進階搜尋


   電子論文尚未授權公開,紙本請查館藏目錄
(※如查詢不到或館藏狀況顯示「閉架不公開」,表示該本論文不在書庫,無法取用。)
系統識別號 U0026-2501201323120700
論文名稱(中文) 探討知覺脆弱性之前置因子對網路社群知識分享之影響:以警戒互動為調節變數
論文名稱(英文) The Antecedence of Perceived Vulnerability towards Knowledge Sharing in Online Community: Vigilant Interaction as a Moderator
校院名稱 成功大學
系所名稱(中) 國際企業研究所碩博士班
系所名稱(英) Institute of International Business
學年度 101
學期 1
出版年 102
研究生(中文) 幸禹名
研究生(英文) Yu Ming Hsing
電子信箱 alicersing@gmail.com
學號 r66991010
學位類別 碩士
語文別 英文
論文頁數 106頁
口試委員 指導教授-張心馨
口試委員-周信輝
口試委員-陳素雯
中文關鍵字 網路社群  知覺脆弱性  知識合作  警戒互動 
英文關鍵字 Online Community  Perceived Vulnerability  Knowledge sharing  Vigilant Interaction 
學科別分類
中文摘要 網路社群是一種虛擬組織,在這些社群中不同出身,甚至沒有面對面溝通機會的成員卻能一同知識合作。但是上述有關網路社群的特質,卻會同時帶來負面的影響。特別是知覺脆弱性,會阻礙人與人之間的知識交流。為了享受知識分享帶來的好處與避開知覺脆弱性帶來的風險,知識分享的參與者會使用一種稱為警戒互動的溝通方法。這樣的溝通互動需要評估溝通雙方的每一個行動已決定接下來的反應。準此,本研究將模糊社會身分、群體異質性、網路平台的文字溝通作為知覺脆弱性的影響因素,也將探討知覺脆弱性對知識合作的影響與警戒互動的調節效果。本研究採取透過紙本與網路問卷,從253位受訪者中取得225份有效回覆。分析結果發現模糊社會身分、群體異質性、網路平台的文字溝通對知覺脆弱性有顯著影響;而知覺脆弱性對知識合作具有顯著負面影響;且較熟悉警戒互動者可以降低知覺脆弱性對知識合作具的負面影響,即使在詭譎多變的環境下仍有較多的知識合作。本研究的發現有助於設計使參與者分享更多的知識的網路平台。
英文摘要 Online communities are virtual organizations where knowledge sharing can occur among people who share different attributes without face-to-face dialogue. However, the negative influences that create the possibility of vulnerability also prevent people from sharing their knowledge. One way for online participants to enjoy the benefits of knowledge sharing and avoid the risk of vulnerability is called vigilant interaction, which is an interactive emergent dialogue requiring appraisals of each other’s actions. Hence, the research purpose of the present study is first to examine the effects of online community attributes (socially ambiguous identity, group heterogeneity, and text-based computer-mediated communication) on perceived vulnerability, following the moderating effect of vigilant interaction. 253 respondents were collected, and 225 of them were valid. The findings are consistent with prior research and provide evidence that socially ambiguous identity, group heterogeneity, and text-based computer-mediated communication significantly affect perceived vulnerability and that perceived vulnerability negatively influences knowledge sharing. The results demonstrate a difference between online participants who showed different levels of vigilant interactions. The higher the level of vigilant interaction participants were involved in, the lower the negative effects were from perceived vulnerability with regard to knowledge sharing. The findings of study can be used to design a platform that encourages participants to share more knowledge.
論文目次 Abstract i
摘要 ii
誌謝 iii
Chapter 1 Introduction 1
1.1 Research Motivation and Background 1
1.2 Research Objectives 7
1.3 Research Process 8
Chapter 2 Literature Review 10
2.1 Online Communities 10
2.2 Socially Ambiguous Identities 15
2.3 Group Heterogeneity 17
2.4 Text-Based Computer-Mediated Communication 19
2.5 Perceived Vulnerability 21
2.6 Knowledge sharing 23
2.7 Vigilant Interaction 24
2.8 Hypotheses Development 26
2.8.1 Socially Ambiguous Identity and Perceived Vulnerability 26
2.8.2 Group Heterogeneity and Perceived Vulnerability 28
2.8.3 Text-Based Computer-Mediated Communication and Perceived Vulnerability 29
2.8.4 Perceived Vulnerability and Knowledge sharing 31
2.8.5 Vigilant Interaction, Perceived Vulnerability and Knowledge Sharing 33
Chapter 3 Research Method 38
3.1 Definition of Variables 38
3.2 Research Design and Questionnaire Development 39
3.3 Results of Pilot Test 41
3.4 Analysis of Formal Test 46
Chapter 4 Data Analysis 48
4.1 Sample Demographics 48
4.2 Scale Purification: Validity and Reliability 50
4.3 Hypotheses Testing 56
4.3.1 Structural Model Analysis of All Respondents 57
4.3.2 Multigroup Structural Model Analysis (High vs. Low Vigilant Interaction Groups) 60
4.3.3 Additional Findings 64
4.4 ANOVA of Demographic Variables 68
4.4.1 Online Community 68
4.4.2 Topics of discussion 71
4.4.3 Average Time (Per day) for Internet 72
4.4.4 Experience (years) of participating in online communities 74
Chapter 5 Discussion and Conclusions 77
5.1 Discussion of Findings 77
5.2 Theoretical Implications 83
5.3 Managerial Implications 85
5.4 Limitations and Suggestions for Future Research 87
References 89
Appendix A 97
Appendix B 102
參考文獻 Adler, P. S. (2001). Market, hierarchy, and trust: The knowledge economy and the future of capitalism. Organization Science, 12(2), 215-234.
Anderson, J. C., & Gerbing, D. W. (1988). Structural Equation Modeling in Practice: A Review and Recommended Two-Step Approach. Psychological Bulletin, 103(3), 411-423.
Bearden, W. O., Sharma, S., & Teel, J. E. (1982). Sample size effects on chi square and other statistics used in evaluating causal models. Journal of Marketing Research, 19(4), 425-430.
Becerra-Fernandez, I., & Leidner, D. E. (2008). Knowledge management: An evolutionary view (Vol. 12). Armonk, NY: M. E. Sharpe Inc.
Bergquist, M., & Ljungberg, J. (2001). The power of gifts: Organizing social relationships in open source communities. Information Systems Journal, 11(4), 305-320.
Blanchard, A. L., & Markus, M. L. (2004). The experienced "sense" of a virtual community: Characteristics and processes. ACM SIGMIS Database, 35(1), 64-79.
Bogers, M. (2011). The open innovation paradox: knowledge sharing and protection in R&D collaborations. European Journal of Innovation Management, 14(1), 93-117.
Boland, R. J., Tenkasi, R. V., & Te'eni, D. (1994). Designing information technology to support distributed cognition. Organization Science, 5(3), 456-475.
Bollinger, A. S., & Smith, R. D. (2001). Managing organizational knowledge as a strategic asset. Journal of Knowledge Management, 5(1), 8-18.
Bordia, P. (1997). Face-to-face versus computer-mediated communication: A synthesis of the experimental literature. Journal of Business Communication, 34(1), 99-120.
Brown, J. S., & Duguid, P. (2001). Knowledge and organization: A social-practice perspective. Organization Science, 12(2), 198-213.
Bruner, J. (1991). The narrative construction of reality. Critical Inquiry, 18(1), 1-21.
Butler, B. S. (2001). Membership size, communication activity, and sustainability: A resource-based model of online social structures. Information Systems Research, 12(4), 346-362.
Carlile, P. R. (2002). A pragmatic view of knowledge and boundaries: Boundary objects in new product development. Organization Science, 13(4), 442-456.
Carmines, E. G., & Zeller, R. A. (1979). Reliability and validity assessment. Thousand Oaks, CA: Sage Publications, Inc.
Christopherson, K. M. (2007). The positive and negative implications of anonymity in Internet social interactions: “On the Internet, Nobody Knows You’re a Dog”. Computers in Human Behavior, 23(6), 3038-3056.
Clemons, E. K., & Hitt, L. M. (2004). Poaching and the misappropriation of information: Transaction risks of information exchange. Journal of Management Information Systems, 21(2), 87-107.
Constant, D., Sproull, L., & Kiesler, S. (1996). The kindness of strangers: The usefulness of electronic weak ties for technical advice. Organization Science, 7(2), 119-135.
Cook, S. D. N., & Brown, J. S. (1999). Bridging epistemologies: The generative dance between organizational knowledge and organizational knowing. Organization Science, 10(4), 381-400.
Daft, R. L., & Lengel, R. H. (1986). Organizational Information Requirements, Media Richness and Structural Design. Management Science, 32(5), 554-571.
Danet, B. (1998). Text as mask: Gender, play, and performance on the Internet. In S. G. Jones (Ed.), Cybersociety 2.0: Revisiting computer-mediated communication and community (Vol. 2, pp. 129-158). Thousand Oaks: Sage Publications, Inc.
De Laet, M., & Mol, A. (2000). The Zimbabwe Bush Pump: Mechanics of a fluid technology. Social Studies of Science, 30(2), 225-263.
Dennis, A. R., Fuller, R. M., & Valacich, J. S. (2008). Media, tasks, and communication processes: A theory of media synchronicity. MIS Quarterly, 32(3), 575-600.
Dinev, T., & Hart, P. (2004). Internet privacy concerns and their antecedents - measurement validity and a regression model. Behaviour & Information Technology, 23(6), 413-422.
Erlich, Z., Erlich-Philip, I., & Gal-Ezer, J. (2005). Skills required for participating in CMC courses: An empirical study. Computers and Education, 44(4), 477-487.
Faraj, S., Jarvenpaa, S. L., & Majchrzak, A. (2011). Knowledge Collaboration in Online Communities. Organization Science, 22(5), 1224-1239.
Faraj, S., & Johnson, S. L. (2011). Network exchange patterns in online communities. Organization Science, 22(6), 1464-1480.
Fornell, C., & Larcker, D. F. (1981). Evaluating structural equation models with unobservable variables and measurement error. Journal of Marketing Research, 18(FEBRUARY), 39-50.
Fuchs, C. (2008). Wikinomics: How mass collaboration changes everything - by Don Tapscott & Anthony D. Williams. Journal of Communication, 58(2), 402-403.
Fusilier, M. R., & Hoyer, W. D. (1980). Variables affecting perceptions of invasion of privacy in a personnel selection situation. Journal of Applied Psychology, 65(5), 623.
Goodman, P. S., & Darr, E. D. (1998). Computer-aided systems and communities: Mechanisms for organizational learning in distributed environments. MIS Quarterly, 22(4), 417-440.
Graebner, M. E. (2009). Caveat venditor: Trust asymmetries in acquisitions of entrepreneurial firms. Academy of Management Journal, 52(3), 435-472.
Grazioli, S. (2004). Where did they go wrong? An analysis of the failure of knowledgeable Internet consumers to detect deception over the internet. Group Decision and Negotiation, 13(2), 149-172.
Hagerty, B. M. K., Lynch-Sauer, J., Patusky, K. L., Bouwsema, M., & Collier, P. (1992). Sense of belonging: A vital mental health concept. Archives of Psychiatric Nursing, 6(3), 172-177.
Hair, J. F., William, C. B., Barry, J. B., Anderson, R. E., & Tatham, R. L. (2006). Multivariate Data Analysis (6th ed.). Upper Saddle River, NJ: Pearson Education.
Han, H.-J., Hiltz, S. R., Fjermestad, J., & Wang, Y. (2011). Does medium matter? A comparison of initial meeting modes for virtual teams. IEEE Transactions on Professional Communication, 54(4), 376-391.
Hancock, J. T. (2007). Digital Deception: Why, When and How People Lie Online The Oxford Handbook of Internet Psychology (pp. 289-301). New York: Oxford University Press, USA.
Hargadon, A. B., & Bechky, B. A. (2006). When collections of creatives become creative collectives: A field study of problem solving at work. Organization Science, 17(4), 484-500.
Hinds, P. J., & Bailey, D. E. (2003). Out of Sight, Out of Sync: Understanding Conflict in Distributed Teams. Organization Science, 14(6), 615-632+754.
Hsu, M. H., Ju, T. L., Yen, C. H., & Chang, C. M. (2007). Knowledge sharing behavior in virtual communities: The relationship between trust, self-efficacy, and outcome expectations. International Journal of Human-Computer Studies, 65(2), 153-169.
Jöreskog, K. G., & Sörbom, D. (1982). Recent developments in structural equation modeling. Journal of Marketing Research, 404-416.
Jarvenpaa, S. L., Knoll, K., & Leidner, D. E. (1998). Is anybody out there?: antecedents of trust in global virtual teams. Journal of Management Information Systems, 14(4), 29-64.
Jarvenpaa, S. L., & Leidner, D. E. (1999). Communication and Trust in Global Virtual Teams. Organization Science, 10(6), 791-815.
Jarvenpaa, S. L., & Majchrzak, A. (2010). Vigilant interaction in knowledge collaboration: challenges of online user participation under ambivalence. Information Systems Research, 21(4), 773-784.
Jeppesen, L. B., & Frederiksen, L. (2006). Why do users contribute to firm-hosted user communities? the case of computer-controlled music instruments. Organization Science, 17(1), 45-63.
Kane, G. C., Majchrzak, A., Johnson, J., & Chen, G. (2009). A longitudinal model of perspective making and perspective taking within fluid online collectives. Paper presented at the International Conference on Information Systems (ICIS), Phoenix, Arizona.
Kelly, K. (2010). What technology wants. New York, NY: Viking Press.
Kelvin, P. (1973). A Social‐Psychological Examination of Privacy. British Journal of Social and Clinical Psychology, 12(3), 248-261.
Kiesler, S., Siegel, J., & Mcguire, T. W. (1984). Social psychological-aspects of computer-mediated communication. American Psychologist, 39(10), 1123-1134.
Krasnova, H., Spiekermann, S., Koroleva, K., & Hildebrand, T. (2010). Online social networks: Why we disclose. Journal of Information Technology, 25(2), 109-125.
Knights, D., Noble, F., Vurdubakis, T., & Willmott, H. (2001). Chasing shadows: Control, virtuality and the production of trust. Organization Studies, 22(2), 311-336.
Kuk, G. (2006). Strategic interaction and knowledge sharing in the KDE developer mailing list. Management Science, 52(7), 1031-1042.
Lakhani, K. R., & von Hippel, E. (2003). How open source software works: "free" user-to-user assistance. Research Policy, 32(6), 923-943.
Law, J., & Urry, J. (2004). Enacting the social. Economy and Society, 33(3), 390-410.
Lerner, J., & Tirole, J. (2002). Some simple economics of open source. Journal of Industrial Economics, 50(2), 197-234.
Lessig, L. (2008). RW, REVIVED Remix: Making Art and Commerce Thrive in the Hybrid Economy (pp. 51-83). New York, NY: Penguin Press.
Lewicki, R. J., McAllister, D. J., & Bies, R. I. (1998). Trust and distrust: New relationships and realities. Academy of Management Review, 23(3), 438-458.
Lewis, K., Belliveau, M., Herndon, B., & Keller, J. (2007). Group cognition, membership change, and performance: Investigating the benefits and detriments of collective knowledge. Organizational Behavior and Human Decision Processes, 103(2), 159-178.
Marx, G. T. (1999). What's in a name? Some reflections on the sociology of anonymity. Information Society, 15(2), 99-112.
Meng, M., & Agarwal, R. (2007). Through a glass darkly: Information technology design, identity verification, and knowledge contribution in online communities. Information Systems Research, 18(1), 42-67.
Mitchell, K. J., Becker-Blease, K. A., & Finkelhor, D. (2005). Inventory of problematic Internet experiences encountered in clinical practice. Professional Psychology-Research and Practice, 36(5), 498-509.
Mitchell, K. J., Finkelhor, D., & Becker-Blease, K. A. (2007). Classification of adults with problematic internet experiences: Linking internet and conventional problems from a clinical perspective. Cyberpsychology and Behavior, 10(3), 381-392.
Mol, A., & Law, J. (1994). Regions, networks and fluids: Anaemia and social topology. [Historical Article]. Social Studies of Science, 24(4), 641-671.
Nambisan, S., & Baron, R. A. (2010). Different roles, different strokes: Organizing virtual customer environments to promote two types of customer contributions. Organization Science, 21(2), 554-572.
Nunamaker Jr, J. F., Dennis, A. R., Valacich, J. S., & Vogel, D. R. (1991). Information Technology for Negotiating Groups: Generating Options for Mutual Gain. Management Science, 37(10), 1325-1346.
O'Connor, K. M., & Adair, W. L. (2003). Integrative interests? Building a bridge between negotiation research and the dynamic organization. Leading and Managing People in the Dynamic Organization, 163-184.
Oliver, P., Marwell, G., & Teixeira, R. (1985). A theory of the critical mass. I. Interdependence, group heterogeneity, and the production of collective action. American Journal of Sociology, 91(3), 522-556.
Parent, M., Gallupe, R. B., Salisbury, W. D., & Handelman, J. M. (2000). Knowledge creation in focus groups: Can group technologies help? Information and Management, 38(1), 47-58.
Paul, D. L. (2006). Collabortive activities in virtual setting: A knowledge management perspective of t telemedicine. J. Management Inform. Systems, 22(4), 46-176.
Petronio, S. (1991). Communication boundary management: A theoretical model of managing disclosure of private information between marital couples. Communication Theory, 1(4), 311-335.
Pinsonneault, A., & Heppel, N. (1997). Anonymity in group support systems research: a new conceptualization, measure, and contingency framework. Journal of Management Information Systems, 14(3), 89-108.
Postmes, T., & Lea, M. (2000). Social processes and group decision making: anonymity in group decision support systems. [Meta-Analysis Research Support, Non-U.S. Gov't]. Ergonomics, 43(8), 1252-1274.
Prasarnphanich, P., & Wagner, C. (2009). The role of Wiki technology and altruism in collaborative knowledge creation. Journal of Computer Information Systems, 49(4), 33-41.
Qian, H., & Scott, C. R. (2007). Anonymity and self-disclosure on weblogs. Journal of Computer-Mediated Communication, 12(4), 1428-1451.
Raab, C. D. (1998). The distribution of privacy risks: Who needs protection? The information society, 14(4), 263-274.
Rafaeli, S., & Ariel, Y. (2008). Online motivational factors: Incentives for participation and contribution in Wikipedia. In A. Barak (Ed.), Psychological Aspects of Cyberspace: Theory, Research, Applications, Combridge University Press.
Rains, S. A. (2007). The impact of anonymity on perceptions of source credibility and influence in computer-mediated group communication - A test of two competing hypotheses. Communication Research, 34(1), 100-125.
Ren, Y. Q., Kraut, R., & Kiesier, S. (2007). Applying common identity and bond theory to design of online communities. Organization Studies, 28(3), 377-408.
Rice, R. E. (2006). Influences, usage, and outcomes of Internet health information searching: Multivariate results from the Pew surveys. International Journal of Medical Informatics, 75(1), 8-28.
Roberts, J. A., Hann, I. H., & Slaughter, S. A. (2006). Understanding the motivations, participation, and performance of open source software developers: A longitudinal study of the Apache projects. Management Science, 52(7), 984-999.
Rottman, J. W., & Lacity, M. C. (2006). Proven practices for effectively offshoring IT work. MIT Sloan Management Review, 47(3), 56-67.
Santos, F. M., & Eisenhardt, K. M. (2005). Organizational boundaries and theories of organization. Organization Science, 16(5), 491-508.
Satterfield, T. A., Mertz, C. K., & Slovic, P. (2004). Discrimination, vulnerability, and justice in the face of risk. [Article]. Risk Analysis: An International Journal, 24(1), 115-129.
Savas, P. (2011). A case study of contextual and individual factors that shape linguistic variation in synchronous text-based computer-mediated communication. Journal of Pragmatics, 43(1), 298-313.
Scott, C. R. (2004). Benefits and drawbacks of anonymous online communication: Legal challenges and communicative recommendations. Free Speech Yearbook, 41, 127-141.
Scott, S. V., & Walsham, G. (2005). Reconceptualizing and managing reputation risk in the knowledge economy: Toward repuTable action. Organization Science, 16(3), 308-322.
Shen, Y. C., Huang, C. Y., Chu, C. H., & Liao, H. C. (2010). Virtual community loyalty: an interpersonal-interaction perspective. International Journal of Electronic Commerce, 15(1), 49-74.
Silva, L., Goel, L., & Mousavidin, E. (2009). Exploring the dynamics of blog communities: the case of MetaFilter. Information Systems Journal, 19(1), 55-81.
Simpson, J. (2005). Conversational floors in synchronous text-based CMC discourse. Discourse Studies, 7(3), 337-361.
Sproull, L., & Arriaga, M. (2007). Online Communities Handbook of Computer Networks (Vol. 3, pp. 898-914). Hoboken, NJ: John Wiley & Sons.
Staples, D. S., & Webster, J. (2008). Exploring the effects of trust, task interdependence and virtualness on knowledge sharing in teams. Information Systems Journal, 18(6), 617-640.
Steel, R. G. D., & Torrie, J. H. (1960). Principles and Procedures of Statistics. New York: McGraw-Hill.
Tanis, M., & Postmes, T. (2007). Two faces of anonymity: Paradoxical effects of cues to identity in CMC. Computers in Human Behavior, 23(2), 955-970.
Te'eni, D. (2001). Review: A cognitive-affective model of organizational communication for designing IT. MIS Quarterly, 25(2), 251-312.
Tsoukas, H. (2009). A Dialogical Approach to the Creation of New Knowledge in Organizations. Organization Science, 20(6), 941-957.
Tyler, K., & Stanley, E. (2007). The role of trust in financial services business relationships. Journal of Services Marketing, 21(5), 334-344.
Vala, J., Drozda-Senkowska, E., Oberlé, D., Lopes, D., & Silva, P. (2011). Group heterogeneity and social validation of everyday knowledge The mediating role of perceived group participation. Group Processes & Intergroup Relations, 14(3), 347-362.
Von Krogh, G., & Von Hippel, E. (2006). The promise of research on open source software. Management Science, 52(7), 975-983.
Walther, J. B. (1996). Computer-mediated communication: Impersonal, interpersonal, and hyperpersonal interaction. Communication Research, 23(1), 3-43.
Walther, J. B. (2007). Selective self-presentation in computer-mediated communication: Hyperpersonal dimensions of technology, language, and cognition. Computers in Human Behavior, 23(5), 2538-2557.
Walther, J. B., Van Der Heide, B., Hamel, L. M., & Shulman, H. C. (2009). Self-generated versus other-generated statements and impressions in computer-mediated communication a test of warranting theory using facebook. Communication Research, 36(2), 229-253.
Wasko, M. M., & Faraj, S. (2000). “It is what one does”: why people participate and help others in electronic communities of practice. The Journal of Strategic Information Systems, 9(2), 155-173.
Wasko, M. M., & Faraj, S. (2005). Why should I share? Examining social capital and knowledge contribution in electronic networks of practice. MIS Quarterly, 29(1), 35-57.
Wasko, M. M., Faraj, S., & Teigland, R. (2004). Collective action and knowledge contribution in electronic networks of practice. Journal of the Association for Information Systems, 5(11-12), 493-513.
Wasko, M. M., Teigland, R., & Faraj, S. (2009). The provision of online public goods: Examining social structure in an electronic network of practice. Decision Support Systems, 47(3), 254-265.
Weise, G. (1975). Psychologische leistungstests. Göttingen, Germany: Hogrefe.
West, J., & Lakhani, K. R. (2008). Getting clear about communities in open innovation. Industry and Innovation, 15(2), 223-231.
Wright, R. T., & Marett, K. (2010). The influence of experiential and dispositional factors in phishing: An empirical investigation of the deceived. Journal of Management Information Systems, 27(1), 273-303.
Zahedi, F., & Song, J. (2008). Dynamics of trust revision: Using health infomediaries. Journal of Management Information Systems, 24(4), 225-248.
Zittrain, J. (2008). Meeting the Risks of Generativity: Privacy 2.0 The Future of the Internet--And How to Stop It (pp. 200-235). New Haven, Connecticut: Yale University Press.
論文全文使用權限
  • 同意授權校內瀏覽/列印電子全文服務,於2023-12-31起公開。


  • 如您有疑問,請聯絡圖書館
    聯絡電話:(06)2757575#65773
    聯絡E-mail:etds@email.ncku.edu.tw