:::

詳目顯示

回上一頁
題名:社群網站使用用途與隱私政策對用戶持續使用意圖影響之研究
作者:林哲如
作者(外文):Che-Ju Lin
校院名稱:國立中央大學
系所名稱:企業管理學系
指導教授:洪秀婉
陳春希
學位類別:博士
出版日期:2012
主題關鍵詞:社群網站社群網站使用用途線上隱私政策持續使用意圖social networking sitesuses of social networking sitesonline privacy policythe continued use of intent
原始連結:連回原系統網址new window
相關次數:
  • 被引用次數被引用次數:期刊(3) 博士論文(0) 專書(0) 專書論文(0)
  • 排除自我引用排除自我引用:3
  • 共同引用共同引用:0
  • 點閱點閱:311
隨著網路使用率的普及,社群網站正漸漸成為許多人即時搜索資訊與交流互動的工具。對社群網站業者來說,找出用戶持續使用社群網站的主要用途並進一步吸引用戶造訪該網站是個重要的議題。另一方陎,儘管社群網站已隨著網際網路技術而日漸普遍,但同時社群網站也衍生了不少隱私相關議題,導致用戶對社群網站的信任產生疑慮,而要如何讓用戶對社群網站產生信任以及如何在隱私開放程度與持續使用該網站的意圖中找到一個帄衡便顯得相當重要。因此本研究目的即找出影響社群網站用戶持續使用的主要用途,並以隱私-信任-行為意向理論模型為基礎,在原有的隱私四項次構陎 (通知、選擇、存取、安全) 之外,多加入了這些隱私政策是否確實「執行」來做為隱私的衡量構陎,探討影響社群網站持續使用意圖的各個因素,以 Facebook 網站用戶做為研究對象共回收 425份有效問卷,使用 STATISTICAS 6.0 軟體進行結構方程模式資料分析,研究結果發現主要影響社群網站用戶持續使用之用途為「社會搜索」與「近況動態」,也發現用戶會透過隱私政策的「安全」保護及是否徹底「執行」來提高社群網站的信任程度,進而增加持續使用意圖,本研究結果可使社群網站業者得以藉由發展這些因素的相關功能,進而有效地留住龐大用戶以產生更大的商機。
As the internet becomes popular, social network has become a tool for people to do research and communicate. For the social networking site companies, it is important issues for them to find the purpose which keeps the users using and attracts them to visit the website continuously. On the other hand, even though social networking site is more popular by the Internet techniques, it also made lots of privacy issues which cause the users losing confidence in those websites. These are the reason why it is very important to know how to build the confidence between users and websites and find the balance between the privacy open extent and the intention of continuously using the website. Therefore, the purpose of this study is to find out the main purpose of the users which impact them continued to use. Based on the privacy-trust-behavioral intentions theoretical model, we added the privacy policy which confirm whether “Enforcement” for privacy measurement beside the old four privacy (notice, choose, access, and safe). We use the additional policy to determent the influence for every factor that affects the social network usage. We use Facebook website user as our study object that we got 425 valid questionnaires, and then we use STATISTICAS 6.0 to analysis these information. The result is that the main purpose which affect social network users are “Social searching” and “Status updates.” Also, users use “safe” and “Enforcement” in privacy setting to raise the trust level of social website then increase the usage intent. Our conclusion can make social website company develop these functions in order to keep these huge users for enormous business opportunity.
6-1 中文文獻
1.田育菁 (2011) 社群網站於我國隱私權保障之研究 國立東華大學財經法律研究所 碩士論文

2.江嘉軒 (2004) 虛擬社群網站使用動機與社會臨場感研究 國立中山大學傳播管理研究所 碩士論文

3.林嘉容 (2010) 社群網站使用者行為模式之研究-以臉書為例 國立東華大學全球運籌管理研究所 碩士論文

4.岳鵬雲 (2011) 網頁遊戲及網路外部性對於社群網站會員忠誠度之影響-以FACEBOOK 為例 德明財經科技大學資訊科技與管理研究所 碩士論文

5.陳映儒 (2011) 社群網站特性與使用者忠誠度、持續參與意圖之關係研究 東吳大學商學院企業管理研究所 碩士論文new window

6.劉丹迪 (2011) 移动社會網络服務(Social Network Service, SNS)持續使用行為研究 清華大學經濟管理學院 碩士論文

7.愛麗娜 (2009) 網站隱私保護政策與信任之研究:比較俄羅斯與台灣的差異逢甲大學國際貿易學系 碩士論文

6-2 英文文獻
8.Acquisti, A. and Gross, R. (2005). Information revelation and privacy in online social networks. Wpes''05, VA p. 71-80.

9.Acquisti, A. and Gross, R. (2006). Imagined communities: Awareness, information sharing, and privacy on the facebook. Privacy Enhancing Technologies 4258, 36-5855
10.Anderson, J. and Gerbing, D. (1988). Structural equation modeling in practice: A review and recommended two-step approach. Psychological bulletin 103(3), 411-423.

11.Andrew D Smock, Nicole B Ellison, Cliff Lampe and Donghee Yvette Wohn (2011). Facebook as a toolkit: A uses and gratification approach to unbundling feature use. Computers in Human Behavior.

12.Asimina Vasalou, Adam N. Joinson and Delphine Courvoisier (2010). Cultural differences, experience with social networks and the nature of ‘‘true commitment’’ in Facebook . Int. J. Human-Computer Studies 68719–728

13.Bernhard Debatin, Jennette P. Lovejoy, Ann-Kathrin Horn, M.A., Brittany N. Hughes (2009). Facebook and Online Privacy: Attitudes, Behaviors, and Unintended Consequences. Journal of Computer-Mediated Communication 15 83–108

14.Bhattacher jee, A. (2001). Understanding information systems continuance: An expectation-confirmation model. Mis Quarterly 25(3), 351-70.

15.Blumler J.G. & Katz, E. (1974). The uses of mass communications: Current perspectives on gratifications research. Beverly Hills, CA: Sage.

16.Boyd, D. (2004). Friendster and publicly articulated social networks. Conference on Human Factors and Computing Systems Vienna.

17.Boyd, D. (2008). Facebook''s Privacy Trainwreck: Exposure, Invasion, and Social Convergence. Convergence 14, 1
18.Boyd, D. M., and Ellison, N. B. (2007). Social network sites: Definition, history, and scholarship. Journal of Computer-Mediated Communication 13(1), 210-30 article 11. http://jcmc.indiana.edu/vol13/issue1/boyd.ellison.html

19.Buchanan, D.A., Fitzgerald, L. and Ketley, D. (2007). The sustainability and spread of organizational change: Modernizing healthcare. London: Routledge.

20.Bulgurcu, B. Burcu Bulgurcu (2010). Antecedents and Outcomes of Information Privacy Concerns in Online Social Networking: A Theoretical Perspective Working Papers on Information Systems 10(81). http://sprouts.aisnet.org/10-81

21.Chen, S. and Mary-Anne, W. (2009). Privacy in social networks: A comparative study. PACIS p. 81.

22.Chih-Hsiung Tu (2002). The relationship between social presence and online privacy. Internet and Higher Education 5 293–318

23.Craig Ross , Emily S. Orr, Mia Sisic, Jaime M. Arseneault, Mary G. Simmering, R. Robert Orr (2009). Personality and motivations associated with Facebook use. Computers in Human Behavior 25578–586

24.Dwyer, C., Hiltz, S. and Passerini, K. (2007). Trust and privacy concern within social networking sites: A comparison of facebook and mySpace. Americas Conference on Information Systems.

25.Ellison, Nicole B., Charles Steinfield, and Cliff Lampe (2007). The Benefits of Facebook Friends: Social Capital and College Students Use of Online Social 28 Network Sites, Journal of Computer-Mediated Communication, 12(4), article 1. http://jcmc.indiana.edu/vol12/issue4/ellison.html.

26.Ellison, N., Heino, R. and Gibbs, J. (2006). Managing Impressions Online: Self-Presentation Processes in the Online Dating Environment. Journal of Computer-Mediated Communication 11, 2

27.Ellison, N., Steinfield, C. and Lampe, C. (2006). Spatially Bounded Online Social Networks and Social Capital: The Role of Facebook. Paper presented at the annual meeting of the International Communication Association.

28.Flavelle, D. (2007). Worries follow rise of Facebook: Employers not happy with time spent on site. Toronto Star, May 04. Available at: http://www.thestar.com/Business/article/210313

29.Fornell, C. and Larcker, D. (1981). Evaluating structural equation models with unobservable variables and measurement error. Journal of marketing researc, 18, 39-50.

30.Frederick, E.C., Clarke, T.E. and Hamill, C.L. (1984). The effect of running shoe design on shock attenuation. In: Sport Shoes and Playing Surfaces. Ed: Frederick, E.C. Champaign: Human Kinetics. 190-198.

31.Garramone, G. M., Harris, A. C. and Anderson, R. (1986). Uses of political computer bulletin boards. Journal of Broadcasting and Electronic Media 30(3), 325–339.

32.Gefen, D., Karahanna, E., and Straub, D. W. (2003) Inexperience and experience with online stores: The importance of TAM and trust. IEEE Transactions on Engineering Management 50(3), 307-321.

33.Golder, D. Wilkinson and Huberman, (2007). Rhythms of social interaction: Messaging within a massive online network. Third International Conference on Communities and Technologies, at http://www.hpl.hp.com/research/idl/papers/facebook/facebook.pdf, accessed 21 December 2008.

34.Gordon Hull , Heather Richter Lipford, Celine Latulipe.(2007) Contextual gaps: privacy issues on Facebook. Ethics Inf Technol. DOI 10.1007/s10676-010-9224-8

35.Gross, R. and Acquisti, A. (2005). Information Revelation and Privacy in Online Social Networks. In Workshop on Privacy in the Electronic Society, ACM Press.

36.Guo, C. and Yu, J. (2009). Socializing Online in Various Cultural Contexts: A Cross Nation Study of Social Network Service Development. AMCIS, p. 514.

37.Hann, R., Y. Lu and K.R. Subramanyam. (2007). Uniformity versus Flexibility: Evidence from Pricing of the Pension Obligation. The Accounting Review 82(1): 107-137.

38.Ho, A., Maiga, A. and Aimeur, E. (2009). Privacy protection issues in social networking sites. IEEE/Acs International Conference on Computer Systems and Applications. 1 and 2, 271-8

39.Hoffman, D. L., T. P. Novak, M. Peralta (1999). Building consumer trust online. Comm. ACM 42(4) 80–85.

40.Hong, S. J., Thong, J. Y. L. and Tam, K. Y. (2006). Understanding continued informationtechnology usage behavior: A comparison of three models in the context of mobile internet.Decision Support Systems. 42(3), 1819-34.

41.Humphreys, L. (2007). Mobile social networks and social practice: A case study of dodgeball. Journal of Computer-Mediated Communication. 13(1), 341-60.

42.Heijden, T. Verhagen (2002). Measuring and assessing online store image: a study of two online bookshops in the Benelux. In: Proceedings of the 35th Annual Hawali International Conference on System Sciences, Hawali, USA, 7–10.

43.Joinson, A.N. and Paine, C.B. (2007) Self-Disclosure, Privacy and the Internet. Oxford Handbook of Internet Psychology (pp. 237-252). Oxford University Press.

44. Joinson Adam N. (2008). Looking at, Looking up or Keeping up with People? Motives and Uses of Facebook ACM. In CHI ''08: Proceeding of the twenty-sixth annual SIGCHI conference

45.Katz, J.E., and Aakhus, M.A. (2002). Perpetual contact: mobile communication, private talk, public performance. New York: Cambridge University Press.

46.Kim, B. (2010). An empirical investigation of mobile data service continuance: Incorporatingthe theory of planned behavior into the expectation-confirmation model. Expert Systems with Applications. 37(10), 7033-9.
47.Kolko, B. E., Johnson, E. and Rose, E. (2007). Mobile social software for the developing world. Online Communities and Social Computing, Proceedings. 4564, 385-94

48.Korzaan, M., Brooks, N., and Greer, T. (2009). Demystifying Personality and Privacy: An Empirical Investigation into Antecedents of Concerns for Information Privacy. Journal of Behavioral Studies in Business (1), pp. 1-17.

49.Krasnova, H., Kolesnikova, E. and Guenther, O. (2010). Leveraging trust and privacy concerns in online social networks: An empirical study. ECIS, p. 160.

50.Lampe, C., Ellison, N. and Steinfield, C. (2006). A Face(book) in the Crowd: Social Searching vs. Social Browsing. In proceedings of ACM Special Interest Group on Computer-Supported Cooperative Work, ACM Press , 167 – 170.

51.Lampe, C., Ellison, N. and Steinfield, C. (2007). A Familiar Face(book): Profile Elements as Signals in an Online Social Network. In Proc. CHI 2007, ACM Press 435-444.

52.Lee, M. C. (2010). Explaining and predicting users'' continuance intention toward e-learning: An extension of the expectation-confirmation model. Computers & Education. 54(2), 506-16.

53.Lee, Y. and Kwon, O. (2010). Intimacy, familiarity and continuance intention: An extended expectation-confirmation model in web-based services. Electronic Commerce Research and Applications.

54.Li, Q., Yongbeom, K., Xin, T. and Jeffrey, H. (2009). The effects of privacy concern and social influence on user acceptance of online social networks. AMCIS, p. 321.

55.Limayem, M., Hirt, S. G. and Cheung, C. M. K. (2007). How habit limits the predictive power of intention: The case of information systems continuance. Mis Quarterly. 31(4), 705-37.

56.Limayem, M. and Cheung, C. M. K. (2008). Understanding information systems continuance: The case of Internet-based learning technologies. Information & Management. 45(4), 227-32.

57.Lin, C. S., Wu, S. and Tsai, R. J. (2005). Integrating perceived playfulness into expectation-confirmation model for web portal context. Information and Management. 42(5),683-93.

58.Liu Chang, Marchewka Jack T., Lu June, Yu Chun-Sheng (2005). Beyond concern—a privacy-trust-behavioral intention model of electronic commerce Information and Management 42289–304

59.Lu, H. and Lin, K. (2011). Why people use social networking sites: An empirical study integrating network externalities and motivation theory. Computers in Human Behavior 27, 1152-1161.

60.Lwin, M., Wirtz, J., and Williams, J. D. (2007). Consumer online privacy concerns and responses: a power-responsibility equilibrium perspective. Journal of the Academy of Marketing Science (35:4), pp. 572-585.

61.Matteo Turilli A Luciano Floridi (2009). The ethics of information transparency. Ethics Inf Technol 11:105–112 DOI 10.1007/s10676-009-9187-9

62.McGuire, W.J.(1974). Psychological Motives and Communication Gratification. The Uses of Mass Communications: Current Perspectives on Gratifications Research. J. G. Blumler and E. Katz, eds.Beverly Hills, CA: Sage Publications,.

63.Metzer, J. (2004). Privacy, trust and disclousure: exploring barriers to electronic commerce. Journal of Computer-mediated Commnication. 9(4).

64.Okazaki, S., Li, H., and Hirose, M. (2009). Consumer Privacy Concerns and Preference for Degree of Regulatory Control. Journal of Advertising (38:4), pp. 63-77.

65.Rempel, J. K., Holmes, J. G., Zanna, M. P. (1985). Trust in close relationships. Journal of Personality and Social Psychology 49, 95 – 122.

66.Ridings, C., Gefen, D., and Arinze, B. (2002). Some Antecedents and Effects of Trust in Virtual Communities. Journal of Strategic Information Systems 11(3-4), 271-295.

67.Roca, J. C., Chiu, C. M. and Martinez, F. J. (2006). Understanding e-learning continuance intention: An extension of the Technology Acceptance Model. International Journal of Human-Computer Studies. 64(8), 683-96.

68.Samantha L. Miller, (2008). The Facebook Frontier: Responding to the Changing Face of Privacy on the Internet. 97 Ky. L. J. 541, 559

69.Shin, D. H. (2010). The effects of trust, security and privacy in social networking: A security-based approach to understand the pattern of adoption. Interacting with Computers. 22(5), 428-38.

70.Sledgianowski, D. and Kulviwat, S. (2008). Social Network Sites: Antecedents of User Adoption and Usage. AMCIS, p. 83.

71.Taylor, S. and Todd, P. A. (1995). Understanding information technology usage: A test of competing models. Information Systems Research. 6(2), 144-76.new window

72.Thong, J. Y. L., Hong, S. J. and Tam, K. Y. (2006). The effects of post-adoption beliefs on the expectation-confirmation model for information technology continuance. International Journal of Human-Computer Studies. 64(9), 799-810.

73.Tom Buchanan, Carina Paine and Adam N. Joinson (2007). Ulf-Dietrich Reips Development of Measures of Online Privacy Concern and Protection for Use on the Internet, journal of the american society for information science and technology—January 15, DOI: 10.1002/asi

74. Vasaloa, Joinson and Courvoisier (2010). Cultural differences, experience with social networks and the nature of ‘‘true commitment’’ in Facebook. Int. J. Human-Computer Studies 68 (2010) 719–728

75.Venkatesh, V. and Davis, F. D. (2000). A theory extension of the technology acceptance model:four longitudinal field study. Management Science. 45(2), 186-204.

76.Venkatesh, V., Morris, M. G., Davis, G. B. and Davis, F. D. (2003). User acceptance of information technology: Toward a unified view. Mis Quarterly. 27(3), 425-78.

77. Vijayasarathy Leo R. (2004) Predicting consumer intentions to use on-line shopping: the case for an augmented technology acceptance model. Information & Management 41 747–762

78.Warren, S. D. and Harv, L. (1890). The right to privacy. Harvard Law Review. 4(5).

79.Wellman, B., Salaff, J. and Dimitrova, D. (1996). Computer networks as social networks: collaborative work, telework, and virtual community. Annual Review of Sociology, 22, 213-238

80.Zhong, H., Bi, L., Feng, Z. and Li, N. (2008). Research on the Design Method of Mobile Social Network Services. International Conference of Information Management, Innovation Management and Industrial Engineering, p. 458 - 61.

81.Zhou, T. (2011). An empirical examination of users'' post-adoption behaviour of mobile services. Behaviour & Information Technology. 30(2), 241-50.

82.Ziv, N. and Mulloth, B. (2011). An Exploration on Mobile Social Networking: Dodgeball as a Case in Point. the International Conference on Mobile Business.

6-3 其他來源
83.CRM2顧客是核心股份有限公司 -[臉書] 台灣 Facebook 使用人數 1000 萬 http://crm2.tw/?p=944
84.Inside 網路趨勢觀察 http://www.inside.com.tw/2010/02/21/social_privacy

85.InsightXplorer 創市際市場研究顧問電子報, 創市際月刊報告書2011.07 http://news.ixresearch.com/?p=4299

86.John HagelⅢ & Arthur G. Armstrong著,朱道凱 譯(1998) 網路商機:如何經營虛擬社群?(Net Gain -Expanding Markets through Virtual Communities)

87.udn數位資訊,社群網站掀起隱私大戰http://mag.udn.com/mag/digital/storypage.jsp?f_MAIN_ID=319&f_SUB_ID=2941&f_ART_ID=320194#ixzz1q6ZKTA67

88.周冠中/郭美懿(資料來源:E-Business時代風潮,博碩出版社) http://www.anan1.webnow.biz/it/b11.htm

89.美國聯邦貿易委員會 (US Federal Trade Commission–FTC)公平資訊使用原則 http://www.ftc.gov/reports/privacy3/fairinfo.shtm

90.聯意製作股份有限公司-TVBS網路新聞 ©2002-2010 TVBS TV NETWORK‧All Rights Reserved‧ TVBS.COM.TW網站使用協定

91.電子商務時報 (2007/8/23) 探索資訊時代的網路經濟法則(十二) 解析網路社群的種類和型態 http://www.ectimes.org.tw/shownews.aspx?id=10026

92.電子商務時報 Electronic Commerce Times all right reserved http://www.ectimes.org.tw/Shownews.aspx?id=120227064319
 
 
 
 
第一頁 上一頁 下一頁 最後一頁 top
:::
無相關博士論文
 
無相關書籍
 
無相關著作
 
QR Code
QRCODE