Responsive image
博碩士論文 etd-0621103-123213 詳細資訊
Title page for etd-0621103-123213
論文名稱
Title
資訊專業人員隱私保護行為的自我規範機制之研究
Self-Regulation Mechanisms in the Practice of Information Privacy
系所名稱
Department
畢業學年期
Year, semester
語文別
Language
學位類別
Degree
頁數
Number of pages
131
研究生
Author
指導教授
Advisor
召集委員
Convenor
口試委員
Advisory Committee
口試日期
Date of Exam
2003-06-09
繳交日期
Date of Submission
2003-06-21
關鍵字
Keywords
自我規範機制、資訊專業人員、隱私權
IS Personnel, Self-Regulation Mechanism, Privacy
統計
Statistics
本論文已被瀏覽 5761 次,被下載 3302
The thesis/dissertation has been browsed 5761 times, has been downloaded 3302 times.
中文摘要
隨著資訊科技愈來愈便捷有效率的進行監督、儲存、擷取及傳輸個人的資料,使用者的個人資訊因此可能造成實際或潛在性的危機。諸多調查研究指出,「隱私權」在e世代的資訊社會中是個難解且更應該被重視的議題。本研究首先由現象面的倫理關鍵時刻及理論面的自我規範機制切入探討資訊專業人員在察覺資訊隱私侵犯關鍵時刻的能力,以形成個人在面對倫理情境時的決策制訂程序。另一方面,企業的管理機制在個人的決策制訂程序中則扮演了另一種影響的力量。因此,本研究將從企業管理機制的守則與行為獎懲切入,瞭解在不同管理機制下資訊專業人員的自我規範機制之變化。
經過研究模式的驗證說明了本研究所提出的動機中樞應用於倫理決策研究的適用性。另一方面,由企業管理機制的探討也顯示了行為獎懲對於研究構面有直接的影響效果。本研究也發現,個人對其行為獎懲的預期在倫理判斷對倫理意圖的影響關係上存在顯著的調節效果,至於企業守則則是在隱私自我效能對倫理意圖的影響關係上有顯著的調節效果。研究結果的發現可以瞭解到實務上企業在制訂守則時需要有配套政策,才能發揮管理上最大的效果;而在理論層面上,藉由本研究模式的驗證也可應用於探討資訊倫理的其他議題。

Abstract
Today, many privacy abuses can be traced to the lack of organization policies governing the conduct of the personnel who are in charge of managing the information systems. IT professionals, who are the most important gatekeepers to the information privacy practices, have the oversight responsibility for information privacy since they have the most extensive knowledge of their organization’s systems and data. In this research, we have studied the impact of managerial policies concerning ethical codes and rewards/penalty perception on IS professionals’ self-regulation capacity against privacy abuses.
Specificially, based upon the Moment-of-Truth model and paradigm of self-regulation, we investigated how IS professionals’ ethical judgment, subjective norm, privacy self-efficacy and intention may reciprocally interact with their business environment that was characterized by its use of ethical codes and the rewards/penalty system. We first proposed an ethical dicision model based on the paradigm of self-regulation and validated the appropriateness of this model for studying information privacy. We then demonstrated how the perception of the rewards/penalty may impact the ethical judgment, subjective norm, privacy self-efficay, and ethical intention. We discovered that the rewards/penalty perception had a moderating effect on the relationship between ethical judgment and intention, and that the ethical codes had the moderating effect on the relationship between privacy self-efficacy and intention.

目次 Table of Contents
第一章、緒論 1
第一節、研究背景 1
(一)前言 1
(二)隱私權發展史 3
(三)隱私權的保護 5
第二節、研究動機 8
第三節、研究目的 11
第四節、研究流程 16
第二章、文獻探討 17
第一節、理論基礎 17
(一)理論基礎:從「倫理關鍵時刻」到「自我規範程序」 17
(二)理論基礎 21
(三)理論模式的形成 27
第二節、研究構面 29
(一)SCT「個人」層面 29
(二)SCT「環境」層面 34
(三)SCT「行為」層面 36
第三章、研究方法 38
第一節、研究架構與假說 38
(一)自我規範機制模式的建立 38
(二)管理機制對個人動機中樞的影響 41
第二節、研究變項 45
第三節、研究設計 47
第四節、資料蒐集程序 48
第五節、先導研究(Pilot Study) 49
(一)內容效度 49
(二)情境劇本交互作用檢定 51
第四章、統計分析 53
第一節、資料蒐集 53
(一)樣本特徵 54
(二)信度與效度 58
第二節、研究模式之驗證:Lisrel分析 65
第三節、企業守則與行為獎懲對研究構面的影響:MANOVA分析 69
第四節、企業守則與行為獎懲對研究模式的調節效果:
    Hierarchical Regression分析 72
第五節、人口統計變項對研究構面的影響 83
第五章、結論與建議 90
第一節、研究結果 90
(一)動機中樞(Motivation Hub)應用於倫理決策的模式驗證 90
(二)企業守則與行為獎懲對研究模式的影響 92
(三)隱私自我效能的重要性 95
第二節、研究貢獻 97
(一)學術研究上的貢獻 97
(二)管理實務上的貢獻 98
第三節、研究限制 100
第四節、未來研究方向 101
第六章、參考文獻 103
第七章、附錄 114
附錄一、情境故事 114
(一)劇本A(有守則,正向結果) 115
(二)劇本B(有守則,負向結果) 119
(三)劇本C(無守則,正向結果) 123
(四)劇本D(無守則,負向結果) 127
附錄二、個人基本資料 131
參考文獻 References
1. Ajzen, I. “Perceived behavioral control, self-efficacy, locus of control, and the theory of planned behavior.” Journal of Applied Social Psychology, 32, 2002, pp.665-683.
2. Ajzen, I. Attitude structure and behavior, 1989. In Pratkanis. A., Breckler, S.J. and Greenwald, A.G.(eds.), Attitude structure and function (pp. 241-274). Hillsdale: Lawrence Erlbaum Associates.
3. Ajzen, I. Attitudes, Personality, and Behavior, Chicago: Dorsey Press, 1988.
4. Ajzen, I. From Intentions To Actions: A theory of Planned Behaviour, 1985. In Kuhl, J. and Beckmann, J. (Eds.), Action-Control: From cognition to Behaviour (pp. 11-39). Heidelberg: Springer.
5. Ajzen, I., & Fishbein, M. “Understanding Attitudes and Predicting Social Behavior”, Prentice-Hall, Englewood Cliffs, NJ, 1980.
6. Anderson, J. C., & Gerbing, D. W. “Structural equation modeling in practice: A review and recommended two-step approach.” Psychological Bulletin, 103:3, 1988, pp.411-423.
7. Arnold, H. J. “Moderator variables: A clarification of conceptual, analytic, and psychometric issues.” Organizational Behavior and Human Performance, 29, 1982, pp.143-174.
8. Bagozzi, R.P. and Yi Y. “On the Evaluation of Structural Equation Models,” Journal of the Academy of Marketing Science, 16, Spring 1988, pp.74-79.
9. Bandura, A. & Cervone, D. “Differential Engagement of Self-Reactive Influences in Cognitive Motivation,” Organizational Behavior and Human Decision Process, 38, 1986, pp.92-113.
10. Bandura, A. & Jourden, F.G. “Self-Regulatory Mechanisms Governing the Impact of Social Comparison on Complex Decision Making,” Journal of Personality and Social Psychology, 60:6, 1991, pp.941-951.
11. Bandura, A. & Wood, R. “Effects of Perceived Controllability and Performance Standards on Self-regulation of Complex Decision Making,” Journal of Personality and Social Psychology, 56:5, 1989, pp.805-814.
12. Bandura, A. “Regulation of Cognitive Processes through Perceived Self-Efficacy,” Development Psychology, 25:5, 1989, pp.729-735.
13. Bandura, A. “The Psychology of chance encounters and path life paths,” American Psychological Journal, 37, 1982, pp.747-755.
14. Bandura, A. Self-Efficacy: The Exercise of Control, W.H. Freeman, New York, 1997.
15. Bandura, A. Social Foundations of Thought and Action, Prentice Hall, Englewood Cliffs, NJ, 1986.
16. Bandura, A. Social Learning Theory, Prentice-Hall, Englewood Cliffs, NJ, 1977.
17. Bandura, A. The Social Cognition Theory of Moral Thought and Action, New York, 1991.
18. Banerjee, D., Cronan, T.P. & Jones, T.W. “Modeling IT Ethics: A Study in Situational Ethics,” MIS Quarterly, 22:1, 1998, pp.31-60.
19. Banisar, D. “Privacy and Data Protection around the world,” Electronic Privacy Center, Privacy International, 1999. http://www.privacyinternational.org/
20. Barki, H. & Harwick, J. “User Participation, Conflict, and Conflict Resolution: The Mediating Roles of Influence,” Information Systems Research, 5:4, December 1994, pp. 422-438.
21. Barling, J. and Russell B. "Self-Efficacy Beliefs and Sales Performance," Journal of Organizational Behavior Management, 5, Spring 1983, pp.41-51.
22. Becker, M.H. & Rosenstock, I.M. “Comparing social learning theory and the health belief model.” In W. B. Ward (Ed.), Advances in health education and promotion, 2, 1987, pp. 245-249. Greenwich, CT: JAI.
23. Bem, D.J. Beliefs, Attitudes and Human Affairs. Belmont, CA: Brooks/Cole. 1970.
24. Bennett, C.J. Regulating Privacy. Cornell University Press, Ithaca, NY, 1992.
25. Bequai, A. How to Prevent Computer Crime: A Guide for Managers, John Wiley & Sons, New York, 1983.
26. Berenbeim, R.E. Corporate Ethics Practices, The Conference Board, New York, 1992, pp.7-10.
27. Betz, N. E., & Hackett, G.. “Applications of self-efficacy theory to career development,” Journal of Social and Clinical Psychology, 4, 1986, pp.279-289.
28. Bloombecker, B. Spectacular Computer Crimes, Dow Jones-Irwin, Homewood, IL, 1990.
29. Brown, I., Jr. and Inouye, D. K. “Learned helpless through modeling: The role of perceived similarity in competence,” Journal of Personality and Social Psychology, 36, 1978, pp.900-908.
30. Cass, E.L. and Zimmer F.G., Man and Work in Society, New York: Van Nostrand Reinhold, 1975, pp. 557-566
31. Chambliss C.A., & Murray E.J. “Efficacy Attribution, Locus of Control, and Weight Loss,” Cognitive Therapy and Research, 3, 1979, pp.349-354.
32. Chang, M.K. “Predicting Unethical Behavior: A Comparison of the Theory of Reasoned Action on the Theory of Planned Behavior,” Journal of Business Ethics, 17:16, 1998, pp.1828-1834.
33. Churchill, G.A., Jr. "A Paradigm for Developing Better Measures of Marketing Constructs," Journal of Marketing Research, 16, February 1979, pp.64-73.
34. Clarke, R.A. “information Technology and Dataveillance,” Communications of the ACM, 31:5, May 1988, pp.498-512.
35. Cohen J. & Cohen P. Applied Multiple Regression/Correlation Analysis for the Behavioral Sciences. Hillsdale, N.J.: Erlbaum, 1975.
36. Collins, A. Sex differences in psychoneuroendocrine stress responses. Phd. Dissertation, Univ Stokholm, 1985.
37. Compeau, D.R. & Higgins, C.A. “Computer Self-Efficacy: Development of a Measure and Initial Test,” MIS Quarterly, 19:2, 1995, pp.189-211.
38. Cressey, D.R., & Moore, C.A. “Managerial Values and Corporate Codes of Ethics,” California Management Review, 25:4, 1983, pp.53-77.
39. Csikszentmihalyi, Flow. Harpr Prenennial, Inc., New York. NY. 1990.
40. Culnan M.J. “Protecting Privacy Online: IS Self-Regulation Working?” Journal of Public Policy & Marketing, 19:1, Spring 2000, pp.20-26.
41. Culnan, J.J. “How did they get my name?: An exploratory investigation of consumer attitudes toward secondary information use,” MIS Quarterly, September 1993, pp.341-363.
42. Dalai Lama XIV, Bstan-‘dzin-rgya-mtsho. Ethics for a New Millennium, New York: Riverhead Books (Penguin Putnam). 1999.
43. David L.B. “Probing Privacy”, Gonaga Law Review, 12:4, 1997, pp.587-619.
44. De Vries, H.A., Dijkstra, M., & Kuhlman, P. “Self-efficacy: The third factor besides attitude and subjektive norm as a predictor of behavioral intentions.” Health Education Research, 3:3, 1988, pp.273-282.
45. Donaldson T., and Dunfee T.W. “Toward a unified conception of business ethics: Integrative Social Contracts Theory,” The Academic of Management Review, 19:2, 1994, pp.252-284.
46. Dubinsky, A.J. & Loken B. "Analyzing Ethical Decision Making in Marketing," Journal of Business Research, 19, September, 1989, pp.83-107.
47. Eachus, P. “Development of the Health Student Self-efficacy Scale,” Perceptual and Motor Skills, 77, 1993, pp.670.
48. Eachus, P., & Cassidy, S. “Self-efficacy, locus of control and styles of learningas contributing factors in the academic performance of student health professionals.” Proceedings of the first regional congress of psychology for professionals in the Americas, 1997, Mexico City.
49. Eachus, P; Locus of Control, Self-efficacy and Attributional style of Investment Professionals; Unpublished Ph.D Thesis. Manchester Metropolitan University. 1994.
50. Edwards, A.L. Techniques of Attitude Scale Construction. New York: Appleton-Century-Crofts. 1957.
51. Eining, S.T., & Chrsitensen, A.L., “A Psycho-Social Model of Software Piracy: The Development and Test of Model”, In Ethical Issue in Information Systems, DeJoie, R., Flower G., & Paradice D., Boyd & Fraser Publishing Company, Boston, MA, 1991.
52. Farhoomand, A.F. and Drury D.H. “Factors Influencing Electronic Data Interchange Success,” DATA BASE Advances, 27:1, Winter 1996, pp. 45-57.
53. Federal Trade Commission, "Law Enforcers Target "Top 10" Online Scams", October 31, 2000, available at http://www.ftc.gov/opa/2000/10/topten.htm
54. Federal Trade Commission, Privacy Online: A Report to Congress, June, 1998, 1999, available at http://www.ftc.gov/privacy/
55. Ferrel O.C., & Gresham L.G. “A Contingency Framework for Understanding Ethical Decision Making in Marketing,” Journal of Marketing, 49, Summer 1985, pp.87-96.
56. Ferrel, O.C. & Weaver, K.M. “Ethical Beliefs of Marketing Managers,” Journal of Marketing, 42, July 1978, pp.69-73.
57. Fishbein, M., & Ajzen, I. Beliefs, Attitude, Intentions and Behavior: An Introduction to theory and Research, Addition-Wesley, Boston, MA, 1975.
58. Fishbein, Martin, and Icek Ajzen. Understanding Attitudes and Predicting Social Behavior. New Jersey: Prentice Hall, 1980
59. Flaherty, D.H. Protecting Privacy in Surveillance Societies. University of North Carolina Press, Chapel Hill, NC, 1989.
60. Fornell, C. & Larcker, V. F. “Evaluating structural equation models with unobservable variables and measurement error.” Journal of Marketing Research, 18, 1981, pp.39-50.
61. Fornell, C. (Ed.). A Second Generation Of Multivariate Analysis, Volume 1: Methods. New York: Praeger. 1982.
62. Frayne, C. A., & Latham, G. P. “Application of social learning theory to employee self-management of attendance,” Journal of Applied Psychology, 72:3, 1987, pp.387-392.
63. Gentile, M., and Sviokla, J.J. “Information Technology in Organizations: Emerging Issues in Ethics & Policy,” Harvard Business School, Boston, MA, 1990.
64. Georgia Tech Research Corporation, WWW User Survey, 7th Survey in 1997, 10th Survey in 1998, available at http://www.cc.gatech.edu/gvu/user_surveys/
65. Gist, M.E. & Mitchell, T. R. “Self-Efficacy: A Theoretical Analysis of Its Determinants and Malleability,” Academy of Management Review, 17:2, 1992, pp.183-211.
66. Green, H., Catherine Y., & Paul C.J. “A Little Net Privacy, Please,” BusinessWeek, March 16, 1998, pp.98-102.
67. Hafner, K., & Markoff, J. Cyberpunk: Outlaws and Hackers on the Computer Frontier, Simon & Schuster, New York, 1991.
68. Hair J.F., Anderson R.E., Thatham R.L., & Black W.C. Multivariate Data Analysis, Fifth Edition, Prentice-Hall, 1998.
69. Harrington, S.J. “The Effect of Codes of Ethics and Personal Denial of Responsibility on Computer Abuse Judgments and Intentions,” MIS Quarterly, September 1996, pp.257-278.
70. Hartwick, J. & Barki, H. “Explaining the Role of User Participation in Information System Use,” Management Science, 40:4, 1994, PP.440-465.
71. Hill, R.J. “Attitudes and Behavior”. In M. Rosenberg and R.H. Turner (Eds), Social Psychology: Sociological Perspectives, pp.347-377. New York: Basic Books. 1981.
72. Hollenbeck, J.R. & Brief, A.P., “The Effects of Individual Differences and Goal Origin on Goal Setting and Performance,” Organizational Behavior and Human Decision Processes, 40, 1987, 392-414.
73. Hunt S.D., & Vitell S. “A General Theory of Marketing Ethics,” Journal of MacroMarketing, 6, Spring 1986, pp.5-16.
74. Hunt, S.D. & Vasquez-Parrage, A.Z. “Organizational Consequences, Marketing Ethics, and Salesforce Supervision,” Journal of Marketing Research, XXX, February 1993, pp.78-90.
75. Hunt, S.D., L.B. Chonko and J.B. Wilcox, "Ethical Problems of Marketing Researchers," Journal of Marketing Research, XXI, August 1984, pp.309-324.
76. Igbaria M., Guimaraes T. & Davis G.B. "Testing the Determinants of Microcomputer Usage via a Structural Equation Model," Journal of Management Information Systems, 11:4, Spring 1995 pp. 87-114.
77. Jansen E. & Von Glinow M.A. “Ethical Ambivalence and Organizational Reward Systems,” Academy of Management Review, 10, October, 1985, pp.814-822.
78. Jones, G. R. “Socialization tactics, self-efficacy, and newcomers’ adjustment to organizations,” Academy of Management Journal, 29, 1986, pp.262-279.
79. Jones, T.M. “Ethical Decision Making By Individuals in Organizations: An Issue-Contingent Model,” Academy of Management Review, 16:2, 1991, pp.366-395.
80. Joreskog, Karl and Dag Sorbom. LISREL 7: A Guide to the Program and Applications. Chicago: SPSS Inc. 1989.
81. Kallman, E.A. & Grillo J.P. Ethical Decision Making and Information Technology: An Introduction with Cases, Second Edition. New York: McGraw-Hill. 1996.
82. Karloy, P. “Mechanisms of Self-Regulation: A Systems View,” Annual Review of Psychology, 44, 1993, pp.23-51.
83. Kasen, S., Vaughn, R. D., & Walter, H. J. “Self-efficacy for AIDS preventive behaviors among tenth grade students.” Health Education Quarterly, 19:2, 1992, pp.187-202.
84. Kohlberg, L. “Moral Stages and Moralization: The Cognitive-Developmental Approach”, in T. Lickona (ed.), Moral Development and Behavior (Holt, Rinehart & Winston, New York), 1976, pp.31-53.
85. Kohlberg, L. The Meaning and Measurement of Moral Development. Worcester, MA: Clark University Press. 1981.
86. Kuo, F.Y. & Hsu, M.H. “Development and Validation of Ethical Computer Self-Efficacy Measure: The Case of Softlifting,” Journal of Business Ethics, 32:4, 2001, pp. 299-315.
87. Latham, G. P., & Frayne, C. A. “Self-management training for increasing job attendance: A follow-up and a replication,” Journal of Applied Psychology, 74:3, 1989, pp.411-416.
88. Lew D. “Video Games: Dungeons, Dragons… and Quarters”, The Stanford Daily, October 12, 1983, p.12.
89. Loch, K.D. & Conger, S. “Evaluating Ethical Decision Making and Computer Use,” Communication of ACM, 39:7, 1996, pp.74-83.
90. Locke E.A., & Latham G.P. A theory of goal setting and task performance. 1990. Englewood Cliffs, NJ: Prentice-Hall
91. Locke, E.A. “The Motivation Sequence, the Motivation Hub, and the Motivation Core,” Organizational Behavior and Human Decision Process, 50, 1991, pp.288-299.
92. Locke, E.A., Frederick, E., & Lee, C. “The Effect of Self-efficacy, Goals, and Task Strategies on Task Performance,” Journal of Applied Psychology, 69, 1984, pp.241-251.
93. Madden, T.J. Ellen, P.S., & Ajzen, I. “A comparison of the theory of planned behaviour and the theory of reasoned action”. Personality and Social Psychology Bulletin, 18, 1992, pp.3- 9.
94. Madsen, W. Handbook of Personal data Protection. Macmillan, New York, 1992.
95. Manley, W.J., Executive’s Handbook of Model Business Conduct Codes, Prentice-Hall, Englewood Cliffs, NJ, 1991, pp.3-10.
96. Marakas, G.M., Yi, M.Y., & Johnson, R.D. “The Multilevel and Multifaced Character of Computer Self-Efficacy: Toward Clarification of the Construct and an Integrative Framework for Research,” Information System Research, 9:2, 1998, 126-163.
97. Mason, R.O. “Four ethical issues of the information age,” MIS Quarterly, 10:1, March 1986, pp.5-12.
98. Mason, R.O., Mason, F.M., & Culnan, M.J., Ethics of Information Management, Sage Publications, 1995.
99. Mathieson, K. "Predicting User Intentions: Comparing the Technology Acceptance Model with the Theory of Planned Behavior," Information Systems Research, 2, 1991, pp.173-191.
100. Mengüç, B. “Organizational Consequences, marketing Ethics and Salesforce Supervision: Further Empirical Evidence,” Journal of Business Ethics, 17, 1998, pp.333-352.
101. Milberg, S.J., Burke, S.J., Smith, J., and Kallman, E.A. “Values, Personal information privacy, and Regulatory Approaches,” Communications of the ACM, 38:12, Dec. 1995, pp.65-74.
102. Miller, A. The Assault on Privacy: Computers, Data Banks and Dossiers, University of Michigan Press, Ann Arbor, MI, 1971.
103. Miner J.B, “Twenty years of research on role-motivation theory of managerial effectiveness.” Personnel Psychology, 31, 1978, pp.739-760.
104. Moore, G.C. & Benbasat, I., "An Empirical Examination of a Model of the Factors Affecting Utilization of Information Technology by End-Users", Working Paper, University of British Columbia, Faculty of Commerce, Nov, 1993.
105. Nunnally, J. C. Psychometric theory (2nd ed.). New York: McGraw-Hill. 1978.
106. Osgood, C.E., Suci, G.J. & Tannenbaum, P.H. The Measurement of Meaning. Urbana, IL: University of Illinois Press. 1957.
107. Oskamp, S. Attitudes and Opinions. Englewood-Cliffs, NJ: Prentice-Hall. 1977.
108. Oz, E. “Ethical Standards for Information Systems Professionals: A Case for a Unified code,” MIS Quarterly, 16:4, December 1992, pp.423-433.
109. Parker, D.B., Swope S., & Barker, B.N. Ethical Conflicts in Information and Computer Science, Technology, and Business, QED Information Sciences, Inc. Wellesley, MA, 1990.
110. Pearson, F.S., & Weiner, N.A. “Criminology: Toward an Integration of Criminological Theories,” The Journal of Criminal Law & Criminology, 76:1, 1985, pp.116-150.
111. Randall, D.M. & Gibson A.M. “Ethical decision making in the medical profession: An application of the theory of planned behavior.” Journal of Business Ethics, 10, 1991, pp.111-122.
112. Rest, J. Moral Development: Advances in Research and Theory, Praeger, New York, 1986.
113. Robin D.P., & Reidenbach R.E. “Social Responsibility, Ethics, and Marketing Strategy: Closing the Gap Between Concept and Application,” Journal of Marketing, 51, January 1987, pp.44-58.
114. Sandra J.M., Sandra J.B., Smith H.J., and Ernest A.K. “Values, Personal Information, Privacy, and Regulatory Approaches,” Communications of the ACM, 38:12, December 1995, pp.65-74.
115. Schunk, D.H. “Modeling and attributional effects on children’s achievement: a self-efficacy analysis,” Journal of Educational Psychology, 73, 1981, pp.93-105.
116. Schwartz, P.M. “Privacy and democracy in cyberspace,” Vanderbilt Law Review, 52:6, Nov 1999, pp. 1609-1701.
117. Schwarzer, R. Self-efficacy: Thought Control of Action; London: Hemisphere. 1992.
118. Sheppard, B.H., Hartwick, J., & Warshaw, P.R. “The theory of reasoned action: A meta-analysis of past research with recommendations for modifications and future research,” Journal of Consumer Research, 15, 1988, pp.325-343.
119. Simon D. "Europe to U.S.: No Privacy, No Trade", Wired Magazine, 1998, May, pp.135.
120. Smith, H.J. Managing Privacy: Information Technology and Corporate America. University of North Carolina Press, Chapel Hill, NC, 1994.
121. Stevens, B. “An Analysis of Corporate Ethical Code Studies: Where Do We Go From Here?” Journal of Business Ethics, 13:1, 1994, pp.63-61.
122. Straub, D.W., & Nance, W.D. “Discovering and Disciplining Computer Abuse in Organizations,” MIS Quarterly, 14:1, March 1990, pp.45-55.
123. Straub, D.W., Carlson, P.J., & Jones, E.H. “Deterring Cheating by Student Programmers: A Field Experiment in Computer Security,” Journal of Management Systems, 5:1, 1993, pp.33-48.
124. Susannah, F. “Trust and Privacy Online: Why Americans want to rewrite the rule”, The Pew Internet & American Life Project, Aug 2000, available at http://www.pewinternet.org/
125. Taylor, S.E., Locke E. A., Lee, C., & Gist, M. E. “Type A behavior and faculty research productivity: What are the mechanisms?” Organizational Behavior and Human Decision Processes, 34, 1984, pp.402-418.
126. Tittle, C.R. Sanctions and Social Deviance: The Question of eterrence, Praeger Publishers, New York, 1980.
127. Trevino, L.K. “Ethical Decision Making in Organizations: A Person-Situation Interactionist Model,” Academy of Management Review, 11:3, 1986, pp.601-617.
128. Tymchuk, A. J.. Ethical decision making and psychological treatment. Journal of Psychiatric Treatment and Evaluation, 3, 1981, pp.507-513.
129. Vallerand, R.D., Deshaies, P., Cuerrier, J., Pelletier, J.G., & Mongeau, C. “Ajzen and Fishbein’s Theory of Reasoned Action as Applied to Moral Behavior: A Confirmatory analysis,” Journal of Personality and Social Psychology, 62, 1992, pp.98-109.
130. Van Hoose, W.H. & Paradise, L.V. Ethics in Counseling and Psychother-apy: Perspectives in Issues and Decision Making. Cranston, R.I.: Carroll Press. 1979.
131. Vroom V.H., Work and Motivation. New York: John Wiley & Sons, 1964.
132. Warren, S.D. and Brandeis, L.D., “The Right to Privacy”, Harvard Law Review, 193, 1890, pp.193-220
133. Weaver, K.M. & Ferrel O.C. “The Impact of Corporate Policy on Reported Ethical Beliefs and Behavior of marketing Practitioners.” In Contemporary Marketing Thought, Barnett Breenberg and Danny N. Bellenger, eds., Chicago: American marketing. 1977.
134. Westin, A.F. Privacy and Freedom, Atheneum, New York, NY, 1967.
135. Wood, R. & Bandura, A. “Social Cognitive Theory of Organizational Management,” Academy of Management Review, 14:3, 1989, 361-384.
136. Zaichkowsky, J.L. “Measuring the Involvement Construct,” Journal of Consumer Research, 12, December 1985, pp.341-354.
137. 許孟祥、郭峰淵、林杏子、朱彩馨、游佳萍, “個人資訊隱私:倫理效能之量表的發展與驗證”,第九卷第三期, 2001年秋季號, 中山管理評論, pp.373-394.
電子全文 Fulltext
本電子全文僅授權使用者為學術研究之目的,進行個人非營利性質之檢索、閱讀、列印。請遵守中華民國著作權法之相關規定,切勿任意重製、散佈、改作、轉貼、播送,以免觸法。
論文使用權限 Thesis access permission:校內立即公開,校外一年後公開 off campus withheld
開放時間 Available:
校內 Campus: 已公開 available
校外 Off-campus: 已公開 available


紙本論文 Printed copies
紙本論文的公開資訊在102學年度以後相對較為完整。如果需要查詢101學年度以前的紙本論文公開資訊,請聯繫圖資處紙本論文服務櫃台。如有不便之處敬請見諒。
開放時間 available 已公開 available

QR Code