题名

線上使用者匿名傾向的前因及結果

并列篇名

Causes and Consequences of Users Online Anonymity Concern

DOI

10.3966/207321472017030901002

作者

林南宏(Nan-Hong Lin);胡珈瑄(Chia-Hsuan Hu)

关键词

匿名性 ; 網路溝通恐懼 ; 保護隱私權 ; 注意社會比較訊息 ; 溝通滿足 ; 自我揭露 ; 去個人化 ; Anonymity ; Computer-mediated Communication Apprehension ; Privacy Protection ; Attention to Social Comparison Information ; Communication Satisfaction ; Self-Disclosure ; Deindividuation

期刊名称

商略學報

卷期/出版年月

9卷1期(2017 / 03 / 01)

页次

17 - 36

内容语文

繁體中文

中文摘要

網際網路的匿名特性除了增進網路溝通、可保有個人隱私權、有助於特定主題的自由言論發表的正面效果外,亦會帶來諸如:逃避責任歸屬、網路犯罪等負面效果,因此了解匿名的原因及影響是有其必要性的。本研究突破過去網路匿名性研究的不足之處,對網路匿名傾向作一整合性的研究,並說明網路上使用者採用匿名行為的前因及其影響結果之間的因果關係。 研究結果顯示:網路使用者在「網路溝通恐懼」、「保護隱私權」與「注意社會比較訊息」等三項動機上都對「匿名傾向」有顯著的正向影響。對本研究的樣本而言在產生匿名行為的動機成因上,應答者最顧慮隱私權的保護。其次,網路使用者匿名傾向的正面效果上,溝通的滿足感高過於揭露自我資訊的行為。

英文摘要

The nature of anonymity inherent on the Internet not only produces positive effects, including to improve online communication, and to protect privacy which benefits the freedom of speech on specific issues, but also brings about some negative effects, such as getting rid of responsibility and network crimes. Hence, it is a must to understand the causes and consequences of online anonymity concern. This study makes a breakthrough to the lack of the extant research on online anonymity in terms of an integrated research in order to explain the causes and the consequences of anonymity behavior adopted by online users. The findings reveal that, for online users, the three motivations of Computer-mediated Communication Apprehension, Privacy Protection and Attention to Social Comparison Information have significantly positive effects on anonymity concern. Among them, privacy protection concerns online users most. Next, on the positive effect of anonymity concern, the communication satisfaction outweighs the self-disclosure.

主题分类 基礎與應用科學 > 資訊科學
社會科學 > 經濟學
社會科學 > 管理學
参考文献
  1. 谷玲玲(2013)。網路親密關係中的自我揭露。資訊社會研究,24,1-26。
    連結:
  2. 施翠倚、楊力旗(2011)。行動廣告內容、廣告價值、隱私權保護對消費者採用意願之影響。電子商務學報,13(3),625-648。
    連結:
  3. 許韶玲、施香如(2013)。網路成癮是一種心理疾病嗎?從實證與論述文獻的脈絡檢視。教育心理學報,44(4),773-792。
    連結:
  4. Fox, S., Rainie, L., Horrigan, J., Lenhart, A., Spooner, T., Burke, M., Lewis, O. and Carter, C., 2000. The Online Healthcare Revolution: How the Web Helps Americans Take Better Care of Themselves, Pew Internet and American Life Project, retrieved from http://www.pewinternet.org/PPF/r/26/report_display.asp
  5. Lasswell, H. D., 1948. The Structure and Function of Communication in Society, in Bryson, L. (Eds.), The Communication of Ideas: Religion and Civilization Series, New York, NY: Harper & Row, 37-51
  6. 維基百科,2016。言論自由,取自:https://zh.wikipedia.org/zh-tw/%E8%A8%80%E8%AB%96%E8%87%AA%E7%94%B1
  7. 靜宜大學學務處 ,2010尊重他人,切勿網路惡意攻擊,違法案例宣導!,取自: http://www.osa.pu.edu.tw/osa/district/tutor/files/S3/S3F9_125.pdf
  8. 台灣網路資訊中心,2015。2015年台灣無線網路使用狀況調查,取自:http://www.twnic.net.tw/download/200307/200307index.shtml
  9. Akdeniz, Y.(2002).Anonymity, Democracy, and Cyberspace.Social Research,69(1),223-237.
  10. Allen, D. G.,Scotter, J. R. V.,Otondo, R. F.(2004).Recruitment Communication Media: Impact on Pre-Hire Outcomes.Personnel Psychology,57(1),143-171.
  11. Amichai-Hamburger, Y.,Hayat, Z.(2011).The Impact of the Internet on the Social Lives of Users: A Representative Sample from 13 Countries.Computers in Human Behavior,27(1),595-589.
  12. Anderson, J. C.,Gerbing, D. W.(1988).Structural Equation Modeling in Practice: A Review and Recommended Two-step Approach.Psychological Bulletin,103(3),411-423.
  13. Anne, W. B.(1994).Who Owns Information? From Privacy to Public Access.New York, NY:Basic Books.
  14. Arnie, S. G.,Marci, E. J. G.,Katelyn, Y. A. M.(2002).Relationship Formation on the Internet: What's the Big Attraction.Journal of Social Issues,58(1),9-31.
  15. Banerjee, D.,Cronan, T. P.,Jones, T. W.(1998).Modeling IT Ethics: A Study in Situational Ethics.MIS Quarterly,22(1),31-60.
  16. Batra, R.,Homer, P. M.,Kahle, L. R.(2001).Values, Susceptibility to Normative Influence and Attribute Importance Weights: A Nomological Analysis.Journal of Consumer Psychology,11(2),115-128.
  17. Baym, N. K.(1993).Interpreting Soap Operas and Creating Community: Inside a Computer-Mediated Fan Culture.Journal of Folklore Research,30(2/3),143-177.
  18. Bearden, W. O.,Etzel, M. J.(1982).Reference Group Influence on Product and Brand Purchase Decisions.Journal of Consumer Research,9,183-194.
  19. Ben-Ze'ev, A.(2003).Privacy, Emotional Closeness, and Openness in Cyberspace.Computers in Human Behavio,19(4),451-467.
  20. Bjarnason, T.,Adalbjarnardottir, S.(2000).Anonymity and Confidentiality in School Surveys on Alcohol, Tobacco, and Cannabis Use.Journal of Drug Issues,30(2),335-343.
  21. Bowers, D. K.(1998).FAQs on Online Research.Marketing Research,10(4),45-48.
  22. Burkell, J.(2006).Anonymity in Behavioral Research: Not Being Unnamed, but Being Unknown.University of Ottawa Law & Technology Journal,3(1),189-205.
  23. Caudill, E. M.,Murphy, P. E.(2000).Consumer Online Privacy: Legal and Ethical Issues.Journal of Public Policy & Marketing,19(1),7-19.
  24. Cheng, G. H. L.,Chan, D. K. S.,Tong, P. Y.(2006).Qualities of Online Friendships with Different Gender Compositions and Durations.CyberPsychology and Behavior,9(1),14-21.
  25. Christopherson, K. M.(2007).The Positive and Negative Implications of Anonymity in Internet Social Interactions: On the Internet, Nobody Knows You're a Dog.Computers in Human Behavior,23(6),3038-3056.
  26. Clarke, C. T.(1991).Kent, OH, USA,Kent State University.
  27. Claytona, R. B.,Osborn, R. E.,Miller, K. B.,Oberle, D. C.(2013).Loneliness, Anxiousness, and Substance Use as Predictors of Facebook Use.Computers in Human Behavior,29(3),687-693.
  28. Coffey, B.,Woolworth, S.(2004)."Destroy the Scum, and then Neuter Their Families:" The Web Forum as a Vehicle for Community Discourse?.The Social Science Journal,41(1),1-14.
  29. Crino, M. D.,White, M. C.(1981).Satisfaction in Communication: An Examination of the Downs-Hazen Measure.Psychological Reports,49(3),831-838.
  30. Davis, K.(1972).Human Behavior at Work: Human Relations and Organization Behavior.New York, NY:McGraw-Hill.
  31. De Vito, J. A.(2003).Human Communication: The Basic Course.Bostonl, MA:Allyn and Bacon.
  32. Derlega, V. J.,Metts, S.,Petronio, S.,Margulis, S. T.(1993).Self-Disclosure.Newbury Park, CA:Sage Publications.
  33. Donna, L. H.,Thomas, P. N.,Marcos, A. P.(1999).Information Privacy in the Marketspace: Implications for the Commercial Uses of Anonymity on the Web.The Information Society,15(2),129-139.
  34. Ellingson, L. L.,Buzzanell, P. M.(1999).Listening to Women's Narratives of Breast Cancer Treatment: A Feminist Approach to Patient Satisfaction with Physician-Patient Communication.Health Communication,11(2),153-183.
  35. Er, M. C.,Ng, A. C.(1995).The Anonymity and Proximity Factors in Group Decision Support Systems.Decision Support Systems,14(1),75-83.
  36. Festinger, L.(1954).A Theory of Social Comparison Processes.Human Relations,7(2),117-140.
  37. Flaherty, L. M.,Pearce, K. J.,Rubin, R. B.(1998).Internet and Face-to-Face Communication: Not Functional Alternatives.Communication Quarterly,46(3),250-268.
  38. Fred, H. C.(1997).Privacy in the Information Age.Washington, D.C.:Brookings Institution Press.
  39. Hair, J. F.,Black, W. C.,Babin, B. J.,Anderson, R. E.(2010).Multivariate Data Analysis: A Global Perspective.Upper Saddle River, NJ:Pearson Prentice Hall.
  40. Henderson, S.,Gilding, M.(2004).I've Never Clicked This Much with Anyone in My Life': Trust and Hyperpersonal Communication in Online Friendships.New Media & Society,6(4),487-506.
  41. Hiller, J. S.,Cohen, R.(2001).Internet Law and Policy.Upper Saddle River, NJ:Prentice-Hall.
  42. Hsu, M. H.,Kuo, F. Y.(2003).The Effect of Organization-Based Self Esteem and Deindividuation in Protecting Personal Information Privacy.Journal of Business Ethics,42(4),305-320.
  43. Hunt, D.,Atkin, D.,Krishnan, A.(2012).The Influence of Computer-Mediated Communication Apprehension on Motives for Facebook Use.Journal of Broadcasting & Electronic Media,56(2),187-202.
  44. Inness, J. C.(1992).Privacy, Intimacy, and Isolation.New York, NY:Oxford University Press.
  45. Jang, K.,Park, N.,Song, H.(2016).Social Comparison on Facebook: Its Antecedents and Psychological Outcomes.Computers in Human Behavior,62,147-154.
  46. Jessup, L. M.,Connolly, T.,Galegher, J.(1990).The Effects of Anonymity on GDSS Group Process with an Idea-Generating Task.MIS Quarterly,14(3),313-321.
  47. Jessup, L. M.,Tansik, D. A.(1991).Decision Making in an Automated Environment: The Effects of Anonymity and Proximity with a Group Decision Support System.Decision Sciences,22(2),266-279.
  48. John, H., III.,Armstrong, A. G.(1997).Net Gain: Expanding Markets through Virtual Communities.Boston MA:Harvard Business School Press.
  49. Johnson, D.(2000).Anonymity and the Internet.The Futurist,34(4),12.
  50. Joinson, A. N.(1998).Causes and Implications of Disinherited Behavior on the Internet.San Diego, CA:Academic Press.
  51. Joinson, A. N.(2001).Self-Disclosure in Computer-Mediated Communication: the Role of Self-Awareness and Visual Anonymity.European Journal of Social Psychology,31(2),177-192.
  52. Joinson, A. N.(Ed.),McKenna, K. Y. A.(Ed.),Postmes, T.(Ed.),Reips, U-D.(Ed.)(2007).Oxford Handbook of Internet Psychology.Oxford, UK:Oxford University Press.
  53. Jones, S. G.(1998).CyberSociety 2.0: Revisiting Computer-Mediated Communication and Community.Thousand Oaks, CA:Sage.
  54. Kahai, S. S.,Avolio, B. J.,Sosik, J. J.(1998).Effects of Source and Participant Anonymity and Difference Initial Opinions in an EMS Context.Decision Sciences,29(2),427-460.
  55. Kiesler, S.,Siegel, J.,McGuire, T. W.(1984).Social Psychological Aspects of Computer-Mediated Communication.American Psychologist,39(10),1123-1134.
  56. Kiesler, S.,Zubrow, D.,Moses, A. M.,Geller, V.(1985).Affectin Computer-Mediated Communication: An Experiment in Synchronous Terminal-to-Terminal Discussion.Human Computer Interaction,1,77-104.
  57. Knapp, M. L.(Ed.),Daly, J . A.(Ed.)(2002).Handbook of Interpersonal Communication.Thousand Oaks, CA:Sage.
  58. Lennox, R. D.,Raymond, N. W.(1984).Revision of the Self-Monitoring Scale.Journal of Personality and Social Psychology,46(6),1349-1364.
  59. Level, D.A.(1959).West Lafayette, IN, USA,Purdue University.
  60. Loch, K. D.,Conger, S.(1996).Evaluation Ethical Decision Making and Computer Use.Communications of the ACM,39(7),74-83.
  61. Mann, L.(1981).The Baiting Crowd in Episodes of Threatened Suicide.Journal of Personality and Social Psychology,41(4),703-709.
  62. Marcoulides, G. A.,Schumacker, R. E.(1996).Advanced Structural Equation Modeling: Issues and Techniques.Mahwah, NJ:Lawrence Erlbaum Associates.
  63. Marshall, K. P.(1999).Has Technology Introduced New Ethical Problems?.Journal of Business Ethics,19(1),81-90.
  64. Mazur, M. A.,Burns, R. J.,Emmers-Sommer, T. M.(2000).Perceptions of Relational Interdependence in Online Relationships: The Effects of Communication Apprehension and Introversion.Communication Research Reports,17(4),397-406.
  65. McCroskey, J. C.(1977).Oral Communication Apprehension: A Summary of Recent Theory and Research.Human Communication Research,4(1),78-96.
  66. McCroskey, J. C.(1970).Measures of Communication-Bound Anxiety.Speech Monographs,37,269-277.
  67. McCroskey, J. C.,Beatty, M. J.,Jones, W. H.,Cheek, J. M.,Brigg, S. R.(1986).Oral Communication Apprehension.New York, NY:Plenum.
  68. McQuail, D.(2000).McQuail's Mass Communication Theory.London, UK:Sage.
  69. Merkle, E.,Richardson, R.(2000).Digital Dating and Virtual Relating: Conceptualizing Computer Mediated Romantic Relationships.Family Relation,49(2),187-192.
  70. Miller, C.(1995).Concern Raised Over Privacy on Infohighway.Marketing News,29(1),1-3.
  71. Miller, L. C.,Berg, J. H.,Archer, R. L.(1983).Openers: Individuals Who Elicit Intimate Self-Disclosure.Journal of Personality and Social Psychology,44(6),1234-1244.
  72. Morahan-Martin, J.,Schumacher, P.(2003).Loneliness and Social Users of the Internet.Computers in Human Behavior,19(6),659-671.
  73. Morio, H.,Buchholz, C.(2009).How Anonymous Are You Online? Examining Online Social Behaviors from a Cross-Cultural Perspective.AI & Society,23(2),297-307.
  74. Nissenbaum, H.(1999).The Meaning of Anonymity in an Information Age.Information Society,15(2),141-144.
  75. Nunnally, J. C.,Bernstein, I. H.(1994).Psychometric Theory.New York, NY:McGraw-Hill.
  76. Parks, M. R.,Floyd, K.(1996).Making Friends in Cyberspace.Journal of Communication,46(1),80-97.
  77. Patterson, B. R.,Gojdycz, T. K.(2000).The Relationship between Computer-Mediated Communication and Communication Related Anxieties.Communication Research Reports,17(3),278-287.
  78. Pearson, J. C.,Child, J. T.,DeGreeff, B. L.,Semlak, J. L.,Burnett, A.(2011).The Influence of Biological Sex, Self-Esteem, and Communication Apprehension on Unwillingness to Communicate.Atlantic Journal of Communication,19(4),216-227.
  79. Perlman, D.(Ed.),Cozby, P. C.(Ed.)(1983).Social Psychology.New York, NY:Holt, Rinehart and Winston.
  80. Pincus, L. B.,Johns, R.(1997).Private Parts: A Global Analysis of Privacy Protection Schemes and a Proposed Innovation for Their Comparative Evaluation.Journal of Business Ethics,16(12-13),1237-1260.
  81. Prentice-Dunn, S.,Rogers, R. W.(1982).Effects of Public and Private Self-Awareness on Deindividuation and Aggression.Journal of Personality and Social Psychology,43(3),503-513.
  82. Rachels, J.(1975).Why Privacy Is Important.Philosophy and Public Affairs,4(4),323-333.
  83. Ratner, R. K.,Kahn, B. E.(2002).The Impact of Private versus Public Consumption on Variety Seeking Behavior.Journal of Consumer Research,29(2),246-257.
  84. Reeding, W. C.(1972).Communication within the Organization: An Interpretive Review of Theory and Research.New York, NY:Industrial Communication Council.
  85. Rheingold, H.(2000).The Virtual Community: Homesteading on the Electronic Frontier.Cambridge, MA:MIT Press.
  86. Rice, R. E.,Case, D.(1983).Electronic Message Systems in the University: A Description of Use and Utility.Journal of Communication,33(1),131-152.
  87. Richins, M.(1991).Social Comparison and the Idealized Images of Advertising.Journal of Consumer Research,18(1),71-83.
  88. Scott, C. R.(1999).The Impact of Physical and Discursive Anonymity on Group Members' Multiple Identifications during Computer-Supported Decision Making.Western Journal of Communication,63(4),456-487.
  89. Scott, C. R.,Timmerman, E. C.(2005).Relating Computer, Communication and Computer-Medicate Communication Apprehension to New Communication Technology Use in the Workplace.Communication Research,32(6),683-725.
  90. Sheehan, K. B.,Hoy, M. G.(1999).Flaming, Complaining, Abstaining: How Online Users Respond to Privacy Concerns.Journal of Advertising,28(3),37-51.
  91. Simon, T.(1988).Hamilton, Ontario, Canada,McMaster University.
  92. Singer, J. E.,Brush, C. A.,Lublin, S. C.(1965).Some Aspects of Deindividuation: Identification and Conformity.Journal of Experimental Social Psychology,1(4),356-378.
  93. Snyder, C. R.(Ed.),Ford, C. E.(Ed.)(1987).Coping with Negative Life Events: Clinical and Social Psychological Perspectives.New York, NY:Plenum Press.
  94. Solomon, M. E.(1951).The Control of Humidity with KOH, H2SO4, or Other Solutions.Bulletin of Entomological Research,42,543-559.
  95. Torkzadeh, G.,Koufteros, X.,Pflughoeft, K.(2003).Confirmatory Analysis of Computer Self-Efficacy.Structural Equation Modeling,10(2),263-275.
  96. Trevino, L. K.,Lengel, R. K.,Daft, R. L.(1987).Media Symbolism, Media Richness and Media Choice in Organizations.Communication Research,14(5),553-574.
  97. Valacich, J. S.,Jessup, L. M.,Dennis, A. R.,Nunamaker, J. F.(1992).A Conceptual Framework of Anonymity in Group Support Systems.Group Decision and Negotiation,1(3),219-241.
  98. Vogel, E. A.,Rose, J. P.,Roberts, L. R.,Eckles, K.(2014).Social Comparison, Social Media, and Self-Esteem.Psychology of Popular Media Culture,3(4),206-222.
  99. Wallace, K. A.(1999).Anonymity.Ethics and Information Technology,1(1),23-35.
  100. Wallace, P. M.(2001).Psychology of the Internet.Cambridge, UK:Cambridge University Press.
  101. Watson, B. R.(2007).Columbia, MO, USA,University of Missouri.
  102. Weisband, S.,Kiesler, S.(1996).Self Disclosure on Computer Forms: Meta-Analysis and Implications.Proceedings of the SIGCHI Conference on Human Factors in Computing Systems,New York, NY, USA:
  103. Wirtz, J.,Lwin, M. O.,Williams, J. D.(2007).Causes and Consequences of Consumer Online Privacy Concern.International Journal of Service Industry Management,18(4),326-348.
  104. Wood, J. V.(1996).What is Social Comparison and How Should We Study it?.Personality and Social Psychology Bulletin,22(5),520-521.
  105. Wood, J. V.(1989).Theory and Research Concerning Social Comparisons of Personal Attributes.Psychological Bulletin,106(2),231-248.
  106. Wright, K. B.(1999).Norman, OK, USA,University of Oklahoma.
  107. Yoffie, A. J.(1998).The Sampling Dilemma is No Different On-Line.Marketing News,32(8),16.
  108. Zimbardo, P. G.(1969).The Human Choice: Individuation, Reason and Order versus Deindividuation, Impulse and Chaos.Nebraska Symposium on Motivation,Lincoln, NE:
  109. 王智弘(2008)。兒童及青少年網路成癮症之諮商輔導策略。兒童及青少年網路成癮之探討研討會,台北:
  110. 吳泰毅(2006)。碩士論文(碩士論文)。世新大學口語傳播學系。
  111. 吳筱玫(2003)。網路傳播概論。台北:智勝文化。
  112. 盧希鵬(2005)。網路行銷:電子化企業經營策略。台北:雙葉書廊有限公司。
被引用次数
  1. 柯皓仁,李佳恩(2020)。圖書館Facebook匿名版「靠北圖書館」內容分析研究。教育資料與圖書館學,57(3),291-319。