(3.238.186.43) 您好!臺灣時間:2021/03/01 15:25
字體大小: 字級放大   字級縮小   預設字形  
回查詢結果

詳目顯示:::

我願授權國圖
: 
twitterline
研究生:李明翰
研究生(外文):Ming-Han Li
論文名稱:PTT使用者對侵犯他人隱私之研究
論文名稱(外文):A Study of Internet Privacy Invasion in PTT
指導教授:郭峰淵郭峰淵引用關係
指導教授(外文):Feng-Yang Kuo
學位類別:碩士
校院名稱:國立中山大學
系所名稱:資訊管理學系研究所
學門:電算機學門
學類:電算機一般學類
論文種類:學術論文
論文出版年:2010
畢業學年度:98
語文別:中文
論文頁數:120
中文關鍵詞:PTT文字敘述隱私決策判斷
外文關鍵詞:PTTword descriptionprivacy decision making
相關次數:
  • 被引用被引用:1
  • 點閱點閱:986
  • 評分評分:系統版面圖檔系統版面圖檔系統版面圖檔系統版面圖檔系統版面圖檔
  • 下載下載:0
  • 收藏至我的研究室書目清單書目收藏:0
在科技發展之下,個人資料也被放在網路上隨手可得,然而在PTT上卻可看到各式各樣隱私侵犯,從姓名或者影片就可以被其他人找出其他各式各樣資料,個人在網路上不能扮演另一個自己,而是害怕真實的自己被揪出。
然而對於其他網路使用者而言為何會支持這類隱私侵犯,當網路使用者看到侵犯隱私行為時,為何有些人會支持有些人卻會反對,其影響的主因為何?
本研究利用文字敘述以及不同事件等方式進行操弄,觀察文字敘述的不同是否會影響受測者對於隱私侵犯的決策。並且將文字敘述分為暴力色情文字敘述以及非暴力色情文字敘述,事件分為男性劈腿事件與女性劈腿事件兩部分。並且利用兩階段問卷觀察組內間是否有所不同,當個人面對不同敘述的相同事件時,其隱私決策判斷是否有所差別。
最後本研究發現受測者性別、文字敘述、事件情境三部分對於隱私決策判斷的影響,並且對於隱私情境設計與隱私侵犯重要因子給予建議。
Although technology is well developed, personal data is well spread in internet ,too. We can see a lot of privacy invasion in PTT. People can find a lot of data about someone from his name or movie. People are afraid of being caught in internet. But why some people support this kind of privacy invasion but some don’t. What is the main factor?
This study uses description and different kind of event to observe if description can affect people’s decision toward privacy invasion. We separate description into violate and non-violate, and we use two stage survey to observe when people face different kind of description, is there any different between violate and non-violate description toward privacy decision making.
In the end, we find how sex, description, and event affect privacy decision making, and we bring up a suggestion of privacy situational desion and the main factor toward privacy decision making.
目錄
表目錄 v
圖目錄 vii
第一章 緒論 1
第一節、研究背景 1
第二節、研究動機 2
第三節、問題描述 4
第四節、研究流程 4
第二章 文獻探討 6
第一節、PTT隱私侵犯事件 6
第二節、由社會認知理論到自我效能 9
第三節、道德強度 12
第四節、風險認知 14
第五節、憤怒 16
第六節、道德義務 17
第七節、法律保護 18
第八節、隱私決策判斷 19
第九節、研究模式與假說彙整 21
第三章 研究方法 22
第一節、研究流程 22
第二節、實驗設計、研究對象與資料收集方法 23
第三節、研究構念設計 24
第四節、資料分析方法與工具 32
第四章、資料分析 35
第一節、基本資料分析 35
第二節、因素分析與信效度分析 41
第三節、研究模式之驗證 45
第四節、各操作變數T檢定 47
第五章、結論與建議 66
第一節、研究結果 66
第二節、研究貢獻 69
第三節、研究限制 70
第四節、未來研究 71
第六章、參考文獻 72
附錄 76
參考文獻
1.A. Singhapakdi, S. J. Vitell and K. Kraft,“Moral Intensity and Ethical Decision-Making of Marketing Professionals,” Journal of Business Research,Vol. 36, Issue 3, pp. 245-255, 1996
2.Bauer, R. A., 1960, ''Consumer Behaviour as Risk Taking'', in R. S. Hancock (ed.).Dynamic Marketing for a Changing World, Chicago AMA Proceedings, p.
3.Bandura, A. (1986). Social foundations of thought and action. Englewood Cliffs, NJ: Prentice Hall.
4.Bandura, A. (1991). Social cognitive theory of moral thought and action. In W. M. Kurtines, & J. L. Gewirtz (Eds.), Handbook of Moral Behavior and Development (vol. 1, pp. 45-103). Hillsdale, NJ: Lawrence Erlbaum.
5.Berkowitz, L. (1993). Aggression: Its causes, consequences, and control.Philadelphia: Temple University Press.
6.Cunningham, S. M.(1967), “The Major Dimensions Of Perceived Risk”, In Donald, F.C.(Eds), Risk Taking And Information Handling In Consumer Behavior, Boston: Harvard University Press, pp. 82-108
7.Davis, F. D. 1989. Perceived usefulness, perceived ease of use, and user acceptance of information technology. MIS Quart. 13(3) 319–339.
8.Dholakia , U. M. (2001). A motivational process model of product involvement and consumer risk perception. European Journal of Marketing, 35, 1340-1360.
9.Gaudine, A. and L. Thorne: 2001, ‘Emotion and Ethical Decision-Making in Organizations’, Journal of Business Ethics 31, 175–187
10.Hunt, S.D. Commentary on an empirical investigation of a general theory of marketing ethics. Journal ofthe Academy of Marketing Science, 18,2(1990), 173-177
11.Hollinger, R. (1988). Computer hackers follow a Guttmann-like progression. Social Sciences Review, 72, 199-200.
12.Jacoby, J., Kaplan, L.B., 1972. The components of perceived risk. In: M. Ventakesan (Ed.), Proc. of the third annual conference of the Association for Consumer Research, Chicago, US, pp. 382–393.
13.James H. Gerlach, Feng-Yang Kuo, and Cathy S. Lin, "Self Sanction and Regulative Sanction against Copyright Infringement: A Comparison between US and China College Students," Journal of the American Society for Information Science and Technology, 60:6, 2009, pp.1-15. (SSCI)
14.Jones, T. M.: 1991, Ethical Decision Making by Individuals in Organizations: An Issue-contingent Model ,Academy of Management Review 16(2), 366–395
15.K.C. Laudon, Ethical concepts and information technology, Communications of the ACM 38 (12), 1995, pp. 33±39
16.Loch, K. D. and S. Conger: 1996, ‘Evaluating Ethical Decision Making and Computer Use’, Communications of the ACM 39(7), 74–84
17.Mason, R.O. Four ethical issues of the information age. MIS Q. (Mar. 1986), 4–12.
18.Marshall, B. and P. Dewe.: 1997, ‘An Investigation of the Components of Moral Intensity’, Journal of Business Ethics 16, 521–530
19.Ostergard, R.L. Jr. (2000). The measurement of intellectual property rights protection. Journal of International Business Studies, 31(2), 349-360
20.Perugini & Bagozzi, 2001 M. Perugini and R.P. Bagozzi, The role of desires and anticipated emotions in goal-directed behaviors: A model of goal-directed behavior, British Journal of Social Psychology 40 (2001), pp. 79–98.
21.Richard O. Mason, Applying ethics to information technology issues, Communications of the ACM, v.38 n.12, p.55-57, Dec. 1995
22.Richins, Marsha L. 1997. “Measuring Emotions in the Consumption Experience.”Journal of Consumer Research 24: 127–146.
23.Rest, J. Moral development: Advances in research and theory Praeger, New York, 1986.
24.Rogers, M.K., 2001. A social learning theory and moral disengagement analysis of criminal computer behavior: An exploratory study. Unpublished doctoral dissertation, University of Manitoba, Winnipeg, Manitoba, Canada.
25.Ronald E. Anderson , Deborah G. Johnson , Donald Gotterbarn , Judith Perrolle, Using the new ACM code of ethics in decision making, Communications of the ACM, v.36 n.2, p.98-107, Feb. 1993
26.Schwartz, M. (2001) "‘The Nature of the Relationship Between Corporate Codes of Ethics and Behavior’" Journal of Business Ethics 32: 247-262
27.Skinner, W.F. & Fream, A.M. (1997). A social learning theory analysis of computer crime among college students. Journal of Crime and Delinquency, 34(4), 495-518.
28.Shin, M (2001) "The Animosity Model of Foreign Product Purchase Revisited: Does It Work in Korea?", Journal of Empirical Generalisations in Marketing Science, Vol 6, No.1
29.Tan, B.: 2002, ''Understanding Consumer Ethical Decision Making with respect to Purchase of Pirated Software'', Journal of Consumer Marketing 19(2), 96-111.
30.Thong, J. L., Yap, C. S. 1998. Testing an ethical decision-making theory: the case of softlifting. J. Management Inform. Systems 15 (1)213-237.
31.林杏子(2003)。資訊專業人員隱私保護行為的自我規範機制之研究。中山大學資訊管理研究所博士論文
32.許孟祥、郭峰淵、林杏子、朱彩馨、游佳萍(2001),「個人資訊隱私:倫理效能之量表的發展與驗證」,中山管理評論,九卷三期,373-394頁。
33.呂維理等/譯。道德發展研究與理論之進展,心理出版社,2004.
QRCODE
 
 
 
 
 
                                                                                                                                                                                                                                                                                                                                                                                                               
第一頁 上一頁 下一頁 最後一頁 top
系統版面圖檔 系統版面圖檔