English  |  正體中文  |  简体中文  |  Post-Print筆數 : 11 |  Items with full text/Total items : 88531/118073 (75%)
Visitors : 23458092      Online Users : 247
RC Version 6.0 © Powered By DSPACE, MIT. Enhanced by NTU Library IR team.
Scope Tips:
  • please add "double quotation mark" for query phrases to get precise results
  • please goto advance search for comprehansive author search
  • Adv. Search
    HomeLoginUploadHelpAboutAdminister Goto mobile version
    政大機構典藏 > 商學院 > 資訊管理學系 > 學位論文 >  Item 140.119/31044
    Please use this identifier to cite or link to this item: http://nccur.lib.nccu.edu.tw/handle/140.119/31044


    Title: 電子商務網站信任管理之研究
    The Study of E-Commerce Trust Management
    Authors: 邱顯貴
    Chiu, Hsien-Kuei
    Contributors: 楊亨利
    Yang, Heng-Li
    邱顯貴
    Chiu, Hsien-Kuei
    Keywords: 電子商務
    網站
    信任
    值得信任
    準備就緒
    商業經營模式
    e-commerce
    website
    trust
    trustworthiness
    readiness
    business model
    Date: 2002
    Issue Date: 2009-09-14 09:08:46 (UTC+8)
    Abstract: 本研究係提出一個能夠讓企業經營的購物網站值得消費者信任之管理模式,以期幫助業者在提昇網站信任方面,有具體的目標和施力點。該模式包括兩個主要的部分:(1)網站值得信任的構成因素和(2)促成網站值得信任的管理措施。有關前者部分,本研究建構網站信任的架構和各因素重要性的排序,並轉成量表和對量表的驗證。後者在探討促成業者建立網站信任的顯著影響因素,以及業者和消費者在此方面表現的認知差距之分析。此外本研究也實際將量表分別應用在網站信任對個人資訊揭露意願的影響,和購物經驗對網站信任之影響的驗證。

    在研究的流程上,首先以消費者為導向,探討網站值得信任的架構和重要組成。接著由業者評量自己的網站在此方面的表現,同時也指出影響該表現的各因素之強烈程度。然後,再回到消費者本身,進一步逐一評量該網站的實際情況,以作為本研究探討業者與消費者之間認知落差的情形。

    本研究結果指出,網站值得消費者信任的主要因素可分為能力、正直和關係三個維度,十三個總指標,和五十三個細目指標。對業者的實證結果顯示,會顯著地促成網站業者在「網站信任」有較佳表現的因素,並不是感知的利益或感知的外在壓力,而是該網站是否一切準備就緒,尤其是在教育訓練與管理結構的支持、資訊科技資源、以及線上認證的配合等方面。另外,商業經營模式也是促成的重要因素,尤其是業者對網站的重要程度越高,又懂得虛擬社群的經營,那麼將更助於網站信任的展現。

    在本研究中並指出線上業者和消費者在認知上落差之所在和其主要原因。為有效管理網站和促使網站值得信任,業者需真正地以消費者為導向,建立和妥善運用所需的資源和能力(如:教育訓練和管理結構的支持、資訊科技資源),以提升消費者的信任。

    此外,本研究確認了網站信任對提供個人資訊意願的正向影響,以及線上購物經驗對網站信任的助益。最後,本研究並對各階段成果說明策略意涵,也結合顧客關係管理觀念,提供業者信任管理的參考模式和網站信任的自我檢核參考表,期望有助於業者對網站信任,有較綜合性的瞭解和經營上的幫助。
    This paper presents an EC-trust management model based on a series of empirical studies, in order to help website managers to develop or enhance their website trustworthiness. This model consists of (1) the website trust/trustworthiness structure and its components, and (2) the managerial measures to support the development or enhancement of the trustworthiness. The latter also includes (1) the organizational readiness and business model for the trustworthiness, (2) the gap analysis that helps finding out the differences in the trustworthiness perceptions between website managers and consumers, and (3) the potential trust accumulation via the continuously better online experiences.

    The paper conducts a four-phase research. At first, the website trustworthiness structure and its evaluation form are constructed and validated. Then, out of 476 shopping websites, 100 managers use the form to evaluate their website trustworthiness, and also fill in the questionnaire that measures their perceptions of the factors (e.g. organizational readiness and business model) influencing their website trustworthiness performances. In the third phase, 128 consumers are asked to use the same form to perceive and evaluate those websites’ trustworthiness performance, in order to measure the correlations and the gaps between the managers’ and consumers’ perceptions. Besides, the effect of trust on the willingness of personal information disclosure is also tested in this phase. Finally, in the fourth phase, this research adopts a multiple case study strategy to find out the reasons for the significant gaps identified in the third phase, and, practically, works with a case company to find out the effect of the online-shopping experience on trust in the website.

    The result shows that the website trustworthiness involves three latent factors (i.e., competence, integrity, and relation), which consist of 13 elements, and a total of 53 detailed items. The website trust/trustworthiness performance is significantly affected by their website readiness (i.e., E & T and managerial structure, IT resources, financial resources, and seal-program preparation), the perceived website importance, as well as the perceived community importance. Meanwhile, the results also show that the gaps of perceptions between website managers and consumers do exist. Therefore, to effectively enhance their website trustworthiness, they should be really consumer-oriented and improve their performance according to the gap analysis.

    Besides, there are another two exciting findings in this paper. The effect of trust on the willingness of personal-information disclosure is validated. The significant effect of shopping experiences on trust suggests that the website managers should promote customers’ online experiences to enhance their trust in the websites.
    Reference: 中文部分
    尤克強(1997),「資訊管理個案研究方法評論」,資訊管理學報,4(1),18-20。
    方世榮譯(2002),關係行銷,台北:五南。
    王毓良(1999),倫理氣候與資訊倫理的關聯性之研究─以高科技業及金融業為研究對象,靜宜大學企業管理研究所碩士論文。
    余千智等合著(2002),電子商務總論,二版,台北:智勝。
    吳思華(1993),策略九說─總論:策略管理的內涵,世界經理文摘。
    吳思華(1998),策略九說:策略思考的本質,臺北:臉譜文化。
    吳思華、黃宛華、賴鈺晶(1999),「智慧資本衡量因素之研究─以我國軟體業為例」,中華民國科技管理研討會論文集(三),591-604。
    吳琮璠、謝清佳(2003),資訊管理理論與實務,台北:智勝。
    李東峰、林子銘(2002),「資訊主管對企業資訊安全之風險控管決策」,資訊管理研究,資訊安全專刊,4(2),1-42。
    李東峰、林子銘、余春達(2001),「不確定環境下倫理決策行為之研究:以資訊隱私權為例」,第七屆資訊管理研究暨實務研討會,台北:景文技術學院。
    Eggar, F. (2002). “Consumer Trust in E-Commerce: From Psychology to Interaction Design,” in Prins et al. (Eds.), Trust in Electronic Commerce: The Role of Trust from a Legal, an Organizational and a Technical Point of View, Kluwer Law International.
    Eining .M. M. and Christensen, A. L. (1991). “A Psycho-Social Model of Software Piracy: the Development and Test of a Model,” in Ethical Issues in Information Systems, R. Dejoie, G. Fowler and D. Paradice (Eds.), Boyd and Fraser, Boston.
    Farnham, A. (1989). “The trust Gap,” Fortune, Dec. 4, 56-78.
    Farris, G., Senner, E., and Butterfield, D. (1973). “Trust, Culture, and Organizational Behavior,” Industrial Relations, 12, 144-157.
    Federal Trade Commission (FTC). (May 2000). “Privacy Online: Fair Information Practices In The Electronic Marketplace,” A Federal Trade Commission Report To Congress.
    Federal Trade Commission (FTC). (July 1999).“Self-Regulation and Privacy Online,”A Federal Trade Commission Report to. Congress.
    Federal Trade Commission (FTC), (2000). “Privacy Online: Fair Information Practices In The Electronic Marketplace,” A Federal Trade Commission Report To Congress.
    Ferrell, O. C. and Gresham, L. G. (1985).“A Contingency Framework for Understanding Ethical Decision Making in Marketing,”Journal of Marketing, 49, 87-97.
    Fishbein, M. and Ajzen, I. (1975) Belief, Attitude, Intention and Behavior: An Introduction to Theory and Research, MA: Addison-Wesley.
    Fogg, B.J. et al. (2001). “What Makes Web Sites Credible? A Report on a Large Quantitative Study,” ACM SIGCHI, 3 (1), 61-67.
    李漢雄、郭書齊(1997),「提升競爭優勢的人力資源策略:談創新力發展與創新活度導入」,1997中華民國科技管理研討,367-378。
    Foxman, E.R. and Kilcoyne, P. (1993). “Information Technology, Marketing Practice, and Consumer Privacy: Ethical Issues,” Journal of Public Policy & Marketing, 12(1), 106-119.
    Fritzsche, David J. (1991). “A Model of Decision-Making Incorporating Ethical Values,” Journal of Business Ethics, 10, 841-852.
    Frost, T., Stimpson, D. V., and Maughan, M. R. C. (1978). “Some Correlates of Trust,” Journal of Psychology, 99, 103-108.
    Fuller, S.R. and Aldag, R.J. (2001). “The GGPS Model: Broadening the Perceptive on Group Problem Solving,” in M. Turner (Ed.), Groups at Work: Theory and Research, 3-24.
    Gabarro, J. J. (1978). “The Development of Trust, Influence, and Expectations,” in A. G. Athos and J. J. Gabarro (Eds.), Interpersonal Behavior: Communication and Understanding in Relationship, 290-303. Englewood Cliffs, NJ: Prentice-Hall.
    Gaines, J. H. (1980). “Upward Communication in Industry: An Experiment,” Human Relations, 33, 929-942.
    Ganesan, S. (1994). “Determinants of Long-Term Orientation in Buyer-Seller Relationships,” Journal of Marketing, 58(2), 1-19.
    Garbarino, E. and Johnson, M. (1999). “The Different Roles of Satisfaction, Trust and Commitment in Customer Relationships,” Journal of Marketing, 63(April), 70-87.
    Gefen, D. (2000). “E-Commerce: The Role of Familiarity and Trust,” Omega, 28(6), 725-737.
    Gefen, D. (2002). “Reflections on the Dimensions of Trust and Trustworthiness among Online Consumers,” Database for Advances in Information Systems, 33(3), 38-53.
    汪智揚(1999),風險性結局下的資訊倫理決策—倫理決策理論與理性行為理論之比較,國立中央大學資訊管理研究所碩士論文。
    Gefen, D. (2003). “Trust and TAM in Online Shopping: An Integrated Model,” MIS Quarterly, 27(1), 51-90.
    Giffin, K. (1967). “The Contribution of Studies of Source Credibility to a Theory of Interpersonal Trust in the Communication Process,” Psychological Bulletin, 68(2), 104-120.
    Givens, B. (1997). “A Review of State and Federal Privacy Laws,” http://www.privacyrights.org/ar/jttaskap.htm.
    Govier, T. (1997). Social Trust and Human Communities, McGill-Queen’s University Press.
    Greenleaf, G.(1998). “Global Protection of Privacy in Cyberspace - Implications for the Asia-Pacific,” http://austlii.edu.au/itlaw/articles/TaiwanSTLC.html.
    Hanson, W. (2000). Principles of Internet Marketing, South-Western College Publishing.
    Hardin, R. (1940). Trust and Trustworthiness, NY: Russell Sage Foundation.
    Harrison, D.A., Mykytyn, P.P. Jr., and Riemenschneider, C.K. (1997). "Executive Decisions About Adoption of Information Technology in Small Business: Theory and Empirical Tests," Information Systems Research, 8(2), 171-195.
    Heimovics, R. D. (1984). “Trust and Influence in an Ambiguous Group Setting,” Small Group Behavior, 15, 545-552.
    Hicks, W. (2001). “Cyber-Risk Meets Corporate Governance- I ,” Directorship, 1-3.
    周文賢(2002),多變量統計分析:SAS/STAT 使用方法,台北:智勝文化。
    Hoffman, D. L., Novak, T. P., and Peralta, M. (1999). “Building Consumer Trust Online,” Communications of the ACM, 42 (4), 80-85.
    Holmes, J. G. (1991). “Trust and the Appraisal Process in Close Relationships,” in Jones, W. H. and Perlman, D. (Eds.), Advances in Personal Relationships, 2, 57-104. London: Jessica Kingsley.
    Hunt, K. (1996). “Establishing a Presence on the World Wide Web: A Rhetorical Approach,” Technical Communication, 43(4), 376-387.
    Hunt, S. D. and Vitell, S. (1986). “A General Theory of Marketing Ethics,” Journal of Macromarketing, Spring, 5-16.
    Iacovou C. L., Benbasat, I., and Dexter, A. S.(1995). “Electronic Data Interchange and Small Organizations: Adoption and Impact of Technology,” MIS Quarterly, 19(4), 465-85.
    Igbaria, M., Zinatelli, N., Cragg, P., and Cavaye, A. (1997). "Personal Computing Acceptance Factors in Small Firms: A Structural Equation Model," MIS Quarterly, Sept., 279-305.
    Jarvenpaa, S. L., Knoll, K., and Leidner. D. E. (1998). “Is Anybody Out There? Antecedents of Trust in Global Virtual Teams,”Journal of Management Information Systems, 14(4), 29-64.
    Jarvenpaa, S. L., Tractinsky, J., and Saarinen, L. (1999). “Consumer Trust in an Internet Store: A Cross-Cultural Validation,” Journal of Computer Mediated Communication, 5 (2), http://www.asusc.org/jcmc/vol5/issue2.
    Jarvenpaa, S. L., Tractinsky, J., and Vitale, M. (2000). “Consumer Trust in an Internet Store,” Information Technology and Management, 1 (1-2), 45-71.
    Johnson-George, C. and Swap, W. C. (1982). “Measurement of Specific Interpersonal Trust: Construction and Validation of a Scale to Assess Trust in a Specific Other,” Journal of Personality and Social Psychology, 43(6), 1306-1317.
    林子銘、李東峰、連俊瑋(2002),「台灣人在不確定性環境下倫理決策行為研究」,資訊管理研究,4(3),163-204.
    Jone, G.R. and George, J.M. (1998).“The Experience and Evolution of Trust: Implication for Cooperation and Teamwork,”Academy of Management Review, 531-546.
    Jones, S., Wilikens, M., Morris, P., and Masera, M. (2000).“Trust Requirements in e-Business,”Communications of the ACM, 43(12), 81-87.
    Kallman, E. A. and Grillo, J. P. (1996). Ethical Decision Making and Information Technology, 2nd ed., McGgraw-Hill.
    Kasperson, R.E., Golding, D., and Tuler, S. (1992), “Social Distrust as a Factor in Siting Hazardous Facilities and Communicating Risks,” Journal of Social Issues, 48(4), 161-187.
    Katerattanakul, Pairin. (2002). “Framework of Effective Web Site Design for Business-To-Consumer Internet Commerce,” INFOR, 40(1), 57-70.
    Kee, H.W. and Knox, R.E. (1970).“Conceptual and Methodological Considerations in the Study of Trust and Suspicion,”Journal of Conflict Resolution, 14, 357-366.
    Kelly, C. M. (1987). “The Interrelationship of Ethics and Power in Today’s Organizations,” Organizational Dynamics, 16(Summer), 5-18.
    Kemp, Ted (2000), “A Matter of Trust - B2Cs Seek Credibility,”Internetweek, 830, 1 & 16.
    Kettinger, W., Grover, V., Guha, S., and Segars, A. (1994). “Strategic Information Systems Revisited: A Study in Sustainability and Performance,” MIS Quarterly, 18(1), 31-58.
    Kettinger, W.J. and Hackbarth, G. (1997). “Selling in the Era of the Net: Integration of Electronic Commerce in Small Firms” Proceedings of the 18 International Conference on Information Systems, Atlanta, 249-262.
    林子銘、梁昇凱、汪智揚(1999),「以社會交換理論探討個人對資訊隱私權的認知」,第十屆國際資訊管理學術研討會,台北:警察大學。
    Killingsworth, S. (1999). “Mining Your Own Business: Privacy Policy in Principle and in Practice,” Journal of Internet Law, October, 1-18.
    Kimery, K. and M. McCord. (2002). “Third-Party Assurances: Mapping the Road to Trust in E-retailing,” The Journal of Information Technology Theory and Application (JITTA), 4(2), 63-82.
    Kohlberg, L. (1976). “Moral Stages and Moralization: the Cognitive-Developmental Approach,” in T. Lickona (Ed.), Moral Development and Behavior: Theory, Research, and Social Issues, 34-35, NY: Holt, Rinehart & Winston.
    Koller, M. (1988). “Risk as a Determinant of Trust,” Basic and Applied Social Psychology, 9(4), 265-276.
    Kotler, P. (1991). Marketing Management: Analysis, Planning, Implementation, and Control, 7th, NJ: Prentice-Hall.
    Kramer, L.C. (2002). “Private Eyes Are Watching You: Consumer Online Privacy Protection-Lessons from Home and Abroad,” Texas International Law Journal, 37(2), 387-420.
    Kreie, J. and Timothy, P. C. (1998).“How Men and Woman View Ethics,” Communication of the ACM, 41(September), 70-76.
    Krüge, C. (1982).“Right of Privacy, Right of Personality and Commercial Advertising,” International Review of Industrial Property and Copyright Law, 13, p.183.
    Kruglanski, A.W. (1970). “Attributing Trustworthiness in Supervisor-Worker Relations,” Journal of Experimental Psychology, 6, 214-232.
    Kuo, Feng-Yang and Hsu, Meng-Hsiang, (2001). “Development and Validation of Ethical Computer Self-Efficacy Measure: The Case of Softlifting,” Journal of Business Ethics, 32(4), 299-315.
    林水波(1999),組織理論,台北:智勝。
    Larzelere, R., and Huston, T. (1980). “The Dyadic Trust Scale: Toward Understanding Interpersonal Trust in Close Relationships,” Journal of Marriage and the Family, 42, 595-604.
    Lau, T., Etzioni, O. and Weld, D. (1999).“Privacy Interfaces for Information Management,”Communication of the ACM, 42, 88-94.
    Leana, C.R. and van Buren, H.J. III. (1999). “Organizational Social Capital and Employment Practices,” Academy of Management Review, 24, 538-555.
    Lederer, A.L., Mirchandani, D.A., and Sims, K. (1997).“The Link Between Information Strategy and Electronic Commerce,” Journal of Organizational Computing and Electronic Commerce, 7(1), 1997, 17-34.
    Lee, K.O. and Turban, E. (2001). “A Trust Model for Consumer Internet Shopping,” International Journal of Electronic Commerce, 6(1), 75-91.
    Lewis, J. D., and Weigert, A. (1985). “Trust as a Social Reality,” Social Forces, 63, 967-985.
    Luhmann, N. (1988). “Familiarity, Confidence, Trust: Problems and Alternatives,” in D. Gambetta (Ed.), Trust: Making and Breaking Cooperative Relations, Basil Blakwell.
    Magouirk, J. (2001). “Partners in Privacy,” Intelligent Enterprise, 4(14), Sep 18, 28-32.
    Mason, R. O. (1986).“Four Ethical Issues of the Information Age,”MIS Quarterly, 10(1), 5-12.
    Mayer, R.C., Davis, J.H., and Schoorman, F.D. (1995). “An Integrative Model of Organizational Trust”Academy of Management Review, 20(3), 709-734.
    林東清(2002),資訊管理:e化企業的核心競爭能力,台北:智勝文化。
    McAllister, Daniel J. (1995). “Affect- and Cognition-based Trust as Foundations for Interpersonal Cooperation in Organizations,” Academy of Management Journal, Feb, 38(1), 24-59.
    McCarthy, T. (2000), The Rights of Publicity and Privacy, (1st Edition, 1987), 2nd Edition, NY: Clark Boardman Callaghan.
    McFall, L. (1987),“Integrity,”Ethics, 98, 5-20.
    McKim, R.(1999). “Information: The Newest Currency;” Target Marketing, 22(7), 36-38.
    McKnight, D.H. and Chervany, N.L. (2001). “Trust and Distrust Definitions: One Bite at a Time,” in R. Falcone, M. Singh and Y.-H. Tan (Eds.): Trust in Cyber-Societies, LNAI 2246, 27-54, Springer-Verlag Berlin Heidelberg.
    Microsoft, (1999). Summary of Global Internet Legal Developments─from the Period Oct. to Dec. 1999, Microsoft.
    Miller, S. and Weckert, J. (2000).“Privacy, the Workplace and the Internet,” Journal of Nusiness Ethics, 28, 255-265.
    Mishra, A. K. (1996).“Organizational Responses to Crisis: The Centrality of Trust,” in R. M. Kramer and T. R. Tyler (Eds.), Trust in Organizations: Frontiers of Theory and Research, 261-287, Thousand Oaks, CA: Sage.
    Morgan, R.M. and Hunt, S.D. (1994). “ The Commitment-Trust Theory of Relationship Marketing,” Journal of Marketing, 58(3), 20-38.
    Nimmer, M. (1954). “The Right of Publicity,”Law and Contemporary Problems, 19, p. 203.
    林東清(2002),「顧客關係管理(CRM)研究的一些相關理論模式與重要議題」,資訊管理學報,9(專刊期),31-56。
    Olson, J. M., and Zanna, M. P. (1993). “Attitudes and Attitude Change,” Annual Review of Psychology, 44, 117-154.
    Palmer, J., Bailey, J. P., and Faraj, S. (2000). “The Role of Intermediaries in the Development of Trust on the WWW: The Use and Prominence of Trusted Third Parties and Privacy Statements,” Journal of Computer Mediated Communication, 5 (3).
    Papadopoulou, P., Andreou, A., Kanellis, P., and Martakos, D. (2001). “Trust and Relationship Building in Electronic Commerce,” Internet Research: Electronic Networking Applications and Policy, 11(4), 322-332.
    Parasuraman, A. Zeithaml, V.A., and Berry, L.L. (1985). “A conceptual Model of Service Quality and Its Implications for Future Research,” Journal of Marketing, Fall, 44.
    Parker, D., Swope, S., and Baker, B. (1990). Ethical Conflicts in Information and Computer Science, Technology, and Business, Wellesley, MA: QED Information Sciences.
    Pinckaers, J. (1996). From Privacy toward a New Intellectual Property Right in Persona, MA: Kluwer Law International.
    Powell, W.W. (1990). Neither Maker nor Hierarchy: Network Forms of Organization,” Research in Organizational Behavior, 12, 295-336.
    Pressey, A.D. and Mathew, B.P. (1998). “Relationship Marketing and Retailing: Comfortable Bedfellow?” Customer Relationship Management, 1(1), 39-53.
    Prosser, W. (1960). “Privacy,” California Law Review, 48 (January), 383-423.
    Putnam, R.D. (1993). Making Democracy Work: Civil Traditions in Morden Italy, Princeton: Princeton University Press.
    邱顯貴(1999),「資訊存取之隱私問題在倫理學與科技法律層面之探討」,企業倫理與永續發展研討會,中壢:中央大學,188-206。
    Radcliff, D. (1998). “Is your ISP secure?” InfoWorld, Mar 2.
    Rainnone, S., Sipior, J., and Ward, B. (1998).“Ethical Management of Employee E-mail Privacy, Information Strategy,”The Executive’s Journal, Spring, 34-41.
    Ramaswani, S.N., Srinivasan, S.S., and Gorton, S.A. (1997). "Information Asymmetry Between Salesperson and Supervisor: Postulates from Agency and Social Exchange Theory," Journal of Personal Selling & Sales Management, 17(3), 29-50.
    Rawlins, W. K. (1983).“Openness as Problematic in Ongoing Friendships: Two Conversational Dilemmas,”Communication Monographs, 50, 1-13.
    Renn, O. and Levine, D. (1991). “Credibility and Trust in Risk Communication,” in R.E. Kasperson and P.M. Stallen (Eds.), Communicating Risks to the Public: International Perspectives, Amsterdam: Kluwer.
    Reynolds, Larry (1997). The Trust Effect: Creating the High Trust, High Performance Organization, CA: Nicholas Brealey Publishing.
    Roos, G., Roos, J., Edvinsson, L., and Dragonetti, N.C. (1998). Intellectual Capital: Navigating in the New Business Landscape, NY: New York University Press.
    Rousseau, D. M., Sitkin, S. B., Burt, R. S., and Camerer, C. (1998). “Not So Different After All: A Cross-Discipline View of Trust,”The Academy of Management Review, 23(3), 393-404.
    Sabatelli, R.M., Buck, R., and Dreyer, A. (1983). “Locus of Control, Interpersonal Trust and Nonverbal Communication Accuracy,” Journal of Personality and Social Psychology, 44, 399-409.
    Schlenker, B., Helm, B., and Tedeschi, J. (1973). “The Effects of Personality and Situational Variables on Behavioral Trust,” Journal of Personality and Social Psychology, 25, 419-427.
    邱顯貴、傅素芬(2002),「透過合作以創造價值:一個分析模式與個案研究」,商業職業教育季刊,84期,15-25。
    Schneiderman, B. (2000). “Designing Trust into Online Experiences,” Communications of the ACM, 43 (12), 57-59.
    Schneier, B. (2001). “Is Disclosing Vulnerabilities A Security Risk In Itself?” Internetweek, 886, 27.
    Schubert, P. and Ginsburg, M. (1999) "Virtual Communities of Transaction: The Role of Personalization in Electronic Commerce," Proceedings of the Twelfth Bled Electronic Commerce Conference, June 7-9, 647-663.
    Science & Technology Law Center (STLC). (2002). “Electronic Commerce on the Internet-Legal Developments in Taiwan,” http://stlc.iii.org.tw/earticles/ EC-JM-U.htm#p6, visited in May 2002.
    Shapiro, A. (1999). The Control Revolution: How the Internet is Putting Individuals in Charge and Changing the World We Know, PublicAffairs.
    Shaw, Paul. (2001). E-Business Privacy and Trust: Planning and Management Strategies, NY: John Wiley & Sons.
    Shaw, R. B. (1997). Trust in the Balance: Building Successful Organizations on Results, Integrity, and Concern, Calif.: Jossey-Bass.
    Shaw, R. B. (1998). “Organizational Integrity,” Executive Excellence, 15(3), 13+.
    Sheehan, K. B. and Hoy, M. G. (2000), “Dimensions of Privacy Concern among Online Consumers,”Journal of Public Policy & Marketing, 19(1), 62-73.
    Shneiderman, B.(2000). “Designing Trust into Online Experiences,” Communications of the ACM, 43(12), 57-59.
    邱顯貴、楊亨利(2000),「以資料發掘經由知識管理建構顧客關係管理模式之研究」,第十一屆全國資訊管理學術研討會,高雄:中山大學。
    Shockley-Zalabak, P., Ellis, K., and Winograd, G. (2000). “Organizational Trust: What It Means, Why It Matters,” Organization Development Journal, 18(4), 35-48.
    Siegel, S. (1956). Nonparametric Statistics – for the Behavioral Sciences, NY: McGraw-Hill.
    Simon, A. and Shaffer, S. (2001). Data Warehousing and Business Intelligence for E-Commerce, CA: Academic Press.
    Simon, H. A. (1960). Administrative Behaviour, NY: Macmillan, 2nd.
    Singh, J. and Sirdeshmukh, D. (2000). “Agency and Trust Mechanisms in Consumer Satisfaction and Loyalty Judgments,” Academy of Marketing Science, 28(1), 150-167.
    Sitkin, S. B. and Roth, N. L. (1993). “Explaining the Limited Effectiveness of Legalistic "Remedies" for Trust/Distrust,” Organization Science, 4(3), 367-392.
    Smeltzer, L. R. (1997). “The Meaning and Origin of Trust in Buyer-Supplier Relationships,”International Journal of Purchasing and Materials, 40-48.
    Smith, H.J., Milberg, S.J., and Burke, S.J. (1996). “Information Privacy: Measuring Individuals' Concerns about Organizational Practices,” MIS Quarterly, 20(2), 167-196.
    Smith, M., Bailey, J., and Brynjolfsson, E. (2000), “Understanding Digital Markets: Review and Assessment,” Erik Brynjolfsson and Brian Kahin, eds, Understanding the Digital Economy, MIT Press, Cambridge, MA.
    Smith, C. (2000). “Virgin's Reputation Gives its E-Activity Instant Credibility,” Marketing, Apr 13, p.19.
    邱顯貴、楊亨利(2002),「電子商務網站信任的重要考量因素之探討」,第三屆電子化企業經營管理理論與實務研討會,彰化:大葉大學。
    Sommerville, Ian. (1992). Software Engineering, 4th ed., Addison-Wesley.
    Stewart, Thomas A. (1997). Intellectual Capital:The New Wealth of Organization. NY:Bantam Donbleday Dell.
    Sultan, F., Urban, G. L., Shankar, V., and Bart, I. (2002), “Determinants and Consequences of Trust in e-Business,” Working Paper, Sloan School of Management, MIT, Cambridge, MA 02142.
    Tan, Y. and Thoen, W. (2001).“Toward a Generic Model of Trust for Electronic Commerce,” International Journal of Electronic Commerce, 5(2), 61-74.
    Taylor, R. G. (1989). “The Role of Trust in Labor-Management Relations,” Organization Development Journal, 7, 85-89.
    Teece, D. J. (1986). “Profiting from Technological Innovation: Implications for Integration, Collaboration, Licensing and Public Policy,” Research Policy, 285-305.
    Trevino, L.K. (1986). “Ethical Decision Making in Organizations: A Person-Situation Interactionist Model,” Academy of Management, 11(3), 601-617.
    Turban, E., McLean, E., and Wetherbe, J. (2002). Information Technology for Management: Making Connection for Strategic Advantage, John Wiley & Sons.
    U.S. Department of Commerce, (2000). http://Web.ita.doc.gov/safeharbor/, May 18.
    Urban, G. L., Sultan, F., and Qualls, W. (2000), “Making Trust the Center of Your Internet Strategy,” Sloan Management Review, Fall (1), 39–48.
    邱顯貴、楊亨利(2003),「電子商務網站值得消費者信任的影響因素」,第五屆資管博士論文研討會,台北:台灣大學。
    Verbeke, W, Ouwerkerk, C., and Peelen, E. (1996).“Exploring the Contextual and Individual Factors on Ethical Decision Making of Salespeople,”Journal of Business Ethics, 15, 1175-1187.
    Wang, H., Lee, M., and Wang, C. (1998).“Consumer Privacy Concerns about Internet Marketing,”Communication of the ACM, 41(3), 63-70.
    Wareham, E. (1999). “Successful E-Commerce Requires Trust of Buyers,” Computing Canada, 25(35), Sep 17, p. 27.
    Warren, S. and Brandies, L. (1890). “The Right to Privacy,” Harvard Law Review, 4, 193-220.
    Webster, F. E. Jr. (1997). “The Future Role of Marketing in the Organization,” in Lehmann, D. R. and Jocz, K. E. (Eds), Reflections on the Futures of Marketing: Practice and Education, MA: Cambridge, 39-66.
    Weiss, E. A. (Ed.) (1991).“Self-Assessment Procedure IX,” Communications of the ACM, 34(2), 102-118.
    Westin, A. (1967). Privacy and Freedom, NY: Atheneum.
    Westing, J. H. (1967). “Some Thoughts on the Nature of Ethics in Marketing,” in R. Moyer (ed.), Changing Marketing Systems, Chicago: American Marketing Association, 161-163.
    Wicker, A. W. (1969). “Attitudes versus Actions: The Relationship of Verbal and Overt Behavioral Responses to Attitude Objects,” Journal of Social Issues, 25, 41-47.
    Whitener, E.M., Brodt, S.E., Korsgaard, M.A., and Werner, J.M. (1998). “Managers as Initiators of Trust: An Exchange Relationship Framework for Understanding Managerial Trustworthy Behavior,” The Academy of Management Review, 23(3), 513-530.
    消基會(1999),「1999 ISP 調查」,http://survey.yam.com/isp99/。
    Wiig, K. M.(1993). Knowledge Management Foundations: How People and Organizations Create, Present, and Use Knowledge, TX: Schema Press.
    Winer, R.S. (2001). “A Framework for Customer Relationship Management,” California Management Review, 43(4), 89-105.
    Wong, Amy and Sohal, Amrik. (2002) “An Examination of the Relationship between Trust, Commitment and Relationship Quality,” International Journal of Retail & Distribution Management, 30(1), 34+.
    Woturba, T. R. (1990).“A Comprehensive Framework for the Analysis of Ethical Behavior, with a Focus on Sales Organizations,” Journal of Personal Selling & Sales Management, X, 29-42.
    Yin, R.(1981).“The Case Crisis: Some Answers,” Administrative Science Quarterly, 26, 58-65.
    Zack, M.H. (1999).“Developing a Knowledge Strategy,”California Management Review, 41(3), 125-145.
    梁定澎(2000),電子商務理論與實務,華泰。
    許文義(2001),個人資料保護法論,台北:三民書局。
    許孟祥(1988),以意向模式研究資訊人員之專業倫理行為,國立中山大學資訊管理研究所博士論文。
    許孟祥、黃貞芬、林東清(1997),「資訊時代中倫理導向之決策制定架構」,第一屆資訊科技與社會轉型研討會。
    郭木興(2001),電子商務理論與技術,□峰。
    黃三榮(1998),「個人資料之保護─兼評我國電腦處理個人資料保護法」,資訊法務透析,38-53。
    黃河明(2000),「由資訊科技觀點看知識管理」,知識管理:方法與系統研討會, http://ceiba.cc.ntu.edu.tw/km/km_conference/ keynote_ speech.htm。
    黃俊英 (1997),行銷管理,台北:華泰。
    楊正宏(2000),電子商務之經營策略,文魁資訊。
    楊亨利、邱顯貴(2001),「台灣地區電子商務隱私權保護之現況探討」,中華管理評論,4(1),101-118。
    葉重新(1999),心理測驗,台北:三民書局。
    熊愛卿(2000),網際網戶個人資料保護之研究,國立台灣大學法律學研究所博士論文。
    劉江彬(1988),資訊法論,二版,國立台灣大學法律叢書編輯委員會,台北:三民書局。
    鄭錫鍇(2001),「知識管理對政府部門人力資源管理之影響分析」,國政研究報告憲政(研)090-010號,財團法人國家政策研究基金會,http://www.npf.org.tw/publication/cl/090/cl-r-090-010.htm。
    盧希鵬(2001),E-Oscar 優質網站評估模式,網通國際。
    盧希鵬、蔡宗霖(2001),「探討消費者採用網路購物意願之影響因素」,台灣區網際網路研討會暨網路學習與繼續教育國際會議。
    盧蓓恩譯(1996),人際溝通─目標本位取向(Conary, D. and Cody, M. 1994. Interpersonal Communication: A Goals-Based Approach, St. Martin’s Press.),台北:五南。
    英文部分
    Afuah, A. and Tucci, C.L. (2002). Internet Business Models and Strategies: Text and Cases, 2nd, McGraw-Hill.
    Amit, R. and Schoemaker, P.J. (1993). “ Strategic Asset and Organization Rent,” Strategic Management Journal, 14, 33-46.
    Ajzen, I. (1985). From Intention to Actions: A Theory of Planned Behavior, in J. Kuhl and J. Beckman (Eds.), Action Control: From Cognition to Behavior, NY: Springer-Verlag.
    Ajzen, I. (1988). Attitudes, Personality and Behavior. Milton Keynes: Open University Press.
    Ajzen, I. (1991). “The Theory of Planned Behavior,” Organizational Behavior and Human Decision Processes, 50, 179-211.
    Anderson, M.N. and Morrow, M. (1997). “ Organization Capability: Creating Simplicity and Focus in Business Life,” Organization Development Journal, 15(1), 77.
    Applegate, L. M., McFarlan, F. W., and McKenney J. L. (1999). Corporate Information Systems Management: Text and Cases, 5th ed., Irwin/McGraw-Hill.
    Armstrong, A. and Hagel, J. (1996) "The Real Value of On-Line Communities," Harvard Business Review, 74 (May-June), 134-141.
    Bachmann, R. (2001). “Trust, Power and Control in Trans-Organization Relations,” Organization Studies, 22(2), 337-.
    Baier, A. (1986). “Trust and Antitrust,” Ethics, 96, 231-260.
    Bandura, A. (1986). Social Foundations of Thought and Action, NJ: Prentice Hall.
    Banerjee, D., Cronan, T. P., and Jones, T. W. (1998). “Modeling IT Ethics: A Studying in Situational Ethics,”MIS Quarterly, 31-60.
    Banisar, D. (2000). “Privacy & Human Rights 2000,” http://www.privacyinternational.org/survey/index2000.html.
    Barber, B. (1983). The Logic and Limits of Trust, New Brunswick, NJ: Rutgers University Press.
    Barlow, J. P. (1994).“The Economy of Ideas,”http://www.wired.com/archive.
    Barney, J. (1991). “Firm Resources and Sustained Competitive Advantage,” Journal of Management, 17, 99-120.
    Barney, J. and Hansen, M. (1994). “Trustworthiness as a source of competitive advantage,” Strategic Management Journal, 15(Winter Special Issue), 175-190.
    Baumhart, R.C. (1961). “How Ethical are Businessmen?” Harvard Business Review, 39(July-August), 156-176.
    Bhattacherjee, A. (2002). “Individual Trust in Online Firms: Scale Development and Initial Test,” Journal of Management Information Systems, 19(1), 211-241.
    Biggs, M. (2000). “Web Privacy Standard P3P Takes Steps to Address Concerns of Business, Consumers,”InfoWorld, 22, p.49.
    Blakeney, R. N. (1986) “A Transactional View of the Role of Trust in Organizational Communication,” Transactional Analysis Journal, 16, 95-98.
    Bommer, M., Gratto, C., Gravander, J., and Tuttle, M. (1987). “A Behavior Model Ethical and Unethical Decision Making,” Journal of Business Ethics, 265-280.
    Bonoma, T. V. (1976). “Conflict, Cooperation, and Trust in Three Power Systems,” Behavioral Science, 21(6), 499-514.
    Boss, R. W. (1978). “Trust and Managerial Problem Solving Revisited,” Group and Organization Studies, 3, 331-342.
    Boyle, R. and Bonacich, P. (1970). “The Development of Trust and Mistrust in Mixed-Motive Games,” Sociometry, 33, 123-139.
    Brin, D. (1998). The Transparent Society: Will Technology Focus Us to Choose between Privacy and Freedom, Addison-Wesley.
    Bruce, W. (1994). “Ethical People are Productive People,” Public Productivity & Management Review, 17(3), 241-253.
    Butler, J. K. (1983). “Reciprocity of Trust between Professionals and their Secretaries,” Psychological Report, 53, 411-416.
    Butler, J. K., and Cantrell, R. S. (1984). “A Behavioral Decision Theory Approach to Modeling Dyadic Trust in Superiors and Subordinates,”Psychological Reports, 55, 19-28.
    Butler, J. K. (1991).“Toward Understanding and Measuring Conditions of Trust: Evolution of a Conditions of Trust Inventory,”Journal of Management, 17, 643-663.
    Charters, D. (2002). “Electronic Monitoring and Privacy Issues in Business-Marketing: The Ethics of the DoubleClick Experience,” Journal of Business Ethics, 35(4), 243-254.
    Cheskin Research and Studio Archetype/Sapient Report (1999). “E-commerce Trust Study,” http://www.sapient.com/cheskin.
    Chiles, T. H. and McMackin, J. F. (1996). “Integrating Variable Risk Preferences, Trust and Transaction Cost Economics,” Academy of Management Journal, 21(1), 73-99.
    Chiu, H.-K. and Yang, H.-L. (2003). “Knowledge Capital Accumulation and Value Creation: Based on Learning and Relationship Network Theories,” Journal of Cyber Culture and Information Society, 4, 19-52.
    Cho, H. and LaRose, R. (1999). “Privacy Issues in Internet Surveys,” Social Science Computer Review, 17(4), 421-434.
    Chwelos, P., Benbasat, I., and Dexter, A.S. (2001). “Research Report: Empirical Test of an EDI Adoption Model," Information System Research, Sept.
    Clarke, R (1999a). “Introduction to Dataveillance and Information Privacy and Definitions of Terms.” http://www.anu.edu.au/people/Roger.Clarke/DV /Intro.html.
    Clarke, R. (1999b). “Internet Privacy Concerns Confirm the Case for Intervention,” Communication of the ACM, 42, 60-67.
    Cohen, D. and Prusak, L. (2000). In Good Company: How Social Capital Makes Organizational Work, Harvard Business School Press.
    Coleman, J.S.(1990). Foundations of Social Theory, Cambridge, Mass.: Harvard University Press.
    Cook, J., and Wall, T. (1980).“New Work Attitude Measures of Trust, Organizational Commitment, and Personal Need Nonfulfillment,”Journal of Occupational Psycholo, 53, 39-52.
    Cozby, P. C. (1973). “Self-Disclosure: A Literature Review,”Psychological Bulletin, 79, 73-91.
    Croteau, Anne-Marie and Li, Peter. (2003). “Critical Success Factors of CRM Technological Initiatives,” Canadian Journal of Administrative Sciences, 20(1), 21-34.
    Culnan, M. (1999a). “Georgetown Internet Privacy Policy Survey: Report to the Federal Trade Commission,” http://www.epic.org/privacy/.
    Culnan, M. (1999b).“Privacy and the Top 100 Web Sites: Report to the Federal Trade Commission,” http://www.epic.org/privacy/.
    Culnan, M. (2000). “Protecting Privacy Online: Is Self-Regulation Working?” Journal of Public Policy & Marketing; 19(1), 20-26.
    Dayal, S., Landesberg, H., and Zeisser, M. (1999).“How to Build Trust Online,”Marketing Management, 8(3), 64-69.
    Delgado-Ballester, E. and Munuera-Aleman, J. L. (2001). “Brand Trust in the Context of Consumer Loyalty,” European Journal of Marketing, 35(11-12), 1238-1258.
    Derlega, V., Metts, S., Petronio, S., and Margulis, S. (1993). Self-Disclosure, CA: Sage.
    Deutsch, M. (1960)“The Effect of Motivational Orientation upon Trust and Suspicion,”Human Relations, 13, 123-140.
    Doney, P.M. and Cannon, J.P. (1997). “An Examination of the Nature of Trust in Buyer-Seller Relationships,” Journal of Marketing, 61(2), 35-51.
    Driscoll, J. W. (1978). “Trust and Participation in Organizational Decision Making as Predictors of Satisfaction,” Academy of Management Journal, 21, 44-56.
    Duff, W. M., Smieliauskas, W., and Yoos, H. (2001). “Protecting Privacy,”Information Management Journal, 35(2), 14-30.
    Dunn, M. H. (1988). “Trust and Political Agency,” in D.Gambetta (Ed.), Trust: Making and Breaking Cooperative Relations, 73-93. New York: Blackwell.
    Dwyer, F.R., Schurr, P.H., and Oh, S. (1987). “Developing Buyer-Seller Relationships,” Journal of Marketing, 51,11-27.
    Earle, T.C. and Cvetkovice, G.T. (1995). Social Trust: Toward a Cosmopolitan, CT: Praeger Publishers.
    Egan, J. (2001). Relationship Marketing: Exploring Relational Strategies in Marketing, Pearson Education.
    Description: 博士
    國立政治大學
    資訊管理研究所
    87356504
    91
    Source URI: http://thesis.lib.nccu.edu.tw/record/#G0087356504
    Data Type: thesis
    Appears in Collections:[資訊管理學系] 學位論文

    Files in This Item:

    File SizeFormat
    index.html0KbHTML102View/Open


    All items in 政大典藏 are protected by copyright, with all rights reserved.


    社群 sharing

    著作權政策宣告
    1.本網站之數位內容為國立政治大學所收錄之機構典藏,無償提供學術研究與公眾教育等公益性使用,惟仍請適度,合理使用本網站之內容,以尊重著作權人之權益。商業上之利用,則請先取得著作權人之授權。
    2.本網站之製作,已盡力防止侵害著作權人之權益,如仍發現本網站之數位內容有侵害著作權人權益情事者,請權利人通知本網站維護人員(nccur@nccu.edu.tw),維護人員將立即採取移除該數位著作等補救措施。
    DSpace Software Copyright © 2002-2004  MIT &  Hewlett-Packard  /   Enhanced by   NTU Library IR team Copyright ©   - Feedback