Responsive image
博碩士論文 etd-0110114-223343 詳細資訊
Title page for etd-0110114-223343
論文名稱
Title
影響使用者網路去抑制化行為之研究-以網際網路的心理特性、社會影響及遏止理論探討
Examining the Antecedents of Online Disinhibition - Internet Psychological Characteristics, Social Influence, and Containment Theory
系所名稱
Department
畢業學年期
Year, semester
語文別
Language
學位類別
Degree
頁數
Number of pages
82
研究生
Author
指導教授
Advisor
召集委員
Convenor
口試委員
Advisory Committee
口試日期
Date of Exam
2013-07-18
繳交日期
Date of Submission
2014-02-10
關鍵字
Keywords
遏止理論、網路心理特性、網路去抑制化行為、去個人化、社會影響
Containment theory, Social influence, Internet psychological characteristics, Deindividuation, Online Disinhibition
統計
Statistics
本論文已被瀏覽 6066 次,被下載 890
The thesis/dissertation has been browsed 6066 times, has been downloaded 890 times.
中文摘要
「電腦中介溝通」已被發現在使用者之間會產生較不受控制的行為,人們在網路上會感到較不受限制,會使用粗魯的言語、威脅性的字眼或是激進的批評來發洩他們的憤怒或憤恨。我們稱這種現象為「網路去抑制化行為」。
本實證研究提出了一個整合性的研究,結合了網路心理層面、社會層面及環境層面,網路心理層面包含了六項網路心理特性(匿名性、不可見性、非同步性、自我投射、解離的想像認知及階級權力最小化)及去個人化,社會層面則是採用了社會影響(主觀規範、描述性規範),環境層面我們則是用遏止理論(內在遏止、外在遏止)來做衡量。本研究提出了一個創新的模式能夠彌補以往研究去抑制化行為上的不足。
本研究於台灣收集了530份網路使用者的有效樣本來驗證本研究的假說,結果顯示匿名性對於去個人化及去抑制化行為有顯著的影響。而非同步性及解離的想像認知對去抑制化行為則是有直接顯著的影響。在社會影響方面,結果顯示主觀規範比描述性規範對於去抑制化行為有更加顯著的正向影響,此外,在遏止理論方面,我們發現內在遏止可以有效地降低人們的的去抑制化行為,但外在遏止則無。
總而言之,本研究提供了學術界及實務界一個實證的結果,了解到底哪些因素確實會導致人們的去抑制化行為。同時我們也建立的一個創新的觀點,發現社會影響及遏止理論對於去抑制化行為是存在著交互作用的。
Abstract
Computer-mediated communication (CMC) has since been found to have a correlation with uninhibited behaviors among users. Many of the human behaviors are less restraint to use rude or threatening language, leashing harsh criticisms, venting anger or hatred online, we called this phonemes ”Toxic online disinhibition effect. ”
Our empirical study tried to integrate psychological dimension, social dimension, and environment dimension -six internet psychological characteristics(dissociative anonymity, invisibility, asynchronicity, solipsistic introjection, dissociative imagination, and minimization of status and authority), deindividuation, social influence(subjective norm and descriptive norm), and containment theory(inner containment and outer containment)- to propose an innovative model which can make up for deficiencies in previous studies of the toxic online disinhibition effect.
Data was collected from 530 internet users in Taiwan to test our hypothesis. The result shows that dissociative anonymity have significant impact on deindividuation and toxic disinhibition. In addition, asynchronicity and dissociative imagination have directly effect on toxic disnhibition. Besides, in social influence, we found that subjective norm is a stronger predictor of toxic disinhibition than descriptive norm. Moreover, in containment theory, the result shows inner containment can effective reduce toxic disinhibition but outer containment not.
To sum up, this study can provide academics and practical side empirical evidence that what factor would cause toxic disinhibition and give an innovation view regarding social influence and containment theory have relationship on toxic disinhibition.
目次 Table of Contents
論文審定書 i
誌謝 ii
摘要 iii
Abstract iv
Content v
List of Figures vii
List of Tables vii
1 Introduction 1
1.1 Research background 1
1.2 Motivation 3
1.3 Research purpose 6
2 Literature review 7
2.1 Disinhibition 7
2.1.1 Toxic Disinhibition 8
2.2 Deindividuation 9
2.3 Internet psychological characteristics 12
2.3.1 Dissociative Anonymity 13
2.3.2 Invisibility 14
2.3.3 Asynchronicity 15
2.3.4 Solipsistic Introjection 16
2.3.5 Dissociative Imagination 18
2.3.6 Minimization of status and authority 19
2.4 Social Influence 21
2.4.1 Subjective Norm 21
2.4.2 Descriptive Norm 23
2.5 Containment theory 24
2.5.1 Inner containment 25
2.5.2 Outer containment 26
3 Research Model and Methodology 29
3.1 Research model 29
3.2 Sampling and Data Collection 30
3.3 Demographic Analysis 31
3.4 Constructs and Measurements 32
3.4.1 Questionnaire Internal Reliability 35
3.5 Measurement Model 39
3.5.1 Common Method Variance 39
3.5.2 Reliability and Validity 42
4 Analysis and Discussions 49
4.1 Data Analysis 49
4.2 Analysis of mediating 52
4.3 Discussion 55
5 Conclusions and Implications 59
5.1 Conclusions 59
5.2 Academic Applications 60
5.3 Practical Implications 61
5.4 Limitations and Suggestions for Future Study 63
Reference 64
Appendix 68
參考文獻 References
  Anderson, Catherine L., & Agarwal, Ritu. (2010). SAFE COMPUTING: A MULTIMETHOD EMPIRICAL EXAMINATION OF HOME COMPUTER USER SECURITY BEHAVIORAL INTENTIONS. MIS Quarterly, 34(3), 613-643.
  Barak, Azy, Boniel-Nissim, Meyran, & Suler, John. (2008). Fostering empowerment in online support groups. Computers in Human Behavior, 24(5), 1867-1883. doi: 10.1016/j.chb.2008.02.004
  Baron, Reuben M., & Kenny, David A. (1986). The Moderator-Mediator Variable Distinction in Social Psychological Research: Conceptual, Strategic, and Statistical Considerations. Journal of Personality and Social Psychology, 51(6), 1173-1182.
  Beck, Lisa, & Ajzen, Icek. (1991). Predicting Dishonest Actions Using the Theory of Planned Behavior. JOURNAL OF RESEARCH IN PERSONALITY, 25, 285-301.
  Berkowitz, Alan D. (2004). An overview of the social norms approach. In L. Lederman & L. Stewart (Eds.), Changing the culture of college drinking. Cresskill, NJ: Hampton Press.
  Campbell, D. T., & Fiske, D. W. (1959). Convergent and discriminant validation by the multitrait-multimethod matrix. Psychological Bulletin, 56(2).
  Cestac, Julien, Paran, Françoise, & Delhomme, Patricia. (2011). Young drivers’ sensation seeking, subjective norms, and perceived behavioral control and their roles in predicting speeding intention: How risk-taking motivations evolve with gender and driving experience. Safety Science, 49(3), 424-432. doi: 10.1016/j.ssci.2010.10.007
  Chin, W. W., Gopal, A., & Salisbury, W. D. (1997). Advancing the theory of adaptive structuration: The development of a scale to measure faithfulness of appropriation. Information Systems Research, 8(4), 342-367.
  Choi, Jayoung, & Geistfeld, Loren V. (2004). A cross-cultural investigation of consumer e-shopping adoption. Journal of Economic Psychology, 25(6), 821-838. doi: 10.1016/j.joep.2003.08.006
  DeMelo, Diane M. (1999). Criminological Theory.
  Deutsch, Morton, & Gerard, Harol B. (1955). A study of normative and informational influences upon individual judgement. Journal of Abnormal and Social Psychology, 51, 629-636.
  Diener, E. (1976). Effects of prior destructive behavior, anonymity, and group presence on deindividuation and aggression. Journal of Personality and Social Psychology, 33, 497-507.
  Diener, E. (1980). Deindividuation: The absence of self-awareness and self-regulation in group members. In P. B. Paulus (Ed.). Hillsdale, NJ: Edbaum.
  Diener, E. . (1980). The absence of self-awareness and self-regulation in group members. The Psychology of Group Influence, 209-242.
  DiIulio, John J. (2010). Deterrence theory.
  Festinger, L., Pepitone, A., & Newcomb, T. (1952). Some consequences of de-individuation in a group. Journal of Abnormal and Social Psychology, 47, 382-389.
  Fishbein, M., & Ajzen, I. (1975). Belief Attitude, Intention and Behavior: An Introduction to Theory and Research. Reading, MA: Research, Addison-Wesley.
  Fornell, C., & Larcker, D. F. (1981). Evaluating structural equation models with unobservable variables and measurement error. Journal of Marketing Research, 18(1), 39-50.
  Frey, Bruno S., & Meier, Stephan. (2004). Pro-social behavior in a natural setting. Journal of Economic Behavior & Organization, 54(1), 65-88. doi: 10.1016/j.jebo.2003.10.001
  Gorsuch, Richard L., & Ortberg, John. (1983). Moral Obligation and Attitudes: Their Relation to Behavioral Intentions. Journal of Personality and Social Psychology, 44(5), 1025-1028.
  Hair, J. F., Black, W. C., Babin, B. J., & Anderson, R. E. (2010). Multivariate data analysis (7th ed.). New Jersey: Prentice Hall.
  Hinduja, S. (2008). Deindividuation and Internet software piracy. Cyberpsychol Behav, 11(4), 391-398. doi: 10.1089/cpb.2007.0048
  Hui, C., & Triandis, H. C. (1986). Individualism–collectivism: A study of cross-cultural researchers. Journal of Cross-Cultural Psychology, 17(2), 225-248.
  John A. Bargh, McKenna, Katelyn Y. A., & Fitzsimons, Grainne M. (2002). Can You See the Real Me? Activation and Expression
  of the “True Self” on the Internet. Journal of Social Issues, 58, 33-48.
  Joinson. (2007). Disinhibition and the Internet (second ed.).
  Joinson. (l998a). Causes and implications of disinhibited behavior on the Net. In 1.Gackenbach (Ed.) Psychology of the Internet
  New York: Academic Press.
  Keser, Claudia, & Winden, Frans van. (2000). Conditional Cooperation and Voluntary Contributions to Public Goods. Scand. J. of Economics, 102(1), 23-39.
  Kiesler, S., Siegal, J., & Mcgire, T. W. (1984). Social psychological aspects of computer mediated communication. American Psychologist, 39(1123-1134).
  Kiesler, S., Zubrow, D., Moses, A. M., & Geller, V. (1985). Affect in computer-meditated communication: An experiment in synchronous terminal-to-terminal discussion. Human-Computer Interaction, 1, 77-104.
  Klepper, S. , & Nagin, D. (1989). THE DETERRENT EFFECT OF PERCEIVED CERTAINTY AND SEVERITY OF PUNISHMENT REVISITED. Criminology, 27(721-746). doi: 10.1111/j.1745-9125.1989.tb01052.x
  Lam, S. P. (1999). Predicting intentions to conserve water from the theory of planned behavior, perceived moral obligation, and perceived water right. Journal of Applied Psychology, 29, 1058-1071.
  Lapidot-Lefler, Noam, & Barak, Azy. (2012). Effects of anonymity, invisibility, and lack of eye-contact on toxic online disinhibition. Computers in Human Behavior, 28(2), 434-443. doi: 10.1016/j.chb.2011.10.014
  Le Bon, G. (1895). The crowd: A study of the popular mind. London: Transaction.
  Lea, M., O'Shea, T., Fung, P., & Spears, R. (1992). Flaming in computer-mediated communication: Observations, explanations, implications. Contexts of Computer-Mediated Communication.
  Lee, C., & Green, R.T. (1991). Cross-Cultural Examination of the Fishbein Behavioral Intentions Model. Journal of International Business Studies, 22(2), 289.
  Liang, H., Saraf, N., Hu, Q., & Xue, Y. (2007). Assimilation of enterprise systems: the effect of institutional pressures and the mediating role of top management. MIS Quarterly, 31(1), 59-87.
  Mahon, Denise, Cowan, Cathal, & McCarthy, Mary. (2006). The role of attitudes, subjective norm, perceived control and habit in the consumption of ready meals and takeaways in Great Britain. Food Quality and Preference, 17(6), 474-481. doi: 10.1016/j.foodqual.2005.06.001
  Nunnally, J. C. (1978). Psychometric theory. New York: McGraw-Hill.
  Podsakoff, P. M., MacKenzie, S. B., Lee, J. Y., & Podsakoff, N. P. (2003). Common method biases in behavioral research: A critical review of the literature and recommended remedies. Journal of Applied Psychology, 88(5), 879-903.
  Pomazal, R. J., & Jaccard, J. J. (1976). An informational approach to altruistic behavior. Journal of Personality and Social Psychology, 33, 317-326.
  Porter, Michael E., & Kramer, Mark R. (2006). Strategy-Society:The Link Between Competitive Advantage and Corporate Social Responsibility. Harvard Business Review.
  Postmes, Tom, & Spears, Russell. (1998). Deindividuation and Antinormative Behavior A Meta-Analysis. Psychological Bulletin, 123(3), 238-259.
  Reckless, W. C. (1961). A new theory of delinquency and crime. Federal Probation, 25, 42-46.
  Reckless, W. C. (1973b). The Crime Problem.: Pacific Palisades: Goodyear Publishing Company.
  Reno, Raymond R., Cialdini, Robert B., & Kallgren, Carl A. (1993). The Transsituational Influence of Social Norms. Journal of Personality and Social Psychology, 64(1), 104-112.
  Rivis, Amanda, & Sheeran, Paschal. (2003). Descriptive Norms as an Additional Predictor in the Theory of Planned Behaviour: A Meta-Analysis. Current Psychology: Developmental, Learning, Personality, Social., 22(3), 218-233.
  Schouten, A. P., Valkenburg, P. M., & Peter, J. (2007). Precursors and underlying processes of adolescents' online self-disclosure: Developing and testing an “Internet-attribute-perception” model. Media Psychology, 10(2), 292-315.
  Schwartz, S. H., & Tessler, R. C. . (1972). A test of a model for reducing measured attitude-behavior inconsistencies. Journal of Personality and Social Psychology, 24(225-236).
  Suler, John. (2004). The online disinhibition effect. Cyberpsychology & Behavior, 7(3), 321-326. doi: Doi 10.1089/1094931041291295
  Thompson, W. E., & Dodder, R. A. (1983). Juvenile Delinquency Explained?: A Test of Containment Theory. Youth & Society, 15(2), 171-194. doi: 10.1177/0044118x83015002004
  Tsao, fu-nien. (2010). 廢死被罵「腦袋有洞」 副教授告31人, 聯合報.
  Van Dijk, E., & Wilke, H. (1997). Is It Mine or Is It Ours? Framing Property Rights and Decision Making in Social Dilemmas. Organizational Behavior and Human Decision Processes, 71(2), 195-209.
  White, Katherine M., Smith, Joanne R., Terry, Deborah J., Greenslade, Jaimi H., & McKimmie, Blake M. (2009). Social influence in the theory of planned behaviour: The role of descriptive, injunctive, and ingroup norms. British Journal of Social Psychology, 48(1), 135-158.
  Zimbardo, P. G. (1969). The human choice: Individuation, reason, and order vs. deindividuation, impulse and chaos. In W. 1. Arnold & D. Levine (Eds.). Lincoln: University ofNebraska Press.
  Zibardo, P. G. (1977). Shyness: What is it and what to do about it. London: Pan Books.
電子全文 Fulltext
本電子全文僅授權使用者為學術研究之目的,進行個人非營利性質之檢索、閱讀、列印。請遵守中華民國著作權法之相關規定,切勿任意重製、散佈、改作、轉貼、播送,以免觸法。
論文使用權限 Thesis access permission:自定論文開放時間 user define
開放時間 Available:
校內 Campus: 已公開 available
校外 Off-campus: 已公開 available


紙本論文 Printed copies
紙本論文的公開資訊在102學年度以後相對較為完整。如果需要查詢101學年度以前的紙本論文公開資訊,請聯繫圖資處紙本論文服務櫃台。如有不便之處敬請見諒。
開放時間 available 已公開 available

QR Code