• 沒有找到結果。

後續研究建議

在文檔中 中 華 大 學 博 士 論 文 (頁 148-171)

第七章 結論與建議

7.3 後續研究建議

132

已令人分不清究竟是藝術模仿生活還是生活模仿藝術。總之,只要時機適當,

「發災難財」並非一定是不具道德意識的行銷途徑,業者在謹慎運作恐怖事 件之餘,還很可能在娛樂的作用上一躍成為「民族救星」!

本研究雖以慣常被作為科技預測的情境分析法來敘說探究恐怖主義對管 理的衝擊,但其重點並非要預測未來,而是要對未來的可能發展做出比競爭 者更好的準備,並妥善管理更多常見的企業風險。若人類智慧無法斷絕恐怖 主義的形成,那麼一場永無止境的技術發展與恐怖主義間的循環關係,將如 同本論文所提出的因果迴路圖,不斷的重複發生。從而可知,恐怖主義確實 會為科技管理帶來機會與挑戰,未來當我們享受著這些發展的成果時,回頭 檢視本文敘說探究的情境,對於當時的科技產品與管理行為產生的緣由,理 當頗具一番感悟才是。

133

對於恐怖主義對服務業所造成的衝擊,未來便可從事比本研究更深入的探 討。總之,只要恐怖主義一日無消失的可能,各式組織與事件參與者便將身 處其所可能衍生的風險中,於是這一領域的研究便有持續存在的必要,唯有 在管理上找出應因措施,方能改善效率與追求效能。

134

參考文獻

1. 伍忠賢(2006),「科技管理」,五南出版社。

2. 宋一之譯,古是三春著(2002),「自殺式恐怖活動分析報告」,收錄《對 美國九一一事件及反恐戰爭研究論文專輯》,國防大學彙編,史政編譯室,

第 505 頁。

3. 胡幼慧、姚美華(1996),「質性研究――理論、方法及本土女性研究實例:

一個質性方法上的思考」,巨流圖書公司。

4. 陶在樸(1999),「系統動態學――直擊『第五項修鍊』奧祕」,五南出版社。

5. 國 家 圖 書 館 / 全 國 博 碩 士 論 文 資 訊 網 , http://etds.ncl.edu.tw/theabs/index.jsp,2005 年 6 月 9 日。

6. 陳澤義(2005),「科技管理:理論與應用」,華泰書局。

7. 蔡 東 杰 (2004) ,「 第 三 世 界 問 題 與 恐 怖 主 義 發 展 」,

www.peaceforum.org.tw/onweb.jsp?webno=33333332:5&webitem_no=909,

2004 年 9 月 14 日。

8. 潘淑滿(2003),「質性研究:理論與應用」,心理出版社,第 82 - 83 頁。

9. 賴士葆、謝龍發、陳松柏(2005),「科技管理」,華泰書局。

10. Addison, R. B. (1989), “Grounded Interpretive Research: An Investigation of Physician Socialization.” in M. J. Packer & R. B. Addison (eds.), Entering the Circle: Hermeneutic Investigation in Psychology. Albany: State University of New York Press. pp. 39-57.

11. Alexander, D. C. (2004), Business Confronts Terrorism: Risks and Responses.

University of Wisconsin Press, Madison, WI.

12. Alexander, D. (1993). Natural Disasters. NY: Chapman and Hall.

13. Alexander, Y., Valton, D., and Wilkinson, P. (1979). Terrorism: theory and practice. Westview Press, Boulder, CO., p.4.

14. Albrow, M. (1996), The Global Age, Cambridge: Polity Press.

15. Anderson, J. E., Marcouiller, D. (2002), “Insecurity and the pattern of trade:

an empirical investigation,” The Review of Economics and Statistics, Vol. 84, No. 2, pp. 342-352.

16. Anonymous. (2004), “Al-Qaeda Still Out There,” The Economist, Vol. 370, No. 8357, pp. 10-11.

135

17. Anonymous. (2005), “Bali takes another hit,” Business Asia, Vol. 37, No. 19, pp. 6-8.

18. Anonymous. (2005), “How HR can help in the aftermath of disaster. Human Resource Management International Digest,” Vol.13, No. 6, pp. 18-20.

19. Arquilla, J., Ronfeldt, D., and Zanini, M. (1999), Networks, Netwar, and Information-Age Terrorism, Rand Publications.

20. Arthur, J. B. (1994), “Effects of human resource systems on manufacturing performance and turnover,” Academy of Management Journal, Vol. 37, pp.

670-687.

21. Axford, B. (1995), The Global System, Cambridge: Polity Press.

22. Baalbaki, I. And Malhotra, N. (1995), “Standardization versus customization in international marketing: an investigation using bridging conjoint analysis,”

Journal of the Academy of Marketing Science, Vol. 23, No. 3, pp. 182-194.

23. Bahrami, H. (1992), “The emerging flexible organization: perspectives from silicon valley,” California Management Review, Vol. 34, No.4, pp. 33-52.

24. Barker, J. (2003), The No-Nonsense Guide to Terrorism, New Internationalist Publications Ltd., Oxford, UK.

25. Bali tourism devastated by terrorist bombings. (2005), CDNN Travel News, Dec. 2.

26. Banerjee, M. & Gillespie, D. (1994), “Strategy and organizational disaster preparedness,” Disasters, Vol. 18, pp. 344-354.

27. Barr, P. S. (1998), “Adapting to unfamiliar environmental events: A look at the evolution of interpretation and its role in strategic change,” Organization Science, Vol. 9, No. 6, pp. 644–667.

28. Bartlett, C. and Ghoshal, S. (1989), Managing Across Borders, Boston:

Harvard Business School Press.

29. Barton, L. and Hardigree, D. (1995), “Risk and crisis management in facilities:

Emerging paradigms in assessing critical incidents,” Facilities, Vol.

13, No.9,10, pp. 11-14.

30. Beck, U. (1999), What Is Globalization? Cambridge: Polity Press.

31. Benton, L. (1996), “From the world systems perspective to institutional world history: culture and economy in global theory,”Journal of World History, p. 7.

136

32. Behar-Horenstein, L. S. (1999), Narrative Research: Understanding Teaching and Teacher Thinking . In A. C. Ornstein & L. S. Behar-Horenstein (2ndEd.), Contemporary issues in curriculum. pp.90-102. U.S.A.: Allyn and Bacon.

33. Bennington, L. & Habir, A. D. (2003), “Human resource management in Indonesia,” Human Resource Management Review, 13(3), pp. 373-392.

34. Berger, P. L. and Huntington, S. P. (2002), Many Globalizations-Cultural Diversity in the Contemporary World, UK: Oxford University Press.

35. Betz, F. (1998), Managing Technological Innovation, NY: John Wiley & Sons, pp. 95-97.

36. Biggadike, E. R. (1981), “The contributions of markcting to strategic management,” Academy of Management Review, Vol. 6, pp. 621-632.

37. Birkinshaw, J., Nobel, R., and Ridderstrale, J., (2002), “Knowledge as a contingency variable: do the characteristics of knowledge predict organization structure,” Organization Science, Vol.13, No. 3, pp. 274-289.

38. Biometric Consortium (2005), Introduction to Biometrics, Available at:

http://www.biometrics.org/html/introduction.html.

39. Blyth, T. (2004), “Terrorism as Technology: A Discussion of the Theoretical Underpinnings.” Terrorism Research Centre, Inc.

40. Bogen, K. T. and Jones, E. D. (2006), “Risks of Mortality and Morbidity from Worldwide Terrorism: 1968-2004,” Risk Analysis, Vol. 26, No. 1, p. 45.

41. Bohn, R. E. (1994), “Measuring and Managing Technological Knowledge,”

Sloan Management Review, Fall, pp. 61-73.

42. Bonner, R. (2003), “US Links Indonesian Troops to Deaths of Two Americans,” New York Times, Jan. 30, p. A3.

43. Booth, I. M. (1993), “Corporations that confront the scourge of AIDS,”

Business and Society Review, No. 85, pp. 21-23.

44. Bowen, D. E., Galang, C., Pillai, R. (2002), “The role of human resource management: an exploratory study of cross-country variance,” Human Resource Management, Vol. 41, No. 1, pp. 103-122.

45. Branscomb, L. (2004), “Protecting Civil Society from Terrorism: the Search for a Sustainable Strategy,” Technology in Society, Vol. 26 No. 2-3, pp.

271-285.

46. Buck, G. (1998). Preparing for terrorism. Albany, NY: Del Mar Publishers.

137

47. Buckley, P. J., Casson, M. C. (1998), “Models of the multinational enterprise,”

Joumal of International Business Studies, Vol. 29, No. 1, pp. 21-44.

48. Carafano, J. J. (2005), “The Future of Anti-Terrorism Technologies,” Lecture at a Middle East Police Exhibition Conference held at the Dubai World Trade Center, Jan. 17.

49. Chen, N.F., Roli, R., Ross, S., (1986), “Economic forces and the stock market,” Joumal of Business, Vol. 59, No. 3, pp. 383-403.

50. Child, J., Chung, L., Davies, H., (2003), “The performance of cross-border units in China: a test of natural selection, strategic choice and contingency theories,” Journal of International Business Studies, Vol. 34, No. 3, pp.

242-254.

51. Chomsky, N. (2002), Pirates and Emperors-Old and New: International Terrorism in the Real World, Pluto Press.

52. Chow, J. T. (2005), “ASEAN Counterterrorism Cooperation Since 9/11,” Asian Survey. Berkeley: Vol. 45, No. 2, p.302.

53. Clandinin, D. J. and Connelly, F. M. (2000), Narrative Inquiry: Experience and Story in Qualitative Research. San Francisco: Jossey-bass.

54. Clark, T. (1988), “The concept of a marketing crisis,” Joumal of the Academy of Marketing Science, Vol. 16, No. 2, pp. 43 -49.

55. Clark, T., Varadarajan, P. R., & Pride, W. M. (1994), “Environmental management: The construct and research propositions,” Journal of Business Research, Vol. 29, pp. 23–38.

56. Cline R. S. and Alexander, Y. (1986), Terrorism : As State-Sponsored Covert Warfare. Virginia: Hero Book, p. 38.

57. Colema-Norton, P. R. (1986), “Zealot,” Encyclopedia Americana, 1986 ed.

58. Conant, J. D., Clark, T., Burnett, J. J., Zank, G., (1988). “Terrorism and travel:

managing the unmanageable,” Journal of Travel Research, pp. 16-20.

59. Connelly, F. M., & Clandinin, D. J. (1986), “On narrative method, biography, and narrative unities in the study of teaching,” Journal of Research in Science on Teaching, Vol. 24, No. 4, pp. 293-320.

60. Connolly, W. E. (1996), The Ethos of Pluralization, Minneapolis: University of Minnesota Press.

61. Contzen, J.P. (2002), The Role of Science and Technology in the

138

Reinforcement of Global Security and the Fight Against Terrorism, Talk presented at the 6th International Conference on Technology Policy and Innovation, Kyoto, Japan, pp. 12–15.

62. Cookc, D. (1995), “L.A. earthquake puts city disaster planning to the lest,”

Disaster Recovery Journal, Vol. 7, pp. 10-14.

63. Cutcher-Gershenfeld, J. (1991), “The impact on economic performance of a transformation in industrial relations,” Industrial and Labor Relations Review, Vol. 44, pp. 241-260.

64. Council on Foreign Relations, (2002), “America Still Unprepared-America Still In Danger,” NY: Council on Foreign Relations, Inc.

65. Crenshaw, M. (1990), “The causes of terrorism. In: Kegley, C. (Ed.), International Terrorism: Characteristics, Causes, Controls,” NY: St. Martin's Press.

66. Czinkota, M., Knight, G. A., and Liesch, P. W. (2004), Terrorism and international business: comeptual foundations. In: Suder, Gabriele (Ed.), Terrorism and the International Business Environment: The Security-Business Nexus Edward Elgar, Cheltenham.

67. Czinkota, M., Knight, G. A., and Liesch, P. W., and Steen, J. (2005),

“Positioning terrorism in management and marketing: Research propositions,”

Journal of International Management, Vol. 11, No. 4, pp. 581-604.

68. Dahlhamer, J. & D’Sousa, M. (1997), “Determinants of business disaster preparedness in two U.S. metropolitan areas,” International Journal of Mass Emergencies and Disasters, Vol. 15, pp. 265-281.

69. Das, T. K., & Teng, B. (1996), “Risk types and interfirm alliance structures,”

Academy of Management, pp. 11–15.

70. Davis, D., Morris, M., Allen, J. (1991), “Perceived environmental turbulence and its effect on selected entrepreneurship, marketing, and organizational characteristics in industrial firms,” Journal of the Academy of Marketing Science, Vol. 19, No. 1, pp. 43 - 51.

71. Dearstyne, B. W. (2005), “Fighting terrorism, making war: Critical insights in the management of information and intelligence,” Government Information Quarterly, Vol.22, No. 2, pp. 170-186.

72. Dempsey, J. (2001), “Cable Nets Nix Violent Pix in Wake of Tragedy,”

139

Variety.com, Sep. 16, pp.1-2.

73. DeRosa, D. M., Hantula, D. A., Kock, N., & D'Arcy, J. (2004), “Trust and leadership in virtual teamwork: A media naturalness perspective,” Human Resource Management, Vol. 43No. 2-3, pp. 219-232.

74. Devost, M. (1995), National Security in the Information Age, Thesis presented to University of Vermont.

75. Dignan, L. (2001), Survey: Attacks prompt IT spending gloom. ZDNet News, Oct. 17.

76. Donaldson, L., (2001), The Contingency Theory of Organizations. , CA: Sag.

77. Drabek, T. & Hoetmcr, J. (1991), Crisis management. Washington, DC:

International City and County Management Association.

78. Drucker, P. F. (1986), The Frontiers of Management, New York: Truman Talley Books, p. 1.

79. Dussauge, P., Hart, S. and Ramanantsoa B. (1992), Strategy Technology Management, West Sussex: John Wiley & Sons, pp. 1-16.

80. Ekeledo, E., Sivakumar, K., (1998), “Foreign market entry mode choice of service firms: a contingency perspective,” Journal of the Academy of Marketing Science, Vol. 26, No. 4, pp. 274-292.

81. Eisner, E.W. (1998), The Nature of Teaching and Teacher Thinking.

82. Eisenberg D. etc., (2001), “How Safe Can We Get?” Time, Vol. 158, No. 13, pp. 83-87.

83. Elegant, S & Perrin, A. (2003), Asia's Terror Threat, Oct. 6.

84. Epps, W. M. (2005), Terrorism & personal security: Reduce your chances of becoming a target, Thomson, p. 127.

85. Evans, J. S. (1991), “Strategic flexibility and high technology maneuvers: a conceptual framework,” Journal of Management Studies, Vol. 28.

86. Evans, J. L. and Archer, S. H., (1968), “Diversification and the reduction of dispersion: an empirical analysis,” Journal of Finance, Vol. 23, No. 5, pp.

761-767.

87. Fama, E. F., (1971), “Risk, return, and equilibrium,” Journal of Political Economy, Vol. 79, No. 1, pp. 30-55.

88. Ferris, G. R., Perrewe´, P. L., Anthony, W. P., & Gilmore, D. C. (2000),

“Political skill at work,” Organizational Dynamics, Vol. 28, No. 4, pp. 25–37.

140

89. Fink, S. (1986). Crisis Management: Planning for the Inevitable. New York:

American Management Association, p. 15.

90. Fischer, H.W. III (1998a), Behavioral response to chemical and biological terrorism: White paper. Research Planning, Inc., Church Falls.

91. Fischer, H.W. III (1998b), Response to Disaster: Fact Versus Fiction & Its Perpetuation, 2nd ed., University Press of America, Lannam, MD.

92. Fleck, J. and Howells, J. (2001) “Technology, the Technology Complex and the Paradox of TechnologyDeterminism”, Technology Analysis and Strategic Management, Vol. 13, No. 4, pp.523-31.

93. Flemings, R.S. (1998), “Assessing organizational vulnerability to acts of terrorism”, SAM Advanced Management Journal, Vol. 63, pp. 27-32.

94. Flint, J. and Lippman, J. (2001), “Hollywood revisits Terrorism-Related Projects,” Wall Street Journal, Sep. 13, B2.

95. Foreign Policy, (2002), “Hostage, Inc.,” July/Aug, pp. 27-30.

96. Forrester, J. W. (1958), “Industrial Dynamics: A Major Breakthrough for Decision Makers,” Harvard Business Review, Vol. 36, No. 4, pp. 37-66.

97. Freedman, L., Hill C., Roberts, A., Vincent, R.J., Wilkinson, P., and Windsor, P. (1986), Terrorism and International Order, London Routledge and Kegan:

Paul, p.19.

98. Frankel, J. (2004), “Bush's Spectacular Failure,” The International Economy, Vol. 18, No. 2, pp. 22-28.

99. Galdi, T. (1995), “CRS Report for Congress-Revolution in Military Affairs?

Competing Concepts,” Organisational Models, Outstanding Issues, p.6.

100. Gatchalian, M. M. (2004), “Promote Global Peace and Understanding: Build Bridges among Quality Organizations,” ASQ World Conference on Quality and Improvement Proceedings, Vol. 58, p. 181-190.

101. Ghemawat, P. del Sol, Patricio, (1998), “Commitment versus flexibility?”

California Management Review, Vol. 40, No. 4, pp. 26-24.

102. Gibbs, N. (2002), “What a difference a year makes,” Time, Sep. 11, pp.

20-30.

103. Giddens, A. (1990), The Consequences of Modernity, Cambridge: Polity Press.

104. Giddens, A. (1995), Beyond Left and Right: The Future of Radical Politics.

141

Stanford: Stanford University Press.

105. Gillespie, D., Sherraden, M., Streeter, C. & Xakour, M. (1986), Mapping networks of organized volunteers for natural hazards preparedness. St. Louis, MO: School of Social Work, Washington University.

106. Ginsberg, A., Venkatraman, N. (1985), “Contingency perspectives of organizational strategy: a critical review of the empirical research,” Academy of Management Review, Vol. 10, No.3, pp. 421-434.

107. Glaesser, D. (2004), Crisis Management in the Tourism Industry. Oxford:

Butterworth-Heinemann.

108. Glazer, R., Weiss, A. (1993), “Marketing in turbulent environments: decision processes and the time-sensitivity of information,” Journal of Marketing, Vol.

30, pp. 509-521.

109. Golan, N. (1978), Treatment in crisis situations. New York: Free Press.

110. Gotlieb, J. and Sarel, D. (1992), “The influence of type of advertisement, price, and source credibility on perceived quality,” Journal of the Academy of Marketing Science, Vol. 20, No. 3, pp.253-260.

111. Greenberg, J. W. (2002), “September 11, 2001: A CEO's story,” Harvard Business Review, Vol. 80, No. 10, p. 58.

112. Gregg, L. (2005), “Lessons Learned From the Brink of Disaster,” The Journal for Quality and Participation, Vol. 28, No. 1, p. 8-11.

113. Griffin, R. W. (1999), Management, 6th ed., Boston: Houghton Mifflin Company.

114. Guba, E. G. (1990), The alternative paradigm dialog, In Guba, E.G.(Ed.), The Paradigm Dialog, London: Sage Publications.

115. Gummesson, E. (2000), Qualitative Methods in Management Research, Sage Publications, Inc.

116. Hambrick, D. C. and Lei, D. (1985), “Toward an empirical prioritization of contingency variables for business strategy,” Academy of Management Journal, Vol. 28, No. 4, pp. 763 - 788.

117. Hannan, M. and Freeman, J. (1977), “The population ecology of organizations,” American Journal of Sociology, Vol. 82. No. 5, pp. 929-·964.

118. Harvard Business Essentials. (2004), Crisis management: Master the skills to prevent disasters. Harvard Business School Press: Boston, Massachusetts,

142

p.46.

119. Harvey, M. G. (1995), A survey of corporate programs for managing terrorist threats. Journal of International Business Studies, Vol. 24, No. 3, pp.

465-478.

120. Henriques, D. (2002), Horrible Year Ends on Up Note at Cantor. New York Times.

121. Herman, E. (1983), The Real Terror Network, Boston: South End Press, pp.11-70.

122. Herzog, T. (1996), Research Methods and Data Analysis in the Social Sciences. NY: Wesley Logman Publichses Inc.

123. Hofer, C. W. (1975), “Toward a contingency theory of business strategy,”

Academy of Management Journal, Vol. 18, pp. 784- 810.

124. Hosein, I. (2005), “Transforming travel and border controls: Checkpoints in the Open Society,” Government Information Quarterly, Vol. 22, No. 4, pp.

594-625.

125. Hues, A. & Barnes, B. (1999), The definitive handbook of business continuity management. NY: Wiley.

126. Huselid, M. A. (1995), “The Impact of Human Resource Management Practices on Turnover, Productivity, and Corporate Financial Performance,”

Academy of Management Journal, Vol. 38 No. 3, pp. 635-672.

127. Huselid, M. & Becker, B. (1996), “Methodological Issues in Cross-Sectional and Panel Estimates of the Human Resource-Firm Performance Link,”

Industrial Relations, Vol. 35, pp. 400-422.

128. Huss, W. R. and E. J. Honton (1987), “Scenario Planning: What Style Should You Use,” Long Range Planning, Vol. 20, No.4, pp. 21-29.

129. Huy, Q. N. (1999), “Emotional capability, emotional intelligence, and radical change,” Academy of Management Review, Vol. 24 No. 2, pp. 325–345.

130. Hymowitz, C. (2001), “Companies experience major power shifts as crises continue,” Wall Street Journal, October 9, B1.

131. Jackson, S. E., & Schuler, R. S. (1995), Understanding human resource management in the context of organizations and their environments. In M. R.

Rosenzweig & L. W. Porter (Eds.), Annual Review of Psychology. Vol. 46, (pp. 237-264). Palo Alto, CA, Annual Review.

143

132. Janis, I. L. (1982), Decision-making under stress. In L. Goldberger, & S.

Breznitz (Eds.), Handbook of stress: Theoretical and clinical aspects (pp.

69–87). NY: Free Press.

133. Jenkins, B. M. (1985), “Will Terrorists Go Nuclear?” Sociological Review, Vol. 29, No.3, pp. 507-516.

134. Jenkins, B. M. (2002), Will Terrorists Go Nuclear? A Reappraisal, in Kushner, the Future of Terrorism, pp. 225-249.

135. Jirsa, J. (1993), Buildings: General issues and characteristics, p. 3-18 in Committee on Mitigation of Damage to the Build Environment (eds.) Damage to the Built Environment. Memphis, TN: Central United States Earthquake Consortium.

136. Jones, A. (2005), “Cyber terrorism: Fact or fiction,” Computer Fraud &

Security, Vol. 6, pp. 4-7.

137. Joy, B. (2000), “Why the Future Doesn’t Need Us,” Wired, pp. 238–262.

138. Kahn, H. and Weiner, A. J. (1967), The Year 2000: A Framwork for Speculation on the Next Thirty Years, NY: Macmillan Publishing.

139. Kartez, J. & Lindell, M. (1990). Adaptive Planning for Community Disaster Response, p. 163-179 in Sylves, R. & Waugh, W (Eds.) Cities and Disaster.

Springfield, IL: Charles C. Thomas.

140. Kaufmann, J. B., Kesner, A. I. F. & Hazen, T.L. (1994), “The myth of full disclosure: a look at organizational communications during crisis,” Business Horizons, Vol. 19, pp. 29-39.

141. Kemeny, J. (1994), “Balancing Two Boats: Managing the Cross-Currents,”

System Thinker, Vol. 5, No. 10.

142. Khalil, T. (2000), Management of Technology, NY: McGraw-Hill.

143. Kobrin, S. J. (1979), “Political risk: a review and reconsideration,” Journal of International Business Studies, Vol. 10, pp. 67-80.

144. Koh, W. T.H. (2006), “Terrorism and its impact on economic growth and technological innovation,” Technological Forecasting & Social Change, In Press.

145. Konicki, S. (2001), “Ford Starts Stockpiling,” Information Week, September.

146. Kristof, N. D. (2002), “What Does and Doesn’t Fuel Terrorism?”

International Herald Tribune, May 8, 2002, p. 8.

144

147. Kroonenberg, H. H. Van den (1989), “Getting a Quicker Pay-off from R&D,” Long Range Planning, Vol. 22, pp.51-58.

148. Labog-Javellana, J. (2004), No new kidnapping upsurge, says GMA, Philippine Daily Inquier, June 17, 2004.

149. Lacayo, R., Locke, L., Roston, E. and Thottam, J. (2003), “Will We Be Safer?” Time, Vol. 162, No. 10, pp. 56-59.

150. Laqueur, W. (2000), The New Terrorism: Fanaticism and the Arms of Mass Destruction, NY: Oxford Press.

151. Laudicina, P. A. (2004), The World Out of Balance, McGraw-Hill Companies, Inc.

152. Lavigna, R. J. (2002), “Best practices in public-sector human resources:

Wisconsin State Government,” Human Resource Management, Vol. 41, No.

3, pp. 369-384.

153. Lawrence, P. R., Lorsch, J. W. (1967), Organization and Environment, Boston: Harvard Business School Press.

154. Lee, H., Padmanabhan, P. and Whang, S. (1997), “The Paralyzing Curse of the Bullwhip Effect in a Supply Chain,” Sloan Management Review, Spring, pp. 93-102.

155. Levesque, L. L. (2005), “Opportunistic hiring and employee fit,” Human Resource Management, Vol. 44, No. 3, pp. 301-317.

156. Lewis, B. (1967), The Assassins, London, p. 47.

157. Liao, S. H. (2005), “Technology management methodologies and applications: A literature review from 1995 to 2003,” Technovation, Vol. 25, No. 4, pp. 381-393.

158. Lin, C. H., Liou, D. Y., and Wu, K. W. (2006), “Opportunities and challenges created by terrorism,” Technological Forecasting and Social Change, In Press.

159. Lincoln Jr., R. W. (2002), “Dealing with HR issues following the 9/11 terrorist attacks,” Employment Relations Today, Vol. 28, No.4, pp. 1-7.

160. Lincoln, Y. S, and Guba, E. G. (1985), Naturalistic Inguiry, Newbury Park:

Sage Publications.

161. Lindell, M. & Perry, R. W. (1992), Behavioral foundations of community emergency planning. Washington, DC: Hemisphere Publishers.

145

162. Lindell, M. & Perry, R.W. (1998), “Earthquake impacts and hazard adjustment by acutely hazardous materials facilities following the Northridge earthquake,” Earthquake Spectra, Vol. 14, pp. 285-299.

163. Linneman, R. E. and Klein, H. E. (1983), “The Use of Multiple Scenarios by U.S. Industrial Companies,” Long Range Planning, Vol. 16, No. 6, pp.

94-101.

164. Linstone, H. (2002), “From My Perspective: Military Technology and Its Frustrations, Technological.” Forecasting and Social Change Vol. 69, pp.

759–764.

165. Lynch, A. (1996), Thought Contagion, NY: Basic Books.

166. MacDuffie, J.P. (1995), “Human resource bundles and manufacturing performance: Organizational logic and flexible production systems in the world auto industry,” Industrial and Labor Relations Review, Vol. 48, pp.

197-221.

167. Macmillan, Q(1988), “States, Terrorism and State Terrorism,” in Robert Slater and Michael Stohl, Current Perspective on International Terrorism.

168. Magnusson, P., (2004), “What companies need to do,” Business Week, Aug.

16, 2004, p. 26.

169. Management of Technology: The Hidden Competitive Advantage (1987), Washington, D.C: National Academy Press, pp. 5-9.

170. McKee, D., Conant, J., Rajan V. P., and Mokwa, M., (1992),

“Success-producer c.nd failure-preventer marketing skills: a social learning theory interpretation,” Journal of the Academy of Marketing Science, Vol. 20, No. 1, pp. 17-26.

171. Mentzer, J. T. (2001), Supply Chain Management. Sage Publications, Thousand Oaks, CA.

172. Miller, D., Friesen, P., (1980), “Momentum and revolution in organizational adaptation,” Academy of Management Journal, Vol. 23, pp. 591-614.

173. Making a list, checking it twice: A return to bombing in Sulawesi, (2006), The Economist, Jan. 5, 2006.

174. Maney, K. (2001), “No Telling What King of Technology This War Will Give Birth to,” USA Today, Oct. 10, 2001.

175. Mankin, L. D. & Perry, R. W. (2004), “Commentary: terrorism challenges for

在文檔中 中 華 大 學 博 士 論 文 (頁 148-171)