Responsive image
博碩士論文 etd-0722109-165757 詳細資訊
Title page for etd-0722109-165757
論文名稱
Title
學術網路點對點傳輸軟體管制之研究
Study of The Restrain to P2P Software on The TANet
系所名稱
Department
畢業學年期
Year, semester
語文別
Language
學位類別
Degree
頁數
Number of pages
145
研究生
Author
指導教授
Advisor
召集委員
Convenor
口試委員
Advisory Committee
口試日期
Date of Exam
2009-07-13
繳交日期
Date of Submission
2009-07-22
關鍵字
Keywords
管制政策、智慧財產權、P2P、學術網路、盜版下載
policy, copyright, P2P, TANet, piracy
統計
Statistics
本論文已被瀏覽 5816 次,被下載 2
The thesis/dissertation has been browsed 5816 times, has been downloaded 2 times.
中文摘要
校園的智慧財產權一直是版權擁有者以及法律單位所關注的焦點,在校園侵權行為中,P2P(peer-to-peer)是未授權檔案最主要的下載管道之一。教育部於九十六年度頒佈了P2P禁止使用命令,並發函至各大學以進行管制與宣導相關措施,本研究據此管制背景進行調查分析,試圖瞭解校園管制之下學生對於非法下載的認知狀況,並分析其對於使用意圖的影響,以作為此次P2P軟體管制的影響性分析。

研究發現宣導雖能大致影響學生們的主觀規範、知覺風險、道德判斷、智慧財產權知識(中介變項),但在中介變項中卻僅有道德判斷能顯著的影響使用P2P之意圖,其他則沒有顯著的影響。本研究可以提供校方管制時的參考與建議,並提供後續研究者發展校園非法下載模式參考。
Abstract
The problem of copyright infringement has always been a focus of concern of copyright owners and law enforcement units. P2P (peer-to-peer) software is one of the major ways to acquire unauthorized files on campus. In the 96th academic year, The Ministry of Education proclaimed the prohibition against P2P software using, issuing governmental documents to request every university to restrain students from using P2P software and to promote related measures. As an effect analysis to the P2P software restrain this time, this study had conducted an investigation and an analysis according to the above background, trying to find the perceptions of the students under the contol, and to explain how these perceptions impact the behavior intention on.

This study is revealing that though anti-P2P campaigns generally influence every perception like subjective norm, perceived risk, moral judgment, knowledge of copyright (the mediating variables) of the students, there is only an evident effect of moral judgment on behavior intention. As for the effects of other perceptions, they are not prominent. The study’s result can provide schools with not only some practical suggestions concerning how to plan restrain strategies, but also a resource of references to develop campus piracy model for following researchers.
目次 Table of Contents
第一章 緒論 1
第一節 研究背景與動機 1
第二節 研究問題 3
第二章 文獻探討 4
第一節 點對點傳輸技術 4
一、P2P技術 4
二、P2P下載軟體 9
三、P2P對於網路服務的影響 12
四、P2P軟體管理原理與策略 14
第二節 學術網路侵權管制 18
一、台灣學術網路TANet簡介 18
二、學術網路侵權相關管制現況 20
三、各校管制措施差異 24
第三節 影響學術網路非法下載之因素 29
一、宣導 29
二、認知管制程度 35
三、主觀規範 37
四、知覺風險 40
五、道德判斷 44
六、知識 46
第三章 研究方法 49
第一節 研究架構 49
第二節 研究假設 51
第三節 變數定義與操作化 59
中介變數(Mediating Variables) 59
依變數(Dependent Variables) 61
第四節 問卷設計 62
第五節 研究程序 68
第六節 資料分析方法 70
第四章 資料分析 72
第一節 敘述統計 73
一、使用者基本資料描述 73
二、研究變項的描述 78
第二節 因素分析 82
第三節 信度分析 88
第四節 相關分析 89
第五節 多元迴歸分析 91
第五章 研究討論 104
第一節 研究程序與分析 104
第二節 P2P禁用之合理性探討 110
第六章 結論與建議 112
第一節 研究結論與建議 112
第二節 研究限制與後續研究建議 114
第三節 研究貢獻 116
參考文獻 120
中文部分 120
英文部分 123
網路資料 130

參考文獻 References
中文部分

王保進(1999)。視窗版SPSS與行為科學研究(初版)。台北市:心理。
王翠琪(1996)。媒體反毒公共宣導訊息策略之研究。中國文化大學新聞研究所碩士論文。未出版。台北市。
丘昌泰(1995)。公共政策—當代政策科學理論之研究。台北:巨流。
李欣蕙(2002)。青少年盜版行為因素之探討。國立政治大學國際貿易研究所碩士班碩士論文。未出版。台北市。
李家慶(2006)。從策略行銷規劃探討高雄縣高中職校青少年愛滋病防治宣導策略。國立中山大學高階公共政策碩士班碩士論文。未出版。高雄市。
李紹唐(2007),P2P網路流量管理系統之設計實作,國立中山大學資訊工程學系研究所碩士論文。未出版。高雄市。
沈慧聲譯(1998)。人際傳播。台北市:揚智文化事業有限公司。
汪志堅(2005)。盜版商品購買意願影響因素之研究:以音樂雷射唱片為例。行銷評論,4(3),491-522。
林安凱(2003)。網路族為何下載mp3?比較理性與非理性動機的影響,東吳大學企業管理學系碩士班碩士論文。未出版。台北市。
周世中(2004)。對等式應用之網路傳輸行為分析與效能評估,國立台灣大學資訊管理學研究所碩士論文。未出版。台北市。
吳定(1993)。公共政策研究的未來發展。行政管理論文選輯第七輯。185-201。銓敘部。
吳定(1996)。公共政策。台北:華視文化事業股份有限公司。
吳宜蓁(1998)。企業議題管理業務初探---以公共事務部門為觀點的個案研究。廣告學研究,10:91-120。
吳明隆(2006)。SPSS統計應用學習實務-問卷分析與應用統計。台北:知城圖書。
姚思謙(1988),管制性政策執行之研究:我國環境保護政策個案分析。台灣大學政治學研究所碩士論文。未出版。台北市。
唐日新(1995)。軟體盜版的因素探討。國立中央大學資訊管理研究所碩士論文, 未出版。桃園。
翁煌哲(2002),以道德強度模型檢測道德判斷與軟體盜版意圖。國立中正大學企業管理研究所論文,未出版,嘉義。
黃瓊儀(2000)。公共政策之議題管理與公共宣導策略研究—以台北市垃圾費隨袋徵收政策為例。國立台灣師範大學大眾傳播研究所碩士論文。未出版。台北市。
黃義雄、郭倫嘉(2008)。點對點網路檔案分享與媒體串流技術發展介紹。電腦與通訊,123,49-54。
陳伯榆(2002)。校園網路管制與懲罰觀點:從使用者觀點分析。國立中正大學電訊傳播研究所碩士論文。未出版。嘉義。
陳景堂(2003),統計分析SPSS for windows入門與應用。台北:儒林。
陳品錚(2003)。點對點環境下檔案分享行為之倫理決策探討,東吳大學企業管理學系碩士班碩士論文。未出版。台北市。
陳祥源 (2005)。以消費價值探討數位音樂(MP3)下載意圖,東吳大學企業管理學系碩士班碩士論文。未出版。台北市。
陳建伯、許洲銘、邱俊榮、唐善智、吳敬慧、劉怡凭(2008)。以封包特徵為基礎識別P2P檔案分享行為。資訊科技與實務研討會,銘傳大學2008國際學術研討會,銘傳大學。
楊正宏、張俊陽、李長樹(2007年10月)。台灣學術網路(TANet)沿革與未來展望。李長樹(主持人),網路規劃建置與管理營運。TANet2007台灣網際網路研討會,國立台灣大學。
溫素真(2004)。消費者使用簡訊折價券之行為意圖。高雄第一科技大學行銷與流通管理所碩士論文,未出版,高雄。
張懿云(2007)。網路侵權問題及具體因應策略與執行措施之研究。經濟部智慧財產局九十五年專題研究計畫。民96年7月30日,取自經濟部智慧財產局網頁:http://www.tipo.gov.tw/ch/MultiMedia_FileDownload.ashx?guid=c08a4b8c-e7ce-49c5-92dd-8ee91a4b3186.doc
楊世瑩(2004)。Excel在統計上的應用。台北:旗標。
劉怡玟(2003)。點對點檔案分享軟體使用行為之研究,國立中山大學傳播管理研究所碩士班碩士論文。未出版。高雄市。
劉祥得(2005)。我國反盜版政策之倫理決策模式研究。行政暨政策學報,40,63-98。
劉建良(2007)。高屏澎區網工作報告。國立中山大學計算機與網路中心應用組。取自:http://kpprc.tanet.edu.tw/meeting/970730kpprc.ppt。

潘中道、郭俊賢譯(2005)。行為科學統計學。台北:雙葉。
賴光臨(1984)。政令宣導與媒體效用之調查研究。國立政治大學新聞研究所。未出版。台北市。
賴俊廷(2005),P2P軟體對網路影響之研究,國立交通大學資訊工程學系碩士論文。未出版。新竹。
鄭貞銘、林東泰、鍾蔚文 (1988)。新聞與傳播 下冊。台北:國立空中大學。
蕭毅、劉景豐(2007)。P2P與SKYPE技術分析研究。電信研究雙月刊,37(3)。353-365。

英文部分

Ajzen, I., & Fishbein, M.(1980). Understanding attitudes and predicting social behavior. Englewood Cliffs, New Jersey :Prentice-Hall.
Ajzen, I. (1991). The theory of planned behavior. Organizational Behavior and Human Decision Processes, 50(2), 179-211.
Bauer, R. A.(1960), Consumer behavior as risk taking, in R. S. Hancock( Ed.), Dynamic Marketing for a Changing World. ( pp. 389-398). Chicago: America Marketing Association.
Bauman, A.E., Bellew B, Owen N, Vita P.(2001). Impact of an Australian mass media campaign targeting physical activity in 1998. Am J Prev Med,21(1),41-47.
Beauchamp, T. L. & Bowie, N. E., (1983). Ethical Theory and Business. N.J.: Prentice Hall.
Benefo, K. D., Takyi, B. K.(2002). Mass Media Effects on AIDS Knowledge and Sexual Behavior with Special Reference to Ghana. International Journal of Sociology and Social Policy, 22(4),77-99.
Bettman, J. R., (1973). Perceived Risk and Its Components: A Model and Empirical Test. Journal of Marketing Research, 10(2), 184-190.
Biehal G. & Chakravarti D. (1983), Information Accessibility as a Moderator of Consumer Choice. Journal of Consumer Research, 10(1), 1-14.
Biggam, J.(2001,January). Defining Knowledge:an Episternological Foundation for Kniledge Management. In Y. G. Kim, H.S. Lee & I. Han,(Chair), Proceedings of the 34th Hawaii International Conference on System Sciences.Virtual and Knowledge-Based Organizations, Hawaii.
Bommer, M., Gratto, C., Gravander, J. & Tuttle, M., (1987). A Behavioral Model of Ethical and Unethical Decision Making. Journal of Business Ethics, 6(4), 265-280.
Burnkrant, R. E.& Thomas, J. P.(1988). The Structure and Antecedents of the Normative and Attitudinal Components of Fishbein’s Theory of Reasoned Action. Journal of Experimental Social Psychology, 24(1), 66-87.
Cox, D. F.(1967). Risk handling in consumer behavior- an intensive study of two cases, in D. F. Cox(ed.), Risk Taking and Information Handling in Consumer Behavior (pp.34-81). Boston: Harvard University Press.
Cunningham, S. M.(1967). The major dimension of perceived risk. in D. F. Cox (Ed.), Risk Taking and Information Handling in Consumer Behavior (pp.82-108), Boston: Harvard University Press.
Davenport, T. H. & Prusak, L.(1998). Working Knowledge:How Organizations Manage What They Know, Harvard Business School Press.
d’Astous, A., F. Colbert & D. Montpetit.(2005). Music Piracy on the Web – How Effective Are Anti-Piracy Arguments? Evidence From the Theory of Planned Behaviour. Journal of Consumer Policy, 28(3), 289–310.
Dubinsky, A. J., & Loken, B. (1989). Analyzing Ethical Decision Making in Marketing. Journal of Business Ethics, 19(2), 83-107.
Eberspächer J., & Schollmeier R. (2005). First and Second Generation of Peer-to-Peer Systems. Peer-to-Peer Systems and Applications,3485, 35-56. Retrieved March, 13,2009, from springerLink data base.
Engel, J. F., Blackwell, R. D. & Miniard P. W. (1995). Consumer Behavior. Dryden Press.
Flay, B. R.& Cook, T. D. (1981). Evaluation of mass media prevention campaigns. In R. E. Rice & W. Paisley (Eds.), Public Communication Campaigns (pp. 239-264). Beverly Hills: Sage.
Fishbein, M. & Ajzen, I.(1975), Belief, Attitude, Intention and Behavior:An Introduction to Theory and Research Reading. MA: Addison-Wesley.
Fraedrich, J.P.,& Ferrell, O.C. (1992). The impact of perceived risk and moral philosophy type on ethical decision making in business organizations. Journal of Business Research, 24(4), 283-295.
Gregson, S., Zhuwau, T., Anderson R. M., & Chandiwana S.K. (1998). Is there evidence for behaviour change in response to AIDS in rural Zimbabwe?. Social Science and Medicine 46(3),321-330.
Hairs, J. F., Tatham R. L., Anderson R. E., & Black W. C. (1998). Multivariate data analysis. New York: Macmillan.
Halme, A. (2005). Peer-to-peer Traffic: Impact on ISPs and Evaluation of Traffic Management Tools. Peer-to-peer technologies, networks and systems. Seminar on Internetworking 2005. Lisbon, Portugal.
Harrison, D.A.(1995). Volunteer motivation and attendance decisions: competitive theory testing in multiple samples from a homeless shelter, Journal of Applied Psychology, 80 (3), 371-385.
Havlena W. J. & DeSarbo, W. S. (1991). On the measurement of perceived consumer risk. Decision Science, 22(4) 927-939.
Hunt, S. D. & Vitell, S. (1986). A general theory of marketing ethics. Journal of Macromarketing, 6(1), 5-16.
Jacoby, J. & Kaplan, L.B. (1972). The components of perceived risk. Annual Conference of the Association for Consumer Research, M. Venkatesan, ed. Chicago: Association for Consumer Research, 382-393.
Jones, T. M. (1991). Ethical decision making by individuals: an issue-contingent model. Academy of Management Review, 16(2), 366-395.
Kaplan, L. B., Szybillo, G.. J. & Jacoby, J. (1974). Components of Perceived Risk in Product Purchase: A Cross-Validation. Journal of Applied Psychology, 59(3), 287-291.
Leibowitz, N., Bergman A., Ben-Shaul R., & Shavit A. (2002). Are File Swapping Networks Cacheable? Characterizing P2P Traffic. Paper presented at the 7th Symposium on International Workshop on Web Content Caching and Distribution. Retrieved October 23, 2008, from http://2002.iwcw.org/papers/18500253.pdf
Limayem, M., Khalifa M. & Chin, W. W. (1999). Factors Motivating Software Piracy: A Longitudinal Study. Ieee Transactions on Engineering Management, 51(4), 414-425.
Lofsdon, J. M., Thompson J. K., & Reid R, A. (1994). Software Piracy: Is It Related to Level of Moral Judgement? Journal of Business Ethics, 13(11), 849-857.
Lynch, J.G., Jr., Marmorstein, H., & Weigold M. F.(1988). Choices from Sets Including Remembered Brands;Use of Recall Attributes and Prior Overall Evaluations. Journal of Consmer Research, 15(2), 169-184.
Macinnis, H. (1997). Consumer Behavior. New York: Houghton Mifflin Company.
Martha V. Gottron (1982). Regulation : Process and Politics. Washington, D.C.:Congressional Quarterly Inc.
McGuire, W. ( 1981). Theoretical foundations of campaigns, in R. E. Rice & W. Paisley (Eds.), Public Communication Campaigns (pp. 41-70). Beverly Hills, C A: Sage.
Nonaka, I. (1994). A Dynamic Theory of Organizational Knowledge Creation, Organization Science, 5(10), 14-37.
Peace, A. G., Galletta D. F., & Thong J. Y. L.(2003). Software piracy in the workplace: A model and empirical test. Journal of Management Information System, 22(3), 153-177.
Park. C. W. & Lessing, V. P. (1977). Student and housewives:difference in susceptibility to reference group influence, Journal of Consumer Research, 4(2), 102-110.
Paisley W.J. (1989). Public communication campaigns:The American experience. In R.E. Rice & C.K. (Eds.), Public communication campaigns (pp. 15-40). Beverly Hills, CA:Sage
Razecki, D.W. (1982). Attitude:Themes & Advances. Sunderland, MA:Sinauer.
Rettig, S. & Rawson, H. E. (1963). The risk hypothesis in predictive judgments of unethical behavior. Journal of Abnormal Psychology, 66, 243-248
Reid, R. A., Thompson, J. K. & Logsdon, J. M. (1992). Knowledge and attitudes of management students toward software piracy. Journal of Computer Information Systems, 33(1), 46-51.
Roselius, T. (1971). Consumer rankings of risk reduction methods. Journal of
Marketing, 35(1), 56-61.
Rogers, E.M., Solomon D., & Adhikarya R. (1979). Further Directions for USAID’s Communication Policies in Population. Stanford: Institute for Communication Research.
Rogers E. M., & Storey, J. D. (1987). Communication Campaigns. In C. Berger & S.Chaffee (Eds.), Handbook of Communication Science (pp. 817-846). Newbury Park, CA : Sage.
Schwepker, C. H., & Good, D. J., (1999). The impact of sales quotas on moral judgment in the financial services industry. Journal of Services Marketing, 13(1), 38-58.
Shaoyi, L., Yuan, P.S., Huaiqing, W., & Ada I. (1999). The Adoption of Virtual Banking: An Empirical Study. International Journal of Information Management, 19(1), 63-74.
Steinmetz, R. & Wehrle, K. (2005). What is this peer-to-peer about? Peer-to-Peer Systems and Applications. Peer-to-Peer Systems and Applications,3485, 9-16. Retrieved March, 13,2009, from SpringerLink data base.
Simpson, P. M., Banerjee, D., & Simpson, C. L. (1994). Softlifting: A Model of Motivating Factors, Journal of Business Ethics, 13(6), 431-438
Sen S., Spatscheck O., & Wang D. (2004). Accurate, Scalable In-Network Identification of P2P Traffic Using Application Signatures. Paper presented at the 13th international conference on World Wide Web. Retrieved October 24, 2008, from http://www.iw3c2.org/WWW2004/docs/1p512.pdf
Saroiu, S., Gummadi, K. P. & Gribble, S. D. (2002). A measurement study of peer-to-peer file sharing systems. Paper presented at the Multimedia Computing and Networking. Retrieved October 24, 2008, from http://www.cs.washington.edu/homes/gribble/papers/mmcn.pdf
Swinyard, W.R., Rinne, H., & Kau, A.K. (1990). The morality of software piracy: a cross-cultural analysis. Journal of Business Ethics, 9(8), 655-664.
Sheppard, B.H., Hartwick, J. & Warshaw, P.R. (1988), The Theory of Reasoned Action: A Meta-analysis of Past Research with Recommendations for Modifications and Future Research, Journal of Consumer Research, 15(3), 325-343.
Tan, B. (2002). Understanding Consumer Ethical Decision Making with Respect to Purchase of Pirated Software. Journal of Consumer Marketing, 19(2), 96-111
Taylor, P. W. (1975). Principles of Ethics: An Introduction. Dickenson Publishing Company, Inc.
Taylor, S. & Todd, P. A. (1995). Understanding information technology usage: A test of competing models. Information System Research, 6(2), 144-176.
Karagiannis T., Broido A., & Faloutsos M. (2004). Transport Layer Identification of P2P Traffic. Paper presented at the Internet Measurement Conference. Retrieved October 24, 2008, from http://www.caida.org/publications/papers/2004/p2p-layerid/p2p-layerid.pdf
Thoma, S. J., & Rest, J. R. (1986). Moral Judgement, Behavior , Decision Making and Attitude. Cambridge University Press.
Thong, J. Y. & Yap, C. S. (1998). Testing an Ethical Decision-Making Theory: The Case of Softlifting, Journal of Management Information Systems, 15(1), 213-237.
Topping, K. (1998). Peer assessment between students in colleges and universities. Review of Educational Research, 68(3), 249-276.
Venkatesh, V., Morris, M. G., David, G. B. & David, F. D.(2003). User acceptance of information technology: Toward a unified view. MIS Quarterly, 27(3), 425-478
Werbach K. (2005, January 17). The Implications of Video P2P on Network Usage. Paper presented at the Columbia Institute for Tele-Information, 2005 Symposium. Retrieved October 22, 2008, from
http://papers.ssrn.com/sol3/papers.cfm?abstract_id=649682
Wiig, K. M. (1993). Knowledge Management Foundation. Schema Press.
Wimbush E., MacGregor A., & Fraser E. (1998). Impacts of a national mass media campaign on walking in Scotland. Health Promotion International, 13(1), 45-53.
Woodside, A. G.. (1968). Group Influence and Consumer Risk Taking: An Experimental Study. Doctoral Dissertation the Pennsylvania State University.
Worona S. (2008, Febuary 26). Policies and measures for campus Internet management in the U.S.. paper presented at the 2008 Capacity Building on Campus Computer Networks. retreived May 16, 2009, from: http://www.njtc.edu.tw/njcc/Intelligent/occurrence/3/html/_frame.htm
Wotruba, T. R. (1990). A Comprehensive Framework for the Analysis of Ethical Behavior, with a Focus on Sales Organizations. Journal of Personal Selling and Sales Management, 10(2), 29-42.

網路資料
交大新聞-宿網侵權 交大罰生勞服(2008年8月25日)。2008年12月20日。取自:國立交通大學 公共事務委員會:http://pac.fansio.com/Report/report_more.php?id=15190&PHPSESSID=
許玉君(2007年2月8日)。學生網路非法下載 學校將連坐。聯合新聞網。2009年2月14日,取自:http://mag.udn.com/mag/campus/storypage.jsp?f_ART_ID=58732
教育部重編國語辭典修訂本(無日期)。台北市:教育部。2008年12月15日。取自http://dict.revised.moe.edu.tw/cgi-bin/newDict/dict.sh?cond=%B9D%BCw&pieceLen=50&fld=1&cat=&ukey=-1102069658&serial=3&recNo=1&op=f&imgFont=1
台灣學術網路(TANet)概述—電子計算機中心(2007年2月5日)。台北市:教育部。2008年12月18日。取自ttp://www.edu.tw/MOECC/content.aspx?site_content_sn=1730
計算機世界網(2008年4月21日)。FCC指責Comcast在法規中蓄意限制P2P。2009年7月16日,取自:http://www.ppcn.net/n4452c1.aspx
維基百科-點對點技術(無日期)。取自:http://zh.wikipedia.org/w/index.php?title=%E9%BB%9E%E5%B0%8D%E9%BB%9E%E6%8A%80%E8%A1%93&variant=zh-tw#.E5.AD.A6.E6.9C.AF.E6.80.A7P2P.E7.BD.91.E7.BB.9C
維基百科-FOXY(無日期)。取自:http://zh.wikipedia.org/w/index.php?title=Foxy&variant=zh-tw
學術網路保護智慧財產權之相關措施—電子計算機中心(無日期)。教育部電子計算機中心。2008年10月25日。取自:http://www.edu.tw/moecc/content.aspx?site_content_sn=5264
台電字第0970077254號(97年5月8日)。屏東科技大學九十六學年度十次行政會議紀錄。取自http://www.staff.chu.edu.tw/secretariat/96_record/96-10.pdf
FCC Adopts Policy Statement (Aug 15, 2005). Retrieved July 16, 2009, from http://hraunfoss.fcc.gov/edocs_public/attachmatch/DOC-260435A1.pdf
New York University (n.d.). Peer-to-Peer File Sharing policies. Retrieved May 22, 2009, from http://www.nyu.edu/its/p2p/#policies。
University of Southern California (n.d.). Infromation Technology Services. Retrieved May 22, 2009, from http://www.usc.edu/its/copyright/p2p.html
University of Cambridge (n.d.). p2p_ policy. Retrieved May 22, 2009, from http://www.robinson.cam.ac.uk/rccs/policy/p2p_ policy.pdf
電子全文 Fulltext
本電子全文僅授權使用者為學術研究之目的,進行個人非營利性質之檢索、閱讀、列印。請遵守中華民國著作權法之相關規定,切勿任意重製、散佈、改作、轉貼、播送,以免觸法。
論文使用權限 Thesis access permission:校內一年後公開,校外永不公開 campus withheld
開放時間 Available:
校內 Campus: 已公開 available
校外 Off-campus:永不公開 not available

您的 IP(校外) 位址是 44.223.40.255
論文開放下載的時間是 校外不公開

Your IP address is 44.223.40.255
This thesis will be available to you on Indicate off-campus access is not available.

紙本論文 Printed copies
紙本論文的公開資訊在102學年度以後相對較為完整。如果需要查詢101學年度以前的紙本論文公開資訊,請聯繫圖資處紙本論文服務櫃台。如有不便之處敬請見諒。
開放時間 available 已公開 available

QR Code