跳到主要內容

臺灣博碩士論文加值系統

(44.192.92.49) 您好!臺灣時間:2023/06/10 12:20
字體大小: 字級放大   字級縮小   預設字形  
回查詢結果 :::

詳目顯示

我願授權國圖
: 
twitterline
研究生:提姆康納
研究生(外文):Timothy-Ross O'Connor
論文名稱:Privacy Awareness and Online Education: A Field Study into the Learning Effectiveness of Online Privacy Ethics Training on International Business Students in Taiwan
論文名稱(外文):Privacy Awareness and Online Education: A Field Study into the Learning Effectiveness of Online Privacy Ethics Training on International Business Students in Taiwan
指導教授:陳正忠陳正忠引用關係
指導教授(外文):Jeng-Chung Chen
學位類別:碩士
校院名稱:國立成功大學
系所名稱:國際管理碩士在職專班
學門:商業及管理學門
學類:企業管理學類
論文種類:學術論文
論文出版年:2009
畢業學年度:97
語文別:英文
論文頁數:127
外文關鍵詞:Online EducationVirtual Learning EnvironmentCognitive Moral ReasoningInformation PrivacyPrivacy ConcernsPrivacyEthical DevelopmentComputer-Mediated CommunicationLearning Style InventoryConstructivismPerceived Learning EffectivenessEthicsDefining Issues TestPrivacy TrainingInformation Communication Technologies
相關次數:
  • 被引用被引用:0
  • 點閱點閱:212
  • 評分評分:
  • 下載下載:0
  • 收藏至我的研究室書目清單書目收藏:0
Corporations have suffered recently from a negative view of the ethics of its business practices. In the Information Technology field, this has lead to Corporate Social Responsibility policies including new “Green IT” initiatives. But ethical duties go beyond environmental responsibilities. Public concerns over the misuse of information in the modern world, especially with the exponential growth of information communication technologies, such as cyberspace, are being loudly expressed. Organizations must effectively train their IT staff in privacy issues. Managers of IT departments must be trained effectively and the universities where they are educated must also seek effective measures. This study will examine how factors, such as learning environment, learning activity, teaching pedagogy, curriculum development, and learning behavior, effect the efficient instruction of ethics. To do this, this study will measure their effects on the development of ethical reasoning, learning effectiveness, and their individual privacy concerns. This study found strengths and weaknesses with both integrated and non-integrated ethics instruction and a strong relationship between social interaction, context, and learning effectiveness.
ACKNOWLEDGEMENTS III
ABSTRACT IV
TABLE OF CONTENTS V
LIST OF TABLES IX
LIST OF FIGURES X
CHAPTER ONE INTRODUCTION 1
1.1 Research Background. 1
1.1.1 Privacy in the Information Age. 2
1.1.2 Privacy Education and the Information Workforce. 5
1.1.3 Ethics and the Effectiveness of Online Education. 9
1.2 Research Motivation. 11
1.3 Research Objectives. 13
1.3.1 Research Questions. 14
1.4 Research Project. 14
1.5 Research Structure. 15
CHAPTER TWO LITERATURE REVIEW 17
2.1 Finding a Place for Cyberethics. 17
2.1.1 Non-Integrated IS Ethics Curriculum. 17
2.1.2 Integrated IS Ethics Curriculum. 17
2.2 The Development of Ethical Reasoning. 19
2.2.1 Theory of Cognitive Development. 19
2.2.2 Theory of Cognitive Moral Development. 21
2.2.3 Stages of Ethical Development. 22
2.2.4 Up the Ethical Ladder. 23
2.2.5 Neo-Kohlbergian Theory. 25
2.2.6 Predictors of Moral Development. 27
2.3 Learning Effectiveness. 28
2.3.1 Behaviorism. 29
2.3.2 Cognitivism. 30
2.3.3 Constructivism. 31
2.4 Constructing the Virtual Classroom. 35
2.4.1 Social Presence. 36
2.4.2 Social Interaction. 36
2.4.3 Collaboration. 38
2.4.4 The Collaborative Model. 39
2.4.5 Measuring Learning Effectiveness. 41
2.4.6 Technology and Learning Environments. 44
2.5 Privacy Concerns. 46
2.5.1 Data Collection. 47
2.5.2 Unauthorized Secondary Use. 47
2.5.3 Errors. 48
2.3.4 Improper Access. 48
2.5.5 The Situational Paradigm. 49
2.5.6 Privacy and Context. 50
2.5.8 Predictors of Privacy Concerns. 50
2.5.7 Curricula, Learning Effectiveness and Privacy Concerns 51
CHAPTER THREE METHODOLOGY 53
3.1 Introduction. 53
3.2 Research Design. 53
3.2.1 Experimental Design. 54
3.2.2 Tasks. 56
3.2.3 Operationalization of Constructs. 58
3.3 Measurement Instruments. 61
3.3.1 Defining Issues Test 2. 62
3.3.2 Privacy Concerns. 64
3.3.3 Perceived Learning Effectiveness. 65
3.3.4 Grades. 65
3.4 Data Analysis. 66
3.4.1 Descriptive Analysis. 66
3.4.2 Reliability Analysis. 66
3.4.3 Analysis of Variance. 67
CHAPTER FOUR RESULTS 68
4.1 Introduction. 68
4.2 Descriptive Analysis. 68
4.3 Reliability Analysis. 70
4.3.1 Privacy Concerns. 70
4.3.2 Perceived Skill Development. 71
4.4 Findings. 72
4.4.1 Mean Comparison Results for Ethical Reasoning. 72
4.4.3 Means Comparison for Social Interaction. 75
4.4.4 Means Comparison for Collaboration. 78
4.4.6 Means Comparison for General and Business IT Contexts. 82
4.4.7 Mean Comparison of Blended and Online Learning Environments. 83
4.4.8 Mean Comparison of Demographic Statistics and Privacy Concerns. 84
4.4.9 Analysis of Hypotheses. 85
CHAPTER FIVE CONCLUSION 87
5.1 Discussion 87
5.1.1 Ethical Development 88
5.1.2 Measures of Learning Effectiveness. 89
5.1.3 Overall Learning Effectiveness. 90
5.1.4 Learning Effectiveness and Learning Environment 91
5.1.5 Learning Effectiveness and Learning Activity. 91
5.1.6 Learning Effectiveness and Learning Behavior. 92
5.1.3 Privacy Concerns. 93
5.2 Research Limitations. 93
5.3 Recommendations for Further Study. 94
5.4 Conclusion. 95
REFERENCES 96
APPENDICES 103
Appendix 1: Defining Issues Test. 103
Appendix 2: Privacy Concerns Questionnaire. 122
Appendix 3: Perceived Skill Development Questionnaire. 124
Appendix 5: Personal Information. 125
Abrahamson, C. (1998). Issues in Interactive Communication in Distance Education. College Student Journal , 32 (1), 33-43.
Arbaugh, J. (2002). Managing the On-line Classroom: A study of technological and behavioral characteristics of web based MBA courses. Journal of High Technology Management , 13, 203-223.
Arnold, D., & Ponemon, L. A. (1991, Fall). Internal Auditors; Perceptions of Whistle-Blowing and the Influence of Moral Reasoning: An Experiment. Auditing: A Journal of Practice and Theory , 1-15.
Aron, C. (1999). On-line U. Across the Board , 26 (8), 62-66.
Badaracco, J. L., & R., E. R. (1989). Leadership and the Quest for Integraty. Boston: Harvard Business School Press.
Beetz, K. H. (1976). John Ruskin: A Bibliography, 1900-1974. Lanham, Maryland: Scarecrow Press.
Ben-Ze'ev, A. (2003). Privacy, emotional closeness, and openness in cyberspace . Computers in Human Behvior , 19, 451-467.
Brady, N., & Hart, D. (2007). An Exploration into the Developmental Psychology of Ethical Theory with Implications for Business Practice and Pedagogy. Journal of Business Ethics , 76 (4), 397-412.
Camp, L. J., & Y.T., C. (2000). The Internet as Public Space: Concepts, Issues, and Implications of Public Policy. Computers & Society , 30 (3), 13-19.
Carpenter, R. (1998). The Anywhere MBA. Canadian Business , 71, 62-67.
Cash, J., McFarlan, F., & McKenney, J. (1992). Corporate Information Systems Management: The Issues Facing Senior Executives (3rd ed.). Homewood, IL: Irwin.
Caudill, E. M., & Murphy, P. E. (2000). Consumer Online Privacy: Legal and Ethical Issues. Journal of Public Policy and Marketing , 19 (1), 72-86.
Cespedes, F. V., & Smith, H. J. (1993). Database Marketing: New Rules for Policy and Practice. Sloan Management Review , 34, 7-22.
Cho, H., & LaRose, R. (1999). Privacy Issues in Internet Surveys. Social Science Computer Review , 17 (4), 421-434.
Citera, M., Beaurgard, R., & Mitsuya, T. (2004). An Experimental Study of Cedibility in E-negotiations. Pyschologocial Marketing , 22 (2), 163-179.
Colby, A., & L., K. (1987). The Measurement of Moral Judgment (Vols. I-II). Cambridge: Cambridge University Press.
Cooper, T. M. (2005). Moral Judgement of Students Violating a University Disciplinary Code. Dissertation, The Florida State University, College of Education.
Culnan, M. J. (1993). How Did They Get My Name?: An Exploratory Investigation of Consumer Attitudes Towards Secondary Information Use. MIS Quarterly , 17 (3), 341-363.
Culnan, M. J. (2000). Protecting Privacy Online: Is Self-Regulation Working? Journal of Public Policy and Marketing , 19 (1), 20-26.
Dawson, S. (2006). A Study of the Relationship Between Student Communication Interaction and Sense of Community. The Internet and Higher Education , 9 (3), 153-162.
Dinev, T., & Hart, P. (2004). Internet privacy concerns and their antecedents: measurement validity and a regression model. Behaviour & Information Technology , 23 (6), 413-422.
Equifax Inc. (1990). The Equifax Report on Consumers in the Information Age. Atlanta: Equifax Inc.
Falkenberg, A. W. (2004). When in Rome...Moral Maturity and Ethics for International Economic Organization. Journal of Business Ethics , 54, 17-32.
Ferrell, O. C., & Weaver, M. K. (1978, July). Ethical Beliefs of Marketing Managers. Journal of Marketing .
French, W. (2006). Business Ethics Training: Face to Face and at a Distance. Journal of Business Ethics , 66, 117-126.
Goldhaber, G. (1990). Organizational Communication. Dubuque, IA: Wm C. Brown.
Gotterbarn, D. (1999). Privacy Lost: The Net, autonomous agents, and 'virtual information'. Ethics and Information Technology , 1, 147-154.
Graber, M., D'eAlessandro, D., & Johnson-West, J. (2002). Reading Level of Privacy Policies on Internet Health Websites. The Journal of Family Practice , 51 (7), 642-645.
Hawk, T. F., & Shah, A. J. (2007). Using Learning Style Instruments to Enhance Student Leanring. Journal of Innovative Education , 5 (1), 1-16.
Hay, A., Hodgkinson, M., Peltier, J. W., & Drago, W. A. (2004). Interaction and Virtual Learning. Strategic Change , 13 (4), 193-204.
Hine, C., & Eve, J. (1998). Privacy in the Marketplace. Information Society , 14 (4), 253-262.
Hoffman, D. L., Novak, T. P., & Peralta, M. A. (1999). Information Privacy in the Marketspace: Implications for the Commercial Uses of Anonymity on the Web. Information Society , 15 (2), 129-139.
Hofstede, G. (1991). Cultures and Organizations. London: McGrawl-Hill Book Company.
Hsu, C.-w. J. (2006). Privacy concerns, privacy practices and web site categories: Toward a situational paradigm. Online Information Review , 30 (5), 569-586.
Jaju, A., Kwak, H., & M., Z. G. (2002). Learning Styles of Undergraduate Business Students: A Cross-Cultural Comparison Between the US, India, and Korea. Mrketing Education Review , 12 (2), 49-60.
Jonassen, D., Davidson, M., Collins, M., Campell, J., & Hagg, B. B. (1995). Constructivism and Computer-Mediated Communication in Distance Education. The American Journal of Distance Education , 9 (2), 7-26.
Kate, N. (1998). Women Want Privacy. American Demographics , 20 (1), 37.
Kling, R. (1978). Value Conflicts and Social Choices in Electronic Funds Transfer Systems Developments. Communications of the ACM , 21 (8), 642-657.
Kohlberg, L. (1976). Moral Stages and Moralization: the Cognitive Development Approach. In T. Lickona (Ed.), Moral Development and Behavior (pp. 31-55). New York: Holt, Rinehart and Winston.
Kohlberg, L. (1969). Stage and Sequence, Handbook of Socialization Theory and Research. Chicago: Rand McNally.
Kohlberg, L. (1975). The Cognitive-Developmental Approach to Moral Education. Phi Delta Kappan , 56, 670-677.
Kolb, D. A. (1984). Experiential Learning: Experience as a Source of Learning and Development. Englewood Cliffs, NJ: Prentice-Hall.
Kolb, D. A., Boyatzis, R. E., & Mainemelis, C. (2000). Perspectives on Cognitive . In S. R.J., & Z. L.F. (Eds.), Perspectives on Thinking, Learning, and Cognitive Styles (pp. 227-247). Mahwah, NJ: Lawrence Erlbaum.
Lally, l. (1996). Privacy versus Accessibility: The Impact of Situationally Conditioned Belief. Journal of Business Ethics , 15, 1221-1226.
Lan, G., Gowing, M., McMahon, S., Reiger, F., & King, N. (2008). A Study of the Relationship Between Personal Values and Moral Reasoning of Undergraduate Business Students. Journal of Business Ethics , 78 (1-2), 121-139.
Laudon, K. C. (1986). Markets and Privacy. Communications fo the ACM , 39 (9), 92-104.
Lemley, M. A. (2003). Place and Cyberspace. California Law Review , 91, 521.
Lewicki, R. J., Bruce, B., & Saunders, D. M. (2007). Essentials of Negotiation (Four ed.). New York, NY: McGrawl-Hill.
Lovell, A. (1995). Moral Reasoning and Moral Atmosphere in the Domain of Accounting. Accounting, Auditing, and Accountability Journal , 8 (3), 60-80.
Lowman, J., & V.A., M. (1993). What Should Graduate Teaching Assistants Know about Teaching? Teaching of Psychology , 29 (2), 84-88.
McKeachi, W. (1986). Teaching Tips: A Guibebook on for the Beginning Colege Teacher. Lexington, MA: D.C. Health.
Mehrabian, A. (2007). Non-Verbal Communication. Piscataway, NJ: Transaction Publishers.
Miller, A. (1982). Computers and Privacy. In W. M. Hoffman, & J. M. Moore (Eds.), Ethics and the Management of Computer Technology. Cambridge, MA: Oelgeschlager, Gunn and Hain Publishers Inc.
Milne, G. R., & Culnan, M. J. (2002). Using the Content of Online Privacy Notices to Inform Public Policy: A Longitudinal Analysis of the 1998-2001 U.S. Web Surveys. The Information Society , 18, 345-359.
Milne, G. R., & Rohm, A. J. (2000). Consumer Privacy and Name Removal Across Direct Marketing Channels: Exploring Opt-in and Opt-out Alternatives. Journal of Public Policy and Marketing , 19 (2), 238-249.
Milne, G., & Boza, M. (1999). Trust and Concern in Consumers' Perceptions of Marketing Information Management Practices. Journal of Interactive Marketing , 13 (1), 5-24.
Mintu-Wimsatt, A. (2001). Traditional Versus Technology Mediated Learning: a comparison of students' course evaluations. Marketing Education Review , 11 (2), 63-72.
Monga, M. (2007). Managers' Moral Reasoning: Evidence from large Indian manufacturing organizations. Journal of Business Ethics , 71 (2), 179-194.
Moor, J. H. (1997). Towards a Theory of Privacy in the Information Age. Computers and Society , 27 (3), 27-32.
Mowshowitz, A. (1976). The Conquest of Will. Reading, MA: Addison-Wesley.
Murphy, E. (2004). Recognizing and Promoting Collaboration in an Online Asynchronous Discussion. British Journal of Educational Technology , 35 (4), 421-431.
Nelson, R. R. (1991, December). Educational Needs as Perceived by IS and End-User Personnel: A Survey of Knowledge and Skill Requirements. MIS Quarterly , 503-525.
Niederman, F. B. (1991). Information Systems Management Issues for the 1990s. MIS Quarterly , 15 (4), 475-500.
O'Neil, D. (2001). Analysis of Internet Users' Level of Online Privacy Concerns. Social Science Computer Review , 19 (1), 17-31.
Ozdemir, S. (2008). E-learning's Effect on Knowledge: Can you download tacit knowledge? British Journal of Educational Technology , 39 (3), 552-554.
Penn, W. Y., & Boyd, C. D. (1985). Current Research in Moral Development as a Decision Support System. Journal of Business Ethics , 4, 131-136.
Pfeffer, J. (1992). Managing with Power: Politics and Influence in Organizations. Boston: Harvard Business School Press.
Phelps, J., Nowak, G., & Ferrell, E. (2000). Privacy Concerns and Consumer Willingness to Provide Personal Information. Journal of Public Policy and Marketing , 19 (1), 27-41.
Piaget, J. (1932). The Moral Judgment of the Child. New York: Free Press.
Ponemon, L., & Gabhart, D. R. (1990). Auditor Independence Judgments: A Cognitive Development Model and Experimental Evidence. Contemporary Accounting Research , 7 (1), 221-251.
Raab, C. D., & Mason, D. (2002). Privacy, Surveillance, Trust and regulation: A Series, Information. Communication & Society , 5 (2), 237-241.
Raab, C., & Bennett, C. J. (1998). The Distribution of Privacy Risks: Who Needs Protection. The Information Society , 14, 263-274.
Rahm, D. R. (1997). Going Remote: the use of distnace learning, the World Wide Web, and the Internet in graduate programmes of public affairs and administration. Public Productivity and Management Review , 20 (4), 459-471.
Rest, J. (1979). Defining Issues Test. Minneapolis, Minn.: University of Minnesota Press.
Rest, J. (1979). Development in Judging Moral Issues. Minneapolis: University of Minneapolis Press.
Rest, J., Narvaez, D., Bebeau, M., & Thoma, S. (1999). Postconventional Moral Thinking: A Neo-Kohlbergian Approach. Mahwah, N.J.: Lawrence Erlbaum Associates.
Richardson, W. (2006). Blogs, Wilis, Podcasts, and Other Powerful Tools for the Classrooms. Thousand Oaks, CA: Corwin Press.
Ryan, J. J. (2001). Moral Reasoning as a Determinant of Organizational Citizenship Behavirs: A Study in the Public Accounting Profession. Journal of Business Ethics , 12 (12), 901-918.
Saade, R. G., & Bahli, B. (2995). The impact of Cognitive Absorption on Perceived Usefulnes and Percieved Easy of Use in Online Learning: An Extension of the Technology Acceptance Model. Information Management , 42, 317-327.
Schwaig, K., Kane, G., & C., S. V. (2005). Pricay, Fair Information Practices and the Fortune 500: The Virtual Reality of Compliance. ACM SIGMIS Database , 36 (1), 49-63.
Shea, T. M. (2001, Nov/Dec). Internet-bases Distance Education: the administrator's perspective. Journal of Education for Business , 112-117.
Sheehan, K. B. (2002). Toward a Typology of internet Users and Online Privacy Concerns. The Information Society , 18, 21-32.
Singhapalcedi, A. C., & Vitell, S. (1996). Ethical Decision-making: An Investigation of Services Marketing Professions. Journal of Business Ethics , 15, 635-644.
Sitton, V. J. (2003, September/October). When the Right to Know and the Right to Privacy Collide. The Information Management Journal , 76-80.
Smith, H. J., Millberg, S. J., & Burke, S. J. (1996, June). Information Privacy: Measuring Individuals' Concern about Organizational Practices. MIS Quarterly , 167-196.
Smith, J. H., & Hasnas, J. (1999). Ethics and Information Systems: The Corporate Domain. MIS Quarterly , 21 (1), 109-127.
Snarey, J. (1985). Cross-Cultural Universality of Social-Moral Development: A Critical Review of Kohlbergian Research. 97, 202-232.
Sonner, B. (1999). Sucess in Capstone Business Course: assessinf the effectiveness of distance learning. Journal of Education for Business , 74, 243-247.
Stevens, B. (1997). Business Communication and the Ethical Context. (7th, Ed.) Effective Business Communication , 95-116.
Stevens, B. (1999). Communicating Ethcal Values: A study of Employee Perceptions. Journal of Business Ethics , 20, 113-120.
Stewart, A. K., & Segars, A. H. (2002). An Empirical Examination of the Concern for Information Privacy Instrument. Information Systems Research , 13 (1), 36-49.
Stone, E. F., Gardner, D. G., Gueutal, H., & McClure, S. (1983). A Field Experiment Comparing Information-Privacy Values, Beliefs, and Attitudes Across Several Types of Organizations. Journal of Applied Psychology , 68 (3), 459-468.
Stone, E., & Stone, D. (1990). Privacy in Organizations: Theoretical Issues, Research Findings, and Protection Mechanisms. In M. a. Rowland, Research in Personal and Human Resources Management (8th ed., pp. 349-411). Greenwich, CT: JAI Press.
Sullivan, P. (2001). Gender Differences and the On-line Classroom: male and female college students evaluate their experiences. College Journal of Research and Practices , 25, 805-818.
Swan, K., & Shih, L.-F. (n.d.). On the Nature and Development of Social Presence in Online Course Discussions. Journal of Asynochronous Lwaerning Networks 2005, 115-136.
Tang, T., Chen, L.-P., & Chen, Y.-J. (2008). Intelligence Vs. Wisdom: The Love of Money, Machiavellianism, and Unethical Behavior across College Major and Gender. Journal of Business Ethics , 82 (1), 1-26.
Tavani, H. T. (2007). Ethics & Technology (Second Edition ed.). Hoboken, NJ: John Wiley & Sons, Inc.
Tavani, H. T., & Grodzinsky, F. S. (2002). Cyberstaking, Personal Privacy and Moral Responsibility. Ethics and Information Technology , 4, 123-132.
Trevino, L. K. (1992). Moral Reasoning and Business Ethics: Implications for Research, Education, and Management. Journal of Business Ethics , 11, 445-459.
Trevino, L., & Youngblood, S. A. (1990). Bad Apples in Bad Barrels: A Causal Analysis of Ethical Decision-Making Behavior. Journal of Applied Psychology , 75, 378-385.
Tsui, J., & Windsor, C. (2001). Some Cross-Cultural Evidence on Ethical Reasoning. Journal of Business Ethics , 31, 143-150.
Vygotsky, I. (1978). Mind in Society. Cambridge, MA: Harvard University Press.
Weber, J. (1990). Managers' Moral Reasoning: Assessing Their Responses to Three Moral Dilemmas. Human Relations , 43 (1), 687-702.
Webster J., H. P. (1997). Teaching Effectiveness in Technologically-Mediated Distance Learning. Academy of Management Journal , 40 (6), 128.
Weick, K. E., & L., B. D. (1986). Arguement and Narraration in Organizational Communication. Journal of Management , 12 (2), 243-259.
Werhane, P. H. (1998). Moral Imagination and the Search for Ethical Decision Making in Management. Business Ethics Quarterly Ruffin Series , 1, 75-98.
White, R. D. (1999). Organisational Design and Ethics: The Effects of Rigid Hierarchy on Moral Reasoning. International Journal of Organisational Theory and Behavior , 2, 431-456.
Whorf, B. (1956). Language, Thought, and Reality. Cambridge, MA: MIT Press.
Zviran, M. (2008, Summer). User's Perspectives on Privacy in Web-Based Applications. Journal of Computer Information Systems , 97-105.
連結至畢業學校之論文網頁點我開啟連結
註: 此連結為研究生畢業學校所提供,不一定有電子全文可供下載,若連結有誤,請點選上方之〝勘誤回報〞功能,我們會盡快修正,謝謝!
QRCODE
 
 
 
 
 
                                                                                                                                                                                                                                                                                                                                                                                                               
第一頁 上一頁 下一頁 最後一頁 top
無相關期刊