1.Agarwal, S. and R. K. Teas (2001). "Perceived value: mediating role of perceived risk." Journal of Marketing Theory and Practice: 1-14.
2.Franz-J Batza, Willem Janssenb and Kurt J Petersc, (2003). "Predicting technology adoption to improve research priority—setting." Agricultural Economics 28(2): 151-164.
3.Bauer, R. A. (1960). "Consumer behavior as risk taking." Dynamic Marketing for a Changing World, Proceedings of the 43rd Conference of the American Marketing Association, American Marketing Association, Chicago, 389-398
4.Bhatnagar, A., Sanjog Misra and H Raghav Rao (2000). "On risk, convenience, and Internet shopping behavior." Communications of the ACM 43(11): 98-105.
5.Boer, R. and T. de Boer (2009). Mobile payments 2010: Market Analysis and overview, Technical report
6.Bourreau & Verdier (2010), “Cooperation for innovation in payment systems: The case of mobile payments,” Communications & Strategies 79(3): 95-113.
7.Busselle, R., Reagan, J., Pinkleton, B. and Jackson, K. (1999). "Factors affecting Internet use in a saturated-access population." Telematics and Informatics 16(1): 45-58.
8.Cases, A. S. (2002). "Perceived risk and risk-reduction strategies in Internet shopping." The International Review of Retail, Distribution and Consumer Research 12(4): 375-394.
9.Cooper, R. (1998). "Benchmarking new product performance: results of the best practices study." European Management Journal 16(1): 1-17.
10.Cox, D. F. (1967). Risk taking and information handling in consumer behavior, Division of Research, Graduate School of Business Administration, Harvard University Boston.
11.Cunningham, S. M. (1967). "The major dimensions of perceived risk." Risk taking and information handling in consumer behavior. Boston: Harvard University Press: 82-108.
12.Davis, F. D., Bagozzi, R. P.and Warshaw, P. R. (1989). "User acceptance of computer technology: a comparison of two theoretical models." Management science 35(8): 982-1003.
13.Dhebar, A. (1996). "Speeding high-tech producer, meet the balking customer." Sloan Management Review 37(2): 37-49.
14.Duffy, J. (2000). "Knowledge management: what every information professional should know." Information Management Journal 34(3): 10-17.
15.Featherman, M. S. and P. A. Pavlou (2003). "Predicting e-services adoption: a perceived risk facets perspective." International Journal of Human-Computer Studies 59(4): 451-474.
16.Fishbein, M. and I. Ajzen (1975). "Belief, attitude, intention and behavior: An introduction to theory and research." MA: Addison-Wesley.
17.Fishbein, M. and I. Ajzen (1980). "Understanding attitudes and predicting social behavior." Englewood Cliffs, NJ: Prentice-Hall
18.Fischer, R. J. and Green, G.(2004). “Introduction to Security”,7th edition. Butterworth-Heinemann.
19.Grewal, D., Gotlieb, J and Marmorstein, H. (1994). "The moderating effects of message framing and source credibility on the price-perceived risk relationship." Journal of Consumer Research 21(1): 145-153.
20.Hofacker, C. F. (1998). Internet Marketing 3rd edition
21.Hsu, C. L., Wang, C. F. and Lin, C.C. (2011). “Investigating customer adoption behaviors in Mobile Financial Services” International Journal of Mobile Communications 9(5): 477-494.
22.Jackson, B. A. (2001). "Technology acquisition by terrorist groups: threat assessment informed by lessons from private sector technology adoption." Studies in Conflict and Terrorism 24(3): 183-213.
23.Jacoby, J. and L. B. Kaplan (1972). "The components of perceived risk." Advances in consumer research 3(3): 382-383.
24.Jensen, R. (2003). "Innovative leadership: First-mover advantages in new product adoption." Economic Theory 21(1): 97-116.
25.Karahanna, E., Agarwal, R. and Angst, C. M. (2006). "Reconceptualizing Compatibility Beliefs in Technology Acceptance Research." MIS Quarterly 30(4): 781-804.
26.Kim, D. J., Ferrin, D. L. and Rao, H. R. (2007). "A trust-based consumer decision-making model in electronic commerce: The role of trust, perceived risk, and their antecedents." Decision support systems 44(2): 544-564.
27.Kotler, P. (1979). "Strategies for introducing marketing into nonprofit organizations." Journal of Marketing: 37-44.
28.Lederer, A. L., Maupin, D. J., Sena, M. P. and Zhuang, Y. (2000). "The technology acceptance model and the World Wide Web." Decision support systems 29(3): 269-282.
29.Lowry, G. (2002). "Modelling user acceptance of building management systems." Automation in Construction 11(6): 695-705.
30.Mallat, N. (2007). "Exploring consumer adoption of mobile payments–a qualitative study." The Journal of Strategic Information Systems 16(4): 413-432.
31.McCrie, R. (2007). “Security Operations Management” 2nd. Butterworth-Heinemann.
32.McDade, S. R., Oliva, T. A. and Pirsch, J. A. (2002). "The organizational adoption of high-technology products “for use”: Effects of size, preferences, and radicalness of impact." Industrial Marketing Management 31(5): 441-456.
33.Mitchell, V.-W. and M. Greatorex (1993). "Risk perception and reduction in the purchase of consumer services." Service Industries Journal 13(4): 179-200.
34.Murray, K. B. and J. L. Schlacter (1990). "The impact of services versus goods on consumers’ assessment of perceived risk and variability." Journal of the Academy of Marketing Science 18(1): 51-65.
35.Premkumar, G. and M. Roberts (1999). "Adoption of new information technologies in rural small businesses." Omega 27(4): 467-484.
36.Rogers, E. M. (1995). Diffusion of innovations (4th ED.). NEW YORK : THE Free press.
37.Shin, D. H. (2010). “Ubiquitous Computing Acceptance Model: end user concern about security, privacy and risk” International Journal of Mobile Communications 8(2): 169-186.
38.Stone, R. N. and K. Grønhaug (1993). "Perceived risk: further considerations for the marketing discipline." European Journal of marketing 27(3): 39-50.
39.Swaminathan, V., White, E. L. and Rao, B. P. (1999). "Browsers or buyers in cyberspace? An investigation of factors influencing electronic exchange." Journal of Computer‐Mediated Communication 5(2)
40.Tang, S.M. (2000). "An impact factor model of Intranet adoption: an exploratory and empirical research." Journal of Systems and Software 51(3): 157-173.
41.Teng, J. T., Grover, V. and Guttler, W (2002). "Information technology innovations: general diffusion patterns and its relationships to innovation characteristics." Engineering Management, IEEE Transactions on 49(1): 13-27.
42.Tushman, M. L. and W. L. Moore (1982). Readings in the Management of Innovation, Pitman Boston, MA
43.Van den Poel, D. and J. Leunis (1999). "Consumer Acceptance of the Internet as a Channel of Distribution." Journal of Business Research 45(3): 249-256.
44.Van Slyke, C., Lou, H. and Day, J. (2002). "The impact of perceived innovation characteristics on intention to use groupware." Information Resources Management Journal 15(1): 1-12.
45.Vijayasarath, L. R. (2004). “Predicting consumer intentions to use on-line shopping: the case for an augmented technology acceptance model.” Information & Management 41(6): 747-762.
46.Vishwanath, A. and G. M. Goldhaber (2003). "An examination of the factors contributing to adoption decisions among late-diffused technology products." New Media & Society 5(4): 547-572.
47.Yang, S., Lu, Y., Gupta, S., Cao, Y. and Zhang, R. (2012). "Mobile payment services adoption across time: An empirical study of the effects of behavioral beliefs, social influences, and personal traits." Computers in Human Behavior 28(1): 129-142.
48.NFC技術與TSM發展現況分析(2012).MIC研究報告,資策會產業情報研究所
49.邱金蘭(2013)「手機信用卡 國泰世華拔頭籌」,聯合新聞網,http://udn.com/NEWS/FINANCE/FIN4/7887452.shtml
50.司徒達賢、李仁芳及吳思華(1985). 企業概論, 教育部空中大學教學委員會
51.夏淑賢、李淑慧(2012)「行動支付,銀行新商機」,台灣銀行家,台灣金融研訓院,台北
52.周逸衡(1988). 「企業之結構性管理作為與創新之關係」,管理科學,華泰書局,台北
53.梁定澎(2012). 資訊管理理論, 前程, 台北
54.陳勳慧 (2004). 「國軍人員信用卡功能偏好,知覺風險與信用卡使用行為關係之研究」,國防管理學院國防財務資源研究所碩士論文55.楊雅婷 (2009). 「以理性行為理論和科技接受模型來探討消費者對創新科技智慧型手機的購買意願行為之研究.」,南華大學企管所碩士論文56.資策會FIND計畫http://www.find.org.tw/find/home.aspx?page=many&id=336
57.廖珮君(2011). 「NFC行動支付上路 安全比方便更重要」,資安人科技網
58.賴建宇、黃怡婷(2013)「行動、第三方支付興起」,台灣銀行家,台灣金融研訓院
59.支援NFC手機列表http://www.nfc-phones.org/certified-phones/