帳號:guest(3.146.35.80)          離開系統
字體大小: 字級放大   字級縮小   預設字形  

詳目顯示

以作者查詢圖書館館藏以作者查詢臺灣博碩士論文系統以作者查詢全國書目勘誤回報
作者:張容瑄
作者(英文):Jung-Hsuan Chang
論文名稱:蜜糖與毒藥:社交媒體的光與暗
論文名稱(英文):The Conflict between Positive and Negative Perspective: The Study of Antecedents of Social Well-being
指導教授:池文海
指導教授(英文):Wen-Hai Chih
口試委員:蔡宗宏
藍毓莉
口試委員(英文):Chung-Hung Tsai
Yu-Li Lan
學位類別:碩士
校院名稱:國立東華大學
系所名稱:企業管理學系
學號:610632005
出版年(民國):110
畢業學年度:109
語文別:中文
論文頁數:145
關鍵詞:社群媒體投入社會臨場感隱私風險信念潛伏社交幸福感
關鍵詞(英文):Social MediaEngagementSocial PresencePrivacy Risk BeliefLurkingSocial Well-being
相關次數:
  • 推薦推薦:0
  • 點閱點閱:30
  • 評分評分:系統版面圖檔系統版面圖檔系統版面圖檔系統版面圖檔系統版面圖檔
  • 下載下載:3
  • 收藏收藏:0
本研究探討社群媒體使用者社交幸福感的前因變數,以社會臨場感作為正向影響因素,並討論互動性、投入、社會臨場感之間的關係;以潛伏作為負向影響因素,並討論資訊安全意識、隱私風險信念、潛伏之間的關係,且探討投入及隱私風險信念的中介效果。本研究對象為曾經使用社群媒體的使用者,共收回375份有效問卷。研究結果顯示:(1)互動性及投入對社會臨場感有顯著正向影響,且投入具部份中介效果;(2)資訊安全意識及隱私風險信念對潛伏有顯著正向影響,並且隱私風險信念具部份中介效果;(3)社會臨場感對社交幸福感的社會整合及社會認同皆有顯著正向影響,潛伏只對社會認同有顯著負向影響。
This study investigates the antecedents of social well-being and explores the relationships among interactivity, engagement, social presence, information secutity awareness, privacy risk belief and lurking on social media. The research samples consist of 375 members who have used social media. The results indicate that: (1) Interactivity and engagement have significant and positive effects on social presence. Engagement plays as the partial mediator between interactivity and social presence. (2) Information secutity awareness and privacy risk belief have significant and positive effects on lurking. Privacy risk belief is also partial mediator between information secutity awareness and lurking. (3) Social presence has positive effects on both social integration and social acceptance, whereas lurking only has a negative effect on social acceptance.
致謝 i
中文摘要 ii
Abstract iii
目錄 iv
圖目錄 vii
表目錄 viii
第一章 緒論 1
第一節 研究背景 1
第二節 研究動機 3
第三節 研究問題與研究目的 5
第四節 研究重要性與貢獻 6
第五節 研究範圍與對象 7
第六節 研究流程 7
第二章 文獻探討 9
第一節 互動性(Interactivity) 9
第二節 投入(Engagement) 10
第三節 社會臨場感(Social Presence) 12
第四節 資訊安全意識(Information Security Awareness) 14
第五節 隱私風險信念(Privacy Risk Belief) 15
第六節 潛伏(Lurking) 16
第七節 社交幸福感(Social well-being) 18
第三章 研究方法 21
第一節 研究架構與研究假說 21
第二節 研究變數操作性定義與衡量 24
第三節 問卷設計 35
第四節 資料蒐集方法 37
第五節 資料分析方法 37
第六節 共同方法變異問題之處理與檢測 40
第七節 問卷前測結果分析 41
第四章 資料分析 49
第一節 正式問卷發放 49
第二節 敘述性統計分析 51
第三節 共同方法變異檢測 62
第四節 信度與效度分析 63
第五節 模型檢測─結構模式 74
第六節 競爭模型分析比較 80
第七節 中介效果分析 86
第五章 結論與建議 91
第一節 結論 91
第二節 管理意涵與貢獻 94
第三節 研究限制與後續研究建議 99
參考文獻 103
附錄一、前測問卷 121
附錄二、英文原始量表 125
附錄三、前測共同方法變異檢測-探索性因素分析 129
附錄四、前測各構面量表收斂效度分析 131
附錄五、前測區別效度分析暨變數相關係數表 137
附錄六、前測各構面信度分析 139
附錄七、正式問卷 143
1. 財團法人臺灣網路資訊中心(2020),2020臺灣網路報告,取自:https://report.twnic.tw/2020/assets/download/TWNIC_TaiwanInternetReport_2020_CH.pdf/(Accessed on October 18, 2021).
2. Abfalter, D., Zaglia, M. E. and Mueller, J. (2012), “Sense of virtual community: A follow up on its measurement,” Computers in Human Behavior, Vol. 28, No. 2, pp. 400-404.
3. Ajzen, I. (1991), “The theory of planned behavior,” Organizational Behavior and Human Decision Processes, Vol. 50, No. 2, pp. 179-211.
4. Albrechtsen, E. and Hovden, J. (2010), “Improving information security awareness and behaviour through dialogue, participation and collective reflection. An intervention study,” Computers & Security, Vol. 29, No. 4, pp. 432-445.
5. Anderson, J. C. and Gerbing, D. W. (1988), “Structural Equation Modeling in practice: A review and recommended two-step approach,” Psychological Bulletin, Vol. 103, No. 3, pp. 411-423.
6. Avidar, R. (2013), “The responsiveness pyramid: Embedding responsiveness and interactivity into public relations theory,” Public Relations Review, Vol. 39, No. 5, pp. 440-450.
7. Avolio, B. J., Yammarino, F. J. and Bass, B. M. (1991), “Identifying common methods variance with data collected from a single source: An unresolved sticky issue,” Journal of Management, Vol. 17, No. 3, pp. 571-587.
8. Bagozzi, R. P. and Yi, Y. (1988), “On the evaluation of Structural Equation Models,” Journal of the Academy of Marketing Science, Vol. 16, No. 1, pp. 74-94.
9. Baron, R. M. and Kenny, D. A. (1986), “The moderator-mediator variable distinction in social psychological research: Conceptual, strategic, and statistical considerations,” Journal of Personality and Social Psychology, Vol. 51, No. 6, pp. 1173-1182.
10. Bentler, P. M. and Wu, E. J. C. (1993), EQS/Windows User Guide, BMDP Statistical Software, Los Angeles, CA.
11. Berendt, B., Günther, O. and Spiekermann, S. (2005), “Privacy in e-commerce: Stated preferences vs. actual behavior,” Communications of the ACM, Vol. 48, No. 4, pp. 101-106.
12. Bik, H. M. and Goldstein, M. C. (2013), “An introduction to social media for scientists,” PLoS Biology, Vol. 11, No. 4, e1001535.
13. Biocca, F., Harms, C. and Burgoon, J. (2003), “Toward a more robust theory and measure of social presence: Review and suggested criteria,” Presence, Vol. 12, No. 5, pp. 456-480.
14. Bishop, J. (2007), “Increasing participation in online communities: A framework for humanecomputer interaction,” Computers in Human Behavior, Vol. 23, No. 4, pp. 1881-1893.
15. Blais, J. J., Craig, W. M., Pepler, D. and Connolly, J. (2008), “Adolescents online: The importance of Internet activity choices to salient relationships,” Journal of Youth and Adolescence, Vol. 37, No. 5, pp. 522-536.
16. Bobowik, M., Basabe, N. and Páez, D. (2015), “The bright side of migration: Hedonic, psychological, and social well-being in immigrants in Spain,” Social Science Research, Vol. 51, pp. 189-204.
17. Boyle, K. and Johnson, T. J. (2010), “MySpace is your space? Examining self-presentation of MySpace users,” Computers in Human Behavior, Vol. 26, No. 6, pp. 1392-1399.
18. Brown, J., Broderick, A. J. and Lee, N. (2007), “Word of mouth communication within online communities: Conceptualizing the online social network,” Journal of Interactive Marketing, Vol. 21, No. 3, pp. 2-20.
19. Bulgurcu, B., Cavusoglu, H. and Benbasat, I. (2010), “Information security policy compliance: An empirical study of rationality-based beliefs and information security awareness,” MIS Quarterly, Vol. 34, No. 3, pp. 523-548.
20. Burgoon, J. K., Parrott, R., Le Poire, B. A., Kelley, D. L., Walther, J. B. and Perry, D. (1989), “Maintaining and restoring privacy through communication in different types of relationships,” Journal of Social and Personal Relationships, Vol. 6, No. 2, pp. 131-158.
21. Burke, M., Marlow, C. and Lento, T. (2010), “Social network activity and social well-being,” Proceeding of the 2010 ACM Conference on Human Factors in Computing Systems, Association for Computing Machinery, Atlanta, GA.
22. Campbell, C., Pitt, L. F., Parent, M. and Berthon, P. R. (2011), “Understanding consumer conversations around ads in a web 2.0 world,” Journal of Advertising, Vol. 40, No. 1, pp. 87-102.
23. Caplan, S. E. (2003), “Preference for online social interaction: A theory of problematic Internet use and psychosocial well-being,” Communication Research, Vol. 30, No. 6, pp. 625-648.
24. Cavusoglu, H., Cavusoglu, H., Son, J. Y. and Benbasat, I. (2009), “Information security control resources in organizations: A multidimensional view and their key drivers,” Working Paper, University of British Columbia, Vancouver, Canada.
25. Chen, B. and Marcus, J. (2012), “Students’ self-presentation on Facebook: An examination of personality and self-construal factors,” Computers in Human Behavior, Vol. 28, No. 6, pp. 2091-2099.
26. Chen, G. M. (2011), “Tweet this: A uses and gratifications perspective on how active Twitter use gratifies a need to connect with others,” Computers in Human Behavior, Vol. 27, No. 2, pp. 755-762.
27. Chen, X. P. and Chen, C. C. (2004), “On the intricacies of the Chinese Guanxi: A process model of Guanxi development,” Asia Pacific Journal of Management, Vol. 21, No. 3, pp. 305-323.
28. Chida, Y. and Steptoe, A. (2008), “Positive psychological well-being and mortality: A quantitative review of prospective observational studies,” Psychosomatic Medicine, Vol. 70, No. 7, pp. 741-756.
29. Chung, K. C., Chen, C. H., Tsai, H. H. and Chuang, Y. H. (2021), “Social media privacy management strategies: A SEM analysis of user privacy behaviors,” Computer Communications, Vol. 174, pp.122-130.
30. Clerkin, E. M., Smith, A. R. and Hames, J. L. (2013), “The interpersonal effects of Facebook reassurance seeking,” Journal of Affective Disorders, Vol. 151, No. 2, pp. 525-530.
31. Cole, J. I. (2004), “Surveying the digital future year four,” The Digital Future Report, Vol. 4, No. 1, pp. 9-103.
32. Conroy, M., Feezell, J. T. and Guerrero, M. (2012), “Facebook and political engagement: A study of online political group membership and offline political engagement,” Computers in Human Behavior, Vol. 28, pp. 1535-1546.
33. Culnan, M. J. and Armstrong, P. K. (1999), “Information privacy concerns, procedural fairness, and impersonal trust: An empirical investigation,” Organization Science, Vol. 10, No. 1, pp. 104-115.
34. Dennen, V. P. (2008), “Pedagogical lurking: Student engagement in non-posting discussion behavior,” Computers in Human Behavior, Vol. 24, No. 4, pp. 1624-1633.
35. Dinev, T. and Hart, P. (2006), “An extended privacy calculus model for E-commerce transactions,” Information Systems Research, Vol. 17, No. 1, pp. 61-80.
36. Downes, E. J and McMillan, S. J. (2000), “Defining interactivity: A qualitative identification of key dimensions,” New Media & Society, Vol. 2, No. 2, pp. 157-179.
37. Efron, B. and Tibshirani, R. J. (1994), An Introduction to the Bootstrap, Chapman and Hall, London, UK.
38. Erwin, B. A., Turk, C. L., Heimberg, R. G., Fresco, D. M. and Hantula, D. A. (2004), “The Internet: Home to a severe population of individuals with social anxiety disorder?” Journal of Anxiety Disorders, Vol. 18, No. 5, pp. 629-466.
39. Fan, L., Liu, X., Wang, B. and Wang, L. (2016), “Interactivity, engagement, and technology dependence: Understanding users’ technology utilisation behaviour,” Behaviour & Information Technology, Vol. 36, No. 2, pp. 113-124.
40. Fiori, K. L., Antonucci, T. C. and Cortina, K. S. (2006), “Social network typologies and mental health among older adults,” The Journals of Gerontology Series B: Psychological Sciences and Social Sciences, Vol. 61, No. 1, pp. 25-32.
41. Fishbein, M. (2007), “A reasoned action approach: Some issues, questions, and clarifications,” In Ajzen, I., Albarracin, D. and Hornik, R. (Eds.), Prediction and Change of Health Behavior: Applying the Reasoned Action Approach, pp. 281-296, Lawrence Erlbaum & Associates, Hillsdale, NJ.
42. Fishbein, M. and Ajzen, I. (1975), Belief, Attitude, Intention and Behavior: An Introduction to Theory and Research, Addison-Wesley Publishing Company, Reading, MA.
43. Fornell, C. and Larcker, D. F. (1981), “Evaluating Structural Equation Models with unobservable variables and measurement error,” Journal of Marketing Research, Vol. 18, No. 1, pp. 39-50.
44. Fortin, D. R. and Dholakia, R. R. (2005), “Interactivity and vividness effects on social presence and involvement with a web-based advertisement,” Journal of Business Research, Vol. 58, No. 3, pp. 387-396.
45. Fox, J. and Warber, K. M. (2013), “Romantic relationship development in the age of Facebook: An exploratory study of emerging adults' perceptions, motives, and behaviors,” Cyberpsychology, Behavior, and Social Networking, Vol. 16, No. 1, pp. 3-7.
46. Gantz, W. and Lewis, N. (2014), “Sports on traditional and newer digital media: Is there really a fight for fans?” Television & New Media, Vol. 15, No. 8, pp. 760-768.
47. Gaski, J. F. and Nevin, J. R. (1985), “The differential effects of exercised and unexercised power sources in a marketing channel,” Journal of Marketing Research, Vol. 22, No. 2, pp. 130-142.
48. Gay, J. and Laidlaw, H. (2004), “Improving the measurement of communication satisfaction,” Management Communication Quarterly, Vol. 17, Issue 3, pp. 425-448.
49. Golder, S. A. and Donath, J. (2004), “Social roles in electronic communities,” Internet Research, Vol. 5, No. 1, pp. 19-22.
50. Greene, G. N. and Organ, D. W. (1973), “An evalution of causal models linking the received role with job satisfaction,” Administrative Science Quarterly, Vol. 18, No. 1, pp. 95-103.
51. Greene, K., Derlega, V. J. and Mathews, A. (2006), “Self-disclosure in personal relationships,” In Vangelisti, A. L. (Ed.), The Cambridge Handbook of Personal Relationships, pp. 409-427, Cambridge University Press, Cambridge, UK.
52. Hair, J. F. Jr., Black, W. C., Babin, B. J. and Anderson, R. E. (2010), Multivariate Data Analysis (7th Ed.), Prentice-Hall, Upper Saddle River, NJ.
53. Hewson, C., Yule, P., Laurent, D. and Vogel, C. (2003), Internet Research Methods: A Practical Guide for the Social and Behavioral Sciences, Sage Publications, London, UK.
54. Hong, W. and Thong, J. Y. (2013), “Internet privacy concerns: An integrated conceptualization and four empirical studies”, MIS Quarterly, Vol. 37 No. 1, pp. 275-298.
55. Hsu, C. L. and Lin, J. C. C. (2008), “Acceptance of blog usage: The roles of technology acceptance, social influence and knowledge sharing motivation,” Information & Management, Vol. 45, No. 1, pp. 65-74.
56. Hu, L. T. and Bentler, P. M. (1999), “Cutoff criteria for fit indexes in covariance structure analysis: Conventional criteria versus new alternatives,” Structural Equation Modeling, Vol. 6, No. 1, pp. 1-55.
57. Hull, K. and Lewis, N. P. (2014), “Why Twitter displaces broadcast sports media: A model,” International Journal of Sport Communication, Vol. 7, No. 1, pp. 16-33.
58. Hulland, J. (1999), “Use of partial least squares in strategic management research: A review of four recent studies,” Strategic Management Journal, Vol. 20, No. 2, pp. 195-204.
59. Huppert, F. A. (2009), “Psychological well-being: Evidence regarding its causes and consequences,” Applied Psychology: Health and Well-Being, Vol. 1, No. 2, pp. 137-164.
60. Javornik, A. and Mandelli, A. (2012), “Behavioral perspectives of customer engagement: An exploratory study of customer engagement with three Swiss FMCG brands,” Journal of Database Marketing & Customer Strategy Management, Vol. 19, Nol. 4, pp. 300-310.
61. Johns, M. D. (2012), “Two screen viewing and social relationships: Exploring the invisible backchannel of TV viewing,” In Sudweeks, F. (Ed.), Proceedings Cultural Attitudes towards Technology and Communication, pp. 333-343, Murdoch University, Perth, Australia.
62. Johnson, G. J., Bruner II, G. C. and Kumar, A. (2006), “Interactivity and its facets revisited: Theory and empirical test,” Journal of Advertising, Vol. 35, No. 4, pp. 35-52.
63. Jöreskog, K. G. and Sörbom, D. S. (1993), LISREL 8, A Guide to the Program and Application, SPSS Inc., Chicago, IL.
64. Joyce, E. and Kraut, R. (2006), “Predicting continued participation in newsgroups,” Journal of Computer-Mediated Communication, Vol. 11, No. 3, pp. 723-747.
65. Kang, S. (2007), “Disembodiment in online social interaction: Impact of online chat on social support and psychosocial well-being,” Cyberpsychology & Behavior, Vol. 10, No.3, pp. 475-477.
66. Kaplan, A. M. and Haenlein, M. (2010), “Users of the world, unite! The challenges and opportunities of social media,” Business Horizons, Vol. 53, No. 1, pp. 59-68.
67. Katz, E., Gurevitch, M. and Haas, H. (1973), “On the use of mass media for important things,” American Sociological Review, Vol. 38, pp. 164-181.
68. Kemp, S. (2021), “Digital 2021: global overview report,” Retrieved from https://datareportal.com/reports/digital-2021-global-overview-report/(Accessed on October 18, 2021)
69. Keyes, C. L. M. (1998), “Social well-being,” Social Psychology Quarterly, Vol. 61, No. 2, pp. 121-140.
70. Kietzmann, J. H., Silvestre, B. S., McCarthy, I. P. and Pitt, L. F. (2012), “Unpacking the social media phenomenon: Towards a research agenda,” Journal of Public Affairs, Vol. 12, No. 2, pp. 109-119.
71. Kim, S. (2011), “Web-interactivity dimensions and shopping experiential value,” Journal of Internet Business, Issue 9, pp. 1-25.
72. Kiousis, S. (2002), “Interactivity: A concept explication,” New Media & Society, Vol. 4, No. 3, pp. 355-383.
73. Koohang, A., Paliszkiewicz, J. and Goluchowski, J. (2018), “Social media privacy concerns: Trusting beliefs and risk beliefs,” Industrial Management & Data Systems, Vol. 118, No. 6, pp. 1209-1228.
74. Krasnova, H., Spiekermann, S., Koroleva, K. and Hildebrand, T. (2010), “Online social networks: Why we disclose,” Journal of Information Technology, Vol. 25, No. 2, pp. 109-125.
75. Kruger, H. A. and Kearney, W. D. (2006), “A prototype for assessing information security awareness,” Computers & Security, Vol. 25, No. 4, pp. 289-296.
76. Kruikemeier, S., van Noort, G., Vliegenthart, R. and de Vreese, C. H. (2013), “Getting closer: The effects of personalized and interactive online political communication,” European Journal of Communication, Vol. 28, No. 1, pp. 53-66.
77. Larson, J. S. (1993), “The measurement of social well-being,” Social Indicators Research, Vol. 28, No. 3, pp. 285-296.
78. Lee, E. J. and Shin, S. Y. (2012), “Are they talking to me? Cognitive and affective effects of interactivity in politicians’ Twitter communication,” Cyberpsy, Behavior, and Social Networking, Vol. 15, No. 10, pp. 515-520.
79. Lee, J. and Rao, H. R. (2007), “Perceived risks, counter-beliefs, and intentions to use anti-/counter-terrorism websites: An exploratory study of government-citizens online interactions in a turbulent environment,” Decision Support Systems, Vol. 43, No. 4, pp. 1431-1449.
80. Lee, Y., Kozar, K. A. and Larsen, K. R. (2009), “Avatar e-mail versus traditional e-mail: Perceptual difference and media selection difference,” Decision Support Systems, Vol. 46, No. 2, pp. 451-467.
81. Lee, Y. and Kwon, O. (2011), “Intimacy, familiarity and continuance intention: An extended expectation–confirmation model in web-based services,” Electronic Commerce Research and Applications, Vol. 10, No. 3, pp. 342-357.
82. Li, H., Sarathy, R. and Xu, H. (2011), “The role of affect and cognition on online consumers’ decision to disclose personal information to unfamiliar online vendors,” Decision Support Systems, Vol. 51, No. 3, pp. 434-445.
83. Liao, C. H., Yen, H. R. and Li, E. Y. (2011), “The effect of channel quality inconsistency on the association between e-service quality and customer relationships,” Internet Research, Vol. 21, No. 4, pp. 458-478.
84. Lim, J. S., Hwang, Y. C., Kim, S. and Biocca, F. A. (2015), “How social media engagement leads to sports channel loyalty: Mediating roles of social presence and channel commitment,” Computers in Human Behavior, Vol. 46, pp. 158-167.
85. Liu, Y. and Shrum, L. J. (2002), “What is interactivity and is it always such a good thing? Implications of definition, person, and situation for the influence of interactivity on advertising effectiveness,” Journal of Advertising, Vol. 31, No. 4, pp. 53-64.
86. Lowry, P. B., Roberts, T. L., Romano, N. C. Jr., Cheney, P. D. and Hightower, R. T. (2006), “The impact of group size and social presence on small-group communication: Does computer-mediated communication make a difference?” Small Group Research, Vol. 37, No. 6, pp. 631-661.
87. Malhotra, N., Kim, S. and Agarwal, J. 2004, “Internet users’ information privacy concerns (IUIPC): The construct, the scale, and a causal model,” Information Systems Research, Vol. 15, No. 4, pp. 336-355.
88. McDowell, I. and Newell, C. (1987), Measuring Health: A Guide to Rating Scales and Questionnaires, Oxford University Press, New York, NY.
89. McEwan, B. (2013), “Sharing, caring, and surveilling: An actor-partner interdependence model examination of Facebook relational maintenance strategies,” Cyberpsychology, Behavior, and Social Networking, Vol. 16, No. 12, pp. 863-869.
90. McKnight, D. H., Choudhury, V. and Kacmar, C. (2002), “The impact of initial consumer trust on intentions to transact with a web site: A trust building model,” The Journal of Strategic Information Systems, Vol. 11, No. 3, pp. 297-323.
91. McMillan, D. W. and Chavis, D. M. (1986), “Sense of community: A definition and theory,” Journal of Community Psychology, Vol. 14, No. 1, pp. 6-23.
92. McMillan, S. J. and Hwang, J. S. (2002), “Measures of perceived interactivity: An exploration of the role of direction of communication, user control, and time in shaping perceptions of interactivity,” Journal of Advertising, Vol. 31, No. 3, pp. 29-42.
93. Mesch, G. S. (2012), “Is online trust and trust in social institutions associated with online disclosure of identifiable information online,” Computers in Human Behavior, Vol. 28, No. 4, pp. 1471-1477.
94. Mooney, C. Z. and Duval, R. D. (1993), Bootstrapping: A Nonparametric Approach to Statistical Inference, Sage Publications, Newbury Park, CA.
95. Morgan, C. and Cotten, S. R. (2003), “The relationship between Internet activities and depressive symptoms in a sample of college freshmen,” CyberPsychology & Behavior, Vol. 6, No. 2, pp. 133-142.
96. Neelen, M. and Fetter, S. (2010), “Lurking: A challenge or a fruitful strategy? A comparison between lurkers and active participants in an online corporate community of practice,” International Journal of Knowledge and Learning, Vol. 6, No. 4, pp. 269-284.
97. Neiger, B. L., Thackeray, R., Van Wagenen, S. A., Hanson, C. L., West, J. H., Barnes, M. D. and Fagen, M. C. (2012), “Use of social media in health promotion: Purposes, key performance indicators, and evaluation metrics,” Health Promotion Practice, Vol. 13, No. 2, pp. 159-164.
98. Nielsen, J. (2006), “The 90-9-1 rule for participation inequality in social media and online communities,” Retrieved from
http://www.nngroup.com/articles/participation-inequality/(Accessed on October 18, 2021)
99. Nonnecke, B., Andrews, D. and Preece, J. (2006), “Non-public and public online community participation: Needs, attitudes and behavior,” Electron Commerce Research, Vol. 6, No. 1, pp. 7-20.
100. Nunnally, J. C. (1978), Psychometric Theory (2nd Ed.), McGraw-Hill, New York, NY.
101. O’Brien, D. and Torres, A. M. (2012), “Social networking and online privacy: Facebook users’ perceptions,” Irish Journal of Management, Vol. 31, No. 2, pp. 63-97.
102. Oeldorf-Hirsch, A. and Sundar, S. S. (2015), “Posting, commenting, and tagging: Effects of sharing news stories on Facebook,” Computers in Human Behavior, Vol. 44, pp. 240-249.
103. Okazaki, S. and Mendez, F. (2013), “Perceived ubiquity in mobile services,” Journal of Interactive Marketing, Vol. 27, No. 2, pp. 98-111.
104. Ortiz, J., Chih, W. H. and Tsai, F. S. (2018), “Information privacy, consumer alienation, and lurking behavior in social networking sites,” Computers in Human Behavior, Vol. 80, pp. 143-157.
105. Osatuyi, B. (2015), “Is lurking an anxiety-masking strategy on social media sites? The effects of lurking and computer anxiety on explaining information privacy concern on social media platforms,” Computers in Human Behavior, Vol. 49, No. 1, pp. 324-332.
106. Ou, C. X., Pavlou, P. A. and Davison, R. M. (2014), “Swift Guanxi in online marketplaces: The role of computer-mediated communication technologies,” MIS Quarterly, Vol. 38, No. 1, pp. 209-230.
107. Paek, H. J., Hove, T., Jung, Y. and Cole, R. T. (2013), “Engagement across three social media platforms: An exploratory study of a cause-related PR campaign,” Public Relations Review, Vol. 39, No. 5, pp. 526-533.
108. Papacharissi, Z. and Rubin, A. M. (2000), “Predictors of Internet use,” Journal of Broadcasting & Electronic Media, Vol. 44, No. 2, pp. 175-196.
109. Park, M. and Park, J. (2009), “Exploring the influences of perceived interactivity on consumers’ E-shopping effectiveness,” Journal of Customer Behaviour, Vol. 8, No. 4, pp. 361-379.
110. Park, N., Jin, B. and Annie Jin, S. A. (2011), “Effects of self-disclosure on relational intimacy in Facebook,” Computers in Human Behavior, Vol. 27, No. 5, pp. 1974-1983.
111. Podsakoff, P. M., MacKenzie, S. B. and Lee, J. Y. (2003), “Common method biases in behavioral research: A critical review of the literature and recommended remedies,” Journal of Applied Psychology, Vol. 88, No. 5, pp. 579-903.
112. Podsakoff, P. M. and Organ, D. W. (1986), “Self-reports in organizational research: Problems and prospects,” Journal of Management, Vol. 12, No. 4, pp. 531-544.
113. Podsakoff, P. M., Todor, W. D., Grover, R. A. and Huber, V. L. (1984), “Situational moderators of leader reward and punishment behaviors: Fact or fiction,” Organizational Behavior and Human Performance, Vol. 34, No. 1, pp. 21-63.
114. Preece, J., Nonnecke, B. and Andrews, D. (2004), “The top five reasons for lurking: Improving community experiences for everyone,” Computers in Human Behavior, Vol. 20, No. 2, pp. 201-223.
115. Qiu, L., Lin, H., Leung, A. K. and Tov, W. (2012), “Putting their best foot forward: Emotional disclosure on Facebook,” Cyberpsychology, Behavior, and Social Networking, Vol. 15, No. 10, pp. 569-572.
116. Roldán, J. L., Sánchez-Franco, M. J. and Real, J. C. (2017), “From frequency of use to social integration: The mediation of routinization and infusion in Tuenti community,” European Research on Management and Business Economics, Vol. 23, No. 2, pp. 63-69.
117. Rosenblum, D. (2007), “What anyone can know: The privacy risks of social networking sites,” IEEE Security and Privacy, Vol. 5, No. 3, pp. 40-9.
118. Rozgonjuk, D., Ryan, T., Kuljus, J. K., Taht, K. and Scott, G. G. (2019), “Social comparison orientation mediates the relationship between neuroticism and passive Facebook use,” Cyberpsychology: Journal of Psychosocial Research on Cyberspace, Vol. 13, No. 1, Article 2.
119. Ruggeri, K., Garcia-Garzon, E., Maguire, Á., Matz, S. and Huppert, F. A. (2020), “Well-being is more than happiness and life satisfaction: A multidimensional analysis of 21 countries,” Health and Quality of Life Outcomes, Vol. 18, No. 1, pp. 1-16.
120. Samad, S., Nilashi, M. and Ibrahim, O. (2019), “The impact of social networking sites on students’ social wellbeing and academic performance,” Education and Information Technologies, Vol. 24, No. 3, pp. 2081-2094.
121. Segovia, J. (1989), “An empirical analysis of the dimensions of health status measures,” Social Science & Medicine, Vol. 29, No. 6, pp. 761-768.
122. Shao, G. (2009), “Understanding the appeal of user-generated media: A uses and gratification perspective,” Internet Research, Vol.19, No. 1, pp. 7-25.
123. Shaw, A. M., Timpano, K. R., Tran, T. B. and Joormann, J. (2015), “Correlates of Facebook usage patterns: The relationship between passive Facebook use, social anxiety symptoms, and brooding,” Computers in Human Behavior, Vol. 48, pp. 575-580.
124. Shin, D. H. (2013), “Defining sociability and social presence in social TV,” Computers in Human Behavior, Vol. 29, No. 3, pp. 939-947.
125. Short, J., Williams, E. and Christie, B. (1976), The Social Psychology of Telecommunications, John Wiley and Sons, Inc., New York, NY.
126. Sintonen, H. (1981), “An approach to measuring and valuing health states,” Social Science & Medicine. Part C: Medical Economics, Vol. 15, No. 2, pp. 55-65.
127. Sipior, J. C., Ward, B. T. and Rongione, N. M. (2009), “Consumer privacy expectations in a virtual environment: A framework for corporate risk assessment,” International Journal of Networking and Virtual Organisations, Vol. 6, No. 6, pp. 558-573.
128. Sledgianowski, D. and Kulviwat, S. (2009), “Using social network sites: The effects of playfulness, critical mass and trust in a hedonic context,” Journal of Computer Information Systems, Vol. 49, No. 4, pp. 74-83.
129. Smith, B. G. and Gallicano, T. D. (2015), “Terms of engagement: Analyzing public engagement with organizations through social media,” Computers in Human Behavior, Vol. 53, pp. 82-90.
130. Smith, H. J., Milberg, S. J. and Burke, S. J. (1996), “Information privacy: Measuring individuals’ concerns about organizational practices,” MIS Quarterly, Vol. 20, No. 2, pp. 167-196.
131. Sobel, M. E. (1982), “Asymptotic confidence intervals for indirect effects in structural equation models,” Sociological Methodology, Vol. 13, pp. 290-312.
132. Solis, B. (2011), Engage! The Complete Guide for Brands and Businesses to Build, Cultivate, and Measure Success in the New Web, John Wiley and Sons, Inc., Hoboken, NJ.
133. Song, J. H. and Zinkhan, G. M. (2008), “Determinants of perceived web site interactivity,” Journal of Marketing, Vol. 72, No. 2, pp. 99-113.
134. Sternberg, R. J. (1986), “A triangular theory of love,” Psychological Review, Vol. 93, No. 2, pp. 119-135.
135. Steuer, J. (1992), “Defining virtual reality: Dimensions, determining telepresence,” Journal of Communication, Vol. 42, No. 4, pp. 73-93.
136. Sun, N., Rau, P. P. L. and Ma, L. (2014), “Understanding lurkers in online communities: A literature review,” Computers in Human Behavior, Vol. 38, pp. 110-117.
137. Takahashi, K. (2005), “Toward a life span theory of close relationships: The affective relationships model,” Human Development, Vol. 48, No.1/2, pp. 48-66
138. Tang, T. and Cooper, R. (2011), “The first online Olympics: The interactions between Internet use and sports viewing,” Journal of Sports Media, Vol. 6, No. 1, pp. 1-22.
139. Teo, H. H., Oh, L. B., Liu, C. and Wei, K. K. (2003), “An empirical study of the effects of interactivity on web user attitude,” International Journal of Human-Computer Studies, Vol. 58, No. 3, pp. 281-305.
140. Tu, C. H. (2001), “How Chinese perceive social presence: An examination of interaction in online learning environment,” Educational Media International, Vol. 38, No. 1, pp. 45-60.
141. Tu, C. H. and McIsaac, M. (2002), “The relationship of social presence and interaction in online classes,” The American Journal of Distance Education, Vol. 16, No. 3, pp. 131-150.
142. van Noort, G., Voorveld, H. A. and van Reijmersdal, E. A. (2012), “Interactivity in brand web sites: Cognitive, affective, and behavioral responses explained by consumers’ online flow experience,” Journal of Interactive Marketing, Vol. 26, No. 4, pp. 223-234.
143. Verhagen, T., Swen, E., Feldberg, F. and Merikivi, J. (2015), “Benefitting from virtual customer environments: An empirical study of customer engagement,” Computers in Human Behavior, Vol. 48, pp. 340-357.
144. von Solms, R. (1999), “Information security management: Why standards are important,” Information Management & Computer Security, Vol. 7, No. 1, pp. 50-58.
145. Voorveld, H. A. M., Niejens, P. C. and Smit, E. G. (2011), “The relation between actual and perceived interactivity,” Journal of Advertising, Vol. 40, No. 2, pp. 77-92.
146. Wade, D. (2006), “Belief in rehabilitation, the hidden power for change, Chap 6,” In Halligan, P. and Aylward, M. (Eds.), The Power of Belief, Oxford University Press, Oxford.
147. Wirtz, J., Ambtman, A., den Bloemer, J., Horváth, C., Ramaseshan, B., Klundert, J., van de Canli, Z. G. and Kandampully, J. (2013), “Managing brands and customer engagement in online brand communities,” Journal of Service Management, Vol. 24, No. 3, pp. 223-244.
148. Xu, C., Ryan, S., Prybutok, V. and Wen, C. (2012), “It is not for fun: An examination of social network site usage,” Information & Management, Vol. 49, No. 5, pp. 210-217.
149. Xu, H., Dinev, T., Smith, H. J. and Hart, P. (2008), “Examining the formation of individual’s information privacy concerns: Toward an integrative view,” Proceedings of the 29th International Conference on Information Systems, Association for Information Systems, Paris, France.
150. Yang, S. U. and Kang, M. (2009), “Measuring blog engagement: Testing a four-dimensional scale,” Public Relations Review, Vol. 35, pp. 323-324.
151. Yuan, C. Y., Chih, W. H. and Huang, C. Y. (2016), “Download intention in the mobile application marketplace,” Issues in Information Systems, Vol. 17, No. 4, pp. 178 -186.
152. Zhao, L. and Lu, Y. (2012), “Enhancing perceived interactivity through network externalities: An empirical study on micro-blogging service satisfaction and continuance intention,” Decision Support Systems, Vol. 53, No. 4, pp. 825-834.
153. Zhao, S. (2003), “Toward a taxonomy of copresence,” Presence: Teleoperators and Virtual Environments, Vol. 12, No. 5, pp. 445-455.
154. Zimmer, J., Arsal, R. E., Al-Marzouq, M. and Grover, V. (2010), “Investigating online information disclosure: Effects of information relevance, trust and risk,” Information & Management, Vol. 47, No. 2, pp. 115-123.
(此全文20261027後開放外部瀏覽)
01.pdf
 
 
 
 
第一頁 上一頁 下一頁 最後一頁 top
* *