Tang, Jih-Hsin
|
Academic Position
|
Associate Professor
|
|
Name
|
Tang, Jih-Hsin
|
|
Office
|
承835
|
|
Tel
|
2322-6591
|
|
E-mail
|
|
|
Research Field
|
Internet Marketing, Cyberpsychology
|
|
Education
|
PhD, National Chengchi University
|
|
Courses
|
MIS, Internet marketing
|
|
Honors & Experience
|
|
|
Referred Paper
|
1. 翁振福、唐日新、范錚強(1997),「台灣企業電腦化成長階段模式之適域化研究」,資訊管理學報,第三卷,第二期,pp.75-87,中華民國資訊管理學會。
2. 唐日新, 李坤清,邱孟佑,吳慧娟,楊亨利(2001),「資料連結的研究-以交通事故資料與死因資料為例」,資訊醫療雜誌,第13期,pp. 1-22。
3. Yang, Heng-Li, Tang, Jih-Hsin (2003), “Effects of Social Network on Students’ Performance: A Web-based Forum Study in Taiwan”, Journal of Asynchronous Learning Network, Vol. 7, No. 3, September 2003, pp. 93-107.
4. Yang, Heng-Li, Tang, Jih-Hsin (2003), “A Three-Stage Model of Requirements Elicitation for Web-based Information Systems”, Industrial Management & Data Systems, 103, 6, pp. 398-409.
5. Kwo-Shing Hong, Yen-Ping Chi, Louis R. Chao and Jih-Hsin Tang (2003),
An Integrated System Theory of Information Security Management, Information Management & Computer Security, 11, 5, pp. 243-248, 2003.
6. Yang, Heng-Li, Tang, Jih-Hsin (2003), “Team Structure and Team Performance in IS Development: A Social Network Perspective”, Information & Management, Vol. 41, No. 3, Jan. 2004, pp. 335-349.
7. Tang, Jih-Hsin, Farn, C.K. (2005), “The effect of interpersonal influence on softlifting intention and behavior”, Journal of Business Ethics, 56, pp. 149-161
8. Yang, Heng-Li, Tang, Jih-Hsin, (2005), “Key User Roles on Web-based Information Systems Requirements”, Industrial Management & Data Systems,105, 5, pp. 577-595.
9. Tang, Jih-Hsin, Yang, Heng-Li, (2005), “User Role and Perception of Requirements in a Web-based Community of Practice”, Online Information Review, 29, 5, pp. 499-512.
10. Kwo-Shing Hong, Yen-Ping Chi, Louis R. Chao and Jih-Hsin Tang (2006), “An empirical study of information security policy on information security elevation in Taiwan”, Information Management & Computer Security, 14, 2, pp.104 – 115.
11. 唐日新, 葉耀仁, 應用推敲可能性模型探討部落格行銷效果:以旅遊部落格為例 (2011), 中山管理評論, 19, 3, 517-555 .
12. 費彥霖, 唐日新, 廖淯任 (2011), 繁體中文文章之剽竊偵測工具實作, 資訊管理學報, 18, 1, 25-52.
13. Ko-Tsung Chu, Sheng-Ming Wang, Jia-Li Hou, Jih-Hsin Tang, Jyh-Jian Sheu (2012),” Customer Behavior Analysis by Using Multiple Databases: A Case of University Students’ Use of Online Bookstore Services”, Journal of Internet Technology, Journal of Internet Technology, 12,1, pp. 891-907.
14. Tang, Jih-Hsin; Wang, Cheng-Chung (2012),Self-disclosure among bloggers: re-examination of social penetration theory, Cyberpsychology Behavior and Social Networking,15, 5, pp. 245-250.
15. Jih-Hsin Tang, Min-Chu Hsu, Ting-Yuan Hu, Hsing-Hua Huang (2014), A General Domain Name Appraisal Model, Journal of Internet Technology, 15, 3, pp. 427-432.
|
|
Conference Paper
|
1. Spamming or Hamming?: An Empirical Investigation of the Moral Intensity of E-mail Spamming Behaviors. IMSA 2005: 259-263.
2. A Preliminary Study on the Blogger’s Social Networks and the Word-of-Mouth Effects, General Online Research 2007, Leipzig, Germany.
3. 應用推敲可能性理論模式(ELM)於部落格口碑行銷效果-以旅遊部落格為例」,管理與技術國際研討會, 2008資訊管理技術與實務應用發展暨資訊人才培育研討會, 台北,聖約翰科技大學。
4. A Study on Bloggers’ Social Networks(Abstract), 13th Asia Pacific Region of Decision Science Institute Annual Meeting , Brisbane, Australia, 2008.
5. A Measurement Model on Bloggers' Self-Disclosure", IADIS international conference Web based communities, Algarve, Portugal, June, 2009.
6. 社群網站及交易網站的隱私關注:Facebook與露天拍賣之比較,第十三屆電子商務研討會,台北。
7. eWOM、品牌知名度以及來源可信度對數位商品採購之影響-以線上音樂為例,第十三屆電子商務研討會,台北。
8. “Comparing Online Users’ Privacy Concerns: Facebook vs Ruten.com”, IADIS international conference e-Commerce, Freiburg, Germany, July, 2010.
|
|
Book & other
|
|
