跳到主要內容

臺灣博碩士論文加值系統

(44.222.104.206) 您好!臺灣時間:2024/05/23 17:58
字體大小: 字級放大   字級縮小   預設字形  
回查詢結果 :::

詳目顯示

我願授權國圖
: 
twitterline
研究生:莊念婕
研究生(外文):CHUANG, NIEN-CHIEH
論文名稱:探討網路心理特徵與網路去抑制效應對分享行為之影響
論文名稱(外文):Exploring the Effects of Internet Psychological Characteristics and Toxic Disinhibition on Sharing Behavior
指導教授:莊育維莊育維引用關係
指導教授(外文):CHUANG, YU-WEI
口試委員:黃玉琴涂宏任
口試委員(外文):HUANG, YU-CHINTU, HUNG-JEN
口試日期:2019-06-18
學位類別:碩士
校院名稱:靜宜大學
系所名稱:資訊管理學系
學門:電算機學門
學類:電算機一般學類
論文種類:學術論文
論文出版年:2019
畢業學年度:107
語文別:中文
論文頁數:41
中文關鍵詞:網路心理特徵社會影響網路不良去抑制效應資訊分享謠言分享
外文關鍵詞:Internet Psychological CharacteristicsSocial InfluenceToxic DisinhibitionInformation SharingRumor Sharing
相關次數:
  • 被引用被引用:0
  • 點閱點閱:732
  • 評分評分:
  • 下載下載:0
  • 收藏至我的研究室書目清單書目收藏:0
隨著網路的快速傳播,網路平台也發展有別於一般臉書粉絲專頁不同的「匿名平台」,像是Dcard、PTT、巴哈姆特等,使用者透過匿名系統在平台上發表言論藉以紓發情緒,撰寫自己遇到的故事,也可以透過討論版觀看其他使用者的文章,在文章底下留言自己的想法,甚至也能使用匿名來認識其他使用者。
Dcard是台灣的匿名網路平台,創辦人為臺大學生林裕欽及簡勤佑,2011年,僅開放臺大、政大學生註冊,後來陸續開放其他大學及少部分的國外大學進行註冊,現在已經是超過百萬會員的大型論壇。Dcard最主要的就是社群功能,使用者可以藉由Dcard的網站或是App來透過瀏覽、發文、回應他人文章,討論區也依照內容不同分作不同討論版,在討論版上的任何行為皆為匿名制,可以知道發言者是什麼大學,但不會知道他的真實姓名,Dcard也規範使用者不能在文章或是留言透露個人資訊、任何形式之聯絡方式,也不能交換個人資料。還有一個特色是抽卡,使用者在每個午夜12時,會收到一張系統配對的匿名邀請卡,若有興趣與對方認識的話就可以送出交友邀請,收到交友邀請的人在當天午夜之前必須同意邀請,雙方才能成為朋友,一旦錯過之後,這兩位使用者便不會再收到或是抽到彼此的Dcard,很多人會透過抽卡,來認識其他使用者。
本研究針對曾經使用過Dcard匿名網路平台的使用者,透過網路問卷的方式回收資料並驗證本研究所提出的研究假說。有效問卷總計 498 份。研究結果發現:(1) 網路心理特徵(匿名性、去個性化、自我投入)對網路去抑制效應有正向顯著影響;(2)主觀規範、資訊影響對網路去抑制效應有正向顯著影響;(3)網路不良去抑制效應對資訊分享及謠言分享有正向顯著影響
現在匿名網路平台越來越盛行,透過本研究的研究結果,能發現部分網路心理特徵對網路不良去抑制效應有正向且顯著的影響,進而影響資訊分享的行為及謠言分享的行為,希冀本研究結果可供後續從事相關網路行為研究之參考。
With the rapid spread of the Internet, the Internet platform has also developed an "anonymous platform" that is different from the general Facebook fan pages, such as Dcard, PTT, Gamer, etc. Users also can use the anonymous system to express their opinions on the platform. By expressing your emotions and writing stories you have encountered, you can also view other users' articles through the discussion board, leave your own ideas under the article, and even use anonymous to know other users.
Dcard is an anonymous online platform in Taiwan. The founders are Taiwan University students Lin Yuqin and Jian Qinyou. In 2011, only National Taiwan University and National Chengchi University students were registered. Later, other universities and a few foreign universities also can register account on Dcard. Now, it is a large forum with over one million members.
The main function of Dcard is the community function. Users can browse, post, respond to other articles through Dcard's website or App. The discussion area is also divided into different discussion versions according to different content. Any behavior on the discussion board is for the anonymous system, you can know the university of the speaker, but you will not know his/her real name. Dcard also regulates that the user cannot disclose personal information, any form of contact information, or exchange personal information in articles or messages. Another feature is the draw card. The user will receive an anonymous invitation card for system matching at midnight. If you are interested in knowing the people, you can send a friend invitation. The person who receives the friend invitation is on the same day. Before midnight, you must agree to the invitation. Then the person and you will become friends. Once they are missed, the two users will not receive or draw each other's Dcard. Many people will know other users by drawing cards.
This study is aimed at users who have used the Dcard anonymous network platform to recover data through the online questionnaire and verify the research hypothesis proposed by the research. The total number of valid questionnaires was 498. The research results show that:(1)network psychological characteristics(anonymity, deindividuation, and solipsistic introjection) have positive and significant impacts on toxic disinhibition(2)subjective norm and information influence have positive and significant impacts on toxic disinhibition(3)toxic disinhibition has positive and significant impacts on information sharing and rumor sharing.
Nowadays, anonymous network platforms are becoming more and more popular. Through the results of this research, we can find that the some characteristics of the network have a significant impact on toxic disinhibition, which in turn affects the behavior of information sharing and the behavior of rumor sharing. The results of this study can be used as a reference for subsequent research on related network behaviors.
摘要 I
Abstract II
致謝 III
目錄 IV
表目錄 V
圖目錄 V
緒論 1
第一節 研究背景與動機 1
第二節 研究目的與預期貢獻 4
第三節 研究方法 4
第四節 研究範圍 4
第五節 研究流程 5
第六節 章節架構 6
第二章 文獻回顧 7
第一節 網路不良去抑制效應(Toxic Disinhibition) 7
第二節 網路特徵(Internet Psychological Characteristics) 9
第三節 社會影響(Social Influence) 12
第四節 分享行為(Sharing Behavior) 14
第三章 研究設計 15
第一節 觀念性架構 15
第二節 研究假設 16
第三節 各構面之衡量問項 20
第四章 實證分析 23
第一節 敘述性統計 23
第二節 測量模型之評估 26
第三節 結構模型之評估 30
第五章 結論 32
第一節 研究結果 32
第二節 研究貢獻 34
第三節 研究限制 34
參考文獻 35
Abdul, W. K., Gaur, S. S., & Peñaloza, L. N. (2012). The determinants of customer trust in buyer–seller relationships: An empirical investigation in rural India. Australasian Marketing Journal (AMJ), 20(4), 303-313.
Ajzen, I. (1991). The theory of planned behavior. Organizational behavior and human decision processes, 50(2), 179-211.
Allport, G. and Postman, L. (1947) The Psychology of Rumor. Holt, Rinehart and Winston, New York.
Alonzo, M., & Aiken, M. (2004). Flaming in electronic communication. Decision Support Systems, 36(3), 205-213.
Anderson, C. L., & Agarwal, R. (2010). Practicing safe computing: a multimedia empirical examination of home computer user security behavioral intentions. MIS quarterly, 34(3), 613-643.
Aoyama, I., Saxon, T. F., & Fearon, D. D. (2011). Internalizing problems among cyberbullying victims and moderator effects of friendship quality. Multicultural Education & Technology Journal, 5(2), 92-105.
Athiyaman, A. (2002). Internet users’ intention to purchase air travel online: an empirical investigation. Marketing intelligence & planning, 20(4), 234-242.
Barak, A., Hen, L., Boniel-Nissim, M., & Shapira, N. A. (2008). A comprehensive review and a meta-analysis of the effectiveness of internet-based psychotherapeutic interventions. Journal of Technology in Human services, 26(2-4), 109-160.
Bargh, J. A., & McKenna, K. Y. (2004). The Internet and social life. Annu. Rev. Psychol., 55, 573-590.
Bargh, J. A., McKenna, K. Y., & Fitzsimons, G. M. (2002). Can you see the real me? Activation and expression of the “true self” on the Internet. Journal of social issues, 58(1), 33-48.
Behavioral Intentions Model, Journal of International Business
Bordia, P., & DiFonzo, N. (2007). Rumor, gossip and urban legends. Diogenes, 54(1), 19-35.
Bordia, P., & DiFonzo, N. (2013). 10 Rumors during organizational change: a motivational analysis. The Psychology of Organizational Change: Viewing Change from the Employee’s Perspective, 232.
Brawley, A. M., & Pury, C. L. (2016). Work experiences on MTurk: Job satisfaction, turnover, and information sharing. Computers in Human Behavior, 54, 531-546.
Brown, K., Jackson, M., & Cassidy, W. (2006). Cyber-bullying: Developing policy to direct responses that are equitable and effective in addressing this special form of bullying. Canadian Journal of Educational Administration and Policy, 57, 1-36.
Burgess-Proctor, A., Patchin, J. W., & Hinduja, S. (2009). Cyberbullying and online harassment: Reconceptualizing the victimization of adolescent girls. Female crime victims: Reality reconsidered, 153-175.
Burgoon, J. K., Blair, J. P., & Strom, R. E. (2008). Cognitive biases and nonverbal cue availability in detecting deception. Human Communication Research, 34(4), 572-599.
Burnkrant, R. E., & Cousineau, A. (1975). Informational and normative social influence in buyer behavior. Journal of Consumer research, 2(3), 206-215.
Castellá, V. O., Abad, A. Z., Alonso, F. P., & Silla, J. P. (2000). The influence of familiarity among group members, group atmosphere and assertiveness on uninhibited behavior through three different communication media. Computers in Human Behavior, 16(2), 141-159.
Cestac, J., Paran, F., & Delhomme, P. (2011). Young drivers’ sensation seeking, subjective norms, and perceived behavioral control and their roles in predicting speeding intention: How risk-taking motivations evolve with gender and driving experience. Safety science, 49(3), 424-432.
Cestac, J., Paran, F., & Delhomme, P. (2011). Young drivers’ sensation seeking, subjective norms, and perceived behavioral control and their roles in predicting speeding intention: How risk-taking motivations evolve with gender and driving experience. Safety science, 49(3), 424-432.
Chan, M., Woon, I., & Kankanhalli, A. (2005). Perceptions of information security in the workplace: linking information security climate to compliant behavior. Journal of information privacy and security, 1(3), 18-41.
Chan, S. C. (2004). Understanding internet banking adoption and use behavior: A Hong Kong perspective. Journal of Global Information Management (JGIM), 12(3), 21-43.
Chang, A.-M., Aeschbach, D., Duffy, J. F., & Czeisler, C. A. (2014). Evening use of light-emitting eReaders negatively affects sleep, circadian timing, and next-morning alertness. Proceedings of the National Academy of Sciences, 112(4), 1232–1237.
Chang, C. H., Rosen, C. C., & Levy, P. E. (2009). The relationship between perceptions of organizational politics and employee attitudes, strain, and behavior: A meta-analytic examination. Academy of Management journal, 52(4), 779-801.
Chatterjee, A., Schroeder, F. C., Jurgenson, C. T., Ealick, S. E., & Begley, T. P. (2008). Biosynthesis of the thiamin-thiazole in eukaryotes: identification of a thiazole tautomer intermediate. Journal of the American Chemical Society, 130(34), 11394-11398.
Chesney, T., Chuah, S. H., & Hoffmann, R. (2009). Virtual world experimentation: An exploratory study. Journal of Economic Behavior & Organization, 72(1), 618-635.
Chester, A., & Bretherton, D. (2007). Impression management and identity online. The Oxford handbook of Internet psychology, 223-236.
Choi, J., & Geistfeld, L. V. (2004). A cross-cultural investigation of consumer e-shopping adoption. Journal of Economic Psychology, 25(6), 821-838.
Christopherson, K. M. (2007). The positive and negative implications of anonymity in Internet social interactions:“On the Internet, Nobody Knows You’re a Dog”. Computers in Human Behavior, 23(6), 3038-3056.
Clark, R. A., & Goldsmith, R. E. (2006). Global innovativeness and consumer susceptibility to interpersonal influence. Journal of Marketing Theory and Practice, 14(4), 275-285.
Collins, A. L., Lawrence, S. A., Troth, A. C., & Jordan, P. J. (2013). Group affective tone: A review and future research directions. Journal of Organizational Behavior, 34(S1), S43-S62.
Constant, D., Kiesler, S., & Sproull, L. (1994). What's mine is ours, or is it? A study of attitudes about information sharing. Information systems research, 5(4), 400-421.
Cox, M. (2012). Power shifts, economic change and the decline of the West?. International Relations, 26(4), 369-388.
Deutsch, M., & Gerard, H. B. (1955). A study of normative and informational social influences upon individual judgment. The journal of abnormal and social psychology, 51(3), 629.
Diener, E. (1976). Effects of prior destructive behavior, anonymity, and group presence on deindividuation and aggression. Journal of Personality and Social Psychology, 33(5), 497.
Diener, E. (1980). Deindividuation: The absence of self-awareness and self-regulation in group members. The psychology of group influence, 209242.
Dumont, G., & Candler, G. (2005). Virtual jungles: Survival, accountability, and governance in online communities. The American Review of Public Administration, 35(3), 287-299.
Feeley, T. H., & Young, M. J. (1998). Humans as lie detectors: Some more second thoughts. Communication quarterly, 46(2), 109-126.
Festinger, L., Pepitone, A., & Newcomb, T. (1952). Some consequences of de-individuation in a group. The Journal of Abnormal and Social Psychology, 47(2S), 382.
Fishbein, M., & Ajzen, I. (1975). Belief, Attitude, Intention, and Behavior: An Introduction to Theory and Research. Reading, MA: Addison-Wesley.
Fornell, C., & Larcker, D. F. (1981). Evaluating structural equation models with unobservable variables and measurement error. Journal of Marketing Research, 18(1), 39-50.
Fox, J., Cruz, C., & Lee, J. Y. (2015). Perpetuating online sexism offline: Anonymity, interactivity, and the effects of sexist hashtags on social media. Computers in Human Behavior, 52, 436-442.
Friedman, R. A., & Currall, S. C. (2003). Conflict escalation: Dispute exacerbating elements of e-mail communication. Human relations, 56(11), 1325-1347.
Fu, S., Han, Z., & Huo, B. (2017). Relational enablers of information sharing: evidence from Chinese food supply chains. Industrial Management & Data Systems, 117(5), 838-852.
Gerhart, N., & Koohikamali, M. (2019). Social network migration and anonymity expectations: What anonymous social network apps offer. Computers in Human Behavior, 95, 101-113.
Giles, C. (2006) “The public interest challenges for the communications sector over the next 10 years: Comtestable public service funding.” In E. Richards, R. Foster, and T. Kiedrowski(eds) Communications : the Next Decade. A Collection of Essays Prepared for the UK Office of Communication. London: Ofcom, pp. 101-111.
Gopi, M., & Ramayah, T. (2007). Applicability of theory of planned behavior in predicting intention to trade online: Some evidence from a developing country. International Journal of Emerging Markets, 2(4), 348-360.
Hair, J. F., Anderson, R. E., Tatham, R. L., & Black, W. C. (1992). Multivariate data analysis (3rd ed.). New York: Macmillan.
Hair, J. F., Anderson, R. E., Tatham, R. L., & Black, W. C. (1998) , Applied Multivariate Data Analysis , Upper Saddle River, NJ: Prentice Hall.
Han, G., Gupta, S. D., Gable, K., Niranjanakumari, S., Moitra, P., Eichler, F., ... & Dunn, T. M. (2009). Identification of small subunits of mammalian serine palmitoyltransferase that confer distinct acyl-CoA substrate specificities. Proceedings of the National Academy of Sciences, 106(20), 8186-8191.
Heide, J. B., & Miner, A. S. (1992). The shadow of the future: Effects of anticipated interaction and frequency of contact on buyer-seller cooperation. Academy of management journal, 35(2), 265-291.
Henningsen, M. L. M., Henningsen, D. D., Cruz, M. G., & Morrill, J. (2003). Social influence in groups: A comparative application of relational framing theory and the elaboration likelihood model of persuasion. Communication Monographs, 70(3), 175-197.
Herath, T., & Rao, H. R. (2009). Protection motivation and deterrence: a framework for security policy compliance in organisations. European Journal of Information Systems, 18(2), 106-125.
Hinduja, S., & Patchin, J. W. (2008). Cyberbullying: An exploratory analysis of factors related to offending and victimization. Deviant behavior, 29(2), 129-156.
Ho, C. I., & Lee, Y. L. (2007). The development of an e-travel service quality scale. Tourism Management, 28(6), 1434-1449.
Hollenbaugh, E. E., & Everett, M. K. (2013). The effects of anonymity on self-disclosure in blogs: An application of the online disinhibition effect. Journal of Computer-Mediated Communication, 18(3), 283-302.
Husarik, D. B., Gordic, S., Desbiolles, L., Krauss, B., Leschka, S., Wildermuth, S., & Alkadhi, H. (2015). Advanced virtual monoenergetic computed tomography of hyperattenuating and hypoattenuating liver lesions: ex-vivo and patient experience in various body sizes. Investigative radiology, 50(10), 695-702.
Jafarkarimi, H., Saadatdoost, R., Sim, A. T. H., & Hee, J. M. (2016). Behavioral intention in social networking sites ethical dilemmas: An extended model based on Theory of Planned Behavior. Computers in Human Behavior, 62, 545-561.
Jin, Z., Schwend, T., Fu, J., Bao, Z., Liang, J., Zhao, H., & Yang, J. (2016). Members of the Rusc protein family interact with Sufu and inhibit vertebrate Hedgehog signaling. Development, 143(21), 3944-3955.
Johnston, A. C., & Warkentin, M. (2010). Fear appeals and information security behaviors: an empirical study. MIS quarterly, 549-566.
Joinson, A. N. (1998). Causes and implications of disinhibited behavior on the Net. In J. Gackenbach (Ed.),Psychology of the Internet (pp. 43–60). New York: Academic Press.
Jöreskog, K. G., & Sörbom, D. (1993). LISREL 8: Structural equation modeling with the SIMPLIS command language. Scientific Software International.,
Kabay, M. E. (1998). Anonymity and pseudonymity in cyberspace: deindividuation, incivility and lawlessness versus freedom and privacy. In Paper presented at the Annual Conference of the European Institute for Computer Anti-virus Research (EICAR) (Vol. 16, p. 8).
Kaplan, M. F., & Miller, C. E. (1987). Group decision making and normative versus informational influence: Effects of type of issue and assigned decision rule. Journal of Personality and social psychology, 53(2), 306.
Kaplan, R., & Kaplan, S. (1989). The experience of nature: A psychological perspective. CUP Archive.
Kianto, A., Vanhala, M., & Heilmann, P. (2016). The impact of knowledge management on job satisfaction. Journal of Knowledge Management, 20(4), 621-636.
Kiesler, S., Siegel, J., & McGuire, T. W. (1984). Social psychological aspects of computer-mediated communication. American psychologist, 39(10), 1123.
Kiesler, S., Zubrow, D., Moses, A. M., & Geller, V. (1985). Affect in computer-mediated communication: An experiment in synchronous terminal-to-terminal discussion. Human-Computer Interaction, 1(1), 77-104.
Knapp, K. J., Marshall, T. E., Kelly Rainer, R., & Nelson Ford, F. (2006). Information security: management's effect on culture and policy. Information Management & Computer Security, 14(1), 24-36.
Kowalski, R. M., Limber, S. P., & Agatston, P. W. (2008). CYBER BULLYING. Malden: Blackwell.
Lapidot-Lefler, N., & Barak, A. (2012). Effects of anonymity, invisibility, and lack of eye-contact on toxic online disinhibition. Computers in human behavior, 28(2), 434-443.
Lea, M., & Spears, R. (1992). Paralanguage and social perception in computer‐mediated communication. Journal of Organizational Computing and Electronic Commerce, 2(3-4), 321-341.
Lee, C. and Green, R. T., Cross-Culture Examination of the Fishbein
Lee, M. K., Cheung, C. M., Sia, C. L., & Lim, K. H. (2006, January). How positive informational social influence affects consumers' decision of Internet shopping?. In Proceedings of the 39th Annual Hawaii International Conference on System Sciences (HICSS'06) (Vol. 6, pp. 115a-115a). IEEE.
Li, Chia-Ying, "Does Self-Efficacy Contribute to Knowledge Sharing and Innovation Effectiveness? A Multi-Level Perspective" (2013).
Lin, T. C., Wu, S., & Shih, J. F. (2017). Examining the antecedents of online disinhibition. Information Technology & People, 30(1), 189-209.
Machuletz, D., Sendt, H., Laube, S., & Böhme, R. (2016, July). Users protect their privacy if they can: Determinants of webcam covering behavior. In European Workshop on Usable Security (EuroUSEC).
Mahon, D., Cowan, C., & McCarthy, M. (2006). The role of attitudes, subjective norm, perceived control and habit in the consumption of ready meals and takeaways in Great Britain. Food Quality and Preference, 17(6), 474-481.
Martens, M., De Wolf, R., & De Marez, L. (2019). Investigating and comparing the predictors of the intention towards taking security measures against malware, scams and cybercrime in general., Computers in Human Behavior, 92, 139-150.
McKenna, K. Y., & Seidman, G. (2005). Social identity and the self: Getting connected online. From Cognitive Technology: Essays on the Transformation of Thought and Society.
Mouakket, S. (2015). Factors influencing continuance intention to use social network sites: The Facebook case. Computers in Human Behavior, 53, 102-110.
Muzellec, L., Lynn, T., Caemmerer, B., & Turley, D. (2017). Social network sites: early adopters’ personality and influence. Journal of Product & Brand Management, 26(1), 42–51. doi:10.1108/jpbm-10-2015-1025
Park, C. W., & Lessig, V. P. (1977). Students and housewives: Differences in susceptibility to reference group influence. Journal of consumer Research, 4(2), 102-110.
Park, N., & Lee, S. (2014). College students' motivations for Facebook use and psychological outcomes. Journal of Broadcasting & Electronic Media, 58(4), 601-620.
Postmes, T., & Spears, R. (1998). Deindividuation and antinormative behavior: A meta-analysis. Psychological bulletin, 123(3), 238.
Ramayah, T., Jantan, M. and Bushra, A. (2003). Internet usage among students of institutions of higher learning: The role of motivational variables. The Proceedings of the 1st International Conference on Asian Academy of Applied Business Conference, Sabah, Malaysia, 10–12 July.
Ramayah, T., Ling, C. Y., Suki, N. M., & Ibrahim, A. (2005). Determinants of intention to use an online bill payment system among MBA students. E-business, (9), 80-91.
Ramayah, T., Nasurdin, A. M., Noor, M. N. M., & Beng, L. S. (2002). THE RELATIONSHIPS BETWEEN BELIEF, ATTITUDE, SUBJECTIVE NORM, INTENTION, AND BEHAVIOR TOWARDS NUMBERS GAMBLING: THE MALAYSIAN CONTEXT. JURNAL BISNIS STRATEGI, 10(7), 81-95.
Ramayah, T., Noor, M.N.M., Nasurdin, A.M. and Sin, Q.B. (2004), “The relationships between belief, attitude, subjective norm, intention, and behavior towards infant food formula selection: the views of the Malaysian mothers”, Gadjah Mada International Journal of Business, Vol. 6 No. 3, pp. 405‐18.
Ramayah, T., Rouibah, K., Gopi, M., & Rangel, G. J. (2009). A decomposed theory of reasoned action to explain intention to use Internet stock trading among Malaysian investors. Computers in Human Behavior, 25(6), 1222-1230.
Reinig, B. A., Briggs, R. O., & Nunamaker Jr, J. F. (1997). Flaming in the electronic classroom. Journal of Management Information Systems, 14(3), 45-59.
Rich, B. L., Lepine, J. A., & Crawford, E. R. (2010). Job engagement: Antecedents and effects on job performance. Academy of management journal, 53(3), 617-635.
Rivis, A., & Sheeran, P. (2003). Social influences and the theory of planned behaviour: Evidence for a direct relationship between prototypes and young people's exercise behaviour. Psychology and Health, 18(5), 567-583.
Schumann, S., Klein, O., Douglas, K., & Hewstone, M. (2017). When is computer-mediated intergroup contact most promising? Examining the effect of out-group members' anonymity on prejudice. Computers in human behavior, 77, 198-210.
Seçkin, G. (2010). Cyber patients surfing the medical web : Computer-mediate knowledge and perceived benefits. Computers in Human Behavior, 26(6), 1694-1700.
Spears, R., & Lea, M. (1992). Social influence and the influence of the'social'in computer-mediated communication. Harvester Wheatsheaf.
Spears, R., Lea, M., & Postmes, T. (2007). Computer-mediated communication and social identity. The Oxford handbook of internet psychology, 253-269.
Spears, R., Postmes, T., Lea, M., & Wolbert, A. (2002). When are net effects gross products? Communication. Journal of Social Issues, 58(1), 91-107.
Spreng, R. A., & Page Jr, T. J. (2001). The impact of confidence in expectations on consumer satisfaction. Psychology & Marketing, 18(11), 1187-1204.
Sproull, L., & Kiesler, S. (1986) Reducing Social Context Cues: Electronic Mail in Organizational Communication. Management Science, 32, 1492-1512. Studies, 1991, Vol. 2, pp.289-305.
Suler, J. (2004). The online disinhibition effect. Cyberpsychology & behavior, 7(3), 321-326.
Suler, J. (2005). The online disinhibition effect. International Journal of Applied Psychoanalytic Studies, 2(2), 184-188.
Suler, J. R., & Phillips, W. L. (1998). The bad boys of cyberspace: Deviant behavior in a multimedia chat community. CyberPsychology & Behavior, 1(3), 275-294.
Sun, Y., Jiang, H., Hwang, Y., & Shin, D. (2018). Why should I share? An answer from personal information management and organizational citizenship behavior perspectives. Computers in Human Behavior, 87, 146-154.
Tanis, M., & Postmes, T. (2007). Two faces of anonymity: Paradoxical effects of cues to identity in CMC. Computers in Human Behavior, 23(2), 955-970.
Taylor, S., & Todd, P. A. (1995). Understanding information technology usage: A test of competing models. Information Systems Research, 6(2), 145-176.
Thompson, P. (2006). Patent citations and the geography of knowledge spillovers: evidence from inventor-and examiner-added citations. The Review of Economics and Statistics, 88(2), 383-388.
Trafimow, D., & Finlay, K. A. (1996). The importance of subjective norms for a minority of people: Between subjects and within-subjects analyses. Personality and social psychology bulletin, 22(8), 820-828.
Tremblay, M., Landreville, J. (2015). Information sharing and citizenship behaviors: Mediating role of empowerment, procedural justice and perceived organizational support. Journal of Business Communication, 52(4), 347-368. Nominated for the best article of the year.
Udris, R. (2014). Cyberbullying among high school students in Japan: Development and validation of the Online Disinhibition Scale. Computers in Human Behavior, 41, 253-261.
Valkenburg, P. M., Schouten, A. P., & Peter, J. (2005). Adolescents’ identity experiments on the Internet. New media & society, 7(3), 383-402.
Venkatesh, V., & Brown, S. A. (2001). A longitudinal investigation of personal computers in homes: adoption determinants and emerging challenges. MIS quarterly, 71-102.
Venkatesh, V., & Davis, F. D. (2000). A theoretical extension of the technology acceptance model: Four longitudinal field studies. Management Science, 46, 186-204.
Waheed, K., Staszewski, R. B., Rezeq, S. S., & Eliezer, O. E. (2012). U.S. Patent No. 8,195,103. Washington, DC: U.S. Patent and Trademark Office.
White, F. A., Harvey, L. J., & Abu-Rayya, H. M. (2015). Improving intergroup relations in the Internet age: A critical review. Review of General Psychology, 19(2), 129-139.
Yoon, C., Hwang, J. W., & Kim, R. (2012). Exploring factors that influence students' behaviors in information security. Journal of Information Systems Education, 23(4), 407-415.
Yu, T. K., Lu, L. C., & Liu, T. F. (2010). Exploring factors that influence knowledge sharing behavior via weblogs. Computers in human behavior, 26(1), 32-41.
Zhang Y., Xiao L., Zhou H., Xu J., Du X., Dong G. (2016). Brain activity toward gaming-related cues in Internet gaming disorder during an addiction stroop task. Front. Psychol. 7:714 10.3389/fpsyg.2016.00714
Zimbardo, P. G. (1969). The human choice: Individuation, reason, and order versus deindividuation, impulse, and chaos. In W. D. Arnold & D. Levine (Eds.), Nebraska Symposium on Motivation, (pp. 237-307). Lincoln: University of Nebraska.
Zuckerman, M., DePaulo, B. M., & Rosenthal, R. (1981). Verbal and nonverbal communication of deception. In L. Berkowitz (Ed.), Advances in experimental social psychology (Vol. 14, pp. 1–59). New York: Academic Press.
電子全文 電子全文(網際網路公開日期:20240702)
QRCODE
 
 
 
 
 
                                                                                                                                                                                                                                                                                                                                                                                                               
第一頁 上一頁 下一頁 最後一頁 top
無相關期刊