走你個資和信用卡完整資料。上網日期:2013年7月1日。檢自:http://www.soft4fun.net/social-networks/facebook/facebook-trick-catch-your-id-and-credit-card-info.htm
華南銀行(2012)。網路銀行安全小秘訣手冊。上網日期:2012年11月6日。檢自:http://www.hncb.com.tw/personal/images/tips.pdf
鈕文英、鍾儀潔、陳佩玉、王慧婷、彭雅真(2012)。應用行為分析。台北市:美國展望教育中心。
黃芳銘(2007)。結構方程式-理論與應用(第五版)。台北市:五南。
黃國禎、蘇俊銘、陳年興(2012)。數位學習導論與實務。新北市: 博碩文化。
黃淑貞、劉翠薇、洪文綺(2002)。影響大學生運動習慣之社會心理因素研究。健康促進暨衛生教育雜誌(22),55-66。
黃葳威、林紀慧、呂傑華(2007)。2007 台灣青少兒網路使用調查報告。上網日期:2013年7月5日。檢自:http://123.50.36.35/mediaguide/uploads/conference/20100324170140.pdf
瑞士商業銀行(2012)。通信詐騙 (網路釣魚)。上網日期:2013年7月5日。檢自:http://www.ubs.com/tw/tc/legalinfo2/phishing.html
經濟部(2011)。網路交易買家必備的防詐自保寶典。台北市:經濟部商業司。
葉亭均(2013)。Google將定期公布惡意程式、網路釣魚資訊。上網日期:上網日期:2013年7月5日。檢自:http://udn.com/NEWS/BREAKINGNEWS/BREAKINGNEWS5/7989348.shtml
資策會FIND(2013)。2012年6月底止台灣上網人口。上網日期:上網日期:2013年7月4日。檢自:http://www.find.org.tw/find/home.aspx?page=many&;id=340
劉濱、吳燕、陳琦、曹樹貴、劉振宇(2008)。網路釣魚及其防範技術。河北工業科技,25(6),379-381。
歐陽誾(2007)。網路世界不設防─ 淺談兒童及青少年網路安全的重要性。上網日期: 2013年7月5日。檢自:http://www2.nutn.edu.tw/gac500/webservice/96/book/p5/584/歐陽誾.pdf
鄭秀月、李茹萍(2009)。戒菸門診個案持續戒菸行為與自我效能之研究。臺灣醫學,13(3),223-230。
鄭紹成、陳鉦達、黃仁俊(2006)。服務保證、價格與企業可信度對消費者購買意願之影響-以團體套裝旅遊業為例。旅遊管理研究,6(1),83-100。
鄭照順、鄒浮安(2011)。大學生網路使用行為與網路影響之研究-以高苑科技大學為例 。高苑學報,17(2),119-134。
諾頓(2011)。魚叉式網路釣魚:這是詐騙,無關運動。上網日期:2013年5月5日。檢自:http://tw.norton.com/spear-phishing-scam-not-sport/article
賴英娟(2006)。創意自我效能—概念分析與理論應用。教育與發展,23(3),123-129。
謝子樵(2009)。台灣線上遊戲玩家行為分析。上網日期:2013年7月19日。檢自:http://mic.iii.org.tw/aisp/reports/reportdetail_register.asp?docid=2667
蘋果日報(2013)。按讚送LINE貼圖 疑騙個資。上網日期:2013年7月19日。檢自:http://www.appledaily.com.tw/appledaily/article/headline/20130212/34829082/
英文部分
Agarwal, R., Sambamurthy, V., &; Stair, R.M. (2000). Research report: The evolving relationship between general and specific computer self-efficacy—an empirical assessment. Information Systems Research, 11(4), 418-430.
Ambient Insigh. (2013). The worldwide market for self-paced elearning products and services: 2011-2016 forecast and analysis. Retrieved Sep 1, 2013, from http://www.ambientinsight.com/Resources/Documents/AmbientInsight-2011-2016-Worldwide-Self-paced-eLearning-Market-Premium-Overview.pdf
American Academy of Pediatrics. (2011). Babies and toddlers should learn from play, not screens. Retrieved July 19, 2013, from http://www2.aap.org/pressroom/mediaunder2.pdf
APWG. (2013a). Global phishing survey: Trends and domain name use in 1h2013. Retrieved Oct 9, 2013, from http://docs.apwg.org/reports/APWG_GlobalPhishingSurvey_1H2013.pdf
APWG. (2013b). Phishing activity trends report 4th quarter. Retrieved July 1, 2013, from http://docs.apwg.org/reports/apwg_trends_report_Q4_2012.pdf
Bagozzi, R.P., &; Yi, Y. (1988). On the evaluation of structural equation models. Journal of the academy of marketing science, 16(1), 74-94.
Bandura, A. (1977). Self-efficacy: Toward a unifying theory of behavioral change. Psychological Review, 84(2), 191-215.
Bandura, A. (1982). Self-efficacy mechanism in human agency. American psychologist, 37(2), 122-147.
Bandura, A. (1989). Regulation of cognitive processes through perceived self-efficacy. Developmental psychology, 25(5), 729-735.
Bandura, A. (1997). Self-efficacy:The exercise of control. NewYork: Freeman.
Bandura, A. (2006). Guide for constructing self-efficacy scales. Self-efficacy beliefs of adolescents, 5, 307-337.
Baron, R.M., &; Kenny, D.A. (1986). The moderator–mediator variable distinction in social psychological research: Conceptual, strategic, and statistical considerations. Journal of personality and social psychology, 51(6), 1173-1182.
Brody, R.G., Mulig, E., &; Kimball, V. (2007). Phishing, pharming and identity theft. Academy of Accounting and Financial Studies Journal, 11(3), 43-56.
Busch, T. (1995). Gender differences in self-efficacy and attitudes toward computers. Journal of educational computing research, 12(2), 147-158.
Chiu, Y.-L., &; Tsai, C.-C. (2014). The roles of social factor and internet self-efficacy in nurses' web-based continuing learning. Nurse education today, 34(3), 446-450.
Chu, R.J.-c. (2010). How family support and internet self-efficacy influence the effects of e-learning among higher aged adults–analyses of gender and age differences. Computers &; Education, 55(1), 255-264.
Cohen, J. (1988). Statistical power analysis for the behavioral sciencies(2nd ed.). Hillsdale, NJ: Erlbaum.
Compeau, D.R., &; Higgins, C.A. (1995a). Application of social cognitive theory to training for computer skills. Information systems research, 6(2), 118-143.
Compeau, D.R., &; Higgins, C.A. (1995b). Computer self-efficacy: Development of a measure and initial test. MIS Quarterly, 19(2), 189-211.
Cooper, M.D., &; Phillips, R.A. (2004). Exploratory analysis of the safety climate and safety behavior relationship. Journal of safety research, 35(5), 497-512.
Dermitzaki, I., Leondari, A., &; Goudas, M. (2009). Relations between young students' strategic behaviours, domain-specific self-concept, and performance in a problem-solving situation. Learning and Instruction, 19(2), 144-157.
Dhamija, R., Tygar, J.D., &; Hearst, M. (2006, April). Why phishing works. Paper presented at the SIGCHI conference on Human Factors in computing systems, Montreal, Canada.
Downs, J.S., Holbrook, M., &; Cranor, L.F. (2007, October). Behavioral response to phishing risk. Paper presented at the APWG eCrime Researchers Summit, Pittsburgh, PA.
Earley, P.C., &; Lituchy, T.R. (1991). Delineating goal and efficacy effects: A test of three models. Journal of Applied Psychology, 76(1), 81-98.
Eastin, M.S., &; LaRose, R. (2000). Internet self‐efficacy and the psychology of the digital divide. Journal of Computer‐Mediated Communication, 6(1).
Egelman, S., Cranor, L.F., &; Hong, J. (2008, April). You've been warned: An empirical study of the effectiveness of web browser phishing warnings. Paper presented at the SIGCHI Conference on Human Factors in Computing Systems, Florence, Italy.
Frye, D.W. (2007). Email, instant messaging and phishing Network security policies and procedures (pp. 131-152). New York: Springer US.
Glendon, A.I., &; Litherland, D.K. (2001). Safety climate factors, group differences and safety behaviour in road construction. Safety Science, 39(3), 157-188.
Hasan, B. (2006). Delineating the effects of general and system-specific computer self-efficacy beliefs on is acceptance. Information &; Management, 43(5), 565-571.
Herley, C., &; Florêncio, D. (2008, September). A profitless endeavor: Phishing as tragedy of the commons. Paper presented at the 2008 workshop on New security paradigms, Lake Tahoe, CA.
Hirvonen, R., Tolvanen, A., Aunola, K., &; Nurmi, J.-E. (2012). The developmental dynamics of task-avoidant behavior and math performance in kindergarten and elementary school. Learning and Individual Differences, 22(6), 715–723.
Hristidis, V., &; Papakonstantinou, Y. (2002, August). Discover: Keyword search in relational databases. Paper presented at the 28th international conference on Very Large Data Bases, Hong Kong, China.
Hsu, M.-H., &; Chiu, C.-M. (2004). Internet self-efficacy and electronic service acceptance. Decision support systems, 38(3), 369-381.
Hsu, T., &; Huang, L.C. (2006 , October). Developing an internet self-efficacy scale of 2006 (ise06). Paper presented at the World Conference on E-Learning in Corporate, Government, Healthcare, and Higher Education , Hawaii, USA.
International Telecommunication Union. (2013a). ICT Facts and Figures. Retrieved Sep 1, 2013, from http://www.itu.int/en/ITU-D/Statistics/Documents/facts/ICTFactsFigures2013.pdf
International Telecommunication Union. (2013b). Measuring the information society. Retrieved Dec 30, 2013, from http://www.itu.int/en/ITU-D/Statistics/Documents/publications/mis2013/MIS2013_without_Annex_4.pdf
Internet Society. (2012). Global Internet User Survey Summary Report. Retrieved July 24, 2013, from https://www.internetsociety.org/sites/default/files/rep-GIUS2012global-201211-en.pdf
Internet World Stats. (2012). Top 50 countries with the highest internet penetration rate. Retrieved 4, 2013, from http://www.internetworldstats.com/top25.htm
Kaspersky. (2010). Spam evolution: January-march 2010. Retrieved July 5, 2013, from http://www.securelist.com/en/analysis/204792117/Spam_evolution_January_March_2010
Kaspersky. (2013). The evolution of phishing attacks:2011-2013. Retrieved July 5, 2013, from http://media.kaspersky.com/pdf/Kaspersky_Lab_KSN_report_The_Evolution_of_Phishing_Attacks_2011-2013.pdf
Kim, Y., &; Glassman, M. (2013). Beyond search and communication: Development and validation of the internet self-efficacy scale (iss). Computers in Human Behavior, 29(4), 1421-1429.
Klein, P.S., Nir-Gal, O., &; Darom, E. (2000). The use of computers in kindergarten, with or without adult mediation; effects on children's cognitive performance and behavior. Computers in Human Behavior, 16(6), 591-608.
Klien, F., &; Strohmaier, M. (2012, June). Short links under attack: Geographical analysis of spam in a url shortener network. Paper presented at the 23rd ACM conference on Hypertext and social media, WI, USA.
Kline, R. (2005). Principles and practice of structural equation modeling. New York: The Guilford Press.
Krebs, B. (2012). Who's behind the worlds largest spam botnet? Retrieved Sep 29, 2013, from http://krebsonsecurity.com/2012/02/whos-behind-the-worlds-largest-spam-botnet/
Kumaraguru, P., Cranshaw, J., Acquisti, A., Cranor, L.F., Hong, J., Blair, M.A., &; Pham, T. (2009, July). School of phish: A real-word evaluation of anti-phishing training Paper presented at the 5th Symposium On Usable Privacy and Security, Menlo Park, CA.
Kumaraguru, P., Rhee, Y., Acquisti, A., Cranor, L.F., Hong, J., &; Nunge, E. (2007, April). Protecting people from phishing: The design and evaluation of an embedded training email system. Paper presented at the SIGCHI conference on Human factors in computing systems, San Jose, CA.
Laird, S. (2012). How tech is changing college life[infographic]. Retrieved Sep 1, 2013, from http://mashable.com/2012/05/06/tech-college-infographic/
Landis, J.R., &; Koch, G.G. (1977). The measurement of observer agreement for categorical data. biometrics, 33(1), 159-174.
Lawton, R., Parker, D., Manstead, A.S., &; Stradling, S.G. (1997). The role of affect in predicting social behaviors: The case of road traffic violations. Journal of Applied Social Psychology, 27(14), 1258-1276.
Leavitt, N. (2005). Instant messaging: A new target for hackers. Computer, 38(7), 20-23.
Lee, Y.-H., Salman, A., &; Fitzpatrick, J.J. (2009). Hiv/aids preventive self-efficacy, depressive symptoms, and risky sexual behavior in adolescents: A cross-sectional questionnaire survey. International journal of nursing studies, 46(5), 653-660.
Li, L., Helenius, M., &; Berki, E. (2012, October). A usability test of whitelist and blacklist-based anti-phishing application. Paper presented at the 16th International Academic MindTrek Conference, Tampere, Finland.
Liang, J.-C., Wu, S.-H., &; Tsai, C.-C. (2011). Nurses' internet self-efficacy and attitudes toward web-based continuing learning. Nurse education today, 31(8), 768-773.
Liang, J.-C., &; Wu, S.H. (2010). Nurses’ motivations for web‐based learning and the role of internet self‐efficacy. Innovations in Education and Teaching International, 47(1), 25-37.
Lubbers, M.J., Van Der Werf, M.P., Kuyper, H., &; Hendriks, A. (2010). Does homework behavior mediate the relation between personality and academic performance? Learning and Individual differences, 20(3), 203-208.
Marakas, G.M., Mun, Y.Y., &; Johnson, R.D. (1998). The multilevel and multifaceted character of computer self-efficacy: Toward clarification of the construct and an integrative framework for research. Information systems research, 9(2), 126-163.
McVeigh, H. (2009). Factors influencing the utilisation of e-learning in post-registration nursing students. Nurse Education Today, 29(1), 91-99.
Meghan Neal. (2013). Why we think the internet is a human right. Retrieved Sep 1, 2013, from http://motherboard.vice.com/blog/is-internet-the-next-fundamental-human-right
Mitnick, K.D., &; Simon, W.L. (2002). The art of deception: Controlling the human element of security. New York: John Wiley &; Sons.
Nahl, D. (1996). Affective monitoring of internet learners: Perceived self-efficacy and success. Journal of American Society for Informantion Sciences, 33, 100-109.
NCL. (2012). Top scams of 2011. Retrieved Sep 1, 2013, from http://fraudresearchcenter.org/wp-content/uploads/2012/02/National-Consumers-League-2011-Top-Scams-of-2011.pdf
Nora, W.L.Y., &; Zhang, K.C. (2010). Motives of cheating among secondary students: The role of self-efficacy and peer influence. Asia Pacific Education Review, 11(4), 573-584.
O'Leary, A. (1985). Self-efficacy and health. Behaviour research and therapy, 23(4), 437-451.
Odacı, H. (2012). Risk-taking behavior and academic self-efficacy as variables accounting for problematic internet use in adolescent university students. Children and Youth Services Review, 183-187.
Öz, B., Özkan, T., &; Lajunen, T. (2013). An investigation of professional drivers: Organizational safety climate, driver behaviours and performance. Transportation Research Part F: Traffic Psychology and Behaviour, 16, 81-91.
Pajares, F., &; Miller, M.D. (1995). Mathematics self-efficacy and mathematics performances: The need for specificity of assessment. Journal of counseling psychology, 42, 190-190.
Peng, H., Tsai, C.C., &; Wu, Y.T. (2006). University students' self‐efficacy and their attitudes toward the internet: The role of students' perceptions of the internet. Educational Studies, 32(1), 73-86.
Perkins, S., &; Jenkins, L.S. (1998). Self-efficacy expectation, behavior performance, and mood status in early recovery from percutaneous transluminal coronary angioplasty. Heart &; Lung: The Journal of Acute and Critical Care, 27(1), 37-46.
Piercy, N.F., Cravens, D.W., Lane, N., &; Vorhies, D.W. (2006). Driving organizational citizenship behaviors and salesperson in-role behavior performance: The role of management control and perceived organizational support. Journal of the Academy of Marketing Science, 34(2), 244-262.
Polakis, I., Kontaxis, G., Antonatos, S., Gessiou, E., Petsas, T., &; Markatos, E.P. (2010, October). Using social networks to harvest email addresses. Paper presented at the Proceedings of the 9th Annual ACM Workshop on Privacy in the Electronic Society, Chicago, IL, USA.
Pousette, A., Larsson, S., &; Törner, M. (2008). Safety climate cross-validation, strength and prediction of safety behaviour. Safety Science, 46(3), 398-404.
Robila, S.A., &; Ragucci, J.W. (2006, June). Don't be a phish: Steps in user education. Paper presented at the 11th annual SIGCSE conference on innovation and technology in computer science education, Bologna, Italy.
Schumacher, P., &; Morahan-Martin, J. (2001). Gender, internet and computer attitudes and experiences. Computers in human behavior, 17(1), 95-110.
Sheng, S., Magnien, B., Kumaraguru, P., Acquisti, A., Cranor, L.F., Hong, J., &; Nunge, E. (2007, July). Anti-phishing phil:The design and evaluation of a game that teaches people not to fall for phish. Paper presented at the 3rd symposium on Usable privacy and security, PA, USA.
Shi, P., Xu, H., &; Zhang, X.L. (2011, June). Informing security indicator design in web browsers. Paper presented at the PACIS 2013, Jeju island,Korea.
Sun, J.C.-Y., &; Rueda, R. (2012). Situational interest, computer self-efficacy and self-regulation: Their impact on student engagement in distance education. British Journal of Educational Technology, 43(2), 191-204.
Svenson, O. (1981). Are we all less risky and more skillful than our fellow drivers? Acta Psychologica, 47(2), 143-148.
Szilagyi, A.D. (1980). Causal inferences between leader reward behaviour and subordinate performance, absenteeism, and work satisfaction. Journal of Occupational Psychology, 53(3), 195-204.
Tanneeru, M. (2005). A convicted hacker debunks some myths. Retrieved Sep 26, 2013, from http://edition.cnn.com/2005/TECH/internet/10/07/kevin.mitnick.cnna/index.html
The Radicati Group. (2013). The radicati group releases “instant messaging market, 2013-2017”. Retrieved Oct 5, 2013, from http://www.radicati.com/?p=10154
Torkzadeh, G., &; Van Dyke, T.P. (2001). Development and validation of an internet self-efficacy scale. Behaviour &; information technology, 20(4), 275-280.
Tsai, C.-C., &; Tsai, M.-J. (2003). Information searching strategies in web-based science learning: The role of internet self-efficacy. Innovations in Education and Teaching International, 40(1), 43-50.
Tsai, Y.H., Lin, C.-P., Chiu, C.-K., &; Joe, S.-W. (2009). Understanding learning behavior using location and prior performance as moderators. The Social Science Journal, 46(4), 787-799.
Wang, C.-Y., Chang, H.-C., Chou, S.-C.T., &; Chen, F.-F. (2013, June). Acceptance and willingness to pay for mobile tv apps. Paper presented at the PACIS 2013, Jeju Island,Korea.
Wolters, C.A. (2003). Understanding procrastination from a self-regulated learning perspective. Journal of Educational Psychology, 95(1), 179-187.

日文部分
Cereja Technology. (2013). セレージャテクノロジー、アジア各国のFacebook推定ユーザ数を発表. Retrieved July 1, 2013, from http://www.cereja.co.jp/press_release20130408.pdf

連結至畢業學校之論文網頁點我開啟連結
註: 此連結為研究生畢業學校所提供,不一定有電子全文可供下載,若連結有誤,請點選上方之〝勘誤回報〞功能,我們會盡快修正,謝謝!
QRCODE
 
 
 
 
 
                                                                                                                                                                                                                                                                                                                                                                                                               
第一頁 上一頁 下一頁 最後一頁 top