博碩士論文 104524017 詳細資訊




以作者查詢圖書館館藏 以作者查詢臺灣博碩士 以作者查詢全國書目 勘誤回報 、線上人數:80 、訪客IP:3.138.68.161
姓名 張家豪(Chia-Hao Chang)  查詢紙本館藏   畢業系所 網路學習科技研究所
論文名稱 網路霸凌防治學習系統的設計開發與TAM評估
(Design and Development of an Interactive System for Cyberbullying Prevention)
相關論文
★ 影片註記輔助同儕互評: ESP取向之口語訓練
檔案 [Endnote RIS 格式]    [Bibtex 格式]    [相關文章]   [文章引用]   [完整記錄]   [館藏目錄]   [檢視]  [下載]
  1. 本電子論文使用權限為同意立即開放。
  2. 已達開放權限電子全文僅授權使用者為學術研究之目的,進行個人非營利性質之檢索、閱讀、列印。
  3. 請遵守中華民國著作權法之相關規定,切勿任意重製、散佈、改作、轉貼、播送,以免觸法。

摘要(中) 網路霸凌現象隨著通訊網路科技以及軟體的普及化,已經成為校園之中亟欲解決和預防的重要議題,在教育實務之中,要如何有效預防網路霸凌尚未有完整的執行策略,相關研究多半為自陳式調查,並且礙於各國文化用語和不同年齡層之間對於網路霸凌概念之差異,其中研究結果難以跨文化概括而論。目前國內外網路霸凌防治教學教材並無系統化發展,更遑論針對潛在大量的旁觀者面向出發 。綜結文獻與需求,本研究分析實際校園與教師需求後,開發出針對網路霸凌旁觀者反應之防治學習系統。本系統期望藉由互動式多路徑情境教材跳脫傳統教育的教條式宣導,提供學生思考不同反應行為之發展之機會,以期建立正確面對網路霸凌之態度以及協助建立友善校園網路空間。本研究除開發系統外,更進一步評估網路霸凌防治學習系統是否符合現場教師需求。本研究採用調查研究法的問卷調查法,針對124名教師進行問卷調查,評估教師對於本系統的認知有用性、認知易用性與使用意圖。研究結果顯示發現多數參與教師對於本系統在認知有用性、認知易用性與使用意圖皆是給予正面回饋,認為本系統所提供的操作介面與教學內容是有用並且容易使用的以及願意使用本系統進行防治網路霸凌教學。更進一步的分析結果顯示,不同學校規模的教師可能會影響教師對於本系統認知有用性和認知易用性以及使用意圖。最後本研究依據分析結果提出系統改善與未來研究建議。
摘要(英) With the prevailing of the internet and technology, cyberbullying has become a serious problem among adolescents and has attracted considerable attention in academia and in educational practice. To date, no solution has been made to successfully prevent cyberbullying. Past research on cyberbullying are mostly conducted in Western countries using high school student as samples. This study aims to design and develop a scenario-based interactive learning courseware for students in elementary schools and middle school in Taiwan to prevent cyberbullying. It is hoped that the interactive multi-path courseware could help to build appropriate attitude toward and awareness of cyberbullying in an effective and engaging manners. Target learners would be able to experience the cyberbullying incident as a bystander, make decision on what actions to take, and be taught the according consequences. The effectiveness of the self-developed courseware was evaluated by 124 teachers of various levels in terms of its perceived usefulness, perceived ease of use, and its influence on raising cognitive empathy and positive behavior intentions toward cyberbullying. Data sources included questionnaires of cyberbystanders’ experience, behavior intention to respond to cyberbullying incidents, focus group interviews, and log record of the interactive courseware. Results indicated that participating teachers perceived the interface of the scenario-based interactive learning courseware useful and easy to use, and considered to actually incorporate the courseware in their teaching. Further analysis revealed that teachers from different school sizes rated perceived usefulness and perceived ease of use differently. Based on the findings, recommendations and potential modifications of the courseware were discussed.
關鍵字(中) ★ 網路霸凌
★ 教學設計
★ 科技接受模型
★ 網路霸凌應對策略
★ 情境學習
關鍵字(英) ★ cyberbullying
★ instructional design
★ Technology Acceptance Model
★ cyberbullying prevention
★ situated learning
論文目次 網路霸凌防治學習系統的設計開發與TAM評估 1
摘  要 I
Abstract II
致謝 III
目  錄 V
圖目錄 IX
表目錄 X
第一章 緒論 1
1.1研究背景與動機 1
1.2研究目的 3
1.3研究問題 3
1.4名詞釋義 4
1.4.1網路霸凌 4
1.4.2認知有用性 4
1.4.3認知易用性 4
1.4.4使用意圖 4
1.4.5資訊素養 5
第二章 文獻探討 6
2.1網路霸凌的定義 6
2.1.1網路霸凌的特性 9
2.1.2校園網路霸凌與防治教育 10
2.1.3網路霸凌相關研究 11
2.2科技接受模型 14
2.2.1認知有用性與認知易用性 14
2.2.2 TAM外部變數探究 18
2.3國內網路霸凌防治教學資源整理 20
2.3.1網路資源介紹 20
2.3.2 網路霸凌防治課程發展 24
2.3.3當前網路霸凌防治教學資源分析 25
2.4 文獻探討總結 29
第三章 網路霸凌防治學習系統設計與實作 30
3.1系統設計 30
3.2研究流程 32
3.3網路霸凌防治學習系統 34
3.3.1系統使用流程 34
3.3.2 功能介紹 35
3.3.3 系統架構 42
第四章 研究方法 44
4.1 研究對象 44
4.1.1 教師基本資料 44
4.1.2 教師網路霸凌相關經驗 46
4.2 實驗目的 47
4.3 實驗設計與流程 47
4.4 評估方法 48
4.4.1研究架構 49
4.4.2 Technology Acceptance Model(TAM)科技接受模型問卷 49
4.4.3 Behavioral Intentions行為意圖 50
4.4.4 開放性問題 50
4.5資料處理與分析 50
4.5.1資料收集 51
4.5.2資料分析方式 51
第五章 結果分析與討論 52
5.1教師整體之資訊素養 52
5.2教師整體對於本系統之認知有用性 53
5.3 教師整體對於本系統之認知易用性 55
5.4 教師整體對於本系統之使用意圖 56
5.5 不同背景變項教師對於本系統之感受與預測力 58
5.5.1不同教學年資的教師對於本系統的感受與差異 58
5.5.2不同授課專長的教師對於本系統的感受差異 59
5.5.3不同學校級別的教師對於本系統的感受差異 60
5.5.4不同學校規模的教師對於本系統的感受差異 61
5.5.5資訊素養對於有用性和易用性與使用意圖相關分析 63
5.6教師對於本系統之改進意見與想法 66
第六章結論與建議 71
6.1結論 71
6.1.1本系統對於教師防治網路霸凌教學是有用的 71
6.1.2本系統易用對於教師是容易使用的 71
6.1.3教師對於本系統是願意使用系統網站 72
6.1.4教師在不同背景對本系統之感受與預測力 72
6.2建議 74
6.2.1教師教學實務的建議 74
6.2.2網站功能 74
6.2.3 網站內容 75
6.2.4 未來研究建議 75
參考文獻 77
(一)中文部分 77
(二)英文部分 79
附錄一 85

參考文獻 (一)中文部分
王品蘋(民105)。國小高年級學童自我概念、同儕關係與網路霸凌之相關研究-以大台南都會區為例 (未出版之碩士論文),國立台南大學,台南。
白青平(民89)。台北縣市國民小學初任教師工作困擾與解決途徑之研究(碩士論文)。國立台北師範學院,台北。
朱美瑰(民97)。看不見的拳頭-高雄市國中生網路霸凌經驗之研究(碩士論文)。國立高雄師範大學,高雄。
朱斌妤、黃仟文、翁少白 (民97)。以科技接受模式探討即時交通資訊系統之使用意願. 電子商務學報, 10(1), 173-200。
吳昕縈(民102)。迷宮多路徑融入品德素養之數位敘事方法研究(碩士論文)。國立新竹教育大學,新竹。
兒童福利聯盟文教基金會。2016台灣兒童少年網路霸凌經驗調查報告。http://www.cylaw.org.tw/about/guidance/8/235。
周君倚、陸洛 (民103)。以科技接受模式探討數位學習系統使用態度─ 以成長需求為調節變項. Information Management, 21(1), 83-106。
林妍汎 (民99)。台北市高中職學生網路霸凌行為之研究(未出版之碩士論文)。銘傳大學,台北。
林滄崧 (民101)。校園霸凌與防治.校園犯罪與安全維護 (頁 139-197).,台北市: 五南。
徐敏容 (民104)。中學職前教師之網路霸凌防治線上課程設計、發展與評鑑(碩士論文)。國立交通大學,新竹。
郭祐榕 (民98)。網路霸凌被害者之被害特質分析: 以嘉義市地區國中生為例(未出版之碩士論文)。國立中正大學,嘉義。
陳凌瑤 (民102)。教師網路霸凌認知態度之調查研究(碩士論文)。國立臺東大學,臺東。
傅士原 (民105)。以科技接受模式探討線上平台應用於大一微積分課程教學之學習滿意度與學習成效之研究(碩士論文)。國立中央大學,桃園。
黃建群 (民99)。網路霸凌素養課程對網路霸凌認知與行為意圖之影響(碩士論文)。國立臺東大學,臺東。
黃耀德 (民100)。情境式網路霸凌體驗網站之開發與評估研究(碩士論文)。國立臺東大學,臺東。
蔡雅惠 (民102)。高中職學生網路霸凌影響因素模式驗證之研究(未出版之碩士論文)。國立東華大學,花蓮。
鄭雅穗 (民98)。兒童及青少年網路霸凌行為探討及輔助策略。教育部九十七年度選送公。私立高級中等以下學校及幼稚園教師出國專題研究。
謝意苹 (民102)。 網路惡勢力:青少年網路霸凌之多面向探究。人文與社會科學簡訊,65-71。
謝麗紅 (民104)。國中教師網路霸凌認知、態度與自我效能之調查研究-以宜蘭縣為例(碩士論文)。國立東華大學,花蓮。
魏翊雄 (民101)。青少年網路霸凌行為及影響因子調查研究(碩士論文)。國立東華大學,花蓮。










(二)英文部分
Ajzen, I., & Fishbein, M. (1980). Understanding attitudes and predicting social behaviour.
Agarwal, R., & Prasad, J. (1998). A conceptual and operational definition of personal innovativeness in the domain of information technology. Information systems research, 9(2), 204-215.
Agarwal, R., & Prasad, J. (1999). Are individual differences germane to the acceptance of new information technologies?. Decision sciences, 30(2), 361-391.
Agarwal, R., Sambamurthy, V., & Stair, R. M. (2000). The evolving relationship between general and specific computer self-efficacy—An empirical assessment. Information systems research, 11(4), 418-430.
Andrew, Beringer (2011). Teacher′s Perceptions and Awareness of CyberbullyingAmong Middle School Students. State University of New York. Counselor Education Master′s Theses. Retrieved Nov. 4, 2014, from http://digitalcommons.brockport.edu/edc_theses/115
Belsey, B. (2004). Always on, always aware. Cyberbullying< http://www. cyberbullying. ca> at, 17.
Belsey, B. (2006). Bullying. org: A learning journey. Bulletin–Newfoundland and Labrador Teachers Association, 49(4), 20.
Barlińska, J., Szuster, A., & Winiewski, M. (2015). The role of short-and long-term cognitive empathy activation in preventing cyberbystander reinforcing cyberbullying behavior. Cyberpsychology, Behavior, and Social Networking, 18(4), 241-244.
Campbell, M., Butler, D., & Kift, S. (2008). A school′s duty to provide a safe learning environment: Does this include cyberbullying. Austl. & NZJL & Educ., 13, 21.
Chen, J.-K., & Wei, H.-S. (2010). The impact of school violence on self-esteem and depression among Taiwanese junior high school students. Social Indicators Research, 100(3), 479-498.
Davis, F. D. (1986). A technology acceptance model for empirically testing new end-user information system: Theory and results. Ph.D. dissertation, MIT Sloan School of Management, Cambridge, MA.
Davis, F. D. (1989). Perceived usefulness, perceived ease of use, and user acceptance of information technology. MIS quarterly, 319-340.
Dodds, W. B., Monroe, K. B., & Grewal, D. (1991). Effects of price, brand, and store information on buyers′ product evaluations. Journal of marketing research, 307-319.
DeSmet, A., Aelterman, N., Bastiaensens, S., Van Cleemput, K., Poels, K., Vandebosch, H., ... & De Bourdeaudhuij, I. (2015). Secondary school educators′
perceptions and practices in handling cyberbullying among adolescents: A cluster analysis. Computers & Education, 88, 192-201.
Gefen, D., & Straub, D. W. (1997). Gender differences in the perception and use of e-mail: An extension to the technology acceptance model. MIS quarterly, 21(3), 389-400.
Hinduja, S., & Patchin, J. W. (2008a). Bullying beyond the schoolyard: Preventing
and responding to cyberbulling. Thousand Oaks, CA: Corwin Press.
Huang, Y. Y., & Chou, C. (2010). An analysis of multiple factors of cyberbullying among junior high school students in Taiwan. Computers in Human Behavior, 26(6), 1581-1590.
Hinduja, S., & Patchin, J. W. (2010). Bullying, cyberbullying, and suicide. Archives
of suicide research, 14(3), 206-221.
Huang, Y. Y., & Chou, C. (2013). Revisiting cyberbullying: Perspectives from Taiwanese teachers. Computers & Education, 63, 227-239.
Huang, Y. -y., & Chang, C.-M., Chen, Y.-L., Wei, H.-C., & Chou, C. (2015). An analysis of adverse beliefs about cyberbullying among Taiwanese adolescents. Violence and Victims.
Igbaria, M., Parasuraman, S., & Baroudi, J. J. (1996). A motivational model of microcomputer usage. Journal of management information systems, 13(1), 127-143.
Kwon, T. H. & Zmud, R. W. (1987). Unifying the fragmented models of information systems implementation. In Boland, R. J. & Hirschheim, R. A. (Eds.), Critical Issues in Information Systems Research. (pp. 227-251.). New York: John Wiley & Sons
Kowalski, R. M., Giumetti, G. W., Schroeder, A. N., & Lattaner, M. R. (2014). Bullying the digital age: A critical review and meta-analysis of cyberbullying research among youth. Psychological Bulletin, 140(4), 1073-1137.
Lewis, W., Agarwal, R., & Sambamurthy, V. (2003). Sources of influence on beliefs about information technology use: An empirical study of knowledge workers. MIS quarterly, 657-678.
Li, Q. (2006). Cyberbullying in schools: A research of gender differences. School psychology international,27(2), 157-170.
Limber, S. P., Kowalski, R. M., & Agatston, P. W. (2008). Cyber bullying: A
prevention curriculum for grades 3-5. MN: Hazelden.
Malhotra, Y., & Galletta, D. (1999). Extending the technology acceptance model to account for social influence: theoretical bases and empirical validation. In Proceedings of the Hawaii International Conference on System Sciences (Vol. 32, pp. 5–5).
Money, W., & Turner, A. (2004). Application of the Technology Acceptance Model to a Knowledge Management System. Hawaii International Conference on System Sciences, 8, 80237b.
Navarro, R., & Serna, C. (2016). Spanish youth perceptions about cyberbullying:
Qualitative research into understanding cyberbullying and the role that parents play in its solution. In Cyberbullying Across the Globe (pp. 193-218). Springer International Publishing.
Olweus, D. (2003). A profile of bullying at school. Educational leadership, 60(6),
12-17.
Patchin, J. W., & Hinduja, S. (2006). Bullies move beyond the schoolyard: A preliminary look at cyberbullying. Youth violence and juvenile justice, 4(2), 148-169.
Rigby, K. (2003). Consequences of bullying in schools. The Canadian journal of psychiatry, 48(9), 583-590.
Roca, J. C., Chiu, C. M., & Martínez, F. J. (2006). Understanding e-learning
continuance intention: An extension of the Technology Acceptance Model. International Journal of human-computer studies, 64(8), 683-696.
Shariff, S., & Gouin, R. (2005). Cyber-dilemmas: gendered hierarchies, free
expression and cyber-safety in schools. Retrieved from
http://www.oii.ox.ac.uk/research/cybersafety/extensions/pdfs/papers/shaheen_
shariff.pdf
Schillewaert, N., Ahearne, M. J., Frambach, R. T., & Moenaert, R. K. (2005). The adoption of information technology in the sales force. Industrial Marketing Management, 34(4), 323-336.
Slonje, R., & Smith, P. K. (2008). Cyberbullying: Another main type of bullying?.
Scandinavian journal of psychology, 49(2), 147-154.
Teo, T. S., Lim, V. K., & Lai, R. Y. (1999). Intrinsic and extrinsic motivation in
Internet usage. Omega, 27(1), 25-37.
Thong, J. Y., Hong, W., & Tam, K. Y. (2002). Understanding user acceptance of
digital libraries: what are the roles of interface characteristics, organizational context, and individual differences?. International journal of human-computer studies, 57(3), 215-242.
Tokunaga, R. S. (2010). Following you home from school: A critical review and
synthesis of research on cyberbullying victimization. Computers in human behavior, 26(3), 277-287.
Venkatesh, V., & Morris, M. G. (2000). Why don′t men ever stop to ask for
directions? Gender, social influence, and their role in technology acceptance and usage behavior. MIS quarterly, 115-139.
Venkatesh, V., Morris, M. G., & Ackerman, P. L. (2000). A longitudinal field
investigation of gender differences in individual technology adoption decision-making processes. Organizational behavior and human decision processes, 83(1), 33-60.
Venkatesh, V. (2000). Determinants of perceived ease of use: Integrating control,
intrinsic motivation, and emotion into the technology acceptance model. Information systems research, 11(4), 342-365.
Willard, N. (2003). Off-campus, harmful online student speech. Journal of School
Violence, 2(1), 65-93.
Willard, N. (2005). Educator’s guide to cyberbullying addressing the harm caused by
online social cruelty. Retrieved July, 19, 2005.
Willard, N. (2006). Flame Retardant: Cyberbullies Torment Their Victims 24/7:
Here′s How to Stop the Abuse. School Library Journal, 52(4), 54.
Wang, J., Iannotti, R. J., & Nansel, T. R. (2009). School bullying among adolescents
in the United States: Physical, verbal, relational, and cyber. Journal of Adolescent health, 45(4), 368-375.
Ybarra, M. L., & Mitchell, K. J. (2004). Online aggressor/targets, aggressors, and
targets: A comparison of associated youth characteristics. Journal of child Psychology and Psychiatry, 45(7), 1308-1316.
指導教授 劉晨鐘 黃芸茵(Chen-Chung Liu Yun-yin Huang) 審核日期 2018-1-30
推文 facebook   plurk   twitter   funp   google   live   udn   HD   myshare   reddit   netvibes   friend   youpush   delicious   baidu   
網路書籤 Google bookmarks   del.icio.us   hemidemi   myshare   

若有論文相關問題,請聯絡國立中央大學圖書館推廣服務組 TEL:(03)422-7151轉57407,或E-mail聯絡  - 隱私權政策聲明