Responsive image
博碩士論文 etd-0527117-213931 詳細資訊
Title page for etd-0527117-213931
論文名稱
Title
巨量資料隱私風險特性和資訊隱私顧慮對使用者掩飾行為之影響
The Impact of Big Data Privacy Risks and Information Privacy Concerns on User Disguises
系所名稱
Department
畢業學年期
Year, semester
語文別
Language
學位類別
Degree
頁數
Number of pages
89
研究生
Author
指導教授
Advisor
召集委員
Convenor
口試委員
Advisory Committee
口試日期
Date of Exam
2017-06-15
繳交日期
Date of Submission
2017-06-27
關鍵字
Keywords
巨量資料隱私、掩飾行為、隱私風險、資訊隱私顧慮、巨量資料
user disguise, information privacy concerns, privacy risks, big data privacy, big data
統計
Statistics
本論文已被瀏覽 5947 次,被下載 1641
The thesis/dissertation has been browsed 5947 times, has been downloaded 1641 times.
中文摘要
巨量資料(Big Data,或又稱大數據)時代的來臨讓資訊隱私的問題更加受到重視,過去研究中多在探討巨量資料分析預測的技術,或是一般由使用者主動提供的資訊隱私,很少研究關注巨量資料分析預測的隱私問題以及使用者在巨量資料分析的環境下產生的行為,然而使用者的部分行為不但會讓資料分析結果不準確,隱私問題更會造成使用者有不佳的使用體驗。本研究從文獻中整理出巨量資料的隱私風險特性,並將過去研究中常使用的資訊隱私顧慮一併進行探討,對於信任信念與風險信念的影響,以及以上自變數是否造成使用者使用網路時掩飾行為的產生。本研究使用線上問卷,共回收570份有效樣本,透過統計分析證實本研究量表具有足夠之信效度。研究結果顯示,在現今網路環境下,資訊隱私顧慮仍對風險信念有正向影響、對信任信念有負向影響;巨量資料之隱私風險特性多數對風險信念有正向影響;風險信念確實會正向影響使用者的掩飾行為,而信任信念則非掩飾行為的影響因素。最後,本研究亦根據研究結果提出理論與實務的建議,期望對未來相關領域的研究有所助益。
Abstract
The coming of the generation of big data makes the issues of information privacy receive more attention. In the past, most of research on big data focused on programming or the privacy concerns of the information which users are willingly to give. Few studies focus on the privacy concerns of big data analysis and prediction or the users’ behavior in big data environment. The users’ behavior may lead the result of big data analysis to inaccurate, and the doubt of privacy also resulting in poor user experience. Based on prior research, we identified four features of big data privacy risks, and also the constructs of information privacy concerns. In this research we examined the impact of these constructs on trust belief and risk belief, and also explored the cause of user disguises. Data collected from 570 users of the Internet provide enough reliability and validity for the research model. The results suggested that information privacy concerns enhance risk belief and decrease trust belief. Most of the big data privacy risks features lead to risk belief. Risk belief indeed foster more user disguises, but the trust belief is not an important determinant of risk belief and user disguises. Practical implications for theory and practice and suggestions for future research are also discussed.
目次 Table of Contents
論文審定書 i
論文公開授權書 ii
誌謝 iii
摘要 iv
Abstract v
目錄 vi
圖次 ix
表次 x
第一章 緒論 1
第一節 研究背景 1
第二節 研究動機 3
第三節 研究問題與目的 4
第四節 研究方法與流程 5
第二章 文獻探討 7
第一節 隱私權與資訊隱私顧慮 7
一、隱私與隱私權 7
二、資訊隱私顧慮 8
第二節 隱私權保護政策聲明 11
第三節 巨量資料(Big Data) 13
第四節 巨量資料的隱私風險 15
第五節 周哈里窗(Johari Window Model) 18
第三章 研究方法 22
第一節 研究模型 22
第二節 研究假說 22
一、巨量資料之隱私風險特性 22
二、資訊隱私顧慮 24
三、信任信念與風險信念 26
四、掩飾行為 27
五、主觀規範 28
六、控制變數 28
第三節 操作型定義 29
第四節 研究設計 30
一、研究對象 30
二、問卷設計 30
三、訪談 38
四、前測與資料蒐集 39
第四章 資料分析 40
第一節 樣本基本資料分析 40
第二節 衡量模型 41
一、 信度分析(Reliability) 42
二、 收斂效度(Convergent Validity) 44
三、 區別效度(Discriminant Validity) 46
四、 共線性(Multicollinearity)檢定 47
五、 共同方法偏誤(Common Method Bias) 47
第三節 模型及假說驗證 52
第五章 結論與建議 56
第一節 研究結果及討論 56
一、認知產生的主觀風險感受 56
二、資訊隱私顧慮在現今網路環境中的影響 58
三、掩飾行為的成因 58
四、專長與專業領域產生的影響 59
第二節 理論及實務意涵 60
一、理論面 60
二、實務面 61
第三節 研究限制 62
第四節 未來研究方向 63
參考文獻 64
附錄:本研究正式問卷 73
參考文獻 References
Ajzen, I. (1991). The Theory of Planned Behavior. Organizational Behavior and Human Decision Processes, 50(2), 179-211.
Anderson, J. C., & Gerbing, D. W. (1988). Structural equation modeling in practice: A review and recommended two-step approach. Psychological Bulletin, 103(3), 411-423. doi:10.1037/0033-2909.103.3.411
Asur, S., & Huberman, B. A. (2010). Predicting the Future With Social Media. Web Intelligence and Intelligent Agent Technology (WI-IAT), 2010 IEEE/WIC/ACM International Conference, 1, 492-499.
Ayyagari, R., Grover, V., & Purvis, R. (2011). Technostress: technological antecedents and implications. MIS quarterly, 35(4), 831-858.
Backstrom, L., Dwork, C., & Kleinberg, J. (2007). Wherefore art thou r3579x?: anonymized social networks, hidden patterns, and structural steganography. Proceedings of the 16th international conference on World Wide Web, 181-190. doi:10.1145/1242572.1242598
Baier, A. (1986). Trust and antitrust. Ethics, 96(2), 231-260.
Bakos, Y., & Brynjolfsson, E. (1999). Bundling information goods: Pricing, profits, and efficiency. . Management science, 45(12), 1613-1630.
Baldwin, J. (2002). Policing, Surveillance and Social Control: CCTV and Police Monitoring of Suspects. By Tim Newburn and Stephanie Hayman (Cullompton: Willan Publishing, 2002. 198 pp.£ 30.00 hb): CCJS.
Becker, G. S., & Murphy, K. M. (1988). A theory of rational addiction. The Journal of Political Economy, 675-700.
Becker, J. M., Klein, K., & Wetzels, M. (2012). Hierarchical latent variable models in PLS-SEM: guidelines for using reflective-formative type models. Long Range Planning, 45(5), 359-394.
Bhattacherjee, A. (2002). Individual trust in online firms: Scale development and initial test. Journal of management information systems, 19(1), 211-241.
Byrne, B. M. (1998). Structural Equation Modeling with LISREL, PRELIS and SIMPLIS: Basic Concepts, Applications and Programming. Mahwah, New Jersey: Lawrence Erlbaum Associates.
C-131/12 - Google Spain and Google (Audiencia Nacional 2014).
Campbell, A. J. (1997). Relationship marketing in consumer markets: A comparison of managerial and consumer attitudes about information privacy. Journal of Interactive Marketing, 11(3), 44-57.
Cavanillas, J. M., Curry, E., & Wahlster, W. (2016). New Horizons for a Data-Driven Economy: A Roadmap for Usage and Exploitation of Big Data in Europe: Springer International Publishing.
Cha, S., McCleary, K. W., & Uysal, M. (1995). Travel motivations of Japanese overseas travelers: A factor-cluster segmentation approach. Journal of travel research, 34(1), 33-39.
Cheung, C. M., Chiu, P. Y., & Lee, M. K. (2011). Online social networks: Why do students use facebook? Computers in Human Behavior, 27(4), 1334-1343.
Chin, W. W. (1997). Overview of the PLS Method: University of Houston.
Chin, W. W. (1998a). Commentary: Issues and opinion on structural equation modeling. MIS quarterly, 22(1), 7-16.
Chin, W. W. (1998b). The partial least squares approach to structural equation modeling. Modern methods for business research, 295(2), 295-336.
Chin, W. W., Marcolin, B. L., & Newsted, P. R. (2003). A partial least squares latent variable modeling approach for measuring interaction effects: Results from a Monte Carlo simulation study and an electronic-mail emotion/adoption study. Information systems research, 14(2), 189-217.
Chiu, C. M., Hsu, M. H., Lai, H., & Chang, C. M. (2012). Re-examining the influence of trust on online repeat purchase intention: The moderating role of habit and its antecedents. Decision Support Systems, 53(4), 835-845.
Chtseng. (2014). Data exhaust. CH.TSENG IT & Photography. Retrieved from http://chtseng.wordpress.com/2014/05/09/data-exhaust/
Cohen, R. L. (1987). Distributive justice: Theory and research. Soc. Justice Res., 1, 19-40.
Crampton, S. M., & Wagner, J. A. (1994). Percept-percept inflation in microorganizational research: An investigation of prevalence and effect. Journal of applied psychology, 79(1), 67-76.
Cukier, K. (2010). Data, data everywhere: A special report on managing information. Economist Newspaper.
Cukier, K. (2012). Tracking Social Media: The Mood of the Market. The Economist Newspaper. Retrieved from http://www.economist.com/blogs/graphicdetail/2012/06/tracking-social-media
Culnan, M. J. (1995). Consumer awareness of name removal procedures: Implications for direct marketing. J. Direct Marketing, 9(2), 10-19.
Culnan, M. J., & Bies., R. J. (2003). Consumer privacy: Balancing economic and justice considerations. J. Soc. Issues, 59(2), 323-342.
Davenport, T. H., Barth, P., & Bean, R. (2012). How big data is different. MIT Sloan Management Review, 54(1), 43.
Davis, F. D. (1989). Perceived Usefulness, Perceived Ease of Use, and User Acceptance of Informa- tion Technology. MIS quarterly, 13(3), 319-339.
Davis, F. D., Bagozzi, R. P., & Warshaw, P. R. (1989). User acceptance of computer technology: a comparison of two theoretical models. Management science, 35(8), 982-1003.
Diamantopoulos, A., & Siguaw, J. A. (2000). Introducing LISREL. London: Sage Publications.
Diamantopoulos, A., & Siguaw, J. A. (2006). Formative versus reflective indicators in organizational measure development: A comparison and empirical illustration. British Journal of Management, 17(4), 263-282.
Dishaw, M. T., & Strong, D. M. (1999). Extending the technology acceptance model with task–technology fit constructs. Information & management, 36(1), 9-21.
Duhigg, C. (2012). How Companies Learn Your Secrets. The New York Times.
Duhigg, C. (2014). The Power of Habit: Why We Do What We Do in Life and Business. Random House Trade Paperbacks.
Finn, R. H. (1972). Effects of some variations in rating scale characteristics on the means and reliabilities of ratings. Educational and Psychological Measurement, 32(2), 255-265.
Fishbein, M., & Ajzen, I. (1975). Belief, attitude, intention, and behavior : an introduction to theory and research. Addison-Wesley, Reading, MA.
Flavián, C., & Guinalíu, M. (2006). Consumer trust, perceived security and privacy policy: Three basic elements of loyalty to a web site. Industrial Management & Data Systems, 106(5), 601-620.
Fornell, C., & Larcker, D. F. (1981). Structural equation models with unobservable variables and measurement error: Algebra and statistics. Journal of marketing research, 18(3), 382-388.
Foxman, E. R., & Kilcoyne, P. (1993). Information technology, marketing practice, and consumer privacy: Ethical issues. J. Public Policy Marketing, 12(1), 106-119.
Gefen, D. (1997). Building users' trust in freeware providers and the effects of this trust on users' perceptions of usefulness, ease of use and intended use of freeware. Georgia State University.
Gefen, D., Karahanna, E., & Straub, D. W. (2003). Trust and TAM in Online Shopping: An Integrated Model. MIS quarterly, 27(1), 51-90.
Gilliland, S. W. (1993). The perceived fairness of selection systems: An organizational justice perspective. Acad. Management Rev., 18(4), 694-734.
Golle, P. (2006). Revisiting the uniqueness of simple demographics in the US population. Proceedings of the 5th ACM workshop on Privacy in electronic society, 77-80. doi:10.1145/1179601.1179615
Hair, J., Black, W., Babin, B., & Anderson, R. (2010). Multivariate data analysis: A global perspective (Vol. 7). Upper Saddle River, NJ: Pearson.
Halevy, A., Norvig, P., & Pereira, F. (2009). The Unreasonable Effectiveness of Data. IEEE Intelligent Systems, 24(2), 8-12. doi:10.1109/MIS.2009.36
Hamari, J., & Koivisto, J. (2013). Social Motivations To Use Gamification: An Empirical Study Of Gamifying Exercise. ECIS 2013 Completed Research., 105.
Helft, M. (2008). Google Tightens Data Retention Policy-Again. The New York Times. Retrieved from http://bits.blogs.nytimes.com/2008/09/09/google-tightens-data-retention-policy-again/?_r=0
Helland, P. (2011). If you have too much data, then 'good enough' is good enough. Communications of the ACM, 54(6), 40-47.
Henseler, J., Hubona, G., & Ray, P. A. (2016). Using PLS path modeling in new technology research: updated guidelines. Industrial Management & Data Systems, 116(1), 2-20.
Herring, S. C., Scheidt, L. A., Bonus, S., & Wright, E. (2004). Bridging the gap: A genre analysis of weblogs. Paper presented at the Paper presented at the Proceedings of the 37th Hawaii international conference on system sciences (HICSS-37), Los Alamitos, CA.
Hilbert, M., & López, P. (2011). The world’s technological capacity to store, communicate, and compute information. science, 332(6025), 60-65.
Hoffman, D. L., Novak., T. P., & Peralta., M. (1999). Building consumer trust online. Comm. ACM, 42(4), 80-85.
Hooper, D., Coughlan, J., & Mullen, M. (2008). Structural equation modelling: Guidelines for determining model fit. Articles, 2.
Hsu, M. H., & Chiu, C. M. (2004). Predicting electronic service continuance with a decomposed theory of planned behaviour. BEHAVIOUR & INFORMATION TECHNOLOGY, 23(5), 359-373.
Hu, L. T., & Bentler, P. M. (1999). Cutoff criteria for fit indexes in covariance structure analysis: Conventional criteria versus new alternatives. Structural equation modeling: a multidisciplinary journal, 6(1), 1-55.
Jarvenpaa, S. L., Tractinsky, N., & Saarinen, L. (1999). Consumer trust in an internet store: a cross‐cultural validation. Journal of Computer‐Mediated Communication, 5(2).
Jarvis, C. B., MacKenzie, S. B., & Podsakoff, P. M. (2003). A critical review of construct indicators and measurement model misspecification in marketing and consumer research. Journal of consumer research, 30(2), 199-218.
Jones, S., Wilikens, M., Morris, P., & Masera, M. (2000). Trust requirements in e-business. Communications of the ACM, 43(12), 81-87.
Jung, C. G. (1966). Two essays on analytical psychology (2 ed.). Princeton University Press.
Klein, J. G., Smith, N. C., & John, A. (2004). Why we boycott: Consumer motivations for boycott participation. Journal of marketing research, 68(3), 92-109.
Kline, R. B. (2005). Principles and Practice of Structural Equation Modeling (2nd Edition ed.). New York: The Guilford Press.
Kolsaker, A., & Payne, C. (2002). Engendering trust in e-commerce: a study of gender-based concerns. Marketing Intelligence & Planning, 20(4), 206-214.
Koops, B. J. (2011). Forgetting footprints, shunning shadows: A critical analysis of the'right to be forgotten'in big data practice. SCRIPTed, 8(3), 229-256. doi:10.2139/ssrn.1986719
Laney, D. (2001). 3D Data Management: Controlling Data Volume, Velocity and Variety. META Group META Delta, File: 949.
Lazer, D., Kennedy, R., King, G., & Vespignani, A. (2014). The parable of Google flu: traps in big data analysis. science, 343(6176), 1203-1205.
Lewis, J. D., & Weigert, A. (1985). Trust as a social reality. Social forces, 63(4), 967-985.
Lohmöller, J.-B. (1989). Latent variable path modeling with partial least squares: Springer Science & Business Media.
Lowe, L. (2016). 125 Amazing Social Media Statistics You Should Know in 2016. SocialPilot.co. Retrieved from http://socialpilot.co/blog/125-amazing-social-media-statistics-know-2016/
Luft, J. (1961). The Johari Window: a graphic model of awareness in interpersonal relations. Human relations training news, 5(9), 6-7.
Luft, J., & Ingham, H. (1961). The johari window. Human relations training news, 5(1), 6-7.
Lyon, D. (1994). The electronic eye: The rise of surveillance society: U of Minnesota Press.
Lyon, D. (2003). Surveillance as Social Sorting: Privacy, Risk, and Digital Discrimination: Routledge.
Malhotra, N. K., Kim, S. S., & Agarwal, J. (2004). Internet users' information privacy concerns (IUIPC): The construct, the scale, and a causal model. Information systems research, 15(4), 336-355.
Manyika, J., Chui, M., Brown, B., Bughin, J., Dobbs, R., Roxburgh, C., & Byers, A. H. (2011). Big data: The next frontier for innovation, competition, and productivity.
Mathieson, K. (1989). Predicting User Intentions: Com- paring the Technology Acceptance Model with the Theory of Planned Behavior. Information systems research, 2(3), 173-191.
Mayer-Schönberger, V. (2011). Delete: The virtue of forgetting in the digital age. . Princeton University Press.
Mayer-Schönberger, V., & Cukier, K. (2013). Big data: A revolution that will transform how we live, work, and think. Houghton Mifflin Harcourt.
Mayer, R. C., Davis, J. H., & Schoorman, F. D. (1995). An integrative model of organizational trust. Academy of Management Review, 20(3), 709-734.
McAfee, A., Brynjolfsson, E., Davenport, T. H., Patil, D. J., & Barton, D. (2012). Big data: The management revolution. Harvard Bus Rev, 90(10), 61-67.
McCormick, M. (2003). New Privacy Legislation. Beyond Numbers.
McKnight, D. H., & Chervany, N. L. (2001). Trust and distrust definitions: One bite at a time Trust in Cyber-societies (pp. 27-54): Springer Berlin Heidelberg.
McKnight, D. H., & Chervany, N. L. (2002). What Trust Means in E-Commerce Customer Relationships: An Interdisciplinary Conceptual Typology. International Journal of Electronic Commerce, 6(2), 35-59. doi:10.1080/10864415.2001.11044235
McKnight, D. H., & Choudhury, V. (2006). Distrust and trust in B2C e-commerce: Do they differ? Paper presented at the ICEC '06 Proceedings of the 8th international conference on Electronic commerce: The new e-commerce: innovations for conquering current barriers, obstacles and limitations to conducting successful business on the internet, ACM New York, NY, USA.
McKnight, D. H., Choudhury, V., & Kacmar, C. (2002). Developing and validating trust measures for e-commerce: An integrative approach. Information systems research, 13(3), 334-359.
McKnight, D. H., Cummings, L. L., & Chervany, N. L. (1998). Initial trust formation in new organizational relationships. Academy of Management Review, 23(3), 473-490.
Mills, H. (2011). Analytics: Turning data into dollars. Forward Focus, 1.
Moore, G. E. (1965). Cramming more components onto integrated circuits. Electronics, 38(8), 114-117.
Moorman, C., Zaltman, G., & Deshpande, R. (1992). Relationships between providers and users of market research: The dynamics of trust within and between organizations. Journal of marketing research, 29(3), 314.
Morgan, R. M., & Hunt, S. D. (1994). The commitment-trust theory of relationship marketing. The journal of marketing, 58(3), 20-38.
Nunnally, J. C. (1978). Psychometric theory (2nd ed.). New York: McGraw-Hill.
Ohm, P. (2010). Broken promises of privacy: Responding to the surprising failure of anonymization. . UCLA law review, 57, 1701.
Ohtonen, R., & Karjaluoto, H. (2016). Consumer Acceptance and Use of Instagram. Paper presented at the 2016 49th Hawaii International Conference on System Sciences.
Parasuraman, A. (2000). Technology Readiness Index (TRI) a multiple-item scale to measure readiness to embrace new technologies. Journal of service research, 2(4), 307-320.
Parrack, D. (2015). Do You Ever Actually Read Privacy Policies? MakeUseOf Poll. Retrieved from http://www.makeuseof.com/tag/read-privacy-policies-poll/
Pavlou, P. A., & Gefen, D. (2004). Building effective online marketplaces with institution-based trust. Information systems research, 15(1), 37-59.
Petter, S., Straub, D., & Rai, A. (2007). Specifying formative constructs in information systems research. MIS quarterly, 31(4), 623-656.
Podsakoff, P. M., MacKenzie, S. B., Lee, J. Y., & Podsakoff, N. P. (2003). Common method biases in behavioral research: a critical review of the literature and recommended remedies. Journal of applied psychology, 88(5), 879.
Podsakoff, P. M., & Organ, D. W. (1986). Self-reports in organizational research: Problems and prospects. Journal of management, 12(4), 531-544.
Quinn, E. (2009). Smart Metering and Privacy: Existing Laws and Competing Policies. SSRN Electronic Journal. doi:10.2139/ssrn.1462285
Rallapalli, M. (2012). Privacy Policies Considerations in Socio-Technical Systems. Technology and Investment, 3(2), 63. doi:10.4236/ti.2012.32009
Reichheld, F. F., & Schefter, P. (2000). E-loyalty: your secret weapon on the web. Harvard business review, 78(4), 105-113.
Rosen, J. (2012). The right to be forgotten. Stanford law review online, 64, 88.
Rouvroy, A. (2008). Réinventer l'art d'oublier et de se faire oublier dans la société de l'information? (S. Lacour Ed.): L'Harmattan.
Rys, M. (2011). Scalable SQL. Communications of the ACM, 54(6), 48-53.
Savage, M., & Burrows, R. (2007). The Coming Crisis of Empirical Sociology. Sociology, 41(5), 885-899.
Schacter, D. L., Gilbert, D. T., & Wegner, D. M. (2011). Psychology (Loose Leaf) (2 ed.). Macmillan Higher Education.
Scism, L., & Maremont, M. (2010). Insurers Test Data Profiles to Identify Risky Clients. The World Street Journal. Retrieved from http://www.wsj.com/articles/SB10001424052748704648604575620750998072986
Shapiro, S. P. (1987). The social control of impersonal trust. American journal of Sociology, 93(3), 623-658.
Singel, R. (2009). Netflix spilled your Brokeback Mountain secret, lawsuit claims. Threat Level (blog), Wired. Retrieved from https://www.wired.com/2009/12/netflix-privacy-lawsuit
Smith, H. J., Milberg, S. J., & Burke, S. J. (1996). Information privacy: measuring individuals' concerns about organizational practices. MIS quarterly, 20(2), 167-196.
South, B. (2007). Combining mandala and the Johari Window: An exercise in self-awareness. Teaching and Learning in Nursing, 2(1), 8-11.
Streiner, D. L., & Norman, G. R. (1995). Health Measurement Scales: A practical guide to their development and use (2 ed.). Oxford: Oxford University Press.
Supriatna, M. (2008). The Personal and Social Problems of Adolescent: The Supplement of Course Personal and Social Guidance. Development, 96(100), 10.
Sweeney, L. (2002). K-Anonymity: A Model for Protecting Privacy. International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, 10(5), 557. doi:10.1142/S0218488502001648
Taylor, S., & Todd, P. A. (1995a). Assessing IT Usage: The Role of Prior Experience. MIS quarterly, 19(2), 561-570.
Taylor, S., & Todd, P. A. (1995b). Understanding Information Technology Usage: A Test of Com- peting Models. Information systems research, 6(4), 144-176.
Tenenhaus, M. (2008). Component-based structural equation modelling. Total quality management, 19(7-8), 871-886.
Thibaut, J., & Walker., L. (1975). Procedural Justice: A Psychological Analysis. Erlbaum, Hillsdale, NJ.
Thurm, S. (2011). Next frontier in credit scores: Predicting personal behavior. The World Street Journal, 27.
Tyler, T. R. (1994). Psychological models of the justice motive: Antecedents of distributive and procedural justice. J. Personality Soc. Psych., 67, 850-863.
Urbach, N., & Ahlemann, F. (2010). Structural equation modeling in information systems research using partial least squares. JITTA: Journal of Information Technology Theory and Application, 11(2), 5-40.
Van Slyke, C., Shim, J. T., Johnson, R., & Jiang, J. J. (2006). Concern for Information Privacy and Online Consumer Purchasing. Journal of the Association for Information Systems, 7(6), 415-444.
Venkatesh, V., Morris, M. G., Davis, G. B., & Davis, F. D. (2003). User Acceptance of Information Technology: Toward a Unified View. MIS quarterly, 27(3), 425-478.
Verklan, M. T. (2007). Johari Window: a model for communicating to each other. . The Journal of perinatal & neonatal nursing, 21(2), 173-174.
Warren, S. D., & Brandeis, L. D. (1890). The right to privacy. Harvard law review, 193-220.
Westin, A. F. (1967). Privacy And Freedom. New York: Athenum.
Wong, R. C. (2012). Big data privacy. J Inform Tech Softw Eng, 2(5).
Wulf, K. D., Odekerken-Schröder, G., & Iacobucci, D. (2001). Investments in consumer relationships: A cross-country and cross-industry exploration. Journal of marketing research, 65(4), 33-50.
Yue, C., Xie, M., & Wang, H. (2010). An automatic HTTP cookie management system. Computer Networks, 54(13), 2182-2198.
Zucker, L. G. (1986). Production of trust: Institutional sources of economic structure, , 1840–1920. Research in organizational behavior., 8, 53-111.
李明怡. (2014). 社交網站成癮程度對使用者幸福感之影響─ 以台灣 Facebook 為例. 中山大學資訊管理學系研究所學位論文, 1-75.
俞小海. (2009). 人肉搜索的法律困境與出路. 河北青年管理幹部學院學報, 5.
胡世忠. (2013). 雲端時代的殺手級應用:Big Data海量資料分析. 天下雜誌.
徐振雄. (2016). 人肉搜索的暴力?網路隱私的探勘與違權思考. Paper presented at the 真理大學2016優質通識研討會.
財團法人台灣網路資訊中心. (2015). 2015年台灣寬頻網路使用調查報告. Retrieved from http://www.twnic.net.tw/download/200307/20150901e.pdf
財團法人台灣網路資訊中心. (2016). 2016年台灣寬頻網路使用調查報告. Retrieved from http://www.twnic.net.tw/download/200307/20160922e.pdf
馬特. (2009). 誰謀殺了隱私?從人肉搜索看隱私權的困境與出路. 月旦民商法, 24.
域動行銷. (2015). 域動行銷2015年第一季台灣網路、行動調查數據報告. Retrieved from
張國鴻. (2016). 被遺忘的權利. 北美智權報. Retrieved from http://www.naipo.com/Portals/1/web_tw/Knowledge_Center/Editorial/publish-206.htm
數位媒體研究團隊. (2015). 2015上半年手機遊戲遊玩時間分佈分析.
賴冠名. (2010). 使用者資訊隱私顧慮和網站引司機制對信任的影響— 以 Facebook 台灣使用者為例;The Influence of User’s Privacy Concern and Websites Privacy Mechanism on Trust─ An Example of Facebook Users in Taiwan. (碩士), 國立中央大學.
釋字第603號. (2005). 司法院大法官 Retrieved from http://www.judicial.gov.tw/constitutionalcourt/p03_01.asp?expno=603.
電子全文 Fulltext
本電子全文僅授權使用者為學術研究之目的,進行個人非營利性質之檢索、閱讀、列印。請遵守中華民國著作權法之相關規定,切勿任意重製、散佈、改作、轉貼、播送,以免觸法。
論文使用權限 Thesis access permission:校內校外完全公開 unrestricted
開放時間 Available:
校內 Campus: 已公開 available
校外 Off-campus: 已公開 available


紙本論文 Printed copies
紙本論文的公開資訊在102學年度以後相對較為完整。如果需要查詢101學年度以前的紙本論文公開資訊,請聯繫圖資處紙本論文服務櫃台。如有不便之處敬請見諒。
開放時間 available 已公開 available

QR Code