跳到主要內容

臺灣博碩士論文加值系統

(44.220.249.141) 您好!臺灣時間:2023/12/11 20:47
字體大小: 字級放大   字級縮小   預設字形  
回查詢結果 :::

詳目顯示

: 
twitterline
研究生:葉香君
研究生(外文):Xiang-Jun Ye
論文名稱:「我在這裡」—隱私顧慮與自戀人格對使用社群媒體定位功能意圖之影響研究
論文名稱(外文):“I am here.” — The Effects of Privacy Concern and Narcissism on the Intention to Disclose Location in Social Media
指導教授:范錚強范錚強引用關係
學位類別:碩士
校院名稱:國立中央大學
系所名稱:資訊管理學系
學門:電算機學門
學類:電算機一般學類
論文種類:學術論文
論文出版年:2019
畢業學年度:107
語文別:中文
論文頁數:64
中文關鍵詞:計畫行為理論自戀人格隱私顧慮社群媒體
外文關鍵詞:Theory of Planned BehaviorNarcissismPrivacy concernSocial media
相關次數:
  • 被引用被引用:4
  • 點閱點閱:435
  • 評分評分:
  • 下載下載:135
  • 收藏至我的研究室書目清單書目收藏:0
隨著資訊科技與社群媒體的進步,如:去中心化的5G、區塊鏈等技術,正不斷地改變民眾的生活習慣,目的是在創造更加便利與即時的資訊世界。而智能手機在此便扮演了協助者的角色,民眾可以更輕鬆地藉由手機媒介悠遊網路世界,如:網路購物、社群網站等。然而近幾年出現眾多的個資外洩案,讓民眾開始意識到我們不僅在網路上享受便利的服務,同時也留下許多的「資訊足跡」,而這些足跡很有可能受到非法的收集與濫用,故民眾的隱私顧慮慢慢地提升了。
本研究以計畫行為理論為基礎,並試圖從用戶的角度,去探討現今用戶在社群媒體上選擇揭露自我資訊的影響因素,以使用任何能讓他人得知或追蹤個人位置的定位功能為情境,如:Facebook打卡、Instagram地點標注等。研究結果指出「感知價值」與「行為規範」確實對「使用意圖」有直接正向影響;「隱私顧慮」則對「使用意圖」有負向影響;而「自戀人格」對「隱私顧慮」與「使用意圖」有調節作用。由以上結果發現,社群媒體用戶所感知到的娛樂與社交價值,以及重要關係人的認同與否與實際行為的影響越高,確實會讓用戶越想去使用定位功能。且當用戶越擔心個人隱私會受到非法使用時,用戶就越不願意去使用定位功能。然而,受到自戀人格的調節,有較高程度自戀人格的用戶會有較高的使用意圖。最後,本研究建議企業可以積極地對低自戀程度的使用者做隱私安全措施,以提高他們的使用意願。
With the advance of Information technology and Social media, technologies such as decentralized 5G, block-chain, among others, have been constantly changing our lifestyles, creating a more convenient and instant information world. Smartphones play an important role of helping people to easily surf online, achieving tasks like online shopping, online socializing and so on. However, there are recently many cases of personal private information intrusions. People started to realize that while they are taking advantage of the convenience brought by technologies, there are many privacy risk at the same time. The exposed information may be illegally exploited by hackers.
Based on the Theory of Planned Behavior, this study attempts to look into the factors affecting usage of location-based services in social media, such us check-in in Facebook or tag location in Instagram. Results show that “perceived value” and “behavior norm” have positive effects on “user intention.” Also, “Privacy concern” negatively affects “user intention.” In the meantime, “narcissism” moderates the effect of “privacy concern” on “user intention.” This result shows that the higher the perceived hedonic and utilitarian values, and the greater impact of friends and family’s thought and actual behavior, users are more likely to use location-based services in social media. Also, users are less likely to use it, when they have more concern about their privacy being illegally used. However, the moderating effect of narcissism is such that user with higher level of narcissism are having higher intention to use it. Finally, this study suggests that enterprises should focus on reducing users’ privacy concern, who have low level of narcissism, by building some privacy policy, in order to raise their intention of using location-based services in social media.
摘要 I
Abstract II
致謝 III
圖目錄 VI
表目錄 VII
第一章 緒論 1
1-1 研究背景 1
1-2 研究動機 2
1-3 研究目的 2
1-4 研究流程 3
第二章 文獻探討 4
2-1 自我揭露 4
2-2 計畫行為理論 6
2-3 感知價值 8
2-4 行為規範 10
2-5 隱私顧慮 10
2-6 社群媒體定位功能 11
2-7 自戀人格 12
2-8 自戀與社群媒體的關係 13
第三章 研究方法 15
3-1 研究架構 15
3-2 研究假說 16
3-2-1 「感知價值」對「定位功能之使用意圖」之影響 16
3-2-2 「行為規範」對「定位功能之使用意圖」之影響 16
3-2-3 「隱私顧慮」對「定位功能之使用意圖」之影響 16
3-2-4 「自戀人格」對「定位功能之使用意圖」之影響 17
3-2-5 「自戀人格」對「感知價值」與「定位功能之使用意圖」之調節影響 17
3-2-6 「自戀人格」對「隱私顧慮」與「定位功能之使用意圖」之調節影響 18
3-3 變數的操作型定義 19
3-3-1 感知價值 19
3-3-2 行為規範 20
3-3-3 隱私顧慮 20
3-3-4 自戀人格 21
3-3-5 定位功能之使用意圖 22
3-4 研究設計 22
3-4-1 問卷設計 22
3-4-2 研究樣本與資料收集方法 22
3-4-3 資料分析方法與工具 24
第四章 資料分析 25
4-1 問卷回收過程 25
4-2 敘述性統計分析 26
4-3 問卷量表之信、效度檢驗 28
4-3-1 收斂效度 28
4-3-2 區別效度 30
4-3-3 信度分析 30
4-4 研究假說的實質關係檢定 31
4-4-1 模型適配度 31
4-4-2 研究假說驗證結果 32
4-4-3 主效果 34
4-4-4 調節效果 35
4-4-5 小結 37
第五章 結論與建議 39
5-1 研究結果 39
5-1-1 「感知價值」對「定位功能之使用意圖」 40
5-1-2 「行為規範」對「定位功能之使用意圖」 40
5-1-3 「隱私顧慮」對「定位功能之使用意圖」 40
5-1-4 「自戀人格」對「隱私顧慮」與「定位功能之使用意圖」的調節效果 40
5-2 研究貢獻 41
5-3 管理意涵 41
5-4 研究限制 42
5-5 未來研究方向 42
參考文獻 44
附錄一 問卷設計 50
英文文獻
1. Ajzen, I. (1985). From intentions to actions: A theory of planned behavior. In: J. Kuhl & J. Beckman (Eds.), Action Control: From cognition to behavior (pp 11-39). Heidelberg: Springer.
2. Ajzen, I. (1991). The theory of planned behavior. Organizational Behavior and Human Decision Processes, 50(2), 179-211.
3. Ajzen, I. (2002). Constructing a TPB questionnaire: Conceptual and methodological considerations. 2019年3月13日,取自https://pdfs.semanticscholar.org/0574/b20bd58130dd5a961f1a2db10fd1fcbae95d.pdf?_ga=2.247588228.2047516183.1558772406-1737810901.1558772406
4. Ajzen, I. (2006). Constructing a Theory of Planned Behavior Questionnaire: Brief description of the theory of planned behavior. 2019年3月13日,取自https://people.umass.edu/aizen/pdf/tpb.measurement.pdf
5. Ajzen, I., & Fishbein, M. (1980). Understanding attitudes and predicting social behavior. Englewood Cliffs, NJ: Prentice-Hall.
6. Allen, V. (1965). Situational factors in conformity. Advances in Experimental Social Psychology, 2, 133-170.
7. Ames, D. R., Rose, P., & Anderson, C. P. (2006). The NPI-16 as a short measure of narcissism. Journal of Research in Personality, 40, 440-450.
8. Andrade, E. B., Kaltcheva, V., & Weitz, B. (2002). Self-Disclosure on the web: the impact of privacy policy, reward and company reputation. Advances in Consumer Research, 29 (1), 350–353.
9. Asch, S.E. (1951). Effects of group pressure on the modification and distortion of judgments. In H. Guetzkow (Ed.), Groups, leadership and men(pp. 177–190). Pittsburgh, PA:Carnegie Press.
10. Babin B.J., Darden W.R., & Griffin M. (1994). Work and/or fun: measuring hedonic and utilitarian shopping value. Journal of consumer research, Vol. 20, No. 4 (Mar., 1994), pp. 644-656.
11. Bandura A. (1982). Self-Efficacy Mechanism in Human Agency. American psychologist, Vol. 37, No. 2, 122-147.
12. Bandura A. (1997). Self-efficacy: The exercise of control. Macmillan.
13. Banerjee, A. V. (1992). A Simple Model of Herd Behavior. The Quarterly Journal of Economics, Volume 107, Issue 3, August 1992, Pages 797–817.
14. Bentler, P. M. (1990). Comparative fit indexes in structural models. Psychological Bulletin, 107 (2), 238 246.
15. Bibby, P. A. (2008). Dispositional Factors in the Use of Social Networking Sites: Findings and Implications for Social Computing Research. International Conference on Intelligence and Security Informatics, 5075, pp. 392–400.
16. Błachnio, A., Przepiorka, A., Bałakier, E., & Boruch, W. (2016). Computers in Human Behavior, 55, 664–667.
17. Browne, M. W., & Cudeck, R. (1993). Alternative ways of assessing model fit. In K.A. Bollen and J.S. Long (Eds.), Testing structural equation models. Newbury Park, CA: Sage.
18. Campbell, W. K., & Foster, J. D. (2007). The narcissistic self: Background, an extended agency model and ongoing controversies. In C. Sedikides & S. J. Spencer (Eds.), The self (pp. 115-138). New York, NY: Psychology Press.
19. Cho, I., Kim, J. K., Park, H., & Lee, S. M. (2014). Motivations of Facebook Places and store atmosphere as moderator. Industrial Management & Data Systems, Vol. 114 No. 9, pp. 1360-1377.
20. Derlega, V. J., Metts, S., Sandra, P., & Margulis, S. T. (1993). Self-Disclosure. California: Sage Publications, Inc.
21. Dinev, T., & Hart, P. (2006). An Extended Privacy Calculus Model for E-Commerce Transactions. Information Systems Research, Vol. 17, No. 1, pp. 61-80.
22. Ducoffe, R. H. (1996). Advertising value and advertising on the Web. Journal of Advertising Research, 36(5), 21-35.
23. Eling, N., Krasnova, H., Widjaja, T., & Buxmann, P. (2013). Will you accept an app? Empirical investigation of the decisional calculus behind the adoption of applications on Facebook. In Proceedings of the 34th International Conference on Information Systems, Milan, Italy.
24. Emmons, R. A. (1984). Factor analysis and construct validity of the Narcissistic Personality Inventory. Journal of Personality Assessment, 4S, 291-300.
25. Fishbein, M., & Ajzen, I. (1975). Belief, attitude, intention and behavior: An introduction to theory and research. Addison-Wesley, Reading, MA.
26. Fomell, C. (1983). Issues in the application of covariance structure analysis: A comment. Journal of Consumer Research, 9, 443-448
27. Fornell, C. R., & Larcker, F. F. (1981). Structural equation models with unobservable variables and measurement error. Journal of Marketing Research, 18, 39 51.
28. Hair, J. F., Anderson, R. E., Tatham, R. L., & Black, W. C. (1998). Multivariate data analysis (5th ed.). New York: Macmillan.
29. Henry, J. W., & Stone, R. W. (1994). A structural equation model of end user satisfaction with a computer based medical information system. Information Resources Management Journal, 7(3), 21 33.
30. Hsu, CL., & Lin, CC. (2015). What drives purchase intention for paid mobile apps? – An expectation confirmation model with perceived value. Electronic Commerce Research and Applications, Volume 14, Issue 1, Pages 46-57
31. Insu, C., Joseph, K. K., Heejun, P., & Sang, M. L., (2014). Motivations of Facebook Places and store atmosphere as moderator. Industrial Management and Data Systems, Vol. 114 Issue: 9, pp.1360-1377.
32. Joinson, A. N. (2001). Self‐disclosure in computer‐mediated communication: The role of self‐awareness and visual anonymity. European Journal of Social Psychology, 31(2), 177-192.
33. Jourard, S. M. (1959). Healthy personality and self-disclosure. Mental Hygiene, New York.
34. Junglas, I. A., Johnson, N. A., & Spitzmuller, C. (2008). Personality traits and concern for privacy: an empirical study in the context of location-based services. European Journal of Information Systems, 17 (4), 387–402.
35. Kapidzic, S. (2013). Narcissism as a predictor of motivations behind Facebook profile picture selection. Cyberpsychology, Behavior, and Social Networking, 16, 14e19. http://dx.doi.org/10.1089/cyber.2012.0143.
36. Kim H.S. (2016). What drives you to check in on Facebook? Motivations, privacy concerns, and mobile phone involvement for location-based information sharing. Computers in Human Behavior, Volume 54, January 2016, Pages 397-406.
37. Li, H., Sarathy, R., & Wu, H. (2011). The role of affect and cognition on online consumers’ decision to disclosure personal information to unfamiliar online vendors. Decision Support Systems, 51, 434-445.
38. Luarna, P., & Lin, H. (2005). Toward an understanding of thebehavioral intention to use mobile banking. Computers in Human Behavior, 21 873–891.
39. McIver, J. P., & Carmines, E. G. (1981). Unidimensional scaling. California: sage publication.
40. Mehdizadeh, S. (2010). Self-presentation 2.0: Narcissism and self-esteem on Facebook. Cyberpsychology, Behavior and Social Networking, 13(4), 357-364.
41. Morf, C. C., & Rhodewalt, F. (2001). Unraveling the Paradoxes of Narcissism: A Dynamic Self-Regulatory Processing Model. Psychological Inquiry, Vol. 12, No. 4, pp. 177-196.
42. Nunnally, J. C. (1967). Psychometric theory. New York: McGraw-Hill.
43. Omarzu, J. (2000). A Disclosure Decision Model: Determining How and When Individuals Will Self-Disclose. Personality and Social Psychology Review, Volume: 4 issue: 2, page(s): 174-185.
44. Raacke J., Bonds-Raacke J. (2008). MySpace and Facebook: Applying the Uses and Gratifications Theory to Exploring Friend-Networking Sites. CyberPsychology & Behavior, Vol. 11, No. 2
45. Raskin, R., & Hall, C. S. (1981). The Narcissistic Personality Inventory: Alternate form reliability and further evidence of construct validity. Journal of Personality Assessment, 45,159-162.
46. Raskin, R., & Terry, H. (1988). A Principal-Components Analysis of the Narcissistic Personality Inventory and Further Evidence of Its Construct Validity. Journal of Personality and Social Psychology, Vol. 54, No. 5,890-902.
47. Rheingold, H. (1993). The virtual community: Homesteading on the electronic frontier. Reading, MA: Addison-Wesley.
48. Rivis, A., & Sheeran, P. (2003). Descriptive norms as an additional predictor in the theory of planned behaviour: A meta-analysis. Current Psychology, 22(3), 218-233. DOI:10.1007/s12144-003-1018-2
49. Ryan, T., & Xenos, S. (2011). Who uses Facebook? An investigation into the relationship between the Big Five, shyness, narcissism, loneliness and Facebook usage. Computers in Human Behavior, 27(5), 1658–1664.
50. Schumacker, R. E., & Lomax, R. G. (2004). A beginner’s guide to structural equation modeling (2nd ed.). Mahwah, NJ: Lawrence Erlbaum Associates.
51. Statista. (2019). Active social network penetration in selected countries as of January 2019. 2019年3月13日,取自https://www.statista.com/statistics/282846/regular-social-networking-usage-penetration-worldwide-by-country/
52. Steiger, J. H., & Lind, J. M. (1980). Statistically based tests for the number of factors. Psychometric Society, Iowa City, IA.
53. Taylor, D. A., Wheeler, L., & Altman, I. (1973). Self-disclosure in isolated groups. Journal of Personality and Social Psychology, 26(1), 39-47.
54. To, P. L., Liao, C., & Lin T. H. (2007). Shopping motivations on Internet: A study based on utilitarian and hedonic value. Technovation, Volume 27, Issue 12, pp. 774-787.
55. Wu, H. L. (2009). Utilitarian and Hedonic Values of Social Network Services. Proceedings of the Fifteenth Americas Conference on Information Systems, Paper 289, San Francisco, CA, USA.
56. Zeithaml, V. A. (1988). Consumer perceptions of price, quality, and value: a means-end model and synthesis of evidence. The Journal of Marketing, 52, 2-22.
57. Zeng, S. Y., Wu, L. L., & Chen, H. G. (2009). Sharing private information online: The mediator effect of social exchange. Paper presented at the Proceedings of the 11th International Conference on Electronic Commerce, Taipei, Taiwan.
中文文獻
1. 吳肇銘。(1999)。影響網站使用意向之因素研究─以入門網站為例。國立中央大學資訊管理研究所博士論文,桃園市。
2. 林建宏。(2014)。什麼樣的人離不開 Facebook – 自戀人格的調節效果。國立中央大學資訊管理研究所碩士論文,桃園市。
3. 曹亞璇。(2018)。為什麼願意在遊戲內知識分享?—探討MMORPG玩家遊戲內知識分享之意圖。國立中央大學資訊管理研究所碩士論文,桃園市。
4. 郭俊賦。(2015)。網路使用者的隱私顧慮與誘因對於 其自我揭露行為之影響。國立中央大學資訊管理研究所碩士論文,桃園市。
5. 陳曉莉 (2018)。中國最大資料外洩事件!? 傳駭客在黑市兜售華住酒店集團1.3億名客戶資訊。2019年3月13日,取自https://www.ithome.com.tw/news/125567
6. 陳曉莉 (2019)。資安研究:5個Collection #系列資料庫,總計彙整了22億組外洩的電子郵件與密碼。2019年3月13日,取自https://www.ithome.com.tw/news/128594
7. 創市際。(2018)。社群服務篇與社交媒體類別使用概況。創市際雙周刊,第一一七期。
8. 經濟日報 (2018)。萬豪酒店遭駭,5億個資外洩。2019年3月13日,取自https://money.udn.com/money/story/5599/3511894
連結至畢業學校之論文網頁點我開啟連結
註: 此連結為研究生畢業學校所提供,不一定有電子全文可供下載,若連結有誤,請點選上方之〝勘誤回報〞功能,我們會盡快修正,謝謝!
QRCODE
 
 
 
 
 
                                                                                                                                                                                                                                                                                                                                                                                                               
第一頁 上一頁 下一頁 最後一頁 top
無相關期刊