Publications-Theses

Article View/Open

Publication Export

Google ScholarTM

NCCU Library

Citation Infomation

Related Publications in TAIR

題名 電子商務網站信任管理之研究
The Study of E-Commerce Trust Management
作者 邱顯貴
Chiu, Hsien-Kuei
貢獻者 楊亨利
Yang, Heng-Li
邱顯貴
Chiu, Hsien-Kuei
關鍵詞 電子商務
網站
信任
值得信任
準備就緒
商業經營模式
e-commerce
website
trust
trustworthiness
readiness
business model
日期 2002
上傳時間 14-Sep-2009 09:08:46 (UTC+8)
摘要 本研究係提出一個能夠讓企業經營的購物網站值得消費者信任之管理模式,以期幫助業者在提昇網站信任方面,有具體的目標和施力點。該模式包括兩個主要的部分:(1)網站值得信任的構成因素和(2)促成網站值得信任的管理措施。有關前者部分,本研究建構網站信任的架構和各因素重要性的排序,並轉成量表和對量表的驗證。後者在探討促成業者建立網站信任的顯著影響因素,以及業者和消費者在此方面表現的認知差距之分析。此外本研究也實際將量表分別應用在網站信任對個人資訊揭露意願的影響,和購物經驗對網站信任之影響的驗證。
     
      在研究的流程上,首先以消費者為導向,探討網站值得信任的架構和重要組成。接著由業者評量自己的網站在此方面的表現,同時也指出影響該表現的各因素之強烈程度。然後,再回到消費者本身,進一步逐一評量該網站的實際情況,以作為本研究探討業者與消費者之間認知落差的情形。
     
      本研究結果指出,網站值得消費者信任的主要因素可分為能力、正直和關係三個維度,十三個總指標,和五十三個細目指標。對業者的實證結果顯示,會顯著地促成網站業者在「網站信任」有較佳表現的因素,並不是感知的利益或感知的外在壓力,而是該網站是否一切準備就緒,尤其是在教育訓練與管理結構的支持、資訊科技資源、以及線上認證的配合等方面。另外,商業經營模式也是促成的重要因素,尤其是業者對網站的重要程度越高,又懂得虛擬社群的經營,那麼將更助於網站信任的展現。
     
      在本研究中並指出線上業者和消費者在認知上落差之所在和其主要原因。為有效管理網站和促使網站值得信任,業者需真正地以消費者為導向,建立和妥善運用所需的資源和能力(如:教育訓練和管理結構的支持、資訊科技資源),以提升消費者的信任。
     
      此外,本研究確認了網站信任對提供個人資訊意願的正向影響,以及線上購物經驗對網站信任的助益。最後,本研究並對各階段成果說明策略意涵,也結合顧客關係管理觀念,提供業者信任管理的參考模式和網站信任的自我檢核參考表,期望有助於業者對網站信任,有較綜合性的瞭解和經營上的幫助。
This paper presents an EC-trust management model based on a series of empirical studies, in order to help website managers to develop or enhance their website trustworthiness. This model consists of (1) the website trust/trustworthiness structure and its components, and (2) the managerial measures to support the development or enhancement of the trustworthiness. The latter also includes (1) the organizational readiness and business model for the trustworthiness, (2) the gap analysis that helps finding out the differences in the trustworthiness perceptions between website managers and consumers, and (3) the potential trust accumulation via the continuously better online experiences.
     
      The paper conducts a four-phase research. At first, the website trustworthiness structure and its evaluation form are constructed and validated. Then, out of 476 shopping websites, 100 managers use the form to evaluate their website trustworthiness, and also fill in the questionnaire that measures their perceptions of the factors (e.g. organizational readiness and business model) influencing their website trustworthiness performances. In the third phase, 128 consumers are asked to use the same form to perceive and evaluate those websites’ trustworthiness performance, in order to measure the correlations and the gaps between the managers’ and consumers’ perceptions. Besides, the effect of trust on the willingness of personal information disclosure is also tested in this phase. Finally, in the fourth phase, this research adopts a multiple case study strategy to find out the reasons for the significant gaps identified in the third phase, and, practically, works with a case company to find out the effect of the online-shopping experience on trust in the website.
     
      The result shows that the website trustworthiness involves three latent factors (i.e., competence, integrity, and relation), which consist of 13 elements, and a total of 53 detailed items. The website trust/trustworthiness performance is significantly affected by their website readiness (i.e., E & T and managerial structure, IT resources, financial resources, and seal-program preparation), the perceived website importance, as well as the perceived community importance. Meanwhile, the results also show that the gaps of perceptions between website managers and consumers do exist. Therefore, to effectively enhance their website trustworthiness, they should be really consumer-oriented and improve their performance according to the gap analysis.
     
      Besides, there are another two exciting findings in this paper. The effect of trust on the willingness of personal-information disclosure is validated. The significant effect of shopping experiences on trust suggests that the website managers should promote customers’ online experiences to enhance their trust in the websites.
參考文獻 中文部分
尤克強(1997),「資訊管理個案研究方法評論」,資訊管理學報,4(1),18-20。
方世榮譯(2002),關係行銷,台北:五南。
王毓良(1999),倫理氣候與資訊倫理的關聯性之研究─以高科技業及金融業為研究對象,靜宜大學企業管理研究所碩士論文。
余千智等合著(2002),電子商務總論,二版,台北:智勝。
吳思華(1993),策略九說─總論:策略管理的內涵,世界經理文摘。
吳思華(1998),策略九說:策略思考的本質,臺北:臉譜文化。
吳思華、黃宛華、賴鈺晶(1999),「智慧資本衡量因素之研究─以我國軟體業為例」,中華民國科技管理研討會論文集(三),591-604。
吳琮璠、謝清佳(2003),資訊管理理論與實務,台北:智勝。
李東峰、林子銘(2002),「資訊主管對企業資訊安全之風險控管決策」,資訊管理研究,資訊安全專刊,4(2),1-42。
李東峰、林子銘、余春達(2001),「不確定環境下倫理決策行為之研究:以資訊隱私權為例」,第七屆資訊管理研究暨實務研討會,台北:景文技術學院。
Eggar, F. (2002). “Consumer Trust in E-Commerce: From Psychology to Interaction Design,” in Prins et al. (Eds.), Trust in Electronic Commerce: The Role of Trust from a Legal, an Organizational and a Technical Point of View, Kluwer Law International.
Eining .M. M. and Christensen, A. L. (1991). “A Psycho-Social Model of Software Piracy: the Development and Test of a Model,” in Ethical Issues in Information Systems, R. Dejoie, G. Fowler and D. Paradice (Eds.), Boyd and Fraser, Boston.
Farnham, A. (1989). “The trust Gap,” Fortune, Dec. 4, 56-78.
Farris, G., Senner, E., and Butterfield, D. (1973). “Trust, Culture, and Organizational Behavior,” Industrial Relations, 12, 144-157.
Federal Trade Commission (FTC). (May 2000). “Privacy Online: Fair Information Practices In The Electronic Marketplace,” A Federal Trade Commission Report To Congress.
Federal Trade Commission (FTC). (July 1999).“Self-Regulation and Privacy Online,”A Federal Trade Commission Report to. Congress.
Federal Trade Commission (FTC), (2000). “Privacy Online: Fair Information Practices In The Electronic Marketplace,” A Federal Trade Commission Report To Congress.
Ferrell, O. C. and Gresham, L. G. (1985).“A Contingency Framework for Understanding Ethical Decision Making in Marketing,”Journal of Marketing, 49, 87-97.
Fishbein, M. and Ajzen, I. (1975) Belief, Attitude, Intention and Behavior: An Introduction to Theory and Research, MA: Addison-Wesley.
Fogg, B.J. et al. (2001). “What Makes Web Sites Credible? A Report on a Large Quantitative Study,” ACM SIGCHI, 3 (1), 61-67.
李漢雄、郭書齊(1997),「提升競爭優勢的人力資源策略:談創新力發展與創新活度導入」,1997中華民國科技管理研討,367-378。
Foxman, E.R. and Kilcoyne, P. (1993). “Information Technology, Marketing Practice, and Consumer Privacy: Ethical Issues,” Journal of Public Policy & Marketing, 12(1), 106-119.
Fritzsche, David J. (1991). “A Model of Decision-Making Incorporating Ethical Values,” Journal of Business Ethics, 10, 841-852.
Frost, T., Stimpson, D. V., and Maughan, M. R. C. (1978). “Some Correlates of Trust,” Journal of Psychology, 99, 103-108.
Fuller, S.R. and Aldag, R.J. (2001). “The GGPS Model: Broadening the Perceptive on Group Problem Solving,” in M. Turner (Ed.), Groups at Work: Theory and Research, 3-24.
Gabarro, J. J. (1978). “The Development of Trust, Influence, and Expectations,” in A. G. Athos and J. J. Gabarro (Eds.), Interpersonal Behavior: Communication and Understanding in Relationship, 290-303. Englewood Cliffs, NJ: Prentice-Hall.
Gaines, J. H. (1980). “Upward Communication in Industry: An Experiment,” Human Relations, 33, 929-942.
Ganesan, S. (1994). “Determinants of Long-Term Orientation in Buyer-Seller Relationships,” Journal of Marketing, 58(2), 1-19.
Garbarino, E. and Johnson, M. (1999). “The Different Roles of Satisfaction, Trust and Commitment in Customer Relationships,” Journal of Marketing, 63(April), 70-87.
Gefen, D. (2000). “E-Commerce: The Role of Familiarity and Trust,” Omega, 28(6), 725-737.
Gefen, D. (2002). “Reflections on the Dimensions of Trust and Trustworthiness among Online Consumers,” Database for Advances in Information Systems, 33(3), 38-53.
汪智揚(1999),風險性結局下的資訊倫理決策—倫理決策理論與理性行為理論之比較,國立中央大學資訊管理研究所碩士論文。
Gefen, D. (2003). “Trust and TAM in Online Shopping: An Integrated Model,” MIS Quarterly, 27(1), 51-90.
Giffin, K. (1967). “The Contribution of Studies of Source Credibility to a Theory of Interpersonal Trust in the Communication Process,” Psychological Bulletin, 68(2), 104-120.
Givens, B. (1997). “A Review of State and Federal Privacy Laws,” http://www.privacyrights.org/ar/jttaskap.htm.
Govier, T. (1997). Social Trust and Human Communities, McGill-Queen’s University Press.
Greenleaf, G.(1998). “Global Protection of Privacy in Cyberspace - Implications for the Asia-Pacific,” http://austlii.edu.au/itlaw/articles/TaiwanSTLC.html.
Hanson, W. (2000). Principles of Internet Marketing, South-Western College Publishing.
Hardin, R. (1940). Trust and Trustworthiness, NY: Russell Sage Foundation.
Harrison, D.A., Mykytyn, P.P. Jr., and Riemenschneider, C.K. (1997). "Executive Decisions About Adoption of Information Technology in Small Business: Theory and Empirical Tests," Information Systems Research, 8(2), 171-195.
Heimovics, R. D. (1984). “Trust and Influence in an Ambiguous Group Setting,” Small Group Behavior, 15, 545-552.
Hicks, W. (2001). “Cyber-Risk Meets Corporate Governance- I ,” Directorship, 1-3.
周文賢(2002),多變量統計分析:SAS/STAT 使用方法,台北:智勝文化。
Hoffman, D. L., Novak, T. P., and Peralta, M. (1999). “Building Consumer Trust Online,” Communications of the ACM, 42 (4), 80-85.
Holmes, J. G. (1991). “Trust and the Appraisal Process in Close Relationships,” in Jones, W. H. and Perlman, D. (Eds.), Advances in Personal Relationships, 2, 57-104. London: Jessica Kingsley.
Hunt, K. (1996). “Establishing a Presence on the World Wide Web: A Rhetorical Approach,” Technical Communication, 43(4), 376-387.
Hunt, S. D. and Vitell, S. (1986). “A General Theory of Marketing Ethics,” Journal of Macromarketing, Spring, 5-16.
Iacovou C. L., Benbasat, I., and Dexter, A. S.(1995). “Electronic Data Interchange and Small Organizations: Adoption and Impact of Technology,” MIS Quarterly, 19(4), 465-85.
Igbaria, M., Zinatelli, N., Cragg, P., and Cavaye, A. (1997). "Personal Computing Acceptance Factors in Small Firms: A Structural Equation Model," MIS Quarterly, Sept., 279-305.
Jarvenpaa, S. L., Knoll, K., and Leidner. D. E. (1998). “Is Anybody Out There? Antecedents of Trust in Global Virtual Teams,”Journal of Management Information Systems, 14(4), 29-64.
Jarvenpaa, S. L., Tractinsky, J., and Saarinen, L. (1999). “Consumer Trust in an Internet Store: A Cross-Cultural Validation,” Journal of Computer Mediated Communication, 5 (2), http://www.asusc.org/jcmc/vol5/issue2.
Jarvenpaa, S. L., Tractinsky, J., and Vitale, M. (2000). “Consumer Trust in an Internet Store,” Information Technology and Management, 1 (1-2), 45-71.
Johnson-George, C. and Swap, W. C. (1982). “Measurement of Specific Interpersonal Trust: Construction and Validation of a Scale to Assess Trust in a Specific Other,” Journal of Personality and Social Psychology, 43(6), 1306-1317.
林子銘、李東峰、連俊瑋(2002),「台灣人在不確定性環境下倫理決策行為研究」,資訊管理研究,4(3),163-204.
Jone, G.R. and George, J.M. (1998).“The Experience and Evolution of Trust: Implication for Cooperation and Teamwork,”Academy of Management Review, 531-546.
Jones, S., Wilikens, M., Morris, P., and Masera, M. (2000).“Trust Requirements in e-Business,”Communications of the ACM, 43(12), 81-87.
Kallman, E. A. and Grillo, J. P. (1996). Ethical Decision Making and Information Technology, 2nd ed., McGgraw-Hill.
Kasperson, R.E., Golding, D., and Tuler, S. (1992), “Social Distrust as a Factor in Siting Hazardous Facilities and Communicating Risks,” Journal of Social Issues, 48(4), 161-187.
Katerattanakul, Pairin. (2002). “Framework of Effective Web Site Design for Business-To-Consumer Internet Commerce,” INFOR, 40(1), 57-70.
Kee, H.W. and Knox, R.E. (1970).“Conceptual and Methodological Considerations in the Study of Trust and Suspicion,”Journal of Conflict Resolution, 14, 357-366.
Kelly, C. M. (1987). “The Interrelationship of Ethics and Power in Today’s Organizations,” Organizational Dynamics, 16(Summer), 5-18.
Kemp, Ted (2000), “A Matter of Trust - B2Cs Seek Credibility,”Internetweek, 830, 1 & 16.
Kettinger, W., Grover, V., Guha, S., and Segars, A. (1994). “Strategic Information Systems Revisited: A Study in Sustainability and Performance,” MIS Quarterly, 18(1), 31-58.
Kettinger, W.J. and Hackbarth, G. (1997). “Selling in the Era of the Net: Integration of Electronic Commerce in Small Firms” Proceedings of the 18 International Conference on Information Systems, Atlanta, 249-262.
林子銘、梁昇凱、汪智揚(1999),「以社會交換理論探討個人對資訊隱私權的認知」,第十屆國際資訊管理學術研討會,台北:警察大學。
Killingsworth, S. (1999). “Mining Your Own Business: Privacy Policy in Principle and in Practice,” Journal of Internet Law, October, 1-18.
Kimery, K. and M. McCord. (2002). “Third-Party Assurances: Mapping the Road to Trust in E-retailing,” The Journal of Information Technology Theory and Application (JITTA), 4(2), 63-82.
Kohlberg, L. (1976). “Moral Stages and Moralization: the Cognitive-Developmental Approach,” in T. Lickona (Ed.), Moral Development and Behavior: Theory, Research, and Social Issues, 34-35, NY: Holt, Rinehart & Winston.
Koller, M. (1988). “Risk as a Determinant of Trust,” Basic and Applied Social Psychology, 9(4), 265-276.
Kotler, P. (1991). Marketing Management: Analysis, Planning, Implementation, and Control, 7th, NJ: Prentice-Hall.
Kramer, L.C. (2002). “Private Eyes Are Watching You: Consumer Online Privacy Protection-Lessons from Home and Abroad,” Texas International Law Journal, 37(2), 387-420.
Kreie, J. and Timothy, P. C. (1998).“How Men and Woman View Ethics,” Communication of the ACM, 41(September), 70-76.
Krüge, C. (1982).“Right of Privacy, Right of Personality and Commercial Advertising,” International Review of Industrial Property and Copyright Law, 13, p.183.
Kruglanski, A.W. (1970). “Attributing Trustworthiness in Supervisor-Worker Relations,” Journal of Experimental Psychology, 6, 214-232.
Kuo, Feng-Yang and Hsu, Meng-Hsiang, (2001). “Development and Validation of Ethical Computer Self-Efficacy Measure: The Case of Softlifting,” Journal of Business Ethics, 32(4), 299-315.
林水波(1999),組織理論,台北:智勝。
Larzelere, R., and Huston, T. (1980). “The Dyadic Trust Scale: Toward Understanding Interpersonal Trust in Close Relationships,” Journal of Marriage and the Family, 42, 595-604.
Lau, T., Etzioni, O. and Weld, D. (1999).“Privacy Interfaces for Information Management,”Communication of the ACM, 42, 88-94.
Leana, C.R. and van Buren, H.J. III. (1999). “Organizational Social Capital and Employment Practices,” Academy of Management Review, 24, 538-555.
Lederer, A.L., Mirchandani, D.A., and Sims, K. (1997).“The Link Between Information Strategy and Electronic Commerce,” Journal of Organizational Computing and Electronic Commerce, 7(1), 1997, 17-34.
Lee, K.O. and Turban, E. (2001). “A Trust Model for Consumer Internet Shopping,” International Journal of Electronic Commerce, 6(1), 75-91.
Lewis, J. D., and Weigert, A. (1985). “Trust as a Social Reality,” Social Forces, 63, 967-985.
Luhmann, N. (1988). “Familiarity, Confidence, Trust: Problems and Alternatives,” in D. Gambetta (Ed.), Trust: Making and Breaking Cooperative Relations, Basil Blakwell.
Magouirk, J. (2001). “Partners in Privacy,” Intelligent Enterprise, 4(14), Sep 18, 28-32.
Mason, R. O. (1986).“Four Ethical Issues of the Information Age,”MIS Quarterly, 10(1), 5-12.
Mayer, R.C., Davis, J.H., and Schoorman, F.D. (1995). “An Integrative Model of Organizational Trust”Academy of Management Review, 20(3), 709-734.
林東清(2002),資訊管理:e化企業的核心競爭能力,台北:智勝文化。
McAllister, Daniel J. (1995). “Affect- and Cognition-based Trust as Foundations for Interpersonal Cooperation in Organizations,” Academy of Management Journal, Feb, 38(1), 24-59.
McCarthy, T. (2000), The Rights of Publicity and Privacy, (1st Edition, 1987), 2nd Edition, NY: Clark Boardman Callaghan.
McFall, L. (1987),“Integrity,”Ethics, 98, 5-20.
McKim, R.(1999). “Information: The Newest Currency;” Target Marketing, 22(7), 36-38.
McKnight, D.H. and Chervany, N.L. (2001). “Trust and Distrust Definitions: One Bite at a Time,” in R. Falcone, M. Singh and Y.-H. Tan (Eds.): Trust in Cyber-Societies, LNAI 2246, 27-54, Springer-Verlag Berlin Heidelberg.
Microsoft, (1999). Summary of Global Internet Legal Developments─from the Period Oct. to Dec. 1999, Microsoft.
Miller, S. and Weckert, J. (2000).“Privacy, the Workplace and the Internet,” Journal of Nusiness Ethics, 28, 255-265.
Mishra, A. K. (1996).“Organizational Responses to Crisis: The Centrality of Trust,” in R. M. Kramer and T. R. Tyler (Eds.), Trust in Organizations: Frontiers of Theory and Research, 261-287, Thousand Oaks, CA: Sage.
Morgan, R.M. and Hunt, S.D. (1994). “ The Commitment-Trust Theory of Relationship Marketing,” Journal of Marketing, 58(3), 20-38.
Nimmer, M. (1954). “The Right of Publicity,”Law and Contemporary Problems, 19, p. 203.
林東清(2002),「顧客關係管理(CRM)研究的一些相關理論模式與重要議題」,資訊管理學報,9(專刊期),31-56。
Olson, J. M., and Zanna, M. P. (1993). “Attitudes and Attitude Change,” Annual Review of Psychology, 44, 117-154.
Palmer, J., Bailey, J. P., and Faraj, S. (2000). “The Role of Intermediaries in the Development of Trust on the WWW: The Use and Prominence of Trusted Third Parties and Privacy Statements,” Journal of Computer Mediated Communication, 5 (3).
Papadopoulou, P., Andreou, A., Kanellis, P., and Martakos, D. (2001). “Trust and Relationship Building in Electronic Commerce,” Internet Research: Electronic Networking Applications and Policy, 11(4), 322-332.
Parasuraman, A. Zeithaml, V.A., and Berry, L.L. (1985). “A conceptual Model of Service Quality and Its Implications for Future Research,” Journal of Marketing, Fall, 44.
Parker, D., Swope, S., and Baker, B. (1990). Ethical Conflicts in Information and Computer Science, Technology, and Business, Wellesley, MA: QED Information Sciences.
Pinckaers, J. (1996). From Privacy toward a New Intellectual Property Right in Persona, MA: Kluwer Law International.
Powell, W.W. (1990). Neither Maker nor Hierarchy: Network Forms of Organization,” Research in Organizational Behavior, 12, 295-336.
Pressey, A.D. and Mathew, B.P. (1998). “Relationship Marketing and Retailing: Comfortable Bedfellow?” Customer Relationship Management, 1(1), 39-53.
Prosser, W. (1960). “Privacy,” California Law Review, 48 (January), 383-423.
Putnam, R.D. (1993). Making Democracy Work: Civil Traditions in Morden Italy, Princeton: Princeton University Press.
邱顯貴(1999),「資訊存取之隱私問題在倫理學與科技法律層面之探討」,企業倫理與永續發展研討會,中壢:中央大學,188-206。
Radcliff, D. (1998). “Is your ISP secure?” InfoWorld, Mar 2.
Rainnone, S., Sipior, J., and Ward, B. (1998).“Ethical Management of Employee E-mail Privacy, Information Strategy,”The Executive’s Journal, Spring, 34-41.
Ramaswani, S.N., Srinivasan, S.S., and Gorton, S.A. (1997). "Information Asymmetry Between Salesperson and Supervisor: Postulates from Agency and Social Exchange Theory," Journal of Personal Selling & Sales Management, 17(3), 29-50.
Rawlins, W. K. (1983).“Openness as Problematic in Ongoing Friendships: Two Conversational Dilemmas,”Communication Monographs, 50, 1-13.
Renn, O. and Levine, D. (1991). “Credibility and Trust in Risk Communication,” in R.E. Kasperson and P.M. Stallen (Eds.), Communicating Risks to the Public: International Perspectives, Amsterdam: Kluwer.
Reynolds, Larry (1997). The Trust Effect: Creating the High Trust, High Performance Organization, CA: Nicholas Brealey Publishing.
Roos, G., Roos, J., Edvinsson, L., and Dragonetti, N.C. (1998). Intellectual Capital: Navigating in the New Business Landscape, NY: New York University Press.
Rousseau, D. M., Sitkin, S. B., Burt, R. S., and Camerer, C. (1998). “Not So Different After All: A Cross-Discipline View of Trust,”The Academy of Management Review, 23(3), 393-404.
Sabatelli, R.M., Buck, R., and Dreyer, A. (1983). “Locus of Control, Interpersonal Trust and Nonverbal Communication Accuracy,” Journal of Personality and Social Psychology, 44, 399-409.
Schlenker, B., Helm, B., and Tedeschi, J. (1973). “The Effects of Personality and Situational Variables on Behavioral Trust,” Journal of Personality and Social Psychology, 25, 419-427.
邱顯貴、傅素芬(2002),「透過合作以創造價值:一個分析模式與個案研究」,商業職業教育季刊,84期,15-25。
Schneiderman, B. (2000). “Designing Trust into Online Experiences,” Communications of the ACM, 43 (12), 57-59.
Schneier, B. (2001). “Is Disclosing Vulnerabilities A Security Risk In Itself?” Internetweek, 886, 27.
Schubert, P. and Ginsburg, M. (1999) "Virtual Communities of Transaction: The Role of Personalization in Electronic Commerce," Proceedings of the Twelfth Bled Electronic Commerce Conference, June 7-9, 647-663.
Science & Technology Law Center (STLC). (2002). “Electronic Commerce on the Internet-Legal Developments in Taiwan,” http://stlc.iii.org.tw/earticles/ EC-JM-U.htm#p6, visited in May 2002.
Shapiro, A. (1999). The Control Revolution: How the Internet is Putting Individuals in Charge and Changing the World We Know, PublicAffairs.
Shaw, Paul. (2001). E-Business Privacy and Trust: Planning and Management Strategies, NY: John Wiley & Sons.
Shaw, R. B. (1997). Trust in the Balance: Building Successful Organizations on Results, Integrity, and Concern, Calif.: Jossey-Bass.
Shaw, R. B. (1998). “Organizational Integrity,” Executive Excellence, 15(3), 13+.
Sheehan, K. B. and Hoy, M. G. (2000), “Dimensions of Privacy Concern among Online Consumers,”Journal of Public Policy & Marketing, 19(1), 62-73.
Shneiderman, B.(2000). “Designing Trust into Online Experiences,” Communications of the ACM, 43(12), 57-59.
邱顯貴、楊亨利(2000),「以資料發掘經由知識管理建構顧客關係管理模式之研究」,第十一屆全國資訊管理學術研討會,高雄:中山大學。
Shockley-Zalabak, P., Ellis, K., and Winograd, G. (2000). “Organizational Trust: What It Means, Why It Matters,” Organization Development Journal, 18(4), 35-48.
Siegel, S. (1956). Nonparametric Statistics – for the Behavioral Sciences, NY: McGraw-Hill.
Simon, A. and Shaffer, S. (2001). Data Warehousing and Business Intelligence for E-Commerce, CA: Academic Press.
Simon, H. A. (1960). Administrative Behaviour, NY: Macmillan, 2nd.
Singh, J. and Sirdeshmukh, D. (2000). “Agency and Trust Mechanisms in Consumer Satisfaction and Loyalty Judgments,” Academy of Marketing Science, 28(1), 150-167.
Sitkin, S. B. and Roth, N. L. (1993). “Explaining the Limited Effectiveness of Legalistic "Remedies" for Trust/Distrust,” Organization Science, 4(3), 367-392.
Smeltzer, L. R. (1997). “The Meaning and Origin of Trust in Buyer-Supplier Relationships,”International Journal of Purchasing and Materials, 40-48.
Smith, H.J., Milberg, S.J., and Burke, S.J. (1996). “Information Privacy: Measuring Individuals` Concerns about Organizational Practices,” MIS Quarterly, 20(2), 167-196.
Smith, M., Bailey, J., and Brynjolfsson, E. (2000), “Understanding Digital Markets: Review and Assessment,” Erik Brynjolfsson and Brian Kahin, eds, Understanding the Digital Economy, MIT Press, Cambridge, MA.
Smith, C. (2000). “Virgin`s Reputation Gives its E-Activity Instant Credibility,” Marketing, Apr 13, p.19.
邱顯貴、楊亨利(2002),「電子商務網站信任的重要考量因素之探討」,第三屆電子化企業經營管理理論與實務研討會,彰化:大葉大學。
Sommerville, Ian. (1992). Software Engineering, 4th ed., Addison-Wesley.
Stewart, Thomas A. (1997). Intellectual Capital:The New Wealth of Organization. NY:Bantam Donbleday Dell.
Sultan, F., Urban, G. L., Shankar, V., and Bart, I. (2002), “Determinants and Consequences of Trust in e-Business,” Working Paper, Sloan School of Management, MIT, Cambridge, MA 02142.
Tan, Y. and Thoen, W. (2001).“Toward a Generic Model of Trust for Electronic Commerce,” International Journal of Electronic Commerce, 5(2), 61-74.
Taylor, R. G. (1989). “The Role of Trust in Labor-Management Relations,” Organization Development Journal, 7, 85-89.
Teece, D. J. (1986). “Profiting from Technological Innovation: Implications for Integration, Collaboration, Licensing and Public Policy,” Research Policy, 285-305.
Trevino, L.K. (1986). “Ethical Decision Making in Organizations: A Person-Situation Interactionist Model,” Academy of Management, 11(3), 601-617.
Turban, E., McLean, E., and Wetherbe, J. (2002). Information Technology for Management: Making Connection for Strategic Advantage, John Wiley & Sons.
U.S. Department of Commerce, (2000). http://Web.ita.doc.gov/safeharbor/, May 18.
Urban, G. L., Sultan, F., and Qualls, W. (2000), “Making Trust the Center of Your Internet Strategy,” Sloan Management Review, Fall (1), 39–48.
邱顯貴、楊亨利(2003),「電子商務網站值得消費者信任的影響因素」,第五屆資管博士論文研討會,台北:台灣大學。
Verbeke, W, Ouwerkerk, C., and Peelen, E. (1996).“Exploring the Contextual and Individual Factors on Ethical Decision Making of Salespeople,”Journal of Business Ethics, 15, 1175-1187.
Wang, H., Lee, M., and Wang, C. (1998).“Consumer Privacy Concerns about Internet Marketing,”Communication of the ACM, 41(3), 63-70.
Wareham, E. (1999). “Successful E-Commerce Requires Trust of Buyers,” Computing Canada, 25(35), Sep 17, p. 27.
Warren, S. and Brandies, L. (1890). “The Right to Privacy,” Harvard Law Review, 4, 193-220.
Webster, F. E. Jr. (1997). “The Future Role of Marketing in the Organization,” in Lehmann, D. R. and Jocz, K. E. (Eds), Reflections on the Futures of Marketing: Practice and Education, MA: Cambridge, 39-66.
Weiss, E. A. (Ed.) (1991).“Self-Assessment Procedure IX,” Communications of the ACM, 34(2), 102-118.
Westin, A. (1967). Privacy and Freedom, NY: Atheneum.
Westing, J. H. (1967). “Some Thoughts on the Nature of Ethics in Marketing,” in R. Moyer (ed.), Changing Marketing Systems, Chicago: American Marketing Association, 161-163.
Wicker, A. W. (1969). “Attitudes versus Actions: The Relationship of Verbal and Overt Behavioral Responses to Attitude Objects,” Journal of Social Issues, 25, 41-47.
Whitener, E.M., Brodt, S.E., Korsgaard, M.A., and Werner, J.M. (1998). “Managers as Initiators of Trust: An Exchange Relationship Framework for Understanding Managerial Trustworthy Behavior,” The Academy of Management Review, 23(3), 513-530.
消基會(1999),「1999 ISP 調查」,http://survey.yam.com/isp99/。
Wiig, K. M.(1993). Knowledge Management Foundations: How People and Organizations Create, Present, and Use Knowledge, TX: Schema Press.
Winer, R.S. (2001). “A Framework for Customer Relationship Management,” California Management Review, 43(4), 89-105.
Wong, Amy and Sohal, Amrik. (2002) “An Examination of the Relationship between Trust, Commitment and Relationship Quality,” International Journal of Retail & Distribution Management, 30(1), 34+.
Woturba, T. R. (1990).“A Comprehensive Framework for the Analysis of Ethical Behavior, with a Focus on Sales Organizations,” Journal of Personal Selling & Sales Management, X, 29-42.
Yin, R.(1981).“The Case Crisis: Some Answers,” Administrative Science Quarterly, 26, 58-65.
Zack, M.H. (1999).“Developing a Knowledge Strategy,”California Management Review, 41(3), 125-145.
梁定澎(2000),電子商務理論與實務,華泰。
許文義(2001),個人資料保護法論,台北:三民書局。
許孟祥(1988),以意向模式研究資訊人員之專業倫理行為,國立中山大學資訊管理研究所博士論文。
許孟祥、黃貞芬、林東清(1997),「資訊時代中倫理導向之決策制定架構」,第一屆資訊科技與社會轉型研討會。
郭木興(2001),電子商務理論與技術,□峰。
黃三榮(1998),「個人資料之保護─兼評我國電腦處理個人資料保護法」,資訊法務透析,38-53。
黃河明(2000),「由資訊科技觀點看知識管理」,知識管理:方法與系統研討會, http://ceiba.cc.ntu.edu.tw/km/km_conference/ keynote_ speech.htm。
黃俊英 (1997),行銷管理,台北:華泰。
楊正宏(2000),電子商務之經營策略,文魁資訊。
楊亨利、邱顯貴(2001),「台灣地區電子商務隱私權保護之現況探討」,中華管理評論,4(1),101-118。
葉重新(1999),心理測驗,台北:三民書局。
熊愛卿(2000),網際網戶個人資料保護之研究,國立台灣大學法律學研究所博士論文。
劉江彬(1988),資訊法論,二版,國立台灣大學法律叢書編輯委員會,台北:三民書局。
鄭錫鍇(2001),「知識管理對政府部門人力資源管理之影響分析」,國政研究報告憲政(研)090-010號,財團法人國家政策研究基金會,http://www.npf.org.tw/publication/cl/090/cl-r-090-010.htm。
盧希鵬(2001),E-Oscar 優質網站評估模式,網通國際。
盧希鵬、蔡宗霖(2001),「探討消費者採用網路購物意願之影響因素」,台灣區網際網路研討會暨網路學習與繼續教育國際會議。
盧蓓恩譯(1996),人際溝通─目標本位取向(Conary, D. and Cody, M. 1994. Interpersonal Communication: A Goals-Based Approach, St. Martin’s Press.),台北:五南。
英文部分
Afuah, A. and Tucci, C.L. (2002). Internet Business Models and Strategies: Text and Cases, 2nd, McGraw-Hill.
Amit, R. and Schoemaker, P.J. (1993). “ Strategic Asset and Organization Rent,” Strategic Management Journal, 14, 33-46.
Ajzen, I. (1985). From Intention to Actions: A Theory of Planned Behavior, in J. Kuhl and J. Beckman (Eds.), Action Control: From Cognition to Behavior, NY: Springer-Verlag.
Ajzen, I. (1988). Attitudes, Personality and Behavior. Milton Keynes: Open University Press.
Ajzen, I. (1991). “The Theory of Planned Behavior,” Organizational Behavior and Human Decision Processes, 50, 179-211.
Anderson, M.N. and Morrow, M. (1997). “ Organization Capability: Creating Simplicity and Focus in Business Life,” Organization Development Journal, 15(1), 77.
Applegate, L. M., McFarlan, F. W., and McKenney J. L. (1999). Corporate Information Systems Management: Text and Cases, 5th ed., Irwin/McGraw-Hill.
Armstrong, A. and Hagel, J. (1996) "The Real Value of On-Line Communities," Harvard Business Review, 74 (May-June), 134-141.
Bachmann, R. (2001). “Trust, Power and Control in Trans-Organization Relations,” Organization Studies, 22(2), 337-.
Baier, A. (1986). “Trust and Antitrust,” Ethics, 96, 231-260.
Bandura, A. (1986). Social Foundations of Thought and Action, NJ: Prentice Hall.
Banerjee, D., Cronan, T. P., and Jones, T. W. (1998). “Modeling IT Ethics: A Studying in Situational Ethics,”MIS Quarterly, 31-60.
Banisar, D. (2000). “Privacy & Human Rights 2000,” http://www.privacyinternational.org/survey/index2000.html.
Barber, B. (1983). The Logic and Limits of Trust, New Brunswick, NJ: Rutgers University Press.
Barlow, J. P. (1994).“The Economy of Ideas,”http://www.wired.com/archive.
Barney, J. (1991). “Firm Resources and Sustained Competitive Advantage,” Journal of Management, 17, 99-120.
Barney, J. and Hansen, M. (1994). “Trustworthiness as a source of competitive advantage,” Strategic Management Journal, 15(Winter Special Issue), 175-190.
Baumhart, R.C. (1961). “How Ethical are Businessmen?” Harvard Business Review, 39(July-August), 156-176.
Bhattacherjee, A. (2002). “Individual Trust in Online Firms: Scale Development and Initial Test,” Journal of Management Information Systems, 19(1), 211-241.
Biggs, M. (2000). “Web Privacy Standard P3P Takes Steps to Address Concerns of Business, Consumers,”InfoWorld, 22, p.49.
Blakeney, R. N. (1986) “A Transactional View of the Role of Trust in Organizational Communication,” Transactional Analysis Journal, 16, 95-98.
Bommer, M., Gratto, C., Gravander, J., and Tuttle, M. (1987). “A Behavior Model Ethical and Unethical Decision Making,” Journal of Business Ethics, 265-280.
Bonoma, T. V. (1976). “Conflict, Cooperation, and Trust in Three Power Systems,” Behavioral Science, 21(6), 499-514.
Boss, R. W. (1978). “Trust and Managerial Problem Solving Revisited,” Group and Organization Studies, 3, 331-342.
Boyle, R. and Bonacich, P. (1970). “The Development of Trust and Mistrust in Mixed-Motive Games,” Sociometry, 33, 123-139.
Brin, D. (1998). The Transparent Society: Will Technology Focus Us to Choose between Privacy and Freedom, Addison-Wesley.
Bruce, W. (1994). “Ethical People are Productive People,” Public Productivity & Management Review, 17(3), 241-253.
Butler, J. K. (1983). “Reciprocity of Trust between Professionals and their Secretaries,” Psychological Report, 53, 411-416.
Butler, J. K., and Cantrell, R. S. (1984). “A Behavioral Decision Theory Approach to Modeling Dyadic Trust in Superiors and Subordinates,”Psychological Reports, 55, 19-28.
Butler, J. K. (1991).“Toward Understanding and Measuring Conditions of Trust: Evolution of a Conditions of Trust Inventory,”Journal of Management, 17, 643-663.
Charters, D. (2002). “Electronic Monitoring and Privacy Issues in Business-Marketing: The Ethics of the DoubleClick Experience,” Journal of Business Ethics, 35(4), 243-254.
Cheskin Research and Studio Archetype/Sapient Report (1999). “E-commerce Trust Study,” http://www.sapient.com/cheskin.
Chiles, T. H. and McMackin, J. F. (1996). “Integrating Variable Risk Preferences, Trust and Transaction Cost Economics,” Academy of Management Journal, 21(1), 73-99.
Chiu, H.-K. and Yang, H.-L. (2003). “Knowledge Capital Accumulation and Value Creation: Based on Learning and Relationship Network Theories,” Journal of Cyber Culture and Information Society, 4, 19-52.
Cho, H. and LaRose, R. (1999). “Privacy Issues in Internet Surveys,” Social Science Computer Review, 17(4), 421-434.
Chwelos, P., Benbasat, I., and Dexter, A.S. (2001). “Research Report: Empirical Test of an EDI Adoption Model," Information System Research, Sept.
Clarke, R (1999a). “Introduction to Dataveillance and Information Privacy and Definitions of Terms.” http://www.anu.edu.au/people/Roger.Clarke/DV /Intro.html.
Clarke, R. (1999b). “Internet Privacy Concerns Confirm the Case for Intervention,” Communication of the ACM, 42, 60-67.
Cohen, D. and Prusak, L. (2000). In Good Company: How Social Capital Makes Organizational Work, Harvard Business School Press.
Coleman, J.S.(1990). Foundations of Social Theory, Cambridge, Mass.: Harvard University Press.
Cook, J., and Wall, T. (1980).“New Work Attitude Measures of Trust, Organizational Commitment, and Personal Need Nonfulfillment,”Journal of Occupational Psycholo, 53, 39-52.
Cozby, P. C. (1973). “Self-Disclosure: A Literature Review,”Psychological Bulletin, 79, 73-91.
Croteau, Anne-Marie and Li, Peter. (2003). “Critical Success Factors of CRM Technological Initiatives,” Canadian Journal of Administrative Sciences, 20(1), 21-34.
Culnan, M. (1999a). “Georgetown Internet Privacy Policy Survey: Report to the Federal Trade Commission,” http://www.epic.org/privacy/.
Culnan, M. (1999b).“Privacy and the Top 100 Web Sites: Report to the Federal Trade Commission,” http://www.epic.org/privacy/.
Culnan, M. (2000). “Protecting Privacy Online: Is Self-Regulation Working?” Journal of Public Policy & Marketing; 19(1), 20-26.
Dayal, S., Landesberg, H., and Zeisser, M. (1999).“How to Build Trust Online,”Marketing Management, 8(3), 64-69.
Delgado-Ballester, E. and Munuera-Aleman, J. L. (2001). “Brand Trust in the Context of Consumer Loyalty,” European Journal of Marketing, 35(11-12), 1238-1258.
Derlega, V., Metts, S., Petronio, S., and Margulis, S. (1993). Self-Disclosure, CA: Sage.
Deutsch, M. (1960)“The Effect of Motivational Orientation upon Trust and Suspicion,”Human Relations, 13, 123-140.
Doney, P.M. and Cannon, J.P. (1997). “An Examination of the Nature of Trust in Buyer-Seller Relationships,” Journal of Marketing, 61(2), 35-51.
Driscoll, J. W. (1978). “Trust and Participation in Organizational Decision Making as Predictors of Satisfaction,” Academy of Management Journal, 21, 44-56.
Duff, W. M., Smieliauskas, W., and Yoos, H. (2001). “Protecting Privacy,”Information Management Journal, 35(2), 14-30.
Dunn, M. H. (1988). “Trust and Political Agency,” in D.Gambetta (Ed.), Trust: Making and Breaking Cooperative Relations, 73-93. New York: Blackwell.
Dwyer, F.R., Schurr, P.H., and Oh, S. (1987). “Developing Buyer-Seller Relationships,” Journal of Marketing, 51,11-27.
Earle, T.C. and Cvetkovice, G.T. (1995). Social Trust: Toward a Cosmopolitan, CT: Praeger Publishers.
Egan, J. (2001). Relationship Marketing: Exploring Relational Strategies in Marketing, Pearson Education.
描述 博士
國立政治大學
資訊管理研究所
87356504
91
資料來源 http://thesis.lib.nccu.edu.tw/record/#G0087356504
資料類型 thesis
dc.contributor.advisor 楊亨利zh_TW
dc.contributor.advisor Yang, Heng-Lien_US
dc.contributor.author (Authors) 邱顯貴zh_TW
dc.contributor.author (Authors) Chiu, Hsien-Kueien_US
dc.creator (作者) 邱顯貴zh_TW
dc.creator (作者) Chiu, Hsien-Kueien_US
dc.date (日期) 2002en_US
dc.date.accessioned 14-Sep-2009 09:08:46 (UTC+8)-
dc.date.available 14-Sep-2009 09:08:46 (UTC+8)-
dc.date.issued (上傳時間) 14-Sep-2009 09:08:46 (UTC+8)-
dc.identifier (Other Identifiers) G0087356504en_US
dc.identifier.uri (URI) https://nccur.lib.nccu.edu.tw/handle/140.119/31044-
dc.description (描述) 博士zh_TW
dc.description (描述) 國立政治大學zh_TW
dc.description (描述) 資訊管理研究所zh_TW
dc.description (描述) 87356504zh_TW
dc.description (描述) 91zh_TW
dc.description.abstract (摘要) 本研究係提出一個能夠讓企業經營的購物網站值得消費者信任之管理模式,以期幫助業者在提昇網站信任方面,有具體的目標和施力點。該模式包括兩個主要的部分:(1)網站值得信任的構成因素和(2)促成網站值得信任的管理措施。有關前者部分,本研究建構網站信任的架構和各因素重要性的排序,並轉成量表和對量表的驗證。後者在探討促成業者建立網站信任的顯著影響因素,以及業者和消費者在此方面表現的認知差距之分析。此外本研究也實際將量表分別應用在網站信任對個人資訊揭露意願的影響,和購物經驗對網站信任之影響的驗證。
     
      在研究的流程上,首先以消費者為導向,探討網站值得信任的架構和重要組成。接著由業者評量自己的網站在此方面的表現,同時也指出影響該表現的各因素之強烈程度。然後,再回到消費者本身,進一步逐一評量該網站的實際情況,以作為本研究探討業者與消費者之間認知落差的情形。
     
      本研究結果指出,網站值得消費者信任的主要因素可分為能力、正直和關係三個維度,十三個總指標,和五十三個細目指標。對業者的實證結果顯示,會顯著地促成網站業者在「網站信任」有較佳表現的因素,並不是感知的利益或感知的外在壓力,而是該網站是否一切準備就緒,尤其是在教育訓練與管理結構的支持、資訊科技資源、以及線上認證的配合等方面。另外,商業經營模式也是促成的重要因素,尤其是業者對網站的重要程度越高,又懂得虛擬社群的經營,那麼將更助於網站信任的展現。
     
      在本研究中並指出線上業者和消費者在認知上落差之所在和其主要原因。為有效管理網站和促使網站值得信任,業者需真正地以消費者為導向,建立和妥善運用所需的資源和能力(如:教育訓練和管理結構的支持、資訊科技資源),以提升消費者的信任。
     
      此外,本研究確認了網站信任對提供個人資訊意願的正向影響,以及線上購物經驗對網站信任的助益。最後,本研究並對各階段成果說明策略意涵,也結合顧客關係管理觀念,提供業者信任管理的參考模式和網站信任的自我檢核參考表,期望有助於業者對網站信任,有較綜合性的瞭解和經營上的幫助。
zh_TW
dc.description.abstract (摘要) This paper presents an EC-trust management model based on a series of empirical studies, in order to help website managers to develop or enhance their website trustworthiness. This model consists of (1) the website trust/trustworthiness structure and its components, and (2) the managerial measures to support the development or enhancement of the trustworthiness. The latter also includes (1) the organizational readiness and business model for the trustworthiness, (2) the gap analysis that helps finding out the differences in the trustworthiness perceptions between website managers and consumers, and (3) the potential trust accumulation via the continuously better online experiences.
     
      The paper conducts a four-phase research. At first, the website trustworthiness structure and its evaluation form are constructed and validated. Then, out of 476 shopping websites, 100 managers use the form to evaluate their website trustworthiness, and also fill in the questionnaire that measures their perceptions of the factors (e.g. organizational readiness and business model) influencing their website trustworthiness performances. In the third phase, 128 consumers are asked to use the same form to perceive and evaluate those websites’ trustworthiness performance, in order to measure the correlations and the gaps between the managers’ and consumers’ perceptions. Besides, the effect of trust on the willingness of personal information disclosure is also tested in this phase. Finally, in the fourth phase, this research adopts a multiple case study strategy to find out the reasons for the significant gaps identified in the third phase, and, practically, works with a case company to find out the effect of the online-shopping experience on trust in the website.
     
      The result shows that the website trustworthiness involves three latent factors (i.e., competence, integrity, and relation), which consist of 13 elements, and a total of 53 detailed items. The website trust/trustworthiness performance is significantly affected by their website readiness (i.e., E & T and managerial structure, IT resources, financial resources, and seal-program preparation), the perceived website importance, as well as the perceived community importance. Meanwhile, the results also show that the gaps of perceptions between website managers and consumers do exist. Therefore, to effectively enhance their website trustworthiness, they should be really consumer-oriented and improve their performance according to the gap analysis.
     
      Besides, there are another two exciting findings in this paper. The effect of trust on the willingness of personal-information disclosure is validated. The significant effect of shopping experiences on trust suggests that the website managers should promote customers’ online experiences to enhance their trust in the websites.
en_US
dc.description.tableofcontents 摘要
     第一章 緒論……………………..……………………..…... 1
     第一節 研究動機………..………………………………… 1
     第二節 研究目的……………………………………………...… 3
     第三節 研究範圍..……………………………………………… 4
     第四節 研究流程……………………………………………….. 5
     
     第二章 文獻探討 ………………………………………………… 6
     第一節 信任……………………………………….…………….. 6
     第二節 電子商務網站信任…………………………….……….. 12
     第三節 個人資訊與隱私權……………….…………………….. 18
     一、個人資訊提供………………………………………………. 18
     二、資訊隱私權 …………………………………………….…… 24
     三、個人資料保護之倫理道德 ………………………….…….. 28
     四、個人資料保護之隱私政策 ………………………….…….. 32
     五、美國網站隱私政策調查研究 ………………….………….. 33
     六、隱私權保護、資訊揭露與自我揭露理論 ……….………… 35
     七、隱私權揭露與組織決策理論 ………………….…………… 36
     第四節 本研究的先期研究……………………………………... 38
     一、我國電子商務網站之隱私權揭露………………………….. 38
     二、電子商務網站的隱私權揭露之決策因素………………….. 53
     第五節 計劃行為理論……………………………………….….. 71
     第六節 資源基礎理論……………………………………….….. 75
     
     第三章 研究方法…………………………………………………. 79
     第一節 第一階段:網站值得消費者信任的主要因素………… 80
     第二節 第二階段:業者建立網站值得信任的影響因素……… 83
     第三節 第三階段:消費者對網站信任的實際評量…………… 88
     第四節 第四階段:個案訪談暨購物經驗對網站信任的影響… 92
     第五節 各階段研究方法與程序彙整…………………………... 94
     
     第四章 資料分析與討論……………...………………………. 95
     第一節 第一階段:網站值得消費者信任的主要因素………… 95
     一、網站值得消費者信任的架構………………………………. 95
     二、各因素重要性衡量與排序……….…………………………. 98
     三、小結…………………………………………………………. 102
     第二節 第二階段:業者建立網站值得信任的影響因素……… 105
     一、問卷回收與整理…………………………………………….. 105
     二、敘述統計及信度係數………….……………………………. 106
     三、因素萃取和信度分析………………………….……………. 110
     四、路徑分析與命題檢定………………………………………. 113
     五、促成網站信任的關鍵影響因素之線性結構關係…………. 114
     六、商業經營模式與網站信任…………………………………. 115
     七、小結…………………………………………………………. 119
     第三節 第三階段:消費者對網站信任的實際評量…………… 120
     一、業者自評與一般消費者評分的相關與落差………………. 120
     二、網站信任對個人資訊揭露意願的影響……….…………… 133
     三、小結 139
     第四節 第四階段:個案訪談暨購物經驗對網站信任的影響… 141
     一、個案訪談整理、分析和討論………………………………… 141
     二、線上購物經驗對網站信任的影響………………………….. 157
     三、小結 172
     第五節 各階段研究關聯與彙整………………………………... 175
     第六節 電子商務網站信任管理模式…………………………... 181
     
     第五章 結論與建議…………………..…………………………. 184
     第一節 結論……………………………………………………... 184
      第二節 研究限制與未來研究建議…………………………... 186
      第三節 對業者的建議………………………………………... 187
     一、對企業在網站信任管理方面的建議………………………. 187
     二、本研究結果在顧客關係管理的應用………………………. 190
      第四節 研究貢獻………………………….………………….. 194
     一、在學術研究方面……………………………………………. 194
     二、在企業實務方面……………………………………………. 195
     
     參考文獻………………...………………………………………. 197
     
     附錄……………………………………………………………... 212
     壹、 第一階段問卷 ……………………………………... 213
     貳、 第二階段問卷 ……………………………………... 218
     參、 第三階段問卷 ……………………………………... 225
     肆、 第四階段問卷 ……………………………………... 233
     伍、 網站信任的自我檢核參考………………………. 235
     論文著述
zh_TW
dc.language.iso en_US-
dc.source.uri (資料來源) http://thesis.lib.nccu.edu.tw/record/#G0087356504en_US
dc.subject (關鍵詞) 電子商務zh_TW
dc.subject (關鍵詞) 網站zh_TW
dc.subject (關鍵詞) 信任zh_TW
dc.subject (關鍵詞) 值得信任zh_TW
dc.subject (關鍵詞) 準備就緒zh_TW
dc.subject (關鍵詞) 商業經營模式zh_TW
dc.subject (關鍵詞) e-commerceen_US
dc.subject (關鍵詞) websiteen_US
dc.subject (關鍵詞) trusten_US
dc.subject (關鍵詞) trustworthinessen_US
dc.subject (關鍵詞) readinessen_US
dc.subject (關鍵詞) business modelen_US
dc.title (題名) 電子商務網站信任管理之研究zh_TW
dc.title (題名) The Study of E-Commerce Trust Managementen_US
dc.type (資料類型) thesisen
dc.relation.reference (參考文獻) 中文部分zh_TW
dc.relation.reference (參考文獻) 尤克強(1997),「資訊管理個案研究方法評論」,資訊管理學報,4(1),18-20。zh_TW
dc.relation.reference (參考文獻) 方世榮譯(2002),關係行銷,台北:五南。zh_TW
dc.relation.reference (參考文獻) 王毓良(1999),倫理氣候與資訊倫理的關聯性之研究─以高科技業及金融業為研究對象,靜宜大學企業管理研究所碩士論文。zh_TW
dc.relation.reference (參考文獻) 余千智等合著(2002),電子商務總論,二版,台北:智勝。zh_TW
dc.relation.reference (參考文獻) 吳思華(1993),策略九說─總論:策略管理的內涵,世界經理文摘。zh_TW
dc.relation.reference (參考文獻) 吳思華(1998),策略九說:策略思考的本質,臺北:臉譜文化。zh_TW
dc.relation.reference (參考文獻) 吳思華、黃宛華、賴鈺晶(1999),「智慧資本衡量因素之研究─以我國軟體業為例」,中華民國科技管理研討會論文集(三),591-604。zh_TW
dc.relation.reference (參考文獻) 吳琮璠、謝清佳(2003),資訊管理理論與實務,台北:智勝。zh_TW
dc.relation.reference (參考文獻) 李東峰、林子銘(2002),「資訊主管對企業資訊安全之風險控管決策」,資訊管理研究,資訊安全專刊,4(2),1-42。zh_TW
dc.relation.reference (參考文獻) 李東峰、林子銘、余春達(2001),「不確定環境下倫理決策行為之研究:以資訊隱私權為例」,第七屆資訊管理研究暨實務研討會,台北:景文技術學院。zh_TW
dc.relation.reference (參考文獻) Eggar, F. (2002). “Consumer Trust in E-Commerce: From Psychology to Interaction Design,” in Prins et al. (Eds.), Trust in Electronic Commerce: The Role of Trust from a Legal, an Organizational and a Technical Point of View, Kluwer Law International.zh_TW
dc.relation.reference (參考文獻) Eining .M. M. and Christensen, A. L. (1991). “A Psycho-Social Model of Software Piracy: the Development and Test of a Model,” in Ethical Issues in Information Systems, R. Dejoie, G. Fowler and D. Paradice (Eds.), Boyd and Fraser, Boston.zh_TW
dc.relation.reference (參考文獻) Farnham, A. (1989). “The trust Gap,” Fortune, Dec. 4, 56-78.zh_TW
dc.relation.reference (參考文獻) Farris, G., Senner, E., and Butterfield, D. (1973). “Trust, Culture, and Organizational Behavior,” Industrial Relations, 12, 144-157.zh_TW
dc.relation.reference (參考文獻) Federal Trade Commission (FTC). (May 2000). “Privacy Online: Fair Information Practices In The Electronic Marketplace,” A Federal Trade Commission Report To Congress.zh_TW
dc.relation.reference (參考文獻) Federal Trade Commission (FTC). (July 1999).“Self-Regulation and Privacy Online,”A Federal Trade Commission Report to. Congress.zh_TW
dc.relation.reference (參考文獻) Federal Trade Commission (FTC), (2000). “Privacy Online: Fair Information Practices In The Electronic Marketplace,” A Federal Trade Commission Report To Congress.zh_TW
dc.relation.reference (參考文獻) Ferrell, O. C. and Gresham, L. G. (1985).“A Contingency Framework for Understanding Ethical Decision Making in Marketing,”Journal of Marketing, 49, 87-97.zh_TW
dc.relation.reference (參考文獻) Fishbein, M. and Ajzen, I. (1975) Belief, Attitude, Intention and Behavior: An Introduction to Theory and Research, MA: Addison-Wesley.zh_TW
dc.relation.reference (參考文獻) Fogg, B.J. et al. (2001). “What Makes Web Sites Credible? A Report on a Large Quantitative Study,” ACM SIGCHI, 3 (1), 61-67.zh_TW
dc.relation.reference (參考文獻) 李漢雄、郭書齊(1997),「提升競爭優勢的人力資源策略:談創新力發展與創新活度導入」,1997中華民國科技管理研討,367-378。zh_TW
dc.relation.reference (參考文獻) Foxman, E.R. and Kilcoyne, P. (1993). “Information Technology, Marketing Practice, and Consumer Privacy: Ethical Issues,” Journal of Public Policy & Marketing, 12(1), 106-119.zh_TW
dc.relation.reference (參考文獻) Fritzsche, David J. (1991). “A Model of Decision-Making Incorporating Ethical Values,” Journal of Business Ethics, 10, 841-852.zh_TW
dc.relation.reference (參考文獻) Frost, T., Stimpson, D. V., and Maughan, M. R. C. (1978). “Some Correlates of Trust,” Journal of Psychology, 99, 103-108.zh_TW
dc.relation.reference (參考文獻) Fuller, S.R. and Aldag, R.J. (2001). “The GGPS Model: Broadening the Perceptive on Group Problem Solving,” in M. Turner (Ed.), Groups at Work: Theory and Research, 3-24.zh_TW
dc.relation.reference (參考文獻) Gabarro, J. J. (1978). “The Development of Trust, Influence, and Expectations,” in A. G. Athos and J. J. Gabarro (Eds.), Interpersonal Behavior: Communication and Understanding in Relationship, 290-303. Englewood Cliffs, NJ: Prentice-Hall.zh_TW
dc.relation.reference (參考文獻) Gaines, J. H. (1980). “Upward Communication in Industry: An Experiment,” Human Relations, 33, 929-942.zh_TW
dc.relation.reference (參考文獻) Ganesan, S. (1994). “Determinants of Long-Term Orientation in Buyer-Seller Relationships,” Journal of Marketing, 58(2), 1-19.zh_TW
dc.relation.reference (參考文獻) Garbarino, E. and Johnson, M. (1999). “The Different Roles of Satisfaction, Trust and Commitment in Customer Relationships,” Journal of Marketing, 63(April), 70-87.zh_TW
dc.relation.reference (參考文獻) Gefen, D. (2000). “E-Commerce: The Role of Familiarity and Trust,” Omega, 28(6), 725-737.zh_TW
dc.relation.reference (參考文獻) Gefen, D. (2002). “Reflections on the Dimensions of Trust and Trustworthiness among Online Consumers,” Database for Advances in Information Systems, 33(3), 38-53.zh_TW
dc.relation.reference (參考文獻) 汪智揚(1999),風險性結局下的資訊倫理決策—倫理決策理論與理性行為理論之比較,國立中央大學資訊管理研究所碩士論文。zh_TW
dc.relation.reference (參考文獻) Gefen, D. (2003). “Trust and TAM in Online Shopping: An Integrated Model,” MIS Quarterly, 27(1), 51-90.zh_TW
dc.relation.reference (參考文獻) Giffin, K. (1967). “The Contribution of Studies of Source Credibility to a Theory of Interpersonal Trust in the Communication Process,” Psychological Bulletin, 68(2), 104-120.zh_TW
dc.relation.reference (參考文獻) Givens, B. (1997). “A Review of State and Federal Privacy Laws,” http://www.privacyrights.org/ar/jttaskap.htm.zh_TW
dc.relation.reference (參考文獻) Govier, T. (1997). Social Trust and Human Communities, McGill-Queen’s University Press.zh_TW
dc.relation.reference (參考文獻) Greenleaf, G.(1998). “Global Protection of Privacy in Cyberspace - Implications for the Asia-Pacific,” http://austlii.edu.au/itlaw/articles/TaiwanSTLC.html.zh_TW
dc.relation.reference (參考文獻) Hanson, W. (2000). Principles of Internet Marketing, South-Western College Publishing.zh_TW
dc.relation.reference (參考文獻) Hardin, R. (1940). Trust and Trustworthiness, NY: Russell Sage Foundation.zh_TW
dc.relation.reference (參考文獻) Harrison, D.A., Mykytyn, P.P. Jr., and Riemenschneider, C.K. (1997). "Executive Decisions About Adoption of Information Technology in Small Business: Theory and Empirical Tests," Information Systems Research, 8(2), 171-195.zh_TW
dc.relation.reference (參考文獻) Heimovics, R. D. (1984). “Trust and Influence in an Ambiguous Group Setting,” Small Group Behavior, 15, 545-552.zh_TW
dc.relation.reference (參考文獻) Hicks, W. (2001). “Cyber-Risk Meets Corporate Governance- I ,” Directorship, 1-3.zh_TW
dc.relation.reference (參考文獻) 周文賢(2002),多變量統計分析:SAS/STAT 使用方法,台北:智勝文化。zh_TW
dc.relation.reference (參考文獻) Hoffman, D. L., Novak, T. P., and Peralta, M. (1999). “Building Consumer Trust Online,” Communications of the ACM, 42 (4), 80-85.zh_TW
dc.relation.reference (參考文獻) Holmes, J. G. (1991). “Trust and the Appraisal Process in Close Relationships,” in Jones, W. H. and Perlman, D. (Eds.), Advances in Personal Relationships, 2, 57-104. London: Jessica Kingsley.zh_TW
dc.relation.reference (參考文獻) Hunt, K. (1996). “Establishing a Presence on the World Wide Web: A Rhetorical Approach,” Technical Communication, 43(4), 376-387.zh_TW
dc.relation.reference (參考文獻) Hunt, S. D. and Vitell, S. (1986). “A General Theory of Marketing Ethics,” Journal of Macromarketing, Spring, 5-16.zh_TW
dc.relation.reference (參考文獻) Iacovou C. L., Benbasat, I., and Dexter, A. S.(1995). “Electronic Data Interchange and Small Organizations: Adoption and Impact of Technology,” MIS Quarterly, 19(4), 465-85.zh_TW
dc.relation.reference (參考文獻) Igbaria, M., Zinatelli, N., Cragg, P., and Cavaye, A. (1997). "Personal Computing Acceptance Factors in Small Firms: A Structural Equation Model," MIS Quarterly, Sept., 279-305.zh_TW
dc.relation.reference (參考文獻) Jarvenpaa, S. L., Knoll, K., and Leidner. D. E. (1998). “Is Anybody Out There? Antecedents of Trust in Global Virtual Teams,”Journal of Management Information Systems, 14(4), 29-64.zh_TW
dc.relation.reference (參考文獻) Jarvenpaa, S. L., Tractinsky, J., and Saarinen, L. (1999). “Consumer Trust in an Internet Store: A Cross-Cultural Validation,” Journal of Computer Mediated Communication, 5 (2), http://www.asusc.org/jcmc/vol5/issue2.zh_TW
dc.relation.reference (參考文獻) Jarvenpaa, S. L., Tractinsky, J., and Vitale, M. (2000). “Consumer Trust in an Internet Store,” Information Technology and Management, 1 (1-2), 45-71.zh_TW
dc.relation.reference (參考文獻) Johnson-George, C. and Swap, W. C. (1982). “Measurement of Specific Interpersonal Trust: Construction and Validation of a Scale to Assess Trust in a Specific Other,” Journal of Personality and Social Psychology, 43(6), 1306-1317.zh_TW
dc.relation.reference (參考文獻) 林子銘、李東峰、連俊瑋(2002),「台灣人在不確定性環境下倫理決策行為研究」,資訊管理研究,4(3),163-204.zh_TW
dc.relation.reference (參考文獻) Jone, G.R. and George, J.M. (1998).“The Experience and Evolution of Trust: Implication for Cooperation and Teamwork,”Academy of Management Review, 531-546.zh_TW
dc.relation.reference (參考文獻) Jones, S., Wilikens, M., Morris, P., and Masera, M. (2000).“Trust Requirements in e-Business,”Communications of the ACM, 43(12), 81-87.zh_TW
dc.relation.reference (參考文獻) Kallman, E. A. and Grillo, J. P. (1996). Ethical Decision Making and Information Technology, 2nd ed., McGgraw-Hill.zh_TW
dc.relation.reference (參考文獻) Kasperson, R.E., Golding, D., and Tuler, S. (1992), “Social Distrust as a Factor in Siting Hazardous Facilities and Communicating Risks,” Journal of Social Issues, 48(4), 161-187.zh_TW
dc.relation.reference (參考文獻) Katerattanakul, Pairin. (2002). “Framework of Effective Web Site Design for Business-To-Consumer Internet Commerce,” INFOR, 40(1), 57-70.zh_TW
dc.relation.reference (參考文獻) Kee, H.W. and Knox, R.E. (1970).“Conceptual and Methodological Considerations in the Study of Trust and Suspicion,”Journal of Conflict Resolution, 14, 357-366.zh_TW
dc.relation.reference (參考文獻) Kelly, C. M. (1987). “The Interrelationship of Ethics and Power in Today’s Organizations,” Organizational Dynamics, 16(Summer), 5-18.zh_TW
dc.relation.reference (參考文獻) Kemp, Ted (2000), “A Matter of Trust - B2Cs Seek Credibility,”Internetweek, 830, 1 & 16.zh_TW
dc.relation.reference (參考文獻) Kettinger, W., Grover, V., Guha, S., and Segars, A. (1994). “Strategic Information Systems Revisited: A Study in Sustainability and Performance,” MIS Quarterly, 18(1), 31-58.zh_TW
dc.relation.reference (參考文獻) Kettinger, W.J. and Hackbarth, G. (1997). “Selling in the Era of the Net: Integration of Electronic Commerce in Small Firms” Proceedings of the 18 International Conference on Information Systems, Atlanta, 249-262.zh_TW
dc.relation.reference (參考文獻) 林子銘、梁昇凱、汪智揚(1999),「以社會交換理論探討個人對資訊隱私權的認知」,第十屆國際資訊管理學術研討會,台北:警察大學。zh_TW
dc.relation.reference (參考文獻) Killingsworth, S. (1999). “Mining Your Own Business: Privacy Policy in Principle and in Practice,” Journal of Internet Law, October, 1-18.zh_TW
dc.relation.reference (參考文獻) Kimery, K. and M. McCord. (2002). “Third-Party Assurances: Mapping the Road to Trust in E-retailing,” The Journal of Information Technology Theory and Application (JITTA), 4(2), 63-82.zh_TW
dc.relation.reference (參考文獻) Kohlberg, L. (1976). “Moral Stages and Moralization: the Cognitive-Developmental Approach,” in T. Lickona (Ed.), Moral Development and Behavior: Theory, Research, and Social Issues, 34-35, NY: Holt, Rinehart & Winston.zh_TW
dc.relation.reference (參考文獻) Koller, M. (1988). “Risk as a Determinant of Trust,” Basic and Applied Social Psychology, 9(4), 265-276.zh_TW
dc.relation.reference (參考文獻) Kotler, P. (1991). Marketing Management: Analysis, Planning, Implementation, and Control, 7th, NJ: Prentice-Hall.zh_TW
dc.relation.reference (參考文獻) Kramer, L.C. (2002). “Private Eyes Are Watching You: Consumer Online Privacy Protection-Lessons from Home and Abroad,” Texas International Law Journal, 37(2), 387-420.zh_TW
dc.relation.reference (參考文獻) Kreie, J. and Timothy, P. C. (1998).“How Men and Woman View Ethics,” Communication of the ACM, 41(September), 70-76.zh_TW
dc.relation.reference (參考文獻) Krüge, C. (1982).“Right of Privacy, Right of Personality and Commercial Advertising,” International Review of Industrial Property and Copyright Law, 13, p.183.zh_TW
dc.relation.reference (參考文獻) Kruglanski, A.W. (1970). “Attributing Trustworthiness in Supervisor-Worker Relations,” Journal of Experimental Psychology, 6, 214-232.zh_TW
dc.relation.reference (參考文獻) Kuo, Feng-Yang and Hsu, Meng-Hsiang, (2001). “Development and Validation of Ethical Computer Self-Efficacy Measure: The Case of Softlifting,” Journal of Business Ethics, 32(4), 299-315.zh_TW
dc.relation.reference (參考文獻) 林水波(1999),組織理論,台北:智勝。zh_TW
dc.relation.reference (參考文獻) Larzelere, R., and Huston, T. (1980). “The Dyadic Trust Scale: Toward Understanding Interpersonal Trust in Close Relationships,” Journal of Marriage and the Family, 42, 595-604.zh_TW
dc.relation.reference (參考文獻) Lau, T., Etzioni, O. and Weld, D. (1999).“Privacy Interfaces for Information Management,”Communication of the ACM, 42, 88-94.zh_TW
dc.relation.reference (參考文獻) Leana, C.R. and van Buren, H.J. III. (1999). “Organizational Social Capital and Employment Practices,” Academy of Management Review, 24, 538-555.zh_TW
dc.relation.reference (參考文獻) Lederer, A.L., Mirchandani, D.A., and Sims, K. (1997).“The Link Between Information Strategy and Electronic Commerce,” Journal of Organizational Computing and Electronic Commerce, 7(1), 1997, 17-34.zh_TW
dc.relation.reference (參考文獻) Lee, K.O. and Turban, E. (2001). “A Trust Model for Consumer Internet Shopping,” International Journal of Electronic Commerce, 6(1), 75-91.zh_TW
dc.relation.reference (參考文獻) Lewis, J. D., and Weigert, A. (1985). “Trust as a Social Reality,” Social Forces, 63, 967-985.zh_TW
dc.relation.reference (參考文獻) Luhmann, N. (1988). “Familiarity, Confidence, Trust: Problems and Alternatives,” in D. Gambetta (Ed.), Trust: Making and Breaking Cooperative Relations, Basil Blakwell.zh_TW
dc.relation.reference (參考文獻) Magouirk, J. (2001). “Partners in Privacy,” Intelligent Enterprise, 4(14), Sep 18, 28-32.zh_TW
dc.relation.reference (參考文獻) Mason, R. O. (1986).“Four Ethical Issues of the Information Age,”MIS Quarterly, 10(1), 5-12.zh_TW
dc.relation.reference (參考文獻) Mayer, R.C., Davis, J.H., and Schoorman, F.D. (1995). “An Integrative Model of Organizational Trust”Academy of Management Review, 20(3), 709-734.zh_TW
dc.relation.reference (參考文獻) 林東清(2002),資訊管理:e化企業的核心競爭能力,台北:智勝文化。zh_TW
dc.relation.reference (參考文獻) McAllister, Daniel J. (1995). “Affect- and Cognition-based Trust as Foundations for Interpersonal Cooperation in Organizations,” Academy of Management Journal, Feb, 38(1), 24-59.zh_TW
dc.relation.reference (參考文獻) McCarthy, T. (2000), The Rights of Publicity and Privacy, (1st Edition, 1987), 2nd Edition, NY: Clark Boardman Callaghan.zh_TW
dc.relation.reference (參考文獻) McFall, L. (1987),“Integrity,”Ethics, 98, 5-20.zh_TW
dc.relation.reference (參考文獻) McKim, R.(1999). “Information: The Newest Currency;” Target Marketing, 22(7), 36-38.zh_TW
dc.relation.reference (參考文獻) McKnight, D.H. and Chervany, N.L. (2001). “Trust and Distrust Definitions: One Bite at a Time,” in R. Falcone, M. Singh and Y.-H. Tan (Eds.): Trust in Cyber-Societies, LNAI 2246, 27-54, Springer-Verlag Berlin Heidelberg.zh_TW
dc.relation.reference (參考文獻) Microsoft, (1999). Summary of Global Internet Legal Developments─from the Period Oct. to Dec. 1999, Microsoft.zh_TW
dc.relation.reference (參考文獻) Miller, S. and Weckert, J. (2000).“Privacy, the Workplace and the Internet,” Journal of Nusiness Ethics, 28, 255-265.zh_TW
dc.relation.reference (參考文獻) Mishra, A. K. (1996).“Organizational Responses to Crisis: The Centrality of Trust,” in R. M. Kramer and T. R. Tyler (Eds.), Trust in Organizations: Frontiers of Theory and Research, 261-287, Thousand Oaks, CA: Sage.zh_TW
dc.relation.reference (參考文獻) Morgan, R.M. and Hunt, S.D. (1994). “ The Commitment-Trust Theory of Relationship Marketing,” Journal of Marketing, 58(3), 20-38.zh_TW
dc.relation.reference (參考文獻) Nimmer, M. (1954). “The Right of Publicity,”Law and Contemporary Problems, 19, p. 203.zh_TW
dc.relation.reference (參考文獻) 林東清(2002),「顧客關係管理(CRM)研究的一些相關理論模式與重要議題」,資訊管理學報,9(專刊期),31-56。zh_TW
dc.relation.reference (參考文獻) Olson, J. M., and Zanna, M. P. (1993). “Attitudes and Attitude Change,” Annual Review of Psychology, 44, 117-154.zh_TW
dc.relation.reference (參考文獻) Palmer, J., Bailey, J. P., and Faraj, S. (2000). “The Role of Intermediaries in the Development of Trust on the WWW: The Use and Prominence of Trusted Third Parties and Privacy Statements,” Journal of Computer Mediated Communication, 5 (3).zh_TW
dc.relation.reference (參考文獻) Papadopoulou, P., Andreou, A., Kanellis, P., and Martakos, D. (2001). “Trust and Relationship Building in Electronic Commerce,” Internet Research: Electronic Networking Applications and Policy, 11(4), 322-332.zh_TW
dc.relation.reference (參考文獻) Parasuraman, A. Zeithaml, V.A., and Berry, L.L. (1985). “A conceptual Model of Service Quality and Its Implications for Future Research,” Journal of Marketing, Fall, 44.zh_TW
dc.relation.reference (參考文獻) Parker, D., Swope, S., and Baker, B. (1990). Ethical Conflicts in Information and Computer Science, Technology, and Business, Wellesley, MA: QED Information Sciences.zh_TW
dc.relation.reference (參考文獻) Pinckaers, J. (1996). From Privacy toward a New Intellectual Property Right in Persona, MA: Kluwer Law International.zh_TW
dc.relation.reference (參考文獻) Powell, W.W. (1990). Neither Maker nor Hierarchy: Network Forms of Organization,” Research in Organizational Behavior, 12, 295-336.zh_TW
dc.relation.reference (參考文獻) Pressey, A.D. and Mathew, B.P. (1998). “Relationship Marketing and Retailing: Comfortable Bedfellow?” Customer Relationship Management, 1(1), 39-53.zh_TW
dc.relation.reference (參考文獻) Prosser, W. (1960). “Privacy,” California Law Review, 48 (January), 383-423.zh_TW
dc.relation.reference (參考文獻) Putnam, R.D. (1993). Making Democracy Work: Civil Traditions in Morden Italy, Princeton: Princeton University Press.zh_TW
dc.relation.reference (參考文獻) 邱顯貴(1999),「資訊存取之隱私問題在倫理學與科技法律層面之探討」,企業倫理與永續發展研討會,中壢:中央大學,188-206。zh_TW
dc.relation.reference (參考文獻) Radcliff, D. (1998). “Is your ISP secure?” InfoWorld, Mar 2.zh_TW
dc.relation.reference (參考文獻) Rainnone, S., Sipior, J., and Ward, B. (1998).“Ethical Management of Employee E-mail Privacy, Information Strategy,”The Executive’s Journal, Spring, 34-41.zh_TW
dc.relation.reference (參考文獻) Ramaswani, S.N., Srinivasan, S.S., and Gorton, S.A. (1997). "Information Asymmetry Between Salesperson and Supervisor: Postulates from Agency and Social Exchange Theory," Journal of Personal Selling & Sales Management, 17(3), 29-50.zh_TW
dc.relation.reference (參考文獻) Rawlins, W. K. (1983).“Openness as Problematic in Ongoing Friendships: Two Conversational Dilemmas,”Communication Monographs, 50, 1-13.zh_TW
dc.relation.reference (參考文獻) Renn, O. and Levine, D. (1991). “Credibility and Trust in Risk Communication,” in R.E. Kasperson and P.M. Stallen (Eds.), Communicating Risks to the Public: International Perspectives, Amsterdam: Kluwer.zh_TW
dc.relation.reference (參考文獻) Reynolds, Larry (1997). The Trust Effect: Creating the High Trust, High Performance Organization, CA: Nicholas Brealey Publishing.zh_TW
dc.relation.reference (參考文獻) Roos, G., Roos, J., Edvinsson, L., and Dragonetti, N.C. (1998). Intellectual Capital: Navigating in the New Business Landscape, NY: New York University Press.zh_TW
dc.relation.reference (參考文獻) Rousseau, D. M., Sitkin, S. B., Burt, R. S., and Camerer, C. (1998). “Not So Different After All: A Cross-Discipline View of Trust,”The Academy of Management Review, 23(3), 393-404.zh_TW
dc.relation.reference (參考文獻) Sabatelli, R.M., Buck, R., and Dreyer, A. (1983). “Locus of Control, Interpersonal Trust and Nonverbal Communication Accuracy,” Journal of Personality and Social Psychology, 44, 399-409.zh_TW
dc.relation.reference (參考文獻) Schlenker, B., Helm, B., and Tedeschi, J. (1973). “The Effects of Personality and Situational Variables on Behavioral Trust,” Journal of Personality and Social Psychology, 25, 419-427.zh_TW
dc.relation.reference (參考文獻) 邱顯貴、傅素芬(2002),「透過合作以創造價值:一個分析模式與個案研究」,商業職業教育季刊,84期,15-25。zh_TW
dc.relation.reference (參考文獻) Schneiderman, B. (2000). “Designing Trust into Online Experiences,” Communications of the ACM, 43 (12), 57-59.zh_TW
dc.relation.reference (參考文獻) Schneier, B. (2001). “Is Disclosing Vulnerabilities A Security Risk In Itself?” Internetweek, 886, 27.zh_TW
dc.relation.reference (參考文獻) Schubert, P. and Ginsburg, M. (1999) "Virtual Communities of Transaction: The Role of Personalization in Electronic Commerce," Proceedings of the Twelfth Bled Electronic Commerce Conference, June 7-9, 647-663.zh_TW
dc.relation.reference (參考文獻) Science & Technology Law Center (STLC). (2002). “Electronic Commerce on the Internet-Legal Developments in Taiwan,” http://stlc.iii.org.tw/earticles/ EC-JM-U.htm#p6, visited in May 2002.zh_TW
dc.relation.reference (參考文獻) Shapiro, A. (1999). The Control Revolution: How the Internet is Putting Individuals in Charge and Changing the World We Know, PublicAffairs.zh_TW
dc.relation.reference (參考文獻) Shaw, Paul. (2001). E-Business Privacy and Trust: Planning and Management Strategies, NY: John Wiley & Sons.zh_TW
dc.relation.reference (參考文獻) Shaw, R. B. (1997). Trust in the Balance: Building Successful Organizations on Results, Integrity, and Concern, Calif.: Jossey-Bass.zh_TW
dc.relation.reference (參考文獻) Shaw, R. B. (1998). “Organizational Integrity,” Executive Excellence, 15(3), 13+.zh_TW
dc.relation.reference (參考文獻) Sheehan, K. B. and Hoy, M. G. (2000), “Dimensions of Privacy Concern among Online Consumers,”Journal of Public Policy & Marketing, 19(1), 62-73.zh_TW
dc.relation.reference (參考文獻) Shneiderman, B.(2000). “Designing Trust into Online Experiences,” Communications of the ACM, 43(12), 57-59.zh_TW
dc.relation.reference (參考文獻) 邱顯貴、楊亨利(2000),「以資料發掘經由知識管理建構顧客關係管理模式之研究」,第十一屆全國資訊管理學術研討會,高雄:中山大學。zh_TW
dc.relation.reference (參考文獻) Shockley-Zalabak, P., Ellis, K., and Winograd, G. (2000). “Organizational Trust: What It Means, Why It Matters,” Organization Development Journal, 18(4), 35-48.zh_TW
dc.relation.reference (參考文獻) Siegel, S. (1956). Nonparametric Statistics – for the Behavioral Sciences, NY: McGraw-Hill.zh_TW
dc.relation.reference (參考文獻) Simon, A. and Shaffer, S. (2001). Data Warehousing and Business Intelligence for E-Commerce, CA: Academic Press.zh_TW
dc.relation.reference (參考文獻) Simon, H. A. (1960). Administrative Behaviour, NY: Macmillan, 2nd.zh_TW
dc.relation.reference (參考文獻) Singh, J. and Sirdeshmukh, D. (2000). “Agency and Trust Mechanisms in Consumer Satisfaction and Loyalty Judgments,” Academy of Marketing Science, 28(1), 150-167.zh_TW
dc.relation.reference (參考文獻) Sitkin, S. B. and Roth, N. L. (1993). “Explaining the Limited Effectiveness of Legalistic "Remedies" for Trust/Distrust,” Organization Science, 4(3), 367-392.zh_TW
dc.relation.reference (參考文獻) Smeltzer, L. R. (1997). “The Meaning and Origin of Trust in Buyer-Supplier Relationships,”International Journal of Purchasing and Materials, 40-48.zh_TW
dc.relation.reference (參考文獻) Smith, H.J., Milberg, S.J., and Burke, S.J. (1996). “Information Privacy: Measuring Individuals` Concerns about Organizational Practices,” MIS Quarterly, 20(2), 167-196.zh_TW
dc.relation.reference (參考文獻) Smith, M., Bailey, J., and Brynjolfsson, E. (2000), “Understanding Digital Markets: Review and Assessment,” Erik Brynjolfsson and Brian Kahin, eds, Understanding the Digital Economy, MIT Press, Cambridge, MA.zh_TW
dc.relation.reference (參考文獻) Smith, C. (2000). “Virgin`s Reputation Gives its E-Activity Instant Credibility,” Marketing, Apr 13, p.19.zh_TW
dc.relation.reference (參考文獻) 邱顯貴、楊亨利(2002),「電子商務網站信任的重要考量因素之探討」,第三屆電子化企業經營管理理論與實務研討會,彰化:大葉大學。zh_TW
dc.relation.reference (參考文獻) Sommerville, Ian. (1992). Software Engineering, 4th ed., Addison-Wesley.zh_TW
dc.relation.reference (參考文獻) Stewart, Thomas A. (1997). Intellectual Capital:The New Wealth of Organization. NY:Bantam Donbleday Dell.zh_TW
dc.relation.reference (參考文獻) Sultan, F., Urban, G. L., Shankar, V., and Bart, I. (2002), “Determinants and Consequences of Trust in e-Business,” Working Paper, Sloan School of Management, MIT, Cambridge, MA 02142.zh_TW
dc.relation.reference (參考文獻) Tan, Y. and Thoen, W. (2001).“Toward a Generic Model of Trust for Electronic Commerce,” International Journal of Electronic Commerce, 5(2), 61-74.zh_TW
dc.relation.reference (參考文獻) Taylor, R. G. (1989). “The Role of Trust in Labor-Management Relations,” Organization Development Journal, 7, 85-89.zh_TW
dc.relation.reference (參考文獻) Teece, D. J. (1986). “Profiting from Technological Innovation: Implications for Integration, Collaboration, Licensing and Public Policy,” Research Policy, 285-305.zh_TW
dc.relation.reference (參考文獻) Trevino, L.K. (1986). “Ethical Decision Making in Organizations: A Person-Situation Interactionist Model,” Academy of Management, 11(3), 601-617.zh_TW
dc.relation.reference (參考文獻) Turban, E., McLean, E., and Wetherbe, J. (2002). Information Technology for Management: Making Connection for Strategic Advantage, John Wiley & Sons.zh_TW
dc.relation.reference (參考文獻) U.S. Department of Commerce, (2000). http://Web.ita.doc.gov/safeharbor/, May 18.zh_TW
dc.relation.reference (參考文獻) Urban, G. L., Sultan, F., and Qualls, W. (2000), “Making Trust the Center of Your Internet Strategy,” Sloan Management Review, Fall (1), 39–48.zh_TW
dc.relation.reference (參考文獻) 邱顯貴、楊亨利(2003),「電子商務網站值得消費者信任的影響因素」,第五屆資管博士論文研討會,台北:台灣大學。zh_TW
dc.relation.reference (參考文獻) Verbeke, W, Ouwerkerk, C., and Peelen, E. (1996).“Exploring the Contextual and Individual Factors on Ethical Decision Making of Salespeople,”Journal of Business Ethics, 15, 1175-1187.zh_TW
dc.relation.reference (參考文獻) Wang, H., Lee, M., and Wang, C. (1998).“Consumer Privacy Concerns about Internet Marketing,”Communication of the ACM, 41(3), 63-70.zh_TW
dc.relation.reference (參考文獻) Wareham, E. (1999). “Successful E-Commerce Requires Trust of Buyers,” Computing Canada, 25(35), Sep 17, p. 27.zh_TW
dc.relation.reference (參考文獻) Warren, S. and Brandies, L. (1890). “The Right to Privacy,” Harvard Law Review, 4, 193-220.zh_TW
dc.relation.reference (參考文獻) Webster, F. E. Jr. (1997). “The Future Role of Marketing in the Organization,” in Lehmann, D. R. and Jocz, K. E. (Eds), Reflections on the Futures of Marketing: Practice and Education, MA: Cambridge, 39-66.zh_TW
dc.relation.reference (參考文獻) Weiss, E. A. (Ed.) (1991).“Self-Assessment Procedure IX,” Communications of the ACM, 34(2), 102-118.zh_TW
dc.relation.reference (參考文獻) Westin, A. (1967). Privacy and Freedom, NY: Atheneum.zh_TW
dc.relation.reference (參考文獻) Westing, J. H. (1967). “Some Thoughts on the Nature of Ethics in Marketing,” in R. Moyer (ed.), Changing Marketing Systems, Chicago: American Marketing Association, 161-163.zh_TW
dc.relation.reference (參考文獻) Wicker, A. W. (1969). “Attitudes versus Actions: The Relationship of Verbal and Overt Behavioral Responses to Attitude Objects,” Journal of Social Issues, 25, 41-47.zh_TW
dc.relation.reference (參考文獻) Whitener, E.M., Brodt, S.E., Korsgaard, M.A., and Werner, J.M. (1998). “Managers as Initiators of Trust: An Exchange Relationship Framework for Understanding Managerial Trustworthy Behavior,” The Academy of Management Review, 23(3), 513-530.zh_TW
dc.relation.reference (參考文獻) 消基會(1999),「1999 ISP 調查」,http://survey.yam.com/isp99/。zh_TW
dc.relation.reference (參考文獻) Wiig, K. M.(1993). Knowledge Management Foundations: How People and Organizations Create, Present, and Use Knowledge, TX: Schema Press.zh_TW
dc.relation.reference (參考文獻) Winer, R.S. (2001). “A Framework for Customer Relationship Management,” California Management Review, 43(4), 89-105.zh_TW
dc.relation.reference (參考文獻) Wong, Amy and Sohal, Amrik. (2002) “An Examination of the Relationship between Trust, Commitment and Relationship Quality,” International Journal of Retail & Distribution Management, 30(1), 34+.zh_TW
dc.relation.reference (參考文獻) Woturba, T. R. (1990).“A Comprehensive Framework for the Analysis of Ethical Behavior, with a Focus on Sales Organizations,” Journal of Personal Selling & Sales Management, X, 29-42.zh_TW
dc.relation.reference (參考文獻) Yin, R.(1981).“The Case Crisis: Some Answers,” Administrative Science Quarterly, 26, 58-65.zh_TW
dc.relation.reference (參考文獻) Zack, M.H. (1999).“Developing a Knowledge Strategy,”California Management Review, 41(3), 125-145.zh_TW
dc.relation.reference (參考文獻) 梁定澎(2000),電子商務理論與實務,華泰。zh_TW
dc.relation.reference (參考文獻) 許文義(2001),個人資料保護法論,台北:三民書局。zh_TW
dc.relation.reference (參考文獻) 許孟祥(1988),以意向模式研究資訊人員之專業倫理行為,國立中山大學資訊管理研究所博士論文。zh_TW
dc.relation.reference (參考文獻) 許孟祥、黃貞芬、林東清(1997),「資訊時代中倫理導向之決策制定架構」,第一屆資訊科技與社會轉型研討會。zh_TW
dc.relation.reference (參考文獻) 郭木興(2001),電子商務理論與技術,□峰。zh_TW
dc.relation.reference (參考文獻) 黃三榮(1998),「個人資料之保護─兼評我國電腦處理個人資料保護法」,資訊法務透析,38-53。zh_TW
dc.relation.reference (參考文獻) 黃河明(2000),「由資訊科技觀點看知識管理」,知識管理:方法與系統研討會, http://ceiba.cc.ntu.edu.tw/km/km_conference/ keynote_ speech.htm。zh_TW
dc.relation.reference (參考文獻) 黃俊英 (1997),行銷管理,台北:華泰。zh_TW
dc.relation.reference (參考文獻) 楊正宏(2000),電子商務之經營策略,文魁資訊。zh_TW
dc.relation.reference (參考文獻) 楊亨利、邱顯貴(2001),「台灣地區電子商務隱私權保護之現況探討」,中華管理評論,4(1),101-118。zh_TW
dc.relation.reference (參考文獻) 葉重新(1999),心理測驗,台北:三民書局。zh_TW
dc.relation.reference (參考文獻) 熊愛卿(2000),網際網戶個人資料保護之研究,國立台灣大學法律學研究所博士論文。zh_TW
dc.relation.reference (參考文獻) 劉江彬(1988),資訊法論,二版,國立台灣大學法律叢書編輯委員會,台北:三民書局。zh_TW
dc.relation.reference (參考文獻) 鄭錫鍇(2001),「知識管理對政府部門人力資源管理之影響分析」,國政研究報告憲政(研)090-010號,財團法人國家政策研究基金會,http://www.npf.org.tw/publication/cl/090/cl-r-090-010.htm。zh_TW
dc.relation.reference (參考文獻) 盧希鵬(2001),E-Oscar 優質網站評估模式,網通國際。zh_TW
dc.relation.reference (參考文獻) 盧希鵬、蔡宗霖(2001),「探討消費者採用網路購物意願之影響因素」,台灣區網際網路研討會暨網路學習與繼續教育國際會議。zh_TW
dc.relation.reference (參考文獻) 盧蓓恩譯(1996),人際溝通─目標本位取向(Conary, D. and Cody, M. 1994. Interpersonal Communication: A Goals-Based Approach, St. Martin’s Press.),台北:五南。zh_TW
dc.relation.reference (參考文獻) 英文部分zh_TW
dc.relation.reference (參考文獻) Afuah, A. and Tucci, C.L. (2002). Internet Business Models and Strategies: Text and Cases, 2nd, McGraw-Hill.zh_TW
dc.relation.reference (參考文獻) Amit, R. and Schoemaker, P.J. (1993). “ Strategic Asset and Organization Rent,” Strategic Management Journal, 14, 33-46.zh_TW
dc.relation.reference (參考文獻) Ajzen, I. (1985). From Intention to Actions: A Theory of Planned Behavior, in J. Kuhl and J. Beckman (Eds.), Action Control: From Cognition to Behavior, NY: Springer-Verlag.zh_TW
dc.relation.reference (參考文獻) Ajzen, I. (1988). Attitudes, Personality and Behavior. Milton Keynes: Open University Press.zh_TW
dc.relation.reference (參考文獻) Ajzen, I. (1991). “The Theory of Planned Behavior,” Organizational Behavior and Human Decision Processes, 50, 179-211.zh_TW
dc.relation.reference (參考文獻) Anderson, M.N. and Morrow, M. (1997). “ Organization Capability: Creating Simplicity and Focus in Business Life,” Organization Development Journal, 15(1), 77.zh_TW
dc.relation.reference (參考文獻) Applegate, L. M., McFarlan, F. W., and McKenney J. L. (1999). Corporate Information Systems Management: Text and Cases, 5th ed., Irwin/McGraw-Hill.zh_TW
dc.relation.reference (參考文獻) Armstrong, A. and Hagel, J. (1996) "The Real Value of On-Line Communities," Harvard Business Review, 74 (May-June), 134-141.zh_TW
dc.relation.reference (參考文獻) Bachmann, R. (2001). “Trust, Power and Control in Trans-Organization Relations,” Organization Studies, 22(2), 337-.zh_TW
dc.relation.reference (參考文獻) Baier, A. (1986). “Trust and Antitrust,” Ethics, 96, 231-260.zh_TW
dc.relation.reference (參考文獻) Bandura, A. (1986). Social Foundations of Thought and Action, NJ: Prentice Hall.zh_TW
dc.relation.reference (參考文獻) Banerjee, D., Cronan, T. P., and Jones, T. W. (1998). “Modeling IT Ethics: A Studying in Situational Ethics,”MIS Quarterly, 31-60.zh_TW
dc.relation.reference (參考文獻) Banisar, D. (2000). “Privacy & Human Rights 2000,” http://www.privacyinternational.org/survey/index2000.html.zh_TW
dc.relation.reference (參考文獻) Barber, B. (1983). The Logic and Limits of Trust, New Brunswick, NJ: Rutgers University Press.zh_TW
dc.relation.reference (參考文獻) Barlow, J. P. (1994).“The Economy of Ideas,”http://www.wired.com/archive.zh_TW
dc.relation.reference (參考文獻) Barney, J. (1991). “Firm Resources and Sustained Competitive Advantage,” Journal of Management, 17, 99-120.zh_TW
dc.relation.reference (參考文獻) Barney, J. and Hansen, M. (1994). “Trustworthiness as a source of competitive advantage,” Strategic Management Journal, 15(Winter Special Issue), 175-190.zh_TW
dc.relation.reference (參考文獻) Baumhart, R.C. (1961). “How Ethical are Businessmen?” Harvard Business Review, 39(July-August), 156-176.zh_TW
dc.relation.reference (參考文獻) Bhattacherjee, A. (2002). “Individual Trust in Online Firms: Scale Development and Initial Test,” Journal of Management Information Systems, 19(1), 211-241.zh_TW
dc.relation.reference (參考文獻) Biggs, M. (2000). “Web Privacy Standard P3P Takes Steps to Address Concerns of Business, Consumers,”InfoWorld, 22, p.49.zh_TW
dc.relation.reference (參考文獻) Blakeney, R. N. (1986) “A Transactional View of the Role of Trust in Organizational Communication,” Transactional Analysis Journal, 16, 95-98.zh_TW
dc.relation.reference (參考文獻) Bommer, M., Gratto, C., Gravander, J., and Tuttle, M. (1987). “A Behavior Model Ethical and Unethical Decision Making,” Journal of Business Ethics, 265-280.zh_TW
dc.relation.reference (參考文獻) Bonoma, T. V. (1976). “Conflict, Cooperation, and Trust in Three Power Systems,” Behavioral Science, 21(6), 499-514.zh_TW
dc.relation.reference (參考文獻) Boss, R. W. (1978). “Trust and Managerial Problem Solving Revisited,” Group and Organization Studies, 3, 331-342.zh_TW
dc.relation.reference (參考文獻) Boyle, R. and Bonacich, P. (1970). “The Development of Trust and Mistrust in Mixed-Motive Games,” Sociometry, 33, 123-139.zh_TW
dc.relation.reference (參考文獻) Brin, D. (1998). The Transparent Society: Will Technology Focus Us to Choose between Privacy and Freedom, Addison-Wesley.zh_TW
dc.relation.reference (參考文獻) Bruce, W. (1994). “Ethical People are Productive People,” Public Productivity & Management Review, 17(3), 241-253.zh_TW
dc.relation.reference (參考文獻) Butler, J. K. (1983). “Reciprocity of Trust between Professionals and their Secretaries,” Psychological Report, 53, 411-416.zh_TW
dc.relation.reference (參考文獻) Butler, J. K., and Cantrell, R. S. (1984). “A Behavioral Decision Theory Approach to Modeling Dyadic Trust in Superiors and Subordinates,”Psychological Reports, 55, 19-28.zh_TW
dc.relation.reference (參考文獻) Butler, J. K. (1991).“Toward Understanding and Measuring Conditions of Trust: Evolution of a Conditions of Trust Inventory,”Journal of Management, 17, 643-663.zh_TW
dc.relation.reference (參考文獻) Charters, D. (2002). “Electronic Monitoring and Privacy Issues in Business-Marketing: The Ethics of the DoubleClick Experience,” Journal of Business Ethics, 35(4), 243-254.zh_TW
dc.relation.reference (參考文獻) Cheskin Research and Studio Archetype/Sapient Report (1999). “E-commerce Trust Study,” http://www.sapient.com/cheskin.zh_TW
dc.relation.reference (參考文獻) Chiles, T. H. and McMackin, J. F. (1996). “Integrating Variable Risk Preferences, Trust and Transaction Cost Economics,” Academy of Management Journal, 21(1), 73-99.zh_TW
dc.relation.reference (參考文獻) Chiu, H.-K. and Yang, H.-L. (2003). “Knowledge Capital Accumulation and Value Creation: Based on Learning and Relationship Network Theories,” Journal of Cyber Culture and Information Society, 4, 19-52.zh_TW
dc.relation.reference (參考文獻) Cho, H. and LaRose, R. (1999). “Privacy Issues in Internet Surveys,” Social Science Computer Review, 17(4), 421-434.zh_TW
dc.relation.reference (參考文獻) Chwelos, P., Benbasat, I., and Dexter, A.S. (2001). “Research Report: Empirical Test of an EDI Adoption Model," Information System Research, Sept.zh_TW
dc.relation.reference (參考文獻) Clarke, R (1999a). “Introduction to Dataveillance and Information Privacy and Definitions of Terms.” http://www.anu.edu.au/people/Roger.Clarke/DV /Intro.html.zh_TW
dc.relation.reference (參考文獻) Clarke, R. (1999b). “Internet Privacy Concerns Confirm the Case for Intervention,” Communication of the ACM, 42, 60-67.zh_TW
dc.relation.reference (參考文獻) Cohen, D. and Prusak, L. (2000). In Good Company: How Social Capital Makes Organizational Work, Harvard Business School Press.zh_TW
dc.relation.reference (參考文獻) Coleman, J.S.(1990). Foundations of Social Theory, Cambridge, Mass.: Harvard University Press.zh_TW
dc.relation.reference (參考文獻) Cook, J., and Wall, T. (1980).“New Work Attitude Measures of Trust, Organizational Commitment, and Personal Need Nonfulfillment,”Journal of Occupational Psycholo, 53, 39-52.zh_TW
dc.relation.reference (參考文獻) Cozby, P. C. (1973). “Self-Disclosure: A Literature Review,”Psychological Bulletin, 79, 73-91.zh_TW
dc.relation.reference (參考文獻) Croteau, Anne-Marie and Li, Peter. (2003). “Critical Success Factors of CRM Technological Initiatives,” Canadian Journal of Administrative Sciences, 20(1), 21-34.zh_TW
dc.relation.reference (參考文獻) Culnan, M. (1999a). “Georgetown Internet Privacy Policy Survey: Report to the Federal Trade Commission,” http://www.epic.org/privacy/.zh_TW
dc.relation.reference (參考文獻) Culnan, M. (1999b).“Privacy and the Top 100 Web Sites: Report to the Federal Trade Commission,” http://www.epic.org/privacy/.zh_TW
dc.relation.reference (參考文獻) Culnan, M. (2000). “Protecting Privacy Online: Is Self-Regulation Working?” Journal of Public Policy & Marketing; 19(1), 20-26.zh_TW
dc.relation.reference (參考文獻) Dayal, S., Landesberg, H., and Zeisser, M. (1999).“How to Build Trust Online,”Marketing Management, 8(3), 64-69.zh_TW
dc.relation.reference (參考文獻) Delgado-Ballester, E. and Munuera-Aleman, J. L. (2001). “Brand Trust in the Context of Consumer Loyalty,” European Journal of Marketing, 35(11-12), 1238-1258.zh_TW
dc.relation.reference (參考文獻) Derlega, V., Metts, S., Petronio, S., and Margulis, S. (1993). Self-Disclosure, CA: Sage.zh_TW
dc.relation.reference (參考文獻) Deutsch, M. (1960)“The Effect of Motivational Orientation upon Trust and Suspicion,”Human Relations, 13, 123-140.zh_TW
dc.relation.reference (參考文獻) Doney, P.M. and Cannon, J.P. (1997). “An Examination of the Nature of Trust in Buyer-Seller Relationships,” Journal of Marketing, 61(2), 35-51.zh_TW
dc.relation.reference (參考文獻) Driscoll, J. W. (1978). “Trust and Participation in Organizational Decision Making as Predictors of Satisfaction,” Academy of Management Journal, 21, 44-56.zh_TW
dc.relation.reference (參考文獻) Duff, W. M., Smieliauskas, W., and Yoos, H. (2001). “Protecting Privacy,”Information Management Journal, 35(2), 14-30.zh_TW
dc.relation.reference (參考文獻) Dunn, M. H. (1988). “Trust and Political Agency,” in D.Gambetta (Ed.), Trust: Making and Breaking Cooperative Relations, 73-93. New York: Blackwell.zh_TW
dc.relation.reference (參考文獻) Dwyer, F.R., Schurr, P.H., and Oh, S. (1987). “Developing Buyer-Seller Relationships,” Journal of Marketing, 51,11-27.zh_TW
dc.relation.reference (參考文獻) Earle, T.C. and Cvetkovice, G.T. (1995). Social Trust: Toward a Cosmopolitan, CT: Praeger Publishers.zh_TW
dc.relation.reference (參考文獻) Egan, J. (2001). Relationship Marketing: Exploring Relational Strategies in Marketing, Pearson Education.zh_TW