跳到主要內容

臺灣博碩士論文加值系統

(18.97.14.90) 您好!臺灣時間:2025/01/22 13:54
字體大小: 字級放大   字級縮小   預設字形  
回查詢結果 :::

詳目顯示

: 
twitterline
研究生:潘聖興
研究生(外文):Sheng-hsing Pan
論文名稱:資訊隱私顧慮與隱私機制對使用者使用意圖影響之研究─以LINE與Facebook為例
論文名稱(外文):The Influence of Information Privacy Concern and Privacy Mechanism on Users’ Intentional Behavior – An Example on LINE and Facebook
指導教授:許麗玲許麗玲引用關係
指導教授(外文):Li-ling Hsu
學位類別:碩士
校院名稱:國立高雄第一科技大學
系所名稱:資訊管理研究所
學門:電算機學門
學類:電算機一般學類
論文種類:學術論文
論文出版年:2015
畢業學年度:103
語文別:中文
論文頁數:87
中文關鍵詞:隱私機制資訊隱私顧慮Facebook理性行為理論LINE
外文關鍵詞:LINEInformation privacy concernTheory of Reasoned Actionprivacy mechanismFacebook
相關次數:
  • 被引用被引用:7
  • 點閱點閱:1106
  • 評分評分:
  • 下載下載:230
  • 收藏至我的研究室書目清單書目收藏:1
本研究旨在探討LINE與Facebook使用者的使用意圖,以「理性行為理論」(Theory of Reseaoned Action; TRA)為基礎,並透過整理過去有關LINE與Facebook之特性與資訊系統成功的相關文獻,歸納出影響LINE與Facebook使用意圖之相關因素。在「理性行為理論」相關文獻中,尚未有研究同時採用LINE與Facebook來探討社群媒體使用者之使用意圖,本研究延伸理性行為理論之相關變數,以讓此理論應用在LINE與Facebook的情境上更臻完整。

本研究使用問卷調查法,利用Google所提供的網路問卷系統做為本研究發放問卷之平台,針對台灣地區有使用LINE與Facebook之學生族群使用者作為研究對象,其使用期間超過3個月以上,並且以目前仍繼續使用之使用者為主,經由三階段有效問卷篩選,共回收629份。本研究使用SmartPLS3.0軟體進行統計分析資料,結果顯示多數假說均傾向於支持本研究原先所提出。其結果顯示:(1) 社群媒體使用者的「資訊隱私顧慮」會負向顯著影響使用者的「使用態度」;(2) 社群媒體使用者的「知覺結構保證」、「知覺隱私賦權」會正向顯著影響使用者的「信任」;(3) 社群媒體使用者的「信任」會負向顯著影響使用者的「知覺風險」;(4) 社群媒體使用者的「信任」會正向顯著影響使用者的「使用態度」;(5) 社群媒體使用者的「主觀規範」、「使用態度」會正向顯著影響使用者的「使用意圖」。
This study aims to explore the LINE with the intended use of the Facebook users, with " Theory of Reseaoned Action " (TRA) based, and through the past relevant LINE and features of Facebook with the success of related literature, summed up the impact of LINE and Facebook of intended use related factors. " Theory of Reseaoned Action " in the literature, have not yet yet research while using LINE and Facebook at the same time to discuss the intended use of social media users. This study extends theory of rational behavior related variables, so this theory is applied in LINE and Facebook on the situations of integrity.

This study used questionnaires, using online survey system provided by Google as the platform of the research questionnaire. Use LINE with Facebook users of students in Taiwan as the object of study. During its use for more than 3 months or more, and to continue using user-oriented. Through the three-stage filters valid questionnaires were collected, recovered 629. This study used SmartPLS3.0 software for statistical analysis of data. Results show most tended to support the hypothesis of this study was originally proposed. The results show: (1) user''s Information Privacy Concern of social media has significantly negative impact on the user’s attitude. (2) user’s perception structure ensures and perceived privacy empowered of social media would significantly positive impact on the user''s trust.(3) user''s trust of social media would significantly negative impact on the user''s perceived risk.(4) user''s trust of social media would significantly positive impact on the user’s attitude. Finally, user’s Subjective norm and attitude of social media would significantly positive impact on the user’s Usage Intention.
摘要 i
Abstract ii
誌謝 iii
目錄 iv
表目錄 vi
圖目錄 vii
壹、緒論 1
1.1 研究背景 1
1.2 研究動機 3
1.3 研究目的與研究問題 4
1.4 研究範圍 4
1.5 研究流程與論文架構 5
貳、文獻探討 7
2.1 LINE簡介 7
2.1.1 LINE基本功能 7
2.1.2 LINE隱私設定 8
2.2 Facebook簡介 8
2.2.1 Facebook基本功能 9
2.2.2 Facebook隱私設定 9
2.3 資訊隱私顧慮 12
2.3.1 網路使用者資訊隱私顧慮 12
2.4 知覺隱私賦權 13
2.5 理性行為理論 14
2.6 知覺風險 15
2.7 信任 16
參、研究方法 18
3.1 研究架構 18
3.2 研究假說 18
3.2.1 資訊隱私顧慮與使用態度的關係 19
3.2.2 隱私機制與信任的關係 19
3.2.3 主觀規範與使用意圖的關係 20
3.2.4 信任與知覺風險的關係 20
3.2.5 知覺風險與使用意圖的關係 20
3.2.6 信任與使用態度的關係 21
3.2.7 使用態度與使用意圖的關係 21
3.3 變數定義與操作化 23
3.3.1 資訊隱私顧慮 23
3.3.2 隱私機制 25
3.3.3 主觀規範 26
3.3.4 知覺風險 26
3.3.5 信任 27
3.3.6 使用態度 27
3.3.7 使用意圖 28
3.4 研究設計 28
3.4.1 問卷設計 28
3.4.2 研究樣本 30
3.4.3 前測 30
3.4.4 資料分析方法 34
肆、資料分析 35
4.1 敍述性統計分析 35
4.2 問卷量表之檢驗 42
4.2.1 信效度分析 42
4.3 假說與模型驗證 50
4.4 假說驗證結果 51
伍、結論與建議 52
5.1 研究結論 52
5.1.1 路徑分析結果 52
5.1.2 研究結果 52
5.2 研究貢獻 56
5.3 實務上之建議 56
5.4 研究限制 57
5.5 未來研究方向 58
參考文獻 59
附錄一:篩選出經常使用者之研究結果 64
附錄二:理性行為理論應用於資訊系統情境之相關研究 65
附錄三:本研究問卷 69
表目錄
表3 1 本研究假說彙整表 22
表3-2 資訊隱私顧慮之操作化衡量題項 23
表3-3 知覺結構保證之操作化衡量題項 25
表3-4 主觀規範之操作化衡量題項 26
表3-5 知覺風險之操作化衡量題項 26
表3-6 信任之操作化衡量題項 27
表3-7 使用態度之操作化衡量題項 27
表3-8 使用意圖之操作化衡量題項 28
表3-9 變數操作彙整表 29
表3-10 前測問卷信、效度分析表 31
表4-1 LINE與Facebook使用者基本資料 36
表4-2 LINE使用行為 36
表4-3 Facebook使用行為 39
表4-4 各構面之AVE、CR值、Cronbach’s Alpha 43
表4-5 權重值、因素負荷量、標準誤與T值表 45
表4-6 收斂效度 47
表4-7 區別效度分析 49
表4-8 假說檢定結果表 52
圖目錄
圖1-1 LINE全球每月活躍使用者人數 1
圖1-2 LINE全球註冊用戶人數走勢圖 2
圖1-3 Facebook全球每月活躍使用者人數 2
圖1-4 本研究之流程架構圖 6
圖2 1 理性行為理論 14
圖3-1 研究架構 18
圖4-1 使用LINE的主要目的為何?(複選,限選“兩”項) 38
圖4-2 使用LINE的主要功能是以下哪幾種?(複選,限選“五”項) 38
圖4-3 使用Facebook的主要目的為何?(複選,限選“兩”項) 41
圖4-4 使用Facebook的主要功能是以下哪幾種?(複選,限選“五”項) 41
圖4-5 路徑分析圖 51
1.徐凱玲、任文瑗,2011,影響行動體適能健康管理服務使用意圖之前置因子-以My Tracks 為例,資訊管理研究,11期,頁63-82,7月。
2.郭明煌、廖鴻圖、蕭麗齡、王亭雅,2014,資訊隱私顧慮對社群網站使用者使用意圖影響之研究─以Facebook 為例,中華民國資訊管理學報,21卷,4期,頁341-364,10月。
3.賴冠名,2010,使用者資訊隱私顧慮和網站隱私機制對信任的影響─以Facebook台灣使用者為例,國立中央大學資訊管理學系,碩士論文。
4.Agarwal, R., & Prasad, J., 1998, “A conceptual and operational definition of personal innovativeness in the domain of information technology”, Information System, Res. 9, No. 2, pp.204-215.
5.Ajzen, I. and Fishbein, M., 1980, “Understanding Attitudes and Predicting Social Behavior”, Englewood Cliffs, NJ: Prentice-Hall.
6.Allport, G.W., 1935, A Handbook of Social Psychology ,Worcester, MA: Clark University Press, pp. 798-844.
7.Bagozzi, R. P. and Yi, Y., “On the Evaluation of Structural Equation Models,” Journal of the Academy of Marketing Science, Vol. 16, No. 1, 1988, pp. 74-94.
8.Bandura. A., 1986, Social foundations of thought and action:A social cognitive theory, Englewood Cliffs, NJ: Prentice-Hall.
9.Bauer, R. A., 1960, Consumer Behavior as Risk Taking , Cambridge: Harvard University Press, pp.389-398.
10.Belanger, F., & Carter, L., 2008, “Trust and risk in e-government adoption”, Journal of Strategic Information System, Vo. 17, pp.165-176.
11.Bhattacherjee, A., & Premkumar, G., 2004, “Understanding changes in belief and attitude toward information technology usage: a theoretical model and longitudinal test”, MIS Quarterly, Vol. 28, No. 2, 229-254.
12.Briggs, P., Burford, B., Deangeli, A., & Lynch, P., 2002, “Trust in online advice”, Social Science Computer, Rev. 20, No. 3, pp.321-332.
13.Chen, R., and He, F., 2003,“Examination of brand knowledge, perceived risk and consumers’ intention to adopt an online retailer.” , TQM & Business Excellence, Vol.16, No.4, pp.677-693.
14.Das, T.K., & Teng, B., 1998, “Between Trust and Control : Developing Confidence in Partner Cooperation in Alliances.”, Academy of Management Review, Vol. 23, pp. 491-512.
15.Davis, F. D., Bagozzi, R., Richard, P., & Paul, R. Warshaw, 1989,. “User acceptance of computer technology: A comparison of two theoretical modes ”, Management Science, Vol.35, No.8, pp.982-1003.
16.Devellis, R. F., 1991,. “Scale development: Theory and applications. Newbury Park”, CA: Sage. Publications, Inc.
17.Facebook官方網站,2014,https://www.facebook.com/.
18.Facebook隱私導覽與說明,2014,https://www.facebook.com/policy.php/.
19.Fishbein, Martin and Ajzen, Icek, 1975, “Belief, Attitude, Intention and Behavior: An Introduction to Theory and Research, Reading”, MA: Addison-Wesley.
20.Fornell, C. R. & Larcker, F. F., 1981, “Structural Equation Models with Unobservable Variables and Measurement Error” , Journal of Marketing Research, Vol. 18, No. 3, pp.39-51.
21.Gang, Kwangwook and Ravichandran, T., 2011, “Accessing External Knowledge: Intention of Knowledge Exchange in Virtual Community of Practice”, Hawaii International Conference on System Sciences, Vol. 44,pp. 1-10.
22.Garretson, J. A. and Clow, K. E., 1999, “The Influence of Coupon Face Value onService Quality Expectation, Risk Perceptions and Purchase Intentions in the DentalIndustry” , Journal of Service Marketing, Vol. 13, No. 1, pp. 59-72.
23.Gefen, David, Karahanna, Elena and Straub, Detmar W., 2003, “Trust and TAM in Online Shopping: An Integrated Model”, MIS Quarterly, Vol. 27, No. 1, pp. 51-90.
24.Gefen, D., 2002, “Reflections on the Dimensions of Trust and Trustworthiness among Online Consumers”, ACM SIGMIS Database, Vol. 33, No. 3, pp.38-53.
25.Gefen, D., 2000, “E-commerce: the role of familiarity and trust”, Omega, Vol. 28, No. 6, pp.725-737.
26.Grazioli, S. and Jarvenpaa, S., 2000, “Perils of Internet Fraud: An Empirical Investigation of Dedeption and Trust with Experienced Internet Consumers.” IEEE Transactions on Systems, Vol. 30, No. 4, pp. 395-410.
27.Hair Jr., J.F., Anderson, R.E., Tatham, R.L., Black, W. C., 1998, “Multivariate Data Analysis”, fifth ed. Prentice-Hall, Upper Saddle River, NJ.
28.Hansen, T., 2008, “Consumer values, the theory of planned behavior and online grocery shopping”, International Journal of consumer Studies, Vol. 32, No. 2, pp.128-137.
29.Hoffman, Donna L., Novak, Thomas P. and Peralta, Marcos, 1991, “Building Consumer Trust Online”, Communications of the ACM, Vol. 42, No. 4, pp. 80-85.
30.Huang, Jinghua. , and Liu, Dandi., 2011, “Factors influencing continuance of mobile virtual community: Empirical evidence from China and Korea”, International Conference on Service Systems and Service Management, pp.1-6 .
31.Igbaria, M., Guimaraes, T., & Davis, G. B., 1995, “Testing the determinants of microcomputer usage via a structural equation model”, Journal of management information systems, Vol. 11, No. 4, pp.87-114.
32.Jarvenpaa, S. L., Tractinsky, N., Saarinen, L., & Vitale, M., 1999, “Consumer trust in an Internet store: A cross-cultural validation” , Journal of Computer-Mediated Communication, Vol. 5, No. 2, pp.1-35.
33.Karahanna, E., Straub, D.W., & Chervany, N.L., 1999, “Information trechnology adoption across time: A cross-sectional comparison of preadoption and post-adoption heliefs”, MIS Quarterly, Vol. 23, No. 2, pp.183-207.
34.Korzaan, Melinda L. and Boswell, Katherine T., 2008, “The Influence of Personality Traits and Information Privacy Concerns on Behavioral Intentions”, The Journal of Computer Information Systems, Vol. 48, No. 4, pp. 15-24.
35.Lian, Jiunn Woei and Lin, Tzu Ming, 2008, “Effects of Consumer Characteristics on Their Acceptance of Online Shopping: Comparisons Among Different Product Types”, Computers in Human Behavior, Vol. 24, No. 1, pp. 48–65.
36.Liao, Z., and Cheung, M. T., 2001, “Internet-based e-shopping and consumer attitudes:An empirical study”, Information & Management, Vol. 38, No. 5, pp.299-306.
37.LINE官方網站,2014,http://line.me/zh-hant/.
38.Liu, Chang, Marchewka, Jack T., Lu, June and Yu, Chun Sheng, 2005, “Beyond
Concern—a Privacy-Trust-Behavioral Intention Model of Electronic Commerce”, Information and Management, Vol. 42, pp. 289-304.
39.Malhotra, N. K., Kim, S. S., & Agarwal, J., 2004, “Internet Users’ Information Privacy Concerns (IUIPC): The Construct, the Scale, and a Causal Model”, Information Systems Research, Vol. 15, No. 4, pp.336-355.
40.Mayer, R. C., Davis, J. H., & Schoorman, F. D., 1995, “An integrative model of organizational trust”, Academy of Management Review, Vol. 20, No. 3, pp.709-734.
41.McKnight, D. H., Cummings, L. L., & Chervany, N. L., 1998. “Initial trust formation in new organizational relationships”, Academy of Management Review, Vol. 23, No. 3, pp.473-490.
42.McKnight, D.H., Choudhuhy, V., & Kacmah, C., 2002, “Developing and validating trust measures fore-commerce: An integrative typology”, Information System, Res. 13, No. 3, pp.334-359.
43.Merrilees, B., & Fry, M.L., 2003, “E-trust: The influence of perceived interactivity on e-retailing users”, Marketing Intelligence, Planning 21, No. 2, pp.123-128.
44.Mishra, Deepti., Akman, Ibrahim. ,Mishra, Alok.,2014, “Theory of Reasoned Action application for Green Information Technology acceptance”, Computers in Human Behavior, Vol.36, pp.29-40.
45.Pahnila, S.,& Siponen, M., 2010,“Implementation Intentions Explain How a Behavior Becomes Habitual: The Use of Online Newspapers”, Hawaii International Conference on System Sciences, Vol. 43,pp.1-11.
46.Pavlou, P. A., 2003, “Consumer acceptance of electronic commerce: Integrating trust and risk with the technology acceptance model”, International Journal of Electronic Commerce, Vol. 7, No. 3, pp.101-134.
47.Pavlou, P. A., & Gefen, D., 2004, “Building effective online marketplaces with institution-based trust”, Information Systems Research, Vol. 15, No. 1, pp.37-59.
48.Phelps, J., Nowak, G., & Ferrell, E., 2000, “Privacy concerns and consumer willingness to provide personal information”, Journal of Public Policy & Marketing, pp.27-41.
49.Schiffman, L.G., & Kanuk, L.L., 2006, Consumer Behavior, 9th ed., Upper Saddle River, New Jersey: Prentice-Hall,Inc.
50.Shin, Dong Hee, 2010, “The Effects of Trust, Security and Privacy in Social Networking: A Security-Based Approach to Understand the Pattern of Adoption”, Interacting with Computers, Vol. 22, No. 5, pp. 428-438.
51.Smith, H. J., Milberg, S.J. and Burke, S.J., 1996, “Information privacy: measuring individuals concerns about organizational practices”, MIS Quarterly, Vol. 20, No. 2, pp. 167-196.
52.Sillence, E., Briggs, P., Fishwick, L., & Harris, P., 2004, “Trust and Mistrust of Online Health Sites”, Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, pp.663-670.
53.Statista,Facebook全球每月活躍使用者人數,2014,
http://www.statista.com/statistics/264810/number-of-monthly-active-facebook-users-worldwide/.
54.Statista,LINE全球每月活躍使用者人數,2014,http://www.statista.com/statistics/327292/number-of-monthly-active-line-app-users/.
55.Statista,LINE全球註冊用戶人數走勢圖,2014,
http://official-blog.line.me/tw/archives/38020960.html/.
56.Stewart K.J., 2003, “Trust Transfer on the World Wide Web”, Organization Science, Vol. 14, No. 1, pp.5-17.
57.Taylor, J. W., 1974, “The Role of risk in consumer behavior”, Journal of Marketing,Vol. 38, No. 2, pp.54-60.
58.Teas, R. K. and Agarwal, S., 2000, “The Effect of Extrinsic Product Cues on Consumer’s Perceptions of Quality, Sacrifice, and Value”, Journal of the Academy of Marketing Science, Vol. 28, No. 2, pp.278-290.
59.Teo, T.S.H., and Yeong, Y.D., 2003, “Assessing the consumer decision process in the digital marketplace”, Omega, Vol. 31, pp.349-363.
60.Van D., Thomas P., Midha, V. and Nemati, H., 2007, “The effect of consumer privacy empowerment on trust and privacy concerns in E-commerce”, Electronic Markets, Vol. 17, No. 1, pp. 68-81.
61.Van Slyke, C., Shim, J. T., Johnson, R., & Jiang, J., 2006. “Concern for information privacy and online consumer purchasing”, Journal of the Association for Information Systems, Vol.7, No.3, pp.415-444.
62.Venkatesh, V., 1999, “Creation of Favorable User Perceptions: Exploring the Role of Intrinsic Motivation”, MIS Quarterly, Vol. 23, No. 2, pp.239-260.
63.Yousafzai, S.Y , Pallister, J.G., & Foxall, G.R., 2005, “Strategies for Building Find Communicating Trust in Electronic Banking: A Field Experiment”, Psychology Market, Vol. 22, No. 2, pp.181-201.
QRCODE
 
 
 
 
 
                                                                                                                                                                                                                                                                                                                                                                                                               
第一頁 上一頁 下一頁 最後一頁 top