• 沒有找到結果。

網路隱私權與社群網路行為關係之探討 吳百盛、鍾育明

N/A
N/A
Protected

Academic year: 2022

Share "網路隱私權與社群網路行為關係之探討 吳百盛、鍾育明"

Copied!
2
0
0

加載中.... (立即查看全文)

全文

(1)

網路隱私權與社群網路行為關係之探討 吳百盛、鍾育明

E-mail: 322089@mail.dyu.edu.tw

摘 要

隨著網際網路的盛行與WEB2.0時代的來臨,社交網路服務愈來愈受到人們的重視,根據comScore Media Metrix統計

,2009年1月份,受全球經濟形勢的影響,美國稅務類、求職類與旅遊類網站流量大增。Facebook也在第一次躍入前十大 網站榜單,顯示了社交類網站在2009年還將有巨大發展動力。當中著名的有Facebook、twitter、Myspace…等。而其中 的Facebook,推出繁體中文化也在最近的社交網路服務中再次創下另一高峰。 本次研究嘗試以理性行為理論及科技接受模 式之構面與本研究增加之構面網路隱私權,來分析一般網路使用者對於社交網絡服務之認知與行為模式。本研究結果發現

,除了認知易用對態度沒有正向關係,其他認知易用對認知有用有正向關係,認知有用、網路隱私、主觀規範對態度有正 向關係、態度對行為意圖有正向關係,而認知易用很有可能是因為現在網路發達,普遍使用者對網路都有一定的常識,並 且網路社交服務多樣化,因此易用可能並不會直接影響態度。

關鍵詞 : 社交網路服務、臉書、理性行為理論、科技接受模式、網路隱私權 目錄

中文摘要 .....................iii 英文摘要 ....................

.iv 誌謝辭  .....................v 內容目錄 ...................

..vi 表目錄  .....................ix 圖目錄  ..................

...x 第一章  緒論...................1   第一節  研究背景...........

....1   第二節  研究動機...............2   第三節  研究目的..........

.....4   第四節  研究限制...............4   第五節  研究流程.........

......5 第二章  文獻探討.................7   第一節  網路相關理論......

.......7   第二節  社群網路...............11   第三節  網路隱私權......

........15   第四節  網路行為與隱私權關係之探討......17 第三章  研究方法.......

..........19   第一節  研究架構...............19   第二節  研究假設...

............21   第三節  研究變數的操作性定義與衡量......21   第四節  研究對象與 抽樣設計..........25   第五節  資料分析方法.............27 第四章  研究結果與 分析..............29   第一節  樣本基本資料分析...........29   第二節  問 卷信度與效度分析..........31   第三節  因素分析...............33   第四節   回歸分析...............36 第五章  研究結論與建議...............41   第 一節  研究討論...............41   第二節  研究貢獻...............41    第三節  研究限制...............42   第四節  未來研究建議.............42 參考文獻 .....................44

參考文獻

一、中文部份 王郁琦(1995, Oct),美國電腦比對資料法之介紹,資訊法務透析,43。 王郁琦(1996, Oct),網路上的隱私權問題,資訊法 務透析,38。 尹玫君(2003),我國師範院校學生資訊倫理的認知與行為之研究,臺南師院學報,37(1),1-18。 江旻峻(2007),Web 2.0時 代網路發展策略-從整合性關係建立網站之觀點出發,國立臺灣大學商學研究所未出版之碩士論文。 行政院研究發展考核委員會(2007)

,96 年數位落差調查報告。 汪明生、陳正料、林錦郎(2005),政府內部顧客參與行為之研究:以都市垃圾清運業務委外案為例,公共行 政學報,15,81-129。 林欣潔(2007),數位監控系統在校園之接受度研究,國立台灣科技大學未出版之碩士論文。 林英發,陳寬 達(2008),無名小站中真實姓名洩露的危機,RUN!PC 旗標資訊月刊,2。 施宏彬(2002),以TAM 理論為基礎實證網路購物行為模式,

電子商務與數位生活研討會。 戚國雄(1998),資訊時代的倫理議題-兼談網路倫理,應用倫理研究通訊,5,12-18。 郭芳瑜(2001),師範 院校學生之網路倫理態度與行為之研究,臺南師範學院未出版之碩士論文。 陳彥邦(2000),網路使用者之資訊隱私顧慮探討-採用行為意 向模式,國立中山大學資訊管理研究所未出版之碩士論文。 湯宗泰(2008),整合知覺安全構面探討使用者對網路ATM之接受度與行為意 向,產業創新與科技管理研討會。 黃芳銘(2006),社會科學統計方法學-結構方程模式,五南書局。 黃誌坤(2005),網路倫理教學之實驗 研究:以國小五年級為例,國立高雄師範大學未出版之博士論文。 二、英文部份 Ajzen, I. & Fishbein, M. (1980). Understanding Attitudes

(2)

and Predicting Social Behavior. New Jersey: Prentice-Hall. Ajzen, Icek. (1985). From Intention to Action: Theory of Planned Behavior, Kuhl, J. &

Beckmann, J. (eds.), Action Control: From Cognition to Behavior, New York: Springer-Verlag, 11-39. Ajzen, I. Madden, T. (1985). J.Prediction of goal directed behavior: Attitudes,intentions,and perceived behavioral control. Journal of Experimenatl Social Psychology, 22, 453-474. Ajzen, I.(1991). The theory of planned behavior. Organizational Behavior and Human Decision Processes,501, 179-211. Clarke, R. (1999). Internet Privacy Concerns Confirm the Case for Intervention, Communication of the ACM, 42, 60-67. Davis, F. D. (1989). Perceived usefulness, perceived ease of use, and user acceptance of information technology. MIS Quarterly,13(3), 319-340. Davis, F. D., Bagozzi, R. P., & Warshaw, P. R. (1989).

User acceptance of computer technology a comparison of two theoretical models. Management Science, 35(8), 982-1003. Fishbein, M. & Ajzen, I.

(1975). Belief, Attitude, Intention and Behavior: An Introduction to Theory and Research, Addison-Wesley. Fishbein, M. & I. Aizen (1975). Belief, Attitude, Intention and Behavior: An Introduction to Theory and Research, Reading, Mass: Addison-Wesley. Gentry, L. and R. Calantone (2002).

A comparison of three models to explain shop-bot use on the web. Psychology & Marketing,19, 945-956. Huaiqing W., matthew K. O. Lee and Chen W. (1998). Consmer Privacy Concerns about Marketing, Communications of the ACM , 41 (3), 63-70. Ha, S. & Stoel, L. (2008). Consumer e-shopping acceptance: Antecedents in a technology acceptance model, Journal of Business Research, vol. In Press, Corrected Proof. Karahanna, E., Straub, D. W., & Chervany, N. L. (1999). Information technology adoption across time: A cross-sectional comparison of pre-adoption and post-adoption beliefs. MIS Quarterly, 23(2), 183. Klobas, Jane E. and Laurel A. Clyde (2000). Adults Learning to Use the Internet: A Longitudinal Study of Attitudes and Other Factors Associated with Intended Internet Use, Library and Information Science Research, 22(1), 5-34. Korzaan, M.

L. (2003). Going with the flow: Predicting online purchase intentions. Journal of Computer Information Systems, 43(4), 25-31. Liker, J. F. & A. A.

Sindi (1997). Use Acceptance of Expert Systems: A Test of The Theory of Reasoned Action. Journal of Engineering and Technology Management, 14, 147-173. Mykytyn, P. P. Jr. & D. A. Harrison (1993). The Application of the Theory of Reasoned Action to Senior Management and Strategic Information Systems, Information Resources Management Journal, 6(2), 15-26. Oliver, R. L. & Bearden, W. O. (1985). Crossover effects in the Theory of Reasoned Action: A moderating influence attempt. Journal of Consumer Research, 12, 324-340. S. Milgram. (1967). The small world problem, Psychology Today, 61(1). Smith, H. J. (1996). Information Privacy: measuring Individuals’ Concerns About Organizational Practices, MIS Quarterly, 20(2) 167-196. Warshaw, P. R. (1980) A New Model For Predicting Behavioral Intentions : An Alternative to Fishbein, Journal of Marketing Research,17, 153-172. Wilinsky, C. & Sylvester, J. (1992). Privacy in the Telecommunication Age, Communication of the ACM, 35(2), 23-25. Wang, Huaiqing, Matthew K. O. Lee, & Chen Wang (1998). Consumer Privacy Concerns about Marketing, Communications of the ACM, 41, 63-70. 三、網路部份 新浪香港(2009),Facebook遭入侵,[線上資料],來源:

http://news.sina.com.hk/cgi-bin/nw/show.cgi/32/1/1/1135773/1.html 新聞大字報(2009),全球10大互聯網資產排行榜,[線上資料],來 源: http://twt.zhreader.com/2009/11/comscore_09.htm 聯合新聞網(2008),Facebook六大魅力迷倒宅宅,[線上資料],來源:

http://mag.udn.com/mag/digital /storypage.jsp?f_MAIN_ID=314&f_SUB_ID=2923&f_ART_ID=129393 Alexa. (2009).

[Online]. Available:www.alexa.com Alexa Global Top 500 (2009). Survey Finds That Privacy Is Main Concern of Web Users, The Chronicle of Higher Education [Online]. Available:www.alexa.com/topsites Social Software Building Blocks (2009). G. Smith. Social Software Building Blocks [Online]. Available: http://nform.ca/publications/social-software-building-block Mashable (2009). Facebooks New Privacy Push Concerns [Online]. Available: http://mashable.com/2009/12/10/facebook-privacy-experts/ Reuters (2009). Wal-Mart using Facebook to win back-to-school sales [Online]. Available: http://www.reuters.com/article/idUSN0843464220070809 TechCrunch (2009). 85% of College Students use FaceBook [Online]. Available: http://techcrunch.com/2005/09/07/85-of-college-students-use- facebook/ TechCrunch (2009).

Facebook Goes Beyond Colleges, High School Markets [Online]. Available: http://www.techcrunch.com/2005/09/07/85-of-college-students- use-facebook/ Chronicle. (2009). The Chronicle of Higher Education,Survey Finds That Privacy Is Main Concern of Web Users.

[Online]. Available: http://chronicle.com/che-data/articles.dir/art-44.dir/issue- 21.dir/21a02103.htm Chronicle. (2009). The Chronicle of Higher Education [Online]. Available: http://chronicle.com/che-data/articles.dir/art-44.dir/issue- 21.dir/21a02103.htm Facebook. (2009).

[Online]. Available: http://facebook.com/ Facebook. (2009). The Spirit of Openness [Online]. Available:

http://blog.facebook.com/blog.php?post=2223862130 Thinkubator. (2009). Facebook: The Newest Fad in Marketing [Online]. Available:

http://thinkubator.ccsp.sfu.ca/FacebookTheNewestFadInMarketing Wikipedia. (2009).

[Online]. Available: http://www.wikipedia.org

參考文獻

相關文件

• Give the chemical symbol, including superscript indicating mass number, for (a) the ion with 22 protons, 26 neutrons, and 19

• Describe the role and importance of the following key business functions: human resources management, financial management, operations management, marketing management, information

• developing coherent short-term and long-term school development plan that aligns the school aims, the needs, interests and abilities of students in accordance with the

Microphone and 600 ohm line conduits shall be mechanically and electrically connected to receptacle boxes and electrically grounded to the audio system ground point.. Lines in

[16] Dennis, A.R., Nunamaker, J.R., and Vogel, D.R., “A Comparison of Laboratory and Field Research in the Study of Electronic Meeting Systems,” Journal of Management

McCreedy , “The Process of Knowledge Management Within organization :a Critical Assessment of both Theory and Practice”, Knowledge and Process Management, Vol.6,

(1989), “A Theoretical Assessment of the User Satisfaction Construct in Information Systems Research,”.. Management

This study was conducted using the key factor from Technology Acceptance Model (TAM), Theory of Reasoned Action, Diffusion of Innovation, and Involve Theory to explore the