博碩士論文 etd-0203110-120705 詳細資訊


[回到前頁查詢結果 | 重新搜尋]

姓名 李明翰(Ming-Han Li) 電子郵件信箱 E-mail 資料不公開
畢業系所 資訊管理學系研究所(Information Management)
畢業學位 碩士(Master) 畢業時期 98學年第1學期
論文名稱(中) PTT使用者對侵犯他人隱私之研究
論文名稱(英) A Study of Internet Privacy Invasion in PTT
檔案
  • etd-0203110-120705.pdf
  • 本電子全文僅授權使用者為學術研究之目的,進行個人非營利性質之檢索、閱讀、列印。
    請遵守中華民國著作權法之相關規定,切勿任意重製、散佈、改作、轉貼、播送,以免觸法。
    論文使用權限

    電子論文:校內一年後公開,校外永不公開

    論文語文/頁數 中文/120
    統計 本論文已被瀏覽 5662 次,被下載 14 次
    摘要(中) 在科技發展之下,個人資料也被放在網路上隨手可得,然而在PTT上卻可看到各式各樣隱私侵犯,從姓名或者影片就可以被其他人找出其他各式各樣資料,個人在網路上不能扮演另一個自己,而是害怕真實的自己被揪出。
        然而對於其他網路使用者而言為何會支持這類隱私侵犯,當網路使用者看到侵犯隱私行為時,為何有些人會支持有些人卻會反對,其影響的主因為何?
        本研究利用文字敘述以及不同事件等方式進行操弄,觀察文字敘述的不同是否會影響受測者對於隱私侵犯的決策。並且將文字敘述分為暴力色情文字敘述以及非暴力色情文字敘述,事件分為男性劈腿事件與女性劈腿事件兩部分。並且利用兩階段問卷觀察組內間是否有所不同,當個人面對不同敘述的相同事件時,其隱私決策判斷是否有所差別。
        最後本研究發現受測者性別、文字敘述、事件情境三部分對於隱私決策判斷的影響,並且對於隱私情境設計與隱私侵犯重要因子給予建議。
    摘要(英) Although technology is well developed, personal data is well spread in internet ,too. We can see a lot of privacy invasion in PTT. People can find a lot of data about someone from his name or movie. People are afraid of being caught in internet. But why some people support this kind of privacy invasion but some don’t. What is the main factor?
        This study uses description and different kind of event to observe if description can affect people’s decision toward privacy invasion. We separate description into violate and non-violate, and we use two stage survey to observe when people face different kind of description, is there any different between violate and non-violate description toward privacy decision making.
        In the end, we find how sex, description, and event affect privacy decision making, and we bring up a suggestion of privacy situational desion and the main factor toward privacy decision making.
    關鍵字(中)
  • PTT
  • 文字敘述
  • 隱私決策判斷
  • 關鍵字(英)
  • PTT
  • word description
  • privacy decision making
  • 論文目次 目錄
    表目錄 v
    圖目錄 vii
    第一章 緒論 1
    第一節、研究背景 1
    第二節、研究動機 2
    第三節、問題描述 4
    第四節、研究流程 4
    第二章 文獻探討 6
    第一節、PTT隱私侵犯事件 6
    第二節、由社會認知理論到自我效能 9
    第三節、道德強度 12
    第四節、風險認知 14
    第五節、憤怒 16
    第六節、道德義務 17
    第七節、法律保護 18
    第八節、隱私決策判斷 19
    第九節、研究模式與假說彙整 21
    第三章 研究方法 22
    第一節、研究流程 22
    第二節、實驗設計、研究對象與資料收集方法 23
    第三節、研究構念設計 24
    第四節、資料分析方法與工具 32
    第四章、資料分析 35
    第一節、基本資料分析 35
    第二節、因素分析與信效度分析 41
    第三節、研究模式之驗證 45
    第四節、各操作變數T檢定 47
    第五章、結論與建議 66
    第一節、研究結果 66
    第二節、研究貢獻 69
    第三節、研究限制 70
    第四節、未來研究 71
    第六章、參考文獻 72
    附錄 76
    參考文獻 參考文獻
    1. A. Singhapakdi, S. J. Vitell and K. Kraft,“Moral Intensity and Ethical Decision-Making of Marketing Professionals,” Journal of Business Research,Vol. 36, Issue 3, pp. 245-255, 1996
    2. Bauer, R. A., 1960, 'Consumer Behaviour as Risk Taking', in R. S. Hancock (ed.).Dynamic Marketing for a Changing World, Chicago AMA Proceedings, p.
    3. Bandura, A. (1986). Social foundations of thought and action. Englewood Cliffs, NJ: Prentice Hall.
    4. Bandura, A. (1991). Social cognitive theory of moral thought and action. In W. M. Kurtines, & J. L. Gewirtz (Eds.), Handbook of Moral Behavior and Development (vol. 1, pp. 45-103). Hillsdale, NJ: Lawrence Erlbaum.
    5. Berkowitz, L. (1993). Aggression: Its causes, consequences, and control.Philadelphia: Temple University Press.
    6. Cunningham, S. M.(1967), “The Major Dimensions Of Perceived Risk”, In Donald, F.C.(Eds), Risk Taking And Information Handling In Consumer Behavior, Boston: Harvard University Press, pp. 82-108
    7. Davis, F. D. 1989. Perceived usefulness, perceived ease of use, and user acceptance of information technology. MIS Quart. 13(3) 319–339.
    8. Dholakia , U. M. (2001). A motivational process model of product involvement and consumer risk perception. European Journal of Marketing, 35, 1340-1360.
    9. Gaudine, A. and L. Thorne: 2001, ‘Emotion and Ethical Decision-Making in Organizations’, Journal of Business Ethics 31, 175–187
    10. Hunt, S.D. Commentary on an empirical investigation of a general theory of marketing ethics. Journal ofthe Academy of Marketing Science, 18,2(1990), 173-177
    11. Hollinger, R. (1988). Computer hackers follow a Guttmann-like progression. Social Sciences Review, 72, 199-200.
    12. Jacoby, J., Kaplan, L.B., 1972. The components of perceived risk. In: M. Ventakesan (Ed.), Proc. of the third annual conference of the Association for Consumer Research, Chicago, US, pp. 382–393.
    13. James H. Gerlach, Feng-Yang Kuo, and Cathy S. Lin, "Self Sanction and Regulative Sanction against Copyright Infringement: A Comparison between US and China College Students," Journal of the American Society for Information Science and Technology, 60:6, 2009, pp.1-15. (SSCI)
    14. Jones, T. M.: 1991, Ethical Decision Making by Individuals in Organizations: An Issue-contingent Model ,Academy of Management Review 16(2), 366–395
    15. K.C. Laudon, Ethical concepts and information technology, Communications of the ACM 38 (12), 1995, pp. 33±39
    16. Loch, K. D. and S. Conger: 1996, ‘Evaluating Ethical Decision Making and Computer Use’, Communications of the ACM 39(7), 74–84
    17. Mason, R.O. Four ethical issues of the information age. MIS Q. (Mar. 1986), 4–12.
    18. Marshall, B. and P. Dewe.: 1997, ‘An Investigation of the Components of Moral Intensity’, Journal of Business Ethics 16, 521–530
    19. Ostergard, R.L. Jr. (2000). The measurement of intellectual property rights protection. Journal of International Business Studies, 31(2), 349-360
    20. Perugini & Bagozzi, 2001 M. Perugini and R.P. Bagozzi, The role of desires and anticipated emotions in goal-directed behaviors: A model of goal-directed behavior, British Journal of Social Psychology 40 (2001), pp. 79–98.
    21. Richard O. Mason, Applying ethics to information technology issues, Communications of the ACM, v.38 n.12, p.55-57, Dec. 1995
    22. Richins, Marsha L. 1997. “Measuring Emotions in the Consumption Experience.”Journal of Consumer Research 24: 127–146.
    23. Rest, J. Moral development: Advances in research and theory Praeger, New York, 1986.
    24. Rogers, M.K., 2001. A social learning theory and moral disengagement analysis of criminal computer behavior: An exploratory study. Unpublished doctoral dissertation, University of Manitoba, Winnipeg, Manitoba, Canada.
    25. Ronald E. Anderson , Deborah G. Johnson , Donald Gotterbarn , Judith Perrolle, Using the new ACM code of ethics in decision making, Communications of the ACM, v.36 n.2, p.98-107, Feb. 1993
    26. Schwartz, M. (2001) "‘The Nature of the Relationship Between Corporate Codes of Ethics and Behavior’" Journal of Business Ethics 32: 247-262
    27. Skinner, W.F. & Fream, A.M. (1997). A social learning theory analysis of computer crime among college students. Journal of Crime and Delinquency, 34(4), 495-518.
    28. Shin, M (2001) "The Animosity Model of Foreign Product Purchase Revisited: Does It Work in Korea?", Journal of Empirical Generalisations in Marketing Science, Vol 6, No.1
    29. Tan, B.: 2002, 'Understanding Consumer Ethical Decision Making with respect to Purchase of Pirated Software', Journal of Consumer Marketing 19(2), 96-111.
    30. Thong, J. L., Yap, C. S. 1998. Testing an ethical decision-making theory: the case of softlifting. J. Management Inform. Systems 15 (1)213-237.
    31. 林杏子(2003)。資訊專業人員隱私保護行為的自我規範機制之研究。中山大學資訊管理研究所博士論文
    32. 許孟祥、郭峰淵、林杏子、朱彩馨、游佳萍(2001),「個人資訊隱私:倫理效能之量表的發展與驗證」,中山管理評論,九卷三期,373-394頁。
    33. 呂維理等/譯。道德發展研究與理論之進展,心理出版社,2004.
    口試委員
  • 林芬慧 - 召集委員
  • 林杏子 - 委員
  • 郭峰淵 - 指導教授
  • 口試日期 2009-06-22 繳交日期 2010-02-03

    [回到前頁查詢結果 | 重新搜尋]


    如有任何問題請與論文審查小組聯繫