Responsive image
博碩士論文 etd-0726122-155352 詳細資訊
Title page for etd-0726122-155352
論文名稱
Title
個人文化價值觀對隱私顧慮及物聯網使用意圖因果探討
The Effect of Cultural Value of Individual on Privacy Concern and Intentions to Use IoT Things
系所名稱
Department
畢業學年期
Year, semester
語文別
Language
學位類別
Degree
頁數
Number of pages
59
研究生
Author
指導教授
Advisor
召集委員
Convenor
口試委員
Advisory Committee
口試日期
Date of Exam
2022-07-08
繳交日期
Date of Submission
2022-08-26
關鍵字
Keywords
隱私、文化、資訊隱私顧慮、物聯網、隱私計算、使用意圖
Privacy, Culture, Information Privacy Concern, Internet of Things(IoT), Privacy Calculus, Intention to Use
統計
Statistics
本論文已被瀏覽 354 次,被下載 0
The thesis/dissertation has been browsed 354 times, has been downloaded 0 times.
中文摘要
文化在隱私的研究中仍然是不明朗的,更不用說先前的文獻大多是以國家層面的文化特色來衡量,而本研究旨在將國家量化至個人層面,並且將過去文獻中的隱私理論與隱私模型套用至物聯網環境之中,並詴圖探討使用者在個人文化價值觀中,有哪些價值觀可能會影響到資訊隱私顧慮;而在資訊隱私的部分亦衡量了在物聯網使用情境中的資訊隱私顧慮(Privacy Concern)、隱私控制(Privacy Control)、信任(Trust)與使用意圖(Interntion to Use)。
本研究透過問卷調查法,總共回收了 243 份有效問卷,並使用 SmartPLS 3.0 統計軟體進行資料分析,而本研究所得之結果為:(1)「信任」正向影響「使用意圖」,(2)「隱私控制」正向影響「信任」,(3)「資訊隱私顧慮」負向影響「隱私控制」,(4)「模糊不容忍」、「性別帄等」、「遠見」正向影響「隱私顧慮」。
本研究希望透過文化的隱私研究彌補研究缺口,並且能讓成果在理論面、實務面都能夠被應用,期望能夠讓廠商在進行行銷活動時能夠有消費者行為作為依據,並且透過提升使用者信任而讓其更願意使用物聯網產品,雖然文化的價值觀並不是能夠被輕易改變的,但是仍然能夠透過鎖定目標特質的客群進行行銷,綜合以上,本研究雖然仍有限制,但是在該領域的研究理應做出一定貢獻。
Abstract
The role of culture in privacy related research is still unclear nowadays. Besides, many previous researches use features at the country level to measure cultural dimensions. This study aims to measure cultural values of individuals, and applies privacy theories and models to IoT using situations. Also, this paper tries to discuss
which of the individual cultural values may affect user’s information privacy concern. In the part of information privacy, this paper has measured some of the privacy constructs, such as Privacy Concern, Privacy Control, Trust and Intention to Use.
In this study, 243 valid questionnaires were retrieved, and we used the software SmartPLS 3.0 for data analysis. The result shows that: (1) Trust was positively related to Intention to Use. (2) Privacy Control was positively related to Trust. (3)Privacy Concern was negatively related to Privacy Control. (4) Ambiguous, Gender Equality and
Prudence were positively related to Privacy Concern.This study tries to fill up the existing gap of cultural privacy research, and being applied in both aspects of theory and practice. When a manufacturer conducts marketing activities in accordance with the consumer behaviors, it will have some indicators to make consumers more likely to use their IoT products like building trust of users.
Although a person’s value of culture seems hard to change, the manufacturers can still target some certain characteristics to conduct marketing strategies. In summary, this study still has some research limitations though, it still makes some contributions in the research of this area.
目次 Table of Contents
論文審定書 i
摘要 ii
Abstract iii
目錄 iv
圖次 vi
表次 vii
第一章 緒論 1
第一節 研究背景 1
第二節 研究動機 2
第三節 研究問題與目的 3
第二章 文獻探討 5
第一節 隱私與隱私顧慮 5
一、資訊隱私 5
二、資訊隱私顧慮 6
第二節 物聯網 8
一、物聯網 8
二、物聯網對隱私的威脅 9
第三節 Piyush Sharma 個人文化傾向量表 10
第三章 研究方法 14
第一節 研究模型 14
第二節 研究假說 15
一、信任 15
二、隱私控制 15
三、隱私顧慮 15
四、文化傾向 16
第三節 操作型定義 18
第四節 研究設計 19
一、研究對象 19
二、問卷設計 19
三、資料蒐集 23
第四章 資料分析 24
第一節 樣本敘述型統計分析 24
第二節 測量模型 26
一、信度分析(Reliability) 26
二、收斂效度與區別(Convergent Validity and Discriminant Validity) 27
三、共線性分析(Multicollinearity) 29
第三節 結構模型及假說檢驗 30
第五章 結論與建議 33
第一節 研究結果討論 33
第二節 研究貢獻 37
一、理論面 37
二、實務面 38
第三節 研究限制與未來研究方向 38
參考文獻 41
附錄 本研究正式問卷46
參考文獻 References
1. Bélanger, F., & Crossler, R. E. (2011). Privacy in the Digital Age: A Review of Information Privacy Research in Information Systems. MIS Quarterly, 35(4), 1017–1041.

2. Hofstede, G. (2011). Dimensionalizing cultures: The Hofstede model in context. Online readings in psychology and culture, 2(1), 2307-0919.

3. Sharma, P. (2010). Measuring personal cultural orientations: Scale development and validation. Journal of the Academy of Marketing Science, 38(6), 787-806.

4. Smith, H. J., Milberg, S. J., & Burke, S. J. (1996). Information privacy: Measuring individuals' concerns about organizational practices. MIS quarterly, 167-196.

5. Caron, X., Bosua, R., Maynard, S. B., & Ahmad, A. (2016). The Internet of Things (IoT) and its impact on individual privacy: An Australian perspective. Computer law & security review, 32(1), 4-15.

6. Atlam, H. F., & Wills, G. B. (2020). IoT security, privacy, safety and ethics. In Digital twin technologies and smart cities (pp. 123-149). Springer, Cham.

7. Bond, Michael. (1988). Finding Universal Dimensions of Individual Variation in Multicultural Studies of Values: The Rokeach and Chinese Value Surveys. Journal of Personality and Social Psychology. 55. 1009-1015. 10.1037//0022-3514.55.6.1009.

8. Oyserman, D., Coon, H. M., & Kemmelmeier, M. (2002). Rethinking individualism and collectivism: evaluation of theoretical assumptions and meta-analyses. Psychological bulletin, 128(1), 3.

9. Blodgett, J. G., Bakir, A., & Rose, G. M. (2008). A test of the validity of Hofstede's cultural framework. Journal of consumer marketing.

10. Bearden, William & Money, R. & Nevins Henson, Jennifer. (2006). A Measure of Long-Term Orientation: Development and Validation. Journal of The Academy of Marketing Science - J ACAD MARK SCI. 34. 456-467. 10.1177/0092070306286706.

11. Markus, H. R., & Kitayama, S. (1991). Culture and the self: Implications for cognition, emotion, and motivation. Psychological review, 98(2), 224.

12. Bhattacherjee, A., & Premkumar, G., 2004, “Understanding changes in belief and attitude toward information technology usage: a theoretical model and longitudinal test”, MIS Quarterly, Vol. 28, No. 2, 229-254.

13. Ganesan, S., “Determinants of Long-Term Orientation in Buyer-Seller Relationships”, Journal of Marketing, Vol. 58, No. 2, 1994, pp. 1-19.

14. Kim, D. J. (2008). Self-Perception-Based versus Transference-Based Trust Determinants in Computer-Mediated Transactions: A Cross-Cultural Comparison Study. Journal of Management Information Systems, 24(4), 13–45. http://www.jstor.org/stable/40398910

15. Benamati, J. H., Ozdemir, Z. D., & Smith, H. J. (2021). Information Privacy, Cultural Values, and Regulatory Preferences. Journal of Global Information Management (JGIM), 29(3), 131-164. http://doi.org/10.4018/JGIM.2021050106

16. Smith, H. J., Milberg, S. J., & Burke, S. J. (1996). Information Privacy: Measuring Individuals’ Concerns about Organizational Practices. MIS Quarterly, 20(2), 167–196. https://doi.org/10.2307/249477

17. Rath, D.K. and Kumar, A. (2021), "Information privacy concern at individual, group, organization and societal level - a literature review", Vilakshan - XIMB Journal of Management, Vol. 18 No. 2, pp. 171-186. https://doi.org/10.1108/XJM-08-2020-0096

18. Juan Carlos Roca Juan José García Juan José de la Vega, (2009),"The importance of perceived trust, security and privacy in online trading systems", Information Management & Computer Security, Vol. 17 Iss 2 pp. 96 - 113

19. Xu, Heng & Dinev, Tamara & Smith, H. & Hart, Paul. (2008). Examining the Formation of Individual's Privacy Concerns: Toward an Integrative View.. ICIS 2008 Proceedings - Twenty Ninth International Conference on Information Systems. 6.

20. Lili, W., & Min, D. (2014). Effect of Cultural Factors on Online Privacy Concern: Korea vs. China. Journal of Information Technology Applications and Management, 21(2), 149-165.

21. Luo, Robert & Warkentin, Merrill & Johnston, Allen. (2009). The Impact of National Culture on Workplace Privacy Expectations in the Context of Information Security Assurance.. 15th Americas Conference on Information Systems 2009, AMCIS 2009. 6. 521.

22. K.W. Wu, S.Y. Huang, D.C. Yen, I. Popova The effect of online privacy policy on consumer privacy concern and trust Comput. Hum. Behav., 28 (3) (2012), pp. 889-897

23. Hui, C. H., & Triandis, H. C. (1985). Measurement in Cross-Cultural Psychology: A Review and Comparison of Strategies. Journal of Cross-Cultural Psychology, 16(2), 131–152. https://doi.org/10.1177/0022002185016002001

24. Yoo, B., & Donthu, N. (2005). The effect of personal cultural orientation on consumer ethnocentrism: Evaluations and behaviors of US consumers toward Japanese products. Journal of International Consumer Marketing, 18(1-2), 7-44.

25. Schwartz, Shalom H. 1994. "Beyond individualism/collectivism: New cultural dimensions of values." In Individualism and collectivism: Theory, method, and applications. Eds. U. Kim, H. C. Triandis, C. Kagitcibasi, S. Choi and G. Yoon. Thousand Oaks, CA: Sage, 85-119.

26. Leung, Kwok. 1987. "Some Determinants of Reaction to Procedural Models for Conflict Resolution: A Cross-Cultural Study." Journal of Personality and Social Psychology 53: 898-908.

27. Schwartz, Shalom H., and Tammy Rubel-Lifschitz. 2009. "Cross-National Variation in the Size of Sex Differences in Values: Effects of Gender Equality." Journal of Personality and Social Psychology 97 (1): 171-185.

28. Puri, Radhika. 1996. "Measuring and Modifying Consumer Impulsiveness: A Cost-benefit Accessibility Framework." Journal of Consumer Psychology 5 (2): 87-113.

29. Dinev, T., & Hart, P. (2006). An extended privacy calculus model for e-commerce transactions. Information systems research, 17(1), 61-80.

30. Mayer, R. C., Davis, J. H., & Schoorman, F. D. (1995). An integrative model of organizational trust. Academy of management review, 20(3), 709-734.

31. Taddei, S., & Contena, B. (2013). Privacy, trust and control: Which relationships with online self-disclosure?. Computers in human behavior, 29(3), 821-826.

32. Mcknight, D. & Chervany, Norman. (2002). What trust means in ecommerce consumer relationships: an interdisciplinary conceptual typology. Journal of Electronic Commerce. 6. 35-60.

33. Bagozzi, R. P., & Yi, Y. (1988). On the evaluation of structural equation models. Journal of the academy of marketing science, 16(1), 74-94.

34. Nunnally, J. C. (1978). An overview of psychological measurement. Clinical diagnosis of mental disorders, 97-146.

35. Fornell, C., & Larcker, D. F. (1981). Structural equation models with unobservable variables and measurement error: Algebra and statistics.

36. Hair Jr, J. F. (2006). Successful strategies for teaching multivariate statistics. In Proceedings of the 7th International Conference on (pp. 1-5).

37. Diamantopoulos, A., & Siguaw, J. A. (2006). Formative versus reflective indicators in organizational measure development: A comparison and empirical illustration. British journal of management, 17(4), 263-282.

38. McKnight, D. H., Cummings, L. L., & Chervany, N. L. (1998). Initial trust formation in new organizational relationships. Academy of Management review, 23(3), 473-490.

39. Shin, D.H. (2010) The Effects of Trust, Security and Privacy in Social Networking: A Security-Based Approach to Understand the Pattern of Adoption. Interacting with Computers, 22, 428-438.https://doi.org/10.1016/j.intcom.2010.05.001

40. Laufer, R. S., & Wolfe, M. (1977). Privacy as a concept and a social issue: A multidimensional developmental theory. Journal of social Issues, 33(3), 22-42.

41. Steven Bellman, Eric J. Johnson, Stephen J. Kobrin & Gerald L. Lohse (2004) International Differences in Information Privacy Concerns: A Global Survey of Consumers, The Information Society, 20:5, 313-324, DOI: 10.1080/01972240490507956

42. Milberg, S. J., Smith, H. J., & Burke, S. J. (2000). Information Privacy: Corporate Management and National Regulation. Organization Science, 11(1), 35–57. doi:10.1287/orsc.11.1.35.12567

43. Van Slyke, Craig & Shim, J. & Johnson, Richard & Jiang, James. (2006). Concern for Information Privacy and Online Consumer Purchasing. J. AIS. 7. 10.17705/1jais.00092.

44. Tsai, J. Y., Egelman, S., Cranor, L., & Acquisti, A. (2011). The effect of online privacy information on purchasing behavior: An experimental study. Information systems research, 22(2), 254-268.

45. 許昕慈(2017)。巨量資料隱私風險特性和資訊隱私顧慮對使用者掩飾行為之影響。國立中山大學資訊管理學系研究所碩士論文。

46. Watson-Manheim, M. В., and Bélanger, F. 2002. "Support for Communication-Based Work Processes in Virtual Work," E-Service Journal (1:3), pp. 61-82

47. Stone, E. F., Gardner, D. G., Gueutal, H. G., and McClure, S. 1983. "A Field Experiment Comparing Information-Privacy Values, Beliefs, and Attitudes Across Several Types of Organizations," Journal of Applied Psychology (68:3), pp. 459-46

48. Prosser, William L. "Privacy," California Law Review 48 (1960), 383-423.

50. Thierer, Adam D., The Pursuit of Privacy in a World Where Information Control is Failing (March 2013). Harvard Journal of Law and Public Policy, Vol. 36, No. 2, 2013, Available at SSRN: https://ssrn.com/abstract=2234680
電子全文 Fulltext
本電子全文僅授權使用者為學術研究之目的,進行個人非營利性質之檢索、閱讀、列印。請遵守中華民國著作權法之相關規定,切勿任意重製、散佈、改作、轉貼、播送,以免觸法。
論文使用權限 Thesis access permission:自定論文開放時間 user define
開放時間 Available:
校內 Campus:開放下載的時間 available 2025-08-26
校外 Off-campus:開放下載的時間 available 2025-08-26

您的 IP(校外) 位址是 3.137.185.180
現在時間是 2024-04-20
論文校外開放下載的時間是 2025-08-26

Your IP address is 3.137.185.180
The current date is 2024-04-20
This thesis will be available to you on 2025-08-26.

紙本論文 Printed copies
紙本論文的公開資訊在102學年度以後相對較為完整。如果需要查詢101學年度以前的紙本論文公開資訊,請聯繫圖資處紙本論文服務櫃台。如有不便之處敬請見諒。
開放時間 available 2025-08-26

QR Code