博碩士論文 105421065 詳細資訊




以作者查詢圖書館館藏 以作者查詢臺灣博碩士 以作者查詢全國書目 勘誤回報 、線上人數:22 、訪客IP:18.226.150.245
姓名 劉德馨(Te-Hsin Liu)  查詢紙本館藏   畢業系所 企業管理學系
論文名稱 構面階層理論在線上自我揭露行為的實證研究
(The Empirical Study on the CLT on the Online Self-disclosure Behavior)
相關論文
★ 以第四方物流經營模式分析博連資訊科技股份有限公司★ 探討虛擬環境下隱性協調在新產品導入之作用--以電子組裝業為例
★ 動態能力機會擷取機制之研究-以A公司為例★ 探討以價值驅動之商業模式創新-以D公司為例
★ 物聯網行動支付之探討-以Apple Pay與支付寶錢包為例★ 企業資訊方案行銷歷程之探討-以MES為例
★ B2C網路黏著度之探討-以博客來為例★ 組織機制與吸收能力關係之研究-以新產品開發專案為例
★ Revisit the Concept of Exploration and Exploitation★ 臺灣遠距醫療照護系統之發展及營運模式探討
★ 資訊系統與人力資訊科技資源對供應鏈績效影響之研究-買方依賴性的干擾效果★ 資訊科技對知識創造影響之研究-探討社會鑲嵌的中介效果
★ 資訊科技對公司吸收能力影響之研究-以新產品開發專案為例★ 探討買賣雙方鑲嵌關係影響交易績效之機制 ─新產品開發專案為例
★ 資訊技術運用與協調能力和即興能力 對新產品開發績效之影響★ 團隊組成多元性影響任務衝突機制之研究─ 以新產品開發專案團隊為例
檔案 [Endnote RIS 格式]    [Bibtex 格式]    [相關文章]   [文章引用]   [完整記錄]   [館藏目錄]   [檢視]  [下載]
  1. 本電子論文使用權限為同意立即開放。
  2. 已達開放權限電子全文僅授權使用者為學術研究之目的,進行個人非營利性質之檢索、閱讀、列印。
  3. 請遵守中華民國著作權法之相關規定,切勿任意重製、散佈、改作、轉貼、播送,以免觸法。

摘要(中) 隨著近年行動網路的普及、科技及大數據技術的興起,人們對於隱私問題愈來愈關注,雖然知道揭露隱私存在著潛在著風險,但時常還是選擇揭露個人的敏感資訊,這之間的矛盾現象稱為隱私悖論。對於隱私問題的擔憂與自我揭露行為這之間的不一致性尚未被完全解釋。根據過去研究,人們在揭露個人訊息時會權衡揭露隱私產生的風險及報酬,並最大化預期的收益及成本進而作出決策。
根據Trope, Liberman, and Wakslak (2007)提出的CLT理論,認為會把報酬看得較近、風險看得較遠,但本研究認為仍有其他因素會影響人的自我揭露,並非皆如CLT理論所描述。對於風險趨避的人來說或在賭注大的情況下,難道也是看重報酬大於風險嗎?
本研究發展一套架構及實驗,用以探討報酬、隱私風險與自我揭露意圖之關係,並且探討賭注大小、風險趨避程度的差異在CLT理論下對自我揭露意圖之影響。並得出風險趨避大小及賭注大小皆會影響CLT理論下對自我揭露意圖之結論。
摘要(英) With the popularity of mobile networks, the rise of technology and big data technology in recent years, privacy issues have attracted more and more attention from the public. Although they know that there are potential risks in revealing privacy, people still choose to disclose personal sensitive information. The gap between privacy concerns and privacy-related behavior is known as the "privacy paradox". The inconsistency between privacy concerns and self-disclosure behavior has not fully explained. Previous studies stated that the process of decision making about revealing private information contains an estimation of future risk and benefit.
According to the psychological distance of CLT theory proposed by Trope et al. (2007), people see the rewards closer, and the risks are far away. However, this study believes that there are still other factors that affect people′s self-disclosure, not as described by CLT theory. For people with risk averse or when the stakes are big, is it also see reward closer than risk?
This study develops a set of frameworks and experiments to explore the relationship between rewards, privacy risks, and self-disclosure intentions, and to explore the impact of differences in stake size and risk aversion person on self-disclosure intentions under CLT theory. It is concluded that the people with risk averse and the stake size will affect the conclusion of self-disclosure intention under CLT theory.
關鍵字(中) ★ 報酬
★ 隱私風險
★ 自我揭露意圖
★ 心理距離
★ 賭注
關鍵字(英) ★ Reward
★ Privacy Risk
★ Self-Disclosure Behavior
★ Psychical Distance
★ Stake
論文目次 目錄
摘要 i
Abstract ii
誌謝 iii
目錄 iv
圖目錄 vi
表目錄 vii
一、緒論 1
1-1 研究背景與動機 1
1-2 研究目的與問題 2
二、文獻探討 4
2-1 自我揭露 (self-disclosure) 4
2-2 隱私風險 (privacy risk) 4
2-3 報酬 (rewards) 5
2-4 構面階層理論(construal level theory , CLT) 5
2-4-1 解釋的水平(level of construal) 5
2-4-2 心理距離(psychological distance) 6
2-4-3 機率距離 (probability distance) 6
2-5 風險感知 (risk perceptions) 6
三、研究設計 7
3-1 研究架構 7
3-2 研究假說 8
3-3 實驗設計 9
3-3-1 構面階層理論的實驗方法 10
3-3-2 風險趨避程度的實驗方法 11
3-3-3 賭注大小的實驗方法 13
四、研究結果 16
4-1資料處理與統計分析方法 16
4-1-1資料處理 16
4-1-2 統計分析類別 16
4-2性別敘述性統計分析 16
4-3 報酬對線上自我揭露意願的影響高於風險對自我揭露意願的影響 17
4-4 「風險趨避程度」會調節風險與報酬對自我揭露意願的關係 18
4-5 「賭注大小」會調節風險與報酬對自我揭露意願的關係 20
五、結論與建議 24
5-1研究結論與貢獻 24
5-2研究限制與未來建議 25
參考文獻 26
附錄 29

圖目錄
圖 1 研究架構 7


表目錄
表1 研究假說總表 9
表 2 風險、報酬之情境1.2風險評價、2風險要價 11
表 3 風險趨避程度量表(J. BEHAV,2002) 12
表 4 賭注大小之一、二、三子情境 14
表 5 賭注大小之四、五、六子情境 15
表 6 總體有效樣本性別比例分配表 17
表 7 有效樣本之風險趨避性別比例分配表 17
表 8 有效樣本之風險偏好性別比例分配表 17
表 9 風險評價、風險要價成對樣本統計量 18
表 10 風險評價、風險要價成對樣本檢定 18
表 11 風險趨避量表信度分析 19
表 12 風險趨避程度成對樣本統計量 19
表 13 風險趨避程度成對樣本檢定 20
表 14 賭注大小一、二、三情境敘述統計 21
表 15賭注大小一、二、三情境變異數分析 21
表 16賭注大小四、五、六情境敘述統計 21
表 17賭注大小四、五、六情境變異數分析 21
表 18賭注大小成對樣本統計量 22
表 19賭注大小成對樣本檢定 22
參考文獻 Acquisti, A. Privacy in Electronic Commerce and The Economics of Immediate Gratification. Paper Presented at The Proceedings of the 5th ACM Conference on Electronic Commerce, 21-29, New York, USA, May 17 - 20, 2004
Acquisti, A., & Gross, R. (2006). Imagined Communities: Awareness, Information Sharing, And Privacy on The Facebook. Privacy Enhancing Technologies, 36-58
Acquisti, A., & Grossklags, J. (2005). Privacy And Rationality In Individual Decision Making. IEEE Security & Privacy, 3(1), 26-33.
Ansari, A., & Mela, C. F. (2003). E-Customization. Journal Of Marketing Research, 40(2), 131-145.
Archer, R.L., Burleson, J.A., (1980). The Effects of Timing of Self-Disclosure on Attraction and Reciprocity. Journal of Personality and Social Psychology, 38(1), 120-130.
Beck, U., Giddens, A., & Lash, S., Reflexivity and Its Doubles: Structures, Aesthetics, Community. In Reflexive Modernization: Politics, Tradition and Aesthetics in The Modern Social Order. Polity Press.1994.
Beresford, A. R., Kubler, D., & Preibusch, S. (2012). Unwillingness to Pay for Privacy: A Field Experiment. Economics Letters, 117(1), 25-27.
Berg, J.H., (1984). Development of Friendship Between Roommates. Journal of Personality and Social Psychology 46(2), 346-356.
Brown, B. (2001). HP Laboratories Technical Report HPL. Studying the Internet Experience, 49.
Budnitz, M. E. (1998). Privacy Protection For Consumer Transactions In Electronic Commerce: Why Self-Regulation Is Inadequate. South Carolina Law Review, 49(4), 847-886.
Burgoon, J. K. (1982). Privacy And Communication. Annals Of The International Communication Association, 6(1), 206-249.
Campbell, J. E., & Carlson, M. (2002). Panopticon. Com: Online Surveillance and The Commodification of Privacy. Journal of Broadcasting & Electronic Media, 46(4), 586-606.
Chelune, G. J., Vosk, B. N., Waring, E. M., Sultan, F. E., & Ogden, J. K. (1984). Self‐Disclosure and Its Relationship to Marital Intimacy. Journal of Clinical Psychology,40(1), 216-219.
Clarke, R. (1999). Internet Privacy Concerns Confirm The Case For Intervention. Communications Of The ACM, 42(2), 60-67.
Cory Hallam, Gianluca Zanella (2017). Online Self-Disclosure: The Privacy Paradox Explained as A Temporally Discounted Balance Between Concerns and Rewards. Computers in Human Behavior, 68, 217-227
Debatin, B., Lovejoy, J. P., Horn, A. K., & Hughes, B. N. (2009). Facebook And Online Privacy: Attitudes, Behaviors, And Unintended Consequences. Journal Of Computer‐Mediated Communication, 15(1), 83-108.
Dinev, T., & Hart, P. (2006). An Extended Privacy Calculus Model For E-Commerce Transactions. Information Systems Research, 17(1), 61-80.
Eyal, T., Sagristano, M. D., Trope, Y., Liberman, N., & Chaiken, S. (2009). When Values Matter: Expressing Values in Behavioral Intentions for The Near Vs. Distant Future. Journal of Experimental Social Psychology, 45(1), 35-43.
Featherman, M. S., & Pavlou, P. A. (2003). Predicting E-Services Adoption: A Perceived Risk Facets Perspective. International Journal Of Human-Computer Studies, 59(4), 451-474.
Hann, I. H., Hui, K. L., Lee, S. Y. T., & Png, I. P. L. (2008). Overcoming Online Information Privacy Concerns: An Information-Processing Theory Approach. Journal Of Management Information Systems, 24(2), 13-42.
Hui, K. L., Teo, H. H., & Lee, T. S. Y. (2007). The Value Of Privacy Assurance: An Exploratory Field Experiment. MIS Quarterly, 31(1), 19-33.
Jiang, Z., Heng, C. S., & Choi, B. C. (2013). Research Note—Privacy Concerns And Privacy-Protective Behavior In Synchronous Online Social Interactions. Information Systems Research, 24(3), 579-595.
Jourard, S. M., & Jaffe, P. E. (1970). Influence of An Interviewer′s Disclosure on The Self-Disclosing Behavior of Interviewees. Journal of Counseling Psychology, 17(3), 252.
Kokolakis, S. (2017). Privacy Attitudes and Privacy Behaviour: A Review of Currentresearch On the Privacy Paradox Phenomenon. Computers and Security, 64,122-134.
Laufer, R. S., & Wolfe, M. (1977). Privacy as A Concept and A Social Issue: A Multidimensional Developmental Theory. Journal of Social Issues, 33(3), 22-42.
Lawler, E. J., & Thye, S. R. (1999). Bringing Emotions Into Social Exchange Theory. Annual Review Of Sociology, 25(1), 217-244.
Lee, H., Park, H., & Kim, J. (2013). Why Do People Share Their Context Information On Social Network Services? A Qualitative Study And An Experimental Study On Users′ Behavior of Balancing Perceived Benefit and Risk. International Journal of Human-Computer Studies, 71(9), 862-877.
Liberman, N., Sagristano, M. D., & Trope, Y. (2002). The Effect of Temporal Distance on Level of Mental Construal. Journal of Experimental Social Psychology, 38(6), 523-534.
Madden, M. Public Perceptions of Privacy and Security in The Post-Snowden Era. Pew Research Center, 12. November 2014
Malhotra, N. K., Kim, S. S., & Agarwal, J. (2004). Internet Users′ Information Privacy Concerns (IUIPC): The Construct, The Scale, And A Causal Model. Information Systems Research, 15(4), 336-355.
Milne, G. R., & Gordon, E. M. (1993). Direct Mail Privacy-Efficiency Trade-Offs Within An Implied Social Contract Framework. Journal Of Public Policy And Marketing, 12(2), 206-215.
Norberg, P. A., Horne, D. R., & Horne, D. A. (2007). The Privacy Paradox: Personal Information Disclosure Intentions Versus Behaviors. Journal of Consumer Affairs, 41(1), 100-126.
O′Donoghue, T., & Rabin, M. (2001). Choice And Procrastination. The Quarterly Journal Of Economics, 116(1), 121-160.
Omarzu, J. (2000a). A Disclosure Decision Model: Determining How and When. Personality and Social Psychology Review, 4(2), 174-185.
Omarzu, J. (2000b). A Disclosure Decision Model: Determining How and When Individuals Will Self-Disclose. Personality and Social Psychology Review, 4(2), 174-185.
Petronio, S., & Bantz, C. (1991). Research Note: Controlling the Ramifications of Disclosure: Don′t Tell Anybody But. Journal of Language and Social Psychology, 10(4), 263-269.
Petronio, S., Boundaries Of Privacy: Dialectics Of Disclosure, Suny Press,New York, 2012.
Schoeman, F. D., Philosophical Dimensions of Privacy: An Anthology, Cambridge University Press, 1984.
Smith, H. J., Dinev, T., & Xu, H. (2011). Information Privacy Research: An Interdisciplinary Review. MIS Quarterly, 35(4), 989-1016.
Son, J.-Y., & Kim, S. S. (2008). Internet Users′ Information Privacy-Protective Responses: A Taxonomy and A Nomological Model. MIS Quarterly, 503-529.
Trope, Y., & Liberman, N. (2000). Temporal Construal and Time-Dependent Changes in Preference. Journal of Personality and Social Psychology, 79(6), 876-889.
Trope, Y., & Liberman, N. (2003). Temporal Construal. Psychological Review, 110(3),403-421.
Tufekci, Z. (2008). Can You See Me Now? Audience and Disclosure Regulation in Online Social Network Sites. Bulletin of Science, Technology and Society, 28(1), 20-36.
Viswanathan, S., Kuruzovich, J., Gosain, S., & Agarwal, R. (2007). Online Infomediaries And Price Discrimination: Evidence from The Automotive Retailing Sector. Journal of Marketing, 71(3), 89-107.
Wheeless, L. R. (1976). Self‐Disclosure and Interpersonal Solidarity: Measurement, Validation, And Relationships. Human Communication Research, 3(1), 47-61.
Xu, H., Luo, X. R., Carroll, J. M., & Rosson, M. B. (2011). The Personalization Privacy Paradox: An Exploratory Study Of Decision Making Process For Location-Aware Marketing. Decision Support Systems, 51(1), 42-52.
Yuan, M., A Private Sphere: Democracy In A Digital Age, Taylor & Francis, 2012
指導教授 陳炫碩(Shiuann-Shuoh Chen) 審核日期 2019-6-27
推文 facebook   plurk   twitter   funp   google   live   udn   HD   myshare   reddit   netvibes   friend   youpush   delicious   baidu   
網路書籤 Google bookmarks   del.icio.us   hemidemi   myshare   

若有論文相關問題,請聯絡國立中央大學圖書館推廣服務組 TEL:(03)422-7151轉57407,或E-mail聯絡  - 隱私權政策聲明