博碩士論文 107423017 詳細資訊




以作者查詢圖書館館藏 以作者查詢臺灣博碩士 以作者查詢全國書目 勘誤回報 、線上人數:69 、訪客IP:18.191.239.181
姓名 王雅婷(Ya-Ting Wang)  查詢紙本館藏   畢業系所 資訊管理學系
論文名稱 偽造還是不揭露?隱私與利益衝突對意圖之影響研究
(Falsify or Withhold? The Effects of Conflict between Privacy Concern and Perceived Benefit on Disclosure Intention)
相關論文
★ 製藥業的成本會計評估研究─ 一個ABC成本制度的應用★ 一個保險業的資料採擷應用--業務員的薪酬制度分析
★ 農漁產品電子化交易中分類分級管理之研究★ 應用類神經網路建構壽險核保決策支援之研究
★ 企業導入ERP之關鍵成功因素-個案研究★ 體外診斷醫療器材滿足CE及GMP驗證要求之個案研
★ 企業資訊系統委外研究-以個案銀行為例★ DRAM月平均價格變動分析
★ 定期航運產業運價及運送時間對經營績效影響之研究-以某外商海運公司在台灣經營為例★ 以交通儲值卡作為電子支付工具的營運模式及可行性分析
★ 軟體公司能力成熟度評估★ 加速台灣海關的通關便捷化-提升行動化服務的解決方案
★ 以均勻度係數為預測晶圓良率指標之可行性分析-以國內某DRAM廠為例★ 某公司資訊部門變革失敗之探討
★ 資訊部門導入ITIL 管理機制之現況分析─ 以企業導入ITIL 服務支援為例★ 導入WCO SAFE 優質企業之可行性分析–以A航空公司為例
檔案 [Endnote RIS 格式]    [Bibtex 格式]    [相關文章]   [文章引用]   [完整記錄]   [館藏目錄]   [檢視]  [下載]
  1. 本電子論文使用權限為同意立即開放。
  2. 已達開放權限電子全文僅授權使用者為學術研究之目的,進行個人非營利性質之檢索、閱讀、列印。
  3. 請遵守中華民國著作權法之相關規定,切勿任意重製、散佈、改作、轉貼、播送,以免觸法。

摘要(中) 在數據分析的浪潮下,越來越多公司傾向蒐集各式各樣使用者的資料,藉此深入了解顧客進行精準行銷。然而對使用者而言,卻有侵犯隱私的疑慮,擔心被公司未經授權利用或是洩露甚至賣給第三方。過往研究著重在使用者基於隱私顧慮是否會自我揭露,然後在現實情況下,即使自我揭露,也可能是使用者偽造的資料。
本研究以計畫行為理論為基礎,將隱私顧慮視為計畫行為理論的態度,將感知利益視為計畫行為理論的感知行為控制,並加上馬基維利人格作為調節變數。透過網路問卷方式收集研究資料,從註冊音樂串流服務的使用者角度,探討使用者不願揭露資料及提供偽造資料之影響因素。
研究結果指出「隱私顧慮」對「不揭露意圖」及「偽造意圖」有直接正向影響;「感知利益」對「不揭露意圖」及「偽造意圖」有直接負向影響;而本研究另外將馬基維利人格納入研究架構中,結果指出「馬基維利人格」對「隱私顧慮」與「偽造意圖」有調節作用。由以上結果發現,使用者感受到的試用價值越高,確實會讓使用者去註冊帳號並揭露個人資料。且當使用者越擔心個人隱私會受到非預期使用時,使用者就越不願意去揭露資料甚至會偽造註冊資料。然而,受到馬基維利人格的調節,有較高程度馬基維利人格的使用者會有較高的偽造意圖。最後,本研究建議企業檢視個人資料蒐集、處理、利用過程皆符合特定目的及必要範圍,符合法規之要求,也增加取得使用者真實資料的機會。
摘要(英) Following the trends of and “know your customers” and data analytics, more and more enterprises collect all kinds of users related date for in depth analysis. However, users are concerned that personal data could be misused or be unlawfully revealed, even be sold to third parties. Pervious researches focus on user’s intention to disclosure based on privacy concern. However, in reality, user would intentionally choose to disclosure false information.
This study is based on the Theory of Planned Behavior. In the research model, “privacy concern” plays the role of “attitude,” “perceived benefit” is treated as “perceived behavioral control.” Additionally, the “Machiavellianism” trait is added as a moderator. This study attempts to look into the antecedents resulting in falsification and/or withholding intentions when users sign up for new Internet accounts.
Results reveal that “privacy concern” does positively affect both “falsification” and “withholding” intentions; and “perceived benefit” reduces both “falsification” and “withholding” intentions. Additionally, “Machiavellianism” moderates the effect of “privacy concern” on “falsification intention”. Results also show that with higher perceived benefit, users are more likely to sign up and disclosure their personal data. Also, users are likely to withhold or falsify, when they are more concerned about their privacy being used unexpectedly. However, the moderating effect of Machiavellianism is such that users with higher level of Machiavellianism are more likely to falsify. In conclusion, this study suggests that enterprises should collect, process and use personal data for specified, explicit and legitimate purposes and not further processed in a manner that is incompatible with those purposes.
關鍵字(中) ★ 計畫行為理論
★ 隱私顧慮
★ 馬基維利人格
★ 不揭露
★ 偽造
關鍵字(英) ★ Theory of Planned Behavior (TPB)
★ Privacy concern
★ Withholding
★ Falsification
★ Machiavellianism
論文目次 摘要 I
Abstract II
目錄 III
圖目錄 VI
表目錄 VII
第一章 緒論 1
1-1 研究背景 1
1-2 研究動機 1
1-3 研究目的 2
第二章 文獻探討 3
2-1 計畫行為理論 3
2-2 隱私 4
2-2-1 隱私顧慮 5
2-2-2 感知隱私風險 7
2-2-3 信任 7
2-2-4 個人資料敏感度 9
2-3 感知利益 9
2-4 不揭露意圖及偽造意圖 10
2-5 馬基維利人格 11
第三章 研究方法 13
3-1 研究架構與假說 13
3-1-1 「感知隱私風險」對「隱私顧慮」之影響 13
3-1-2 「信任」對「隱私顧慮」之影響 14
3-1-3 「個人資料敏感度」對「隱私顧慮」之影響 14
3-1-4 「隱私顧慮」對「不揭露意圖」及「偽造意圖」之影響 14
3-1-5 「感知利益」對「不揭露意圖」及「偽造意圖」之影響 15
3-1-6 「馬基維利人格」對「偽造意圖」之影響 15
3-2 變數的操作型定義 16
3-2-1 感知隱私風險 16
3-2-2 信任 16
3-2-3 個人資料敏感度 17
3-2-4 隱私顧慮 19
3-2-5 感知利益 20
3-2-6 馬基維利人格 21
3-2-7 不揭露意圖與偽造意圖 22
3-3 研究設計 22
第四章 資料分析 24
4-1 問卷回收過程 24
4-2 敘述性統計分析 24
4-3 問卷量表之信、效度檢驗 25
4-3-1 效度檢驗 26
4-3-3 信度檢驗 28
4-4 研究假說的實質關係檢定 29
4-4-1 模型適配度 29
4-4-2 研究假說驗證結果 29
4-4-3調節效果 31
4-5 小結 32
第五章 結論與建議 34
5-1 研究結果 34
5-1-1 影響隱私顧慮因素 34
5-1-2 使用者不揭露個人資料意圖 35
5-1-3 使用者偽造個人資料意圖 35
5-1-4 馬基維利人格調節效果 35
5-2 管理意涵 35
5-3 研究限制與未來建議 36
5-3-1 樣本限制 36
5-3-2 填答者之偏誤 36
5-3-3 個人資料敏感度之有效性及程度 37
5-3-4 感知利益之有效性及程度 37
5-3-5 信任之有效性 37
參考文獻 38
附錄一 問卷設計 46
參考文獻 [1] Aiken, L. S., & West, S. G. (1991). Multiple regression: Testing and interpreting interactions. Sage Publications, Inc.
[2] Ajzen, I. (1991). The theory of planned behavior. Organizational Behavior and Human Decision Processes, 50(2), 179-211.
[3] Ajzen, I., & Fishbein, M. (1980). Understanding Attitudes and Predicting Social Behavior. Prentice-Hall.
[4] Ames, M., & Kidd, A. H. (1979). Machiavellianism and women′s grade point averages. Psychological Reports, 44(1), 223-238.
[5] Andrade, E. B., Kaltcheva, V., & Weitz, B. (2002). Self-Disclosure on the web: the impact of privacy policy, reward and company reputation. Advances in Consumer Research, 29(1), 350-353.
[6] Bansal, G., Zahedi, F., & Gefen, D. (2010). The Impact of Personal Dispositions on Information Sensitivity, Privacy Concern and Trust in Disclosing Health Information Online. Decision Support Systems, 49(2), 138-150.
[7] Baucer, R. A. (1960). Consumer behavior as risk taking. In B. J. Michael, Marketing: Critical Perspectives on Business and Management (pp. 13-21).
[8] Bellman, S., Johnson, E. J., Kobrin, S. J., & Lohse, G. L. (2004). International Differences in Information Privacy Concerns: A Global Survey of Consumers: A Global Survey of Consumers. The Information Society, 20(5), 313-324.
[9] Belschak, F. D., Den Hartog, D. N., & De Hoogh, A. H. (2018). Behaviors, Angels and Demons: The Effect of Ethical Leadership on Machiavellian Employees’ Work Behaviors. Frontiers in Psychology, 9, 1082.
[10] Berendt, B., Gunther, O., & Spiekermann, S. (2005). Privacy in E-Commerce: Stated Preferences vs. Actual Behavior. Communications of the ACM, 48(4), 101-106.
[11] Bhattacherjee, A. (2002). Individual Trust in Online Firms: Scale Development and Initial Test. Journal of Management Information Systems, 19(1), 211-241.
[12] Cheung, C., & Lee, M. K. (2000). Trust in Internet Shopping: A Proposed Model and Measurement Instrument. AMCIS 2000 Proceedings, (pp. 681–689).
[13] Cheung, C., Lee, Z. W., & Chan, T. K. (2015). Self-disclosure in social networking sites: The role of perceived cost, perceived benefits and social influence. Internet Research, 25(2), 279-799.
[14] Christie, R., & Geis, F. L. (1970). Studies in Machiavellianism. New York: Academic Press.
[15] Cozby, P. C. (1973). Self-disclosure: a literature review. Psychological Bulletin, 79(2), 73-91.
[16] Culnan, M. J., & Armstrong, P. K. (1999). . Information Privacy Concerns, Procedural Fairness, and Impersonal Trust: An Empirical Investigation. Organization Science, 10(1), 104-115.
[17] Dinev, T., & Hart, P. (2006). An Extended Privacy Calculus Model for E-Commerce Transactions. Information Systems, 17(1), 61-80.
[18] Dinev, T., Xu, H., Smith, J. H., & Hart, P. (2013). Information Privacy and Correlates: An Empirical Attempt to Bridge and Distinguish Privacy-Related Concepts. European Journal of Information Systems, 22, 295–316.
[19] Drennan, J., & Mort, G. (2003). Examination of the influence of personal attributes on consumer use on m-services. In: ANZMAC 2003 Conference.
[20] Drory, A., & Gluskinos, U. M. (1980). Machiavellianism and leadership. Journal of Applied Psychology, 65(1), 81-86.
[21] Faja, S., & Trimi , S. (2006). Influence of the Web Vendor‘s Interventions on Privacy-Related Behaviors in ECommerce Commerce. Communications of the Association for Information Systems, 17, 593-634.
[22] Forsythe, S. M., Liu, C., Shannon, D., & Gardner, L. D. (2006). “Development of a scale to measure the perceived benefits and risks of online shopping. Journal of Interactive Marketing, 20(2), 55-75.
[23] Grabosky, P. (2001). The nature of trust in the online world. The Age, 1-12.
[24] Hann, I.-H., Hui, K.-L., Lee, S.-Y. T., & PNG, I. P. (2007). Overcoming Online Information Privacy Concerns: An Information-Processing Theory Approach. Journal of Management Information Systems, 24(2), 13-42.
[25] Hodder, M., Churchill, E., & Cobb, J. (2013). Lying and Hiding in the Name of Privacy. Retrieved from http://customercommons.org/2013/05/08/lying-and-hiding-in-the-name-of-privacy/
[26] Hoffman, D. L., Novak, T. P., & Peralta, M. (1990). Building Consumer Trust Online. Communications of the ACM, 42(4), 80-85.
[27] Hogue, M., Levashina, J., & Hang, H. (2013). Will I fake it? The interplay of gender, Machiavellianism, and self monitoring on strategies for honesty in job interviews. Journal of Business Ethics, 117(2), 399-411.
[28] Jacoby, J., & Kaplan, L. (1972). The Components Of Perceived Risk. in SV - Proceedings of the Third Annual Conference of the Association for Consumer Research, (pp. 383-393).
[29] Johnson-George, C., & Swap, W. C. (1982). Measurement of specific interpersonal trust: Construction and validation of a scale to assess trust in a specific other. Journal of Personality, 43, 1306-1317.
[30] Joinson, A. N. (2001). Self‐disclosure in computer‐mediated communication: The role of self‐awareness and visual anonymity. European Journal of Social Psychology, 31(2), 177-192.
[31] Jonason, P. K., & Webster, G. D. (2010). The Dirty Dozen: A Concise Measure of the Dark Triad. Psychological Assessment, 22(2), 420-432.
[32] Jones, D. N., & Paulhus, D. L. (2014). Introducing the Short Dark Triad (SD3): A Brief Measure of Dark Personality Traits. Assessment, 21, 28-41.
[33] Jones, M. G. (1991). Privacy: a significant marketing issue for the 1990s. Journal of Public Policy & Marketing, 10(1), 133-148.
[34] Jourard, S. M. (1959). Healthy personality and self-disclosure. New York: Mental Hygiene.
[35] Junglas, I. A., Johnson, N. A., & Spitzmuller, C. (2008). Personality Traits and Concern for Privacy: An Empirical Study in the Context of Location-Based Service. European Journal of Information Systems, 17(4), 387-402.
[36] KangJ. (1998). Information Privacy in Cyberspace Transactions. Stanford Law Review, 50, 1193-1294.
[37] Kankanhalli, A., Tan, B. C., & Wei, K.-K. (2005). Contributing knowledge to electronic knowledge repositories: an empirical investigation. MIS Quarterly, 29(1), 113-143.
[38] Kehr, F., Kowatsch, T., Wentzel, D., & Fleisch, E. (2015). Blissfully ignorant: the effects of general privacy concerns, general institutional trust, and affect in the privacy calculus. Information Systems Journal, 25(6), 607-635.
[39] Keith, M. J., Thompson, S. C., Hale, J., Lowry, B., & Greer, G. (2013). Information disclosure on mobile devices: Re-examining privacy calculus with actual user behavior. International Journal of Human-Computer Studies, 71(12), 1163-1173.
[40] Kim, D. J., Ferrin, D. L., & Rao, R. (2008). A trust-based consumer decision-making model in electronic. Decision Support Systems, 544-564.
[41] Leary, M. R., Knight, P. D., & Barnes, B. D. (1986). Ethical Ideologies of the Machiavellian. Personality and Social Psychology Bulletin, 12(1), 75-80.
[42] Lewicki, R. J., & Bunker, B. B. (1995). Trust in relationships: A model of development and decline. In Conflict, cooperation, and justice: Essays inspired by the work of Morton Deutsch. (pp. 133-173). San Francisco, CA, US: Jossey-Bass.
[43] Li, H., Sarathy, R., & Xu, H. (2010). Understanding Situational Online Information. Journal of Computer Information Systems, 51(1), 62-71.
[44] Li, H., Sarathy, R., & Xu, H. (2011). The role of affect and cognition on online consumers decision to disclose personal information to unfamiliar online vendors. Decision Support Systems, 51(3), 434-445.
[45] Li, Y. (2011). Empirical Studies on Online Information Privacy Concerns: Literature Review and an Integrative Framework. Communications of the Association for Information Systems, 28, 453-496.
[46] Lim, N. (2003). onsumers’ perceived risk: sources versus consequences. Electronic Commerce Research and Applications, 2(3), 216-228.
[47] Luo, X. (2002). Uses and Gratifications Theory and E-Consumer Behaviors. Journal of Interactive Advertising, 2(2), 34-41.
[48] Lwin, M., Wirtz, J., & Williams, J. D. (2007). Consumer Online Privacy Concerns and Responses: A Power-Responsibility Equilibrium Perspective. Journal of the Academy of Marketing Science, 35(4), 572-585.
[49] Malhotra, N. K., Kim, S. S., & Agarwal, J. (2004). Internet Users′ Information Privacy Concerns (IUIPC): The Construct, the Scale, and a Causal Model. Information Systems Research, 15(4), 311-416.
[50] Markus, H. R., & Kitayama, S. (1991). Culture and the self: Implications for cognition, emotion, and motivation. Psychological Review, 98(2), 224-253.
[51] Mayer, R. C., Davis, J. H., & Schoorman, F. D. (1995). An integrative model of organizational trust. Academy of Management Review, 20(3), 709–734.
[52] McCallister, G. E., & Scarfone, K. A. (2010). Guide to Protecting the Confidentiality of Personally Identifiable Information (PII). National Institute of Standards and Technology (NIST), Special Publication 800-122.
[53] McLeod, B. A., & Genereux, R. L. (2008). Predicting the acceptability and likelihood of lying: The interaction of personality with type of lie. Personality and Individual Differences, 45(7), 591-596.
[54] Metzger, M. J. (2004). Privacy, Trust, and Disclosure: Exploring Barriers to Electronic Commerce. Journal of Computer-Mediated Communication, 9(4), JCMC942.
[55] Metzger, M. J. (2007). Communication Privacy Management in Electronic Commerce. Journal of Computer-Mediated Communication, 12, 335–361.
[56] Miltgen, C. L., & Smith, H. J. (2019). Falsifying and withholding: exploring individuals’ contextual privacy related decision-making. Information & Management, 56(5), 696-717.
[57] Muris, P., Merckelbach, H., Otgaar, H., & Meijer, E. (2017). The Malevolent Side of Human Nature: A Meta-Analysis and Critical Review of the Literature on the Dark Triad. Perspectives on Psychological Science, 12(2), 183-204.
[58] Nowak, G. J., & Phelps, J. (1992). Understanding Privacy Concerns: An Assessment of Consumers’ Information Related Knowledge and Beliefs. Journal of Direct Marketing, 28-39.
[59] Palomaki, J., Yan, J., & Laakasuo, M. (2016). Machiavelli as a poker mate: A naturalistic behavioural study on strategic deception. Personality and Individual Differences, 98, 266-271.
[60] Paulhus, D. L., & Williams, K. M. (2002). The Dark Triad of personality: Narcissism, Machiavellianism and psychopathy. Journal of Research in Personality, 36(6), 556-563.
[61] Pavlou, P. A. (2003). Consumer acceptance of electronic commerce-Integrating trust and risk, with the technology acceptance model. International Journal of Electronic Commerce, 7(3), 69-103.
[62] Pavlou, P. A., Liang, H., & Xue, Y. (2007). Understanding and Mitigating Uncertainty in Online Exchange Relationships: A Principle–Agent Perspective. MIS Quarterly, 31(1), 105-136.
[63] Peter, J. P., & Tarpey, L. X. (1975). A Comparative Analysis of Three Consumer Decision Strategies. Journal of Consumer Research, 29-37.
[64] Phelps, J., Nowak, G., & Ferrell, E. (2000). Privacy Concerns and Consumer Willingness to Provide Personal Information. Journal of Public Policy & Marketing, 19(1), 27-41.
[65] Rohm, A. J., & Milne, G. R. (2004). Just What the Doctor Ordered - The Role of Information Sensitivity and Trust in Reducing Medical Information Privacy Concern. Journal of Business Research, 57(9), 1000-1011.
[66] Schade, M., Piehler, R., Warwitz, C., & Burmann, C. (2018). Increasing consumers’ intention to use location-based advertising. Journal of Product & Brand Management, 27(6), 661-669.
[67] Smith, H. J., Dinev, T., & Xu, H. (2011). Information Privacy Research: An Interdisciplinary Review. MIS Quarterly, 35(4), 989-1015.
[68] Smith, H. J., Milberg, S. J., & Burke, S. J. (1996). Information Privacy: Measuring Individuals′ Concerns about Organizational Practices. MIS Quarterly, 20(2), 167-196.
[69] Stanton, J. M., & Stam, K. R. (2003). Information Technology, Privacy, and Power within Organizations: a view from Boundary Theory and Social Exchange perspectives. Surveillance & Society, 1(2), 152-190.
[70] Stewart, K. J. (1999). Transference as a means of building trust in Market. 35 (1971) 56–61. Proceedings of the 20th International Conference on Information Systems, (pp. 459–464).
[71] Stone, E. F., Gueutal, H. G., Gardner, D. G., & McClure, S. (1983). A field experiment comparing information-privacy values, beliefs, and attitudes across several types of organizations. Journal of Applied Psychology, 68(3), 459-468.
[72] Stutzman, F. (2006). An Evaluation of Identity-Sharing Behavior. Journal of the International Digital Media and Arts Association, 3(1), 10-18.
[73] Vidmar, N., & Flaherty, D. N. (1985). Concern for Personal Privacy in an Electronic Age. Journal of Communication, 35, 91-103.
[74] Wang, P., & Petrison, L. A. (1993). Direct marketing activities and personal privacy: A consumer survey. Journal of Direct Marketing, 7(1), 7-19.
[75] Warren, S. D., & Brandeis, L. D. (1890). The right to privacy. Harvard Law Review, 4(5), 193-220.
[76] Xie, E., Teo, H.-H., & Wan, W. (2006). Volunteering personal information on the internet: Effects of reputation, privacy notices, and rewards on online consumer behavior. Market Lett, 17, 61-74.
[77] Xu, H., Dinev, T., Smith, H. J., & Hart, P. (2008). Examining the Formation of Individual‘s Privacy Concerns: Toward an Integrative View. ICIS 2008 Proceedings, Paper 6, pp. 1-16.
[78] Yang, H., Lee, H., & Zo, H. (2017). User acceptance of smart home services: an extension of the theory of planned behavior. Industrial Management & Data Systems, 117(1), 68-89.
[79] Zeng, S.-Y., Wu, L.-L., & Chen, H.-G. (2009). Sharing private information online: The mediator effect of social exchange. Paper presented at the Proceedings of the 11th International Conference on Electronic Commerce.
[80] Zhang, Y., Wang, C. L., & Chen, J. (2000). Consumers’ responses to web-based data collection efforts and factors influencing the responses. Journal of International Marketing and Market Research, 115-123.
[81] Zimmer, J. C., Arsal, R. E., Al-Marzouq, M., & Grover, V. (2010). Investigating online information disclosure: Effects of information relevance, trust and risk. Information & Management, 47(2), 115-123.
[82] 吳芷凡. (2013). 網路社群使用者的隱私關注與個人資料揭露行為之研究. 桃園市: 國立中央大學資訊管理研究所碩士論文.
[83] 經濟日報. (2019). 保護個資加州消費者隱私法2020年元旦上路. 2020年5月31日 擷取自 https://money.udn.com/money/story/5599/4259279
[84] 郭俊賦. (2015). 網路使用者的隱私顧慮與誘因對於其自我揭露行為之影響. 桃園市: 國立中央大學資訊管理研究所碩士論文.
指導教授 范錚強(C.K. Farn) 審核日期 2020-6-16
推文 facebook   plurk   twitter   funp   google   live   udn   HD   myshare   reddit   netvibes   friend   youpush   delicious   baidu   
網路書籤 Google bookmarks   del.icio.us   hemidemi   myshare   

若有論文相關問題,請聯絡國立中央大學圖書館推廣服務組 TEL:(03)422-7151轉57407,或E-mail聯絡  - 隱私權政策聲明