Loading...
|
Please use this identifier to cite or link to this item:
https://nccur.lib.nccu.edu.tw/handle/140.119/155381
|
Title: | 探索隱私悖論:從資訊隱私角度 Exploring Privacy Paradox: From A Perspective of Information Privacy |
Authors: | 鄭琮霖 Cheng, Tsung-Lin |
Contributors: | 黃葳威 鄭琮霖 Cheng, Tsung-Lin |
Keywords: | 隱私悖論 隱私態度 隱私行為 結構方程式模型 Privacy Paradox Privacy Attitude Privacy Behavior Structural Equation Model |
Date: | 2025 |
Issue Date: | 2025-02-04 15:18:17 (UTC+8) |
Abstract: | 本研究旨在通過建構結構方程式模型,從更全面的角度理解隱私悖論現象,結構方程式模性研究分為前端和後端,前端是隱私態度的前置變項探討,後端則是探討隱私態度和隱私行為之間的關係,以隱私關注作為測量隱私態度的變項。 研究結果指出,前端部分;自我效能、隱私意識和網路涉入度和隱私關注沒有統計上的顯著關係,後端部分;對隱私的關注不會影響資訊的揭露行為,此外,對隱私的關注會造成受試者的隱私保護行為。根據研究結果,本文建議未來研究不應該糾結在隱私悖論存在與否的爭辯,而是應該根據研究目的,與特定議題作連結,嘗試從不同角度更全面地理解此主題,並以此主體為基礎作研究命題的延伸。 This study aims to understand the privacy paradox phenomenon by constructing a structural equation model. The structural equation modeling research is divided into front-end and back-end. The front-end is to explore the antecedent variables of privacy attitude, and the back-end is to explore the relationship between privacy attitude and privacy behavior. Taking privacy concern as a variable to measure privacy attitude, the research results indicate that the antecedent variables of front-end; self-efficacy, privacy awareness and Internet involvement has no statistically significant relationship with privacy concern, the back-end part; privacy concern will not affect information disclosure behavior. In addition, privacy concern will cause individual’s privacy protection behavior. Based on the results, this article recommends that future research should not be entangled in the debate about the existence of the privacy paradox, but should connect to specific issues, trying to fully understand the topic from different angles, and exploring research topics based on privacy paradox. |
Reference: | 中文部分 111年憲法法院判決第1號【肇事駕駛人受強制抽血檢測酒精濃度案】 111年憲法法院判決第13號【健保資料庫案】 于健, & 歐韋伶. (2021). 網路涉入, 網路口碑與訊息信任對旅客行動上網產品購買決策影響之研究-歐洲地區為例. 觀光與休閒管理期刊, 9(2), 28-39. 《中華民國憲法》 风笑天. (1994). 方法论背景中的问卷调查法. 社会学研究, 3, 13-18. 史書華&鄭敏聲. (2023). 15萬如何買下2300萬人?《天下》深入白帽駭客圈,還原個資賤售荒唐錄. 天下雜誌. https://www.cw.com.tw/article/5124927 《世界人權宣言》 民國81年司法院釋字第293號解釋 民國83年司法院釋字第364號解釋 民國93年司法院釋字第585號解釋 民國94年司法院釋字第603號解釋 李政忠. (2004). 網路調查所面臨的問題與解決建議. 資訊社會研究, 6, 1-24. 李茂能. (2006). 結構方程模式軟體 Amos 之簡介及其在測驗編製上之應用: An introduction to Amos and its uses in scale development: Graphics & Basic (Vol. 32). 心理. 邱皓政. (2011). 結構方程模式: LISREL 的理論, 技術與應用. Shuang ye shu lang you xian gong si. 洪新原, 洪幼力, & 張顥獻. (2021). 應用社會認知理論來瞭解個人揭露健康資料之意圖. 商略學報, 13(4), 267-293. 徐敬宏, & 侯偉鵬. (2020). 「隱私擔憂」的仲介效應:基於對大學生微信使用的結構方程模型分析. 傳播與社會學刊(54). https://doi.org/10.30180/CS.202010_(54).0004 莊書儀. (2023). 《全球新聞媒體使用大調查》臺灣管道多元發展,影音社群平台是關鍵角色!. https://www.find.org.tw/index/indus_trend/browse/63b88c0488d9f464be88242e1004e707/ 陳正昌. (2005). 多變量分析方法: 統計軟體應用. 五南圖書出版股份有限公司. 陳新豐, & 資訊教育. (2014). 結構方程模式: Mplus 的應用. 心理. 陳憶寧, & 溫嘉禾. (2020). 台灣臉書使用者的隱私行為研究: 劍橋分析事件之後. 傳播與社會學刊(54), 27-57. 黃葳威(2024)。「AI世代上網行為與網安素養探討」,發表於2024媒體天空領航員秋季論壇,新北市: 創世一家社服中心。 黃芳銘. (2015). 結構方程模式-理論與應用. 台灣五南圖書出版股份有限公司. 楊錦傑, 邱俊福. (2023). 打詐民調︰詐騙成國安問題 近9成民眾籲加重刑責. 自由時報. 英文部分 Acquisti, A., & Grossklags, J. (2005). Privacy and rationality in individual decision making. IEEE security & privacy, 3(1), 26-33. Adhikari, K., & Panda, R. K. (2018). Users' Information Privacy Concerns and Privacy Protection Behaviors in Social Networks. Journal of Global Marketing, 31(2), 96-110. https://doi.org/10.1080/08911762.2017.1412552 Akhter, S. H. (2014). Privacy concern and online transactions: the impact of internet self-efficacy and internet involvement. The Journal of consumer marketing, 31(2), 118-125. https://doi.org/10.1108/JCM-06-2013-0606 Alani, M. M. (2017). Android users privacy awareness survey. International Journal of Interactive Mobile Technologies, 11(3). Alkire, L., Pohlmann, J., & Barnett, W. (2019). Triggers and motivators of privacy protection behavior on Facebook. Journal of Services Marketing, 33(1), 57-72. Assembly, U. N. G. (1949). Universal declaration of human rights (Vol. 3381). Department of State, United States of America. Athey, S., Catalini, C., & Tucker, C. (2017). The digital privacy paradox: Small money, small costs, small talk. Awwal, M. A. (2012). Influence of age and genders on the relationship between computer self-efficacy and information privacy concerns. International Journal of Technology and Human Interaction (IJTHI), 8(1), 14-37. Bahirat, P., He, Y., Menon, A., & Knijnenburg, B. (2018). A data-driven approach to developing IoT privacy-setting interfaces. 23rd International Conference on Intelligent User Interfaces, Bahk, C. M. (2008). Reliance, immersion, and enjoyment: An exploratory socio-psychological analysis on internet involvement. Communications of the IIMA, 8(1), 7. Bailey, F. J., & Dua, J. (1999). Individualism—collectivism, coping styles, and stress in international and Anglo‐Australian students: A comparative study. Australian Psychologist, 34(3), 177-182. Baker-Eveleth, L., Stone, R., & Eveleth, D. (2022). Understanding social media users’ privacy-protection behaviors. Information & Computer Security, 30(3), 324-345. Bandara, R., Fernando, M., & Akter, S. (2021). Managing consumer privacy concerns and defensive behaviours in the digital marketplace. European Journal of Marketing, 55(1), 219-246. Bandura, A. (1978). Reflections on self-efficacy. Advances in behaviour research and therapy, 1(4), 237-269. Bandura, A. (1989). Regulation of cognitive processes through perceived self-efficacy. Developmental psychology, 25(5), 729. Barnes, S. B. (2006). A privacy paradox: Social networking in the United States. First Monday. Barth, S., de Jong, M. D. T., Junger, M., Hartel, P. H., & Roppelt, J. C. (2019). Putting the privacy paradox to the test: Online privacy and security behaviors among users with technical knowledge, privacy awareness, and financial resources. Telematics and Informatics, 41, 55-69. https://doi.org/https://doi.org/10.1016/j.tele.2019.03.003 Benamati, J. H., Ozdemir, Z. D., & Smith, H. J. (2017). An empirical test of an Antecedents – Privacy Concerns – Outcomes model. Journal of information science, 43(5), 583-600. https://doi.org/10.1177/0165551516653590 Bentler, P. M. (1995). EQS structural equations program manual (Vol. 6). Multivariate software Encino, CA. Beresford, A. R., Kübler, D., & Preibusch, S. (2012). Unwillingness to pay for privacy: A field experiment. Economics letters, 117(1), 25-27. Blank, G., Bolsover, G., & Dubois, E. (2014). A new privacy paradox: Young people and privacy on social network sites. Prepared for the Annual Meeting of the American Sociological Association, Boerman, S. C., Kruikemeier, S., & Zuiderveen Borgesius, F. J. (2018). Exploring Motivations for Online Privacy Protection Behavior: Insights From Panel Data. Communication research, 48(7), 953-977. https://doi.org/10.1177/0093650218800915 Boerman, S. C., Kruikemeier, S., & Zuiderveen Borgesius, F. J. (2021). Exploring motivations for online privacy protection behavior: Insights from panel data. Communication research, 48(7), 953-977. Braunstein, A., Granka, L., & Staddon, J. (2011). Indirect content privacy surveys: measuring privacy without asking about it. Proceedings of the Seventh Symposium on Usable Privacy and Security, Brown, B. (2001). Studying the internet experience. HP laboratories technical report HPL, 49. Browne, M. W., & Cudeck, R. (1992). Alternative ways of assessing model fit. Sociological methods & research, 21(2), 230-258. Buchanan, T., Paine, C., Joinson, A. N., & Reips, U. D. (2007). Development of measures of online privacy concern and protection for use on the Internet. Journal of the American society for information science and technology, 58(2), 157-165. Büchi, M., Just, N., & Latzer, M. (2017). Caring is not enough: the importance of Internet skills for online privacy protection. Information, Communication & Society, 20(8), 1261-1278. Burgoon, J. K. (2012). Privacy and communication. In Communication yearbook 6 (pp. 206-249). Routledge. Butler, J. S., Burkhauser, R. V., Mitchell, J. M., & Pincus, T. P. (1987). Measurement error in self-reported health variables. The Review of Economics and Statistics, 644-650. Chen, H., Beaudoin, C. E., & Hong, T. (2017). Securing online privacy: An empirical test on Internet scam victimization, online privacy concerns, and privacy protection behaviors. Computers in human behavior, 70, 291-302. Chen, H.-T. (2018). Revisiting the privacy paradox on social media with an extended privacy calculus model: The effect of privacy concerns, privacy self-efficacy, and social capital on privacy management. American behavioral scientist, 62(10), 1392-1412. Chen, H.-T., & Chen, W. (2015). Couldn't or wouldn't? The influence of privacy concerns and self-efficacy in privacy management on privacy protection. Cyberpsychology, Behavior, and Social Networking, 18(1), 13-19. Chen, L., Huang, Y., Ouyang, S., & Xiong, W. (2021). The data privacy paradox and digital demand. Chennamaneni, A., & Gupta, B. (2023). The privacy protection behaviours of the mobile app users: exploring the role of neuroticism and protection motivation theory. Behaviour & Information Technology, 42(12), 2011-2029. https://doi.org/10.1080/0144929X.2022.2106307 Christofides, E., Muise, A., & Desmarais, S. (2009). Information disclosure and control on Facebook: are they two sides of the same coin or two different processes? Cyberpsychology & behavior, 12(3), 341-345. Compeau, D., Higgins, C. A., & Huff, S. (1999). Social cognitive theory and individual reactions to computing technology: A longitudinal study. MIS quarterly, 145-158. Culnan, M. J., & Armstrong, P. K. (1999). Information privacy concerns, procedural fairness, and impersonal trust: An empirical investigation. Organization science, 10(1), 104-115. Day, G. S. (1967). Buyer Attitudes and Brand Choice Behavior. Columbia University. Debatin, B., Lovejoy, J. P., Horn, A.-K., & Hughes, B. N. (2009). Facebook and online privacy: Attitudes, behaviors, and unintended consequences. Journal of computer-mediated communication, 15(1), 83-108. Deuker, A. (2010). Addressing the privacy paradox by expanded privacy awareness–the example of context-aware services. Privacy and Identity Management for Life: 5th IFIP WG 9.2, 9.6/11.4, 11.6, 11.7/PrimeLife International Summer School, Nice, France, September 7-11, 2009, Revised Selected Papers 5, Dienlin, T., Masur, P. K., & Trepte, S. (2021). A longitudinal analysis of the privacy paradox. New Media & Society, 25(5), 1043-1064. https://doi.org/10.1177/14614448211016316 Dienlin, T., & Trepte, S. (2015). Is the privacy paradox a relic of the past? An in‐depth analysis of privacy attitudes and privacy behaviors. European journal of social psychology, 45(3), 285-297. Dinev, T., & Hart, P. (2006). An extended privacy calculus model for e-commerce transactions. Information systems research, 17(1), 61-80. Egelman, S., Felt, A. P., & Wagner, D. (2013). Choice architecture and smartphone privacy: There’sa price for that. In The economics of information security and privacy (pp. 211-236). Springer. Elhai, J. D., Levine, J. C., & Hall, B. J. (2017). Anxiety about electronic data hacking: Predictors and relations with digital privacy protection behavior. Internet Research, 27(3), 631-649. Ellison, N. B., Steinfield, C., & Lampe, C. (2007). The benefits of Facebook “friends:” Social capital and college students’ use of online social network sites. Journal of computer‐mediated communication, 12(4), 1143-1168. Fatima, R., Yasin, A., Liu, L., Wang, J., Afzal, W., & Yasin, A. (2019). Sharing information online rationally: An observation of user privacy concerns and awareness using serious game. Journal of information security and applications, 48, 102351. https://doi.org/10.1016/j.jisa.2019.06.007 Fazio, R. H. (1986). How do attitudes guide behavior. Handbook of motivation and cognition: Foundations of social behavior, 1, 204-243. Feng, Y., & Xie, W. (2014). Teens’ concern for privacy when using social networking sites: An analysis of socialization agents and relationships with privacy-protecting behaviors. Computers in human behavior, 33, 153-162. Fernandes, T., & Pereira, N. (2021). Revisiting the privacy calculus: Why are consumers (really) willing to disclose personal data online? Telematics and Informatics, 65, 101717. Floyd, D. L., Prentice‐Dunn, S., & Rogers, R. W. (2000). A meta‐analysis of research on protection motivation theory. Journal of applied social psychology, 30(2), 407-429. Fornell, C., & Larcker, D. F. (1981). Evaluating structural equation models with unobservable variables and measurement error. Journal of marketing research, 18(1), 39-50. Gerber, N., Gerber, P., & Volkamer, M. (2018). Explaining the privacy paradox: A systematic review of literature investigating privacy attitude and behavior. Computers & security, 77, 226-261. H. Akhter, S. (2014). Privacy concern and online transactions: the impact of internet self-efficacy and internet involvement. Journal of Consumer Marketing, 31(2), 118-125. Hair, J. (2009). Análise multivariada de dados. Bookman editora. Hallam, C., & Zanella, G. (2017). Online self-disclosure: The privacy paradox explained as a temporally discounted balance between concerns and rewards. Computers in human behavior, 68, 217-227. Hamilton, L. C. (1981). Self-reports of academic performance: Response errors are not well behaved. Sociological methods & research, 10(2), 165-185. Hargittai, E. (2010). Facebook privacy settings: Who cares? First Monday. Hargittai, E., & Marwick, A. (2016). “What can I really do?” Explaining the privacy paradox with online apathy. International journal of communication, 10, 21. Ho, S. S., Lwin, M. O., Yee, A. Z., & Lee, E. W. (2017). Understanding factors associated with Singaporean adolescents' intention to adopt privacy protection behavior using an extended theory of planned behavior. Cyberpsychology, Behavior, and Social Networking, 20(9), 572-579. Hu, H., Ahn, G.-J., & Jorgensen, J. (2011). Detecting and resolving privacy conflicts for collaborative data sharing in online social networks. Proceedings of the 27th annual computer security applications conference, Hu, L. t., & Bentler, P. M. (1999). Cutoff criteria for fit indexes in covariance structure analysis: Conventional criteria versus new alternatives. Structural equation modeling: a multidisciplinary journal, 6(1), 1-55. Ifinedo, P. (2016). Applying uses and gratifications theory and social influence processes to understand students' pervasive adoption of social networking sites: Perspectives from the Americas. International journal of information management, 36(2), 192-206. Introna, L., & Pouloudi, A. (1999). Privacy in the information age: Stakeholders, interests and values. Journal of business ethics, 22, 27-38. Isdal, T., Piatek, M., Krishnamurthy, A., & Anderson, T. (2010). Privacy-preserving p2p data sharing with oneswarm. ACM SIGCOMM computer communication review, 40(4), 111-122. Jones, B. D. (1999). Bounded rationality. Annual review of political science, 2(1), 297-321. Karlsson, M., Karlsson, S., & Malmberg, A. (2015). Big browser is watching you: How Information Privacy Concerns and Involvement affect Purchase Intentions in Online Personalized Advertising. In. Kim, D., Park, K., Park, Y., & Ahn, J.-H. (2019). Willingness to provide personal information: Perspective of privacy calculus in IoT services. Computers in human behavior, 92, 273-281. Kim, J., & Kim, S. (2013). Privacy behavioral intention in online environment: Based on protection motivation theory. Informatization policy, 20(3), 63-85. Kisekka, V., Bagchi-Sen, S., & Raghav Rao, H. (2013). Extent of private information disclosure on online social networks: An exploration of Facebook mobile phone users. Computers in human behavior, 29(6), 2722-2729. https://doi.org/10.1016/j.chb.2013.07.023 Kokolakis, S. (2017). Privacy attitudes and privacy behaviour: A review of current research on the privacy paradox phenomenon. Computers & security, 64, 122-134. https://doi.org/https://doi.org/10.1016/j.cose.2015.07.002 Koohikamali, M., Peak, D. A., & Prybutok, V. R. (2017). Beyond self-disclosure: Disclosure of information about others in social network sites. Computers in human behavior, 69, 29-42. Krasnova, H., Günther, O., Spiekermann, S., & Koroleva, K. (2009). Privacy concerns and identity in online social networks. Identity in the Information Society, 2, 39-63. Krasnova, H., Spiekermann, S., Koroleva, K., & Hildebrand, T. (2010). Online social networks: why we disclose. Journal of information technology, 25(2), 109-125. https://doi.org/10.1057/jit.2010.6 Kuhn, T. S. (1997). The structure of scientific revolutions (Vol. 962). University of Chicago press Chicago. Kumaraguru, P., & Cranor, L. (2005). Privacy in India: Attitudes and awareness. International workshop on privacy enhancing technologies, Lacko, D., Šašinka, Č., Čeněk, J., Stachoň, Z., & Lu, W.-l. (2020). Cross-cultural differences in cognitive style, individualism/collectivism and map reading between Central European and East Asian University students. Studia Psychologica, 62(1), 23-43. LaRose, R., & Rifon, N. J. (2007). Promoting i‐safety: effects of privacy warnings and privacy seals on risk assessment and online privacy behavior. Journal of consumer affairs, 41(1), 127-149. LaRose, R., Rifon, N. J., & Enbody, R. (2008). Promoting personal responsibility for internet safety. Communications of the ACM, 51(3), 71-76. Lee, W. Y., Tan, C.-S., & Siah, P. C. (2017). The role of online privacy concern as a mediator between internet self-efficacy and online technical protection privacy behavior. Sains Humanika, 9(3-2). Li, H., Wu, J., Gao, Y., & Shi, Y. (2016). Examining individuals’ adoption of healthcare wearable devices: An empirical study from privacy calculus perspective. International journal of medical informatics, 88, 8-17. Liu, Y., Gummadi, K. P., Krishnamurthy, B., & Mislove, A. (2011). Analyzing facebook privacy settings: user expectations vs. reality. Proceedings of the 2011 ACM SIGCOMM conference on Internet measurement conference, Lwin, M. O., Wirtz, J., & Stanaland, A. J. (2016). The privacy dyad: antecedents of promotion-and prevention-focused online privacy behaviors and the mediating role of trust and privacy concern. Internet Research, 26(4), 919-941. Maddux, J. E., & Rogers, R. W. (1983). Protection motivation and self-efficacy: A revised theory of fear appeals and attitude change. Journal of Experimental Social Psychology, 19(5), 469-479. https://doi.org/https://doi.org/10.1016/0022-1031(83)90023-9 Madejski, M., Johnson, M., & Bellovin, S. M. (2012). A study of privacy settings errors in an online social network. 2012 IEEE international conference on pervasive computing and communications workshops, Malandrino, D., Scarano, V., & Spinelli, R. (2013). How increased awareness can impact attitudes and behaviors toward online privacy protection. 2013 international conference on social computing, Malhotra, N. K., Kim, S. S., & Agarwal, J. (2004). Internet Users' Information Privacy Concerns (IUIPC): The Construct, the Scale, and a Causal Model. Information systems research, 15(4), 336-355. https://doi.org/10.1287/isre.1040.0032 Mamonov, S., & Benbunan-Fich, R. (2018). The impact of information security threat awareness on privacy-protective behaviors. Computers in human behavior, 83, 32-44. Marsh, H. W., Balla, J. R., & McDonald, R. P. (1988). Goodness-of-fit indexes in confirmatory factor analysis: The effect of sample size. Psychological bulletin, 103(3), 391. Marsh, H. W., & Hocevar, D. (1985). Application of confirmatory factor analysis to the study of self-concept: First-and higher order factor models and their invariance across groups. Psychological bulletin, 97(3), 562. Massara, F., Raggiotto, F., & Voss, W. G. (2021). Unpacking the privacy paradox of consumers: A psychological perspective. Psychology & Marketing, 38(10), 1814-1827. McDonald, R. P., & Ho, M.-H. R. (2002). Principles and practice in reporting structural equation analyses. Psychological methods, 7(1), 64. Milne, G. R., Labrecque, L. I., & Cromer, C. (2009). Toward an understanding of the online consumer's risky behavior and protection practices. Journal of consumer affairs, 43(3), 449-473. Miltgen, C. L., & Peyrat-Guillard, D. (2014). Cultural and generational influences on privacy concerns: a qualitative study in seven European countries. European journal of information systems, 23(2), 103-125. Miyazaki, A. D., & Fernandez, A. (2001). Consumer perceptions of privacy and security risks for online shopping. Journal of consumer affairs, 35(1), 27-44. Mohamed, N., & Ahmad, I. H. (2012). Information privacy concerns, antecedents and privacy measure use in social networking sites: Evidence from Malaysia. Computers in human behavior, 28(6), 2366-2375. https://doi.org/https://doi.org/10.1016/j.chb.2012.07.008 Moscardelli, D. M., & Divine, R. (2007). Adolescents' concern for privacy when using the Internet: An empirical analysis of predictors and relationships with privacy‐protecting behaviors. Family and Consumer Sciences Research Journal, 35(3), 232-252. Mosteller, J., & Poddar, A. (2017a). To Share and Protect: Using Regulatory Focus Theory to Examine the Privacy Paradox of Consumers' Social Media Engagement and Online Privacy Protection Behaviors. Journal of interactive marketing, 39, 27-38. https://doi.org/10.1016/j.intmar.2017.02.003 Mosteller, J., & Poddar, A. (2017b). To share and protect: Using regulatory focus theory to examine the privacy paradox of consumers’ social media engagement and online privacy protection behaviors. Journal of interactive marketing, 39(1), 27-38. Mou, J., Cohen, J. F., Bhattacherjee, A., & Kim, J. (2022). A test of protection motivation theory in the information security literature: A meta-analytic structural equation modeling approach. Journal of the Association for Information Systems, 23(1), 196-236. Mousavi, R., Chen, R., Kim, D. J., & Chen, K. (2020). Effectiveness of privacy assurance mechanisms in users' privacy protection on social networking sites from the perspective of protection motivation theory. Decision Support Systems, 135, 113323. https://doi.org/https://doi.org/10.1016/j.dss.2020.113323 Natarajan, L., Pu, M., Fan, J., Levine, R. A., Patterson, R. E., Thomson, C. A., Rock, C. L., & Pierce, J. P. (2010). Measurement error of dietary self-report in intervention trials. American journal of epidemiology, 172(7), 819-827. Nemec Zlatolas, L., Welzer, T., Heričko, M., & Hölbl, M. (2015). Privacy antecedents for SNS self-disclosure: The case of Facebook. Computers in human behavior, 45, 158-167. https://doi.org/10.1016/j.chb.2014.12.012 Norberg, P. A., & Horne, D. R. (2007). Privacy attitudes and privacy‐related behavior. Psychology & Marketing, 24(10), 829-847. Norberg, P. A., Horne, D. R., & Horne, D. A. (2007). The privacy paradox: Personal information disclosure intentions versus behaviors. Journal of consumer affairs, 41(1), 100-126. Oomen, I., & Leenes, R. (2008). Privacy risk perceptions and privacy protection strategies. Policies and Research in Identity Management: First IFIP WG11. 6 Working Conference on Policies and Research in Identity Management (IDMAN'07), RSM Erasmus University, Rotterdam, The Netherlands, October 11-12, 2007, Park, C., & Lee, S.-W. (2014). A study of the user privacy protection behavior in online environment: Based on protection motivation theory. Journal of Internet Computing and Services, 15(2), 59-71. Pejić Bach, M., Ivančić, L., Bosilj Vukšić, V., Stjepić, A.-M., & Milanović Glavan, L. (2023). Internet usage among senior citizens: self-efficacy and social influence are more important than social support. Journal of theoretical and applied electronic commerce research, 18(3), 1463-1483. Phelps, J., Nowak, G., & Ferrell, E. (2000). Privacy concerns and consumer willingness to provide personal information. Journal of public policy & marketing, 19(1), 27-41. Pötzsch, S. (2009). Privacy awareness: A means to solve the privacy paradox? The Future of Identity in the Information Society: 4th IFIP WG 9.2, 9.6/11.6, 11.7/FIDIS International Summer School, Brno, Czech Republic, September 1-7, 2008, Revised Selected Papers 4, Pötzsch, S., Wolkerstorfer, P., & Graf, C. (2010). Privacy-awareness information for web forums: Results from an empirical study. Proceedings of the 6th Nordic Conference on Human-Computer Interaction: Extending Boundaries, Preibusch, S. (2013). Guide to measuring privacy concern: Review of survey and observational instruments. International journal of human-computer studies, 71(12), 1133-1143. Rogers, R. W. (1975). A protection motivation theory of fear appeals and attitude change1. The journal of psychology, 91(1), 93-114. Rosenman, R., Tennekoon, V., & Hill, L. G. (2011). Measuring bias in self-reported data. International Journal of Behavioural and Healthcare Research, 2(4), 320-332. Salam, A. F., Rao, H. R., & Pegels, C. C. (2000). Internet involvement: Instrument development, measurement and implications for electronic commerce. Handbook on Electronic Commerce, 175-194. Schomakers, E.-M., Lidynia, C., & Ziefle, M. (2022). The role of privacy in the acceptance of smart technologies: Applying the privacy calculus to technology acceptance. International Journal of Human–Computer Interaction, 38(13), 1276-1289. Schumacker, R. E., & Lomax, R. G. (2004). A beginner's guide to structural equation modeling. psychology press. Sedek, M., Ahmad, R., & Othman, N. F. (2018). Motivational factors in privacy protection behaviour model for social networking. MATEC Web of Conferences, Sherif, M. (1947). The psychology of ego-involvements : social attitudes & identifications / by Muzafer Sherif and Hadley Cantril. J. Wiley, 1947. Simon, H. A. (1990). Bounded rationality. Utility and probability, 15-18. Smith, H. J., Dinev, T., & Xu, H. (2011). Information privacy research: an interdisciplinary review. MIS quarterly, 989-1015. Smith, H. J., Milberg, S. J., & Burke, S. J. (1996). Information privacy: Measuring individuals' concerns about organizational practices. MIS quarterly, 167-196. Spiekermann, S., Grossklags, J., & Berendt, B. (2001). E-privacy in 2nd generation E-commerce: privacy preferences versus actual behavior Proceedings of the 3rd ACM conference on Electronic Commerce, Tampa, Florida, USA. https://doi.org/10.1145/501158.501163 Stewart, K. A., & Segars, A. H. (2002). An empirical examination of the concern for information privacy instrument. Information systems research, 13(1), 36-49. Tan, X., Qin, L., Kim, Y., & Hsu, J. (2012). Impact of privacy concern in social networking web sites. Internet Research, 22(2), 211-233. Tsai, H.-y. S., Jiang, M., Alhabash, S., LaRose, R., Rifon, N. J., & Cotten, S. R. (2016). Understanding online safety behaviors: A protection motivation theory perspective. Computers & security, 59, 138-150. https://doi.org/https://doi.org/10.1016/j.cose.2016.02.009 Tuunainen, V. K., Pitkänen, O., & Hovi, M. (2009). Users' awareness of privacy on online social networking sites-case Facebook. Bled 2009 proceedings, 42. Utz, S., & Krämer, N. (2009). The privacy paradox on social network sites revisited: The role of individual characteristics and group norms. Cyberpsychology: Journal of psychosocial research on cyberspace, 3(2), 2. van Ooijen, I., Segijn, C. M., & Opree, S. J. (2024). Privacy cynicism and its role in privacy decision-making. Communication research, 51(2), 146-177. Vishwanath, A., Xu, W., & Ngoh, Z. (2018). How people protect their privacy on Facebook: A cost‐benefit view. Journal of the Association for Information Science and Technology, 69(5), 700-709. Wang, T., Duong, T. D., & Chen, C. C. (2016). Intention to disclose personal information via mobile applications: A privacy calculus perspective. International journal of information management, 36(4), 531-542. Wang, X., & Meng, T. (2022). Internet involvement, information consumption, and political participation in urban China. Chinese Journal of Sociology, 8(4), 562-595. https://doi.org/10.1177/2057150X221121698 Warner, M., & Wang, V. (2019). Self-censorship in social networking sites (SNSs) – privacy concerns, privacy awareness, perceived vulnerability and information management. Journal of information, communication & ethics in society (Online), 17(4), 375-394. https://doi.org/10.1108/JICES-07-2018-0060 Warren, S., & Brandeis, L. (1989). The right to privacy. In Killing the Messenger: 100 Years of Media Criticism (pp. 1-21). Columbia University Press. Westin, A. F. (1968). Privacy and freedom. Washington and Lee Law Review, 25(1), 166. Wirth, J., Maier, C., Laumer, S., & Weitzel, T. (2022). Laziness as an explanation for the privacy paradox: a longitudinal empirical investigation. Internet Research, 32(1), 24-54. Xie, W., & Karan, K. (2019). Consumers’ privacy concern and privacy protection on social network sites in the era of big data: Empirical evidence from college students. Journal of Interactive Advertising, 19(3), 187-201. Youn, S. (2009). Determinants of online privacy concern and its influence on privacy protection behaviors among young adolescents. Journal of consumer affairs, 43(3), 389-418. Young, A. L., & Quan-Haase, A. (2013). PRIVACY PROTECTION STRATEGIES ON FACEBOOK: The Internet privacy paradox revisited. Information, Communication & Society, 16(4), 479-500. https://doi.org/10.1080/1369118X.2013.777757 Zaichkowsky, J. L. (1986). Conceptualizing involvement. Journal of advertising, 15(2), 4-34. Zhang, N. A., Wang, C. A., Karahanna, E., & Xu, Y. (2022). PEER PRIVACY CONCERN: CONCEPTUALIZATION AND MEASUREMENT. MIS quarterly, 46(1). Zhou, T. (2011). Understanding online community user participation: a social influence perspective. Internet Research, 21(1), 67-81. https://doi.org/10.1108/10662241111104884 Zlatolas, L. N., Welzer, T., Heričko, M., & Hölbl, M. (2015). Privacy antecedents for SNS self-disclosure: The case of Facebook. Computers in human behavior, 45, 158-167. |
Description: | 碩士 國立政治大學 傳播學院傳播碩士學位學程 111464051 |
Source URI: | http://thesis.lib.nccu.edu.tw/record/#G0111464051 |
Data Type: | thesis |
Appears in Collections: | [傳播學院傳播碩士學位學程] 學位論文
|
Files in This Item:
There are no files associated with this item.
|
All items in 政大典藏 are protected by copyright, with all rights reserved.
|