| 研究生: |
林姿君 Lin, Tzu-Chun |
|---|---|
| 論文名稱: |
隱私如何影響人們利用雲端在社群媒介分享其個人資訊之使用意願 How Privacy Affect the Intention of Usage for the Cloud Computing through Social Media |
| 指導教授: |
陳正忠
CHEN, VICTOR |
| 學位類別: |
碩士 Master |
| 系所名稱: |
管理學院 - 國際經營管理研究所碩士在職專班 Institute of International Management (IIMBA--Master)(on the job class) |
| 論文出版年: | 2014 |
| 畢業學年度: | 102 |
| 語文別: | 英文 |
| 論文頁數: | 68 |
| 中文關鍵詞: | 私有雲端 、社群媒介 、隱私演算理論 、溝通隱私管理理論 、信任度 、隱私權的認知與關注 |
| 外文關鍵詞: | Personal cloud based, Social media, Privacy calculus theory, Communication privacy management theory, Trust, Privacy policy awareness, Privacy concern |
| 相關次數: | 點閱:118 下載:0 |
| 分享至: |
| 查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報 |
隨著現今科技與網路快速成長,利用社群網站所提供的雲端服務已成為與世
界接軌的一種潮流。不論走到何處,只要有網路即可以立即傳輸資料,人們更藉
由社群媒介上照片、影片與檔案之分享與彼此交換資訊來建立與維繫朋友、家人、
同事之關係。目前社會大眾最常使用的社群媒介包含Facebook 與YouTube,此
份研究專注在PCBSMA (personal cloud based social media application),我們稱為社群媒介私有雲端之運用。簡單來說,就是藉由網路的雲端設計在社群媒介上分享個人訊息。雲端科技替人們帶來了方便性也節省了開支,由於在網路上暴露個人資料伴隨可能遭受的危險與威脅,故隱私的重要性日益顯著,我將使用由隱私演算理論與溝通隱私管理理論衍伸之概念來探討對於使用社群媒介來分享個人資訊之喜好是否會被此理論所述代價與利益間的對價關係來影響。藉由探討這些概念之相互關係如大眾對於隱私權的認知與關注,以及對於社群媒介供應商的信任度。最終結果發現優弊之對價關係的確會影響人們繼續使用社群媒介分享其個人資料與繼續使用社群媒介的意願。
With the fast growing of the information technology and internet nowadays, cloud computing service on social network has become a trend to connect the world. No matter where you go, individuals can upload your personal data as long as the access ability to internet. People get used of social media to connect and exchange information with their friends, family, and co-workers by sharing the pictures, video, and files. Facebook and YouTube are the most popular social media used in the general public. This study is focused on the PCBSMA. PCBSMA stands for personal cloud based social media application. Simply speaking, it is the way to transmit the personal data via cloud computing service to social media. Cloud computing makes our life easier and save our expenses. The privacy concern has been raised due to the risk and threats for disclosing the personal information on line. This study is based on constructs extended from two theories-privacy calculus theory and communication privacy management theory to find out if the interests for individuals to shares personal data on social media will be affected by cost and benefits. By discussing the relationship among these constructs such as privacy policy awareness, privacy concerns, and the trust of the social media providers, I find that these major constructs will result in users’ intention to share the personal information on social media, and intention to re-use the social media continuously.
Abdi, H. (2010). Partial least squares regression and projection on latent structure regression (PLS Regression). Wiley Interdisciplinary Reviews: Computational Statistics, 2(1), 97-106.
Agarwal, R., Tan, B. C. Y., Teo, H.-H., & Xu, H. (2009). The role of push-pull technology in privacy calculus: The case of location-based services. Journal of Management Information Systems, 26(3), 135-174.
Ajzen, I. (1991). The theory of planned behavior. Organizational Behavior and Human Decision Processes, 50(2), 179-211.
Andrade, E. B., Kaltcheva, V., & Weitz, B. (2002). Self-disclosure on the web: The impact of privacy policy, reward, and company reputation. Advances in Consumer Research, 29(1), 350-353.
Arcand, M., Nantel, J., Arles-Dufour, M., & Vincent, A. (2007). The impact of reading a web site's privacy statement on perceived control over privacy and perceived trust. Online Information Review, 31(5), 661-681.
Benassi, P. (1999). TRUSTe: An online privacy seal program. Communications of the ACM, 42(2), 56-59.
Biernacki, P., & Waldorf, D. (1981). Snowball sampling: Problems and techniques of chain referral sampling. Sociological Methods & Research, 10(2), 141-163.
Brief, A. P., & Aldag, R. J. (1977). The intrinsic-extrinsic dichotomy: Toward conceptual clarity. Academy of Management review, 2(3), 496-500.
Bulgurcu, B., Cavusoglu, H., & Benbasat, I. (2010). Information security policy compliance: An empirical study of rationality-based beliefs and information security awareness. MIS Quarterly, 34(3), 523-548.
Campbell, D. T., & Fiske, D. W. (1959). Convergent and discriminant validation by the multitrait-multimethod matrix. Psychological Bulletin, 56(2), 81-105.
Cheung, C. M. K., & Lee, M. K. O. (2001). Trust in internet shopping: Instrument development and validation through classical and modern approaches. Journal of Global Information Management 9(3), 23-35.
Chi, H., Yeh, H., & Hung, W.-c. (2012). The moderating effect of subjective norm on cloud computing users’ perceived risk and usage intention. International Journal of Marketing Studies, 4(6), 95-102.
Child, J. T., Haridakis, P. M., & Petronio, S. (2012). Blogging privacy rule orientations, privacy management, and content deletion practices: The variability of online privacy management activity at different stages of social
media use. Computers in Human Behavior, 28(5), 1859-1872.
Chin, W. W. (1995). Partial least squares is to LISREL as principal components analysis is to common factor analysis. Technology Studies, 2(2), 315-319.
Chin, W. W. (1998). The partial least squares approach to structural equation modeling. Modern Methods for Business Research, 295(2), 295-336.
Cristobal, E., Flavián, C., & Guinaliu, M. (2007). Perceived e-service quality (PeSQ): Measurement validation and effects on consumer satisfaction and web site loyalty. Managing Service Quality, 17(3), 317-340.
Culnan, M. J., & Armstrong, P. K. (1999). Information privacy concerns, procedural fairness, and impersonal trust: An empirical investigation. Organization Science, 10(1), 104-115.
Culnan, M. J., & Bies, R. J. (2003). Consumer privacy: Balancing economic and justice considerations. Journal of Social Issues, 59(2), 323-342.
Davis, F. D. (1989). Perceived usefulness, perceived ease of use, and user acceptance of information technology. MIS quarterly, 13(3), 319-340.
Dinev, T., & Hart, P. (2004). Internet privacy concerns and their antecedents - measurement validity and a regression model. Behaviour & Information Technology, 23(6), 413-422.
Dinev, T., & Hart, P. (2006). An extended privacy calculus model for e-commerce transactions. Information Systems Research, 17(1), 61-80.
Doney, P. M., & Cannon, J. P. (1997). An examination of the nature of trust in buyer-seller relationships. Journal of Marketing, 61, 35-51.
Dowling, G. R. (1986). Perceived risk: The concept and its measurement. Psychology & Marketing, 3(3), 193-210.
Eastlick, M. A., Lotz, S. L., & Warrington, P. (2006). Understanding online B-to-C relationships: An integrated model of privacy concerns, trust, and commitment. Journal of Business Research, 59(8), 877-886.
Everard, A., Cao, J., & Lowry, P. B. (2011). Privacy concerns versus desire for interpersonal awareness in driving the use of self-disclosure technologies: The case of instant messaging in two cultures. Journal of Management Information Systems, 27(4), 163-200.
Featherman, M. S., & Pavlou, P. A. (2003). Predicting e-services adoption: Aperceived risk facets perspective. International Journal of Human-Computer Studies, 59(4), 451-474.
Flavián, C., & Guinalíu, M. (2006). Consumer trust, perceived security and privacy policy: Three basic elements of loyalty to a web site. Industrial Management & Data Systems, 106(5), 601-620.
Frampton, B. D., & Child, J. T. (2013). Friend or not to friend: Coworker Facebook friend requests as an application of communication privacy management theory. Computers in Human Behavior, 29(6), 2257-2264.
Ganesan, S. (1994). Determinants of long-term orientation in buyer-seller relationships. Journal of Marketing, 58(2), 1-19.
Gefen, D., Karahanna, E., & Straub, D. W. (2003). Trust and TAM in online shopping: An integrated model. MIS quarterly, 27(1), 51-90.
Goodman, L. A. (1961). Snowball sampling. The Annals of Mathematical Statistics, 32(1), 148-170.
Gupta, S., Lu, Y., & Zhao, L. (2012). Disclosure intention of location-related information in location-based social network services. International Journal of Electronic Commerce, 16(4), 53-90.
Hair, J. F., Ringle, C. M., & Sarstedt, M. (2011). PLS-SEM: Indeed a silver bullet. The Journal of Marketing Theory and Practice, 19(2), 139-152.
Hann, I.-H., Hui, K.-L., Lee, S.-Y. T., & Png, I. P. (2007). Overcoming online information privacy concerns: An information-processing theory approach. Journal of Management Information Systems, 24(2), 13-42.
Havlena, W. J., & DeSarbo, W. S. (1991). On the measurement of perceived consumer risk. Decision Sciences, 22(4), 927-939.
Hoffman, D. L., Novak, T. P., & Peralta, M. A. (1999). Information privacy in the marketspace: Implications for the commercial uses of anonymity on the web. The Information Society, 15(2), 129-139.
Hong, W., Thong, L., & James, Y. (2013). Internet privacy concerns: An integrated conceptualization and four empirical studies. MIS Quarterly, 37(1), 275-298.
Hui, K.-L., Tan, B. C., & Goh, C.-Y. (2006). Online information disclosure: Motivators and measurements. ACM Transactions on Internet Technology (TOIT), 6(4), 415-441.
Hui, K.-L., Teo, H. H., & Lee, S.-Y. T. (2007). The value of privacy assurance: An exploratory field experiment. MIS Quarterly, 31(1), 19-33.
Jiang, Z., Heng, C. S., & Choi, B. C. F. (2013). Research note—Privacy concerns and privacy-protective behavior in synchronous online social interactions. Information Systems Research, 24(3), 579-595.
Kalloniatis, C., Mouratidis, H., Vassilis, M., Islam, S., Gritzalis, S., & Kavakli, E. (2014). Towards the design of secure and privacy-oriented information systems in the cloud: Identifying the major concepts. Computer Standards &
Interfaces, 36(4), 759-775.
Kaplan, A. M., & Haenlein, M. (2010). Users of the world, unite! The challenges and opportunities of social media. Business Horizons, 53(1), 59-68.
Keith, M. J., Thompson, S. C., Hale, J., Lowry, P. B., & Greer, C. (2013). Information disclosure on mobile devices: Re-examining privacy calculus with actual user behavior. International Journal of Human-Computer Studies, 71(12),
1163-1173.
Laufer, R. S., & Wolfe, M. (1977). Privacy as a concept and a social issue: A multidimensional developmental theory. Journal of Social Issues, 33(3), 22-42.
Levina, N., & Ross, J. W. (2003). From the vendor's perspective: Exploring the value proposition in information technology outsourcing. MIS Quarterly, 27(3), 331-364.
Li, H., Sarathy, R., & Xu, H. (2010). Understanding situational online information disclosure as a privacy calculus. Journal of Computer Information Systems, 51(1), 62-71.
Li, Y. (2012). Theories in online information privacy research: A critical review and an integrated framework. Decision Support Systems, 54(1), 471-481.
Li, Y. (2014). The impact of disposition to privacy, website reputation and website familiarity on information privacy concerns. Decision Support Systems, 57(1), 343-354.
Li, Y. (2014). A multi-level model of individual information privacy beliefs. Electronic Commerce Research and Applications, 13(1), 32-44.
Liao, C., Liu, C.-C., & Chen, K. (2011). Examining the impact of privacy, trust and risk perceptions beyond monetary transactions: An integrated model. Electronic Commerce Research and Applications, 10(6), 702-715.
Limayem, M., Hirt, S. G., & Cheung, C. M. (2007). How habit limits the predictive power of intention: The case of information systems continuance. MIS Quarterly, 705-737.
Litt, E. (2013). Understanding social network site users’ privacy tool use. Computers in Human Behavior, 29(4), 1649-1656.
Malhotra, N. K., Kim, S. S., & Agarwal, J. (2004). Internet users' information privacy concerns (IUIPC): The construct, the scale, and a causal model. Information Systems Research, 15(4), 336-355.
Mayer, R. C., Davis, J. H., & Schoorman, F. D. (1995). An integrative model of organizational trust. Academy of management review, 20(3), 709-734.
McKnight, D. H., Choudhury, V., & Kacmar, C. (2002). Developing and validating trust measures for e-commerce: An integrative typology. Information Systems
Research, 13(3), 334-359.
Metzger, M. J. (2007). Communication privacy management in electronic commerce. Journal of Computer‐Mediated Communication, 12(2), 335-361.
Milne, G. R., & Boza, M.-E. (1999). Trust and concern in consumers’ perceptions of marketing information management practices. Journal of Interactive Marketing, 13(1), 5-24.
Moores, T. (2005). Do consumers understand the role of privacy seals in e-commerce? Communications of the ACM, 48(3), 86-91.
Pavlou, P. A. (2011). State of the information privacy literature: Where are we now and where should we go? MIS Quarterly, 35(4).
Pavlou, P. A., & Fygenson, M. (2006). Understanding and predicting electronic commerce adoption: An extension of the theory of planned behavior. MIS Quarterly, 30(1), 115-143.
Pavlou, P. A., & Gefen, D. (2004). Building effective online marketplaces with institution-based trust. Information Systems Research, 15(1), 37-59.
Petronio, S. (1991). Communication boundary management: A theoretical model of managing disclosure of private information between marital couples. Communication Theory, 1(4), 311-335.
Phelps, J., Nowak, G., & Ferrell, E. (2000). Privacy concerns and consumer willingness to provide personal information. Journal of Public Policy & Marketing, 19(1), 27-41.
Ray, S., Ow, T., & Kim, S. S. (2011). Security assurance: How online service providers can influence security control perceptions and gain trust. Decision Sciences, 42(2), 391-412.
Reichheld, F. F., & Schefter, P. (2000). E-loyalty. Harvard Business Review, 78(4), 105-113.
Smith, H. J., Dinev, T., & Xu, H. (2011). Information privacy research: An interdisciplinary review. MIS Quarterly, 35(4), 989-1016.
Stone, E. F., & Stone, D. L. (1990). Privacy in organizations: Theoretical issues, research findings, and protection mechanisms. Research in Personnel and
Human Resources Management, 8(3), 349-411.
Taddei, S., & Contena, B. (2013). Privacy, trust and control: Which relationships with online self-disclosure? Computers in Human Behavior, 29(3), 821-826.
Taylor, D. G., Davis, D. F., & Jillapalli, R. (2009). Privacy concern and online personalization: The moderating effects of information control and compensation. Electronic Commerce Research, 9(3), 203-223.
Tsai, J. Y., Egelman, S., Cranor, L., & Acquisti, A. (2011). The effect of online privacy information on purchasing behavior: An experimental study. Information Systems Research, 22(2), 254-268.
Urban, G. L., Sultan, F., & Qualls, W. J. (2000). Placing trust at the center of your internet strategy. Sloan Management Review, 42(1), 39-48.
Van Slyke, C., Shim, J., Johnson, R., & Jiang, J. J. (2006). Concern for information privacy and online consumer purchasing. Journal of the Association for
Information Systems, 7(1), 16.
Venkatesh, V. (2000). Determinants of perceived ease of use: Integrating control, intrinsic motivation, and emotion into the technology acceptance model. Information Systems Research, 11(4), 342-365.
Waters, S., & Ackerman, J. (2011). Exploring privacy management on Facebook: Motivations and perceived consequences of voluntary disclosure. Journal of Computer-Mediated Communication, 17(1), 101-115.
Westin, A. F. (1968). Privacy and freedom. Washington and Lee Law Review, 25(1), 166.
Xu, H., Dinev, T., Smith, J., & Hart, P. (2011). Information privacy concerns: Linking individual perceptions with institutional privacy assurances. Journal of the Association for Information Systems, 12(12), 798-824.
Xu, H., & Gupta, S. (2009). The effects of privacy concerns and personal innovativeness on potential and experienced customers’ adoption of location-based services. Electronic Markets, 19(2-3), 137-149.
Xu, H., Teo, H.-H., Tan, B. C. Y., & Agarwal, R. (2012). Research note—Effects of individual self-protection, industry self-regulation, and government regulation on privacy concerns: A Study of location-based services. Information Systems Research, 23(4), 1342-1363.
校內:2024-08-08公開