Jump to the main content block

Tang, Jih-Hsin

Academic Position

 

Associate Professor

 

Name

 

Tang, Jih-Hsin

 

Office

 

835

 

Tel

 

2322-6591

 

E-mail

 

jefftang@ntub.edu.tw

 

Research Field

 

Internet Marketing, Cyberpsychology

 

Education

 

PhD, National Chengchi University

 

Courses

 

MIS, Internet marketing

 

Honors & Experience

 

 

Referred Paper

 

1.     翁振福、唐日新、范錚強(1997),「台灣企業電腦化成長階段模式之適域化研究」,資訊管理學報,第三卷,第二期,pp.75-87,中華民國資訊管理學會。

 

2.     唐日新, 李坤清,邱孟佑,吳慧娟,楊亨利(2001),「資料連結的研究-以交通事故資料與死因資料為例」,資訊醫療雜誌,第13期,pp. 1-22

 

3.     Yang, Heng-Li, Tang, Jih-Hsin (2003), “Effects of Social Network on Students’ Performance: A Web-based Forum Study in Taiwan”, Journal of Asynchronous Learning Network, Vol. 7, No. 3, September 2003, pp. 93-107.

 

4.     Yang, Heng-Li, Tang, Jih-Hsin (2003), “A Three-Stage Model of Requirements Elicitation for Web-based Information Systems”, Industrial Management & Data Systems, 103, 6, pp. 398-409.

 

5.     Kwo-Shing Hong, Yen-Ping Chi, Louis R. Chao and Jih-Hsin Tang (2003),

 

An Integrated System Theory of Information Security Management, Information Management & Computer Security, 11, 5, pp. 243-248, 2003.

 

6.     Yang, Heng-Li, Tang, Jih-Hsin (2003), “Team Structure and Team Performance in IS Development: A Social Network Perspective”, Information & Management, Vol. 41, No. 3, Jan. 2004, pp. 335-349.

 

7.     Tang, Jih-Hsin, Farn, C.K. (2005), “The effect of interpersonal influence on softlifting intention and behavior”, Journal of Business Ethics, 56, pp. 149-161

 

8.     Yang, Heng-Li, Tang, Jih-Hsin, (2005), “Key User Roles on Web-based Information Systems Requirements”, Industrial Management & Data Systems,105, 5, pp. 577-595.

 

9.     Tang, Jih-Hsin, Yang, Heng-Li, (2005), “User Role and Perception of Requirements in a Web-based Community of Practice”, Online Information Review, 29, 5, pp. 499-512.

 

10.   Kwo-Shing Hong, Yen-Ping Chi, Louis R. Chao and Jih-Hsin Tang (2006), “An empirical study of information security policy on information security elevation in Taiwan”, Information Management & Computer Security, 14, 2, pp.104 – 115.

 

11.   唐日新, 葉耀仁, 應用推敲可能性模型探討部落格行銷效果:以旅遊部落格為例 (2011), 中山管理評論, 19, 3, 517-555 .

 

12.   費彥霖, 唐日新, 廖淯任 (2011), 繁體中文文章之剽竊偵測工具實作, 資訊管理學報, 18, 1, 25-52.

 

13.   Ko-Tsung Chu, Sheng-Ming Wang, Jia-Li Hou, Jih-Hsin Tang, Jyh-Jian Sheu (2012),” Customer Behavior Analysis by Using Multiple Databases: A Case of University Students’ Use of Online Bookstore Services”, Journal of Internet Technology, Journal of Internet Technology, 12,1, pp. 891-907.

 

14. Tang, Jih-Hsin; Wang, Cheng-Chung (2012),Self-disclosure among bloggers: re-examination of social penetration theory, Cyberpsychology Behavior and Social Networking,15, 5, pp. 245-250.

 

15. Jih-Hsin Tang, Min-Chu Hsu, Ting-Yuan Hu, Hsing-Hua Huang (2014), A General Domain Name Appraisal Model, Journal of Internet Technology, 15, 3, pp. 427-432.

 

 

Conference Paper

 

1.     Spamming or Hamming?: An Empirical Investigation of the Moral Intensity of E-mail Spamming Behaviors. IMSA 2005: 259-263.

 

2.     A Preliminary Study on the Blogger’s Social Networks and the Word-of-Mouth Effects, General Online Research 2007, Leipzig, Germany.

 

3.     應用推敲可能性理論模式(ELM)於部落格口碑行銷效果-以旅遊部落格為例」,管理與技術國際研討會, 2008資訊管理技術與實務應用發展暨資訊人才培育研討會, 台北,聖約翰科技大學。

 

4.     A Study on Bloggers’ Social Networks(Abstract), 13th Asia Pacific Region of Decision Science Institute Annual Meeting , Brisbane, Australia, 2008.

 

5.     A Measurement Model on Bloggers' Self-Disclosure", IADIS international conference Web based communities, Algarve, Portugal, June, 2009.

 

6.     社群網站及交易網站的隱私關注:Facebook與露天拍賣之比較,第十三屆電子商務研討會,台北。

 

7.     eWOM、品牌知名度以及來源可信度對數位商品採購之影響-以線上音樂為例,第十三屆電子商務研討會,台北。

 

8.     “Comparing Online Users’ Privacy Concerns: Facebook vs Ruten.com”, IADIS international conference e-Commerce, Freiburg, Germany, July, 2010.

 

Book & other

 

 

Login Success