Agarwal, R., & Karahanna, E. (2000). Time flies when you''re having fun: Cognitive absorption and beliefs about information technology usage. MIS Quarterly, 665-694.
Ajzen, I. (1985). From Intentions to Actions: A Theory of Planned Behavior. Heidelberg: Springer.
Ajzen, I., & Madden, T. J. (1986). Prediction of goal-directed behavior: Attitudes, intentions, and perceived behavioral control. Journal of Experimental Social Psychology, 22(5), 453-474.
Allen, V. L. (1966). Situational Factors in conformity. Advances in Experimental and Social Psychology, Volume 2, 133-175.
Asch, S. E. (1951). Effects of group pressure upon the modification and distortion of judgments. Organizational Influence Processes, 295-303.
Bagozzi, R. P., & Yi, Y. (1988). On the evaluation of structural equation models. Academic of Marketing Science, 16 (1), 76-94.
Bauer, R. Y. (1960). Consumer Behavior as Risk Taking. Paper presented at the Dynamic Marketing for A Changing World, Chicago Illinois:American Marketing Association
Bearden, W. O., Netemeyer, R. G., & Teel, J. E. (1989). Measurement of consumer susceptibility to interpersonal influence. Journal of Consumer Research, 473-481.
Bentler, P. M., & Bonett, D. G. (1980). Significance tests and goodness of fit in the analysis of covariance structures. Psychological Bulletin, 88(3), 588.
Bettman, J. R. (1973). Perceived risk and its components: a model and empirical test. Journal of Marketing Research, 184-190.
Bollen, K. A., & Long, J. S. (1993). Testing structural equation models (Vol. 154): Sage Publications, Inc.
Browne, M. W., & Cudeck, R. (1993). Alternative ways of assessing model fit (Vol. 154): Newbury PArk, CA: Sage.
Burke, P. J. (1997). An Identity Model for Network Exchange. American Sociological Review, 62(1), 134–150
Burnkrant, R. E., & Cousineau, A. (1975). Informational and normative social influence in buyer behavior. Journal of Consumer Research, 2(December), 206-214.
Carlos F. & Miguel G. (2006) "Consumer trust, perceived security and privacy policy: Three basic elements of loyalty to a web site", Industrial Management & Data Systems, Vol. 106 Iss: 5, pp.601 - 620
Chen, Y. F. (2008). Herd behavior in purchasing books online. Computers in Human Behavior, 24(5), 1977-1992.
Cho, J. (2004). Likelihood to Abort an Online Transaction: Influences from Cognitive Evaluations, Attitudes, and Behavioral Variables. Information & Management, 41(7), 827-838.
Cox, D. F., & Rich, S. U. (1964). Perceived risk and consumer decision-making: The case of telephone shopping. Journal of Marketing Research, 32-39.
Cronbach, L. J. (1951). Coefficient alpha and the internal structure of tests. Psychometrika, 16(3), 297-334.
Davis, F. D. (1986). A technology acceptance model for empirically testing new end-user information systems: Theory and results. Massachusetts Institute of Technology, Sloan School of Management.
Davis, F. D. (1989). Perceived usefulness, perceived ease of use, and user acceptance of information technology. MIS Quarterly, 319-340.
Davis, F. D., Bagozzi, R. P., & Warshaw, P. R. (1989). User acceptance of computer technology: a comparison of two theoretical models. Management Science, 982-1003.
Fishbein, M., & Ajzen, I. (1975). Belief, attitude, intention and behaviour: An introduction to theory and research: Addison-Wesley.
Flavián, C. and Guinalíu, M. (2006), “Consumer trust, perceived security and privacy policy: three basic elements of loyalty to a web site”, Industrial Management & Data Systems, Vol. 106 No. 5, pp. 601-20.
Fornell, C. R. & Larcker, F. F. (1981), “Structural Equation Models with Unobservable Variables and Measurement Error,” Journal of Marketing Research, 18, pp.39-51.
Hair, J. F., Anderson, R. E., Tatham, R. L., & Black, W. C. (1998). Multivariate data analysis (5th ed.). New York: Macmillan.
Hanson, W. A., & Putler, D. S. (1996). Hits and misses: Herd behavior and online product popularity. Marketing Letters, 7(4), 297-305.
Herzberg, A. (2003). Payments and Banking with Mobile Personal Devices. Communications of the ACM, 46(5), 53-58.
Hinkin, T. R. (1998). A brief tutorial on the development of measures for use in survey questionnaires. Organizational Research Methods, 1(1), 104-121.
Huang, J. H., & Chen, Y. F. (2006). Herding in online product choice. Psychology and Marketing, 23(5), 413-428.
Jarvenpaa, S. L., & Todd, P. A. (1996). Consumer reactions to electronic shopping on the World Wide Web. International Journal of Electronic Commerce, 1(2), 59-88.
Karahanna, E., & Straub, D. W. (1999). The psychological origins of perceived usefulness and ease-of-use. Information & Management, 35(4), 237-250.
Kelman, H. C. (1961). Processes of opinion change. Public Opinion Quarterly, 25(1), 57-78.
Kotler (1997) , “Marketing Management, Analysis, Implementation and Using the Servoual Model, ” The Service Industries Journal,Vol,11,3, pp.324-343.
Kruck, S.E., Gottovi, D., Moghadami, F., Broom, R. and Forcht, K.A. (2002), “Protecting personal privacy on the internet”, Information Management & Computer Security, Vol. 10 No. 2, pp. 77-84.
Lascu, D., & Zinkhan, G. M. (1999). Consumer Conformity: Review and Applications for Marketing Theory and Practice. Journal of Marketing Theory and Practice, 7(3), 1-12.
Lichtenstein, Donald R., Ridgway, Nancy M., & Netemeyer, Richard G. (1993). Price Perceptions and Consumer Shopping Behavior: A Field Study. Journal of Marketing Research, 30(2), 234-245. doi:10.2307/3172830
Likert, R. (1932). A Technique for the Measurement of Attitudes. Archives of Psychology, 140, 1–55.
Lim, N. (2003). Consumers perceived risk: sources versus consequences. Electronic Commerce Research and Applications, 2 (2003), pp. 216–228
Lwin, M., Wirtz, J., and Williams, J. D. (2007) Consumer online privacy concerns and responses: a power-responsibility equilibrium perspective. Journal of the Academy of Marketing Science, 35, 4, 2007, 572–585.
Moore, G. C., & Benbasat, I. (1991). Development of an instrument to measure the perceptions of adopting an information technology innovation. Information Systems Research, 2(3), 192-222.
Mulaik, S. A., James, L. R., Van Alstine, J., Bennett, N., Lind, S., & Stilwell, C. D. (1989). Evaluation of goodness-of-fit indices for structural equation models. Psychological Bulletin, 105(3), 430.
Nunnally, J. C. (1978). Psychometric theory (2nd ed.). New York: McGraw-Hill.
Pavlou, P. A. (2003). Consumer acceptance of electronic commerce: Integrating trust and risk with the technology acceptance model. International Journal of Electronic Commerce, 7(3), 101-134.
Rogers, E. M. (1983). Diffusion of Innovations New York: Free Press.
Roselius, T. (1971). Consumer rankings of risk reduction methods. The Journal of Marketing, 56-61.
Schierz, P. G., Schilke, O., & Wirtz, B. W. (2010). Understanding consumer acceptance of mobile payment services: An empirical analysis. Electronic Commerce Research and Applications, 9(3), 209-216
Suh, B. and Han, I. (2003), “The impact of customer trust and perception of security control on the acceptance of electronic commerce”, International Journal of Electronic Commerce, Spring, pp. 135-61.
Sun, S. Y., Ju, T. L. and Su, C. F. (2006). A Comparative Study of Value-added Mobile Services in Finland and Taiwan. International Journal of Mobile Communications, 4(4), 436-458.
Van der Heijden, H. (2002). Factors affecting the successful introduction of mobile payment systems. In proceedings of the 15th Bled Electronic Commerce Conference (Bled 2002), Bled, Slovenia, Paper 20.
Veijalainen, J., Terziyan, V., & Tirri, H. (2006). Transaction management for m-commerce at a mobile terminal. Electronic Commerce Research and Applications, 5(3), 229-245.
Venkatesh, V., Morris, M. G., Davis, G. B., & Davis, F. D. (2003). User acceptance of information technology: Toward a unified view. MIS Quarterly, 27(3), 425-478.
Wilkie, W. L. (1994). Consumer Behavior, 3rd ed. New York: John Wiley and Sons Inc.
江濡伃 (2013)。行動支付服務的三篇研究:策略、商業模式與成功因素。國立成功大學 電信管理研究所碩士論文,未出版,台南市。吳明隆. (2009b). 結構方程模式: AMOS 的操作與應用: 臺北市: 五南.
吳明隆. (2011). 論文寫作與量化研究. 台北市: 五南圖書出版股份有限公司.
吳明隆, & 涂金堂. (2006). SPSS 與統計應用分析. 台北市: 五南圖書出版股份有限公司.
張翔. (2009). 提綱挈領學統計. 台北市: 鼎茂圖書出版股份有限公司.
許嘉琤 (2012)。行動支付可用性相關因素探討。國立宜蘭大學應用經濟與管理學系經營 管理碩士論文,未出版,宜蘭縣。黃騰緯 (2012)。在Android平台上之NFC旅遊資訊電子零錢包設計與實作。雲林科技大 學電機工程系碩士論文,未出版,雲林縣。曾春瑜 (2013)。以延伸式科技接受模型探討行動支付帳單之使用意願。東吳大學資訊管 理學系碩士論文,未出版,台北市。葉展皓 (2013)。行動支付機制之研究。國立政治大學經營管理碩士學程碩士論文,未出 版,台北市。劉軒宏 (2013)。行動支付模型之研究。中國文化大學資訊管理學系碩士在職專班碩士論 文,未出版,台北市。鄭詠怡 (2010)。行動付款機制之發展現況與機會。國立交通大學科技管理研究所碩士論 文,未出版,新竹市。謝麗美 (2012)。消費者使用NFC行動支付行為意圖之研究。開南大學資訊學院碩士在職 專班碩士論文,未出版,桃園縣。