研究生: |
陳家亮 Chan, Ka-Leong |
---|---|
論文名稱: |
雙層隱私控制對社交平台上行為之影響 The Dual Nature of Privacy Control in Social Networking Services |
指導教授: |
雷松亞
Ray, Soumya 申欽鳴 Shin, Kyoung |
口試委員: |
王振源
Wong, Chan-Yuan 王貞雅 Wang, Chen-Ya |
學位類別: |
碩士 Master |
系所名稱: |
科技管理學院 - 科技管理研究所 Institute of Technology Management |
論文出版年: | 2020 |
畢業學年度: | 107 |
語文別: | 英文 |
論文頁數: | 44 |
中文關鍵詞: | 不確定性規避 、自我效能 、次級控制 、社交網路服務 、初級控制 、集體主義 、管制 、臉書 、隱私風險 、隱私控制 、隱私顧慮 |
外文關鍵詞: | Collectivism, Facebook, Primary control, Privacy concern, Privacy control, Privacy risk, Regulation, Secondary control, Self efficacy, Social networking services, Uncertainty avoidance |
相關次數: | 點閱:3 下載:0 |
分享至: |
查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報 |
儘管近年來的新聞與輿論均強調使用社交網路服務潛在著巨大的隱私風險,但是很多用戶針對隱私威脅卻有著完全不同的反應,而過往針對資訊隱私的研究並不足以解釋造成人們為何對於隱私問題有不相同的認識、管理方式與反應。
本研究針對過往以隱私控制為中心之模型進行調整,透過把隱私控制概念化為一個雙層的概念,提出把以往隱私控制被忽視的兩個面向作出區分,針對在社交網路服務平台的資訊隱私提出一個更詳盡的框架,以更準確地解釋人們對於社交網路服務平臺的認識與反應產生個人差異之原因。通過臉書用戶針對相關問卷的實際回應,本研究的主張在很大程度上得到了支持,並提出相關理論意涵、研究限制及未來研究方向,及針對立法者、社交網路服務供應商及資訊管理研究者提出建議。
Our understanding of information service users’ information privacy deserves closer scrutiny in the domain of social networking services (SNS). Despite recent news and developments highlighting the potential for significant privacy loss on SNS, users seem to react very differently to these threats. Current models of information privacy do not adequately capture the variations in how people perceive, manage and respond to privacy issues.
Central to prior models of information privacy is the notion of privacy control. This study proposes that we must distinguish between two hitherto ignored aspects of privacy control to better explain personal differences in perception and response to privacy issues on SNS. Through our conceptualization of privacy control as a dual concept, we develop a more nuanced framework of information privacy on SNS. Our propositions are largely supported by an empirical survey of Facebook users. Nonetheless, our results also suggest that there are further nuances worthy of investigation in this direction.
Ackerman, M.S. & Mainwaring S.D. (2005) Privacy issues and human-computer interaction. Garfinkel S, Cranor L, eds. Security and Usability: Designing Secure Systems That People Can Use (O’Reilly, Sebastopol, CA), 381–400.
Agarwal, R., Sambamurthy, V., and Stair, R. M. (2000) The Evolving Relationship between General and Specific Computer Self-Efficacy – an Empirical Assessment, Information Systems Research 11(4), 418-430.
Ajzen, I. (2002). Perceived behavioral control, self‐efficacy, locus of control, and the theory of planned behavior 1. Journal of applied social psychology, 32(4), 665-683.
Altman, I. (1976). A conceptual analysis. Environment and behavior, 8(1), 7-29.
Bandura, A. (1977). Self-efficacy: toward a unifying theory of behavioral change. Psychological Review, 84(2), 191.
Barling, J., & Beattie, R. (1983). Self-efficacy beliefs and sales performance. Journal of Organizational Behavior Management, 5(1), 41-51.
Bélanger, F., & Crossler, R. E. (2011). Privacy in the digital age: a review of information privacy research in information systems. MIS quarterly, 35(4), 1017-1042.
Bellman, S., Johnson, E. J., Kobrin, S. J., & Lohse, G. L. (2004). International differences in information privacy concerns: A global survey of consumers. The Information Society, 20(5), 313-324.
Bunker, M., & Ball, A. D. (2009). Consequences of customer powerlessness: Secondary control. Journal of Consumer Behaviour: An International Research Review, 8(5), 268-283.
Campbell, A. J. (1997). Relationship marketing in consumer markets: A comparison of managerial and consumer attitudes about information privacy. Journal of Direct Marketing, 11(3), 44-57.
Campbell, J. E., & Carlson, M. (2002). Panopticon. com: Online surveillance and the commodification of privacy. Journal of Broadcasting & Electronic Media, 46(4), 586-606.
Campbell, D. T., & Fiske, D. W. (1959). Convergent and discriminant validation by the multitrait-multimethod matrix. Psychological Bulletin, 56(2), 81.
Caudill, E. M., & Murphy, P. E. (2000). Consumer online privacy: Legal and ethical issues. Journal of Public Policy & Marketing, 19(1), 7-19.
Chen, G., Gully, S. M., & Eden, D. (2001). Validation of a new general self-efficacy scale. Organizational research methods, 4(1), 62-83.
Chin, W. W. (1998). The partial least squares approach to structural equation modeling. Modern methods for business research, 295(2), 295-336.
Chin, W. W., Gopal, A., & Salisbury, W. D. (1997). Advancing the theory of adaptive structuration: The development of a scale to measure faithfulness of appropriation. Information systems research, 8(4), 342-367.
Culnan, M. J. (1993). "How Did They Get My Name?" An Exploratory Investigation of Consumer Attitudes toward Secondary Information Use. MIS quarterly, 341-363.
Culnan, M. J., & Bies, R. J. (2003). Consumer privacy: Balancing economic and justice considerations. Journal of social issues, 59(2), 323-342.
DeCew, J. W. (1997). In pursuit of privacy: Law, ethics, and the rise of technology. Cornell University Press.
Dinev, T., & Hart, P. (2004). Internet privacy concerns and their antecedents-measurement validity and a regression model. Behaviour & Information Technology, 23(6), 413-422.
Dinev, T., & Hart, P. (2006). An extended privacy calculus model for e-commerce transactions. Information systems research, 17(1), 61-80.
Dinev, T., McConnell, A. R., & Smith, H. J. (2015). Research commentary—informing privacy research through information systems, psychology, and behavioral economics: thinking outside the “APCO” box. Information Systems Research, 26(4), 639-655.
Dinev, T., Bellotto, M., Hart, P., Russo, V., Serra, I., & Colautti, C. (2006). Privacy calculus model in e-commerce–a study of Italy and the United States. European Journal of Information Systems, 15(4), 389-402.
Dowling, G. R., & Staelin, R. (1994). A model of perceived risk and intended risk-handling activity. Journal of consumer research, 21(1), 119-134.
Edison Research. (2019, March 6). The Infinite Dial 2019. Retrieved from https://www.edisonresearch.com/infinite-dial-2019/
Engel, J. F., Blackwell, R. D., & Miniard, P. W. (1995). Consumer behavior, 8th. New York: Dryder.
Essau, C. A. (l992). Primary-secondary control and coping. A cross-cultural comparison. Regensburg: Roderer.
Facebook Investor Relations. (2019, April 24). Facebook Q1 2019 Earnings. Retrieved from https://investor.fb.com/investor-events/event-details/2019/Facebook-Q1-2019-Earnings/default.aspx
Facebook comes under fresh attack for its data-privacy practices. (2019, January). The Economist. Retrieved from https://www.economist.com/business/2019/01/31/facebook-comes-under-fresh-attack-for-its-data-privacy-practices
Fornell, C., & Larcker, D. F. (1981). Structural equation models with unobservable variables and measurement error: Algebra and statistics.
Garfinkel, S. (2000). Database nation: The death of privacy in the 21st century. O'Reilly Media, Inc.
Gefen, D., & Pavlou, P. (2006). The moderating role of perceived regulatory effectiveness of online marketplaces on the role of trust and risk on transaction intentions. ICIS 2006 proceedings, 81.
Goodwin, C. (1991). Privacy: Recognition of a consumer right. Journal of Public Policy & Marketing, 10(1), 149-166.
Hall, N. C., Perry, R. P., Ruthig, J. C., Hladkyj, S., & Chipperfield, J. G. (2006). Primary and Secondary Control in Achievement Settings: A Longitudinal Field Study of Academic Motivation, Emotions, and Performance 1. Journal of Applied Social Psychology, 36(6), 1430-1470.
Hann, I. H., Hui, K. L., Lee, S. Y. T., & Png, I. P. (2007). Overcoming online information privacy concerns: An information-processing theory approach. Journal of Management Information Systems, 24(2), 13-42.
Hartwick, J., & Barki, H. (1994). Explaining the role of user participation in information system use. Management science, 40(4), 440-465.
Hirschman, A. O. (1970). Exit, voice, and loyalty: Responses to decline in firms, organizations, and states (Vol. 25). Harvard university press.
Hoadley, C. M., Xu, H., Lee, J. J., & Rosson, M. B. (2010). Privacy as information access and illusory control: The case of the Facebook News Feed privacy outcry. Electronic commerce research and applications, 9(1), 50-60.
Hofstede, G. (1984). Culture's consequences: International differences in work-related values (Vol. 5). sage.
Hofstede, G. (1991). Cultures and organizations. Intercultural cooperation and its importance for survival. Software of the mind. London: Mc Iraw-Hill.
Johnson, C. A. (1974). Privacy as personal control. Man-Environment Interactions: Evaluations and Applications: Part, 2, 83-100.
Karahanna E, (2018) The Needs–Affordances–Features Perspective for the Use of Social Media. MIS Quarterly. 42(3), 737-756
Kay, A. C., Gaucher, D., Napier, J. L., Callan, M. J., & Laurin, K. (2008). God and the government: testing a compensatory control mechanism for the support of external systems. Journal of personality and social psychology, 95(1), 18.
Krasnova, H., Spiekermann, S., Koroleva, K., & Hildebrand, T. (2010). Online social networks: Why we disclose. Journal of Information Technology, 25(2), 109-125.
Laufer, R. S., & Wolfe, M. (1977). Privacy as a concept and a social issue: A multidimensional developmental theory. Journal of social Issues, 33(3), 22-42.
Lester, T. (2001). The reinvention of privacy. The Atlantic Monthly, 287(3), 27-39.
Lowry, P. B., Cao, J., & Everard, A. (2011). Privacy concerns versus desire for interpersonal awareness in driving the use of self-disclosure technologies: The case of instant messaging in two cultures. Journal of Management Information Systems, 27(4), 163-200.
Margulis, S. T. (2003). Privacy as a social issue and behavioral concept. Journal of social issues, 59(2), 243-261.
Malhotra, N. K., Kim, S. S., & Agarwal, J. (2004). Internet users' information privacy concerns (IUIPC): The construct, the scale, and a causal model. Information systems research, 15(4), 336-355.
Milne, G. R., & Culnan, M. J. (2004). Strategies for reducing online privacy risks: Why consumers read (or don’t read) online privacy notices. Journal of interactive marketing, 18(3), 15-29.
Milne, G. R., & Rohm, A. J. (2000). Consumer privacy and name removal across direct marketing channels: Exploring opt-in and opt-out alternatives. Journal of Public Policy & Marketing, 19(2), 238-249.
Miltgen, C.L., Peyrat-Guillard, D. (2014) Cultural and generational influences on privacy concerns: a qualitative study in seven European countries. Europe Journal of Information Systems, 23(2), 103-125.
Osatuyi, B. (2015). Is lurking an anxiety-masking strategy on social media sites? The effects of lurking and computer anxiety on explaining information privacy concern on social media platforms. Computers in Human Behavior, 49, 324-332.
Pavlou, P. A. (2003). Consumer acceptance of electronic commerce: Integrating trust and risk with the technology acceptance model. International journal of electronic commerce, 7(3), 101-134.
Pavlou, P. A. (2011). State of the information privacy literature: Where are we now and where should we go? MIS quarterly, 977-988.
Phelps, J., Nowak, G., & Ferrell, E. (2000). Privacy concerns and consumer willingness to provide personal information. Journal of Public Policy & Marketing, 19(1), 27-41.
Rothbaum, F., Weisz, J. R., & Snyder, S. S. (1982). Changing the world and changing the self: A two-process model of perceived control. Journal of Personality and Social Psychology, 42(1), 5-37.
Shin, D. (2010). The effects of trust, security and privacy in social networking: A security-based approach to understand the pattern of adoption. Interacting with Computers, 22(5), 428-438. doi:10.1016/j.intcom.2010.05.001
Schoeman, F. D. (Ed.). (1984). Philosophical dimensions of privacy: An anthology. Cambridge University Press.
Smith, H. J., Milberg, S. J., & Burke, S. J. (1996). Information Privacy: Measuring Individuals Concerns about Organizational Practices. MIS Quarterly. 20(2), 167-196.
Smith, Dinev, & Xu. (2011). Information Privacy Research: An Interdisciplinary Review. MIS Quarterly, 35(4), 989-1016
Son, J. Y., & Kim, S. S. (2008). Internet users' information privacy-protective responses: A taxonomy and a nomological model. MIS quarterly, 503-529.
Stewart, K. A., & Segars, A. H. (2002). An empirical examination of the concern for information privacy instrument. Information systems research, 13(1), 36-49.
Tangsrud Jr, R., & Smith, M. C. (2000). Control-related motivations, capabilities, and preferences among patients: The roles of primary and secondary control in older adulthood. Journal of Business Research, 48(3), 259-266.
Tyler, T. R., & Cook, F. L. (1984). The mass media and judgments of risk: Distinguishing impact on personal and societal level judgments. Journal of Personality and Social Psychology, 47(4), 693.
Venkatesh, V., Morris, M. G., Davis, G. B., & Davis, F. D. (2003). User acceptance of information technology: Toward a unified view. MIS quarterly, 425-478.
Warren, S. D., & Brandeis, L. D. (1890). Right to privacy. Harvard. Law Review, 4, 193-220
Whitley, E. A. (2009). Informational privacy, consent and the “control” of personal data. Information security technical report, 14(3), 154-159.
Wisniewski, P., Knijnenburg, B. P., & Lipford, H. R. (2014, July). Profiling facebook users privacy behaviors. In SOUPS2014 Workshop on Privacy Personas and Segmentation.
Xu, H., Teo, H., Tan, B. C., & Agarwal, R. (2009). The Role of Push-Pull Technology in Privacy Calculus: The Case of Location-Based Services.” Journal of Management Information Systems, 26(3), 137-176.
Xu, H., Teo, H. H., Tan, B. C., & Agarwal, R. (2012). Research note—effects of individual self-protection, industry self-regulation, and government regulation on privacy concerns: a study of location-based services. Information Systems Research, 23(4), 1342-1363.
Yoo, B., Donthu, N., & Lenartowicz, T. (2011). Measuring Hofstede's five dimensions of cultural values at the individual level: Development and validation of CVSCALE. Journal of International Consumer Marketing, 23(3-4), 193-210.
Zweig, D., & Webster, J. (2002). Where is the line between benign and invasive? An examination of psychological barriers to the acceptance of awareness monitoring systems. Journal of Organizational Behavior: The International Journal of Industrial, Occupational and Organizational Psychology and Behavior, 23(5), 605-633.