一、中文文獻
1.A&S安全與自動化雜誌《台灣版》,香港商法蘭克福新時代傳媒有限公司台灣分公司(雜誌)。
2.內政部建築研究所 (2007),"智慧化居住空間安全監控系統整合應用計畫"。
3.內政部建築研究所 (2009),"智慧化居住空間發展重點回顧"。
4.王政欽 (2007),網際網路使用者對網路電話接受度之研究。
5.李進農 (2007),視訊監控技術與發展趨勢,「社區安全e化聯防機制」研討會論文集。
6.林心慧, 張雲豪 (2009),"以UTAUT為基礎之消費者電子折價劵使用行為之預測模式: 直接與干擾效果",中華管理評論國際學報。
7.林震岩 (2007),多變量分析-SPSS的操作及應用。
8.拓墣產業研究所 (2007),安全產業發展現況與趨勢剖析。
9.財團法人資訊工業策進會 (2009),宅經濟賺很大-智慧家庭寬頻應用新商機。
10.曹金成 (2008),物業管理系統使用行為之研究-UTAUT模型之應用。
11.張乘維 (2007/07),全球IP監控產業發展趨勢分析,拓墣產業研究所。
12.張乘維 (2007/08),網路攝影機市場現況分析,拓墣產業研究所。
13.張乘維 (2008),安全監控錄影下一個主流商品-網路影像錄影機,拓墣產業研究所。
14.康琇華 (2010),探討使用者對創新香品的採用因素-以UTAUT模式為基礎。
15.商業週刊 (2009),雲端運算為何改變10億人?,第1146期。
16.陳瀅 (2010),雲端策略, 天下雜誌。
17.經濟部 (2010),"雲端運算產業發展方案"。
18.蕭世暉 (2007),部落格使用者付費購買加值服務行為之研究。
二、英文文獻
1.Ajzen, I. (1991). "The Theory of Planned Behavior." Organizational Beahavior and Human Decision Processes 50(2), PP. 179-211.
2.Allard, T., Banin, B., and Chebat, J. (2009). "When Income Matters: Customers Evaluation of Shopping Malls'' Hedonic and Utilitarian Orientation." Journal of Retailing and Consumer Services 16(1), pp. 40-49.
3.Armbrust, M., Fox, A., Griffith, R., Joseph, A. D., Katz, R., Konwinski, A., Lee, G., Patterson, D.A., Rabkin, A., Stoica, I., and Zaharia, M. (2010). "A View of Cloud Computing." Communications of the ACM 53(4), pp. 50-58.
4.Bandura, A. (1986) Social Foundation of Thought and Action: A Social Cognitive Theory, Prentice Hall, Englewood Cliffs, NJ."
5.Chang, R-I, Wang, T-C, Wang, C-H, Liu, J-C, and Ho, J-M (2010). "Effective Distributed Service Architecture for Ubiquitous Video Surveillance." Information Systems Frontiers, Published online 14, pp. 1-17.
6.Compeau, D.R., and Higgins, C. A. (1995) "Application of Social Cognitive Theory to Traning for Computer Skills." Information Systems Research 6(2), pp. 118-143.
7.Coudert, F. (2009). "Toward a New Generation of CCTV Networks: Erosion of Data Protection Safeguards?" Computer Law & Security Review 25, pp. 145-154.
8.Cronbach, L. J. (1951). " Coefficient Alpha and the Internal Structure of Tests." Psychometrika 16, pp. 297-334.
9.Davis, F. D. (1989). "Perceiced Usefulness, Perceived Ease of Use, and User Acceptance of Information Technology." MIS Quarterly 13(3), pp.319-339
10.Davis, F. D., Bagozzi, R. P., and Wardhaw, P. R. (1992). "Extrinsic and Intrinsic Motivation to Use Computers in the Workplace." Journal of Applied Socail Psychology 22(14), pp.1111-1132
11.Durkee, D. (2010). "Why Cloud Computing Will Never Be Free." Communications of the ACM 53(5), pp. 62-69.
12.European Commission (2010). The Future of Cloud Computing-Opportunities for European Cloud Computing Beyond 2010.
13.Fishbein, M., and Ajzen, I. (1975). Belief, Attitude, Intention, and Behavior: An introduction to Theory and Research. Reading, MA Addison-Wesley.
14.Garfield, M. J. (2005). "Acceptance of Ubiquitous Computing." Information Systems Management 22(4), pp. 24-31.
15.Gay, L. R. (1992). "Educational Research Competencies for Analysis and Application." Macmillan.
16.Hall, D., and Mansfield, R. (1995). "Relationships of Age and Seniority with Career Variables of Engineers and Scientists." Journal of Applied Psychology 60(2), pp. 201-210.
17.Hayes, B. (2008). "Cloud conputing." Communications of the ACM 51(7), pp. 9-11.
18.Iyer, B., and Henderson, J. C. (2010). "Preparing for the Future: Understanding the Seven Capabilities of Cloud Computing." MIS Quarterly Executive 9(2), pp. 117-132.
19.Jefkowitz, J. (1994). "Sex-Related Differences in Job Attitudes and Dispositional Variables - Now You See Them,..." Academy of Management Journal 37(2), pp. 323-350.
20.Kristaly, D. M., Sisak, F., Grigorescu, C. M., and Caraman, M. C. (2009). Designing the Architecture of a Scalable Video Surveillance System. Danube Adria Association for Automation and Manufacturing International. Vienna. 20, pp. 1677-1678.
21.Leny, J. A. (1988). "Intersections of Gender and Aging." The Sociological Quarterly 29(4), pp.479-486.
22.Moore, G. C., and Benbasat, I. (1991). "Development of an Instrument to Measure the Perceptions of Adopting an Information Technology Innovation." Information Systems Research 2(3), pp. 192-222.
23.Morris, M. G., and Venkatesh,V. (2000). "Age Differences in Technology Adoption Decisions: Implications for a Changing Work Force." Personnel Psychology 53(2), pp. 375-403.
24.National Institute of Standards and Technology (2011). "The NIST Definition of Cloud Computing (Draft).", pp.1-7.
25.Okazaki, S. (2006). "What Do We Know about Mobile Internet Adopters: A Cluster Analysis." Information & Management 43, pp. 127-142.
26.Pishva, D., and Takeda, K. (2006), "A product-Based Security Model for Smart Home Appliances.", Carnahan Conferences Security Technology, Proceedings 2006 40th Annual IEEE International, pp. 234-242.
27.Rogers, E. (1995) "Diffusion of Innovations." Free Press, New York.
28.Serenko, K., Turel, O., and Yol, S. (2006). "Moderating Roles of User Demographics in the American Customer Satisfaction Model within the Context of Mobile Services." Journal of Information Technology Management 17(4), pp. 20-32.
29.Shin, D-H (2009). "Towards an Understanding of the Consumer Acceptance of Mobile Wallet." Computers in Human Behavior 25, pp. 1343-1354.
30.Taylor, S., and Todd, P. A. (1995a) "Assessing IT Usage: The Role of Prior Experience." MIS Quarterly 19(2), pp. 561-570.
31.Thompson, R. L., Higgins, C. A., and Howell, J. M. (1991) "Personal Computing: Toward a Conceptual Model of Utilization." MIS Quarterly Executive 15(1), pp. 124-143.
32.Vaquero, L., Rodero-Merino, L., Caceres, J., and Lindner, M. (2009). "A Break in the Clouds: Towards a Cloud Definition." ACM Sigcomm Computer Communication Review 39(1), pp. 50-55.
33.Venkatesh, V., and Morris, M.G. (2000). "Why Don''t Men Ever Stop Ask For Directions? Gender, Social Influence, and Their Role in Techonology Acceptance and Usage Behavior." MIS Quarterly Executive 21(1), pp. 115-139.
34.Venkatesh, V., Morris, M.G., and Ackerman, P.L. (2000). "A Longitudinal Field Investigation of Gender Differences in Individual Technology Adoption Decision-Making Processes." Organizational Behavior and Human Decision Processes 83(1), pp.33-60.
35.Venkatesh, V., Morris, M.G., Davis, G. B., and Davis, F. D. (2003). "User Acceptance of Information Technology: Toward a Unified View." MIS Quarterly Executive 27(3), pp. 425-478.
36.Wright, D., Friedewald, M., Gutwirth, S., Langheinrich, M., Mordini, E., Bellanova, R., De Hert, P., Wadhwa, K., and Bigo, D. (2010). "Sorting out Smart Surveillance." Computer Law & Security Review 26(4), pp. 343-354.
37.Wu, Y-L, Tao, Y-H, and Yang, P-C (2007). "Using UTAUT to explore the behavior of 3G mobile communication users." In Proceedings of The International Conference on Industrial Engineering and Engineering Management (IEEM), pp.119-203.
38.Yang, L., Yang, S-H, and Fang, Y. (2006). "Safety and Security of Remote Monitoring and Control of Intelligent Home Enviroments." IEEE International Conference on Systems, Man, and Cybernetics, pp. 1149-1153.
三、網路文獻
1.Apptis, Inc.,http://www.apptis.com/
2.BT Group,http://www.btplc.com/
3.GKB,http://www.gkbsecurity.com/。
4.J.P. Freeman,http://www.jpfreeman.com/
5.Salesforce.com,http://www.salesforce.com/tw/
6.SecurityStation,http://www.securitystation.com/how-vsaas-works.php
7.The Washington post,Federal government picks 11 cloud-computing vendors,http://www.washingtonpost.com/wp-dyn/content/article/2010/10/22/AR2010102205932.html?sub=AR
8.王元凱 (2010),"VSaaS: Video Surveillance as a Service",http://blog.ykwang.tw/2010/10/vsaas-video-surveillance-as-service.html
9.周秉誼 (2009),"雲端運算平台-Hadoop",http://www.cc.ntu.edu.tw/chinese/epaper/0011/20091220_1106.htm
10.莊也慧 (2011),"雲端新世代專欄─安全監控雲端化 創造無限商機",http://met.asia-info.net/met_InfoBlog_Detail.aspx?id=2723
11.康和證劵 (2008),安全監控產業發展與展望,MoneyDJ 理財網,http://www.moneydj.com/kmdj/report/reportviewer.aspx?a=0b56bec6-4b51-4ae0-ae1d-75c331c5181e
12.黃東榮 (2006),"我國安全產業的發展現況及願景",「工安環保報導」,http://www.ftis.org.tw/cpe/download/she/Issue31/current31_04.htm13.幀速率,http://hi3d.tw/3dsmax7_w/frame_rate_glossary.html
14.凱基證券 (2007),"安全監控產業值得留意- DVR及網路攝影機兩大成長動能",http://money.hinet.net/z/zd/zdc/zdcz/zdcz_66EB4F34-5A29-45ED-93AA-AE7DEF846D91.djhtm
15.資策會FIND (2008),"2008年光纖上網應用服務需求調查",「電信平台整合資通訊應用推動計畫」,http://www.find.org.tw/find/home.aspx?page=many&id=200
16.資策會FIND (2010),"光纖寬頻應用服務之需求─付費程度分析",http://www.find.org.tw/find/home.aspx?page=many&id=254
17.資策會FIND (2011),"2010年我國家庭寬頻現況與需求調查─家戶篇",
http://www.find.org.tw/find/home.aspx?page=many&id=280
18.維基百科,"雲端運算",http://zh.wikipedia.org/wiki/%E4%BA%91%E8%AE%A1%E7%AE%97
19.聯合新聞網 (2010),中國駭客入侵Google「蓋亞」密碼系統,http://mag.udn.com/mag/digital/storypage.jsp?f_ART_ID=244832
20.環球監控網,畫面處理器,http://www.ekuga.com/cctv_8_5.htm
21.藍眼科技有限公司,http://www.blueeyes.com.tw/