博碩士論文 100423030 詳細資訊




以作者查詢圖書館館藏 以作者查詢臺灣博碩士 以作者查詢全國書目 勘誤回報 、線上人數:15 、訪客IP:3.228.220.31
姓名 吳芷凡(Wu Chin-Fan)  查詢紙本館藏   畢業系所 資訊管理學系
論文名稱 網路社群使用者的隱私關注與個人資料揭露行為之研究
(A study on user’s privacy concern and self-disclosure in social network sites)
相關論文
★ 製藥業的成本會計評估研究─ 一個ABC成本制度的應用★ 一個保險業的資料採擷應用--業務員的薪酬制度分析
★ 農漁產品電子化交易中分類分級管理之研究★ 應用類神經網路建構壽險核保決策支援之研究
★ 企業導入ERP之關鍵成功因素-個案研究★ 體外診斷醫療器材滿足CE及GMP驗證要求之個案研
★ 企業資訊系統委外研究-以個案銀行為例★ DRAM月平均價格變動分析
★ 定期航運產業運價及運送時間對經營績效影響之研究-以某外商海運公司在台灣經營為例★ 以交通儲值卡作為電子支付工具的營運模式及可行性分析
★ 軟體公司能力成熟度評估★ 加速台灣海關的通關便捷化-提升行動化服務的解決方案
★ 以均勻度係數為預測晶圓良率指標之可行性分析-以國內某DRAM廠為例★ 某公司資訊部門變革失敗之探討
★ 資訊部門導入ITIL 管理機制之現況分析─ 以企業導入ITIL 服務支援為例★ 導入WCO SAFE 優質企業之可行性分析–以A航空公司為例
檔案 [Endnote RIS 格式]    [Bibtex 格式]    [相關文章]   [文章引用]   [完整記錄]   [館藏目錄]   [檢視]  [下載]
  1. 本電子論文使用權限為同意立即開放。
  2. 已達開放權限電子全文僅授權使用者為學術研究之目的,進行個人非營利性質之檢索、閱讀、列印。
  3. 請遵守中華民國著作權法之相關規定,切勿任意重製、散佈、改作、轉貼、播送,以免觸法。

摘要(中) 網路社群是現代網路使用者的主要集中地之一。使用者會在社群上公開個人資訊、分享生活經驗,或進行網路社交活動,大量集中的網路人口與使用者個人資料,吸引了企業、廣告商,或學術調查者,利用社群網站散佈問卷或收集個人資料。由於網路的開放環境特性,任何人都能搜尋甚至收集公開的個人資料,而收集來的資料也可能面臨被誤用或濫用的風險。從資料收集者的角度,為了讓使用者的行為偏向提供真實個人資料,他們可能會以提供一份獎勵的方式來當作刺激因素。
本研究主要探討使用者對社群網站的隱私顧慮會如何影響個人資料的公開行為,以及誘因的存在與否是否會影響到使用者的隱私顧慮與其行為之間的關係,並由研究結果來對資料收集者提供建議。本研究利用「實驗室研究」作為研究方法,有效實驗樣本102人,實驗網站為虛擬社群網站。研究結果發現,使用者的「隱私顧慮」會受到「隱私操控」、「隱私安全信號」,與「信任」的影響,「隱私安全信號」對「隱私操控」與「隱私顧慮」有調節效果,「誘因」對「隱私顧慮」與「個人資料揭露行為」有調節效果。
摘要(英) Nowadays, Social Networking is one of the activity centers for online users. Many users disclose and share their life experience and mingles with one another through the Social Networking websites. Large number of users and huge amount of user’s personal information attract enterprises, advertisers, and academic investigators, who distribute network questionnaires or collect personal information on-line. Due to the open network environment, everyone can search for even collect others personal information, and network questionnaire can also be a way to collect user’s personal information, and the information collected could be misused or abused. Often times, information collectors may provide a gift or a reward to encourage users to disclose their genuine information.
This study attempts to explore how user’s privacy concern affects their behavior in disclosing personal information, and if rewards would moderate the effects of privacy concern on disclosure behavior.Laboratory experimentation with 102 participants was carried out in this study. Result shows that “privacy control,” “privacy signals” and “trust” are antecedents to user’s “privacy concern,” while “privacy signal” moderates the effects of “privacy control” on “privacy concern,” and “reward” moderates the effects of “privacy concern” on “self-disclosure behavior.”
關鍵字(中) ★ 網路社群
★ 隱私顧慮
★ 個人資料揭露行為
關鍵字(英) ★ social networking
★ privacy concern
★ self-disclosure behavior
論文目次 中文摘要 iv
Abstract v
致謝 vi
目錄 vii
圖目錄 ix
表目錄 x
第一章 緒論 1
1-1 研究背景與動機 1
1-2 研究目的 2
1-3 研究流程 2
第二章 文獻探討 4
2-1 網路社群 4
2-2 網路隱私權 7
2-3 信息傳遞相關理論 9
2-4 信任 10
第三章 研究方法 12
3-1 研究架構與假說 12
3-2 研究設計 14
3-3 研究變數之定義與操作化 16
3-4 問卷前測 18
3-5 研究流程 24
第四章 研究分析 29
4-1 樣本基本資料分析 29
4-2 信度與效度檢驗 29
4-3 假說檢定 30
4-4 研究假說檢定結果彙集 36
第五章 結論與建議 37
5-1 研究結果與討論 37
5-2 管理意涵 39
5-3 研究限制與未來建議 40
參考文獻 43
1 中文部分 43
2 英文部分 43
3 網路資料 45
附錄 46
參考文獻 1 中文部分
[1] 阮紹薇,(2000)。電腦網路中「虛擬社群」現象與經營策略之探討。臺北市:國立臺灣大學圖書館。
[2] 連文雄,(2006)。影響使用者對資訊系統委外廠商信任的因素探討。桃園縣:國立中央大學圖書館。
2 英文部分
[1] Armstrong, A. G. & III, J. H. (1997). Net gain: Expanding Markets Through Virtual Communities (16th ed.), Harvard Business School Press, Boston.
[2] Barab, S. A. (2003). “An introduction to the special issue: Designing for virtual communities in the service of learning.” The Information Society, 19, 197-201.
[3] Chin, W. W., Marcolin, B. L., & Newsted, P. R. (2003). “A Partial Least Squares Latent Variable Modeling Approach for Measuring Interaction Effects: Results from a Monte Carlo Simulation Study and an Electronic-Mail Emotion/Adoption Study.” Information Systems Research, 14(2), 189-217.
[4] Coe, J.B., Weijs, C.A., Muise, A., Christofides, E., & Desmarais, S. (2011). “Teaching Veterinary Professionalism in the Face(book) of Change.” Journal of Veterinary Medical Education, 38(4), 353-359.
[5] Dinev, T. & Hart, P. (2006). “An extended privacy calculus model for e-commerce transactions.” Information Systems Research, 17(1), 61–80.
[6] Dwyer, C., Hiltz, S. R., & Passerini, K. (2007). “Trust and privacy concern within social networking sites: A comparison of Facebook and MySpace.” Proceedings of AMCIS 2007, Keystone, CO.
[7] Goodwin, C. (1991). “Privacy: Recognition of a consumer right.” Journal of Public Policy Mark, 10(1), 106-119.
[8] Krasnova, H., Spiekermann, S., Koroleva, K., & Hildebrand, T. (2010). “Online social networks why we disclose.” Journal of Information Technology, 25, 109–125.
[9] Li, H., Sarathy, R., & Wu, H. (2010). “Understanding situational online information disclosure as a privacy calculus.” Journal of Computer Information Systems, 51(1), 52-71.
[10] Li, H., Sarathy, R., & Wu, H. (2011). “The role of affect and cognition on online consumers’ decision to disclose personal information to unfamiliar online vendors.” Decision Support Systems, 51, 434-445.
[11] Markus, H. R. & Kitayama, S. (1991). “Culture and the Self Implications for Cognition, Emotion, and Motivation.” Psychological Review, 98(2),224-253.
[12] Mason, R. O. (1986). “Four ethical issues of the information age.” MIS Quarterly, 10(1), 5–12.
[13] Mayer, R. C., Davis, J. H., & Schoorman, F. D.(1995). “An Integrative Model of Organizational Trust.” Academy of Management Review, 20(3), 709-734.
[14] McCallister, E., Grance, T., & Scarfone, K. A. (2010). Guide to Protecting the Confidentiality of Personally Identifiable Information (PII). National Institute of Standards and Technology (NIST), Special Publication 800-122
[15] McCrohan, K. F. (1989). “Information technology, privacy, and the public good.” Journal of Public Policy Marketing, 8, 265-78.
[16] Metzger , M. J. (2004). “Privacy, Trust, and Disclosure: Exploring Barriers to Electronic Commerce.” Journal of Computer-Mediated Communication, 9(4).
[17] Parrish, J. (2010). “PAPA knows best: Principles for the ethical sharing of information on social networking sites.” Ethics and Information Technology, 12(2), 187-193.
[18] Rheingold, H. (2000). The Virtual Community: Homesteading on the Electronic Frontier. Cambridge: MIT Press.
[19] Romm, C. & Plisjin, N. R. (1997). “Virtual communities and society: Toward and Integrative three phase model.” International Journal of Information Management, 17(4), 261-270.
[20] Stutzman, F. (2006). “An evaluation of identity-sharing behavior in social network communities.” Journal of the International Digital Media and Arts Association, 3(1), 10–18.
[21] Sweat, J. (2000). “Privacy paradox: customers want control – and coupons”, Information Week, 781, 52-53.
[22] Warren, S. D. & Brandeis, L. D. (1890). “The Right to Privacy.” Harvard Law Review, 4, 193-214.
[23] Wasko, M. M. & Faraj, S. (2000). “It is What One Does’: Why people participate and help others in electronic communities of practice.” Journal of Strategic Information Systems, 9, 155-173.
[24] Yao, M. Z., Rice, R. E., & Wallis, K. (2007). “Predicting User Concerns About Online Privacy.” Journal of the American Society for Information Science and Technology, 58(5), 710-722.
[25] Zeng, S. Y., Wu, L. L., & Chen, H. G. (2009). “Sharing Private Information Online: the Mediator Effect of Social Exchange.” Proceedings of the 11th International Conference on Electronic Commerce, 231-239.
[26] Zimmer, J. C., Arsal, R. E., Al-Marzouq, M., & Grover, V. (2010). “Investigating online information disclosure: Effects of information relevance, trust and risk.” Information & Management, 47(2), 115–23.
3 網路資料
[1] BBBOnLine, (2013). Retrieved June, 2013 from: http://www.bbb.org/us/bbb-online-business/
[2] Brett (2013). “Social platforms gwi.8 update: decline of local social media platforms.” Retrieved June, 2013 from: https://www.globalwebindex.net/social-platforms-gwi-8-update-decline-of-local-social-media-platforms/
[3] Doug C. (2008). “ComScore: Facebook Matches MySpace.” Retrieved June, 2013 from: http://www.webpronews.com/comscore-facebook-matches-myspace-2008-06
[4] EuroPriS, (2013). Retrieved June, 2013 from: https://www.european-privacy-seal.eu/
[5] SOSA, (2013). Retrieved June, 2013 from: http://www.sosa.org.tw/index.asp
[6] TRUSTe, (2013). Retrieved June, 2013 from: http://www.truste.com/ 
指導教授 范錚強 審核日期 2013-7-29
推文 facebook   plurk   twitter   funp   google   live   udn   HD   myshare   reddit   netvibes   friend   youpush   delicious   baidu   
網路書籤 Google bookmarks   del.icio.us   hemidemi   myshare   

若有論文相關問題,請聯絡國立中央大學圖書館推廣服務組 TEL:(03)422-7151轉57407,或E-mail聯絡  - 隱私權政策聲明