系統識別號 U0026-2506201323334300
論文名稱(中文) 資訊隱私顧慮之下的Facebook使用者持續使用行為意圖之研究
論文名稱(英文) Continuance Behavior of Using Facebook under Privacy Concern
校院名稱 成功大學
系所名稱(中) 資訊管理研究所
系所名稱(英) Institute of Information Management
學年度 101
學期 2
出版年 102
研究生(中文) 姜彥光
研究生(英文) Yan-Guang Jiang
學號 R76001029
學位類別 碩士
語文別 英文
論文頁數 105頁
口試委員 指導教授-謝佩璇
中文關鍵字 科技接受模式  資訊隱私顧慮  Facebook  持續使用意圖  習慣 
英文關鍵字 TAM  Privacy Concern  Facebook  Continuance intention  Habit 
中文摘要 由於網際網路發達與智慧型手機的興起使用科技工具已成為潮流,然而相伴隨而來的則是資訊倫理的議題。基於個人隱私的重要性,新版個資法由法務部修改行政院在今年發布實施,個人資料的保護規範更嚴苛,稍不留意就有可能面臨官司,對於社群網路的使用者影響非常巨大。因此本研究以科技接受模式(TAM)為理論基礎結合資訊隱私顧慮構面探討熱門社群網站Facebook上的使用者行為,用於了解在已知有資訊隱私顧慮情況下使用者對於資訊科技工具使用的態度,是否會影響他們在Facebook上持續揭露與分享資訊的行為意圖。
本研究目的有以下三點,一、了解Facebook 使用者的資訊隱私顧慮,是否會影響他們對於Facebook的信任與持續使用這類型自我揭露科技工具的態度與使用意圖。二、使用者的信任是否在資訊隱私顧慮與持續使用意圖之間扮演中介角色。三、習慣是否會干擾與影響使用者對於Facebook的持續使用。本研究使用SEM方法,以AMOS軟體來驗證假設模型。研究結果顯示,習慣對於持續使行為有顯著解釋能力,且調節作用顯著存在於意圖與持續使行為之間。社交性與即時性正向顯著影響隱私顧慮;隱私顧慮顯著負向影響信任,但信任並不顯著影響意圖與知覺易用性,中介效果也不存在。在TAM模式的部分,隱私顧慮沒有顯著影響態度;知覺有用性與知覺易用性顯著影響態度;知覺有用性對知覺易用性為顯著;從態度到意圖,意圖到持續使用行為皆呈顯著。對於使用Facebook環境而言,隱私顧慮高的使用者較不信任Facebook會保障他們的個人隱私資料不外洩,然而在此情況下,他們對於持續使用的態度與意圖卻還是抱持著正向的態度,此結果與過去的研究有所不同。模型分析的結果也顯示,習慣對於在已知有隱私顧慮的情況下還持續使用Facebook的行為有最強的解釋能力,對於社群網站經營者而言,培養使用者的習慣,將能有助於增加持續使用行為。
英文摘要 The emerging technology in addition to generating the trend in nowadays, it also accompanied with a lot of information ethics issues. New version of personal data protection was published by Executive Yuan of Taiwan this year. There has huge influence toward social network users because the principle is more stringent, user may be faced with a lawsuit if they not aware rules. Therefore, the purpose of this study is to understand whether the Internet users’ attitude toward using self-disclosure tools under privacy concern has effect on their behavior intention to continue disclose personal information on a popular social networking site, Facebook. By integrating the concept of TAM and privacy aspects, this study establishes a research model with ten hypotheses proposed. Then, a valid and reliable questionnaire is developed to collect data for examining the hypotheses. Structural equation model is used to analyze the data. As a result, this study reveals a strong relationship between habit and actual continue use of self-disclosure tool, and habit has moderating effect between the intention and actual behavior, but trust did not play plays mediator role in the relationship between privacy concern and continuance intention. Sociability and instantaneity have significant effect on privacy concern. Privacy concern has negative effect on trust. In the part of TAM, perceived usefulness has significant effect on perceived ease of use and attitude, perceived ease of use has significant effect on attitude, and attitude has significant effect on intention. It is worth to note that trust has no significant effect on perceived ease of use, and privacy concern has no significant effect on attitude. There are something difference with previous research, FB user hold positive views toward attitude of continuing use and actual continuance behavior even they have higher privacy concern. Model analysis also showed that habit has the strongest explanation for the continuance behavior of using Facebook under privacy concerns. Thus, for social networking sites providers, increasing the formation of users’ habit, it will be able to increase the continuance behavior. The implications for theory and practice for future research are also discussed.
論文目次 Chapter 1 Introduction 1
1.1 Research Background and Motivation 1
1.2 Research Purposes and Questions 8
1.3 Research Procedures 9
Chapter 2 Literature Review 11
2.1 Technology Acceptance Model (TAM) 11
2.1.1 Difference between TRA and TAM 11
2.1.2 Related research of Technology Acceptance Model 13
2.2 Information Privacy on Facebook 16
2.2.1 Facebook Privacy Setting 18
2.2.2 Facebook Privacy Concern 24
2.2.3 Related Research of Facebook Self-Disclosure 28
2.2.4 User Trust with regard to Facebook 32
2.3 Facebook User Habits 38
2.4 Summary 40
Chapter 3 Research Methodology 42
3.1 Research Model and Hypothesis 42
3.2 Research Participants and Tools 49
3.2.1 Research Objects and Scope 49
3.2.2 Questionnaire Design and the Establishment of Reliability & Validity 50
3.2.3 Pre-test 55
3.3 Data Collection and Analysis Methods 57
Chapter 4 Data Analysis 63
4.1 Descriptive Statistics 63
4.1.1 Data Collection period and sample size 63
4.1.2 Participants’ Demographics 63
4.1.3 Descriptive Statistics of Observed Variables and Normality testing 65
4.2 Reliability Analysis 67
4.3 Measurement Model 69
4.3.1 Convergent Validity 69
4.3.2 Discriminant Validity 71
4.4 Goodness-of-Fit of Measurement Model 72
4.5 Structural Model 72
4.5.1 Path Analysis 72
4.5.2 Moderating Effect Testing 74
4.5.3 Mediating Effect Testing 76
4.5.4 Hypothesis Testing 76
4.5.5 Summary of data analysis 78
Chapter 5 Conclusions 79
5.1 Discussions 79
5.1.1 The impact of sociability and instantaneity toward privacy concern 79
5.1.2 The impact of privacy concern toward trust 80
5.1.3 The impact of trust toward perceived usefulness 80
5.1.4 The impact of privacy concern toward attitude of continuing FB use 81
5.1.5 The validation of TAM model 82
5.1.6 The moderating role of habit between continuance intention and actual continuing use behavior 83
5.2 Contributions 83
5.2.1 Theoretical Implications 84
5.2.2 Practical Implications 87
5.3 Limitations and Future Research 90
Reference 91
參考文獻 Aarts, H., Verplanken, B., & van Knippenberg, A. (1998). Predicting Behavior From Actions in the Past: Repeated Decision Making or a Matter of Habit? Journal of Applied Social Psychology, 28(15), 1355-1374.
Avinandan, M., & Prithwiraj, N. (2007). Role of electronic trust in online retailing: A re-examination of the commitment-trust theory. European Journal of Marketing, 41(9), 1173-1202.
Awad, N. F., & Krishnan, M. S. (2006). The Personalization Privacy Paradox: An Empirical Evaluation of Information Transparency and the Willingness to be Profiled Online for Personalization. MIS Quarterly, 30, 13-28.
Bhattacherjee, A. (2001). Understanding information systems continuance: an expectation-confirmation model. MIS Quarterly, 25(3), 351-370.
Brewer, M. B., & Silver, M. (1978). Ingroup bias as a function of task characteristics. European Journal of Social Psychology, 8(3), 393-400.
Campbell, J. Y., & Cochrane, J. H. (1999). By force of habit: A consumption-based explanation of aggregate stock market behavior. Journal of Political Economy, 107(2), 205.
Chai, S., & Kim, M. (2010). What makes bloggers share knowledge? An investigation on the role of trust. International Journal of Information Management, 30(5), 408-415.
Chechen, L., Pui-Lai, T., Chuang-Chun, L., Pu-Yuan, K., & Shu-Hui, C. (2011). Factors influencing the intended use of web portals. Online Information Review, 35(2), 237-254.
Child, J. T., & Agyeman-Budu, E. A. (2010). Blogging privacy management rule development: The impact of self-monitoring skills, concern for appropriateness, and blogging frequency. Computers in Human Behavior, 26(5), 957-963.
Chiu, C.M., Hsu, M.H., Lai, H., & Chang, C.M. (2012). Re-examining the influence of trust on online repeat purchase intention: The moderating role of habit and its antecedents. Decision Support Systems, 53(4), 835-845.
Chiu, H. C. (2010). Quantitative research and statistical analysis (Fifth ed.). Taipei: Wu-Nan.
Davis, F. (1989). Perceived Usefulness, Perceived Ease of Use, and User Acceptance of Information Technology. MIS Quarterly.
Davis, F., Bagozzi, R. P., & Warshaw, P. R. (1989). User Acceptance of Computer Technology: A Comparison of Two Theoretical Models. Management Science, 35(8), 982-1003.
De Souza, Z., & Dick, G. N. (2009). Disclosure of information by children in social networking—Not just a case of “you show me yours and I’ll show you mine”. International Journal of Information Management, 29(4), 255-261.
Dishaw, M. T., & Strong, D. M. (1999). Extending the technology acceptance model
with task-technology fit constructs. Information & Management, 36, 9-21.
Dwyer, C. (2007). Digital Relationships in the 'MySpace' Generation: Results From a Qualitative Study. Paper presented at the Proceedings of the 40th Hawaii International Conference on System Sciences (HICSS), Hawaii.
Dwyer, C., Hiltz, S. R., & Passerini, K. (2007). Trust and Privacy: A Comparison of Facebook and MySpace. Paper presented at the Proceedings of the Thirteenth Americas Conference on Information Systems, Colorado.
Fishbein, M., & Ajzen, I. (1975). Belief, Attitude, Intention and Behavior: An Introduction to Theory and Research. Reading, MA: Addison-Wesley.
Gefen, D. (2003). TAM or Just Plain Habit: A Look at Experienced Online Shoppers. Journal of Organizational and End User Computing (JOEUC), 15(3), 1-13.
Gefen, D., Karahanna, E., & Straub, D. W. (2003). Trust and TAM in Online Shopping: An Integrated Model. MIS Quarterly, 27(1), 51-90.
Gibbs, J. L. (2006). Self-Presentation in Online Personals: The Role of Anticipated Future Interaction, Self-Disclosure, and Perceived Success in Internet Dating. Communication Research, 33(2), 152-177.
Ha, I., Yoon, Y., & Choi, M. (2007). Determinants of adoption of mobile games under mobile broadband wireless access environment. Information & Management, 44(3), 276-286. doi: http://dx.doi.org/10.1016/j.im.2007.01.001
Hartwick, J., & Barki, H. (1994). Explaining the Role of User Participation in Information System Use. Management Science, 40, 440-465.
Hsiao, C. H., & Yang, C. (2011). The intellectual development of the technology acceptance model: A co-citation analysis. International Journal of Information Management, 31(2), 128-136.
Hsu, H. Y., & Tsou, H.-T. (2011). Understanding customer experiences in online blog environments. International Journal of Information Management, 31(6), 510-523.
Hair, J. F., Black, W. C., & Babin, B. J. (2010). Multivariate Data Analysis: A Global Perspective. Upper Saddle River, NJ: Pearson Education.
Hair, J. F., Black, W. C., Babin, B. J., & Anderson, R. E. (2010). Multivariate data analysis. New Jersey: Prentice Hall.
Joinson, A. N., Reips, U.-D., Buchanan, T., & Schofield, C. B. P. (2010). Privacy, Trust, and Self-Disclosure Online. Human–Computer Interaction, 25(1), 1-24.
Karahanna, E., & Straub, D. W. (1999). The psychological origins of perceived usefulness and ease-of-use. Information & Management, 35(4), 237-250.
Kumar, N., Scheer, L. K., & Steenkamp, J.-B. E. M. (1995). The Effects of Perceived Interdependence on Dealer Attitudes. Journal of Marketing Research, 32(3), 348-356.
Lange, P. G. (2007). Publicly Private and Privately Public: Social Networking on YouTube. Journal of Computer-Mediated Communication, 13(1), 361-380.
Lauer, T. W., & Deng, X. (2007). Building online trust through privacy practices. International Journal of Information Security, 6(5), 323-331.
Lee, J.-E. R., Moore, D. C., Park, E.-A., & Park, S. G. (2012). Who wants to be “friend-rich”? Social compensatory friending on Facebook and the moderating role of public self-consciousness. Computers in Human Behavior, 28(3), 1036-1043.
Lee, C. S., & Ma, L. (2012). News sharing in social media: The effect of gratifications and prior experience. Computers in Human Behavior, 28(2), 331-339.
Lee, D.-H., Im, S., & Taylor, C. R. (2008). Voluntary self-disclosure of information on the Internet: A multimethod study of the motivations and consequences of disclosing information on blogs. Psychology and Marketing, 25(7), 692-710.
Liao, C., Palvia, P., & Lin, H.-N. (2006). The roles of habit and web site quality in e-commerce. International Journal of Information Management, 26(6), 469-483.
Limayem, M., & Cheung, C. M. K. (2008). Understanding information systems continuance: The case of Internet-based learning technologies. Information & Management, 45(4), 227-232.
Limayem, M., Hirt, S., & Cheun, C. (2007). How habit limits the predictive power of intention: The case of information systems continuance. MIS Quarterly, 31(4), 705-737.
Lin, K. Y., & Lu, H. P. (2011). Why people use social networking sites: An empirical study integrating network externalities and motivation theory. Computers in Human Behavior, 27(3), 1152-1161.
Lipford, H. R., Besmer, A., & Watson, J. (2008). Understanding privacy settings in facebook with an audience view. Paper presented at the Usability, Psychology, and Security San Francisco.
Liu, C., Marchewka, J. T., Lu, J., & Yu, C.-S. (2005). Beyond concern—a privacy-trust-behavioral intention model of electronic commerce. Information & Management, 42(2), 289-304.
Liu, Y.., Chen, H.., Liu., Lin, C., & Chan, H. (2010). A Model to Evaluate the Effectiveness of Collaborative Online
Learning Teams – Self-Disclosure and Social Exchange Theory Perspective. International Journal of Cyber Society and Education, 3, 117-132.
Lowry, P., Cao, J., & Everard, A. (2011). Privacy Concerns Versus Desire for Interpersonal Awareness in Driving the Use of Self-Disclosure Technologies: The Case of Instant Messaging in Two Cultures. J. Manage. Inf. Syst., 27(4), 163-200.
Luo, X., Li, H., Zhang, J., & Shim, J. P. (2010). Examining multi-dimensional trust and multi-faceted risk in initial acceptance of emerging technologies: An empirical study of mobile banking services. Decis. Support Syst., 49(2), 222-234.
Mäntymäki, M., & Salo, J. (2011). Teenagers in social virtual worlds: Continuous use and purchasing behavior in Habbo Hotel. Computers in Human Behavior, 27(6), 2088-2097. doi: 10.1016/j.chb.2011.06.003
Malhotra, N. K., Sung, S. K., & Agarwal, J. (2004). Internet Users' Information Privacy Concerns (IUIPC): The Construct, the Scale, and a Causal Model. Information Systems Research, 15(4), 336-355.
Mathieson, K. (1991). Predicting User Intentions: Comparing the Technology
Acceptance Model with the Theory of Planned Behavior. Information Systems Research, 173-191.
McKnight, D. H., Cummings, L. L., & Chervany, N. L. (1998). Initial Trust Formation in New Organizational Relationships. The Academy of Management Review, 23(3), 473-490.
Mohamed, N., & Ahmad, I. H. (2012). Information privacy concerns, antecedents and privacy measure use in social networking sites: Evidence from Malaysia. Computers in Human Behavior, 28(6), 2366-2375.
Morgan, R. M., & Shelby, D. H. (1994). The Commitment-Trust Theory of Relationship Marketing. Journal of Marketing, 58(3), 20-38.
Newell, S., David, G., & Chand, D. (2007). An analysis of trust among globally distributed work teams in an organizational setting. Knowledge and Process Management, 14(3), 158-168.
Omarzu, J. (2000). A Disclosure Decision Model: Determining How and When Individuals Will Self-Disclose. Personality and Social Psychology Review, 4(2), 174-185.
Ouellette, J. A., & Wood, W. (1998). Habit and intention in everyday life: The multiple processes by which past behavior predicts future behavior. Psychological Bulletin, 124(1), 54-74.
Park, N., Jin, B., & Annie Jin, S.-A. (2011). Effects of self-disclosure on relational intimacy in Facebook. Computers in Human Behavior, 27(5), 1974-1983. doi: 10.1016/j.chb.2011.05.004
Ridings, C. M., Gefen, D., & Arinze, B. (2002). Some antecedents and effects of trust in virtual communities. The Journal of Strategic Information Systems, 11(3–4), 271-295.
Roca, J. C., Chiu, C.-M., & Martínez, F. J. (2006). Understanding e-learning continuance intention: An extension of the Technology Acceptance Model. International Journal of Human-Computer Studies, 64(8), 683-696.
Rotter, J. B. (1971). Generalized expectancies for interpersonal trust. American Psychologist, 26(5), 443-452.
Sabatelli, R. M., Buck, R., & Dreyer, A. (1983). Locus of Control, Interpersonal Trust, and Nonverbal Communication Accuracy. Journal of Personality and Social Psychology, 44, 399-409.
Shin, D.-H., Jung, J., & Chang, B.-H. (2012). The psychology behind QR codes: User experience perspective. Computers in Human Behavior, 28(4), 1417-1426.
Shin, D.-H., & Shin, Y.-J. (2011). Why do people play social network games? Computers in Human Behavior, 27(2), 852-861.
Smith, H. J., Milberg, S. J., & Burke, S. J. (1996). Information Privacy: Measuring Individuals' Concerns about Organizational Practices. MIS Quarterly, 20(2), 167-196.
Sheldon, P. (2013). Examining Gender Differences in Self-disclosure on Facebook
Versus Face-to-Face. The Journal of Social Media in Society, 2(1), 89-105.
Swartz, T. A., Bowen, D. E., & Brown, S. W. (1996). Advances in Services Marketing and Management Cambridge: Elsevier Science Ltd.
Thong, J. Y. L., Hong, W., & Tam, K.-Y. (2002). Understanding user acceptance of digital libraries: what are the roles of interface characteristics, organizational context, and individual differences? International Journal of Human-Computer Studies, 57(3), 215-242.
Tosun, L. P. (2012). Motives for Facebook use and expressing “true self” on the Internet. Computers in Human Behavior, 28(4), 1510-1517.
Utz, S., & Krämer, N. (2009). The privacy paradox on social network sites revisited: the role of individual characteristics and group norms. Cyberpsychology: Journal of Psychosocial Research on Cyberspace, 3(2).
van der Heijden, H. (2003). Factors influencing the usage of websites: the case of a generic portal in The Netherlands. Information & Management, 40(6), 541-549.
Warren, S. D., & Brandeis, L. D. (1890). The Right to Privacy. Harvard Law Review, 4.
Wheeles, L. R. (1978). A follow-up study of the relationships among trust, disclosure, and interpesonal solidarity. Human Communication Research, 4(2), 143-157.
Wheeles, L. R., & Grotz, J. (1976). Conceptualization and measurement of reported self-disclosure. Human Communication Research, 2(4), 338-346.
Wu, K.-W., Huang, S. Y., Yen, D. C., & Popova, I. (2012). The effect of online privacy policy on consumer privacy concern and trust. Computers in Human Behavior, 28(3), 889-897.
Xin, T., Li, Q., Yongbeom, K., & Jeffrey, H. (2012). Impact of privacy concern in social networking web sites. Internet Research, 22(2), 211-233.
Yue, G., & Barnes, S. J. (2012). Explaining Purchasing Behavior Within World of Warcraft. Journal of Computer Information Systems, 52(3), 18-30.
Zand, D. E. (1972). Trust and Managerial Problem Solving. Administrative Science Quarterly, 17(2), 229-239.
Zimmer, J. C., Arsal, R. E., Al-Marzouq, M., & Grover, V. (2010). Investigating online information disclosure: Effects of information relevance, trust and risk. Information & Management, 47(2), 115-123.
Facebook. (2012). Help Retrieved Jan, 14, 2013, from
  • 同意授權校內瀏覽/列印電子全文服務,於2015-07-12起公開。
  • 同意授權校外瀏覽/列印電子全文服務,於2015-07-12起公開。

  • 如您有疑問,請聯絡圖書館