Responsive image
博碩士論文 etd-0616121-205252 詳細資訊
Title page for etd-0616121-205252
論文名稱
Title
影響隱私揭露意圖之研究-以心理契約違反理論、隱私揭露與 App 價值為核心來探討
Factors Affecting the Intent to Disclose Privacy - Focus on Psychological Contract Breach,Privacy Disclosure and App value
系所名稱
Department
畢業學年期
Year, semester
語文別
Language
學位類別
Degree
頁數
Number of pages
66
研究生
Author
指導教授
Advisor
召集委員
Convenor
口試委員
Advisory Committee
口試日期
Date of Exam
2021-06-22
繳交日期
Date of Submission
2021-07-16
關鍵字
Keywords
心理契約違背、隱私揭露顧慮、感知有益、隱私揭露意圖、權限相關性
Psychological Contract Breach, Privacy Disclosure Concerns, Perceived Benefits, Privacy Disclosure Intention, Permission Relevance
統計
Statistics
本論文已被瀏覽 243 次,被下載 0
The thesis/dissertation has been browsed 243 times, has been downloaded 0 times.
中文摘要
當行動裝置越來越普及之際,每天每個人花在行動裝置上的時間增加,對於行動 裝置上的應用程式依賴度也提高。然而應用程式供應商在提供服務的時候,被指控 恣意使用使用者行動裝置上其他不相關的隱私內容,而侵害了使用者的隱私權。故 本研究欲探討影響使用者揭露隱私意圖的主要影響構面與因素。
本研究借用心理契約違背理論的構面探討對於應用程式供應商的不信任的因素。 另外也會對於使用者隱私揭露顧慮(privacy disclosure concern)面的資訊敏感度 (information sensitivity)與權限相關性(permission relevance)來分析其對使用者揭露意 圖的影響。最後也將從應用程式的面向做討論,分析應用程式的功利(utilitarian)價 值及享樂(hedonic)價值的高低,是否會負向調節上述因素對使用者下載及揭露意圖 的影響。本研究從不同角度探討隱私揭露的意圖且將應用程式供應商納入探討,更 有助於了解使用者隱私揭露隱私的意圖。
本研究共回收 409 份有效樣本,研究結果發現對於應用程式供應商的不信任、應 用程式的感知有益及權限相關性對於隱私揭露意圖都有顯著影響。
Abstract
As mobile devices become more and more popular, the time that everyone spends on mobile devices everyday increases, and their dependence on applications on mobile devices also increases. However, when the application provider provides services, it is accused of arbitrarily using other irrelevant privacy content on the user's mobile device, which violates the user's privacy. Therefore, this study intends to explore the main influencing dimensions and factors that will influence users to reveal their privacy intentions.
This study using the dimension of psychological contract breach theory to explore the factors of distrust in application provider. In addition, the information sensitivity and permission relevance of the privacy disclosure concern of the user will be analyzed how its impact on the user's disclosure intention. Finally, this study will discuss the application aspect to analyze whether the application's utilitarian value and hedonic value will negatively moderate the influence of the above factors. This study explores intention of privacy disclosure from different angles and includes application providers, which is more helpful to understand the intention of privacy disclosure.
This study collected 409 valid samples from the online community to validate this research model. The results support the inferences we made. Distrust in application provider, perceived benefits, and the relevance of permission all have a significant impact on intent to disclose privacy information.
目次 Table of Contents
論文審定書 i
誌謝 ii
摘要 iii
Abstract iv
目錄 v
圖次 vii
表次 viii
第一章 緒論 1
第一節 研究背景 1
第二節 研究動機 2
第三節 研究目的與問題 4
第二章 文獻探討 5
第一節 使用者對供應商的相信程度:心理契約違背理論(Psychological Contract Breach Theory) 5
第二節 隱私(Privacy)與資訊隱私(Information Privacy) 7
第三節 信任(Trust) 9
第四節 應用程式的價值高低:感知有益(Perceived Benefits)與自我決定理論(Self-determination theory) 10
第五節 資訊敏感性(Information Sensitivity) 12
第六節 權限相關性(Permission Relevance) 13
第三章 研究模型與假說 15
第一節 研究模型 15
第二節 研究假說 16
第三節 操作型定義 25
第四節 研究方法 26
第四章 資料分析與討論 27
第一節 資料搜集與使用工具 27
第二節 樣本資料統計 27
第三節 衡量模型 28
第四節 結構模型與假說檢定 37
第五節 討論(Discussion) 40
第五章 結論 43
第一節 小結 43
第二節 學術貢獻 44
第三節 實務意涵 44
第四節 研究限制與未來研究方向 45
參考文獻 46
附錄:研究問卷 52
參考文獻 References
Aguirre, E., Mahr, D., Grewal, D., De Ruyter, K., & Wetzels, M. (2015). Unraveling the personalization paradox: The effect of information collection and trust-building strategies on online advertisement effectiveness. Journal of Retailing, 91(1), 34-49.
Al-Debei, M. M., Akroush, M. N., & Ashouri, M. I. (2015). Consumer attitudes towards online shopping: the effects of trust, perceived benefits, and perceived web quality. Internet Research.
Angst, C. M., & Agarwal, R. (2009). Adoption of electronic health records in the presence of privacy concerns: The elaboration likelihood model and individual persuasion. MIS quarterly, 33(2), 339-370.
Balapour, A., Reychav, I., Sabherwal, R., & Azuri, J. (2019). Mobile technology identity and self-efficacy: Implications for the adoption of clinically supported mobile health apps. International Journal of Information Management, 49, 58-68.
Balapour, A., & Sabherwal, R. (2017). Usability of apps and websites: a meta-regression study.
Bansal, G., & Gefen, D. (2010). The impact of personal dispositions on information sensitivity, privacy concern and trust in disclosing health information online. Decision support systems, 49(2), 138-150.
Barth, S., & De Jong, M. D. (2017). The privacy paradox–Investigating discrepancies between expressed privacy concerns and actual online behavior–A systematic literature review. Telematics and informatics, 34(7), 1038-1058.
Bélanger, F., & Crossler, R. E. (2011). Privacy in the digital age: a review of information privacy research in information systems. MIS quarterly, 1017-1041.
Bélanger, F., & Crossler, R. E. (2019). Dealing with digital traces: Understanding protective behaviors on mobile devices. The journal of strategic Information Systems, 28(1), 34-49.
Belanger, F., Hiller, J. S., & Smith, W. J. (2002). Trustworthiness in electronic commerce: the role of privacy, security, and site attributes. The journal of strategic Information Systems, 11(3-4), 245-270.
Bicchieri, C., Duffy, J., & Tolle, G. (2004). Trust among strangers. Philosophy of Science, 71(3), 286-319.
Boehmer, J., LaRose, R., Rifon, N., Alhabash, S., & Cotten, S. (2015). Determinants of online safety behaviour: Towards an intervention strategy for college students. Behaviour & Information Technology, 34(10), 1022-1035.
Buck, C., Horbel, C., Kessler, T., & Christian, C. (2014). Mobile consumer apps: Big data brother is watching you. Marketing Review St. Gallen, 31(1), 26-35.
Cavusoglu, H., Phan, T. Q., Cavusoglu, H., & Airoldi, E. M. (2016). Assessing the impact of granular privacy controls on content sharing and disclosure on Facebook. Information systems research, 27(4), 848-879.
Chen, K.-Y. (2015). Understanding the factors of LBS app downloads as a privacy calculus.
Childers, T. L., Carr, C. L., Peck, J., & Carson, S. (2001). Hedonic and utilitarian motivations for online retail shopping behavior. Journal of Retailing, 77(4), 511-535.
Conway, N., & Briner, R. B. (2005). Understanding psychological contracts at work: A critical evaluation of theory and research: Oxford University Press.
Coyle‐Shapiro, J., & Kessler, I. (2000). Consequences of the psychological contract for the employment relationship: A large scale survey. Journal of management studies, 37(7), 903-930.
Coyle‐Shapiro, J. A. M. (2002). A psychological contract perspective on organizational citizenship behavior. Journal of Organizational Behavior: The International Journal of Industrial, Occupational and Organizational Psychology and Behavior, 23(8), 927-946.
Cranor, L. F., Reagle, J., & Ackerman, M. S. (2000). Beyond concern: Understanding net users’ attitudes about online privacy. The Internet upheaval: raising questions, seeking answers in communications policy, 47-70.
Delafrooz, N., Paim, L. H., & Khatibi, A. (2011). Understanding consumers internet purchase intention in Malaysia. African Journal of Business Management, 5(7), 2837-2846.
Dinev, T., & Hart, P. (2006). An extended privacy calculus model for e-commerce transactions. Information systems research, 17(1), 61-80.
Dinev, T., Xu, H., Smith, J. H., & Hart, P. (2013). Information privacy and correlates: an empirical attempt to bridge and distinguish privacy-related concepts. European Journal of Information Systems, 22(3), 295-316.
Eastin, M. S. (2002). Diffusion of e-commerce: an analysis of the adoption of four e-commerce activities. Telematics and informatics, 19(3), 251-267.
Fornell, C., & Larcker, D. F. (1981). Structural equation models with unobservable variables and measurement error: Algebra and statistics. In: Sage Publications Sage CA: Los Angeles, CA.
Grazioli, S., & Jarvenpaa, S. L. (2000). Perils of Internet fraud: An empirical investigation of deception and trust with experienced Internet consumers. IEEE Transactions on Systems, Man, and Cybernetics-Part A: Systems and Humans, 30(4), 395-410.
Griffin, D. W., & Ross, L. (1991). Subjective construal, social inference, and human misunderstanding. In Advances in experimental social psychology (Vol. 24, pp. 319-359): Elsevier.
Grover, V., Cheon, M. J., & Teng, J. T. (1994). A descriptive study on the outsourcing of information systems functions. Information & Management, 27(1), 33-44.
Gu, J., Xu, Y. C., Xu, H., Zhang, C., & Ling, H. (2017). Privacy concerns for mobile app download: An elaboration likelihood model perspective. Decision support systems, 94, 19-28.
Harris, M. A., Brookshire, R., & Chin, A. G. (2016). Identifying factors influencing consumers’ intent to install mobile applications. International Journal of Information Management, 36(3), 441-450.
Harrison McKnight, D., Choudhury, V., & Kacmar, C. (2002). The impact of initial consumer trust on intentions to transact with a web site: a trust building model. The journal of strategic Information Systems, 11(3), 297-323. doi:https://doi.org/10.1016/S0963-8687(02)00020-3
Hoffman, D. L., Novak, T. P., & Peralta, M. (1999). Building consumer trust online. Communications of the ACM, 42(4), 80-85.
Hsu, C.-L., & Lin, J. C.-C. (2008). Acceptance of blog usage: The roles of technology acceptance, social influence and knowledge sharing motivation. Information & Management, 45(1), 65-74.
Kang, J. (1997). Information privacy in cyberspace transactions. Stan. L. Rev., 50, 1193.
Kim, D., Park, K., Park, Y., & Ahn, J.-H. (2019). Willingness to provide personal information: Perspective of privacy calculus in IoT services. Computers in Human Behavior, 92, 273-281.
Kim, D. J., Ferrin, D. L., & Rao, H. R. (2008). A trust-based consumer decision-making model in electronic commerce: The role of trust, perceived risk, and their antecedents. Decision support systems, 44(2), 544-564.
Kozlowska, I. (2018). Facebook and data privacy in the age of Cambridge Analytica. Seattle, WA: The University of Washington. Retrieved August, 1, 2019.
Kumar, N. (1996). The power of trust in manufacturer-retailer relationships. Harvard business review, 74(6), 92.
Lee, T. I., Rinaldi, N. J., Robert, F., Odom, D. T., Bar-Joseph, Z., Gerber, G. K., . . . Simon, I. (2002). Transcriptional regulatory networks in Saccharomyces cerevisiae. science, 298(5594), 799-804.
Levenson, H. (2018). 7 common reasons users are abandoning your app. In: Web Analytics World.
Li, H., Sarathy, R., & Xu, H. (2010). Understanding situational online information disclosure as a privacy calculus. Journal of Computer Information Systems, 51(1), 62-71.
Lin, T.-C., Huang, S.-L., & Chiang, S.-C. (2018). User resistance to the implementation of information systems: A psychological contract breach perspective. Journal of the Association for Information Systems, 19(4), 2.
Liu, M. T., Chu, R., Wong, I. A., Zúñiga, M. A., Meng, Y., & Pang, C. (2012). Exploring the relationship among affective loyalty, perceived benefits, attitude, and intention to use co‐branded products. Asia Pacific Journal of Marketing and Logistics.
Lu, Y., Tan, B. C., & Hui, K. L. (2004). Inducing consumers to disclose personal information to internet businesses with social adjustment benefits. Paper presented at the International Conference on Information Systems (ICIS), Washington DC, USA.
Lucero, M. A., & Allen, R. E. (1994). Employee benefits: A growing source of psychological contract violations. Human Resource Management, 33(3), 425-446.
Malhotra, N. K., Kim, S. S., & Agarwal, J. (2004). Internet users' information privacy concerns (IUIPC): The construct, the scale, and a causal model. Information systems research, 15(4), 336-355.
McKnight, D. H., Choudhury, V., & Kacmar, C. (2002). The impact of initial consumer trust on intentions to transact with a web site: a trust building model. The journal of strategic Information Systems, 11(3-4), 297-323.
Morrison, E. W., & Robinson, S. L. (1997). When employees feel betrayed: A model of how psychological contract violation develops. Academy of management Review, 22(1), 226-256.
Narayanan, M., Koo, B., & Cozzarin, B. P. (2012). Fear of fraud and Internet purchasing. Applied Economics Letters, 19(16), 1615-1619.
Neyaz, A., Kumar, A., Krishnan, S., Placker, J., & Liu, Q. (2020). Security, privacy and steganographic analysis of FaceApp and TikTok. International Journal of Computer Science and Security, 14(2), 38-59.
Parks, J. M., & Kidder, D. L. (1994). " Till death us do part..." Changing work relationships in the 1990s. Journal of Organizational Behavior (1986-1998), 111.
Parks, J. M., & Schmedemann, D. A. (1994). When promises become contracts: Implied contracts and handbook provisions on job security. Human Resource Management, 33(3), 403-423.
Pavlou, P. A., & Gefen, D. (2005). Psychological contract violation in online marketplaces: Antecedents, consequences, and moderating role. Information systems research, 16(4), 372-399.
Phelps, J., Nowak, G., & Ferrell, E. (2000). Privacy concerns and consumer willingness to provide personal information. Journal of public policy & marketing, 19(1), 27-41.
Robinson, S. L., Kraatz, M. S., & Rousseau, D. M. (1994). Changing obligations and the psychological contract: A longitudinal study. Academy of management Journal, 37(1), 137-152.
Robinson, S. L., & Morrison, E. W. (1995). Psychological contracts and OCB: The effect of unfulfilled obligations on civic virtue behavior. Journal of organizational behavior, 16(3), 289-298.
Robinson, S. L., & Wolfe Morrison, E. (2000). The development of psychological contract breach and violation: A longitudinal study. Journal of organizational behavior, 21(5), 525-546.
Rousseau, D. M. (1989). Psychological and implied contracts in organizations. Employee responsibilities and rights journal, 2(2), 121-139.
Rousseau, D. M. (1995). Promises in action: Psychological contracts in organizations. In: Newbury Park, CA: Sage.
Rousseau, D. M., & McLean Parks, J. (1993). The contracts of individuals and organizations. Research in organizational behavior, 15, 1-1.
Rowan, M., & Dehlinger, J. (2014). Observed gender differences in privacy concerns and behaviors of mobile device end users. Procedia Computer Science, 37, 340-347.
Ryan, R. M., & Deci, E. L. (2000). Self-determination theory and the facilitation of intrinsic motivation, social development, and well-being. American psychologist, 55(1), 68.
Shah, M. H., Peikari, H. R., & Yasin, N. M. (2014). The determinants of individuals’ perceived e-security: Evidence from Malaysia. International Journal of Information Management, 34(1), 48-57.
Shang, R.-A., Chen, Y.-C., & Shen, L. (2005). Extrinsic versus intrinsic motivations for consumers to shop on-line. Information & Management, 42(3), 401-413.
Sipior, J. C., Ward, B. T., & Volonino, L. (2014). Privacy concerns associated with smartphone use. Journal of Internet Commerce, 13(3-4), 177-193.
Strahilevitz, M. (1999). The effects of product type and donation magnitude on willingness to pay more for a charity-linked brand. Journal of consumer psychology, 8(3), 215-241.
Teo, T. S., Lim, V. K., & Lai, R. Y. (1999). Intrinsic and extrinsic motivation in Internet usage. Omega, 27(1), 25-37.
Turnley, W. H., & Feldman, D. C. (2000). Re‐examining the effects of psychological contract violations: unmet expectations and job dissatisfaction as mediators. Journal of organizational behavior, 21(1), 25-42.
Van Dijck, J. (2014). Datafication, dataism and dataveillance: Big Data between scientific paradigm and ideology. Surveillance & society, 12(2), 197-208.
Van Maanen, J. (1979). The fact of fiction in organizational ethnography. Administrative science quarterly, 24(4), 539-550.
Warren, S. D., & Brandeis, L. D. (1890). The right to privacy. Harvard law review, 193-220.
Wottrich, V. M., van Reijmersdal, E. A., & Smit, E. G. (2019). App users unwittingly in the spotlight: A model of privacy protection in mobile apps. Journal of Consumer Affairs, 53(3), 1056-1083.
Wu, J., & Lu, X. (2013). Effects of extrinsic and intrinsic motivators on using utilitarian, hedonic, and dual-purposed information systems: A meta-analysis. Journal of the Association for Information Systems, 14(3), 1.
Zhao, H., Wayne, S. J., Glibkowski, B. C., & Bravo, J. (2007). The impact of psychological contract breach on work‐related outcomes: a meta‐analysis. Personnel psychology, 60(3), 647-680.
Zhou, L., Dai, L., & Zhang, D. (2007). Online shopping acceptance model-A critical survey of consumer factors in online shopping. Journal of Electronic Commerce Research, 8(1), 41.
電子全文 Fulltext
本電子全文僅授權使用者為學術研究之目的,進行個人非營利性質之檢索、閱讀、列印。請遵守中華民國著作權法之相關規定,切勿任意重製、散佈、改作、轉貼、播送,以免觸法。
論文使用權限 Thesis access permission:自定論文開放時間 user define
開放時間 Available:
校內 Campus:開放下載的時間 available 2024-07-16
校外 Off-campus:開放下載的時間 available 2024-07-16

您的 IP(校外) 位址是 3.140.185.170
現在時間是 2024-04-28
論文校外開放下載的時間是 2024-07-16

Your IP address is 3.140.185.170
The current date is 2024-04-28
This thesis will be available to you on 2024-07-16.

紙本論文 Printed copies
紙本論文的公開資訊在102學年度以後相對較為完整。如果需要查詢101學年度以前的紙本論文公開資訊,請聯繫圖資處紙本論文服務櫃台。如有不便之處敬請見諒。
開放時間 available 2024-07-16

QR Code