Journal of Information ManagementVol. 19 iss. 4
楊亨利;王湘嵐;
頁: 653-679
日期: 2012/10
關鍵字: Message Intention;Message Framing;Message Acceptance;Message Trust;
Keywords: Message Intention;Message Framing;Message Acceptance;Message Trust;
摘要: Due to the characteristics of immediateness and convenience, accessing information through Internet has become an important approach for people who need information. However, in cyberspace, the participants usually don't know each other. Anonymity so...
瀏覽次數: 18079 下載次數: 6980
引用 導入Endnote
頁: 653-679
日期: 2012/10
關鍵字: Message Intention;Message Framing;Message Acceptance;Message Trust;
Keywords: Message Intention;Message Framing;Message Acceptance;Message Trust;
摘要: Due to the characteristics of immediateness and convenience, accessing information through Internet has become an important approach for people who need information. However, in cyberspace, the participants usually don't know each other. Anonymity so...
瀏覽次數: 18079 下載次數: 6980
引用 導入Endnote
孫思源;趙珮如;陳淑琳;
頁: 681-708
日期: 2012/10
關鍵字: Trust dynamic development;knowledge sharing;agent theory;punctuated equilibrium theory;organization behavior;
Keywords: Trust dynamic development;knowledge sharing;agent theory;punctuated equilibrium theory;organization behavior;
摘要: This study explores how group behavior influences knowledge sharing by conducting a process of trust dynamics development. Whether different degrees of trust among team members differ in terms of the operational development of socialization and natur...
瀏覽次數: 19537 下載次數: 659
引用 導入Endnote
頁: 681-708
日期: 2012/10
關鍵字: Trust dynamic development;knowledge sharing;agent theory;punctuated equilibrium theory;organization behavior;
Keywords: Trust dynamic development;knowledge sharing;agent theory;punctuated equilibrium theory;organization behavior;
摘要: This study explores how group behavior influences knowledge sharing by conducting a process of trust dynamics development. Whether different degrees of trust among team members differ in terms of the operational development of socialization and natur...
瀏覽次數: 19537 下載次數: 659
引用 導入Endnote
3. Effects of Browsing Experience on Loyal Behavior Intentions-The Moderating Effect of Article Categories
李淑芳;陳首志;
頁: 709-738
日期: 2012/10
關鍵字: Browsing Experience;Experiential Value;Loyal Behavior Intention;
Keywords: Browsing Experience;Experiential Value;Loyal Behavior Intention;
摘要: The Internet platform of social media has developed rapidly in recent years. In tourism, the blog-based travel experience sharing has become an important platform for obtaining information. A travel blog provides visitors valuable travel information ...
瀏覽次數: 22564 下載次數: 328
引用 導入Endnote
頁: 709-738
日期: 2012/10
關鍵字: Browsing Experience;Experiential Value;Loyal Behavior Intention;
Keywords: Browsing Experience;Experiential Value;Loyal Behavior Intention;
摘要: The Internet platform of social media has developed rapidly in recent years. In tourism, the blog-based travel experience sharing has become an important platform for obtaining information. A travel blog provides visitors valuable travel information ...
瀏覽次數: 22564 下載次數: 328
引用 導入Endnote
4. Constructing Highly Secure Wireless Local Area Networks Based on Honeypot and Vulnerability Scan Techniques
曹偉駿;黃偉智;蔡欣潔;
頁: 739-767
日期: 2012/10
關鍵字: Network Security;Wireless Local Area Networks;Honeypot;Vulnerability Scan;
Keywords: Network Security;Wireless Local Area Networks;Honeypot;Vulnerability Scan;
摘要: With the information explosion and technological progress, the applications of networks have already been bound up with our daily life. Meanwhile, security problems have arisen following this. Although there are many security tools that can successfu...
瀏覽次數: 17407 下載次數: 260
引用 導入Endnote
頁: 739-767
日期: 2012/10
關鍵字: Network Security;Wireless Local Area Networks;Honeypot;Vulnerability Scan;
Keywords: Network Security;Wireless Local Area Networks;Honeypot;Vulnerability Scan;
摘要: With the information explosion and technological progress, the applications of networks have already been bound up with our daily life. Meanwhile, security problems have arisen following this. Although there are many security tools that can successfu...
瀏覽次數: 17407 下載次數: 260
引用 導入Endnote
王尉任;黃正達;黃翔偉;王旭正;
頁: 769-784
日期: 2012/10
關鍵字: Information hiding;QR code;bar code;vector quantization;
Keywords: Information hiding;QR code;bar code;vector quantization;
摘要: In this paper, we proposed a scheme of double type data hiding, where the security, imperceptible, and high embedding capacity are achieved. In our scheme, the secret data are firstly processed into QR code with encrypted. Then, the QR code of the se...
瀏覽次數: 14562 下載次數: 6767
引用 導入Endnote
頁: 769-784
日期: 2012/10
關鍵字: Information hiding;QR code;bar code;vector quantization;
Keywords: Information hiding;QR code;bar code;vector quantization;
摘要: In this paper, we proposed a scheme of double type data hiding, where the security, imperceptible, and high embedding capacity are achieved. In our scheme, the secret data are firstly processed into QR code with encrypted. Then, the QR code of the se...
瀏覽次數: 14562 下載次數: 6767
引用 導入Endnote