:::

詳目顯示

回上一頁
題名:網狀的鑲嵌,隙狀的充填:人與社群媒介的嵌合傳記
作者:余貞誼 引用關係
作者(外文):Chen-Yi Yu
校院名稱:國立臺灣大學
系所名稱:社會學研究所
指導教授:林鶴玲
學位類別:博士
出版日期:2016
主題關鍵詞:社群媒介時間性馴化挪用網狀鑲嵌填隙形式SNSstemporalitydomesticationappropriationreticular embeddednessinterstitial form
原始連結:連回原系統網址new window
相關次數:
  • 被引用次數被引用次數:期刊(0) 博士論文(0) 專書(0) 專書論文(0)
  • 排除自我引用排除自我引用:0
  • 共同引用共同引用:0
  • 點閱點閱:52
「人們如何使用一個社群媒介?」這個素樸的問題,可以是很簡單的理性行為與變項競合間的策略抉擇。而本文則把這個問題帶回使用者與社群媒介的整體互動情境中,讓它從單一問句深化成一個日常生活微觀場景與鉅觀文化脈絡相互滲透的過程,包括每日生活的節奏感、生涯軌跡的流動、和社會文化對社群媒介的價值期待與想像,都會成為這個問句中的一部份,而後相互滲透建構出一個人與社群媒介相互嵌合的生命記事。
本文以時間這項中介人與社群媒介互動的要素來切入這個問題,在操作上分成大河時間、生涯時間、與每日時間三層次,來論析人與社群媒介的關係如何在不同時間層次上開展。因應不同時間層次的資料,本研究採取多重研究方法並用的形式。大河時間層次以聯合知識庫收集而來的新聞文本分析為主;生涯時間層次則採深度訪談;每日時間層次則採用lifelogging的形式,以手機app和電腦瀏覽器歷史檔取得參與者使用社群媒介的時間點資料,再與深度訪談的資料詮釋相互對照。
研究發現,在大河時間層次上,從1989年至2015年5月關於社群媒介的新聞資料中,其構築出來的敘事框架包含社群媒介的角色、效應、與關係掌控。在角色面向上,社群媒介被套用了資訊、溝通、個人媒體、和資本等面向的隱喻,在描繪出社群媒介確實具有何種用途的同時,還傳達出它能詮釋和被期待為某種角色。在效應面向上,社群媒介被描繪成一把雙面刃,既具有安全網的功能,同時也是個須提防和謹慎的監控網和地雷網。這些隱喻的套用說明了效應的可欲/不可欲性,接連而來的就是敦促使用者善用社群媒介的角色,運用控制觀、警醒觀、和界線觀等敘事框架,傳達出「善用是工具、濫用是悲劇」的情節輪廓。這些新聞敘事的集合,不僅是當代社群媒介發展的歷史圖像,同時也在傳誦的過程中成為架構人們認知模式的資源,進而在實作的過程中成為潛在的行動方針。
在生涯時間層次,人與社群媒介的關係是鑲嵌式的。這鑲嵌的意義不只偏離理性選擇論,也偏離個人特質論。不論是社群媒介的物質特性,或是使用者個人的人口變項,都無法獨立運作在人與社群媒介的關係中。反之,在人們選擇採用社群媒介的過程中,作用的力量是情境的(如特定的身份、認同與關係會促成人們親近、選擇、並著力在哪些媒介之上)、文化的(如關於什麼樣的身份應該匹配什麼樣的媒介的集體實作與想像)、也是歷史的(過往的採用經驗會形成後續媒介使用的策略與實作邏輯)。實作的挪用過程也蘊含脈絡中的主觀詮釋和意義賦予的空間。最後,隨著脈絡的更迭,已被馴化的社群媒介也會出現去馴化或再馴化的結果。
在每日時間層次上,將時間性劃分成長度、時點、次序、期限、週期和韻律等六面向,來觀察社群媒介在每日生活時間結構中的位置。始得知,社群媒介使用時間的長短是鑲嵌在特定社會情境中,與各種技術媒介特質、個人挪用和社會規範的力量相互作用而成。在時間點的座落上,社群媒介的使用也非隨機散布,而是嵌合在各種社會關係、文化期待、技術支援和生活儀式的網絡之內,並在與期限的相互折衝中,調配出一種被認可的「適當」模式來。在週期上,傳統既有的時間結構與生活週期仍指引著社群媒介的使用規律,而後依循脈絡性的變化而衍生出例行與例外性相互參差的韻律結構。
三個層次的時間經驗是相互滲透的,以此統合起來可見,社群媒介進駐人們生活的方式,是鑲嵌在一個網狀關係之中,並以一種片斷、間歇、短促性的隙狀姿態充填在各個孔縫之中。準此,本研究的理論意涵與貢獻在於,(一)經驗層次上,透過時間性的鋪排,把「人使用社群媒介」的議題從脫離脈絡的快照式觀看,放回特屬脈絡的長程縱深。人與社群媒介的關係就此不再只是變項間的推導建構,而是座落在特定的情境脈絡中茁壯起來、具有特定血肉的嵌合傳記,並透過使用模式的時間語言,訴說出社群媒介在當代生活的位置。(二)理論層次上,本文所做的脈絡性梳理,能對人—技術關係的現象學提供更為具體的思考資源,讓人與科技媒介的關係不再只有孰主孰客,而能在具體實作過程中共構出多重連結關係。(三)方法層次上,本文運用多重研究方法,尤其是lifelogging所呈現的擴展詮釋學,更有助於我們討論工具角色與科學知識間的關係。
“How do people use SNSs?” is a question whose answers can be as simple as rational behaviors. The dissertation places this question in an interactive context between users and SNSs, making it evolve from one single question to a process in which micro scenes of daily life and macro cultural contexts penetrate each other. The goal of this study is to explore how SNSs shape our rhythm of daily life, as well as what a social culture expects and imagines about the value of SNSs, and to create a life-embedded narrative of mutual penetration between users and SNSs.
To answer the above question, time was chosen purposefully as a factor that intermediates the interaction between users and SNSs. The framework of three different scales including large-scale time, life time, and everyday time, was constructed to investigate how social culture, use careers and micro-interaction influence our daily SNSs usage. Multiple methods were conducted for different scales of time. For example, news content analysis was adopted to study large-scale time, while depth interview for life time. For everyday time, the logs of SNSs usage on mobile phones and personal computers were collected to verify results of depth interview.
On the level of large-scale time, SNSs related news from 1989 to 2015 were found to create a narrative framework in terms of its role, effect and relationship control. SNSs were implied with roles such as information, communication, personal media, and capitals, which means that, in additional to its actual and practical purpose, SNSs was expected to play multiple roles in different circumstances. Regarding the effect of SNSs, it was described as a double-edged sword, which provides safety but also leads to inevitable social surveillance and traps. These metaphors account for the do-want and don''t want effect of SNSs. Users were found to describe how they view SNSs carefully with narrative frameworks such as control, vigilance, and boundary, which reveal their awareness of good use and abuse of SNSs. This collection of news narratives not only shows the development history of SNSs but also influence how people recognize and use SNSs.
On the scale of life time, users and SNSs were found to mutually embedded with each other. The meaning of embedment deviates from both rational action and demographic characteristics. Neither the material features of SNSs nor the personal demographic variables of users can independently work in the relationship between users and SNSs. Rather, the mechanism of domestication of SNSs are situational, cultural, and historical. Also, the processes of appropriation are involved with subjective interpretation and meaning endowment in a context. With the change of social contexts, domesticated SNSs could be de-domesticated or re-domesticated.
On the everyday time scale, the characteristics of time including duration, temporal location, sequence, deadline, cycle, and rhythm were applied to investigate how SNSs were situated in the temporal structure of one’s daily life. The result shows that the duration of SNSs usage was influenced by the characteristics of SNSs, users’ appropriation, and social norms in specific social circumstances. The uses of SNSs are not randomly allocated at one’s daily life but deeply influenced by various social relations, cultural expectation, technology support, and rituals of life. When encountering a due date in one’s life, the uses of SNSs are often tuned to a recognized “appropriate” mode. Existing temporal structure and life cycle still have an effect on social media usage and accordingly, following the change of contexts, the rhythm with both routine and exception is generated.
To sum up, the three mutual penetrating scales of time experiences reveal that SNSs enter people’s daily life in reticular rhythms and fill in every single slot in a fragmental, intermittent, short, and interstitial form of usage. Based on the results, the dissertation concludes its theoretical significance and contribution in three aspects. First, the SNSs usage is discussed, not on the basis of a snapshot-like observation, but in specific contexts with different temporal scales, which suggests that the relationship between users and SNSs is not a derivative construction of variables, but an embedded biography of lived experiences which develop in situational contexts. Second, the empirical study in the dissertation provides a more contrete way of thinking with regard to the human-technology relationship, which is not limited to an absolute subject-object relation, but a multilevel networked relationship. Last, among the multiple research methods applied in the study, lifelogging method particularly is found to expand the hermeneutics, which benefits researchers in discussing the relationship between roles of tools and scientific knowledge.
于慧玲(2005)網絡時代手機涉及的隱私權探索。商場現代化, 10(450):136-137。
王淑美(2011)網路作為時光機:日常網路使用與時間意義之初探。2011年中華傳播學會年會論文。
── (2014)傳播科技與生活韻律——關於研究方法的探討。傳播研究與實踐,4(1):23-43。
方怡潔(2009)譯序:事實,在行路的終點。後事實追尋:兩個國家、四個十年、一位人類學家,頁v-xii。台北:群學。
方念萱(2003)性別與傳播科技:數位落差的女性網路退用者研究。2003年中華傳播學會論文。
朱元鴻(1997)背叛/洩密/出賣:論民族誌的冥界。台灣社會研究季刊,26:29-65。new window
江淑琳(2014)流動的空間,液態的隱私:再思考社交媒體的隱私意涵。傳播研究與實踐,4(1):85-104。new window
林文源(2007)論行動者網絡理論的行動本體論。科技、醫療與社會,4:65-108。new window
林淇瀁(2004)超文本,跨媒介與全球化:網路科技衝擊下的台灣文學傳播。中外文學,33(7):103-128。new window
沈雲聰(2007)我們真的在墮落嗎?見史蒂芬‧強森(Steven Johnson)著,蔡孟璇譯,開機:電視、電腦、電玩佔據生命,怎麼辦?頁5-8。臺北:早安財經文化。
胡惠君(2015)察覺App使用者之心智模式:以即時通訊軟體LINE為例。設計學報,20(2):25-42。new window
陳順孝(2012)網路動員的繼往開來——反國光石化運動的社會科技基礎和行動策略演化。線上資料:http://www.ashaw.org/2012/01/blog-post.htmlnew window
黃啟龍 (2002)網路上的公共領域實踐:以弱勢社群網站為例。資訊社會研究,3:85-111。new window
鄭宇君、陳百齡(2012)溝通不確定性:探索社交媒體在災難事件中的角色。中華傳播學刊,21:119-153。new window
蕭阿勤(2012) 敘事分析。見瞿海源、畢恆達、劉長萱、楊國樞主編,社會及行為科學研究法(二):質性研究法,頁133-166。臺北:東華書局。
鍾蔚文、陳百齡、陳順孝(2006)數位時代的技藝:提出一個分析架構。中華傳播學刊,10:233-264。new window
Berger, Peter著,黃樹仁,劉雅靈譯 (1982)社會學導引:人文取向的透視。台北:巨流。
Bilton, Nick著,王惟芬、黃柏恆、楊雅婷譯(2001) 一位數位移民的告白:Facebook, iPad, iPhone如何翻轉我們的世界。台北:行人。
Draaisma, Douwe (2013) 記憶的風景:我們為什麼「想起」,又為什麼「遺忘」?張朝霞譯。台北:漫遊者文化。
Geertz, Clifford (2009) 後事實追尋:兩個國家、四個十年、一位人類學家。國立編譯館、方怡潔、郭彥君譯。台北:群學。
唐‧伊德(Don Ihde)著,韓連慶譯 (2008) 讓事物”說話”:後現象學與技術科學。北京:北京大學出版社。
馬塞爾‧普魯斯特(Marcel Proust)著,李桓基等譯(2015)追憶似水年華。台北:聯經。
華康德(Wacquant,  Loïc) (1998)〈邁向社會實踐理論:布迪厄社會學的結構與邏輯〉,《實踐與反思》(An Invitation to Reflexive Sociology),頁1-90。北京:中央編譯出版社。
Abbott, Andrew (2004) Methods of Discovery: Heuristics for the Social Sciences. New York : W.W. Norton & Co.
Abrams, Philip (1982) Historical Sociology. Cornell University Press.
Agger, Ben (2011) iTime: Labor and Life in a Smartphone Era. Time & Society 20(1): 119-136.
Agre, Philip E. (2001) Changing Places: Contexts of Awareness in Computing. Human-Computer Interaction, 16(2-4):177-192.
Ahas, R., and Mark, Ü. (2005) Location based services—new challenges for planning and public administration? Futures, 37(6): 547-561.
Akrich, Madeline (1992) The De-scription of Technical Objects. in Wiebe Eco Bijker and John Law(eds), Shaping technology/Building society: Studies in sociotechnical change (pp. 205-224) . Cambridge: MIT Press.
Alford, Robert R. (1998) The Craft of Inquiry: Theories, Methods, Evidence. New York: Oxford University Press.
Allen, Anita L. (2008) Dredging up the Past: Lifelogging, Memory, and Surveillance. University of Chicago Law Review, 75:47-74.
Arnold , Michael (2004) The Connected Home: Probing the Effects and Affects of Domesticated ICTs. In PDC-04, Proceedings of the Participatory Design Conference, vol. 2, pp. 183-186, Toronto, Canada, July 27-31, 2004.
Bakardjieva, Maria (2005) Internet Society: the Internet in Everyday Life. London: Sage.
── (2006) Domestication Running Wild: From the Moral Economy of the Household to the Mores of a Culture, in Thomas Berker, Maren Hartmann, Yves Punie, and Katie Ward(eds.), Domestication of Media and Technology(pp.62-79). Open University Press.
Bannon, Liam J. (2006) Forgetting as a Feature, not a Bug: the Duality of Memory and Implications for Ubiquitous Computing. CoDesign 2(1): 3-15.
Barley, Stephen R. (1988) On technology, time, and social order: technologically induced change in the tem- poral organization of radiological work. In F. A. Dubinskas, Making time: ethnographies of high- technology organizations (pp. 123–169). Philadelphia, PA: Temple University Press.
Bartlett, Fredrick Charles (1932) Remembering: A Study in Experimental Social Psychology. Cambridge University Press: Cambridge.
Becker, Karin (1995) Media and the Ritual Process. Media, Culture & Society, 17: 629-646.
Bell, Gordon, and Jim Gemmell (2007) A Digital Life. Scientific American, 296: 58-65.
Berker, Thomas, Maren Hartmann, Yves Punie, and Katie Ward (2006) Introduction, in Thomas Berker, Maren Hartmann, Yves Punie, and Katie Ward(eds.), Domestication of Media and Technology(pp.1-17). Open University Press.
Bentley, Clyde H. (2000) Make My Day: Ritual, Dependency and the Habit of Newspaper Reading. Doctoral dissertation, University of Oregon.
Blumler, Jay G. (1979) The Role of Theory in Uses and Gratifications Studies. Communication Research, 6: 9-36.
Bourdieu, Pierre (2004) Science of Science and Reflexivity. Cambridge: Polity.
Bourdieu, Pierre, Jean-Claude Chamboredon & Jean-Claude Passeron (1991) The Craft of Sociology: Epistemological Preliminaries. New York: Walter de Gruyter.
Bossewitch, Jonah, and Aram Sinnreich (2012) The End of Forgetting: Strategic Agency Beyond the Panopticon. New Media & Society, 15(2): 224-242.
boyd, danah m. and Nicole B. Ellison (2007) Social Network Sites: Definition, History, and Scholarship. Journal of Computer-Mediated Communication, 13(1): 210-230.
Bradner, Erin, Wendy A. Kellogg, and Thomas Erickson (1999) The Adoption and Use of ‘BABBLE’:A Field Study of Chat in the Workplace. In Proceedings of the Sixth European Conference on Computer-Supported Cooperative Work (pp. 139-158), 12-16 September 1999, Copenhagen, Denmark.
Bradner, Erin (2000) Social Affordances: Understanding Technology Mediated Social Networks at Work. Paper presented at the Annual Meeting of the Association of Internet Researchers, Minneapolis, MN. http://www.autodeskresearch.com/pdf/techmediatednetworks.pdf
── (2001) Social Affordances of Computer-Mediated Communication Technology: Understanding Adoption. In CHI''01 Extended Abstracts on Human Factors in Computing Systems (pp. 67-68). ACM.
Bray, Francesca (2007) Gender and Technology. Annual Review of Anthropology 36(September): 37-53.
Bruner, Edward M. (1986) Ethnography as Narrative, in Victor Turner and Edward M. Bruner(eds.) The Anthropology of Experience (pp. 139-155). Chicago: University of Illinois.
Bush, Vannevar (1945) As We May Think. The Atlantic Monthly, 176(1): 101-108.
Castells, Manuel (1996)The rise of the network society. Cambridge: Blackwell Publishers.
── (2001) The Internet galaxy: reflections on the Internet, business, and society. Oxford University Press.
Chang, I-Cheng, Chuang-Chun Liu and Kuanchin Chen (2013) The Push, Pull and Mooring Effects in Virtual Migration for Social Networking Sites. Information System Journal, 24(4): 323-346.
Chemero, Anthony (2003) An Outline of a Theory of Affordances. Ecological psychology, 15(2): 181-195.
Clarke, Roger (1988) Information technology and dataveillance. Communications of the ACM, 31(5): 498-512.
Cowan, Ruth Schwartz (1993) The Consumption Junction: A Proposal for Research Strategies in the Sociology of Technology. In Bijker, Wiebe E., Thomas P. Hughes, and Trevor Pinch(eds.), The Social Construction of Technological Systems : New Directions in the Sociology and History of Technology(Pp.261-280). Cambridge, Mass.: MIT Press.
Consolvo, Sunny, Beverly Harrison, Ian Smith, Mike Y. Chen, Katherine Everitt, John Froehlich, and James A. Landay (2007) Conducting in Situ Evaluations for and With Ubiquitous Computing Technologies. International Journal of Human-Computer Interaction, 22(1-2): 103-118.
Couldry, Nick (2003) Media Rituals: A Critical Approach. London; New York: Rputledge.
Crabtree, Andy, Steve Benford, Chris Greenhalgh, Paul Tennent, Matthew Chalmers, Barry Brown (2006) Supporting Ethnographic Studies of Ubiquitous Computing in the Wild. Proc. of INTERACT 2006, ACM Press.
Csikszentmihalyi, Mihaly and Reed Larson (1987) Validity and Reliability of the Experience-sampling Method. Journal of Nervous and Mental Disease, 175 (9):526-536.
Daft, Richard L., and Robert H. Lengel (1984) Information Richness: A New Approach to Managerial Behavior and Organization Design. Research in Organization Behavior 6: 191-233.
Danezis, George, Stephen Lewis, and Ross Anderson (2005) How Much is Location Privacy Worth? Fourth Workshop on the Economics of Information Security, 2005. Harvard University. 網址:http://infosecon.net/workshop/pdf/location-privacy.pdf (2015/1/8瀏覽)
Davis, Fred D. (1989) Perceived Usefulness, Perceived Ease of Use, and User Acceptance of Information Technology. MIS Quarterley 13(3): 319-340.
Davis, Fred D., Richard P. Bagozzi, and Paul R. Warshaw (1989) User Acceptance of Computer Technology: A Comparison of Two Theoretical Models. Management Science 35(8):982-1003.
de Certeau, Michel (1984). The practice of everyday life. Berkeley: University of California Press.
de Montjoye Yve.-Alexandre, Radaelli L., Singh V. K., Pentland A. S. (2015) Unique in the Shopping Mall: On the Reidentifiability of Credit Card Metadata. Science, 347 (6221), 536-539.
Dennis, Alan R., and Joseph S. Valacich (1999) Rethinking Media Richness: Towards a Theory of Media Synchronicity. In Proceedings of the 32nd Hawaii Internal Conference on system Sciences. Los Alamitos: IEEE, 1999.
Dourish, Paul and Ken Anderson (2006) Collective Information Practice: Exploring Privacy and Security as Social and Cultural Phenomena. Human-Computer Interaction, 21: 319-342.
Dreyfus, Hubert (1979) What Computers Can’t Do: the limits of artificial intelligence. New York: Harper and Row.
Eagle, Nathan, and Alex Pentland (2006) Reality Mining: Sensing Complex Social Systems. Personal and Qbiquitous Computing, 10(4): 255-268.
Ellul, Jacques (1964) The technological society. New York: Vintage.
Ewick, Patricia, and Susan S. Silbey (1995) Subversive Stories and Hegemonic Tales: Toward a Sociology of Narrative. Law & Society Review, 29(2): 197-226.
Fei, Liu and Xiao Bo (2014) Do I Switch? Understanding Users’ Intention to Switch Between Social Network Sites. 47th Hawaii International Conference on System Science.
Felski, Rita (2000) Doing time: Feminist theory and postmodern culture. NYU Press.
Flaherty, Michael G. (1987) Multiple Realities and the Experience of Duration. The Sociological Quarterly, 28(3): 313-326.
Flaherty, Michael G. and Lucas Seipp-Williams (2005) Sociotemporal Rhythms in E-mail: A case study. Time & Society, 14(1): 39-49.
Forty, Adrian (1986) Objects of Desire: Design and Society Since 1750. Thames & Hudson.
Foulger, Davis Albert (1993) Medium as Process: The Structure, Use, and Practice of Computer Conferencing on IBM''s IBMPC Computer Conferencing Facility. Ann Arbor, Mich.: UMI.
Frissen, Valerie A. J. (2000) ICTs in the Rush Hour of Life. The Information Society: An International Journal, 16(1): 65-75.
Froonmkin, Michael A. (2000) The Death of Privacy? Standford Law Review, 52, 1461-1543.
Fulk, Janet, Charles W. Steinfield, Joseph Schmitz, and J. Gerard Power (1987) A Social Information Processing Model of Media Use in Organizations. Communication Research, 18(4): 487-523
Fulk, Janet, Joseph Schmitz and Charles W. Steinfield (1990) A Social Influence Model of Technology Use, in Janet Fulk and Charles W. Steinfield, Organizations and Communication Technology (pp. 117-140). Newbury Park, CA: Sage.
Garnham, Nicholas (2004) The Media and the Public Sphere. In Frank Webster (ed.), The Information Society Reader (pp.357-378). Psychology Press.
Gemmell, Jim, Gordon Bell, Roger Lueder, Steven M. Drucker, Curties Wong (2002) MyLifeBits: Fulfilling the Memex vision. Proceeding of ACM Multimedia’02, December 1-6 2002, Juan-les-Pins..
Gemmell, Jim, Aleks Aris, and Roger Lueder (2005) Telling Stories With MyLifeBits. ICME 2005, July 6-9 2005.
Gershuny, Jonathan (2003) Web use and net nerds: a neofunctionalist analysis of the impact of information technology in the home. Social Forces, 82(1), 141-168.
Gibson, James J. (1979) The ecological approach to visual perception. Boston: Houghton Mifflin.
Giddens, Anthony (1987) Social Theory and Modern Sociology. Standford University Press.
── (1991) Modernity and Self-Identity: Self and Society in the Late Modern Age. Stanford, Calif.: Stanford University Press.
Gillmor, Dan (2006) We the media: Grassroots journalism by the people, for the people. " O''Reilly Media, Inc.".
Goffman, Erving (1967) Interaction Ritual. New York: Pantheon Books.
Green, Nicola (2002) On the Move: Technology, Mobility, and the Mediation of Social Time and Space. The Information Society, 18: 281-292.
Gross, Elisheva F. (2004) Adolescent Internet Use: What We Wxpect, What Tenns Report. Applied Developmental Psychology, 25: 633-649.
Habib, Laurence (2005) Finding a place and a space for online learning environments in an institutional setting: issues of objectification. IPSI BgD Transactions on Internet Research, 1(2).
Hackman, Michael Zane and Kim B. Walker (1990) Instructional Communication in the televised Classroom: The Effects of System Design and Teacher Immediacy on Student Learning and Satisfaction. Communication Education 39(3): 196-206
Haddon, Leslie (1993) Studying Information and Communication Technologies Teleworking Households. Proceeding of COST A4 Workshop in Trondheim, Norway, 28th-30th November 1993.
── (2003) Domestication and Mobile Telephony, in James E. Katz (ed), Machines That Become Us: The Social Context of Personal Communication Technology (pp.43-55). Transaction Publishers.
── (2004) Information and Communication Technologies in Everyday Life: A Concise Introduction and Research Guide. Oxford ; New York : Berg.
── (2006) The Contribution of Domestication Research to in-home Computing and Media Consumption. The Information Society, 22(4): 195-203.
── (2011) Domestication Analysis, Objects of Study, and the Centrality of Technologies in Everyday Life. Canadian Journal of Communication, 36(2):311-323.
Harding, Sandra (ed.) (1987) Feminism and methodology: social science issues. Bloomington: Indiana University Press.
Hartmann, Maren (2006) The Triple Articulation of ICTs, Media as Technological Objects, Symbolic Environments and Individual Texts, in Thomas Berker, Maren Hartmann, Yves Punie, and Katie Ward(eds.), Domestication of Media and Technology (pp .80-102). Open University Press.
Heres, Jeroen, Enid Mante-Meijer, Tomaz Turk, and Jo Pierson (2005) Adoption of ICTs: A proposed framework, in  EA Mante-Meijer & L. Klamer (eds.), ICT capabilities in action: What people do. Luxemburg: Office for Official Publications of the European Communities.
Hine, Christine (2000) Virtual Ethnography. London: Sage.
Hodges, Mark R., and Martha E. Pollack (2007) An “Object-Use Fingerprint”: the Use of Electronic Sensors for Human Identification, in UbiComp 2007: Ubiquitous Computing 9th International Conference (pp. 289-303). Innsbruck, Austria, September 16-19 2007. Berlin: Springer.
Hörning, Karl H., Daniela Ahrens, and Anette Gerhard (1999) Do Technologies Have Time? : New Practices of Time and the Transformation of Communication Technologies. Time and Society, 8(2): 293-308.
Hou, Avus C.Y., Yu-Chen Chen, Rong-An Shang, and Ching-Chin Chern (2012) The Post Adoption Switching of Social Network Service: A Human Migratory Model. PACIS 2012 Proceedings.
Hubers, Christa, Schwanen, Tim, & Dijst, Martin (2008) ICT and temporal fragmentation of activities: an analytical framework and initial empirical findings. Tijdschrift voor economische en sociale geografie, 99(5), 528-546.
Hutchby, Ian (2001) Technologies, Texts and Affordances. Sociology, 35(2): 441-456.
Hynes, Deirdre, and Els Rommes (2006). ‘Fitting the Internet into Our Lives’: IT Courses for Disadvantaged Users, in Thomas Berker, Maren Hartmann, Yves Punie, and Katie Ward(eds.), Domestication of Media and Technology(pp.125-144). Open University Press.
Hwang, Ha Sung and SungBok Park (2007) Being Together: User’s Subjective Experience of Social Presence in CMC Environments, in J. Jacko (ed.), Human-Computer Interaction, Part I (pp. 844-853). Springer-Verlag Berlin Heidelberg.
Ihde, Don (1990). Technology and the Lifeworld: From Garden to Earth. Indiana University Press.
── (1998) Expanding hermeneutics: Visualism in science. Northwestern University Press.
Intille, Stephen S., Emmanuel Munguia Tapia, John Rondoni, Jennifer Beaudin, Chuck Kukla, Sitij Agarwal, Ling Bao, and Kent Larson (2003) Tools for studying behavior and technology in natural settings. In UbiComp 2003: Ubiquitous Computing (pp. 157-174). Springer Berlin Heidelberg.
Jackson, Linda A., Kelly S. Ervin, Philip D. Gardner, and Neal Schmitt (2001) Gender and the Internet: Women communicating and men searching. Sex Roles, 44, 363-379.
Jenkins, Henry (2006) Convergence Culture: Where Old and New Media Collide. NYU Press.
Jonas, Hans (1976) Responsibility Today: The Ethics of an Endangered Future. Social Research, 43(1): 77-97.
Kahneman, Daniel, Alan B. Krueger, David A. Schkade, Norbert Schwarz, and Arthur A. Stone (2004) A Survey Method for Characterizing Daily Life Experience: The Day Reconstruction Method. Science, 306(5702): 1776-1780.
Kang, Jerry (1998) Information privacy in cyberspace transactions. Stanford Law Review, 50: 1193-1294.
Kopytoff, Igor (1986) The Cultural Biography of Things: Commoditization as Process, in Arjun Appadurai(ed.), The Social Life of Things: Commodities in a Cultural Perspective (pp. 64-91) . Cambridge: Cambridge University Press.
Kraut, Robert, Malcolm Brynin, and Sara Kiesler (eds.) (2006). Computers, phones, and the Internet: Domesticating information technology. Oxford: Oxford University Press.
Krumm, John (2008) A Survey of Computational Location Privacy. Personal and Ubiquitous Computing, 2008. 網址:http://research.microsoft.com/en-us/um/people/jckrumm/publications%202008/computational%20location%20privacy%20preprint.pdf (2015/1/8瀏覽)
Lahlou, Saadi (2008) Identity, Social Status, Privacy and Face-keeping in Digital Society. Social Science Information, 47(3): 299-330.
LaRose, Robert (2010) The problem of media habits. Communication Theory, 20(2): 194-222.
Law, John (1992) Notes on the theory of the actor-network: Ordering, strategy, and heterogeneity. Systems practice, 5(4): 379-393.
Law, John, and Bijker, W (1992) Technology, stability and social theory. In Bijker, W. E., and John Law (eds.), Shaping Technology/Building Society: Studies in Sociotechnical Change (pp.290-308). Cambridge, Mass:MIT Press.

Lash, Scott (2002) Critique of Information. London: Sage.
Lee, H., and Liebenau, J. (2000) Temporal effects of information systems on business processes: focusing on the dimensions of temporality. Accounting, Management and Information Technologies, 10(3), 157-185.
Leino-Kilpi, H., Välimäki, M., Dassen, T., Gasull, M., Lemonidou, C., Scott, A., and Arndt, M. (2001) Privacy: A Review of the Literature.  International journal of nursing studies, 38(6), 663-671.
Leonardi, Paul M. (2011) When Flexible Routines Meet Flexible Technologies: Affordance, Constraint, and the Imbrication of Human and Material Agencies. MIS Quarterly, 35(1):147-167.
Lewis, David and Andrew J. Weigert (1981) The Structures and Meanings of Social Time. Social Forces, 60(2): 432-462.
Lie, Merete and Knut H. Srensen (1996) Making Technology Our Own? Domesticating Technology into Everyday Life, in Merete Lie and Knut H. Srensen(eds.), Making Technology Our Own? Domesticating Technology into Everyday Life (pp.1-30). Scandinavian University Press.
Lim, Sun Sun and Carol Soon (2010) The influence of social and cultural factors on mothers’ domestication of household ICTs–Experiences of Chinese and Korean women. Telematics and Informatics, 27(3), 205-216.
Ling, Rich and Leslie Haddon (2007) Mobile Telephony, Mobility, and the Coordination of Everyday Life, in James E. Katz (ed), Machines that become us (pp.245-265). Transaction Publishers.
Livingstone, Sonia (2008) Taking risky opportunities in youthful content creation: teenagers'' use of social networking sites for intimacy, privacy and self-expression. New media & society, 10(3), 393-411.
Lombard, Matthew and Theresa Ditton (1997) At the Heart of It All: The Concept of Presence. Journal of Computer-Mediated Communication, 3(2) Available online: http://jcmc.indiana.edu/vol3/issue2/lombard.html
Luciano, Floridi (2007) A Look into the Future Impact of ICT on Our Lives. The Information Society, 23: 59-64.
Mackay, Hughie, and Gareth Gillespie (1992). Extending the social shaping of technology approach: ideology and appropriation. Social studies of science, 22(4), 685-716.
Madan, A., & Pentland, A. (2009) Modeling Social Diffusion Phenomena using Reality Mining. In AAAI Spring Symposium: Human Behavior Modeling (pp. 43-48).
Mante-Meijer, Enid, and Lajla Klamer (eds). (2004) ICT capabilities in action: What people do. Luxemburg: Office for Official Publications of the European Communities.
Marcuse, Herbert (1964) One Dimensional Man: Studies in the Ideology of Advanced Industrial Society. Boston: Beacon Press.
McKeon, Richard (1974) Time and temporality. Philosophy East and West, 24(2), 123-128.
McLuhan, Marshall [1964](2001). Understanding media : the extensions of man. London : Routledge.
Moore, Sally F. and Barbara G. Myerhoff (1977) Introduction: Secular Ritual: Forms and Meanings, in Dally F. Moore and Barbara G. Myerhoff (eds), Secular Ritual (pp. 3-24). Assen and Amsterdam: Van Gorcum.
Mulder, I., G.H. ter Hofte, J. Kort (2005). SocioXensor: Measuring user behavior and user experience in context with mobile devices, in L.P.J.J. Noldus, F. Grieco, L.W.S. Loijens, and P.H. Zimmerman (eds.), Proceedings of Measuring Behavior 2005, the 5th International Conference on Methods and Techniques in Behavioral Research, August 30-September2, 2005, Wageningen, the Netherlands, pp.355-358.
Nansen, Bjorn, Michael Arnold, Martin R. Gibbs and Hilary Davis (2009) Domestic Orchestration: Rhythms in the Mediated Home. Time and Society, 18(2/3): 181-207.
Nissenbaum, Helen (2010) Privacy in Context: Technology, Policy, and the Integrity of Social Life. Stanford University Press.
Norman, Donald (1988) The Psychology of Everyday Things. New York: Basic Books.
O’Hara, Kieron, Mischa M. Tuffield, and Nigel Shadbolt (2009) Lifelogging: Privacy and Empowerment with Memories for Life. Identity in the Information Society, 1(2): 155-172.
O’Hara, Kieron (2010) Narcissus to a Man: Lifelogging, Technology and the Normativity of Truth. At Second Annual SenseCam Symposium, Dublin.
Ohmori, Nobuaki, and Noboru Harata (2008) How different are activities while commuting by train? A case in Tokyo. Tijdschrift voor economische en sociale geografie,99(5), 547-561.
Oldenziel, Ruth. (2001) Man the Maker, Woman the Consumer: The Consumption Junction Revisted, in Angela N. H. Creager, Elizabeth Lunbeck, and Londa Schiebinger (eds), Feminism in Twentieth-Century Science, Technology, and Medicine (pp. 128-148). Chicago: The University of Chicago Press.
Oudshoorn, Nelly and Trevor Pinch (2003) How Users and Non-Users Matter, in Nelly Oudshoorn and Trevor Pinch (eds), How Users Matter: The Co-Construction of Users and Technology (pp.1-25). Cambridge, Mass.: MIT Press.
Palen, Leysia, and Paul Dourish (2003) Unpacking “Privacy” for a Networked World. In Proceedings of the SIGCHI conference on Human factors in computing systems (pp. 129-136). ACM.
Papacharissi, Zizi and Alan M. Rubin (2000) Predictors of Internet Use. Journal of Broadcasting and Electronic Media, 44(2):175-196.
Pentland, A., Lazer, D., Brewer, D., & Heibeck, T. (2009) Using reality mining to improve public health and medicine. Stud Health Technol Inform, 149:93-102.
Petronio, Sandra and Judith N. Martin (1986) Ramifications of Revealing Private Information: A Gender Gap. Journal of Clinical Psychology, 42 (3): 499-506.
Pfaffenberger, Bryan (1992) Technological Dramas. Technology & Human Values, 17(3):282-312.
Pinch, Trevor and Wiebe E. Bijker (1984) The Social Construction of Facts and Artefacts: Or How the Sociology of Science and the Sociology of Technology Might Benefit Each Other. Social Studies of Science, 14(3): 399-441.
Polkinghorne, Donald E. (1988) Narrative Knowing and the Human Sciences. Albany: State University of New York Press.
Poster, Mark (1990). The mode of informatio : poststructuralisms and contexts. Chicago: University of Chicago Press.
Poster, Mark (1997). Cyberdemocracy: Internet and the public sphere. Internet culture, 201, 218.
Prensky, Marc (2001) Digital Natives, Digital Immigrants. On the Horizon, 9(5). Lincoln: MCB University Press.
Rawassizadeh, Reza (2011) Towards Sharing Life-log Information with Society. Behavior &Information Technology, 31(11): 1057-1067.
Reichelt, Lisa (2007) Ambient Intimacy. http://www.disambiguity.com/ambient-intimacy/
Rekimoto, Jun, Takashi Miyaki, and Takaaki Ishizawa (2007) LifeTag: WiFi-based Continuous Location Logging for Life Pattern Analysis. in Location-and Context-Awarness Third International Symposium (pp.35-49). Proceedings of the conference at Oberpfaffenhofen, German, 20-1 September 2007. Berlin: Springer.
Rettie, Ruth (2003) A Comparison of Four New Communication Technologies. Pp. 686-690, in Proceedings of HCI International Conference on Human-Computer Interaction. New Jersey: Lawrence Erlbaum Associates.
Ricoeur, P. (1980) Narrative time. Critical inquiry, 169-190.
Richardson, Laurel (1990) Narrative and Sociology. Journal of Contemporary Ethnography, 19(1): 116-135.
Riddle, Matthew and Michael Arnold (2007) The Day Experience Method: A Resource Kit. http://www.matthewriddle.com/papers/Day_Experience_Resource_Kit.pdf
Riddle, Matthew and Catherine Howell (2008) You are here: Students map their own ICT landscapes. Proceedings ascilite Melbourne 2008 (pp.802-808).
Riessman, Catherine Kohler (1993) Narrative Analysis. London: Sage.
Rogge, Jan-Uwe (2013) The Media in Everyday Family Life: Some Biographical and Typological Aspects., in Ellen Seiter et al. (eds.), Remote control: Television, Audiences, and Cultural Power (pp.168-179). Routledge.
Rosenstein, Aviva W. and August E. Grant (1997) Reconceptualizing the Role of Habit: A New Model of Television Audience Activity. Journal of Broadcasting & Electronic Media, 41(3): 324-344.
Rubin, Alan M. (1984) Ritualized and Instrumental Television Viewing. Journal of Communication, 34(3):67-77.
Salancik, Gerald R. and Jeffrey Pfeffer (1978) A Social Information Processing Approach to Job Attitudes and Task Design. Administrative Science Quarterly, 23:224-253.
Schmitz, Joseph and Janet Fulk (1991) Organizational Colleagues, Media Richness, and Electronic Mail: A Test of the Social Infuence Model of Technology Use. Communication Research, 18(4): 487-523.
Schwanen, Tim., Martin Dijst, and Mei-Po Kwan (2008) ICTs and the decoupling of everyday activities, space and time: Introduction. Tijdschrift voor economische en sociale geografie, 99(5), 519-527.
Sellen, Abigail, and Steve Whittaker (2010) Beyond Total Capture: A Constructive Critique of Lifelogging. Communications of the ACM, 53(5): 70-77.
Shachtman, Noah (2004) Pentagon Kills LifeLog Project. Wired, 2nd April. Available Online: http://www.wired.com/politics/security/news/2004/02/62158 .
Shaw, Lindsay H., and Larry M. Grant (2002) Users divided? Exploring the gender gap in Internet use. Cyberpsychology & Behavior, 5, 517-527.

Sheldon, Pavica (2008) The relationship between unwillingness-to-communicate and students’ Facebook use. Journal of Media Psychology, 20(2), 67-75.
Shklovski, Irina (2012) Social Network Sites: Indispensable or Optional Social Tools. Proceedings of the Sixth International AAAL Conference on Weblogs and Social Media.
Short, John, Ederyn Williams and Bruce Christie (1976) The Social Psychology of telecommunication. London: Wiley.
Silverstone, Roger, Eric Hirsch, and David Morley (1991) Listening to a Long Conversation: An Ethnographic Approach to the Study of Information and Communication Technologies in the Home. Cultural Studies, 5(2): 204-227.
Silverstone, Roger, Eric Hirch and David Morley (1992) Information and Communication Technologies and the Moral Economy of the Household, in Roger Silverstond and Eric Hirch(eds.), Consuming Technologies: Media and Information in Domestic Spaces (pp. 15-31). London: Routledge.
Silverstone, Roger (1993) Time, Information and Communication Technologies and the Household. Time and Society, 2(3): 283-311.
── (1994) Television and Everyday Life. London; New York: Routledge.
Silverstone, Roger and Leslie Haddon (1996) Design and the Domestication of Information and Communication Technology: Technical Chang and Everyday Life, in Roger Silverstone and Robin Mansell (Eds.), Communication by Design: The Politics of Information and Communication Technology (pp.44-74). Oxford: Oxford University Press.
Slater, Mel and Sylvia Wilbur (1997) A Framework for Immersive Virtual Environments(FIVE): Speculations on the Role of Presence in Virtual Environments. Presence: Teleoperators and Virtual Environments, 6(6): 603-616. 
Snow, Robert P. (1987) Interaction with Mass Media: The Importance of Rhythm and Tempo. Communication Quarterly, 35(3): 225-237.
Somers, Margaret R., and Gloria D. Gibson (1994) Reclaiming the Epistemological “Other”: Narrative and the Social Construction of Identity. in Craig Calhoun(ed.), Social Theory and the Politics of Identity (pp. 37-99) . Ozford, UK: Blackwell.
Srensen, Knut H. (2006) Domestication: the Enactment of Technology, in Thomas Berker, Maren Hartmann, Yves Punie, and Katie Ward(eds.), Domestication of Media and Technology (pp .40-61). Open University Press.
Southerton, Dale, and Mark Tomlinson (2005) Pressed for time’–the differential impacts of a ‘time squeeze. The Sociological Review, 53(2), 215-239.
Southerton, Dale (2006) Analysing the temporal organization of daily life: Social constraints, practices and their allocation. Sociology, 40(3), 435-454.
Stewart, James (2007) Local Experts in the Domestication of Information and Communication Technologies. Information, Communication & Society, 10(4):547-569.
Symes, Colin (1999) Chronicles of Labour: A Discourse Analysis of Diaries. Time and Society, 8(2): 357-380.
Taylor, Charles (1989) Sources of the Self: The Making of the Modern Identity. Cambridge: Cambridge University Press.
Thayer, Stacy E., and Sukanya Ray (2006). Online communication preferences across age, gender, and duration of Internet use. CyberPsychology & Behavior, 9(4), 432-440.
Thompson, Clive (2008) Brave New World of Digital Intimacy. http://www.nytimes.com/2008/09/07/magazine/07awareness-t.html?pagewanted=2&_r=0
Trevino, Linda Kiebe, Richard L. Daft, and Robert H. Lengel (1990) Understanding Managers’ Media Choices: A Symbolic Interactionist Perspective. in Janet Fulk and Charles Steinfield(eds.), Organizations and Communication Technology (pp. 71-94). Newbury Park, CA:Sage.
Tu, Chih-Hsiung (2002) The Impacts of Text-based CMC on Online Social Presence. The Journal of Interactive Online Learning, 1(2) Available online: http://www.ncolr.org
Turkle, Sherry (1984) The Second Self: Computers and the Human Spirit. New York : Simon and Schuster.
Van Oost, E. (2003) Materialized gender: how shavers configure the users’ femininity and masculinity’, in Nelly Oudshoorn and Trevor Pinch (eds), How Users Matter: The Co-construction of Users and Technology (pp. 193-208). Cambridge, Mass.: MIT Press.
Venkatesh, Viswanath and Fred D. Davis (2000) A Theoretical Extension of the Technology Acceptance Model: Four Longitudinal Field Studies. Management Science, 46(2): 186-204.
Venkatesh, Viswanath, Michael G. Morris, Gordon B. Davis and Fred D. Davis (2003) User Acceptance of Information Technology: Toward a Unified View. MIS Quarterly, 27(3): 425-478.
Veroff, J., Sutherland, L., Chadiha, L., & Ortega, R. M. (1993) Newlyweds tell their stories: A narrative method for assessing marital experiences. Journal of Social and Personal Relationships, 10(3), 437-457.
Wagman, Ira (2010) Log On, Goof Off, and Look Up: Facebook and the Rhythms of Canadian Internet Use, in Beaty, B., Briton, D., Filax, G., Sullivan, R. (eds.), How Canadians Communicate. Athabasca University Press, Athabasca 2010: 55- 77 [http://hdl.handle.net/10807/56826]
Wajcman, Judy (2008) Life in the fast lane? Towards a sociology of technology and time. The British journal of sociology, 59(1), 59-77.
Webster, Juliet (1996) Shaping Women''s Work: Gender Employment and Information Technology. Routledge.
Weiser, Eric B. (2000) Gender differences in Internet use patterns and Internet application preferences: A two-sample comparison. CyberPsychology & Behavior, 3, 167-178.

Weitzner, Daniel J.,Hal Abelson, Cynthia Dwork, Cameron Kerry, Daniela Rus, Sandy Pentland, and Salil Vadhan (2014) Consume Privacy Bill of Rights and Big Data: Response to White House Office of Science and Technology Policy Request for Information. Retrieved from http://privacytools.seas.harvard.edu/publications/consumer-privacy-bill-rights-and-big-data
Wellman, Barry and Milena Gulia (1999) Virtual Communities as Communities: Net Surfers don’t Ride Alone. In Smith, Marc A. and Peter Kollock (eds.), Communities in Cyberspace (pp.167-194). London ; New York : Routledge.
Wellman, Barry (2001) Physical Place and Cyberspace: The Rise of Personalized Networks. International Urban and Regional Research, 25:227-252.
Wellman, Barry, Anabel Quan‐Haase,Jeffrey Boase, Wenhong Chen, Keith Hampton, Isabel Díaz, and Kakuko Miyata (2003). The social affordances of the Internet for networked individualism. Journal of Computer‐Mediated Communication, 8(3). http://onlinelibrary.wiley.com/doi/10.1111/j.1083-6101.2003.tb00216.x/full
Wu, Yu-Lung, Yu-Hui Tao, Ching-Pu Li, Sheng-Yuan Wang, and Chi-Yuan Chiu (2014) User-switching Behavior in Social Network Sites: A Model Perspective with Drill-Down Analyses. Computers in Human Behavior, 33: 92-103.
Zengyn, Cheng, Yang Yinping, and John Lim (2009) Cyber Migration: An Empirical Investigation of Factors that Affect Users’ Switch Intention in Social Networking Sites. Proceedings of the 42nd Hawaii International Conference on System Sciences.
Zerubavel, Eviatar (1976). Timetables and Scheduling: On the Social Organization of Time. Sociological Inquiry, 46(2): 87-94.
── (1979). Patterns of Time in Hospital Life. Chicago: The University of Chicago Press.
── (1987). The language of time: toward a semiotics of temporality. Sociological Quarterly, 343-356.

 
 
 
 
第一頁 上一頁 下一頁 最後一頁 top
:::
無相關著作
 
QR Code
QRCODE