跳到主要內容

臺灣博碩士論文加值系統

(44.221.70.232) 您好!臺灣時間:2024/05/21 06:54
字體大小: 字級放大   字級縮小   預設字形  
回查詢結果 :::

詳目顯示

: 
twitterline
研究生:王旗麟
研究生(外文):Chi-Ling Wang
論文名稱:探討臉書使用者隱私保護與欺瞞關係之研究
論文名稱(外文):Exploring the Relationship between Facebook Users’Privacy Protection and Deception
指導教授:林杏子林杏子引用關係
指導教授(外文):Hsing-Tzu Lin
學位類別:碩士
校院名稱:國立高雄大學
系所名稱:資訊管理學系碩士班
學門:電算機學門
學類:電算機一般學類
論文種類:學術論文
論文出版年:2012
畢業學年度:101
語文別:中文
論文頁數:90
中文關鍵詞:隱私保護欺瞞實踐意圖理論
外文關鍵詞:privacy protectiondeceptiontheory of implementation intention
相關次數:
  • 被引用被引用:2
  • 點閱點閱:348
  • 評分評分:
  • 下載下載:28
  • 收藏至我的研究室書目清單書目收藏:3
近年來,社交網站的興盛使得人與人之間的互動方式由實體面對面轉移到了
線上環境,帶動了虛擬世界的連結關係。然而,在實體生活中的欺瞞現象卻也同
樣發生在線上環境裡,甚至比實體面對面還要更加頻繁。另外,在社交網站蓬勃
發展之餘,隱私問題成為了使用者最為關切的一部分,在近年來也吸引了眾多學
者投入於隱私問題的相關研究中。基於上述,本研究以使用者隱私保護的觀點為
出發點,透過實踐意圖理論 來探討社交網站中個人隱私保護與欺瞞之間的關係,
同時以個人的隱私顧慮、道德情緒特質、隱私保護自我效能、與自我揭露意識控
制等不同觀點作為個人隱私保護意願的影響因素。
本研究以台灣目前最多人使用的社交網站-臉書(Facebook)為研究對象,共回
收1125 份有效樣本資料,透過結構模式分析方法進行研究模式之驗證。結果發
現欺瞞為個人達到隱私保護的重要實踐意圖。除此之外,個人的無法控制他人的
行為、道德情緒特質、隱私保護自我效能、以及自我揭露意識控制等因素會正向
的影響到個人的隱私保護意願。本研究根據此結果提出結論與建議,供實務與學
術界做為參考。
In recent years, the rise of social networking sites makes the interaction between people face to face by the entity transferred to the online environment, and led the connection relationship in the virtual word. However, the deception phenomenon in real life has also occurred in the online environment, and even more frequently than face-to-face. In addition, the privacy issues in social networking sites have become part of the users most concern, and also attracted many scholars devoted to privacy studies in recent years. Based on the above, the user&;apos;s privacy protection perspective as a starting point, through theory of implementation intention to explore the relationship between privacy protection and deception. Besides, we use privacy concerns, moral emotional traits, privacy protection self-efficacy, and self-disclosure conscious control as the influencing factors of the privacy protection.
This study used the most popular social networking sites in Taiwan-(Facebook) as the research objects, totally 1125 valid samples are used for analysis using structural equation modeling (SEM). The results show that deception is the important implementation intention to help individuals achieve privacy protection. In addition, the uncontrollable actions of others, moral emotional traits, privacy protection self-efficacy, and self-disclosure conscious control will positive influence the privacy protection intention. Based on these results, we make some conclusions and suggestions as a reference for both practice and research.
誌謝 i
摘要 iii
目錄 v
圖目錄 vii
表目錄 viii
第一章、緒論 1
第一節 研究背景 1
第二節 研究動機 2
第三節 研究目的 4
第四節 研究流程 4
第二章、文獻探討 5
第一節 理論基礎:實踐意圖理論 5
第二節 隱私保護 7
第三節 欺瞞 9
第四節 隱私顧慮 15
第五節 道德情緒特質 17
第六節 隱私保護自我效能 20
第七節 自我揭露 23
第八節 假說建立 25
第九節 小結 30
第三章、研究方法 31
第一節 研究方法的選擇與問卷發放方式 31
第二節 研究變項 32
第三節 研究對象 35
第四節 前測 35
第五節 統計分析方法與工具 35
第四章、資料分析 36
第一節 資料蒐集 36
第二節 研究模式之驗證 45
第三節 進階分析 50
第五章、結論與建議 54
第一節 研究結果與討論 54
第二節 結論 57
第三節 學術貢獻 58
第四節 實務貢獻 60
第五節 研究限制與未來研究方向 61
參考文獻 63
附錄、研究問卷 73
參考文獻
中文文獻
1.任文瑗、范錚強、許通安 (2006)。資訊隱私侵害行為意圖之研究。Journal of Information, Technology and Society。2(1),77-99。
2.林杏子 (2003)。資訊專業人員隱私保護行為的自我規範機制之研究 (博士論文)。
3.柯秀佳 (2007)。日記型部落格自我揭露行為與主觀幸福感之理論建構 (博士論文)。
4.徐百欽 (2006)。以情境預防觀點探討台灣大學生軟體盜版之意志與非抑制控制研究(碩士論文)。取自http://ir.nuk.edu.tw:8080/ir/handle/310360000Q/424
5.許孟祥,郭峰淵,林杏子,朱彩馨,游佳萍 (2001)。個人資訊隱私:倫理效能之量表的發展與驗證。中山管理評論,9(3),373-394
6.資策會FIND (2012)。台灣網路使用狀況報告。取自
http://www.find.org.tw/find/home.aspx
7.資策會產業情報研究所(2010)。台灣網友的網路娛樂行為。取自http://mic.iii.org.tw/index.asp
8.資策會產業情報研究所(2011)。台灣網路使用者的數位生活型態。取自http://mic.iii.org.tw/index.asp
9.鄭詩蓉 (2010)。以享樂與新奇觀點探討旅遊行動之研究(碩士論文)。

英文文獻
1.Acharya, R. N., Paudel, K. P., &; Hatch, U. L. (2009). Impact of nostalgia and past experience on recreational demand for wilderness. Applied Economics Letters 34(1), 381-393.
2.Acquisti, A., &; Gross, R. (2006). Imagined communities: Awareness, information sharing, and privacy on the Facebook. Paper presented at the Privacy Enhancing Technologies, Cambridge, U.K. Robinson College.
3.Ajzen, I. (1991). The theory of planned behavior. Organizational Behavior and Human Decision Processes, 50(2), 179-211.
4.Ajzen, I. (2002). Perceived Behavioral Control, Self‐Efficacy, Locus of Control, and the Theory of Planned Behavior1. Journal of Applied Social Psychology, 32(4), 665-683.
5.Ajzen, I., &; Fishbein, M. (1980). Understanding attitudes and predicting social behavior. Englewood Cliffs, NJ: Prentice-Hall.
6.Allen, A. L. (1999). Lying to Protect Privacy. Villanova Law Review 44(2), 161-182.
7.Andersson, D. (2008). 2007 cyberstalking statistics released. Retrieved from http://netcrimes.livejournal.com
8.Attrill, A., &; Jalil, R. (2011). Revealing only the superficial me: Exploring categorical self-disclosure online. Computers in Human Behavior, 27(1), 1234-1642.
9.Bagozzi, R. P., Dholakia, U. M., &; Basuroy, S. (2003). How effortful decisions get enacted: The motivating role of decision processes, desires, and anticipated emotions. Journal of Behavioral Decision Making, 16(4), 273-295.
10.Bandura, A. (1977). Self-efficacy: Toward a unifying theory of behavioral change. Psychological review, 84(2), 191-215.
11.Bandura, A. (1986). Social foundations of thought and action. Englewood Cliffs, NJ: Prentice-Hall.
12.Bandura, A. (1989). Social cognitive theory. Annals of child development, 6(1), 1-60.
13.Bandura, A. (1991). Social cognitive theory of moral thought and action (Vol. 1). Hillsdale, NJ: Erlbaum.
14.Barak, A., &; Gluck-Ofri, O. (2007). Degree and reciprocity of self-disclosure in online forums. CyberPsychology &; Behavior, 10(3), 407-417.
15.Bartlett, M. (1951). The goodness of fit of a single hypothetical discriminant function in the case of several groups. Annals of Human Genetics, 16(1), 199-214.
16.Baumeister, R. F., Stillwell, A. M., &; Heatherton, T. F. (1994). Guilt: An interpersonal approach. Psychological Bulletin, 115(2), 243-267.
17.Ben-Ze&;apos;ev, A. (2003). Privacy, emotional closeness, and openness in cyberspace. Computers in Human Behavior, 19(4), 451-467.
18.Benedict, R. (1946). The chrysanthemum and the sword. New York, NY: Houghton-Mifflin.
19.Bollen, K. A. (1998). Structural equation models. New York, NY: Wiley Online Library.
20.Boyd, D. (2008). Facebook&;apos;s privacy trainwreck: Exposure, invasion, and social convergence. Convergence: The International Journal of Research into New Media Technologies, 14(1), 13-20.
21.Boyd, D., &; Ellison, N. B. (2007). Social network sites: Definition, history, and scholarship. Journal of Computer‐Mediated Communication, 13(1), 210-230.
22.Buller, D. B., &; Burgoon, J. K. (1996). Interpersonal deception theory. Communication Theory, 6(3), 203-242.
23.Burger, J. M. (1997). Personality. Pacific Grove, CA: Brooks/Cole press.
24.Caspi, A., &; Gorsky, P. (2006). Online deception: Prevalence, motivation, and emotion. CyberPsychology &; Behavior, 9(1), 54-59.
25.Checkfacebook. (2012). Global facebook user analysis, from http://www.checkfacebook.com/
26.Chin, W. W. (1998). The partial least squares approach for structural equation modeling. In G. A. Marcoulides (Ed.), Modern Methods for Business Research (pp. 295-336). Englewood Cliffs, NJ: Lawrence Erlbaum Associates Hillsdale.
27.Chin, W. W., Marcolin, B. L., &; Newsted, P. R. (2003). A partial least squares latent variable modeling approach for measuring interaction effects: Results from a Monte Carlo simulation study and an electronic-mail emotion/adoption study. Information Systems Research, 14(2), 189-217.
28.Churchill, G. A. (1979). A paradigm for developing better measures of marketing constructs. Journal of marketing research, 64-73.
29.Churchill , G. A. (1979). A paradigm for developing better measures of marketing constructs. Journal of marketing research, 16(1), 64-73.
30.Cohen, T. R., Wolf, S. T., Panter, A., &; Insko, C. A. (2011). Introducing the GASP scale: A new measure of guilt and shame proneness. Journal of Personality and Social Psychology, 100(5), 947-966.
31.Compeau, D. R., &; Higgins, C. A. (1995). Computer self-efficacy: Development of a measure and initial test. Mis Quarterly, 19(2), 189-211.
32.de Hooge, I. E., Zeelenberg, M., &; Breugelmans, S. M. (2010). Restore and protect motivations following shame. Cognition and Emotion, 24(1), 111-127.
33.Debatin, B., Lovejoy, J. P., Ann-Kathrin Horn, M. A., &; Hughes, B. N. (2009). Facebook and online privacy: Attitudes, behaviors, and unintended consequences. Journal of Computer‐Mediated Communication, 15(1), 83-108.
34.DePaulo, B. M., Kashy, D. A., Kirkendol, S. E., Wyer, M. M., &; Epstein, J. A. (1996). Lying in everyday life. Journal of personality and social psychology, 70(5), 979-995.
35.Derlega, V. J., Winstead, B. A., Mathews, A., &; Braitman, A. L. (2008). Why does someone reveal highly personal information? Attributions for and against self-disclosure in close relationships. Communication Research Reports, 25(2), 115-130.
36.Dholakia, U. M., &; Bagozzi, R. P. (2002). Mustering motivation to enact decisions: How decision process characteristics influence goal realization. Journal of Behavioral Decision Making, 15(3), 167-188.
37.Dinev, T., &; Hart, P. (2004). Internet privacy concerns and their antecedents-measurement validity and a regression model. Behaviour and Information Technology, 23(6), 413-422.
38.Eastin, M. S., &; LaRose, R. (2000). Internet self‐efficacy and the psychology of the digital divide. Journal of Computer‐Mediated Communication, 6(1). Retrieved from http://onlinelibrary.wiley.com/doi/10.1111/j.1083-6101.2000.tb00110.x/full
39.Ekman, P. (1997). Lying and deception. Memory for everyday and emotional events, 333-348.
40.Endler, N. S., &; Parker, J. D. (1990). Multidimensional assessment of coping: A critical evaluation. Journal of Personality and Social Psychology, 58(5), 844-854.
41.Featherman, M. S., &; Pavlou, P. A. (2003). Predicting e-services adoption: A perceived risk facets perspective. International Journal of Human-Computer Studies, 59(4), 451-474.
42.Fishbein, M., &; Ajzen, I. (1975). Belief, attitude, intention and behaviour: An introduction to theory and research. Addison-Wesley: Boston, MA.
43.Fleischman, G., &; Valentine, S. (2003). Professionals&;apos; tax liability assessments and ethical evaluations in an equitable relief innocent spouse case. Journal of Business Ethics, 42(1), 27-44.
44.Forgas, J. P. (2011). Affective influences on self-disclosure: Mood effects on the intimacy and reciprocity of disclosing personal information. Journal of Personality and Social Psychology, 100(3), 449-461.


45.Fornell, C., &; Larcker, D. F. (1981). Evaluating structural equation models with unobservable variables and measurement error. Journal of marketing research, 18(1), 39-50.
46.Gerlach, J. H., Kuo, F. Y. B., &; Lin, C. S. (2009). Self sanction and regulative sanction against copyright infringement: A comparison between US and China college students. Journal of the American Society for Information Science and Technology, 60(8), 1687-1701.
47.Gibbs, J. L., Ellison, N. B., &; Heino, R. D. (2006). Self-presentation in online personals.The Role of Anticipated Future Interaction, Self-disclosure, and Perceived Success in Internet Dating. Communication Research, 33(2), 152-177.
48.Gollwitzer, P. M. (1990). Action phases and mind-sets. Handbook of motivation and cognition: Foundations of social behavior, 2, 53-92.
49.Gollwitzer, P. M. (1999). Implementation intentions: strong effects of simple plans. American Psychologist, 54(7), 493-503.
50.Gollwitzer, P. M., &; Sheeran, P. (2006). Implementation intentions and goal achievement: A meta-analysis of effects and processes. Advances in experimental social psychology, 38(1), 69-119.
51.Gollwitzer, P. M., &; Sheeran, P. (2008). Implementation Intentions. Retrieved from http://dccps.cancer.gov/brp/constructs/implementation_intentions/ii2.html
52.Gollwitzer, P. M., &; Sheeran, P. (2009). Self-regulation of consumer decision making and behavior: The role of implementation intentions. Journal of Consumer Psychology, 19(4), 593-607.
53.Gross, D. (2010). The 10 Biggest Tech Fails of 2010, Cable News Network. Retrieved from http://edition.cnn.com/
54.Haidt, J. (2003). The moral emotions. Oxford, England: Oxford University Press.
55.Hair, J. F. (1998). Multivariate data analysis. Englewood Cliffs, NJ: Prentice-Hall.
56.Ho, A., Maiga, A., &; Aimeur, E. (2009). Privacy protection issues in social networking sites.
57.Hogben, G. (2007). Security issues and recommendations for online social networks. Position Paper ENISA European Network and Information Security Agency, from http://www.enisa.europa.eu/doc/pdf/deliverables/enisa_pp_social_networks.pdf
58.Jarvenpaa, S. L. (1989). The effect of task demands and graphical format on information processing strategies. Management Science, 35(3), 285-303.
59.Jiang, Z., &; Benbasat, I. (2004). Virtual product experience: Effects of visual and functional control of products on perceived diagnosticity and flow in electronic shopping. Journal of Management Information Systems, 21(3), 111-147.
60.Joinson, A. N., &; Paine, C. B. (2007). Self-disclosure, privacy. Great Britain: Oxford University Press.
61.Jones, H., &; Soltren, H. (2005). Facebook: Threats to privacy. Retrieved from http://www-swiss.ai.mit.edu/6805/student-papers/fall05-papers/facebook.pdf
62.Kaiser, H. F. (1974). An index of factorial simplicity. Psychometrika, 39(1), 31-36.
63.Kashy, D. A., &; DePaulo, B. M. (1996). Who lies? Journal of personality and social psychology, 70(5), 1037-1051.
64.Kim, D. J. (2008). Self-perception-based versus transference-based trust determinants in computer-mediated transactions: A cross-cultural comparison study. Journal of Management Information Systems, 24(4), 13-45.
65.Kleinmuntz, D. N., &; Schkade, D. A. (1993). Information displays and decision processes. Psychological Science, 4(4), 221-227.
66.Krasnova, H., Gunther, O., Spiekermann, S., &; Koroleva, K. (2009). Privacy concerns and identity in online social networks. Identity in the Information Society, 2(1), 39-63.
67.Krueger, J. (2010). What Is a Moral Emotion?
68.Kuo, F. Y., &; Hsu, M. H. (2001). Development and validation of ethical computer self-efficacy measure: The case of softlifting. Journal of Business Ethics, 32(4), 299-315.
69.Kuo, F. Y., Lin, C. S., &; Hsu, M. H. (2007). Assessing gender differences in computer professionals’ self-regulatory efficacy concerning information privacy practices. Journal of Business Ethics, 73(2), 145-160.
70.Lenhart, A., &; Madden, M. (2007). Social networking websites and teens: An overview: Pew Internet &; American Life Project.
71.Lewis, H. B. (1971). Shame and guilt in neurosis. New York, NY: International Universities.
72.Li, Y. (2011). Empirical Studies on Online Information Privacy Concerns: Literature Review and an Integrative Framework. Communications of the Association for Information Systems, 28(1), 453-496.
73.Lin, J., &; Wu, S. (2008). Exploring Consumers&;apos; Keyword Ads Search Behaviors: An Integration of Theory of Planned Behavior and Flow Theory. Paper presented at the PACIS
74.Livingstone, S. (2008). Taking risky opportunities in youthful content creation: teenagers&;apos; use of social networking sites for intimacy, privacy and self-expression. New Media &; Society, 10(3), 393-411.


75.Lowry, P. B., Cao, J., &; Everard, A. (2011). Privacy concerns versus desire for Interpersonal awareness in driving the use of self-disclosure technologies: The case of instant messaging in two cultures. Journal of Management Information Systems, 27(4), 163-200.
76.Lwin, M. O., Stanaland, A. J. S., &; Miyazaki, A. D. (2008). Protecting children&;apos;s privacy online: How parental mediation strategies affect website safeguard effectiveness. Journal of Retailing, 84(2), 205-217.
77.Ma, M. L., &; Leung, L. (2006). Unwillingness-to-communicate, perceptions of the Internet and self-disclosure in ICQ. Telematics and Informatics, 23(1), 22-37.
78.MacMillan, D. (2010). Facebook&;apos;s Washington Problem. Businessweek, 33-34.
79.Madden, M. (2012). Privacy management on social media sites Pew Internet &; American Life Project.
80.Maddux, J. E., &; Volkmann, J. (2003). Self‐Efficacy. New York, NY: Oxford University Press.
81.Malhotra, N. K., Kim, S. S., &; Agarwal, J. (2004). Internet users&;apos; information privacy concerns(IUIPC): the construct, the scale, and a causal model. Information Systems Research, 15(4), 336-355.
82.Masip, J., Garrido, E., &; Herrero, C. (2004). Defining deception. Anales de Psicologia, 20(1), 147-171.
83.Mason, R. O., Mason, F. M., &; Culnan, M. J. (1995). Ethics of information management: Sage Publications.
84.McCornack, S. A. (1992). Information manipulation theory. Communications Monographs, 59(1), 1-16.
85.Miller, G. R. (1983). Telling it Like it isn&;apos;t and not telling it like it is: Some thoughts on deceptive communication. Tampa, FL: University of South Florida.
86.Moores, T. T., &; Chang, J. C. J. (2006). Ethical decision making in software piracy: Initial development and test of a four-component model. Mis Quarterly, 167-180.
87.Niederhoffer, K. G., &; Pennebaker, J. W. (2009). Sharing one&;apos;s story: On the benefits of writing or talking about emotional experience. New York, NY: Oxford University Press.
88.Nunnally, J. C. (1967). Psychometric theory. New York, NY: McGraw Hill.
89.Oettingen, G., Honig, G., &; Gollwitzer, P. M. (2000). Effective self-regulation of goal attainment. International Journal of Educational Research, 33(1), 705-732.
90.Ofcom. (2008). Social Networking: A quantitative and qualitative research report into attitudes, behaviours and use: Office of Communications of United Kingdom.

91.Omarzu, J. (2000). A disclosure decision model: Determining how and when individuals will self-disclose. Personality and Social Psychology Review, 4(2), 174-185.
92.Orbeil, S., Hodgldns, S., &; Sheeran, P. (1997). Implementation intentions and the theory of planned behavior. Personality and Social Psychology Bulletin, 23(9), 945-954.
93.Orbell, S., &; Sheeran, P. (2000). Motivational and volitional processes in action initiation: A field study of the role of implementation Intentions. Journal of Applied Social Psychology, 30(4), 780-797.
94.Ortony, A., Clore, G. L., &; Collins, A. (1990). The cognitive structure of emotions. Cambridge, UK: Cambridge Univ. Press.
95.Paine, C., Reips, U. D., Stieger, S., Joinson, A., &; Buchanan, T. (2007). Internet users’ perceptions of ‘privacy concerns’ and ‘privacy actions’. International Journal of Human-Computer Studies, 65(6), 526-536.
96.Parboteeah, D. V., Valacich, J. S., &; Wells, J. D. (2009). The influence of website characteristics on a consumer&;apos;s urge to buy impulsively. Information Systems Research, 20(1), 60-78.
97.Park, Y. J., Campbell, S. W., &; Kwak, N. (2012). Affect, cognition and reward: Predictors of privacy protection online. Computers in Human Behavior, 28(1), 1019-1027.
98.Pavlou, P. A., &; Fygenson, M. (2006). Understanding and predicting electronic commerce adoption: An extension of the theory of planned behavior. Mis Quarterly, 30(1), 115-143.
99.Piko, B. (2011). Gender Differences and Similarities in Adolescents’ ways of coping. The Psychological Record, 51(2), 223-236.
100.Prestwich, A., Lawton, R., &; Conner, M. (2003). The use of implementation intentions and the decision balance sheet in promoting exercise behaviour. Psychology and Health, 18(6), 707-721.
101.PrivacyInternational. (2007). A race to the bottom: Privacy ranking of internet service conpanies- A consultation report from https://www.privacyinternational.org/
102.Raman, P., &; Pashupati, T. K. (2004). Online privacy: the impact of self perceived technological competence. Paper presented at the Enhancing Knowledge Development in Marketing.
103.Realwire. (2007). Social networking sites: Almost two thirds of users enter false information to protect identity, from http://www.realwire.com/


104.Rifon, N. J., LaRose, R., &; Choi, S. (2005). Your privacy is sealed: Effects of web privacy seals on trust and personal disclosures. Journal of Consumer Affairs, 39(2), 339-362.
105.Rifon, N. J., LaRose, R. J., &; Lewis, M. L. (2007). Resolving the Privacy Paradox: Toward A Social-Cognitive Theory of Consumer Privacy Protection.
106.Rogers, R. W. (1975). A protection motivation theory of fear appeals and attitude change. Journal of Psychology, 91(1), 93-114.
107.Roseman, I. J., Wiest, C., &; Swartz, T. S. (1994). Phenomenology, behaviors, and goals differentiate discrete emotions. Journal of Personality and Social Psychology, 67(2), 206-221.
108.Schau, H. J., &; Gilly, M. C. (2003). We are what we post? Self‐presentation in personal web space. Journal of consumer research, 30(3), 385-404.
109.Seiter, J. S., &; Bruschke, J. (2007). Deception and emotion: The effects of motivation, relationship type, and sex on expected feelings of guilt and shame following acts of deception in United States and Chinese samples. Communication Studies, 58(1), 1-16.
110.Sheehan, K. B., &; Hoy, M. G. (1999). Flaming, complaining, abstaining: How online users respond to privacy concerns. Journal of advertising, 28(3), 37-51.
111.Skitka, L. J., Mosier, K., &; Burdick, M. D. (2000). Accountability and automation bias. International Journal of Human-Computer Studies, 52(4), 701-717.
112.Smith, H. J., Milberg, S. J., &; Burke, S. J. (1996). Information privacy: Measuring individuals&;apos; concerns about organizational practices. Mis Quarterly, 20(2), 167-196.
113.Tangney, J. P., &; Dearing, R. L. (2002). Shame and guilt. New York, NY: The Guilford Press.
114.Tangney, J. P., Stuewig, J., &; Mashek, D. J. (2007). Moral emotions and moral behavior. Annual review of psychology, 58(1), 345-372.
115.Teroni, F., &; Deonna, J. A. (2008). Differentiating shame from guilt. Consciousness and cognition, 17(3), 725-740.
116.Tracy, J. L., &; Robins, R. W. (2004). Putting the Self Into self-conscious Emotions: A Theoretical Mode. Psychological Inquiry, 15(2), 103-125.
117.Tufekci, Z. (2008). Can you see me now? Audience and disclosure regulation in online social network sites. Bulletin of Science, Technology &; Society, 28(1), 20-36.
118.Utz, S. (2005). Types of deception and underlying motivation. Social Science Computer Review, 23(1), 49-56.

119.Valentine, S., &; Fleischman, G. (2003). Ethical reasoning in an equitable relief innocent spouse context. Journal of Business Ethics, 45(4), 325-339.
120.Vijayasarathy, L. R. (2004). Predicting consumer intentions to use on-line shopping: the case for an augmented technology acceptance model. Information &; Management, 41(6), 747-762.
121.Waters, S., &; Ackerman, J. (2011). Exploring privacy management on facebook: Motivations and perceived consequences of voluntary disclosure. Journal of Computer‐Mediated Communication, 17(1), 101-115.
122.Westin, A. F. (1967). Privacy and freedom. New york, NY: Atheneum.
123.Wheeless, L. R., &; Grotz, J. (1976). Conceptualization and measurement of reported self‐disclosure. Human Communication Research, 2(4), 338-346.
124.Wirtz, J., Lwin, M. O., &; Williams, J. D. (2007). Causes and consequences of consumer online privacy concern. International Journal of Service Industry Management, 18(4), 326-348.
125.Wolf, S. T., Cohen, T. R., Panter, A., &; Insko, C. A. (2010). Shame proneness and guilt proneness: Toward the further understanding of reactions to public and private transgressions. Self and Identity, 9(4), 337-362.
126.Wu, S., Lin, C. S., &; Lin, J. (2011). An empirical investigation of online users&;apos; keyword ads search behaviours. Online Information Review, 35(2), 177-193.
127.Xiao, B., &; Benbasat, I. (2011). Product-related deception in e-commerce: A theoretical perspective. Mis Quarterly, 35(1), 169-196.
128.Xu, H., Teo, H. H., Tan, B. C. Y., &; Agarwal, R. (2009). The role of push-pull technology in privacy calculus: the case of location-based services. Journal of Management Information Systems, 26(3), 135-174.
129.Yi, M. Y., &; Hwang, Y. (2003). Predicting the use of web-based information systems: self-efficacy, enjoyment, learning goal orientation, and the technology acceptance model. International Journal of Human-Computer Studies, 59(4), 431-449.
130.Youn, S. (2009). Determinants of online privacy concern and its influence on privacy protection behaviors among young adolescents. Journal of Consumer Affairs, 43(3), 389-418.
QRCODE
 
 
 
 
 
                                                                                                                                                                                                                                                                                                                                                                                                               
第一頁 上一頁 下一頁 最後一頁 top