题名

網路人際衝突成因與性別差異之研究

并列篇名

Determinants of Internet Conflict and Gender Differences

DOI

10.6188/JEB.2008.10(1).02

作者

劉仲矩(Chung-Chu Liu);黃金榜(Chin-Pang Huang)

关键词

人際衡突 ; 電腦中介溝通 ; 網際網路 內容分析法 ; 層級分析法 ; Interpersonal Conflict ; Computer-Mediated Communication ; Content Analysis Method ; Analytic Hierarchy process

期刊名称

電子商務學報

卷期/出版年月

10卷1期(2008 / 03 / 01)

页次

113 - 137

内容语文

繁體中文

中文摘要

由於網際網路的快速普及,各式各樣的商業活動和人際社交行為隨之活絡於虛擬世界中。在電腦中介溝通行為模式下,人際間衝突的行為更是有增無減。而有關性別在網路衝突上探討亦較少,故本研究目的在瞭解網路衝突的成因與性別差異。將研究分兩階段進行,第一階段先針對網路使用者在網路上產生人際衝突之原因以開放式問卷收集資料,並以內容分析法予以系統的歸納整理,第二階段以第一階段資料為基礎,針對男女差異進行探討比較,試圖找出性別在網路衝突原因上的認知差異。研究結果發現影響網路衝突成因有三:訊息障礙、侵權行為、個人因素;而有關性別在上述三項原因的差異方面,兩性差異點是男性認為個人因素大於訊息障礙,女性則反之。本研究並針對上述研究提出相關結論與建議。

英文摘要

More and more commercial activities and interpersonal social behavior conduct in the cyberspace world as the rapid popularity of Internet. The interpersonal conflict has been inevitable increasing under the computer-mediated communication mode. Less related research has put attention on the gender difference in Internet conflict, therefore this study come forward. The main purpose of this study is to explore the determinants and gender difference of Internet conflict. The investigated procedure is divided into two stages. First, we collected Internet users' data with open-end questionnaire and conduct Content Analysis to analyze the data. Second, based on the data generated in stage one, we use analytic hierarchy process to compare the perceived differences of Internet conflict between male and female. According to the results, the determinants of Internet conflict are categorized into three dimensions: message obstacles, tort, and personal factors. Regarding these three determinants of Internet conflict, there exist gender differences. Male puts more emphasis on personal factor and female on message obstacles. This study also provides some suggestions for the academic and the practice.

主题分类 人文學 > 人文學綜合
基礎與應用科學 > 資訊科學
基礎與應用科學 > 統計
社會科學 > 社會科學綜合
参考文献
  1. 江啟先、黃思明(2003)。網際網路數位化產品資訊揭露之廣告效果研究。管理學報,20(6),1045-1080。
    連結:
  2. 李東峰、林子銘(2002)。資訊主管對企業資訊安全之風險控管決策。資訊管理研究,4(2),1-42。
    連結:
  3. 林華洋、許秉瑜、蕭文龍(2005)。分析層級程序法在軟體選擇決策之應用。電子商務學報,7(3),293-312。
    連結:
  4. 林勤經、樊國楨、方仁威、黃景彰(2002)。資訊安全管理系統建置工作之研究。資訊管理研究,4(2),43-65。
    連結:
  5. 范懿文、季延平、劉宜菁(2005)。網際網路群體溝通系統之虛擬團隊績效。電子商務學報,7(2),157-190。
    連結:
  6. 莊道明(2000)。網路男女不同乎?男女兩性網路使用者網路規範態度之比較。大學圖書館,4(1),17-28。
    連結:
  7. 郭英峰、陳邦誠(2006)。應用模糊層級分析法分析消費者對行動加值服務之偏好。電子商務學報,8(1),45-64。
    連結:
  8. 陳碧姬、吳宜鮮(2005)。家庭內兩性數位機會、電腦態度與網路使用者行為初探。資訊社會研究,9,295-324。
    連結:
  9. 廖鴻圖、范修維、邱孟佑、蕭麗齡、瞿鴻斌(2005)。資訊安全風險評鑑驗證系統。電子商務學報,7(4),395-414。
    連結:
  10. 鄭弘岳(2003)。組織內衝突與衝突管理研究之回顧與前瞻。應用心理研究,20,53-82。
    連結:
  11. Alonzo, M.,Aiken, M.(2004).Flaming in electronic communication.Decision Support Systems,36(3),205-213.
  12. Babbie, E.(1997).The Practice of Social Research.Cole Publishing Company.
  13. Barki, H.(2004).Conceptualizing the construct of interpersonal conflict.International Journal of Conflict Management,15(3),216-244.
  14. Boneva, B. S.,Krout, R.,Frohlich, D.(2001).Using E-mail for personal relationships: The difference gender makes.American Behavioral Scientist,45(3),530-549.
  15. Brenner, O.C.,Tomkiewicz, J.,Schein, V.E.(1989).The relationship between sex role stereotypes and requisite management characteristics revisited.Academy of Management Journal,32(3),662-669.
  16. Brewer, N.,Mitchell, P.,Weber, N.(2002).Gender role, organization status, and conflict management styles.International Journal of Conflict Management,13(1),79-94.
  17. Briton, N. J.,Hall, J.(1995).Beliefs about female and male nonverbal communication.Sex Roles,32(1/2),79-90.
  18. Coser, L.A.(1956).The Functions of Social Conflict.New York:The Free Press.
  19. Culuan, M.J.,Marcus, M. L.,Jablin, F.M.,Putnam, L.L.,Roberts, K.H.,Porter, L.W. (edited)(1987).Handbook of organizational communication: An interdisciplinary perspective.Newbury Park, CA:Sage.
  20. Daft, R. L.,Lengel, R. H.(1986).Organizational information requirements, media richness, and structural Design.Management Science,32(5),554-571.
  21. Daft, R.L.,Lengel, R. H.(1984).Information richness: A new approach to managerial behavior and organizational design.Research in organizational behavior,6,191-233.
  22. Diener, E.,Fraser, S.,Beaman, A.,Kelem, R.(1976).Effects of deindividuation variables on stealing among halloween trick-or-treaters.Journal of Personality and Social Psychology,33(2),178-183.
  23. Dubrovsky, V. J.,Kiesler, S.,Sethna, B.N.(1991).The equalization phenomenon: Status effects in computer-mediated and face-to-face decision-making groups.Human-Computer Interaction,6(2),119-146.
  24. Dyer, R.,Green, R.,Pitts, M.,Millward, G.,Kirby, M.A,Dix, A.J.,Finlay, J.E. (edited)(1995).People and computers X. Cambridge.UK:Cambridge University Press.
  25. Eagly, A.H.,Johnson, B. T.(1990).Gender and leadership style: A meta-analysis.Psychological Bulletin,108(2),233-256.
  26. Eagly, A.H.,Karau, S.(1991).Gender and emergence of leaders: A meta-analysis.Psychological Bulletin,60(5),685-710.
  27. Ellison, P.,Govern, J.,Petri, H.,Figler, M.(1995).Anonymity and aggressive driving behavior: A field study.Journal of Social Behavior and Personality,10(1),265-272.
  28. Festinger, L.,Pepitone, A.,Newcomb, T.(1952).Some consequences of deindividuation in a group.Journal of Abnormal and Social Psychology,47(2),382-389.
  29. Frissen, V.(1992).Trapped in electronic cages? Gender and new information technologies in public and private domain: An overview of research.Media, Culture, and Society,14(1),31-49.
  30. Frost, J.J.,Wilmot, W.W.(1978).Interpersonal Conflic.Dubuque, Iowa:William C. Brown Co..
  31. Gilligan, C.(1982).In a Different Voice: Psychological Theory and Women Development.Cambridge, MA:Harvard University Press.
  32. Greeff, A.P.,Bruyne, T.(2000).Conflict management style and marital satisfaction.Journal of Sex and marital Therapy,26(4),321-334.
  33. Guadagno, R. E.,Cialdini, R. B.(2002).Online persuasion: An examination of gender differences in computer-mediated interpersonal influence.Group Dynamics: Theory Research and Practice,6(1),38-51.
  34. Haferkamp, C.J.(1991).Orientations to conflict: Gender, attributions , resolution strategies ,and self-monitoring.Current Psychology,10(4),227-240.
  35. Herring, S.(1996).Computer-mediated communication.Amsterdam:John Benjamins Publishing company.
  36. Hess, T.J.,Fuller, M.A.,Mathew, J.(2003).Gender and personality in media rich interfaces. Do birds of a feather flock together?.In Proceedings of the Second Annual Workshop on HCI Research in MIS
  37. Hiltz, S.,Turoff, M.(1993).The Network Nation : Human Communication via Computer.Cambridge, MA:The MIT Press.
  38. Hiltz, S.,Turoff, M.,Johnson, K.(1989).Experiments in group decision making, 3: Disinhibition, deindividuation, and group process in pen name and real name computer conferences.Decision Support Systems,5(2),217-232.
  39. Hobman, E.V.,Bordia, P.,Irmer, B.,Chang, A.(2002).The expression of conflict in computer-mediated and face-to-face groups.Small Group Research,33(4),439-465.
  40. Howard, P.,Rainie, L.,Jones, S.(2001).Days and nights on the internet: The impact of diffusing technology.American Behavioral Scientist,45(3),383-404.
  41. Jansen, S.(1989).Gender and the information society : A socially structured silence.Journal of Communication,39(3),196-213.
  42. Jehn, K. A.(1995).A multimethod examination of the benefits and detriments of intragroup conflict.Administrative Science Quarterly,40(2),256-282.
  43. Jehn, K. A.,Bendersky, C.(2003).Intragroup conflict in organizations: A contingency perspective on the conflict-outcome relationship.Research in Organizational Behavior,25,187-242.
  44. Jehn, K. A.,Chadwick, C.,Thatcher, S.(1997).To agree or not to agree: The effect of value congruence, member diversity & conflict workgroup outcomes.International Journal of Conflict Management,8,287-305.
  45. Jehn, K. A.,Mannix, E.(2001).The dynamic nature of conflict: A longitudinal study of intragroup conflict and group performance.Academy of Management Journal,44(2),238-251.
  46. Jehn, K.A.,Chatman, J. A.(2000).The influence of proportional and perceptual conflict composition on team performance.International Journal of Conflict Management,11(1),56-73.
  47. Joinson, A.(2001).Knowing me, knowing you: reciprocal self-disclosure in internet-based surveys.CyberPsychology & Behavior,4(5),587-591.
  48. Joinson, A.,Gackenbach, J. (edited)(1998).Psychology and the Internet: Intrapersonal, interpersonal, and transpersonal implications.San Diego, CA:Academic Press.
  49. Kerlinger, F. N.(1986).Foundations of Behavioral Research.New York:Harcourt Brace Jovanovich.
  50. Kiesler, S.,Siegel, J.,McGuire, T.(1984).Social psychological aspects of computer-mediated communication.American Psychologist,39(10),1123-1134.
  51. Kiesler, S.,Zubrow, D.,Moses, A. M.,Geller, V.(1985).Affect in computer-mediated communication: An experiment in synchronous terminal-to-terminal discussion.Human-Computer Interaction,1(1),77-104.
  52. Kilman, R.H.,Thomas, K.W.(1977).Perceived gender roles of managers and effective conflict management.Psychological Reports,74(1),104-107.
  53. Korabik, K.(1990).Androgyny and leadership style.Journal of Business Ethics,9(4/5),283-292.
  54. Korabik, K.,Baril, G.,Watson, C.(1993).Managers` conflict management style and leadership effectiveness: The moderating effects of gender.Sex Roles,29(5/6),405-418.
  55. Kozinets, R.V.(1999).E-tribalized marketing?: The strategic implications of virtual communities of consumption.European Management Journal,17(3),252-264.
  56. Lea, M.,Spears, R.,Wood, J. T.,Duck, S. (Eds.)(1995).In Understudied relationships: Off the beaten track.Newbury Park, CA:Sage.
  57. Li, Q.(2006).Computer-mediated communication: A meta-analysis of male and female attitudes and behaviors.International Journal on E-Learning,5(4),525-570.
  58. Mackey, R. A.,O`Brien, B. A.(1998).Marital conflict management: gender and ethnic differences.Social Work,43(2),128-141.
  59. Mann, C.,Sutton, M.(1998).Netcrime: More change in the organization of thieving.British Journal of Criminology,38(1),201-229.
  60. Marissa, V.P.,Suri, R.(2004).Impact of gender differences on the evaluation of promotional emails.Journal of Advertising Research,44(4),360-368.
  61. Matheson, K.(1991).Social cues in computer-mediated negotiations: Gender makes a difference.Computers in Human Behavior,7(3),137-145.
  62. Matheson, K.,Lea, M. (edited)(1992).Contexts of computer-mediated communication.New York:Harvester Wheatsheaf.
  63. Meyers-Levy, J.,Cafferata, P.,Tybout, A. (edited)(1989).In Cognitive and Affective Responses to Advertising.MA:Lexington Books.
  64. Meyers-Levy, J.,Maheswaran, D.(1991).Exploring differences in males' and females` processing strategies.Journal of Consumer Research,18(1),63-70.
  65. Meyers-Levy, J.,Sternthal, B.(1991).Gender differences in the use of message cues and judgments.Journal of Marketing Research,28(1),84-96.
  66. Nie, N.,Erbring, L.(2000).Internet and Society: A Preliminary Report. Stanford.CA:Stanford Institute for the Quantitative Study of Society.
  67. Parks, M. R.,Floyd, K.(1996).Making friends in cyberspace.Journal of Communication,46(1),80-98.
  68. Postmes, T.,Spears, R.(1998).Deindividuation and antinormative behavior: A meta analysis.Psychological Bulletin,123(4),238-259.
  69. Rehm, J.,Steinletner, M.,Lilli, W.(1987).Wearing uniforms and aggression: A field experiment.European Journal of Social Psychology,17(3),357-360.
  70. Rice, R.E.,Steinfield, C.,Andriessen, J.H.E.,Holland, R. Roe. (edited)(1994).In Telematics and work.Lawrence-Erlbaum and Ass.
  71. Robbins, S. P.(2005).Organizational Behavior.Prentice Hall.
  72. Rosenthal, D. B.,Hautaluoma, J.(1988).Effects of importance of issues, gender, and power of contenders on conflict management style.Journal of Social Psychology,128(10),699-701.
  73. Rubin, J. Z.,Brown, B.R.(1975).The Social Psychology of Bargaining and Negotiation.New York, NY:Academic Press.
  74. Saaty, T. L.(1980).The Analytic Hierarchy Process.New York:McGraw-Hill.
  75. Saaty, T. L.(1977).A scaling method for priorities in hierarchical structures.Journal of Mathematical Psychology,15(3),234-281.
  76. Saaty, T. L.(1994).How to make a decision: The analytic hierarchy process.Interfaces,24(6),19-43.
  77. Saaty, T.L.,Kearns, K.P.(1985).Analytical Planning.New York:Pregrmon Press Inc.
  78. Sheehan, K.B.(1999).An investigation of gender differences in online privacy concerns and resultant behaviors.Journal of Interactive Marketing,13(4),24-38.
  79. Sherl, D.B.,Thomas, M.M.,Michael, A.H.,Tonya, B.B.,Jerry, M.C.(2005).A genderbased categorization for conflict resolution.The Journal of Management Development,24(3),204-205.
  80. Shockley-Zalabak, P.(1981).The effects of sex differences on the preference for utilization of conflict styles of managers in a work setting: An exploratory study.Public Personnel Management,10(3),289-295.
  81. Short, J.,Williams, E.,Christie, B.(1976).The social psychology of Telecommunications.London:John Wiley and Sons.
  82. Siegel, J.,Dubrovsky, S.,Kiesler, S.,McGuire, T.(1986).Group process in computer-mediated communication.Organizational Behavior and Human Decision Processes,37(2),157-187.
  83. Sproull, L.,Kiesler, S.(1991).Computers, networks and work.Scientific American,265(3),116-123.
  84. Stuhlmacher, A.F.,Citera, M.(2005).Hostile behavior and profit in virtual negotiation: A meta-analysis.Journal of Business and Psychology,20(1),70-93.
  85. Thomas, K. W.,Dunnette, M. D.,Hough, L. M. (edited)(1992).Handbook of Industrial and Organizational Psychology.Palo Alto, CA:Consulting Psychologists Press.
  86. Thompsen, P. A.,Foulger, D.A.(1996).Effects of pictographs and quoting on flaming in electronic mail.Computers in Human Behavior,12(2),225-243.
  87. Trevino, L.K.,Daft, R.L.,Lengel, R.H.,Fulk, J.,Steinfields, C. (edited)(1990).In Organization and communication technology.Newbury Park, CA:Sage.
  88. Wall, J.A.,Callister, R.R.(1995).Conflict and its management.Journal of Management,21(3),515-558.
  89. Walther, J.B.,Tidwell, L.,Galvin, K. M.,Cooper, P.,Los Angles (edited)(1996).Making connections: Readings in relational communication.CA:Roxbury Publishing Company.
  90. Watson, R.(1973).Investigation into deindividuation using a cross-cultural survey technique.Journal of Personality and Social Psychology,25(3),342-345.
  91. 王石番(1996)。傳播內容分析法-理論與實證。台北:幼獅文化事業公司。
  92. 王俊程、李宜昌、洪銘建(2002)。隱私市場-數位商品分享之價值。資訊管理研究,4(3),119-136。
  93. 甘百瑩(2002)。碩士論文(碩士論文)。國立中山大學傳播管理研究所。
  94. 吳彥輝(1999)。碩士論文(碩士論文)。國立中山大學人力資源管理研究所。
  95. 吳美瑩(2001)。碩士論文(碩士論文)。國立交通大學傳播研究所。
  96. 吳姝蒨(1996)。碩士論文(碩士論文)。國立政治大學新聞學研究所。
  97. 吳國清(2001)。網際網路行為與警察作用之探討。中央警察大學學報,38,349-374。
  98. 汪志堅、駱少康(2002)。以內容分析法探討網路謠言之研究。資訊、科技與社會學報,2(1),131-148。
  99. 林子銘、李東峰、連俊瑋(2002)。台灣人在不確定環境下倫理決策行為研究。資訊管理研究,4(3),163-204。
  100. 林書弘(2003)。碩士論文(碩士論文)。國立中山大學企業管理所。
  101. 唐印星(1998)。碩士論文(碩士論文)。雲林科技大學工業工程與管理研究所。
  102. 張俊彥(2005)。運用公正理論解決組織衝突的可行策略。研習論壇,59,1-11。
  103. 許孟詳、郭峰淵(2001)。電腦倫理效能對電腦偏差行為之影響:以盜版軟體為例。管理學報,18(1),23-47。
  104. 陳妍伶(2005)。碩士論文(碩士論文)。淡江大學資訊管理系碩士班。
  105. 陳淑遙(2003)。碩士論文(碩士論文)。國立中正大學犯罪防治研究所。
  106. 黃剛銘(2003)。碩士論文(碩士論文)。南華大學管理研究所。
  107. 劉久清(2004)。網路民主與網路公民。哲學與文化,31(6),63-80。
  108. 鄧振源、曾國雄(1989)。層級分析法(AHP)的內涵特性與應用(上)。中國統計學報,27(6),6-22。
被引用次数
  1. Liu,Chung-Chu(2011)。馬斯洛需求理論在網路書局使用者之驗證。行銷評論,8(3),405-422。
  2. 郭依潔,范熾文,紀惠英(2021)。國中生網路霸凌行為及其相關因素之研究。學校行政,134,252-273。
  3. 廖郁婷、張文山(2014)。網路霸凌與網路論戰對遊戲玩家品牌忠誠度的影響。資訊傳播研究,4(2),23-42。
  4. 劉仲矩(2010)。網路衝突成因認知類型之研究。Electronic Commerce Studies,8(3),299-322。
  5. 劉仲矩、楊緯剛(2015)。以馬斯洛需求層級理論探討智慧型手機使用者需求重要性之研究。Electronic Commerce Studies,13(2),221-240。
  6. 鍾盼兮、葉榮椿、陳宜檉、郭勝煌(2012)。台灣地區電子商務研究主題趨勢分析之研究。美和學報,31(2),41-62。
  7. (2015)。Bandura道德疏離機制量表對於國內中小學學生適切性之研究。教育學刊,45,85-125。