Title

影響個人持續使用臉書揭露地標資訊之意圖的因素

Translated Titles

The Factors Influencing Individuals’ Intention toward Continuous Disclosing Place Information through the Use of Check-in of Facebook.

Authors

劉泯彤

Key Words

娛樂 ; 資訊記錄 ; 社會資本 ; 使用與滿足理論 ; 溝通隱私管理理論 ; Facebook Place ; information storage ; amusements. ; communication privacy maneagment theory ; Facebook place ; social capital ; use and gratifications theory

PublicationName

朝陽科技大學資訊管理系學位論文

Volume or Term/Year and Month of Publication

2013年

Academic Degree Category

碩士

Advisor

柯秀佳

Content Language

繁體中文

Chinese Abstract

手機地標打卡已成為現今非常熱門的社會網絡平台分享行為。個人可以透過揭露地標相關資訊增加與他人互動的機會,並記錄日常生活。企業可以藉由個人揭露地標相關資訊獲得宣傳商品或服務的機會。然而,地標打卡同時存在著風險,可能影響個人分享地標資訊的意圖。因此,瞭解引發及阻礙個人在適地性社會網絡平台打卡的原因是個重要的研究問題。 本研究以溝通隱私管理理論及使用與滿足理論為基礎,探討隱私管理規則及個人揭露地標相關訊息可能獲得的心理、社會、及實質方面的滿足感,如何影響個人揭露地標資訊之隱私關注以及持續揭露地標相關資訊的意圖。本研究透過問卷調查法進行,以國內目前最多人使用的Facebook地標打卡工具為研究工具。研究結果發現信任及隱私入侵經驗負向影響個人揭露地標資訊的隱私關注程度,而控制及社會延伸則正向影響個人揭露地標資訊的隱私關注程度。在影響持續使用打卡功能揭露地標相關資訊之意圖的因素中,以信任、記錄、社會延伸以及娛樂為主要原因。個人揭露地標資訊之隱私關注並未顯著影響個人持續使用打卡功能揭露地標相關資訊的意圖。最後,透過研究結果與實務意涵的討論,提出實質建議予適地性社會網絡平台的經營者及其他研究者進行未來相關研究的參考。

English Abstract

Nowadays, “Check-In” has become a popular behavior of social network sites (SNSs) usage. Individuals who disclose location related information through the use of “Check-In” increase the opportunity to interact with others and bring the benefits to record daily lives. Moreover, “Check-In” is beneficial for enterprises to obtain the promotional opportunity of products and services. However, individuals who engage in “Check-In” may also accompany with risk, which in turn decrease their intention toward sharing location related information. Therefore, understanding the reasons that influence individuals’ intention toward continuous using location-based social network sites service is a vital research issue. Base on Communication Privacy Management (CPM) theory and Use and Gratifications (U&G) theory, this study aimed to explore the impact of privacy management rule and the psychological, social, and substantial gratifications obtained from the disclosure of location related information on “Check-In” users’ privacy concern and intention toward continuous disclosing location information. The study was conducted by survey method and use the most popular “Check-In” service platform: Place of Facebook as research target. The results showed that trust and privacy invasion experience was negatively related to “Check-In” users’ privacy concerns; while control and bridge social capital were positively related to “Check-In” users’ privacy concerns. Moreover, the results revealed that trust, daily lives record, bridge social capital, and amusement obtain from “Check-In” usage were the main determinants of intention toward continuous disclosing location related information. This study results also found that “Check-In” users’ privacy concerns did not has significant impact on the intention toward continuous disclosing location related information. Finally, through the discussion of theoretical and practical implications, this study proposed several suggestions to location-base social network sites designers, enterprises, and future researchers.

Topic Category 資訊學院 > 資訊管理系
社會科學 > 管理學
Reference
  1. Ajzen, I. (1985), "From intentions to actions: A theory of planned behavior," from Action Control, Springer Berlin Heidelberg, pp. 11-39.
    連結:
  2. Ancu, M., & Cozma, R. (2009), "MySpace politics: Uses and gratifications of befriending candidates," Journal of Broadcasting & Electronic Media, Vol. 53, No. 4, pp. 567-583.
    連結:
  3. Argyrakis, J., Gritzalis, S., & Kioulafas, C. (2003), "Privacy enhancing technologies: A review," In Electronic Government, pp. 282-287.
    連結:
  4. Awad, N. F., & Krishnan, M. (2006), "The personalization privacy paradox: an empirical evaluation of information transparency and the willingness to be profiled online for personalization," Mis Quarterly, Vol. 31, No. 1, pp. 13-28.
    連結:
  5. Belanger, F., & Crossler, R. E. (2011), "Privacy in the digital age: a review of information privacy research in information systems," Mis Quarterly, Vol. 35, No. 4, pp. 1017-1042.
    連結:
  6. Ba, S., Whinston, A. B., & Zhang, H. (2003), "Building trust in online auction markets through an economic incentive mechanism," Decision Support Systems, Vol. 35, No. 3, pp. 273-286.
    連結:
  7. Babrow, A. S. (1987), "Student motives for watching soap operas," Journal of Broadcasting & Electronic Media, Vol. 31 , No. 3, pp. 309-321.
    連結:
  8. Bagozzi, R. P., & Yi, Y. (1988), "On the evaluation of structural equation models," Journal of the academy of marketing science, Vol. 16, No. 1, pp. 74-94.
    連結:
  9. Bansal, G., Zahedi, F., & Gefen, D. (2010), "The impact of personal dispositions on information sensitivity, privacy concern and trust in disclosing health information online," Decision Support Systems, Vol. 49, No. 2, pp. 138-150.
    連結:
  10. Belanger, F., Hiller, J. S., & Smith, W. J. (2002), "Trustworthiness in electronic commerce: the role of privacy, security, and site attributes," The Journal of Strategic Information Systems, Vol. 11, No. 3, pp. 245-270.
    連結:
  11. Bellavista, P., Kupper, A., & Helal, S. (2008), "Location-based services: Back to the future," Pervasive Computing, IEEE, Vol. 7, No. 2, pp. 85-89.
    連結:
  12. Bhattacherjee, A. (2001), "Understanding information systems continuance: an expectation-confirmation model," Mis Quarterly, Vol. 25, No. 3, pp. 351-370.
    連結:
  13. Bhattacherjee, A., & Premkumar, G. (2004), "Understanding changes in belief and attitude toward information technology usage: a theoretical model and longitudinal test," Mis Quarterly, Vol. 28, No. 2, pp. 229-254.
    連結:
  14. Blumler, J. G. (1979), "The role of theory in uses and gratifications studies," Communication Research, Vol. 6, No. 1, pp. 9-36.
    連結:
  15. Bove, L. L., & Johnson, L. W. (2001), "Customer relationships with service personnel: do we measure closeness, quality or strength?," Journal of Business Research, Vol. 54, No. 3, pp. 189-197.
    連結:
  16. Bridges, E., & Florsheim, R. (2008), "Hedonic and utilitarian shopping goals: the online experience," Journal of Business Research, Vol. 61, No. 4, pp. 309-314.
    連結:
  17. Boyd, D. M. (2008), "Taken out of context: American teen sociality in networked publics," ProQuest.
    連結:
  18. Burt, R. S. (1992), "The social structure of competition. Networks and organizations: Structure, form, and action," pp. 57-91.
    連結:
  19. Cheung, C. M., & Lee, M. K. (2009), "Understanding the sustainability of a virtual community: model development and empirical test," Journal of Information Science, Vol. 35, No. 3, pp. 279-298.
    連結:
  20. Cheung, C. M. K., Chiu, P.-Y., & Lee, M. K. O. (2011), "Online social networks: Why do students use facebook?," Computers in Human Behavior, Vol. 27, No. 4, pp. 1337-1343.
    連結:
  21. Child, J. T., & Agyeman-Budu, E. A. (2010), "Blogging privacy management rule development: The impact of self-monitoring skills, concern for appropriateness, and blogging frequency," Computers in Human Behavior, Vol. 26, No. 5, pp. 957-963.
    連結:
  22. Child, J. T., Haridakis, P. M., & Petronio, S. (2012), "Blogging privacy rule orientations, privacy management, and content deletion practices: The variability of online privacy management activity at different stages of social media use," Computers in Human Behavior, Vol. 28, No. 5, pp. 1859–1872.
    連結:
  23. Child, J. T., Pearson, J. C., & Petronio, S. (2009), "Blogging, communication, and privacy management: Development of the blogging privacy management measure," Journal of the American Society for Information Science and Technology, Vol. 60, No. 10, pp. 2079-2094.
    連結:
  24. Child, J. T., Petronio, S., Agyeman-Budu, E. A., & Westermann, D. A. (2011), "Blog scrubbing: Exploring triggers that change privacy rules," Computers in Human Behavior, Vol. 27, No. 5, pp. 2017-2027.
    連結:
  25. Child, J. T., & Westermann, D. A. (2013), "Let''s Be Facebook Friends: Exploring Parental Facebook Friend Requests from a Communication Privacy Management (CPM) Perspective," Journal of Family Communication, Vol. 13, No. 1, pp. 46-59.
    連結:
  26. Chin, W. W. (1998), The partial least squares approach for structural equation modeling.
    連結:
  27. Chiu, C.-M., Hsu, M.-H., & Wang, E. T. G. (2006), "Understanding knowledge sharing in virtual communities: An integration of social capital and social cognitive theories," Decision Support Systems, Vol. 42, No. 3, pp. 1872-1888.
    連結:
  28. Christofides, E., Muise, A., & Desmarais, S. (2009), "Information disclosure and control on Facebook: are they two sides of the same coin or two different processes?," CyberPsychology & Behavior, Vol. 12, No. 3, pp. 341-345.
    連結:
  29. Clarke, R. (1999a), "Internet privacy concerns confirm the case for intervention," Communications of the ACM, Vol 42, No. 2, pp. 60-67.
    連結:
  30. Clarke, R. (2001), "Person location and person tracking-Technologies, risks and policy implications," Information Technology & People, Vol. 14, No. 2, pp. 206-231.
    連結:
  31. Cohen, S. E., & Syme, S. (1985), Social support and health, Academic Press.
    連結:
  32. Coleman, J. S. (1988), "Social capital in the creation of human capital," American journal of sociology, pp. S95-S120.
    連結:
  33. Culnan, M. J. (1993), "How did they get my name?: An exploratory investigation of consumer attitudes toward secondary information use," Mis Quarterly, Vol. 17, No. 3, pp. 341-363.
    連結:
  34. Culnan, M. J., & Armstrong, P. K. (1999), "Information privacy concerns, procedural fairness, and impersonal trust: An empirical investigation," Organization Science, Vol. 10, No. 1, pp. 104-115.
    連結:
  35. Cutrona, C. E., & Suhr, J. A. (1992), "Controllability of stressful events and satisfaction with spouse support behaviors," Communication Research, Vol. 19, No. 2, pp. 154-174.
    連結:
  36. Debatin, B., Lovejoy, J. P., Horn, A. K., & Hughes, B. N. (2009), "Facebook and online privacy: Attitudes, behaviors, and unintended consequences," Journal of Computer‐Mediated Communication, Vol. 15, No. 1, pp. 83-108.
    連結:
  37. Dholakia, U. M., Bagozzi, R. P., & Pearo, L. K. (2004), "A social influence model of consumer participation in network-and small-group-based virtual communities," International Journal of Research in Marketing, Vol. 21, No. 3, pp. 241-263.
    連結:
  38. Dinev, T., Bellotto, M., Hart, P., Russo, V., & Serra, I. (2006a), "Internet users'' privacy concerns and beliefs about government surveillance: An exploratory study of differences between Italy and the United States," Journal of Global Information Management (JGIM), Vol. 14, No. 4, pp. 57-93.
    連結:
  39. Dinev, T., & Hart, P. (2004), "Internet privacy concerns and their antecedents-measurement validity and a regression model," Behaviour & Information Technology, Vol. 23, No. 6, pp. 413-422.
    連結:
  40. Dinev, T., & Hart, P. (2006a), "An extended privacy calculus model for e-commerce transactions," Information Systems Research, Vol. 17, No. 1, pp. 61-80.
    連結:
  41. Dinev, T., & Hart, P. (2006b), "Privacy concerns and levels of information exchange: an empirical investigation of intended e-services use," E-service Journal, Vol. 4, No. 3, pp. 25-59.
    連結:
  42. Donath, J., & Boyd, D. (2004), "Public displays of connection," bt technology Journal,Vol. 22, No. 4, pp. 71-82.
    連結:
  43. Dunne, A., Lawlor, M.-A., & Rowley, J. (2010), "Young people''s use of online social networking sites – a uses and gratifications perspective," Journal of Research in Interactive Marketing, Vol. 4, No. 1, pp. 46-58.
    連結:
  44. Dwyer, C., Hiltz, S. R., & Passerini, K. (2007), "Trust and Privacy Concern Within Social Networking Sites: A Comparison of Facebook and MySpace," Paper presented at the AMCIS, pp. 339.
    連結:
  45. Eastlick, M. A., Lotz, S. L., & Warrington, P. (2006), "Understanding online B-to-C relationships: an integrated model of privacy concerns, trust, and commitment," Journal of Business Research, Vol. 59, No. 8, pp. 877-886.
    連結:
  46. Elliott, W. R., & Rosenberg, W. L. (1987), "The 1985 Philadelphia newspaper strike: A uses and gratifications study," Journalism & Mass Communication Quarterly, Vol. 64, No. 4, pp. 679-687.
    連結:
  47. Ellison, N. B. (2007), "Social network sites: Definition, history, and scholarship," Journal of Computer‐Mediated Communication, Vol. 13, No. 1, pp. 210-230.
    連結:
  48. Ellison, N. B., Steinfield, C., & Lampe, C. (2007), "”The benefits of Facebook “friends:” Social capital and college students’ use of online social network sites," Journal of Computer‐Mediated Communication, Vol. 12, No. 4, pp. 1143-1168.
    連結:
  49. Ellison, N. B., Steinfield, C., & Lampe, C. (2011), "Connection strategies: Social capital implications of Facebook-enabled communication practices," New Media & Society, Vol. 13, No. 6, pp. 873-892.
    連結:
  50. Ellison, N. B., Vitak, J., Steinfield, C., Gray, R., & Lampe, C. (2011), "Negotiating privacy concerns and social capital needs in a social media environment," in Privacy Online, pp. 19-32.
    連結:
  51. Featherman, M. S., & Pavlou, P. A. (2003), "Predicting e-services adoption: a perceived risk facets perspective," Journal of Human-Computer, Vol. 59, No. 4, pp. 451-474.
    連結:
  52. Fogel, J., & Nehmad, E. (2009), "Internet social network communities: Risk taking, trust, and privacy concerns," Computers in Human Behavior, Vol. 25, No. 1, pp. 153-160.
    連結:
  53. Frampton, B. D., & Child, J. T. (2013), "Friend or not to friend: Coworker Facebook friend requests as an application of communication privacy management theory," Computers in Human Behavior, Vol. 29, No. 6, pp. 2257-2264.
    連結:
  54. Gefen, D., Karahanna, E., & Straub, D. W. (2003), "Trust and TAM in online shopping: an integrated model," Mis Quarterly, Vol. 27, No. 1, pp. 51-90.
    連結:
  55. Grabner-Krauter, S., & Bitter, S. (2013), "Trust in online social networks: A multifaceted perspective," Paper presented at the Forum for Social Economics, No. ahead-of-print, pp. 1-21.
    連結:
  56. Granovetter, M. (1983), "The strength of weak ties: A network theory revisited," Sociological theory, Vol. 1, No. 1, pp. 201-233.
    連結:
  57. Griffith, T. L. (1999), "Technology features as triggers for sensemaking," Academy of management review, pp. 472-488.
    連結:
  58. Gupta, S., Lu, Y., & Zhao, L. (2012), "Disclosure Intention of Location-Related Information in Location-Based Social Network Services," International Journal of Electronic Commerce, Vol. 16, No. 4, pp. 53-90.
    連結:
  59. Hampton, K., & Wellman, B. (2003), "Neighboring in Netville: How the Internet supports community and social capital in a wired suburb," City & Community, Vol. 2, No. 4, pp. 277-311.
    連結:
  60. Haridakis, P., & Hanson, G. (2009), "Social interaction and co-viewing with YouTube: Blending mass communication reception and social connection," Journal of Broadcasting & Electronic Media, Vol. 53, No. 2, pp. 317-335.
    連結:
  61. Haythornthwaite, C. (2002), "Strong, weak, and latent ties and the impact of new media," The Information Society, Vol. 18, No. 5, pp. 385-401.
    連結:
  62. Hicks, A., Comp, S., Horovitz, J., Hovarter, M., Miki, M., & Bevan, J. L. (2012), "Why people use Yelp.com: An exploration of uses and gratifications," Computers in Human Behavior, Vol. 28, No. 6, pp. 2274-2279.
    連結:
  63. Hollenbaugh, E. E. (2011), "Motives for maintaining personal journal blogs," Cyberpsychology, Behavior, and Social Networking, Vol. 14, No. 1-2, pp. 13-20.
    連結:
  64. Humphreys, L. (2007), "Mobile social networks and social practice: A case study of Dodgeball," Journal of Computer‐Mediated Communication, Vol. 13, No. 1, pp. 341-360.
    連結:
  65. Jarvenpaa, S. L., Knoll, K., & Leidner, D. E. (1998), "Is Anybody Out There? Antecedents of Trust in Global," Journal 0f Management Information Systems, Vol. 4, No. 4, pp. 29-64.
    連結:
  66. Jasperson, J. S., Carter, P. E., & Zmud, R. W. (2005), "A comprehensive conceptualization of post-adoptive behaviors associated with information technology enabled work systems," Mis Quarterly, Vol. 29, No. 3, pp. 525-557.
    連結:
  67. Jin, S.-A. A. (2012), "“To disclose or not to disclose, that is the question”: A structural equation modeling approach to communication privacy management in e-health," Computers in Human Behavior, Vol. 28, No. 1, pp. 69-77.
    連結:
  68. Katz, E., Blumler, J. G., & Gurevitch, M. (1974), "Utilization of mass communication by the individual," The uses of mass communications: Current perspectives on gratifications research, Vol. 3, pp. 19-32.
    連結:
  69. Kim, D. J. (2008), "Self-perception-based versus transference-based trust determinants in computer-mediated transactions: a cross-cultural comparison study," Journal of Management Information Systems, Vol. 24, No. 4, pp. 13-45.
    連結:
  70. Kraut, R., Patterson, M., Lundmark, V., Kiesler, S., Mukophadhyay, T., & Scherlis, W. (1998), "Internet paradox: A social technology that reduces social involvement and psychological well-being?," American psychologist, Vol. 53, No. 9, pp. 1017.
    連結:
  71. Ku, Y.-C., Chu, T.-H., & Tseng, C.-H. (2012), "Gratifications for using CMC technologies: A comparison among SNS, IM, and e-mail," Computers in Human Behavior, Vol. 29, No. 1, pp. 226–234.
    連結:
  72. Laufer, R. S., & Wolfe, M. (1977), "Privacy as a concept and a social issue: A multidimensional developmental theory," Journal of Social Issues, Vol. 33, No. 3, pp. 22-42.
    連結:
  73. Laurenceau, J.-P., Barrett, L. F., & Pietromonaco, P. R. (1998), "Intimacy as an interpersonal process: The importance of self-disclosure, partner disclosure, and perceived partner responsiveness in interpersonal exchanges," Journal of personality and social psychology, Vol. 74, No. 5, pp. 1238-1251.
    連結:
  74. Lee, C. S., & Ma, L. (2012), "News sharing in social media: The effect of gratifications and prior experience," Computers in Human Behavior, Vol. 28, No. 2, pp. 331-339.
    連結:
  75. Lee, D. H., Im, S., & Taylor, C. R. (2008)," Voluntary self‐disclosure of information on the Internet: A multimethod study of the motivations and consequences of disclosing information on blogs," Psychology & Marketing, Vol. 25, No. 7, pp. 692-710.
    連結:
  76. Leung, L., & Wei, R. (2000), "More than just talk on the move: Uses and gratifications of the cellular phone," Journalism & Mass Communication Quarterly, Vol. 77, No. 2, pp. 308-320.
    連結:
  77. Lin, N., Cook, K. S., & Burt, R. S. (Eds.), (2001)Social capital: theory and research, Transaction Publishers.
    連結:
  78. Lo, O. W.-Y., & Leung, L. (2009), "Effects of gratification-opportunities and gratifications-obtained on preferences of instant messaging and e-mail among college students," Telematics and Informatics, Vol. 26, No. 2, pp. 156-166.
    連結:
  79. Magro, M. J., Ryan, S. D., & Prybutok, V. R. (2013), "The Social Network Application Post-Adoptive Use Model (SNAPUM): A Model Examining Social Capital and Other Critical Factors Affecting the Post-Adoptive Use of Facebook," Informing Science: the International Journal of an Emerging Transdiscipline, Vol. 16, pp. 37-69.
    連結:
  80. Malhotra, N. K., Kim, S. S., & Agarwal, J. (2004), "Internet users'' information privacy concerns (IUIPC): the construct, the scale, and a causal model," Information Systems Research, Vol. 15, No. 4, pp. 336-355.
    連結:
  81. Mason, R. O. (1986), "Four ethical issues of the information age," Mis Quarterly, Vol. 10, No. 1, pp. 5-12.
    連結:
  82. Mayer, R. C., Davis, J. H., & Schoorman, F. D. (1995), "An integrative model of organizational trust," Academy of management review, Vol. 20, No. 3, pp. 709-734.
    連結:
  83. McKnight, D. H., Choudhury, V., & Kacmar, C. (2002), "Developing and validating trust measures for e-commerce: an integrative typology," Information Systems Research, Vol. 13, No. 3, pp. 334-359.
    連結:
  84. McQuail, D. (1994), Mass comunication theory, An Introduction. London.
    連結:
  85. McQuail, D. (2010), McQuail''s mass communication theory, SAGE Publications Limited.
    連結:
  86. Mendelsohn, H. (1964), "Listening to radio. People, society and mass communication, pp. 239-248.
    連結:
  87. Metzger, M. J. (2004), "Privacy, trust, and disclosure: Exploring barriers to electronic commerce," Journal of Computer‐Mediated Communication, Vol. 9, No. 4, pp. 00-00.
    連結:
  88. Metzger, M. J. (2007), "Communication Privacy Management in Electronic Commerce," Journal of Computer-Mediated Communication, Vol. 12, No. 2, pp. 335-361.
    連結:
  89. Nahapiet, J., & Ghoshal, S. (1998), "Social capital, intellectual capital, and the organizational advantage," Academy of management review, pp. 242-266.
    連結:
  90. Netemeyer, R. G., Burton, S., & Lichtenstein, D. R. (1995), "Trait aspects of vanity: measurement and relevance to consumer behavior," Journal of consumer research, pp. 612-626.
    連結:
  91. Newhagen, J. E., & Rafaeli, S. (1996), "Why communication researchers should study the Internet: A dialogue," Journal of Computer‐Mediated Communication, Vol. 1, No. 4, pp. 0-0.
    連結:
  92. Nie, N. H. (2001), "Sociability, interpersonal relations, and the internet reconciling conflicting findings," American behavioral scientist, Vol. 45, No. 3, pp. 420-435.
    連結:
  93. Nov, O., Naaman, M., & Ye, C. (2010), "Analysis of participation in an online photo‐sharing community: A multidimensional perspective," Journal of the American Society for Information Science and Technology, Vol. 61, No. 3, pp. 555-566.
    連結:
  94. Oliver, R. L. (1980), "A cognitive model of the antecedents and consequences of satisfaction decisions," Journal of Marketing Research, pp. 460-469.
    連結:
  95. Pai, P., & Arnott, D. C. (2012), "User adoption of social networking sites: Eliciting uses and gratifications through a means–end approach," Computers in Human Behavior, Vol. 29, No. 3, pp. 1039–1053.
    連結:
  96. Park, N., Kee, K. F., & Valenzuela, S. (2009), "Being immersed in social networking environment: Facebook groups, uses and gratifications, and social outcomes," CyberPsychology & Behavior, Vol. 12, No. 6, pp.729-733.
    連結:
  97. Patil, S., Norcie, G., Kapadia, A., & Lee, A. J. (2012), "Reasons, rewards, regrets: Privacy considerations in location sharing as an interactive practice," Paper presented at the Proceedings of the Eighth Symposium on Usable Privacy and Security.
    連結:
  98. Pavlou, P., & Chellappa, R. (2001), "The role of perceived privacy and perceived security in the development of trust in electronic commerce transactions," Information System Research, Vol. 11, pp. 18-36.
    連結:
  99. Pavlou, P. A., & Gefen, D. (2004), "Building effective online marketplaces with institution-based trust," Information Systems Research, Vol. 15, No. 1, pp. 37-59.
    連結:
  100. Pavlou, P. A., & Gefen, D. (2005), "Psychological contract violation in online marketplaces: Antecedents, consequences, and moderating role," Information Systems Research, Vol. 16, No. 4, pp. 372-399.
    連結:
  101. Pedersen, S., & Macafee, C. (2007), "Gender differences in British blogging," Journal of Computer‐Mediated Communication, Vol. 12, No. 4, pp. 1472-1492.
    連結:
  102. Petronio, S. (1991), "Communication boundary management: A theoretical model of managing disclosure of private information between marital couples," Communication Theory, Vol. 1, No. 4, pp. 311-335.
    連結:
  103. Petronio, S., Ellemers, N., Giles, H., & Gallois, C. (1998), "(Mis) communicating Across Boundaries Interpersonal and Intergroup Considerations," Communication Research, Vol. 25, No. 6, pp. 571-595.
    連結:
  104. Petronio, S. S. (2002), "Boundaries of privacy: Dialectics of disclosure, Suny Press.
    連結:
  105. Phelps, J., Nowak, G., & Ferrell, E. (2000), "Privacy concerns and consumer willingness to provide personal information," Journal of Public Policy & Marketing(19:1), pp. 27-41.
    連結:
  106. Portes, A. (1998), "social capital: Its Origins and Applications in Modern Sociology," Annual Review of Sociology, Vol. 24, pp. 1-24.
    連結:
  107. Putnam, R. D. (1995), "Tuning in, tuning out: The strange disappearance of social capital in America," PS-WASHINGTON-, Vol. 28, pp. 664-664.
    連結:
  108. Putnam, R. D. (2000), Bowling alone: The collapse and revival of American community, New York: Simon and Schuster.
    連結:
  109. Raacke, J., & Bonds-Raacke, J. (2008), "MySpace and Facebook: Applying the uses and gratifications theory to exploring friend-networking sites," CyberPsychology & Behavior, Vol. 11, No. 2, pp. 169-174.
    連結:
  110. Rafaeli, S., & Ariel, Y. (2008), "11 Online Motivational Factors: Incentives for Participation and Contribution in Wikipedia".
    連結:
  111. Rubin, Z. (1975), "Disclosing oneself to a stranger: Reciprocity and its limits," Journal of Experimental Social Psychology, Vol. 11, No. 3, pp. 233-260.
    連結:
  112. Ruggiero, T. E. (2000), "Uses and gratifications theory in the 21st century," Mass communication & society, Vol. 3,No. 1, pp. 3-37.
    連結:
  113. Sheehan, K. B. (1999), "An investigation of gender differences in on-line privacy concerns and resultant behaviors," Journal of Interactive Marketing, Vol. 13, No. 4, pp. 24-38.
    連結:
  114. Sheehan, K. B., & Hoy, M. G. (2000), "Dimensions of privacy concern among online consumers," Journal of Public Policy & Marketing(19:1), pp.62-73.
    連結:
  115. Smith, H. J., Milberg, S. J., & Burke, S. J. (1996), "Information privacy: measuring individuals'' concerns about organizational practices," Mis Quarterly, pp. 167-196.
    連結:
  116. Smith, H. J., Dinev, T., & Xu, H. (2011), "Information privacy research: An interdisciplinary review," MIS quarterly, Vol. 35, No. 4, pp. 989-1016.
    連結:
  117. Steel, J. L. (1991), "Interpersonal correlates of trust and self-disclosure," Psychological Reports, Vol. 68, No. 3c, pp. 1319-1320.
    連結:
  118. Stewart, K. A., & Segars, A. H. (2002), "An empirical examination of the concern for information privacy instrument," Information Systems Research, Vol. 13, No. 1, pp. 36-49.
    連結:
  119. Stone, E. F., Gueutal, H. G., Gardner, D. G., & McClure, S. (1983), "A field experiment comparing information-privacy values, beliefs, and attitudes across several types of organizations," Journal of Applied Psychology, Vol. 68, No. 3, pp. 459-468.
    連結:
  120. Stone, E. F., & Stone, D. L. (1990), "Privacy in organizations: Theoretical issues, research findings, and protection mechanisms," Research in personnel and human resources management, Vol. 8, No. 3, pp. 349-411.
    連結:
  121. Strahilevitz, L. (2004), "A Social Networks Theory of Privacy," U Chicago Law & Economics, Olin Working Paper, pp. 230.
    連結:
  122. Straub, D. W., Karahann, E., & Chervany, N. (1999), "Information technology adoption across time: a cross-sectional comparison of pre-adoption and post-adoption belief," Mis Quarterly, Vol. 23, No. 2, pp. 183-213.
    連結:
  123. Stutzman, F., Capra, R., & Thompson, J. (2011), "Factors mediating disclosure in social network sites," Computers in Human Behavior, Vol. 27, No. 1, pp. 590-598.
    連結:
  124. Taddicken, M., & Jers, C. (2011), "The Uses of Privacy Online: Trading a Loss of Privacy for Social Web Gratifications?, " Privacy Online, Springer, pp. 143-156.
    連結:
  125. Teo, H.-H., Wei, K.-K., & Benbasat, I. (2003), "Predicting intention to adopt interorganizational linkages: An institutional perspective," Mis Quarterly, pp. 19-49.
    連結:
  126. Tufekci, Z. (2008), "Can you see me now? Audience and disclosure regulation in online social network sites," Bulletin of Science, Technology & Society, Vol. 28, No.1, pp. 20-36.
    連結:
  127. Valenzuela, S., Park, N., & Kee, K. F. (2009), "Is There Social Capital in a Social Network Site?: Facebook Use and College Students'' Life Satisfaction, Trust, and Participation," Journal of Computer-Mediated Communication, Vol. 14, No. 4, pp. 875-901.
    連結:
  128. Viegas, F. B. (2005), "Bloggers'' expectations of privacy and accountability: An initial survey," Journal of Computer‐Mediated Communication, Vol.10, No. 3, pp. 00-00.
    連結:
  129. Wang, P. Z., & Waller, D. S. (2006), "Measuring consumer vanity: A cross-cultural validation," Psychology and Marketing, Vol. 23, No. 8, pp. 665-687.
    連結:
  130. Waters, S., & Ackerman, J. (2011), "Exploring privacy management on Facebook: motivations and perceived consequences of voluntary disclosure," Journal of Computer‐Mediated Communication, Vol. 17, No. 1, pp. 101-115.
    連結:
  131. Westin, A. F. (2003), "Social and political dimensions of privacy," Journal of social issues, Vol. 59, No. 2, pp. 431-453.
    連結:
  132. Westlake, E. (2008), "Friend me if you Facebook: Generation Y and performative surveillance," TDR/The Drama Review, Vol. 52, No. 4, pp. 21-40.
    連結:
  133. Wheeless, L. R., & Grotz, J. (1977), "The measurement of trust and its relationship to self‐disclosure," Human Communication Research, Vol. 3, No. 3, pp. 250-257.
    連結:
  134. Williams, D. (2006), "On and off the’net: Scales for social capital in an online era," Journal of Computer‐Mediated Communication, Vol. 11, No. 2, pp. 593-628.
    連結:
  135. Xu, C., Ryan, S., Prybutok, V., & Wen, C. (2012), "It is not for fun: An examination of social network site usage," Information & Management, Vol. 49, No. 5, pp. 210-217.
    連結:
  136. Xu, H. (2007), "The Effects of Self-Construal and Perceived Control on Privacy Concerns," In Proceedings of the 28th international conference on information systemens, Montreal, Canada, p. 125.
    連結:
  137. Xu, H., Teo, H.-H., Tan, B. C., & Agarwal, R. (2009), "The role of push-pull technology in privacy calculus: the case of location-based services," Journal of Management Information Systems, Vol. 26, No. 3, pp. 135-174.
    連結:
  138. Zhang, Y., Tang, L. S.-T., & Leung, L. (2011), "Gratifications, collective self-esteem, online emotional openness, and traitlike communication apprehension as predictors of Facebook uses." Cyberpsychology, Behavior, and Social Networking, Vol. 14, No. 12, pp. 733-739.
    連結:
  139. 王中天(2003),「社會資本 (Social Capital): 概念, 源起, 及現況」,問題與研究,第42卷,第五期,第139-163頁。
    連結:
  140. 安碧芸、鄭淑慧(2007),「台灣地區傳播相關科系大專學生收聽無線廣播與網路廣播節目之動機與行為分析」,朝陽人文社會學刊,第五卷,第一期,第 103-147頁。
    連結:
  141. 胡詩憶(2011),Facebook Place使用意圖影響因素之探討,中正大學電訊傳播研究所論文,嘉義。
    連結:
  142. Al Hasib, A. (2009), "Threats of online social networks," International Journal of Computer Science and Network Security, Vol. 9, No. 11, pp. 288-293.
  143. Altman, I. (1975), "The environment and social behavior, " Brooks/Cole Monterey, CA.
  144. Barkhuus, L., Brown, B., Bell, M., Sherwood, S., Hall, M., & Chalmers, M. (2008), "From awareness to repartee: sharing location within social groups," Paper presented at the proceedings of the SIGCHI conference on human factors in computing systems, pp. 497-506.
  145. Bourdieu, P. (1986), "The forms of social capital," In J. G. Richardson (Ed.), Handbook for Theory and Research for the Sociology of Education, pp. 241-258.
  146. Chen, K., & Rea, A. I. (2004), "Protecting personal information online: A survey of user privacy concerns and control techniques," Journal of Computer Information Systems, Vol. 44, No. 4, pp. 85-92.
  147. Clarke, R. (1999b), "Introduction to dataveillance and information privacy, and definitions of terms," Roger Clarke''s Dataveillance and Information Privacy Pages.
  148. Cohen, N. S., & Shade, L. R. (2008), "Gendering Facebook: Privacy and commodification," Feminist Media Studies, Vol. 8, No. 2, pp. 210-214.
  149. Consolvo, S., Smith, I. E., Matthews, T., LaMarca, A., Tabert, J., & Powledge, P. (2005), "Location disclosure to social relations: why, when, & what people want to share," Paper presented at the Proceedings of the SIGCHI conference on Human factors in computing systems, pp. 81-90.
  150. Dinev, T., Bellotto, M., Hart, P., Russo, V., Serra, I., & Colautti, C. (2006b), "Privacy calculus model in e-commerce–a study of Italy and the United States," European Journal of Information Systems, Vol. 15, No. 4, pp. 389-402.
  151. Goodwin, C. (1991), "Privacy: recognition of a consumer right," Journal of Public Policy & Marketing, pp. 149-166.
  152. Gross, R., & Acquisti, A. (2005), "Information revelation and privacy in online social networks," Paper presented at the Proceedings of the 2005 ACM workshop on Privacy in the electronic society, pp. 71-80.
  153. Hair, J., Tatham, R. L., Anderson, R., & Black, W. (1998), Multivariate data analysis(5th ed.), New Jersey: Prentice-Hall, Inc.
  154. Jensen, K. B., & Rosengren, K. E. (1990), "Five traditions in search of the audience," European journal of communication, Vol. 5, No. 2, pp. 207-238.
  155. Joinson, A. N. (2008), "Looking at, looking up or keeping up with people?: motives and use of facebook," Paper presented at the Proceedings of the SIGCHI conference on Human Factors in Computing Systems, pp. 1027-1036.
  156. Lederer, S., Mankoff, J., & Dey, A. K. (2003), "Who wants to know what when? privacy preference determinants in ubiquitous computing," Paper presented at the CHI''03 extended abstracts on Human factors in computing systems, pp. 724-725.
  157. Lindqvist, J., Cranshaw, J., Wiese, J., Hong, J., & Zimmerman, J. (2011), "I''m the mayor of my house: examining why people use foursquare-a social-driven location sharing application," Paper presented at the Proceedings of the 2011 annual conference on Human factors in computing systems, pp. 2409-2418.
  158. Liu, S.-H., Liao, H.-L., & Zeng, Y.-T. (2007), "Why people blog: an Expectancy Theory analysis," Issues in Information Systems, Vol. 8, No. 2, pp. 232-237.
  159. Lu, Y., Tan, B., & Hui, K. L. (2004), "Inducing customers to disclose personal information to internet businesses with social adjustment benefits," in Proceedings of 25th international conference on information systems, R. Agarwal, L. J Kirsch, and J. I. De gross(eds.), Washington, DC, pp. 272-281
  160. Morris, J., Cooper, A., Tschofenig, H., Lepinski, M., Barnes, R., & Schulzrinne, H. (2011), "An Architecture for Location and Location Privacy in Internet Applications."
  161. Rosengren, K. E., Wenner, L. A., & Palmgreen, P. (Eds.). (1985), Media gratifications research: Current perspectives, Beverly Hills, CA: Sage Publications.
  162. Patil, S., & Lai, J. (2005), "Who gets to know what when: configuring privacy permissions in an awareness application," Paper presented at the Proceedings of the SIGCHI conference on Human factors in computing systems.
  163. Porter, C. E., Donthu, N., MacElroy, W. H., & Wydra, D. (2011), "How to foster and sustain engagement in virtual communities," California management review, Vol. 53, No. 4, pp. 80-110.
  164. Qi, M., & Edgar-Nevill, D. (2011), "Social networking searching and privacy issues," Information Security Technical Report, Vol. 16, No. 2, pp. 74-78.
  165. Quan-Haase, A., & Wellman, B. (2004), "How does the Internet affect social capital. Social capital and information technology, Vol. 113, pp. 135-113.
  166. Rubin, A. M. (2002), "The uses-and-gratifications perspective of media effects, pp. 525-548.
  167. Sangwan, S. (2005), "Virtual community success: A uses and gratifications perspective," Paper presented at the System Sciences, 2005. HICSS''05. Proceedings of the 38th Annual Hawaii International Conference on, pp. 193c-193c.
  168. Scellato, S., Noulas, A., Lambiotte, R., & Mascolo, C. (2011), "Socio-spatial properties of online location-based social networks," Proceedings of ICWSM, Vol. 11, pp. 329-336.
  169. Solove, D. J. (2006), "A taxonomy of privacy," University of Pennsylvania Law Review, pp. 477-564.
  170. Steiniger, S., Neun, M., & Edwardes, A. (2006), "Foundations of location based services," Lecture Notes on LBS, pp. 1.
  171. Tang, K. P., Lin, J., Hong, J. I., Siewiorek, D. P., & Sadeh, N. (2010), "Rethinking location sharing: exploring the implications of social-driven vs. purpose-driven location sharing," Paper presented at the Proceedings of the 12th ACM international conference on Ubiquitous computing, pp. 85-94.
  172. Tankard, J. W., & Severin, J. (1997), "Communication Theories: Origins, Methods, and Uses in the Mass Media: Allyn & Bacon.
  173. Tatli, E. I., Stegemann, D., & Lucks, S. (2005), "Security challenges of location-aware mobile business," In Mobile Commerce and Services, 2005, WMCS''05. The Second IEEE International Workshop on IEEE, pp. 84-95.
  174. Traynor, D., & Curran, K. (2012), "Location-Based Social Networks," From Government to E-Governance: Public Administration in the Digital Age, pp. 243.
  175. Trepte, S., & Reinecke, L.(Eds.) (2011), Privacy online, Springer.
  176. Tsai, J., Kelley, P., Cranor, L., & Sadeh, N. (2009), "Location-sharing technologies: Privacy risks and controls, TPRC.
  177. Tsai, J. Y., Kelley, P., Drielsma, P., Cranor, L. F., Hong, J., & Sadeh, N.(2009), "Who''s viewed you?: the impact of feedback in a mobile location-sharing application," Paper presented at the Proceedings of the 27th international conference on Human factors in computing systems, pp. 2003-2012.
  178. Virrantaus, K., Markkula, J., Garmash, A., Terziyan, V., Veijalainen, J., Katanosov, A., & Tirri, H. (2001), "Developing GIS-supported location-based services," In Web Information Systems Engineering, 2001, Proceedings of the Second International Conference on IEEE, Vol. 2, pp. 66-75.
  179. Wellman, B., & Gulia, M. (1999), "Net surfers don''t ride alone: Virtual communities as communities," Networks in the global village, pp. 331-366.
  180. Westin, A. F. (1968), "Privacy and freedom," Washington and Lee Law Review, Vol. 25, No. 1, pp. 166.
  181. Xu, H., & Teo, H.-H. (2004), "Alleviating consumer''s privacy concern in location-based services: A psychological control perspective," Paper presented at the Proceedings of the Twenty-Fifth International Conference on Information Systems, pp. 793-806.
  182. Yao, M. Z., Rice, R. E., & Wallis, K. (2007), "Predicting user concerns about online privacy," Journal of the American Society for Information Science and Technology, Vol. 58, No 5, pp. 710-722.
  183. 李育璇(2013),打卡大解密,數位時代,第224期,第36-37頁。
  184. 林良哲(2013),小開臉書打卡洩蹤 歹徒看臉書擬綁架計劃,自由時報。
  185. 林東泰(1997),大眾傳播理論,師大書苑。
  186. 邵秀玲(2005),以社會資本觀點探討中階主管之事業生涯成功與工作績效,國立中山大學人力資源管理研究所碩士論文,高雄。
  187. 翁秀琪(1998),大衆傳播理論與實證,三民書局股份有限公司。
  188. 創市際市場研究顧問(2012),「適地性服務篇」,取自http://www.insightxplorer.com/specialtopic/2012_04_20.htm。
  189. 黃春婷(2012),「你今天打卡了嗎?臉書打卡調查!」,104市調中心,取自 http://www.104survey.com/faces/newportal/viewPointCtx.xhtml?researchId=505。
  190. 陳曉莉(2012),「Nielsen:社交網路持續飛快成長」,iThome周刊,取自http://www.ithome.com.tw/itadm/article.php?c=45217,最後瀏灠日:2012-12-04。
Times Cited
  1. 周宜徵(2014)。消費者加入排隊意願成因之研究 ─以美食排隊現象為例。虎尾科技大學經營管理研究所學位論文。2014。1-92。