Responsive image
博碩士論文 etd-0727115-211706 詳細資訊
Title page for etd-0727115-211706
論文名稱
Title
Facebook上的利益與風險之拉鋸:人氣需求與隱私顧慮對於Facebook隱私管理之影響
The Tension between Benefit and Risk on Facebook: The Effect of Need for Popularity and Privacy Concern on Facebook Privacy Management
系所名稱
Department
畢業學年期
Year, semester
語文別
Language
學位類別
Degree
頁數
Number of pages
85
研究生
Author
指導教授
Advisor
召集委員
Convenor
口試委員
Advisory Committee
口試日期
Date of Exam
2015-01-16
繳交日期
Date of Submission
2015-08-27
關鍵字
Keywords
隱私管理、臉書、人氣需求、社會隱私顧慮、揭露、隱私、隱私悖論
disclosure, privacy, social privacy concern, need for popularity, privacy management, privacy paradox, Facebook
統計
Statistics
本論文已被瀏覽 5728 次,被下載 46
The thesis/dissertation has been browsed 5728 times, has been downloaded 46 times.
中文摘要
Facebook致力打造更具分享性與社交性的使用環境,在滿足使用者的人氣需求同時,卻也引發了使用者的隱私顧慮。在Facebook這充滿人氣追求之需求與隱私威脅之顧慮的矛盾使用環境,使用者如何管理隱私?本研究從傳播隱私管理(Communication Privacy Management, CPM)論觀點出發,探討社會隱私顧慮與Facebook人氣需求兩因素,如何影響Facebook使用者的隱私管理行為。問卷調查(N=543)分析結果顯示,社會隱私顧慮正向影響邊界擁有行為,而各與邊界滲透、邊界連結行為不存在關係;Facebook人氣需求正向影響邊界滲透與邊界連結行為,但與邊界擁有行為不存在關係。
研究結果在(1)理論貢獻方面,不僅擴展了CPM理論在線上Facebook場域的應用且得到支持;並以理論主軸-隱私管理是風險與利益之權衡,欲求得兼具揭露需求被滿足與保有自我的最佳水平,為隱私態度與行為不一致之「隱私悖論」議題提供新的詮釋角度。而(2)實務貢獻方面,也提供相關廠商針對影響使用者使用社群平台的兩大重要因素-隱私顧慮與人氣需求,可加強哪方面的功能設計之建議。
Abstract
For Facebook users, the desire to be popular and their privacy concerns have made privacy management a paradoxical issue. This study explores how users’ need for popularity and privacy concerns influence their behaviors to manage privacy on Facebook within the framework of Communication Privacy Management Theory (CPM). Using survey data collected through Facebook users (N=543), this study found that social privacy concern positively influenced the behavior of boundary permeability, but there was no significant relation found between social privacy concern and the behavior of boundary permeability, apart from this, no significant relation found between social privacy concern and the behavior of boundary linkage; need for popularity on Facebook positively influenced the behavior of boundary permeability and the behavior of boundary linkage, but there was no significant relation found between need for popularity and the behavior of boundary ownership.
Privacy management served as a key factor to weigh the risks and benefits on Facebook. The results supported CPM. This study also provide a new interpretation of "privacy paradox" -the inconsistency between privacy attitude and disclosure behavior, by verifying that privacy management is pursuing the optimal level of privacy that fulfill users’ need for disclosure while users are able to avoid negative or personal unsatisfactory feeling resulted from overdisclosure.
目次 Table of Contents
論文審定書.........................................................................i
摘要...................................................................................ii
Abstract.............................................................................iii

第一章 緒論.....................................................................1
第一節 研究背景.................................................................1
第二節 研究動機.................................................................2
第三節 研究目的與研究問題.......................................................7

第二章 文獻探討...............................................................9
第一節 隱私與Facebook上的隱私.................................................9
第二節 理論基礎:傳播隱私管理理論............................................13
第三節 現行研究:Facebook上的隱私管理........................................20

第三章 假說推導與研究模型..............................................30
第一節 Facebook社會隱私顧慮對於隱私管理行為的影響......................30
第二節 Facebook人氣需求對於隱私管理行為的影響..........................33

第四章 研究方法..............................................................36
第一節 研究方法的類型、研究對象與抽樣........................................36
第二節 變數操作型定義與問卷架構..............................................36
第三節 問卷預試(Pilot).....................................................40
第四節 正式問卷施測..........................................................43
第五節 分析方式與工具........................................................44

第五章 資料分析..............................................................45
第一節 樣本描述性統計分析....................................................45
第二節 測量模型分析(整體測量模型配適性與信、效度)..........................48
第三節 結構模型分析(整體結構模型配適性、路徑分析)..........................53

第六章 結論與建議..........................................................56
第一節 研究結果............................................................56
第二節 理論意涵............................................................60
第三節 實務意涵............................................................63
第四節 研究限制與未來建議..................................................65

參考文獻...........................................................................67
正式問卷...........................................................................74
參考文獻 References
邱皓政(2010)。《量化研究與統計分析SPSS(PASW)的操作原理與應用範例 (第五版)》。台北:五南出版。
黃芳銘(2002)。《結構方程模式——理論與應用》。台北:五南。
Acquisti, A., & Gross, R. (2006). Imagined communities: Awareness, information sharing, and privacy on the
Facebook. Paper presented at the Privacy enhancing technologies.
Allen, A. L. (1988). Uneasy access: Privacy for women in a free society: Rowman & Littlefield.
Altman, I. (1975). The environment and social behavior: Privacy, personal space, territory, crowding. Monterey, CA:
Brooks/Cole Publishing Company.
Altman, I. (1977). Privacy regulation: culturally universal or culturally specific? Journal of Social Issues, 33(3), 66-84.
Anderson, J. C., & Gerbing, D. W. (1988). Structural equation modeling in practice: A review and recommended two-
step approach. Psychological bulletin, 103(3), 411.
Barnes, S. B. (2006). A privacy paradox: Social networking in the United States. First Monday, 11(9).
Babbie, E.(1998). The practice of social research. London, England: Sage Publications.
Boyd, D. (2008). Facebook's Privacy Trainwreck. Convergence: The International Journal of Research into New Media
Technologies, 14(1), 13-20.
Boyd, D. M. (2008). Taken out of context: American teen sociality in networked publics: ProQuest.
Brandtzæg, P. B., Lüders, M., & Skjetne, J. H. (2010). Too many Facebook “friends”? Content sharing and sociability
versus the need for privacy in social network sites. Intl. Journal of Human–Computer Interaction, 26(11-12), 1006-
1030.
Carpenter, C. J. (2012). Narcissism on Facebook: Self-promotional and anti-social behavior. Personality and individual
differences, 52(4), 482-486.
Child, J. T., & Agyeman-Budu, E. A. (2010). Blogging privacy management rule development: The impact of self-
monitoring skills, concern for appropriateness, and blogging frequency. Computers in Human Behavior, 26(5), 957-
963.
Child, J. T., Haridakis, P. M., & Petronio, S. (2012). Blogging privacy rule orientations, privacy management, and
content deletion practices: The variability of online privacy management activity at different stages of social media
use. Computers in Human Behavior, 28(5), 1859-1872.
Child, J. T., Pearson, J. C., & Petronio, S. (2009). Blogging, communication, and privacy management: Development
of the blogging privacy management measure. Journal of the American Society for Information Science and
Technology, 60(10), 2079-2094.
Child, J. T., & Petronio, S. (2011). Unpacking the paradoxes of privacy in CMC relationships: The challenges of
blogging and relational communication on the internet. Computer-mediated communication in personal relationships,
21-40.
Child, J. T., & Westermann, D. A. (2013). Let's Be Facebook Friends: Exploring Parental Facebook Friend Requests from a Communication Privacy Management (CPM) Perspective. Journal of Family Communication, 13(1), 46-59.
Christofides, D., & Muise. (2010). Privacy and Disclosure on Facebook: Youth and Adult's Information Disclosure and Perceptions of Privacy Risks: University of Guelph.
Christofides, E. Privacy and Disclosure on Facebook: Youth and Adult's Information Disclosure and Perceptions of Privacy Risks.
Christofides, E., Muise, A., & Desmarais, S. (2009). Information disclosure and control on Facebook: are they two sides of the same coin or two different processes? CyberPsychology & Behavior, 12(3), 341-345.
Curran, P. J., West, S. G., & Finch, J. F. (1996). The robustness of test statistics to nonnormality and specification error in confirmatory factor analysis. Psychological methods, 1(1), 16.
Das, S., & Kramer, A. (2013). Self-censorship on Facebook. Proc. of ICWSM 2013, 120-127.
Debatin, B. (2011). Ethics, privacy, and self-restraint in social networking Privacy Online (pp. 47-60): Springer.
Debatin, B., Lovejoy, J. P., Horn, A. K., & Hughes, B. N. (2009). Facebook and online privacy: Attitudes, behaviors, and unintended consequences. Journal of Computer‐Mediated Communication, 15(1), 83-108.
Dwyer, C., Hiltz, S. R., & Passerini, K. (2007). Trust and Privacy Concern Within Social Networking Sites: A Comparison of Facebook and MySpace. Paper presented at the AMCIS.
eMarketer (2010). Who Spends Most Time on Facebook? How age, income and ethnicity affect time spent social networking . Retrieved December 15, 2014, from http://www.emarketer.com/Article.aspx?R=1007797
Facebook. (2013). News Feed FYI: A Window Into News Feed. Retrieved March 15, 2014,from https://www.facebook.com/business/news/News-Feed-FYI-A-Window-Into-News-Feed
Fornell, C., & Larcker, D. F. (1981). Evaluating structural equation models with unobservable variables and measurement error. Journal of marketing research, 39-50.
Frampton, B. D., & Child, J. T. (2013). Friend or not to friend: Coworker Facebook friend requests as an application of communication privacy management theory. Computers in Human Behavior, 29(6), 2257-2264.
Gorsuch, R. Factor analysis, 1983. LEA, Hillsdale, NJ.
Hair, J. F., Anderson, R. E., Tatham, R. L., & Black, W. C. (1998). Multivariate analysis. Englewood: Prentice Hall International.
Hargittai, E. (2010). Facebook privacy settings: Who cares? First Monday, 15(8).
Hollenbaugh, E. E. (2011). Motives for maintaining personal journal blogs. Cyberpsychology, Behavior, and Social Networking, 14(1-2), 13-20.
Hollenbaugh, E. E., & Ferris, A. L. (2014). Facebook self-disclosure: Examining the role of traits, social cohesion, and motives. Computers in Human Behavior, 30, 50-58.
Johnson, M., Egelman, S., & Bellovin, S. M. (2012). Facebook and privacy: it's complicated. Paper presented at the Proceedings of the eighth symposium on usable privacy and security.
Joinson, A. N., & Paine, C. B. (2007). Self-disclosure, privacy and the Internet. The Oxford handbook of Internet psychology, 237-252.
Kaiser, H. F. (1974). An index of factorial simplicity. Psychometrika, 39(1), 31-36.
Kelley, T. L. (1939). The selection of upper and lower groups for the validation of test items. Journal of Educational Psychology, 30(1), 17.
Lampe, C., Ellison, N. B., & Steinfield, C. (2008). Changes in use and perception of Facebook. Paper presented at the Proceedings of the 2008 ACM conference on Computer supported cooperative work.
Litt, E. (2013). Understanding social network site users’ privacy tool use. Computers in Human Behavior, 29(4), 1649-1656.
Madden, M., Lenhart, A., Cortesi, S., Gasser, U., Duggan, M., Smith, A., & Beaton, M. (2013). Teens, social media, and privacy. Pew Research Center. http://www. pewinternet. org/~/media//Files/Reports/2013/PIP_TeensSocialMediaandPrivacy. pdf.
Margulis, S. T. (2003). On the status and contribution of Westin's and Altman's theories of privacy. Journal of Social Issues, 59(2), 411-429.
Margulis, S. T. (2011). Three theories of privacy: An overview Privacy Online (pp. 9-17): Springer.
Marwick, A. E. (2011). I tweet honestly, I tweet passionately: Twitter users, context collapse, and the imagined audience. New Media & Society, 13(1), 114-133.
Metzger, M. J. (2007). Communication privacy management in electronic commerce. Journal of Computer‐Mediated Communication, 12(2), 335-361.
Mohamed, N., & Ahmad, I. H. (2012). Information privacy concerns, antecedents and privacy measure use in social networking sites: Evidence from Malaysia. Computers in Human Behavior, 28(6), 2366-2375.
Munar, A. M. (2010). Digital exhibitionism: The age of exposure. Culture Unbound: Journal of Current Cultural Research, 2(23), 401-422.
Nissenbaum, H. F. (2010). Privacy in context: Technology, policy, and the integrity of
social life. Stanford, CA: Stanford University Press.
Nunnally, J. C., Bernstein, I. H., & Berge, J. M. t. (1967). Psychometric theory (Vol. 226): McGraw-Hill New York.
Oldenburg, R., & Brissett, D. (1982). The third place. Qualitative Sociology, 5(4), 265-284.
Panek, E., Nardis, Y., & Konrath, S. (2013). Mirror or Megaphone?: How relationships between narcissism and social networking site use differ on Facebook and Twitter. Computers in Human Behavior, 29(5), 2004-2012.
Petronio, S. (1991). Communication boundary management: A theoretical model of managing disclosure of private information between marital couples. Communication Theory, 1(4), 311-335.
Petronio, S. (2002a). Boundaries of privacy: Dialectics of disclosure: State University of New York Press, Albany.
Petronio, S. (2002b). Boundaries of privacy:Dialectics of disclosure. Albany,NY: State University of New York Press.
Petronio, S. (2004). Road to developing communication privacy management theory: Narrative in progress, please stand by. Journal of Family Communication, 4(3-4), 193-207.
Petronio, S. (2010). Communication privacy management theory: What do we know about family privacy regulation? Journal of Family Theory & Review, 2(3), 175-196.
Petronio, S. (2013). Brief status report on communication privacy management theory. Journal of Family Communication, 13(1), 6-14.
Raynes-Goldie, K. (2010). Aliases, creeping, and wall cleaning: Understanding privacy in the age of Facebook. First Monday, 15(1).
Rosenberg, J., & Egbert, N. (2011). Online impression management: personality traits and concerns for secondary goals as predictors of self‐presentation tactics on Facebook. Journal of Computer‐Mediated Communication, 17(1), 1-18.
Ryan, T., & Xenos, S. (2011). Who uses Facebook? An investigation into the relationship between the Big Five, shyness, narcissism, loneliness, and Facebook usage. Computers in Human Behavior, 27(5), 1658-1664.
Santor, D. A., Messervey, D., & Kusumakar, V. (2000). Measuring peer pressure, popularity, and conformity in adolescent boys and girls: Predicting school performance, sexual attitudes, and substance abuse. Journal of youth and adolescence, 29(2), 163-182.
Smith, H. J., Dinev, T., & Xu, H. (2011). Information privacy research: an interdisciplinary review. MIS quarterly, 35(4), 989-1016.
Solove, D. J. (2004). The digital person: Technology and privacy in the information age (Vol. 1): NYU Press.
Soukup, C. (2006). Computer-mediated communication as a virtual third place: building Oldenburg’s great good places on the world wide web. New Media & Society, 8(3), 421-440.
Staddon, J., Huffaker, D., Brown, L., & Sedley, A. (2012). Are privacy concerns a turn-off?: engagement and privacy in social networks. Paper presented at the Proceedings of the eighth symposium on usable privacy and security.
Stutzman, F., Capra, R., & Thompson, J. (2011). Factors mediating disclosure in social network sites. Computers in Human Behavior, 27(1), 590-598.
Stutzman, F., Gross, R., & Acquisti, A. (2013). Silent Listeners: The Evolution of Privacy and Disclosure on Facebook. Journal of Privacy and Confidentiality, 4(2), 2.
Stutzman, F., & Kramer-Duffield, J. (2010). Friends only: examining a privacy-enhancing behavior in facebook. Paper presented at the Proceedings of the SIGCHI Conference on Human Factors in Computing Systems.
Stutzman, F., Vitak, J., Ellison, N. B., Gray, R., & Lampe, C. (2012). Privacy in Interaction: Exploring Disclosure and Social Capital in Facebook. Paper presented at the ICWSM.
Taddicken, M. (2014). The ‘Privacy Paradox’in the Social Web: The Impact of Privacy Concerns, Individual Characteristics, and the Perceived Social Relevance on Different Forms of Self‐Disclosure1. Journal of Computer‐Mediated Communication, 19(2), 248-273.
Taylor, H. (2003). Most people are ‘privacy pragmatists’ who, while concerned about privacy, will sometimes trade it off for other benefits. The Harris Poll, 17(19), 44.
Tello, L. (2013). Intimacy and «Extimacy» in Social Networks. Ethical Boundaries of Facebook. Comunicar, 21(41).
Times, T. (2014). Taiwan likes Facebook, has highest penetration, from http://www.taipeitimes.com/News/biz/archives/2014/02/28/2003584495
Timothy, S. (2015). Facebook Is Now Bigger Than The Largest Country On Earth, from http://www.huffingtonpost.com/2015/01/28/facebook-biggest-country_n_6565428.html?ncid=fcbklnkushpmg00000063
Tokunaga, R. S. (2011). Social networking site or social surveillance site? Understanding the use of interpersonal electronic surveillance in romantic relationships. Computers in Human Behavior, 27(2), 705-713.
Torkzadeh, G., Koufteros, X., & Pflughoeft, K. (2003). Confirmatory analysis of computer self-efficacy. Structural Equation Modeling, 10(2), 263-275.
Tufekci, Z. (2008). Can you see me now? Audience and disclosure regulation in online social network sites. Bulletin of Science, Technology & Society, 28(1), 20-36.
Utz, S., Tanis, M., & Vermeulen, I. (2012). It is all about being popular: The effects of need for popularity on social network site use. Cyberpsychology, Behavior, and Social Networking, 15(1), 37-42.
Vitak, J. (2012). The impact of context collapse and privacy on social network site disclosures. Journal of Broadcasting & Electronic Media, 56(4), 451-470.
Walther, J. B. (1996). Computer-mediated communication impersonal, interpersonal, and hyperpersonal interaction. Communication research, 23(1), 3-43.
Walther, J. B. (2009). Theories, boundaries, and all of the above. Journal of Computer‐Mediated Communication, 14(3), 748-752.
Wang, S. S., & Stefanone, M. A. (2013). Showing Off? Human Mobility and the Interplay of Traits, Self-Disclosure, and Facebook Check-Ins. Social Science Computer Review, 31(4), 437-457.
Warren, S. D., & Brandeis, L. D. (1890). The right to privacy. Harvard law review, 4(5), 193-220.
Waters, S., & Ackerman, J. (2011). Exploring privacy management on Facebook: Motivations and perceived consequences of voluntary disclosure. Journal of Computer‐Mediated Communication, 17(1), 101-115.
Westin, A. F. (1970). Privacy and freedom (Vol. 67). New York: Atheneum.
Westin, A. F. (2003). Social and political dimensions of privacy. Journal of Social Issues, 59(2), 431-453.
Williams, L. J., & Hazer, J. T. (1986). Antecedents and consequences of satisfaction and commitment in turnover models: A reanalysis using latent variable structural equation methods. Journal of applied psychology, 71(2), 219.
Wilson, R. E., Gosling, S. D., & Graham, L. T. (2012). [A review of Facebook research in the social sciences]. 3.
Woollaston, V. (2013). Facebook users are committing 'virtual identity suicide' in droves and quitting the site over privacy and addiction fears. Retrieved March 04, 2014, from http://www.dailymail.co.uk/sciencetech/article-2423713/Facebook-users-committing-virtual-identity-suicide-quitting-site-droves-privacy-addiction-fears.html
電子全文 Fulltext
本電子全文僅授權使用者為學術研究之目的,進行個人非營利性質之檢索、閱讀、列印。請遵守中華民國著作權法之相關規定,切勿任意重製、散佈、改作、轉貼、播送,以免觸法。
論文使用權限 Thesis access permission:自定論文開放時間 user define
開放時間 Available:
校內 Campus: 已公開 available
校外 Off-campus: 已公開 available


紙本論文 Printed copies
紙本論文的公開資訊在102學年度以後相對較為完整。如果需要查詢101學年度以前的紙本論文公開資訊,請聯繫圖資處紙本論文服務櫃台。如有不便之處敬請見諒。
開放時間 available 已公開 available

QR Code