跳到主要內容

簡易檢索 / 詳目顯示

研究生: 吳芷凡
Wu Chin-Fan
論文名稱: 網路社群使用者的隱私關注與個人資料揭露行為之研究
A study on user’s privacy concern and self-disclosure in social network sites
指導教授: 范錚強
口試委員:
學位類別: 碩士
Master
系所名稱: 管理學院 - 資訊管理學系
Department of Information Management
論文出版年: 2013
畢業學年度: 101
語文別: 中文
論文頁數: 64
中文關鍵詞: 網路社群隱私顧慮個人資料揭露行為
外文關鍵詞: social networking, privacy concern, self-disclosure behavior
相關次數: 點閱:10下載:0
分享至:
查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報
  • 網路社群是現代網路使用者的主要集中地之一。使用者會在社群上公開個人資訊、分享生活經驗,或進行網路社交活動,大量集中的網路人口與使用者個人資料,吸引了企業、廣告商,或學術調查者,利用社群網站散佈問卷或收集個人資料。由於網路的開放環境特性,任何人都能搜尋甚至收集公開的個人資料,而收集來的資料也可能面臨被誤用或濫用的風險。從資料收集者的角度,為了讓使用者的行為偏向提供真實個人資料,他們可能會以提供一份獎勵的方式來當作刺激因素。

    本研究主要探討使用者對社群網站的隱私顧慮會如何影響個人資料的公開行為,以及誘因的存在與否是否會影響到使用者的隱私顧慮與其行為之間的關係,並由研究結果來對資料收集者提供建議。本研究利用「實驗室研究」作為研究方法,有效實驗樣本102人,實驗網站為虛擬社群網站。研究結果發現,使用者的「隱私顧慮」會受到「隱私操控」、「隱私安全信號」,與「信任」的影響,「隱私安全信號」對「隱私操控」與「隱私顧慮」有調節效果,「誘因」對「隱私顧慮」與「個人資料揭露行為」有調節效果。


    Nowadays, Social Networking is one of the activity centers for online users. Many users disclose and share their life experience and mingles with one another through the Social Networking websites. Large number of users and huge amount of user’s personal information attract enterprises, advertisers, and academic investigators, who distribute network questionnaires or collect personal information on-line. Due to the open network environment, everyone can search for even collect others personal information, and network questionnaire can also be a way to collect user’s personal information, and the information collected could be misused or abused. Often times, information collectors may provide a gift or a reward to encourage users to disclose their genuine information.
    This study attempts to explore how user’s privacy concern affects their behavior in disclosing personal information, and if rewards would moderate the effects of privacy concern on disclosure behavior.Laboratory experimentation with 102 participants was carried out in this study. Result shows that “privacy control,” “privacy signals” and “trust” are antecedents to user’s “privacy concern,” while “privacy signal” moderates the effects of “privacy control” on “privacy concern,” and “reward” moderates the effects of “privacy concern” on “self-disclosure behavior.”

    中文摘要 iv Abstract v 致謝 vi 目錄 vii 圖目錄 ix 表目錄 x 第一章 緒論 1 1-1 研究背景與動機 1 1-2 研究目的 2 1-3 研究流程 2 第二章 文獻探討 4 2-1 網路社群 4 2-2 網路隱私權 7 2-3 信息傳遞相關理論 9 2-4 信任 10 第三章 研究方法 12 3-1 研究架構與假說 12 3-2 研究設計 14 3-3 研究變數之定義與操作化 16 3-4 問卷前測 18 3-5 研究流程 24 第四章 研究分析 29 4-1 樣本基本資料分析 29 4-2 信度與效度檢驗 29 4-3 假說檢定 30 4-4 研究假說檢定結果彙集 36 第五章 結論與建議 37 5-1 研究結果與討論 37 5-2 管理意涵 39 5-3 研究限制與未來建議 40 參考文獻 43 1 中文部分 43 2 英文部分 43 3 網路資料 45 附錄 46

    1 中文部分
    [1] 阮紹薇,(2000)。電腦網路中「虛擬社群」現象與經營策略之探討。臺北市:國立臺灣大學圖書館。
    [2] 連文雄,(2006)。影響使用者對資訊系統委外廠商信任的因素探討。桃園縣:國立中央大學圖書館。
    2 英文部分
    [1] Armstrong, A. G. & III, J. H. (1997). Net gain: Expanding Markets Through Virtual Communities (16th ed.), Harvard Business School Press, Boston.
    [2] Barab, S. A. (2003). “An introduction to the special issue: Designing for virtual communities in the service of learning.” The Information Society, 19, 197-201.
    [3] Chin, W. W., Marcolin, B. L., & Newsted, P. R. (2003). “A Partial Least Squares Latent Variable Modeling Approach for Measuring Interaction Effects: Results from a Monte Carlo Simulation Study and an Electronic-Mail Emotion/Adoption Study.” Information Systems Research, 14(2), 189-217.
    [4] Coe, J.B., Weijs, C.A., Muise, A., Christofides, E., & Desmarais, S. (2011). “Teaching Veterinary Professionalism in the Face(book) of Change.” Journal of Veterinary Medical Education, 38(4), 353-359.
    [5] Dinev, T. & Hart, P. (2006). “An extended privacy calculus model for e-commerce transactions.” Information Systems Research, 17(1), 61–80.
    [6] Dwyer, C., Hiltz, S. R., & Passerini, K. (2007). “Trust and privacy concern within social networking sites: A comparison of Facebook and MySpace.” Proceedings of AMCIS 2007, Keystone, CO.
    [7] Goodwin, C. (1991). “Privacy: Recognition of a consumer right.” Journal of Public Policy Mark, 10(1), 106-119.
    [8] Krasnova, H., Spiekermann, S., Koroleva, K., & Hildebrand, T. (2010). “Online social networks why we disclose.” Journal of Information Technology, 25, 109–125.
    [9] Li, H., Sarathy, R., & Wu, H. (2010). “Understanding situational online information disclosure as a privacy calculus.” Journal of Computer Information Systems, 51(1), 52-71.
    [10] Li, H., Sarathy, R., & Wu, H. (2011). “The role of affect and cognition on online consumers' decision to disclose personal information to unfamiliar online vendors.” Decision Support Systems, 51, 434-445.
    [11] Markus, H. R. & Kitayama, S. (1991). “Culture and the Self Implications for Cognition, Emotion, and Motivation.” Psychological Review, 98(2),224-253.
    [12] Mason, R. O. (1986). “Four ethical issues of the information age.” MIS Quarterly, 10(1), 5–12.
    [13] Mayer, R. C., Davis, J. H., & Schoorman, F. D.(1995). “An Integrative Model of Organizational Trust.” Academy of Management Review, 20(3), 709-734.
    [14] McCallister, E., Grance, T., & Scarfone, K. A. (2010). Guide to Protecting the Confidentiality of Personally Identifiable Information (PII). National Institute of Standards and Technology (NIST), Special Publication 800-122
    [15] McCrohan, K. F. (1989). “Information technology, privacy, and the public good.” Journal of Public Policy Marketing, 8, 265-78.
    [16] Metzger , M. J. (2004). “Privacy, Trust, and Disclosure: Exploring Barriers to Electronic Commerce.” Journal of Computer-Mediated Communication, 9(4).
    [17] Parrish, J. (2010). “PAPA knows best: Principles for the ethical sharing of information on social networking sites.” Ethics and Information Technology, 12(2), 187-193.
    [18] Rheingold, H. (2000). The Virtual Community: Homesteading on the Electronic Frontier. Cambridge: MIT Press.
    [19] Romm, C. & Plisjin, N. R. (1997). “Virtual communities and society: Toward and Integrative three phase model.” International Journal of Information Management, 17(4), 261-270.
    [20] Stutzman, F. (2006). “An evaluation of identity-sharing behavior in social network communities.” Journal of the International Digital Media and Arts Association, 3(1), 10–18.
    [21] Sweat, J. (2000). “Privacy paradox: customers want control – and coupons”, Information Week, 781, 52-53.
    [22] Warren, S. D. & Brandeis, L. D. (1890). “The Right to Privacy.” Harvard Law Review, 4, 193-214.
    [23] Wasko, M. M. & Faraj, S. (2000). “It is What One Does’: Why people participate and help others in electronic communities of practice.” Journal of Strategic Information Systems, 9, 155-173.
    [24] Yao, M. Z., Rice, R. E., & Wallis, K. (2007). “Predicting User Concerns About Online Privacy.” Journal of the American Society for Information Science and Technology, 58(5), 710-722.
    [25] Zeng, S. Y., Wu, L. L., & Chen, H. G. (2009). “Sharing Private Information Online: the Mediator Effect of Social Exchange.” Proceedings of the 11th International Conference on Electronic Commerce, 231-239.
    [26] Zimmer, J. C., Arsal, R. E., Al-Marzouq, M., & Grover, V. (2010). “Investigating online information disclosure: Effects of information relevance, trust and risk.” Information & Management, 47(2), 115–23.
    3 網路資料
    [1] BBBOnLine, (2013). Retrieved June, 2013 from: http://www.bbb.org/us/bbb-online-business/
    [2] Brett (2013). “Social platforms gwi.8 update: decline of local social media platforms.” Retrieved June, 2013 from: https://www.globalwebindex.net/social-platforms-gwi-8-update-decline-of-local-social-media-platforms/
    [3] Doug C. (2008). “ComScore: Facebook Matches MySpace.” Retrieved June, 2013 from: http://www.webpronews.com/comscore-facebook-matches-myspace-2008-06
    [4] EuroPriS, (2013). Retrieved June, 2013 from: https://www.european-privacy-seal.eu/
    [5] SOSA, (2013). Retrieved June, 2013 from: http://www.sosa.org.tw/index.asp
    [6] TRUSTe, (2013). Retrieved June, 2013 from: http://www.truste.com/ 

    QR CODE
    :::