Responsive image
博碩士論文 etd-0613115-130912 詳細資訊
Title page for etd-0613115-130912
論文名稱
Title
機不可失:由機緣理論分析智慧型手機的監視可能性
Smartphone surveillance in view of affordance theory
系所名稱
Department
畢業學年期
Year, semester
語文別
Language
學位類別
Degree
頁數
Number of pages
93
研究生
Author
指導教授
Advisor
召集委員
Convenor
口試委員
Advisory Committee
口試日期
Date of Exam
2015-05-29
繳交日期
Date of Submission
2015-07-13
關鍵字
Keywords
智慧型手機、監視、機緣理論、隱私、全景敞視主義
smartphone, surveillance, privacy, affordance theory, panopticism
統計
Statistics
本論文已被瀏覽 5692 次,被下載 78
The thesis/dissertation has been browsed 5692 times, has been downloaded 78 times.
中文摘要
智慧型手機的出現改變人們的生活型態,卻也將監視推向另一高峰。智慧型手機中的應用程式、適地性服務、定位系統等功能,能夠將使用者的資訊存取至資料庫,並傳布在社群網站中,令社交圈的其他使用者能夠取得該資訊。本研究針對智慧型手機揭露使用者資訊至社群網站的現象,探討在資訊與傳播科技的環境下,監視型態與隱私定義的轉變。
  本研究透過經驗取樣法與深度訪談法,針對智慧型手機的使用情形,尋求對新監視與隱私型態的解讀。從機緣理論的角度,分析智慧型手機提供的監視可能性,發現智慧型手機的貼身與便利特色產生監視的機緣,而機緣會隨著使用者的心態與管理行為調整,並影響人與人之間的互動。此外,監視的權力關係能夠由使用者的使用模式調整,透過智慧型手機的監視行為也有效的達到社交控制。以上兩者的內涵,進而改變隱私的界定,而個人對隱私的敏感程度能夠影響私人空間與公共空間的範疇。本研究亦發現在智慧型手機普及使用的社會下,產生永恆監視的社交型態,以監視作為人際交往的一種新型態,並且發展出永恆連結的社交生活。
Abstract
As technology develops, smartphones are at once changing lifestyles and also pushing surveillance to a new peak. Smartphone functions like apps, location-based services (LBS), and global positioning system (GPS) enable the archival of users’ information into databases for subsequent broadcast via social media, allowing other users in the same social circle to obtain this information. The main goal of this study is to investigate the transformation of surveillance and privacy with regard to information collected by smartphones and revealed to social media within the context of mobile technology and computer-mediated communication.
This study adopts the experience sampling method and in-depth interviews. The results of the study indicate that convenience and portability lead to opportunities for surveillance. These opportunities change with users’ attitudes and usage behavior, influencing personal interactions. In addition, surveillance is controlled by users, and it becomes social surveillance through monitoring from smartphones. As a consequence, the definition of privacy changes, and the degree to which individuals are sensitive to privacy influences the boundaries of the private and public spheres. Furthermore, owing to the prevalence of smartphones, surveillance is becoming a new social style, creating a society of perpetual surveillance.
目次 Table of Contents
第一章 緒論…………………………………………………………………………1
 第一章 緒論…………………………………………………………………………1
 第一節 研究背景與研究動機……………………………………………………1
 第二節 研究目的…………………………………………………………………3
第二章 文獻探討……………………………………………………………………5
 第一節 智慧型手機的永恆性連結或永恆性監視………………………………5
第二節 機緣與智慧型手機的機緣分析………………………………………....7
一、機緣理論……………………………………………………………………7
二、智慧型手機的機緣………………………………………………………..10
三、小結………………………………………………………………………..11
第三節 監視的型態轉移………………………………………………………..12
一、何謂監視…………………………………………………………………..12
二、新科技的監視型態………………………………………………………..12
第四節 隱私的定義與發展……………………………………………………..17
第三章 研究方法…………………………………………………………………..22
 第一節 經驗取樣法(Experience Sampling Method)操作…………………..22
 第二節 經驗取樣法之問卷題項………………………………………………..25
第三節 深度訪談法(In-depth interview)操作………………………………25
第四節 參與者的挑選…………………………………………………………..26
第四章 資料分析…………………………………………………………………..28
 第一節 經驗取樣問卷分析……………………………………………………..28
 第二節 監視機緣的產生與變化………………………………………………..39
 一、智慧型手機擁有的監視機緣………………………………………………..40
 二、使用者的自主決定智慧型手機的監視機緣………………………………..42
 三、小結……………………………………………………………….………….45
 第三節 智慧型手機的新監視型態………………………………..……………45
 一、權力的流動……………………………………………………..……………46
 二、過度親密的社交………………………………………………..……………47
 三、小結……………………………………………………………..……………51
 第四節 隱私控管的無限延伸…………………………………………………..52
 一、隱私界線的推移……………………………………………………………..52
 二、隱私自我保護………………………………………………………………..56
 三、小結…………………………………………………………………………..59
第五章 研究結論與建議…………………………………………………..………60
 第一節 研究發現…………………………………………………………..……60
 一、永恆監視的社交型態……………………………………………………..…60
 二、新科技中的隱私解讀………………………………………………………..61
 三、永恆連結的社交生活……………………………………………………..…63
 第二節 研究貢獻……………………………………………………………..…63
 一、學術貢獻…………………………………………………………………..…63
 二、實務貢獻…………………………………………………………………..…67
 第三節 研究限制與未來建議………………………………………………..…68
參考文獻……………………………………………………………………………..70
附錄…………………………………………………………………………………..77
圖次
圖3-1 參與者挑選條件……………………………………………………………27
表次
表3-1 經驗取樣法方式與種類整理………………………………………………24
表4-1 智慧型手機使用量……………………………………………………...….29
表4-2 智慧型手機功能使用情形……………………………………………...….30
表4-3 Facebook功能使用情形…………………………………………………...31
表4-4 觀察自己手機顯示的個人資訊………………………………………...….33
表4-5 個人資訊管理行為…………………………………………………………35
表4-6 觀察好友行為………………………………………………………………36
表4-7 觀察好友個人資訊的頻率…………………………………………………37
表4-8 觀察好友的內容……………………………………………………………38
參考文獻 References
管中祥、陳伊禎(2003)。〈一個地方頻道的興衰: 全球資本與地方文化的消 長〉,《傳播與管理研究》,2: 105-133。

陳向明(2002)。《社會科學質的研究》。台北:五南。

資策會(2013年11月)。〈2013年台灣民眾行動與無線上網現況〉。取自http://www.find.org.tw/find/home.aspx?page=many&id=362

劉北成、楊遠嬰譯(1992)。《規訓與懲罰-監獄的誕生》,台北:桂冠圖書股份有限公司。(原書Foucault, M. [1977]. Discipline and punish: the birth of prison. New York: Random House.)

劉倚帆(2011)。〈初探智慧型手機如何改變社會時空經驗〉,《中華傳播學刊》。

鍾蔚文、陳百齡、 陳順孝(2006)。〈數位時代的技藝: 提出一個分析架構〉,《中華傳播學刊》(10), 233-264。

Acquisti, A., & Gross, R. (2006, January). Imagined communities: Awareness, information sharing, and privacy on the Facebook. In Privacy enhancing technologies (pp. 36-58). Springer Berlin Heidelberg.

Akin, L. L. (2009). Activity monitors aka: Cell Phone and Computer Eavesdroppers. Forensic Examiner, 18(2).

Albrechtslund, A. (2008). Online social networking as participatory surveillance.First Monday, 13(3).

Andrejevic, M. (2005). The Work of Watching One Another: Lateral Surveillance, Risk, and Governance. Mark Andrejevic, 13.

Archer, J. L. (1980). Self-disclosure. In D.Wegner & R. Vallacher (Eds.). The self in social psychology. 183-204.

Best, K. (2009). When Mobiles Go Media: Relational Affordances and Present-to-Hand Digital Devices. Canadian Journal of Communication, 34(3).

Boyd, D., & Ellison, N.(2007). Social network sites: Definition, history, and scholarship.Journal of Computer‐Mediated Communication, 13(1), 210-230.

Bradner, E. (2000). Social Affordances: Understanding Technology Mediated Social Networks at Work. In annual meeting of the Association of Internet Researchers, Minneapolis, MN.

Bradner, E. (2001, March). Social affordances of computer-mediated communication technology: understanding adoption. In CHI'01 Extended Abstracts on Human Factors in Computing Systems (pp. 67-68). ACM.

Castillo, J. J. (2009). Snowball sampling. Online im Internet: http://www. experiment-resources. com/snowball-sampling. html, Stand.

Christin, D., Reinhardt, A., Kanhere, S. S., & Hollick, M. (2011). A survey on privacy in mobile participatory sensing applications. Journal of Systems and Software, 84(11), 1928-1946.

Clarke, R. (1988). Information technology and dataveillance. Communications of the ACM, 31(5), 498-512.

Consolvo, S., & Walker, M. (2003). Using the experience sampling method to evaluate ubicomp applications. IEEE Pervasive Computing, 2(2), 24-31.

Coulthard, D., & Keller, S. (2010, January). A social ecological model of ICT cooption: surveillance creep in the information age. In ACIS 2010: Proceedings of the 21st Australasian Conference on Information Systems. ACIS.

Csikszentmihalyi, M., Larson, R., & Prescott, S. (1977). The ecology of adolescent activity and experience. Journal of youth and adolescence, 6(3), 281-294.

Debatin, B., Lovejoy, J. P., Horn, A. K., & Hughes, B. N. (2009). Facebook and online privacy: Attitudes, behaviors, and unintended consequences. Journal of Computer‐Mediated Communication, 15(1), 83-108.

Derlega, V. J., Metts, S., Petronio, S., & Margulis, S. T. (1993). Self-disclosure. Newbury Park, CA: Sage.

DeVries, W. T. (2003). Protecting Privacy in the Digital Age. Berkeley Tech. LJ,18, 283.

Dominic, R. (2014, January 29). Facebook posts record quarterly results and reports $1.5bn profit for 2013. The Guardian, Retrieved from http://www.theguardian.com/technology/2014/jan/29/facebook-record-quarterly-results?CMP=EMCNEWEML6619I2

Dreyfus, H. L. (1996). The current relevance of Merleau-Ponty's phenomenology of embodiment. The Electronic Journal of Analytic Philosophy, 4, 1-16.

Farinosi, M. (2011). Deconstructing Bentham's Panopticon: The New Metaphors of Surveillance in the Web 2.0 Environment. TripleC (Cognition, Communication, Co-Operation): Open Access Journal for a Global Sustainable Information Society, 9(1).

Ferguson, R. (2011). It ain’t the Timeline, it’s the Ticker, Doc. Retrieved from http://countermeasures.trendmicro.eu/it-aint-the-timeline-its-the-ticker-doc/

Gaver, W. W. (1991, March). Technology affordances. In Proceedings of the SIGCHI conference on Human factors in computing systems (pp. 79-84). ACM.

Geser, H. (2006). Is the cell phone undermining the social order?: Understanding mobile technology from a sociological perspective. Knowledge, Technology & Policy, 19(1), 8-18.

Gibson, J. J. (1979). The ecological approach to visual perception.

Goggin, G. (2012). Cell phone culture: Mobile technology in everyday life. Routledge.

Gordon, E., & e Silva, A. D. S. (2011). Net locality: Why location matters in a networked world. John Wiley & Sons.

Gordon, E., & e Silva, A. D. S. (2011). Net locality: Why location matters in a networked world. John Wiley & Sons.

Govani, T., & Pashley, H. (2005). Student awareness of the privacy implications when using Facebook. unpublished paper presented at the “Privacy Poster Fair” at the Carnegie Mellon University School of Library and Information Science, 9.

Greeno, J. G. (1994). Gibson's affordances.

Gross, R., & Acquisti, A. (2005, November). Information revelation and privacy in online social networks. In Proceedings of the 2005 ACM workshop on Privacy in the electronic society (pp. 71-80). ACM.

Haggerty, K. D., & Ericson, R. V. (2000). The surveillant assemblage. The British journal of sociology, 51(4), 605-622.

Hargittai, E. (2010). Facebook privacy settings: Who cares?. First Monday,15(8).

Hartson, R. (2003). Cognitive, physical, sensory, and functional affordances in interaction design. Behaviour & Information Technology, 22(5), 315-338.

Jiang, L., Bazarova, N. N., & Hancock, J. T. (2011). The Disclosure–Intimacy Link in Computer‐Mediated Communication: An Attributional Extension of the Hyperpersonal Model. Human Communication Research, 37(1), 58-77.

Joinson, A. N. (2008, April). Looking at, looking up or keeping up with people?: motives and use of facebook. In Proceedings of the SIGCHI conference on Human Factors in Computing Systems (pp. 1027-1036). ACM.

Jones, H., & Soltren, J. H. (2005). Facebook: Threats to privacy. Project MAC: MIT Project on Mathematics and Computing, 1, 1-76.

Kane, M. J., Brown, L. H., McVay, J. C., Silvia, P. J., Myin-Germeys, I., & Kwapil, T. R. (2007). For whom the mind wanders, and when an experience-sampling study of working memory and executive control in daily life.Psychological science, 18(7), 614-621.

Katz, J. E. (1999:17). Connections: Social and cultural studies of the telephone in American life.

Katz, J. E., & Aakhus, M. (Eds.). (2002). Perpetual contact: Mobile communication, private talk, public performance. Cambridge University Press.

Katz, J. E., & Sugiyama, S. (2006). Mobile phones as fashion statements: evidence from student surveys in the US and Japan. New media & society, 8(2), 321-337.

Kizza, J. M., & Ssanyu, J. (2005). Workplace surveillance. Electronic Monitoring in the Workplace: Controversies and Solutions, ed. J. Weckert, Hershey, PA: Idea Group, 1-18.

Ling, R. (2004). The mobile connection: The cell phone's impact on society. Morgan Kaufmann.

Lyon, D. (2001). Surveillance society: Monitoring everyday life. McGraw-Hill International.

Mann, S., Nolan, J., & Wellman, B. (2003). Sousveillance: Inventing and Using Wearable Computing Devices for Data Collection in Surveillance Environments.Surveillance & Society, 1(3).

Marx, G. T. (1985). The Surveillance Society-The Threat Of 1984-Style Techniques. Futurist, 19(3), 21-26.

Marx, G. T. (1996). Privacy and technology. Telektronikk, 92, 40-48.

Marx, G. T. (2001). Murky conceptual waters: The public and the private. Ethics and Information technology, 3(3), 157-169.

Marwick, A. (2012). The public domain: Surveillance in everyday life. Surveillance & Society, 9(4), 378-393.

Mathiesen, T. (1997). The Viewer Society Michel Foucault'sPanopticon'Revisited. Theoretical criminology, 1(2), 215-234.
Norman, D. A. (1988). The psychology of everyday things.

Maxfield, C. (2013, March 18). Embedded vision: Is your smartphone watching you? EETimes, Retrieved from http://www.eetimes.com/author.asp?section_id=30&doc_id=1287110

Moloney, M., & Bannister, F. (2009, January). A privacy control theory for online environments. In System Sciences, 2009. HICSS'09. 42nd Hawaii International Conference on (pp. 1-10). IEEE.

Norman, D. A. (1999). Affordance, conventions, and design. interactions, 6(3), 38-43.

Orwell, G. (1949). Nineteen Eighty-Four. London, UK: Secker and Warburg.

Parks, M. R., & Floyd, K. (1996). Making friends in cyberspace. Journal of Computer‐Mediated Communication, 1(4), 0-0.

Poster, M. (1990). The mode of information: Poststructuralism and social context. University of Chicago Press.

Pinchot, J., Paullet, K., & Rota, D. (2011). How mobile technology is changing our culture. Journal of Information Systems Applied Research, 4(1), 39.

Regan, P. M. (1995). Legislating privacy: Technology, social values, and public policy. Univ of North Carolina Press.

Slettemeås, D. (2009). RFID—the “Next Step” in Consumer–Product Relations or Orwellian Nightmare? Challenges for Research and Policy. Journal of Consumer Policy, 32(3), 219-244.

Stutzman, F. (2006). An evaluation of identity-sharing behavior in social network communities. Journal of the International Digital Media and Arts Association,3(1), 10-18.

Sting (1983). Every Breath You Take. On Synchronicity [CD]. London: A&M

Tokunaga, R. S. (2011). Social networking site or social surveillance site? Understanding the use of interpersonal electronic surveillance in romantic relationships. Computers in Human Behavior, 27(2), 705-713.

Turkle, S. (2006). Always-on/always-on-you: The tethered self. Erscheint in Handbook of Mobile Communication and Social Change. Hrsg. v. James Katz. Cambridge, MA: MIT Press. Vorabveröffentlichung unter‹ http://web. mit. edu/sturkle/www/Always-on% 20Always-on-you_ The% 20Tethered% 20Self_ST. pdf›(18.7. 07).

Valkenburg, P. M., & Peter, J. (2009). The effects of instant messaging on the quality of adolescents’ existing friendships: A longitudinal study. Journal of Communication, 59(1), 79-97.

Warren, S. D., & Brandeis, L. D. (1890). The right to privacy. Harvard law review, 193-220.

Wellman, B., Quan‐Haase, A., Boase, J., Chen, W., Hampton, K., Díaz, I., & Miyata, K. (2003). The social affordances of the Internet for networked individualism. Journal of Computer‐Mediated Communication, 8(3), 0-0.

Wen, H. J., & Gershuny, P. (2005). Computer-based monitoring in the American workplace: Surveillance technologies and legal challenges. Human Systems Management, 24(2), 165-173.

Westlake, E. J. (2008). Friend me if you Facebook: Generation Y and performative surveillance. TDR/The Drama Review, 52(4), 21-40.

Whitaker, R. (1998). The End of Privacy: How Total Surveillance Is Becoming a Reality.
電子全文 Fulltext
本電子全文僅授權使用者為學術研究之目的,進行個人非營利性質之檢索、閱讀、列印。請遵守中華民國著作權法之相關規定,切勿任意重製、散佈、改作、轉貼、播送,以免觸法。
論文使用權限 Thesis access permission:自定論文開放時間 user define
開放時間 Available:
校內 Campus: 已公開 available
校外 Off-campus: 已公開 available


紙本論文 Printed copies
紙本論文的公開資訊在102學年度以後相對較為完整。如果需要查詢101學年度以前的紙本論文公開資訊,請聯繫圖資處紙本論文服務櫃台。如有不便之處敬請見諒。
開放時間 available 已公開 available

QR Code