參考文獻-中文部份
1. IT Home, . (2011). "資料外洩防護產品." http://online.ithome.com.tw/001/20100324/
2. 工業技術研究院.(2008)"數位版權管理技術" http://www.itri.org.tw/chi/tech-transfer/04.asp?RootNodeId=040&;NodeId=041&;id=3323
3. 立法院圖書館. (2010). "國外個人資料保護法案." http://npl.ly.gov.tw/
4. 全國法規資料庫. (2010 ). "個人資料保護法" http://law.moj.gov.tw/LawClass/
5. 周世雄. (2010). 資料外洩防護導入實務經驗談. 資訊安全通訊, 16(4), 159-172.6. 林鈴玉. (2001). 國內網路銀行現況發展及交易安全之研究, 國立交通大學管理學院 (資訊管理學程) 碩士論文.7. 黃亮宇. (1992). 資訊安全規劃與管理. 松崗電圖書資料股份有限公司, 民國 82 年, 8.
8. 廖緯民(1996).論資訊時代的隱私權保護-以「資訊隱私權」為中心。資訊法務透析,1996(11),22。9. 樊國楨, &; 楊晉寧. (1996). 互連網 (Internet) 電子信息交換安全-以電子公文交換作業安全為本.
10. 戴燊. (2013). 台灣企業資訊安全預防管理之現況, 方法與趨勢. 資訊安全通訊, 19(1), 75-81.11. 趨勢科技(2013),” MIS如何導入適合企業的DLP-趨勢科技資料外洩防護方案” http://www.trendmicro.com.tw/micro/TMLP/TMLP_microsite_mis.html#mis01
參考文獻-英文部份
1. Davis, F. D., Bagozzi, R. P., &; Warshaw, P. R. (1989). User acceptance of computer technology: a comparison of two theoretical models. Management science, 35(8), 982-1003.
2. Delone, W. H. (2003). The DeLone and McLean model of information systems success: a ten-year update. Journal of management information systems, 19(4), 9-30.
3. Drury, D. H., &; Farhoomand, A. (1996). Innovation adoption of EDI. Information Resources Management Journal (IRMJ), 9(3), 5-14.
4. Gartner (2013). "Content-aware data loss prevention (DLP)." http://www.gartner.com/it-glossary/content-aware-data-loss-prevention-dlp
5. Grover, V., &; Goslar, M. D. (1993). The initiation, adoption, and implementation of telecommunications technologies in US organizations. Journal of Management Information Systems, 10(1), 141-163.
6. Herriott, R. E., &; Firestone, W. A. (1983). Multisite qualitative policy research: Optimizing description and generalizability. Educational researcher, 14-19.
7. Kim, Y., Park, N., &; Hong, D. (2011). Enterprise data loss prevention system having a function of coping with civil suits. In Computers, Networks, Systems, and Industrial Engineering 2011 (pp. 201-208). Springer Berlin Heidelberg.
8. Kwon, T. H., &; Zmud, R. W. (1987, April). Unifying the fragmented models of information systems implementation. In Critical issues in information systems research (pp. 227-251). John Wiley &; Sons, Inc..
9. Lawton, G. (2008). New technology prevents data leakage. Computer, 41(9), 14-17.
10. Liu, S., &; Kuhn, R. (2010). Data loss prevention. IT professional, 12(2), 10-13.
11. Malhotra, N. K. (1993). Marketing research: An applied orientation. Englewood Cliffs, NJ: Prentice Hall.
12. Mcafee(2012).“Mcafee total protection for data loss prevention” http://www.mcafee.com/us/resources/solution-briefs/sb-total-protection-for-dlp.pdf
13. Mogull, R., &; Securosis, L. L. C. (2007). Understanding and selecting a data loss prevention solution. Technicalreport, SANS Institute.
14. Phua, C. (2009). Protecting organisations from personal data breaches. Computer Fraud &; Security, 2009(1), 13-18.
15. Premkumar, G., &; Roberts, M. (1999). Adoption of new information technologies in rural small businesses. Omega, 27(4), 467-484.
16. Reich, B. H., &; Benbasat, I. (1990). An empirical investigation of factors influencing the success of customer-oriented strategic systems. Information Systems Research, 1(3), 325-347.
17. SANS Institute . (2010). "Understanding and Selecting a Data Loss Prevention Solution." http://sans.org
18. Schultz, E. E., Proctor, R. W., Lien, M. C., &; Salvendy, G. (2001). Usability and security an appraisal of usability issues in information security methods. Computers &; Security, 20(7), 620-634.
19. Shabtai, A., Elovici, Y., &; Rokach, L. (2012). A taxonomy of data leakage prevention solutions. In A Survey of Data Leakage Detection and Prevention Solutions (pp. 11-15). Springer US.
20. Symentec(2013).” Symantec data loss prevention for endpoint” http://www.symantec.com/content/en/us/enterprise/fact sheets/b-dlp for endpoint DS 21189146.en-us.pdf
21. Tornatzky, L. G. and K. J. Klein (1982). "Innovation characteristics and innovation adoption-implementation: A meta-analysis of findings." Engineering Management, IEEE Transactions on(1): 28-45.
22. Tornatzky, L. G., Fleischer, M., &; Chakrabarti, A. K. (1990). Processes of technological innovation.
23. Von Solms, R. (1996). Information security management: the second generation. Computers &; Security, 15(4), 281-288.on
24. von Solms, R., van der Haar, H., von Solms, S. H., &; Caelli, W. J. (1994). A framework for information security evaluation. Information &; Management, 26(3), 143-153.
25. Websense(2013),” The shortest path to prevention and risk eduction”http://www.websense.com/assets/white-papers/white-paper-dlp-path-prevention-en-june-2013.pdf &; http://www.websense.com/content/support/library/data/v78/deploy/deploy_dss.pdf
26. Wixom, B. H. and H. J. Watson (2001). "An empirical investigation of the factors affecting data warehousing success." MIS quarterly 25(1): 17-32.
27. Yin, R. K. (2009). Case study research: Design and methods, sage.