Reference: | 林永宏,2014,從影響行動裝置資安風險並未展現之因素探討未來行動裝置發展之研究,銘傳大學資訊管理碩士在職專班畢業論文 蔡佾潔,2012,資訊能力影響智慧型手機病毒知覺與資訊安全信任之研究,國立中興大學科技管理研究所碩士論文 徐鵬翔,2012,智慧型手機使用滿意度與品牌忠誠度之研究,國立中山大學資訊管理學系碩士論文 吳凱群,鄒仁淳,林娟娟,2012,智慧型手機使用者下載軟體意願之研究-以享樂型應用軟體為例,東吳大學資訊管理學系,文化大學資訊管理學系論文 Hunter D.R. (2002).Risk Perception and Risk Tolerance in Aircraft Pilots. National Technical Information Service, Springfield Ajzen, I., and Fishbein, M. (1980). Understanding Attitudes and Predicting Social Behavior, Englewood Cliffs, NJ: Prentice-Hall. Anderson, C. L., and Agarwal, R. (2010). Practicing safe computing: A multimedia empirical examination of home computer user security behavioral intentions. MIS Quarterly, 34(3), 613-643 Arachchilage, N. A. G., and Love S. (2013). A game design framework for avoiding phishing attacks, Computers in Human Behavior 29, 706–714 Baghdassarian S, Milanesi C. (2010). Forecast: mobile application stores, world-wide, 2008-14. Tec Report G00209676. Gartner. Bettman, J. (1971). The structure of consumer choice processes, Journal of Marketing Research, 8, 465-471. Chang, K. S. 2013, Can Smartphones Get Virus/Viruses and Malware? iPhone / Android Phone Only as Smart as Their Users in Malware Detection, retrieved on 12/24/2013 from http://kschang.hubpages.com/hub/Do-Smartphones-Get-Viruses-Why-iPhones-Android-Phones-and-Others-Are-Only-as-Smart-as-Their-Users Chase, R. B., Jacobs, F. R., Aquilano, N. J. (2004). Production and Operations Management: Manufacturing and Services. McGraw-Hill, New York. Constant, D., Kiesler, S., and Sproull, L. (1994). What`s mine is ours, or is it? A study of attitudes about information sharing, Information Systems Research 5(4), 400-421. Cox, D. F. (1967). Risk Taking and Information Handling in Consumer Behavior, Harvard University Press, Boston. Cummings, L. L., and Schwab, D. P. (1973). Performance in Organizations. Scott, Foresman and Company, Glenview, IL. Dagon, D., Martin, T., Starner, T. (2004). Mobile phones as computing devices: The viruses are coming! IEEE Pervasive Computing, 3(4), 11–15. Davis, F. D. (1989). Perceived usefulness, perceived ease of use, and user acceptance of information technologies, MIS Quarterly, 13(3), 319-340. Dowling, G. R. (1986). Perceived risk: The concept and its measurement, Psychology & Marketing, 3(3), 193-210. Egelman, S., Felt, A. P., and Wagner, D. (2013). Choice architecture and smartphone privacy: There’s a price for that, at The Economics of Information Security and Privacy, ed. Böhme, R., Springer, New York, 211-236. Enck., W. (2011). Defending users against smartphone apps: Techniques and future directions, ICISS 2011, LYNC 7093, 49-70. Featherman, M. S., & Pavlou, P. A. (2003). Predicting E-Services Adoption: A Perceived Risk Facets Perspective. International Journal of Human-Computer Studies, 59(4), 451-474. Felt, A. P., Egelman, S., and Wagner, D. (2012). I’ve got 99 problems, but vibration ain’t one: A survey of smartphone users’ concerns. Proceedings of SPSM’ 12, 33-38. Felt A, Finifter M, Chin E, Hanna S, and Wagner D. A. (2011). Survey of mobile malware in the wild. Proc. of the 1st ACM workshop on security and privacy in smartphones and mobile devices (SPSM ’11). ACM, 3-14. Filbeck, G., Hatfield, P., & Horvath, P. (2005). Risk Aversion and Personality Type. The Journal of Behavioral Finance, 6(4), 170-180. Filbeck, G., and Smith. L. (1996), Learning styles, teaching strategies, and predictors of success for students in corporate finance. Financial Practice and Education, 6(1), 74–85. Fingas, J., 2013, Android tops 81 percent of smartphone market share in Q3, retrieved on 12/24/2013 from http://www.engadget.com/2013/10/31/strategy-analytics-q3-2013-phone-share/ Gao, T., Rohm, A. J., Sultan, F., and Huang, S. (2012). Antecedents of consumer attitudes toward mobile marketing: A comparative study of youth markets in the United States and China. Thunderbird International Business Review,54, 211-224 Gartner, (2013). Gartner Says Worldwide Mobile Phone Sales Declined 1.7 Percent in 2012, retrieved on 12/28/2013 from: http://www.gartner.com/newsroom/id/2335616 Gartner, (2013). Gartner Says Smartphone Sales Accounted for 55 Percent of Overall Mobile Phone Sales in Third Quarter of 2013, retrieved on 12/28/2013 from: http://www.gartner.com/newsroom/id/2623415 Goldratt, E. M. (1999). Theory of Constraints. North River Press, Great Barrington, MA. Gross, G. (2007). Groups raise concerns about cybersecurity standards, PC World, April 25. Howard, J. A., and Sheth, J. N. (1969). The Theory of Buyer Behavior, Wiley, New York. Hunter, D. R. (2002). Risk Perception and Risk Tolerance in Aircraft Pilots. Retrieved from http://ntl.bts.gov/lib/19000/19800/19856/PB2003100818.pdf Jiang, P. (2009). Consumer adoption of mobile internet services: An exploratory study. Journal of Promotion Management, 15(3), 418-454. Johnston, A. C., and Warkentin, M. (2010). Fear appeals and information security behaviors: an empirical study. MIS Quarterly, 34(3), 549-566. Kim, J. (2012). Developing an empirical model of college students` online shopping behavior. International Journal of Interdisciplinary Social Sciences, 6(10), 81-109. Lee, H., Cho, H. J., Xu, W., and Fairhurst, A. (2010). The influence of consumer trait and demographics on intention to use retail self-service checkouts, Marketing Intelligence & Planning 28(1), 46-58. Lu, H., Hsu, C., and Hsu, H. (1993). An empirical study of the effect of perceived risk upon intention to use online applications. Information Management & Computer Security, 13(2), 106-120. MacKenzie, S. B., Podsakoff, P.M., and Podsakoff, N. P. (2011). Construct measurement and validation procedures in MIS and behavioral research: Integrating new and existing techniques, MIS Quarterly, 35(2), 293-234. Malkiel, B. A. (1996). Random Walk Down Wall Street, 6th ed. W.W. Norton, New York. Marketsandmarkets, (2011). Global Smartphone Security Market by Operating Systems, Ownership & Features (2011 – 2016), retrieved on 12/28/2013 from: http://www.marketsandmarkets.com/Market-Reports/world-computer-mobile-antivirus-market-156.html Matsubara, M. (2012). A long and winding road for cybersecurity cooperation, Harvard Asia Quarterly, 14(1/2), 103-111. Mylonas, A., Kastania, A., and Gritzalis, D. (2013). Delegate the smartphone user? Security awareness in smartphone platforms. Computers & Security, 34, 47-66 Pavlou, P. A. (2003). Consumer acceptance of electronic commerce: integrating trust and risk with the technology acceptance Model. International Journal of Electronic Commerce, 7(3), 101-134. Riedl, E. J. (2004). An examination of long-loved asset impairments, The Accounting Review, 79(3), 823-852. Rogers, R. (1975). A Protection motivation theory of fear appeals and attitude change,” Journal of Psychology, 91, 93-114. Schaninger, C. M. (1976). Perceived Risk and Personality. Journal of Consumer Research, 3(2), 95-100. Siemsen, E., Roth, A. V. , Balasubramanian, S. (2008). How motivation, opportunity, and ability drive knowledge sharing: The constraining-factor model, Journal of Operations Management, 26(3), 426-445. Sitkin, S. B., and Pablo, A. L. (1992). Reconceptualizing the determinants of risk behavior. The Academy of Management Review, 17(1), 9-38. Symantec Corp. (2013) Internet Security Threat Report 2013, Appendix, Vol. 18 Kay, B., Shah, J., and Verma, A., 2013, Mobile Security: McAfee consumer Trends Report Tan, S. J. (1999). Strategies for reducing consumers` risk aversion in internet shopping, Journal of Consumer Marketing, 16(2), 163-180. Terborg, J. R. (1977). Validation and extension of an individual differences model of work performance. Organizational Behavior and Human Performance, 18(2), 188-216. Venkatesh, V., Thong, J. Y. L., and Xu, X. (2012). Consumer acceptance and use of information technology: Extending the unified theory of acceptance and use of technology, MIS Quarterly, 36 (1), 157-178. Verkasalo, H., López-Nicolás, C., Molina-Castillo, F. J., and Bouwman, H. (2010). Analysis of users and non-users of smartphone applications, Telematics and Informatics, 27(3), 242-255. Wang, HY, Liao, C., and Yang, L-H (2013). What Affects Mobile Application Use? The Roles of Consumption Values. International Journal of Marketing Studies, 5(2), 1918-7203. |