Responsive image
博碩士論文 etd-0203110-120705 詳細資訊
Title page for etd-0203110-120705
論文名稱
Title
PTT使用者對侵犯他人隱私之研究
A Study of Internet Privacy Invasion in PTT
系所名稱
Department
畢業學年期
Year, semester
語文別
Language
學位類別
Degree
頁數
Number of pages
120
研究生
Author
指導教授
Advisor
召集委員
Convenor
口試委員
Advisory Committee
口試日期
Date of Exam
2009-06-22
繳交日期
Date of Submission
2010-02-03
關鍵字
Keywords
PTT、文字敘述、隱私決策判斷
PTT, word description, privacy decision making
統計
Statistics
本論文已被瀏覽 5840 次,被下載 14
The thesis/dissertation has been browsed 5840 times, has been downloaded 14 times.
中文摘要
在科技發展之下,個人資料也被放在網路上隨手可得,然而在PTT上卻可看到各式各樣隱私侵犯,從姓名或者影片就可以被其他人找出其他各式各樣資料,個人在網路上不能扮演另一個自己,而是害怕真實的自己被揪出。
然而對於其他網路使用者而言為何會支持這類隱私侵犯,當網路使用者看到侵犯隱私行為時,為何有些人會支持有些人卻會反對,其影響的主因為何?
本研究利用文字敘述以及不同事件等方式進行操弄,觀察文字敘述的不同是否會影響受測者對於隱私侵犯的決策。並且將文字敘述分為暴力色情文字敘述以及非暴力色情文字敘述,事件分為男性劈腿事件與女性劈腿事件兩部分。並且利用兩階段問卷觀察組內間是否有所不同,當個人面對不同敘述的相同事件時,其隱私決策判斷是否有所差別。
最後本研究發現受測者性別、文字敘述、事件情境三部分對於隱私決策判斷的影響,並且對於隱私情境設計與隱私侵犯重要因子給予建議。
Abstract
Although technology is well developed, personal data is well spread in internet ,too. We can see a lot of privacy invasion in PTT. People can find a lot of data about someone from his name or movie. People are afraid of being caught in internet. But why some people support this kind of privacy invasion but some don’t. What is the main factor?
This study uses description and different kind of event to observe if description can affect people’s decision toward privacy invasion. We separate description into violate and non-violate, and we use two stage survey to observe when people face different kind of description, is there any different between violate and non-violate description toward privacy decision making.
In the end, we find how sex, description, and event affect privacy decision making, and we bring up a suggestion of privacy situational desion and the main factor toward privacy decision making.
目次 Table of Contents
目錄
表目錄 v
圖目錄 vii
第一章 緒論 1
第一節、研究背景 1
第二節、研究動機 2
第三節、問題描述 4
第四節、研究流程 4
第二章 文獻探討 6
第一節、PTT隱私侵犯事件 6
第二節、由社會認知理論到自我效能 9
第三節、道德強度 12
第四節、風險認知 14
第五節、憤怒 16
第六節、道德義務 17
第七節、法律保護 18
第八節、隱私決策判斷 19
第九節、研究模式與假說彙整 21
第三章 研究方法 22
第一節、研究流程 22
第二節、實驗設計、研究對象與資料收集方法 23
第三節、研究構念設計 24
第四節、資料分析方法與工具 32
第四章、資料分析 35
第一節、基本資料分析 35
第二節、因素分析與信效度分析 41
第三節、研究模式之驗證 45
第四節、各操作變數T檢定 47
第五章、結論與建議 66
第一節、研究結果 66
第二節、研究貢獻 69
第三節、研究限制 70
第四節、未來研究 71
第六章、參考文獻 72
附錄 76
參考文獻 References
參考文獻
1. A. Singhapakdi, S. J. Vitell and K. Kraft,“Moral Intensity and Ethical Decision-Making of Marketing Professionals,” Journal of Business Research,Vol. 36, Issue 3, pp. 245-255, 1996
2. Bauer, R. A., 1960, 'Consumer Behaviour as Risk Taking', in R. S. Hancock (ed.).Dynamic Marketing for a Changing World, Chicago AMA Proceedings, p.
3. Bandura, A. (1986). Social foundations of thought and action. Englewood Cliffs, NJ: Prentice Hall.
4. Bandura, A. (1991). Social cognitive theory of moral thought and action. In W. M. Kurtines, & J. L. Gewirtz (Eds.), Handbook of Moral Behavior and Development (vol. 1, pp. 45-103). Hillsdale, NJ: Lawrence Erlbaum.
5. Berkowitz, L. (1993). Aggression: Its causes, consequences, and control.Philadelphia: Temple University Press.
6. Cunningham, S. M.(1967), “The Major Dimensions Of Perceived Risk”, In Donald, F.C.(Eds), Risk Taking And Information Handling In Consumer Behavior, Boston: Harvard University Press, pp. 82-108
7. Davis, F. D. 1989. Perceived usefulness, perceived ease of use, and user acceptance of information technology. MIS Quart. 13(3) 319–339.
8. Dholakia , U. M. (2001). A motivational process model of product involvement and consumer risk perception. European Journal of Marketing, 35, 1340-1360.
9. Gaudine, A. and L. Thorne: 2001, ‘Emotion and Ethical Decision-Making in Organizations’, Journal of Business Ethics 31, 175–187
10. Hunt, S.D. Commentary on an empirical investigation of a general theory of marketing ethics. Journal ofthe Academy of Marketing Science, 18,2(1990), 173-177
11. Hollinger, R. (1988). Computer hackers follow a Guttmann-like progression. Social Sciences Review, 72, 199-200.
12. Jacoby, J., Kaplan, L.B., 1972. The components of perceived risk. In: M. Ventakesan (Ed.), Proc. of the third annual conference of the Association for Consumer Research, Chicago, US, pp. 382–393.
13. James H. Gerlach, Feng-Yang Kuo, and Cathy S. Lin, "Self Sanction and Regulative Sanction against Copyright Infringement: A Comparison between US and China College Students," Journal of the American Society for Information Science and Technology, 60:6, 2009, pp.1-15. (SSCI)
14. Jones, T. M.: 1991, Ethical Decision Making by Individuals in Organizations: An Issue-contingent Model ,Academy of Management Review 16(2), 366–395
15. K.C. Laudon, Ethical concepts and information technology, Communications of the ACM 38 (12), 1995, pp. 33±39
16. Loch, K. D. and S. Conger: 1996, ‘Evaluating Ethical Decision Making and Computer Use’, Communications of the ACM 39(7), 74–84
17. Mason, R.O. Four ethical issues of the information age. MIS Q. (Mar. 1986), 4–12.
18. Marshall, B. and P. Dewe.: 1997, ‘An Investigation of the Components of Moral Intensity’, Journal of Business Ethics 16, 521–530
19. Ostergard, R.L. Jr. (2000). The measurement of intellectual property rights protection. Journal of International Business Studies, 31(2), 349-360
20. Perugini & Bagozzi, 2001 M. Perugini and R.P. Bagozzi, The role of desires and anticipated emotions in goal-directed behaviors: A model of goal-directed behavior, British Journal of Social Psychology 40 (2001), pp. 79–98.
21. Richard O. Mason, Applying ethics to information technology issues, Communications of the ACM, v.38 n.12, p.55-57, Dec. 1995
22. Richins, Marsha L. 1997. “Measuring Emotions in the Consumption Experience.”Journal of Consumer Research 24: 127–146.
23. Rest, J. Moral development: Advances in research and theory Praeger, New York, 1986.
24. Rogers, M.K., 2001. A social learning theory and moral disengagement analysis of criminal computer behavior: An exploratory study. Unpublished doctoral dissertation, University of Manitoba, Winnipeg, Manitoba, Canada.
25. Ronald E. Anderson , Deborah G. Johnson , Donald Gotterbarn , Judith Perrolle, Using the new ACM code of ethics in decision making, Communications of the ACM, v.36 n.2, p.98-107, Feb. 1993
26. Schwartz, M. (2001) "‘The Nature of the Relationship Between Corporate Codes of Ethics and Behavior’" Journal of Business Ethics 32: 247-262
27. Skinner, W.F. & Fream, A.M. (1997). A social learning theory analysis of computer crime among college students. Journal of Crime and Delinquency, 34(4), 495-518.
28. Shin, M (2001) "The Animosity Model of Foreign Product Purchase Revisited: Does It Work in Korea?", Journal of Empirical Generalisations in Marketing Science, Vol 6, No.1
29. Tan, B.: 2002, 'Understanding Consumer Ethical Decision Making with respect to Purchase of Pirated Software', Journal of Consumer Marketing 19(2), 96-111.
30. Thong, J. L., Yap, C. S. 1998. Testing an ethical decision-making theory: the case of softlifting. J. Management Inform. Systems 15 (1)213-237.
31. 林杏子(2003)。資訊專業人員隱私保護行為的自我規範機制之研究。中山大學資訊管理研究所博士論文
32. 許孟祥、郭峰淵、林杏子、朱彩馨、游佳萍(2001),「個人資訊隱私:倫理效能之量表的發展與驗證」,中山管理評論,九卷三期,373-394頁。
33. 呂維理等/譯。道德發展研究與理論之進展,心理出版社,2004.
電子全文 Fulltext
本電子全文僅授權使用者為學術研究之目的,進行個人非營利性質之檢索、閱讀、列印。請遵守中華民國著作權法之相關規定,切勿任意重製、散佈、改作、轉貼、播送,以免觸法。
論文使用權限 Thesis access permission:校內一年後公開,校外永不公開 campus withheld
開放時間 Available:
校內 Campus: 已公開 available
校外 Off-campus:永不公開 not available

您的 IP(校外) 位址是 13.59.36.203
論文開放下載的時間是 校外不公開

Your IP address is 13.59.36.203
This thesis will be available to you on Indicate off-campus access is not available.

紙本論文 Printed copies
紙本論文的公開資訊在102學年度以後相對較為完整。如果需要查詢101學年度以前的紙本論文公開資訊,請聯繫圖資處紙本論文服務櫃台。如有不便之處敬請見諒。
開放時間 available 已公開 available

QR Code