博碩士論文 105421037 詳細資訊




以作者查詢圖書館館藏 以作者查詢臺灣博碩士 以作者查詢全國書目 勘誤回報 、線上人數:28 、訪客IP:3.129.67.26
姓名 張雅筑(Chang-Ya Chu)  查詢紙本館藏   畢業系所 企業管理學系
論文名稱 報酬與隱私風險對自我揭露意圖之影響
(The impact of rewards and privacy risk on self-disclosure intention)
相關論文
★ 以第四方物流經營模式分析博連資訊科技股份有限公司★ 探討虛擬環境下隱性協調在新產品導入之作用--以電子組裝業為例
★ 動態能力機會擷取機制之研究-以A公司為例★ 探討以價值驅動之商業模式創新-以D公司為例
★ 物聯網行動支付之探討-以Apple Pay與支付寶錢包為例★ 企業資訊方案行銷歷程之探討-以MES為例
★ B2C網路黏著度之探討-以博客來為例★ 組織機制與吸收能力關係之研究-以新產品開發專案為例
★ Revisit the Concept of Exploration and Exploitation★ 臺灣遠距醫療照護系統之發展及營運模式探討
★ 資訊系統與人力資訊科技資源對供應鏈績效影響之研究-買方依賴性的干擾效果★ 資訊科技對知識創造影響之研究-探討社會鑲嵌的中介效果
★ 資訊科技對公司吸收能力影響之研究-以新產品開發專案為例★ 探討買賣雙方鑲嵌關係影響交易績效之機制 ─新產品開發專案為例
★ 資訊技術運用與協調能力和即興能力 對新產品開發績效之影響★ 團隊組成多元性影響任務衝突機制之研究─ 以新產品開發專案團隊為例
檔案 [Endnote RIS 格式]    [Bibtex 格式]    [相關文章]   [文章引用]   [完整記錄]   [館藏目錄]   [檢視]  [下載]
  1. 本電子論文使用權限為同意立即開放。
  2. 已達開放權限電子全文僅授權使用者為學術研究之目的,進行個人非營利性質之檢索、閱讀、列印。
  3. 請遵守中華民國著作權法之相關規定,切勿任意重製、散佈、改作、轉貼、播送,以免觸法。

摘要(中) 隨著科技及大數據技術的興起,隱私問題越來越受到大眾關注,揭露隱私存在著潛在的風險,但人們還是選擇揭露個人的敏感性資訊,這之間的矛盾現象稱為隱私悖論,對於隱私問題的擔憂與自我揭露行為這之間的不一致性尚未被完全解釋,根據文獻指出人們在揭露個人訊息時會權衡於揭露隱私產生的風險及報酬,並最大化預期的收益及成本並作出決策。
根據Trope, Liberman, and Wakslak (2007)提出的CLT理論的心理距離會影響人內心的某個感覺,事件發生的時間離現在越遠或是事件發生的機率越低,在人的心理上感覺越遙遠,事件發生的時間離現在越近或是事件發生的機率越高,在心理上感覺越近,從CLT的觀點了解個人隱私感知與其行為之間的差距,應用在自我揭露的情境中,因此本研究發展一套架構及實驗,用以探討報酬、隱私風險與自我揭露意圖之關係,並且探討心理距離對於報酬、隱私風險與自我揭露意圖之影響。
摘要(英) With the rise of technology and big data technology, privacy issues have attracted more and more attention from the public. There are potential risks in revealing privacy. However, people still choose to disclose personal sensitive information. The gap between privacy concerns and privacy-related behavior is known as the "privacy paradox". The inconsistency between privacy concerns and self-disclosure behavior has not fully explained. The literature argue that when people disclose personal information, they will consider the risks and rewards of revealing privacy. According to the psychological distance of CLT theory proposed by Trope et al. (2007), it will affect a certain feeling psychologically. The greater the temporal or hypothetical from an event, the more distant it appears and the more abstractly. For example, an event is more psychologically distant as it takes place farther into the future, and as it is less likely to occur. Using a CLT perspective in the context of self-disclosure, we develop a framework and experiment to understand the relationship between rewards, privacy risks and self-disclosure intentions, and exploring the impact of psychological distance on rewards, privacy risks and self-disclosure intentions.
關鍵字(中) ★ 報酬
★ 隱私風險
★ 自我揭露意圖
★ 心理距離
關鍵字(英)
論文目次 目錄

摘要 i
Abstract ii
誌謝 iii
目錄 iv
圖目錄 vii
表目錄 viii
一、緒論 1
1-1 研究背景與動機 1
1-2 研究目的與問題 2
二、文獻探討 3
2-1 自我揭露 (Self-Disclosure) 3
2-2 隱私風險 (Privacy Risk) 3
2-3 報酬 (Rewards) 4
2-4 解釋水平理論(Construal Level Theory , CLT) 4
2-4-1 解釋的水平(Level of Construal) 4
2-4-2 心理距離(Psychological Distance) 5
2-4-3 時間距離 (Temporal Distance) 6
2-4-4 機率距離 (Probability Distance) 6
三、研究設計 7
3-1 研究架構 7
3-2 研究假說 8
3-2-1 報酬、隱私風險與自我揭露意圖之關係 8
3-2-2 時間距離及機率距離程度在報酬、隱私風險與自我揭露意圖之調節效果 9
3-3 實驗設計 11
3-3-1 時間距離的實驗方法 12
3-3-2 機率距離的實驗方法 20
四、資料分析 28
4-1資料處理與統計方法 28
4-1-1資料處理 28
4-1-2 統計分析類別 29
4-2 隱私風險對自我揭露意圖之分析 29
4-3 報酬對自我揭露意圖之分析 30
4-4 時間距離提高對於隱私風險與自我揭露意圖關係之差異度程度分析 32
4-5 時間距離提高對於報酬與自我揭露意圖關係之差異度程度分析 32
4-6 機率距離提高對於隱私風險與自我揭露意圖關係之差異度程度分析 33
4-7 機率距離提高對於報酬與自我揭露意圖關係之差異度程度分析 34
五、結論與建議 35
5-1研究結論與貢獻 35
5-2研究限制與未來建議 36
六、參考文獻 37
七、附錄 41
參考文獻 Acquisti, A. (2004). Privacy in electronic commerce and the economics of immediate gratification. Paper presented at the Proceedings of the 5th ACM conference on Electronic commerce.
Acquisti, A., & Grossklags, J. (2005). Privacy and rationality in individual decision making. IEEE Security & Privacy, 3(1), 26-33.
Ansari, A., & Mela, C. F. (2003). E-customization. Journal of marketing research, 40(2), 131-145.
Babbie, E. (2015). The practice of social research: Nelson Education.
Barnes, S. B. (2006). A privacy paradox: Social networking in the United States. First Monday, 11(9).
Bennett, C. J. (1995). The political economy of privacy: a review of the literature. Hackensack, NJ: Center for Social and Legal Research.
Budnitz, M. E. (1998). Privacy protection for consumer transactions in electronic commerce: why self-regulation is inadequate. South Carolina Law Review, 49, 847.
Campbell, J. E., & Carlson, M. (2002). Panopticon. com: Online surveillance and the commodification of privacy. Journal of Broadcasting & Electronic Media, 46(4), 586-606.
Cantor, N., & Mischel, W. (1979). Prototypes in Person Perception1 Advances in experimental social psychology (Vol. 12, pp. 3-52): Elsevier.
Debatin, B., Lovejoy, J. P., Horn, A. K., & Hughes, B. N. (2009). Facebook and online privacy: Attitudes, behaviors, and unintended consequences. Journal of Computer?Mediated Communication, 15(1), 83-108.
Dinev, T., & Hart, P. (2006). An extended privacy calculus model for e-commerce transactions. Information Systems Research, 17(1), 61-80.
Featherman, M. S., & Pavlou, P. A. (2003). Predicting e-services adoption: a perceived risk facets perspective. International journal of human-computer studies, 59(4), 451-474.
Greene, K. (2000). Disclosure of chronic illness varies by topic and target: The role of stigma and boundaries in willingness to disclose. Balancing the secrets of private disclosures, 123-135.
Hallam, C., & Zanella, G. (2017). Online self-disclosure: The privacy paradox explained as a temporally discounted balance between concerns and rewards. Computers in Human Behavior, 68, 217-227.
Hampson, S. E., John, O. P., & Goldberg, L. R. (1986). Category breadth and hierarchical structure in personality: Studies of asymmetries in judgments of trait implications. Journal of personality and social psychology, 51(1), 37.
Hann, I. H., Hui, K. L., Lee, S. Y. T., & Png, I. P. L. (2008). Overcoming online information privacy concerns: An information-processing theory approach. .Journal of Management Information Systems, 24(2), 13-42.
Hillsdale, N., & Erlbaum, L. (1978). Principles of Categorization. Cognition and categorization, 27-48.
Hui, K. L., Teo, H. H., & Lee, T. S. Y. (2007). The value of privacy assurance: An exploratory field experiment. MIS Quarterly, 31(1), 19-33.
Jiang, Z., Heng, C. S., & Choi, B. C. (2013). Research note—privacy concerns and privacy-protective behavior in synchronous online social interactions. Information Systems Research, 24(3), 579-595.
Keren, G., & Roelofsma, P. (1995). Immediacy and certainty in intertemporal choice. Organizational Behavior and Human Decision Processes, 63(3), 287-297.
Laufer, R. S., & Wolfe, M. (1977). Privacy as a concept and a social issue: A multidimensional developmental theory. Journal of social Issues, 33(3), 22-42.
Lawler, E. J., & Thye, S. R. (1999). Bringing emotions into social exchange theory. Annual review of sociology, 25(1), 217-244.
Lee, H., Park, H., & Kim, J. (2013). Why do people share their context information on Social Network Services? A qualitative study and an experimental study on users′ behavior of balancing perceived benefit and risk. International journal of human-computer studies, 71(9), 862-877.
Liberman, N., & Trope, Y. (1998). The role of feasibility and desirability considerations in near and distant future decisions: A test of temporal construal theory. Journal of personality and social psychology, 75(1), 5.
Liberman, N., Trope, Y., & Stephan, E. (2007). Psychological distance. Social psychology: Handbook of basic principles, 2, 353-383.
Madden, M. (2014). Public perceptions of privacy and security in the post-Snowden era. Pew Research Center, 12.
Malhotra, N. K., Kim, S. S., & Agarwal, J. (2004). Internet users′ information privacy concerns (IUIPC): The construct, the scale, and a causal model. Information Systems Research, 15(4), 336-355.
Milne, G. R., & Gordon, E. M. (1993). Direct mail privacy-efficiency trade-offs within an implied social contract framework. Journal of Public Policy and Marketing, 12(2), 206-215.
Mullainathan, S., & Thaler, R. H. (2000). Behavioral economics. Retrieved from
O′Donoghue, T., & Rabin, M. (2001). Choice and procrastination. The Quarterly Journal of Economics, 116(1), 121-160.
Omarzu, J. (2000a). A Disclosure Decision Model: Determining How and When. Personality and Social Psychology Review, 4(2), 174-185.
Omarzu, J. (2000b). A disclosure decision model: Determining how and when individuals will self-disclose. Personality and Social Psychology Review, 4(2), 174-185.
Petronio, S. (2012). Boundaries of privacy: Dialectics of disclosure: Suny Press.
Petronio, S., & Bantz, C. (1991). Research Note: Controlling the Ramifications of Disclosure:Don′t Tell Anybody but. Journal of Language and Social Psychology, 10(4), 263-269.
Prelec, D., & Loewenstein, G. (1991). Decision making over time and under uncertainty: A common approach. Management science, 37(7), 770-786.
Preston, J. (2004). Judge strikes down section of patriot act allowing secret subpoenas of Internet data. New York Times, 30, 26.
Rachlin, H., Castrogiovanni, A., & Cross, D. (1987). Probability and delay in commitment. Journal of the Experimental Analysis of Behavior, 48(3), 347-353.
Rachlin, H., Raineri, A., & Cross, D. (1991). Subjective probability and delay. Journal of the Experimental Analysis of Behavior, 55(2), 233-244.
Schoeman, F. D. (1984). Philosophical dimensions of privacy: An anthology: Cambridge University Press.
Semin, G. R., & Fiedler, K. (1988). The cognitive functions of linguistic categories in describing persons: Social cognition and language. Journal of personality and social psychology, 54(4), 558.
Simon, H. A. (1959). Theories of decision-making in economics and behavioral science. The American economic review, 49(3), 253-283.
Smith, H. J., Dinev, T., & Xu, H. (2011). Information privacy research: an interdisciplinary review. MIS Quarterly, 35(4), 989-1016.
Todorov, A., Goren, A., & Trope, Y. (2007). Probability as a psychological distance: Construal and preferences. Journal of Experimental Social Psychology, 43(3), 473-482.
Trope, Y. (1986). Identification and inferential processes in dispositional attribution. Psychological review, 93(3), 239.
Trope, Y. (1989). Levels of inference in dispositional judgment. Social Cognition, 7(3), 296-314.
Trope, Y., Liberman, N., & Wakslak, C. (2007). Construal levels and psychological distance: Effects on representation, prediction, evaluation, and behavior. Journal of consumer psychology, 17(2), 83-95.
Tufekci, Z. (2008). Can you see me now? Audience and disclosure regulation in online social network sites. Bulletin of Science, Technology & Society, 28(1), 20-36.
Viswanathan, S., Kuruzovich, J., Gosain, S., & Agarwal, R. (2007). Online infomediaries and price discrimination: Evidence from the automotive retailing sector. Journal of Marketing, 71(3), 89-107.
Wald, M. L. (2004). Airline Gave Government Information on Passengers. The New York Times, 16-16.
Weber, B. J., & Chapman, G. B. (2005). The combined effects of risk and time on choice: Does uncertainty eliminate the immediacy effect? Does delay eliminate the certainty effect? Organizational Behavior and Human Decision Processes, 96(2), 104-118.
Wheeless, L. R. (1976). Self?disclosure and interpersonal solidarity: Measurement, validation, and relationships. Human Communication Research, 3(1), 47-61.
Xu, H., Luo, X. R., Carroll, J. M., & Rosson, M. B. (2011). The personalization privacy paradox: An exploratory study of decision making process for location-aware marketing. Decision support systems, 51(1), 42-52.
Yuan, M. (2012). A private sphere: democracy in a digital age: Taylor & Francis.
指導教授 陳炫碩(Shiuann-Shuoh Chen) 審核日期 2018-7-26
推文 facebook   plurk   twitter   funp   google   live   udn   HD   myshare   reddit   netvibes   friend   youpush   delicious   baidu   
網路書籤 Google bookmarks   del.icio.us   hemidemi   myshare   

若有論文相關問題,請聯絡國立中央大學圖書館推廣服務組 TEL:(03)422-7151轉57407,或E-mail聯絡  - 隱私權政策聲明