( 您好!臺灣時間:2024/05/23 17:58
字體大小: 字級放大   字級縮小   預設字形  
回查詢結果 :::


論文名稱(外文):Exploring the Effects of Internet Psychological Characteristics and Toxic Disinhibition on Sharing Behavior
指導教授(外文):CHUANG, YU-WEI
外文關鍵詞:Internet Psychological CharacteristicsSocial InfluenceToxic DisinhibitionInformation SharingRumor Sharing
  • 被引用被引用:0
  • 點閱點閱:732
  • 評分評分:
  • 下載下載:0
  • 收藏至我的研究室書目清單書目收藏:0
本研究針對曾經使用過Dcard匿名網路平台的使用者,透過網路問卷的方式回收資料並驗證本研究所提出的研究假說。有效問卷總計 498 份。研究結果發現:(1) 網路心理特徵(匿名性、去個性化、自我投入)對網路去抑制效應有正向顯著影響;(2)主觀規範、資訊影響對網路去抑制效應有正向顯著影響;(3)網路不良去抑制效應對資訊分享及謠言分享有正向顯著影響
With the rapid spread of the Internet, the Internet platform has also developed an "anonymous platform" that is different from the general Facebook fan pages, such as Dcard, PTT, Gamer, etc. Users also can use the anonymous system to express their opinions on the platform. By expressing your emotions and writing stories you have encountered, you can also view other users' articles through the discussion board, leave your own ideas under the article, and even use anonymous to know other users.
Dcard is an anonymous online platform in Taiwan. The founders are Taiwan University students Lin Yuqin and Jian Qinyou. In 2011, only National Taiwan University and National Chengchi University students were registered. Later, other universities and a few foreign universities also can register account on Dcard. Now, it is a large forum with over one million members.
The main function of Dcard is the community function. Users can browse, post, respond to other articles through Dcard's website or App. The discussion area is also divided into different discussion versions according to different content. Any behavior on the discussion board is for the anonymous system, you can know the university of the speaker, but you will not know his/her real name. Dcard also regulates that the user cannot disclose personal information, any form of contact information, or exchange personal information in articles or messages. Another feature is the draw card. The user will receive an anonymous invitation card for system matching at midnight. If you are interested in knowing the people, you can send a friend invitation. The person who receives the friend invitation is on the same day. Before midnight, you must agree to the invitation. Then the person and you will become friends. Once they are missed, the two users will not receive or draw each other's Dcard. Many people will know other users by drawing cards.
This study is aimed at users who have used the Dcard anonymous network platform to recover data through the online questionnaire and verify the research hypothesis proposed by the research. The total number of valid questionnaires was 498. The research results show that:(1)network psychological characteristics(anonymity, deindividuation, and solipsistic introjection) have positive and significant impacts on toxic disinhibition(2)subjective norm and information influence have positive and significant impacts on toxic disinhibition(3)toxic disinhibition has positive and significant impacts on information sharing and rumor sharing.
Nowadays, anonymous network platforms are becoming more and more popular. Through the results of this research, we can find that the some characteristics of the network have a significant impact on toxic disinhibition, which in turn affects the behavior of information sharing and the behavior of rumor sharing. The results of this study can be used as a reference for subsequent research on related network behaviors.
摘要 I
Abstract II
致謝 III
目錄 IV
表目錄 V
圖目錄 V
緒論 1
第一節 研究背景與動機 1
第二節 研究目的與預期貢獻 4
第三節 研究方法 4
第四節 研究範圍 4
第五節 研究流程 5
第六節 章節架構 6
第二章 文獻回顧 7
第一節 網路不良去抑制效應(Toxic Disinhibition) 7
第二節 網路特徵(Internet Psychological Characteristics) 9
第三節 社會影響(Social Influence) 12
第四節 分享行為(Sharing Behavior) 14
第三章 研究設計 15
第一節 觀念性架構 15
第二節 研究假設 16
第三節 各構面之衡量問項 20
第四章 實證分析 23
第一節 敘述性統計 23
第二節 測量模型之評估 26
第三節 結構模型之評估 30
第五章 結論 32
第一節 研究結果 32
第二節 研究貢獻 34
第三節 研究限制 34
參考文獻 35
Abdul, W. K., Gaur, S. S., & Peñaloza, L. N. (2012). The determinants of customer trust in buyer–seller relationships: An empirical investigation in rural India. Australasian Marketing Journal (AMJ), 20(4), 303-313.
Ajzen, I. (1991). The theory of planned behavior. Organizational behavior and human decision processes, 50(2), 179-211.
Allport, G. and Postman, L. (1947) The Psychology of Rumor. Holt, Rinehart and Winston, New York.
Alonzo, M., & Aiken, M. (2004). Flaming in electronic communication. Decision Support Systems, 36(3), 205-213.
Anderson, C. L., & Agarwal, R. (2010). Practicing safe computing: a multimedia empirical examination of home computer user security behavioral intentions. MIS quarterly, 34(3), 613-643.
Aoyama, I., Saxon, T. F., & Fearon, D. D. (2011). Internalizing problems among cyberbullying victims and moderator effects of friendship quality. Multicultural Education & Technology Journal, 5(2), 92-105.
Athiyaman, A. (2002). Internet users’ intention to purchase air travel online: an empirical investigation. Marketing intelligence & planning, 20(4), 234-242.
Barak, A., Hen, L., Boniel-Nissim, M., & Shapira, N. A. (2008). A comprehensive review and a meta-analysis of the effectiveness of internet-based psychotherapeutic interventions. Journal of Technology in Human services, 26(2-4), 109-160.
Bargh, J. A., & McKenna, K. Y. (2004). The Internet and social life. Annu. Rev. Psychol., 55, 573-590.
Bargh, J. A., McKenna, K. Y., & Fitzsimons, G. M. (2002). Can you see the real me? Activation and expression of the “true self” on the Internet. Journal of social issues, 58(1), 33-48.
Behavioral Intentions Model, Journal of International Business
Bordia, P., & DiFonzo, N. (2007). Rumor, gossip and urban legends. Diogenes, 54(1), 19-35.
Bordia, P., & DiFonzo, N. (2013). 10 Rumors during organizational change: a motivational analysis. The Psychology of Organizational Change: Viewing Change from the Employee’s Perspective, 232.
Brawley, A. M., & Pury, C. L. (2016). Work experiences on MTurk: Job satisfaction, turnover, and information sharing. Computers in Human Behavior, 54, 531-546.
Brown, K., Jackson, M., & Cassidy, W. (2006). Cyber-bullying: Developing policy to direct responses that are equitable and effective in addressing this special form of bullying. Canadian Journal of Educational Administration and Policy, 57, 1-36.
Burgess-Proctor, A., Patchin, J. W., & Hinduja, S. (2009). Cyberbullying and online harassment: Reconceptualizing the victimization of adolescent girls. Female crime victims: Reality reconsidered, 153-175.
Burgoon, J. K., Blair, J. P., & Strom, R. E. (2008). Cognitive biases and nonverbal cue availability in detecting deception. Human Communication Research, 34(4), 572-599.
Burnkrant, R. E., & Cousineau, A. (1975). Informational and normative social influence in buyer behavior. Journal of Consumer research, 2(3), 206-215.
Castellá, V. O., Abad, A. Z., Alonso, F. P., & Silla, J. P. (2000). The influence of familiarity among group members, group atmosphere and assertiveness on uninhibited behavior through three different communication media. Computers in Human Behavior, 16(2), 141-159.
Cestac, J., Paran, F., & Delhomme, P. (2011). Young drivers’ sensation seeking, subjective norms, and perceived behavioral control and their roles in predicting speeding intention: How risk-taking motivations evolve with gender and driving experience. Safety science, 49(3), 424-432.
Cestac, J., Paran, F., & Delhomme, P. (2011). Young drivers’ sensation seeking, subjective norms, and perceived behavioral control and their roles in predicting speeding intention: How risk-taking motivations evolve with gender and driving experience. Safety science, 49(3), 424-432.
Chan, M., Woon, I., & Kankanhalli, A. (2005). Perceptions of information security in the workplace: linking information security climate to compliant behavior. Journal of information privacy and security, 1(3), 18-41.
Chan, S. C. (2004). Understanding internet banking adoption and use behavior: A Hong Kong perspective. Journal of Global Information Management (JGIM), 12(3), 21-43.
Chang, A.-M., Aeschbach, D., Duffy, J. F., & Czeisler, C. A. (2014). Evening use of light-emitting eReaders negatively affects sleep, circadian timing, and next-morning alertness. Proceedings of the National Academy of Sciences, 112(4), 1232–1237.
Chang, C. H., Rosen, C. C., & Levy, P. E. (2009). The relationship between perceptions of organizational politics and employee attitudes, strain, and behavior: A meta-analytic examination. Academy of Management journal, 52(4), 779-801.
Chatterjee, A., Schroeder, F. C., Jurgenson, C. T., Ealick, S. E., & Begley, T. P. (2008). Biosynthesis of the thiamin-thiazole in eukaryotes: identification of a thiazole tautomer intermediate. Journal of the American Chemical Society, 130(34), 11394-11398.
Chesney, T., Chuah, S. H., & Hoffmann, R. (2009). Virtual world experimentation: An exploratory study. Journal of Economic Behavior & Organization, 72(1), 618-635.
Chester, A., & Bretherton, D. (2007). Impression management and identity online. The Oxford handbook of Internet psychology, 223-236.
Choi, J., & Geistfeld, L. V. (2004). A cross-cultural investigation of consumer e-shopping adoption. Journal of Economic Psychology, 25(6), 821-838.
Christopherson, K. M. (2007). The positive and negative implications of anonymity in Internet social interactions:“On the Internet, Nobody Knows You’re a Dog”. Computers in Human Behavior, 23(6), 3038-3056.
Clark, R. A., & Goldsmith, R. E. (2006). Global innovativeness and consumer susceptibility to interpersonal influence. Journal of Marketing Theory and Practice, 14(4), 275-285.
Collins, A. L., Lawrence, S. A., Troth, A. C., & Jordan, P. J. (2013). Group affective tone: A review and future research directions. Journal of Organizational Behavior, 34(S1), S43-S62.
Constant, D., Kiesler, S., & Sproull, L. (1994). What's mine is ours, or is it? A study of attitudes about information sharing. Information systems research, 5(4), 400-421.
Cox, M. (2012). Power shifts, economic change and the decline of the West?. International Relations, 26(4), 369-388.
Deutsch, M., & Gerard, H. B. (1955). A study of normative and informational social influences upon individual judgment. The journal of abnormal and social psychology, 51(3), 629.
Diener, E. (1976). Effects of prior destructive behavior, anonymity, and group presence on deindividuation and aggression. Journal of Personality and Social Psychology, 33(5), 497.
Diener, E. (1980). Deindividuation: The absence of self-awareness and self-regulation in group members. The psychology of group influence, 209242.
Dumont, G., & Candler, G. (2005). Virtual jungles: Survival, accountability, and governance in online communities. The American Review of Public Administration, 35(3), 287-299.
Feeley, T. H., & Young, M. J. (1998). Humans as lie detectors: Some more second thoughts. Communication quarterly, 46(2), 109-126.
Festinger, L., Pepitone, A., & Newcomb, T. (1952). Some consequences of de-individuation in a group. The Journal of Abnormal and Social Psychology, 47(2S), 382.
Fishbein, M., & Ajzen, I. (1975). Belief, Attitude, Intention, and Behavior: An Introduction to Theory and Research. Reading, MA: Addison-Wesley.
Fornell, C., & Larcker, D. F. (1981). Evaluating structural equation models with unobservable variables and measurement error. Journal of Marketing Research, 18(1), 39-50.
Fox, J., Cruz, C., & Lee, J. Y. (2015). Perpetuating online sexism offline: Anonymity, interactivity, and the effects of sexist hashtags on social media. Computers in Human Behavior, 52, 436-442.
Friedman, R. A., & Currall, S. C. (2003). Conflict escalation: Dispute exacerbating elements of e-mail communication. Human relations, 56(11), 1325-1347.
Fu, S., Han, Z., & Huo, B. (2017). Relational enablers of information sharing: evidence from Chinese food supply chains. Industrial Management & Data Systems, 117(5), 838-852.
Gerhart, N., & Koohikamali, M. (2019). Social network migration and anonymity expectations: What anonymous social network apps offer. Computers in Human Behavior, 95, 101-113.
Giles, C. (2006) “The public interest challenges for the communications sector over the next 10 years: Comtestable public service funding.” In E. Richards, R. Foster, and T. Kiedrowski(eds) Communications : the Next Decade. A Collection of Essays Prepared for the UK Office of Communication. London: Ofcom, pp. 101-111.
Gopi, M., & Ramayah, T. (2007). Applicability of theory of planned behavior in predicting intention to trade online: Some evidence from a developing country. International Journal of Emerging Markets, 2(4), 348-360.
Hair, J. F., Anderson, R. E., Tatham, R. L., & Black, W. C. (1992). Multivariate data analysis (3rd ed.). New York: Macmillan.
Hair, J. F., Anderson, R. E., Tatham, R. L., & Black, W. C. (1998) , Applied Multivariate Data Analysis , Upper Saddle River, NJ: Prentice Hall.
Han, G., Gupta, S. D., Gable, K., Niranjanakumari, S., Moitra, P., Eichler, F., ... & Dunn, T. M. (2009). Identification of small subunits of mammalian serine palmitoyltransferase that confer distinct acyl-CoA substrate specificities. Proceedings of the National Academy of Sciences, 106(20), 8186-8191.
Heide, J. B., & Miner, A. S. (1992). The shadow of the future: Effects of anticipated interaction and frequency of contact on buyer-seller cooperation. Academy of management journal, 35(2), 265-291.
Henningsen, M. L. M., Henningsen, D. D., Cruz, M. G., & Morrill, J. (2003). Social influence in groups: A comparative application of relational framing theory and the elaboration likelihood model of persuasion. Communication Monographs, 70(3), 175-197.
Herath, T., & Rao, H. R. (2009). Protection motivation and deterrence: a framework for security policy compliance in organisations. European Journal of Information Systems, 18(2), 106-125.
Hinduja, S., & Patchin, J. W. (2008). Cyberbullying: An exploratory analysis of factors related to offending and victimization. Deviant behavior, 29(2), 129-156.
Ho, C. I., & Lee, Y. L. (2007). The development of an e-travel service quality scale. Tourism Management, 28(6), 1434-1449.
Hollenbaugh, E. E., & Everett, M. K. (2013). The effects of anonymity on self-disclosure in blogs: An application of the online disinhibition effect. Journal of Computer-Mediated Communication, 18(3), 283-302.
Husarik, D. B., Gordic, S., Desbiolles, L., Krauss, B., Leschka, S., Wildermuth, S., & Alkadhi, H. (2015). Advanced virtual monoenergetic computed tomography of hyperattenuating and hypoattenuating liver lesions: ex-vivo and patient experience in various body sizes. Investigative radiology, 50(10), 695-702.
Jafarkarimi, H., Saadatdoost, R., Sim, A. T. H., & Hee, J. M. (2016). Behavioral intention in social networking sites ethical dilemmas: An extended model based on Theory of Planned Behavior. Computers in Human Behavior, 62, 545-561.
Jin, Z., Schwend, T., Fu, J., Bao, Z., Liang, J., Zhao, H., & Yang, J. (2016). Members of the Rusc protein family interact with Sufu and inhibit vertebrate Hedgehog signaling. Development, 143(21), 3944-3955.
Johnston, A. C., & Warkentin, M. (2010). Fear appeals and information security behaviors: an empirical study. MIS quarterly, 549-566.
Joinson, A. N. (1998). Causes and implications of disinhibited behavior on the Net. In J. Gackenbach (Ed.),Psychology of the Internet (pp. 43–60). New York: Academic Press.
Jöreskog, K. G., & Sörbom, D. (1993). LISREL 8: Structural equation modeling with the SIMPLIS command language. Scientific Software International.,
Kabay, M. E. (1998). Anonymity and pseudonymity in cyberspace: deindividuation, incivility and lawlessness versus freedom and privacy. In Paper presented at the Annual Conference of the European Institute for Computer Anti-virus Research (EICAR) (Vol. 16, p. 8).
Kaplan, M. F., & Miller, C. E. (1987). Group decision making and normative versus informational influence: Effects of type of issue and assigned decision rule. Journal of Personality and social psychology, 53(2), 306.
Kaplan, R., & Kaplan, S. (1989). The experience of nature: A psychological perspective. CUP Archive.
Kianto, A., Vanhala, M., & Heilmann, P. (2016). The impact of knowledge management on job satisfaction. Journal of Knowledge Management, 20(4), 621-636.
Kiesler, S., Siegel, J., & McGuire, T. W. (1984). Social psychological aspects of computer-mediated communication. American psychologist, 39(10), 1123.
Kiesler, S., Zubrow, D., Moses, A. M., & Geller, V. (1985). Affect in computer-mediated communication: An experiment in synchronous terminal-to-terminal discussion. Human-Computer Interaction, 1(1), 77-104.
Knapp, K. J., Marshall, T. E., Kelly Rainer, R., & Nelson Ford, F. (2006). Information security: management's effect on culture and policy. Information Management & Computer Security, 14(1), 24-36.
Kowalski, R. M., Limber, S. P., & Agatston, P. W. (2008). CYBER BULLYING. Malden: Blackwell.
Lapidot-Lefler, N., & Barak, A. (2012). Effects of anonymity, invisibility, and lack of eye-contact on toxic online disinhibition. Computers in human behavior, 28(2), 434-443.
Lea, M., & Spears, R. (1992). Paralanguage and social perception in computer‐mediated communication. Journal of Organizational Computing and Electronic Commerce, 2(3-4), 321-341.
Lee, C. and Green, R. T., Cross-Culture Examination of the Fishbein
Lee, M. K., Cheung, C. M., Sia, C. L., & Lim, K. H. (2006, January). How positive informational social influence affects consumers' decision of Internet shopping?. In Proceedings of the 39th Annual Hawaii International Conference on System Sciences (HICSS'06) (Vol. 6, pp. 115a-115a). IEEE.
Li, Chia-Ying, "Does Self-Efficacy Contribute to Knowledge Sharing and Innovation Effectiveness? A Multi-Level Perspective" (2013).
Lin, T. C., Wu, S., & Shih, J. F. (2017). Examining the antecedents of online disinhibition. Information Technology & People, 30(1), 189-209.
Machuletz, D., Sendt, H., Laube, S., & Böhme, R. (2016, July). Users protect their privacy if they can: Determinants of webcam covering behavior. In European Workshop on Usable Security (EuroUSEC).
Mahon, D., Cowan, C., & McCarthy, M. (2006). The role of attitudes, subjective norm, perceived control and habit in the consumption of ready meals and takeaways in Great Britain. Food Quality and Preference, 17(6), 474-481.
Martens, M., De Wolf, R., & De Marez, L. (2019). Investigating and comparing the predictors of the intention towards taking security measures against malware, scams and cybercrime in general., Computers in Human Behavior, 92, 139-150.
McKenna, K. Y., & Seidman, G. (2005). Social identity and the self: Getting connected online. From Cognitive Technology: Essays on the Transformation of Thought and Society.
Mouakket, S. (2015). Factors influencing continuance intention to use social network sites: The Facebook case. Computers in Human Behavior, 53, 102-110.
Muzellec, L., Lynn, T., Caemmerer, B., & Turley, D. (2017). Social network sites: early adopters’ personality and influence. Journal of Product & Brand Management, 26(1), 42–51. doi:10.1108/jpbm-10-2015-1025
Park, C. W., & Lessig, V. P. (1977). Students and housewives: Differences in susceptibility to reference group influence. Journal of consumer Research, 4(2), 102-110.
Park, N., & Lee, S. (2014). College students' motivations for Facebook use and psychological outcomes. Journal of Broadcasting & Electronic Media, 58(4), 601-620.
Postmes, T., & Spears, R. (1998). Deindividuation and antinormative behavior: A meta-analysis. Psychological bulletin, 123(3), 238.
Ramayah, T., Jantan, M. and Bushra, A. (2003). Internet usage among students of institutions of higher learning: The role of motivational variables. The Proceedings of the 1st International Conference on Asian Academy of Applied Business Conference, Sabah, Malaysia, 10–12 July.
Ramayah, T., Ling, C. Y., Suki, N. M., & Ibrahim, A. (2005). Determinants of intention to use an online bill payment system among MBA students. E-business, (9), 80-91.
Ramayah, T., Noor, M.N.M., Nasurdin, A.M. and Sin, Q.B. (2004), “The relationships between belief, attitude, subjective norm, intention, and behavior towards infant food formula selection: the views of the Malaysian mothers”, Gadjah Mada International Journal of Business, Vol. 6 No. 3, pp. 405‐18.
Ramayah, T., Rouibah, K., Gopi, M., & Rangel, G. J. (2009). A decomposed theory of reasoned action to explain intention to use Internet stock trading among Malaysian investors. Computers in Human Behavior, 25(6), 1222-1230.
Reinig, B. A., Briggs, R. O., & Nunamaker Jr, J. F. (1997). Flaming in the electronic classroom. Journal of Management Information Systems, 14(3), 45-59.
Rich, B. L., Lepine, J. A., & Crawford, E. R. (2010). Job engagement: Antecedents and effects on job performance. Academy of management journal, 53(3), 617-635.
Rivis, A., & Sheeran, P. (2003). Social influences and the theory of planned behaviour: Evidence for a direct relationship between prototypes and young people's exercise behaviour. Psychology and Health, 18(5), 567-583.
Schumann, S., Klein, O., Douglas, K., & Hewstone, M. (2017). When is computer-mediated intergroup contact most promising? Examining the effect of out-group members' anonymity on prejudice. Computers in human behavior, 77, 198-210.
Seçkin, G. (2010). Cyber patients surfing the medical web : Computer-mediate knowledge and perceived benefits. Computers in Human Behavior, 26(6), 1694-1700.
Spears, R., & Lea, M. (1992). Social influence and the influence of the'social'in computer-mediated communication. Harvester Wheatsheaf.
Spears, R., Lea, M., & Postmes, T. (2007). Computer-mediated communication and social identity. The Oxford handbook of internet psychology, 253-269.
Spears, R., Postmes, T., Lea, M., & Wolbert, A. (2002). When are net effects gross products? Communication. Journal of Social Issues, 58(1), 91-107.
Spreng, R. A., & Page Jr, T. J. (2001). The impact of confidence in expectations on consumer satisfaction. Psychology & Marketing, 18(11), 1187-1204.
Sproull, L., & Kiesler, S. (1986) Reducing Social Context Cues: Electronic Mail in Organizational Communication. Management Science, 32, 1492-1512. Studies, 1991, Vol. 2, pp.289-305.
Suler, J. (2004). The online disinhibition effect. Cyberpsychology & behavior, 7(3), 321-326.
Suler, J. (2005). The online disinhibition effect. International Journal of Applied Psychoanalytic Studies, 2(2), 184-188.
Suler, J. R., & Phillips, W. L. (1998). The bad boys of cyberspace: Deviant behavior in a multimedia chat community. CyberPsychology & Behavior, 1(3), 275-294.
Sun, Y., Jiang, H., Hwang, Y., & Shin, D. (2018). Why should I share? An answer from personal information management and organizational citizenship behavior perspectives. Computers in Human Behavior, 87, 146-154.
Tanis, M., & Postmes, T. (2007). Two faces of anonymity: Paradoxical effects of cues to identity in CMC. Computers in Human Behavior, 23(2), 955-970.
Taylor, S., & Todd, P. A. (1995). Understanding information technology usage: A test of competing models. Information Systems Research, 6(2), 145-176.
Thompson, P. (2006). Patent citations and the geography of knowledge spillovers: evidence from inventor-and examiner-added citations. The Review of Economics and Statistics, 88(2), 383-388.
Trafimow, D., & Finlay, K. A. (1996). The importance of subjective norms for a minority of people: Between subjects and within-subjects analyses. Personality and social psychology bulletin, 22(8), 820-828.
Tremblay, M., Landreville, J. (2015). Information sharing and citizenship behaviors: Mediating role of empowerment, procedural justice and perceived organizational support. Journal of Business Communication, 52(4), 347-368. Nominated for the best article of the year.
Udris, R. (2014). Cyberbullying among high school students in Japan: Development and validation of the Online Disinhibition Scale. Computers in Human Behavior, 41, 253-261.
Valkenburg, P. M., Schouten, A. P., & Peter, J. (2005). Adolescents’ identity experiments on the Internet. New media & society, 7(3), 383-402.
Venkatesh, V., & Brown, S. A. (2001). A longitudinal investigation of personal computers in homes: adoption determinants and emerging challenges. MIS quarterly, 71-102.
Venkatesh, V., & Davis, F. D. (2000). A theoretical extension of the technology acceptance model: Four longitudinal field studies. Management Science, 46, 186-204.
Waheed, K., Staszewski, R. B., Rezeq, S. S., & Eliezer, O. E. (2012). U.S. Patent No. 8,195,103. Washington, DC: U.S. Patent and Trademark Office.
White, F. A., Harvey, L. J., & Abu-Rayya, H. M. (2015). Improving intergroup relations in the Internet age: A critical review. Review of General Psychology, 19(2), 129-139.
Yoon, C., Hwang, J. W., & Kim, R. (2012). Exploring factors that influence students' behaviors in information security. Journal of Information Systems Education, 23(4), 407-415.
Yu, T. K., Lu, L. C., & Liu, T. F. (2010). Exploring factors that influence knowledge sharing behavior via weblogs. Computers in human behavior, 26(1), 32-41.
Zhang Y., Xiao L., Zhou H., Xu J., Du X., Dong G. (2016). Brain activity toward gaming-related cues in Internet gaming disorder during an addiction stroop task. Front. Psychol. 7:714 10.3389/fpsyg.2016.00714
Zimbardo, P. G. (1969). The human choice: Individuation, reason, and order versus deindividuation, impulse, and chaos. In W. D. Arnold & D. Levine (Eds.), Nebraska Symposium on Motivation, (pp. 237-307). Lincoln: University of Nebraska.
Zuckerman, M., DePaulo, B. M., & Rosenthal, R. (1981). Verbal and nonverbal communication of deception. In L. Berkowitz (Ed.), Advances in experimental social psychology (Vol. 14, pp. 1–59). New York: Academic Press.
電子全文 電子全文(網際網路公開日期:20240702)
第一頁 上一頁 下一頁 最後一頁 top