§ 瀏覽學位論文書目資料
  
系統識別號 U0002-2107201422423100
DOI 10.6846/TKU.2014.00839
論文名稱(中文) 以自我揭露角度探究Facebook個人隱私劃界
論文名稱(英文) Exploring personal privacy boundaries in Facebook : The perspective of self-disclosure
第三語言論文名稱
校院名稱 淡江大學
系所名稱(中文) 資訊傳播學系碩士班
系所名稱(英文) Department of Information and Communication
外國學位學校名稱
外國學位學院名稱
外國學位研究所名稱
學年度 102
學期 2
出版年 103
研究生(中文) 楊馥綺
研究生(英文) Fu-Chi Yang
學號 699040175
學位類別 碩士
語言別 繁體中文
第二語言別
口試日期 2014-06-18
論文頁數 145頁
口試委員 指導教授 - 劉慧娟
委員 - 王盈勛
委員 - 許傳陽
關鍵字(中) 自我揭露
隱私
Facebook
網路人際互動
自我展演
關鍵字(英) Self-disclosure
Privacy
Facebook
Online Interaction
Self-performance
第三語言關鍵字
學科別分類
中文摘要
本研究旨在探討使用者如何在Facebook中自我揭露並控管揭露的個人資訊,進而瞭解相較於現實環境,使用者在Facebook中互動時的個人隱私認知和維護的情況。資料蒐集方式以焦點團體訪談為主,再結合參與觀察的資料進行比較分析,以釐清使用者在Facebook互動時的自我揭露和個人隱私劃界情形。

研究結果顯示:

一、Facebook串聯離線與線上生活,過半數的受訪者將Facebook視為另一個展現自我的舞台,並將離線生活的隱私態度和認知延伸至Facebook。Facebook的隱私設定看似可讓使用者掌控個人資訊,但繁雜且不斷變更的隱私政策導致使用者只能改變使用習慣,在揭露個人資訊前依照不同目的、對象不斷調整個人隱私的界線。

二、當真實生活延伸至Facebook後,半數以上的受訪者為求持續在Facebook與人互動,經常對個人隱私產生妥協與退讓,不過部分受訪者只揭露對個人隱私影響層面和利害關係最小的個人資訊,這顯示使用者在個人隱私的維護上不因線上與離線而有所區隔,而是根據使用需求和動機衍生出不同的隱私維護機制。
英文摘要
The purpose of research is to explore how users disclose and control their personal information on Facebook and further investigates users’ personal privacy cognition and maintenance to compare with their real life. Data collection methods mainly include focus group interviews and participant observation.

Research results are two-fold:

1.By regarding Facebook as a showing stage, users extend their privacy attitudes and cognitions to Facebook and play a similar part of themselves in reality. Owing to the imperfect of Facebook privacy settings, users change their using habits and adjust the boundaries of personal privacy based on different purposes and people.
2.In order to interact with realistic friends on Facebook, users would compromise between their privacy cognition and using situation. Users’ privacy cognition and maintenance are constructed of their usage needs and motivations but not based on online or offline.
第三語言摘要
論文目次
目錄
第一章 緒論......................................1
第一節 研究背景與動機..............................1
第二節 研究問題...................................5

第二章 文獻探討...................................7
第一節 隱私的起源與定義............................8
第二節 人際互動:線上與離線的串連....................15
第三節 自我揭露...................................28
第四節 小結......................................38

第三章 研究方法..................................41
第一節 研究設計..................................41
第二節 資料蒐集方法	..............................42

第四章 Facebook................................47
第一節 Facebook的媒介特性........................47
第二節 Facebook背景與界面介紹.....................49
第三節 Facebook隱私爭議..........................78

第五章 資料呈現與綜合分析討論	......................83
第一節 使用者與使用者的隱私劃界.....................84
第二節 使用者與系統的隱私劃界	......................105
第三節 綜合分析與討論.............................117

第六章 結論.....................................123
第一節 研究結果..................................123
第二節 研究限制與建議..............................128

參考文獻.........................................131
中文部分.........................................131
英文部分.........................................133

附錄.............................................140
附錄一【訪談前問卷】................................140
附錄二 【受訪者基本資料與場次安排清單】................142
附錄三 【焦點團體受訪者訪談大綱】.....................144

圖1 隱私四層面........................................9
圖 2 使用者對使用者的互動方式...........................23
圖 3 使用者對文本的互動方式.............................25
圖 4 使用者對系統的互動方式.............................27
圖 5 社會滲透模式.....................................34
圖 6 研究設計圖.......................................42
圖 7 Facebook台灣用戶男女比例..........................51
圖 8 Facebook台灣用戶年齡比例..........................52
圖 9 Facebook註冊頁面................................55
圖 10 Facebook好友搜尋...............................56
圖 11 Facebook個人資料編輯頁面分享區塊設定...............57
圖 12 Facebook個人資料編輯頁面.........................58
圖 13 Facebook個人資料編輯頁面細項分享對象選擇............59
圖 14 Facebook個人資料頁面朋友編輯與分享對象設定...........59
圖 15 Facebook個人資料頁面相片設定.......................60
圖 16 Facebook個人資料頁面地標設定.......................61
圖 17 Facebook個人資料頁面說讚的內容設定..................62
圖 18 Facebook首頁....................................64
圖 19 Facebook最新動態內容呈現..........................65
圖 20 Facebook個人頁面.................................68
圖 21 Facebook分享對象快速套用隱私設定.....................71
圖 22 Facebook自訂對象隱私設定............................72
圖 23 Facebook隱私設定介面與捷徑..........................73

表 1基本隱私設定與工具功能.................................74
表 2動態時報與標籤設定功能.................................76
表 3管理封鎖功能.........................................77
表 4 Facebook個人隱私爭議事件列表.........................78
參考文獻
中文部分
徐江敏、李姚軍譯(1992)。《日常生活中的自我表演》,台北:桂冠。(原書:Erving Goffman〔1959〕.The presentation of self in everyday life, NY: Anchor Books)。
徐毓良(2013)。〈連結與發現:那些Facebook告訴我們的事〉。資策會創研所。線上檢索日期:2014年4月30日,取自http://www.slideshare.net/iamwilliam/facebook-25635514。
張安君(2012)。〈隱私問題多,社群網站受重視〉。電子商務時報。線上檢索日期:2012年9月9日,取自http://www.ectimes.org.tw/Shownews.aspx?id=120227064319。
許凱玲(2011)。〈Facebook:賽門鐵克多慮了,我們沒有洩漏用戶個資給第三方〉。數位時代。線上檢索日期:2011年5月12日,取自
許凱玲(2012)。〈社群服務Path執行長:真的做錯了!已將全數個人通訊錄刪除〉。數位時代。線上檢索日期:2012年9月9日,取自http://www.bnext.com.tw/article/view/cid/0/id/22024。
許慈雅(2010)。〈社交網站與組織內人際網路之關聯性研究,以Facebook為例〉。國立政治大學傳播學院碩士在職專班碩士論文。
陳向明(2002)。《社會科學質的研究》。台北:五南。
陳佳靖(2003),〈網路空間. 人際關係_線上線下. 生活世界〉,《資訊社會研究》,4:114-179。
黃厚銘(2001),〈虛擬社區中的身分認同與信任〉,國立台灣大學社會學研究所博士論文。
黃國蓉(2014)。〈台灣人黏臉書 全球No.1。經濟日報〉。線上檢索日期:2014年4月20日。網址:http://mag.udn.com/mag/digital/storypage.jsp?f_ART_ID=501377#ixzz2zokkRC00。
黃瀚諄(2002)。〈使用網際網路而產生的線上與線下行為之探討〉。網路與社會研討會論文。線上檢索日期:2014年4月30日。取自http://mozilla.hss.nthu.edu.tw/iscenter/conference2002/。
楊牧貞、黃光國(1980)。〈自我揭露的楔行模式及其相關變項〉。《中華心理學刊》,26(1),51-70。
詹文凱(1999),〈隱私權研究〉,國立台灣大學法律研究所博士論文。
電子商務時報(2012)。〈追蹤廣告惹爭議Facebook又陷隱私風暴〉。上網日期:2012年9年26日,取自http://www.ectimes.org.tw/Shownews.aspx?id=120925210011。
電子商務時報(2012)。〈隱私問題多 社群網站受重視〉。上網日期:2012年2月,取自http://www.ectimes.org.tw/Shownews.aspx?id=120227064319。
廖鐿鈤(2001),〈虛擬社區凝聚力的初探〉,《資訊社會研究》,1:57-83。
劉靜怡(2012),〈社群網路時代的隱私困境:以facebook為討論對象〉,台大法學論叢,41(1),取自http://www.lawbank.com.tw/treatise/pl_article.aspx?AID=P000213005。
劉靜怡譯(2002)。《網路自由與法律》。台北:商周。(原書:Lessig, Lawrence〔1999〕. Code and other laws of cyberspace, N Y: Basic Books)。
數位時代(2012)。〈2013年台灣100大網站揭曉 Facebook連續三年奪冠、社群類進榜最多、線上娛樂類黏度驚人!〉。上網日期:2013年10月26日,取自http://www.bnext.com.tw/article/view/id/26755。
潘淑滿(2003)。《質性研究:理論與應用》。台北:心理。
蔣索、鄒泓、胡茜(2008)。〈國外自我表露研究述評〉。《心理科學進展》,(1)114-124。
鄭緯筌(2014)。〈Facebook公布2014年第一季財報,營收達25億美元〉。數位時代。線上檢索日期:2014年4月30日,取自
聯合報(2011)。〈按讚登出仍遭追蹤臉書挨告,隱私洩漏你知道嗎?〉。上網日期:2011年10月3日,取自http://blog.xuite.net/echohr/papersharing/56693838。
臉書帳號被盜 五分鐘奪回主權(2012)。東森新聞。上網日期:2012年10月13日,取自https://tw.news.yahoo.com/%E8%87%89%E6%9B%B8%E5%B8%B3%E8%99%9F%E8%A2%AB%E7%9B%9C-%E4%BA%94%E5%88%86%E9%90%98%E5%A5%AA%E5%9B%9E%E4%B8%BB%E6%AC%8A-015838460.html。
謝啟芳、瞿菊農譯(2000)。《洛克政府論次講》。台北:唐山。 (原書:John Locke〔1689〕. Two Treatises of Government, LonDon , U K: Awnsham Churchill)。

英文部分
Acquisti, A. & Gross, R. (2006). Imagined communities: awareness, information sharing, and privacy on the facebook. In Golle, P. & Danezis, G. (Eds.), Proceedings of 6th International Workshop on Privacy Enhancing Technologies., Lecture Notes in Computer Science, 4258, (pp.36-58) .

Adler, R. B., & Towne, N. (2002). Looking out looking in. Singapore, Thomson.
Altman, I. (1975). The environment and social behavior: Privacy, personal space, territory, crowding. Monterey, Brooks/Cole Pub. Co.
Altman, I. (1977). Privacy regulation: Culturally universal or culturally specific?. Journal of Social Issue, 33(3): 66-84.
Altman, I., & Taylor, D. (1973). Social penetration: The development of interpersonal relationship. Oxford, UK: Holt, Rinehart & Winston.
Berger, C. & Calabrese, R. (1975). Some explorations in initial interaction and beyond: Toward a developmental theory of interpersonal communication. Human Communication Research, 1(2): 99-112.
Billy G. (2013, June. 21). Facebook Security Bug Exposed Personal Account Information, Emails And Phone Numbers, Six Million Accounts Affected. Tech Crunch. (Accessed Sep 16, 2013): http://techcrunch.com/2013/06/21/facebook-security-bug-exposed-personal-account-information-emails-and-phone-numbers-six-million-accounts-affected/.
boyd, d. & Donath, J. (2004). Public displays of connection, BT Technology Journal, 22 (4).
boyd, d. & Ellison, B.(2008). Social Network Sites: Definition, History and Scholarship. Journal of Computer-Mediated Communication, 13(1), 210-230.
boyd, d. ( 2007). Why Youth ♥ Social Network Sites: The role ofnNetworked publics in teenage social life. In Buckingham D. (Ed.) Youth, Identity, and Digital Media(PP. 119-142). Cambridge, MA: MIT Press.
Burgoon, J. K., Buller, D. B., Floyd, K., Grandpre, J. (1996). Deceptive Realities: Sender, Receiver, and Observer Perspectives in Deceptive Conversations. Communication Research, 23(6): 724-748.
Charlie S, Edward W & Peter B. (2013, June. 6). U.S. Confirms That It Gathers Online Data Overseas. The New York Times. (Accessed Jan 16, 2014): http://www.nytimes.com/2013/06/07/us/nsa-verizon-calls.html?_r=1&.
Collins, N., & Miller, L. (1994). Self-disclosure and liking: A meta-analytic review.
Cozby, P. C. (1973) Self-disclosure: A literature review. Psychological Bulletin, 79(2), 73-91.

Derlega, V. J., Margulis, S. T., Metts S., & Petronio, S. (1993).Self-Disclosure. Newbury Park CA: Sage
Derlega, V., Winstead, B., Wong, P., & Greenspan, M. (1987). Self-disclosure and
DeVito, J. A. (2003). Human Communication: The basic course (9th ed.).Boston U.S.: Allyn & Bacon.
Dey, A. (2013,June). Facebook Introduces Hashtags to its Users . TechStake-Technology News Blog. (Accessed Apr 3,2014): http://www.techstake.org/2013/06/facebook-introduces-hashtags-to-its-users.html.
Donath, J. (2007). Signals in Social Supernets. Journal of Computer-Mediated Communication 13(1): 231-251.

Donigian, J. & Malnati, R. (1997). Systemic group therapy: A triadic model. N Y,:Brooks/Cole.
Ellison, B., Steinfield, C., Lampe, C. (2007). The Benefits of Facebook Friends: Social Capital and College Students Use of Online Social Network Sites. Journal of Computer-Mediated Communication, 12(4) : 1143–1168.
Elshtain, J. (1993). Public man, Private woman: Women in social and political thought. Oxford: Martin Robertson; 2nd edn with afterword, Princeton, NJ: Princeton University Press.
Festinger, L.(1954). A theory of social comparison processes. Human relations, 7(2): 117-140.
Fletcher-Tomenius, L., & Vossler, A. (2009). Trust in online therapeutic relationships:
Frederic L. (2013, June. 6). Google, Facebook, Dropbox, Yahoo, Microsoft And Apple Deny Participation In NSA PRISM Surveillance Program. Tech Crunch. (Accessed Sep 16, 2013): http://techcrunch.com/2013/06/06/google-facebook-apple-deny-participation-in-nsa-prism-program/. 
Goffman, E. (1959). The presentation of self in everyday life. Harmondsworth, UK: Penguin.
Google (2011). Facebook deletes 20, 000 underage profiles daily. IBN Live. (Accessed March 3, 2014): http://ibnlive.in.com/news/facebook-deletes-20000-underage-profiles-daily/146972-11.html
Gross, Ralph & Alessandro A. (2005).Information revelation and privacy in online social networks.71-80 in Proceedings of the 2005 ACM workshop on Privacy in the electronic society. Alexandria, VA, US: ACM (Accessed Oct 27, 2009): http://portal.acm.org/citation.cfm?id=1102199.1102214.
Hall, E. (1966). The Hidden Dimension. N Y: Anchor Books, A Division of Random House, INC.
Hann I.H., Hui, K.L., Lee, SYT., Png, I.P.L. (2002). Online Information Privacy: Measuring the Cost-Benefit Trade-Off., Twenty-Third International Conference on Information Systems.
Homans, G (1958). Social behavior as exchange. The American Journal of Sociology, 62: 597-606.
Inness, J. (1992). Privacy, Intimacy, and Isolation. Oxford, U.K.: Oxford University Press.
Jacobs, R. S., Hyman, M. R., & McQuitty, S. (2000). Exchange-specific self-disclosure, social self-disclosure, and personal selling. Journal of Marketing Theory And Practice, 48-62.
Joinson, A. N. (1999). Social desirability, anonymity and internet-based questionnaires. Behavior Research Methods, Instruments and Computers, 31(3), 433-438.
Jourard, S. M. (1971). Self-disclosure: An experimental analysis of the transparent self. N Y: Wiley-Interscience.
Julie E. (2010). The Inverse Relationship between Secrecy and Privacy. Social Research 77(3) : 883-898。
Justin L (2013, Dec. 13). UPDATED: Facebook Gives Users More Privacy Options. AllFacebook. 2014, Apr, 20: http://allfacebook.com/facebook-gives-users-more-privacy-options_b106633.
Kevin, L., Jason, K. & Nicholas, C. (2008).The Taste for Privacy: An Analysis of College Student Privacy Settings in an Online Social Network. Journal of Computer-Mediated Communication, 14(1): 79-100.
Kim, K.H. & Yun, H. (2008). Cying for Me, Cying for Us: Relational Dialectics in a Korean Social Network Site. Journal of Computer-Mediated Communication, 13: 298-318.
Konovitz, R.(1966). Privacy and the law: A philosophical prelude. Law and Contemporary Problems, 31: 272.
Krasnova, H., Spiekermann, S., Koroleva, K., & Hildebrand, T. (2010). Online social networks: why we disclose. Journal of Information Technology, 25(2), 109-125.
Lampe, C., Nicole E. & Charles S. (2006). A face(book) in the crowd: social Searching vs. social browsing(pp. 167-170). In Proceedings of the 2006 20th anniversary conference on Computer supported cooperative work. Banff, Alberta, Canada: ACM. ( Accessed June 13, 2012) http://portal.acm.org/citation.cfm?id=1180901.
Lange, P. G. (2007). Publicly private and privately public: Social networking on YouTube. Journal of Computer-Mediated Communication.13: 361.
Liu, H. (1996). Privacy-implicated system design in the virtual marketplace. Dotoral Dissertation, The Ohio State University.
Palen, L., Dourish, P., (2003). Unpacking privacy for a networked world. Paper: Privacy and Trust, 5(1): 129-136.
Papacharissi, Z.Z. (2010). Privacy as a luxury commodity.First Monday, 15(8). (Accessed March 12, 2013): http://firstmonday.org/ojs/index.php/fm/article/view/3075/2581.
Park, N., Jin, B., & Jin, S.A. (2011). Effects of self-disclosure on relational intimacy in Facebook. Computers in Human Behavior, 27(5), 1974-1983.
Pearce, W. B., & Cronen, V. E. (1980). Communication ‘action’ and meaning: The creation of social realities. (pp. 273–283). N Y: Praeger.
Ploderer, B., Howard, S. and Thomas, P. (2008): Being online, living offline: The influence of social ties over the appropriation of social network sites. In Begole, B. & McDonald,D. (Eds): Proceedings of the Conference on Computer Supported Cooperative Work (CSCW 2008), San Diego, CA, November 8-12, 2008. N Y: ACM Press, 333-342.
Rafaeli, S. (1988). Interactivity: from new media to communication, In Sage Annual Review of Communication Research: Advancing Communication Science, 16, Hawkins, R. P., Wiemann, J. M., Pingree, S. (Eds), (pp.110-134). Beverly Hills , CA : Sage.
Rafaeli, S. & Sudweeks, F. (1988). Networked Interactivity. Journal of Computer-Mediated Communication. 2(4). 
Regan, K. (2003, February, 1). Online Privacy Is Dead –What Now?. E-Commerce Times, (Accessed April 8, 2011): http://www.ecommercetimes.com/story/20346.html.
Robertson, A. (2013, Sep, 17). Facebook users have uploaded a quarter-trillion photos since the site's launch. The verge, (Accessed March 3, 2014): http://www.theverge.com/2013/9/17/4741332/facebook-users-have-uploaded-a-quarter-trillion-photos-since-launch.
Sally J. (2006). Exploring models of interactivity from multiple research traditions: users, Documents and Systems. In Lievrouw, L. & Livingstone, S. (Eds). Handbook of new Media: social shaping and social consequences of ICTs, updated utudent edition(pp.205-229). London, UK: SAGE Publications Ltd.
Samarajiva, R. (1994). Privacy in electronic public space: Emerging issues. Canadian Journal of Communication, 19(1), 87-99.
Schneier, B. (2006, May, 19). The Value of Privacy. Schneier on Security, 2012, July, 10: https://www.schneier.com/blog/archives/2006/05/the_value_of_pr.html.
Schutz, E. (1958). Energetik des Herzens. Physiologie des Herzens. (pp.36-58). Berlin Heidelberg : Springer-Verlag.
Shin, D.H., (2010). The effects of trust, security and privacy in social networking: A security-basedapproach to understand the pattern of adoption. Interacting with Computers, 22(5), 428-438.
Smith. A. (2014, Feb, 3). 6 new facts about Facebook. factank news in the number. (Accessed March 10, 2014): http://www.pewresearch.org/fact-tank/2014/02/03/6-new-facts-about-facebook/.
Stone, E. F., Gueutal, H. G., Gardner, D. G., McClure, S. (1983). A field experiment comparing information-privacy values, beliefs, and attitudes across several types of organizations. Journal of Applied Psychology, 68(3), 459-468.
Thibaut, J., & Kelly, H. (1959).The social psychology of groups. N Y: Wiley.
Tsukayama, H. (2013, Jan. 15). Facebook introduces social search feature. The Washington Post. (Accessed Apr 3, 2014): http://www.washingtonpost.com/business/technology/facebook-introduces-social-search-feature/2013/01/15/599c6f7e-5f3d-11e2-9940-6fc488f3fecd_story.html?.
Turow, J., & Hennessy, M. (2007). Internet privacy and institutional trust: Insights from a national survey. New Media & Society, 9(2): 300-318.
Vinogradov, S. & Yalom, I. P. (1990). Self-disclosure in group psychotherapy. In Self-Disclosure in the Therapeutic Relationship(pp.191-204). Stricker, G. & Fisher, M. (Eds), N Y:Springer-Verlag US.

Walther, J. B. (1992). Interpersonal effects in computer-mediated interaction: A relational perspective. Communication Research, 19, 52-90.

Walther, J. B. (1996). Computer-mediated communication: Impersonal, interpersonal, and hyper personal interaction. Communication Research, 23, 1-43.
Warren, S. & Brandeis, L. (1890). The Right to Privacy, Harvard Law Review, 4(193), 193-220.
Watzlawick, P., Beavin, J., Jackson, D. (1967). Pragmatics of human communication: A study of interactional patterns, pathologies, and paradoxes. N Y: W. W. Norton & Company, Inc.
Westin, A. (1967). Privacy and Freedom, 7. N Y Atheneum.
Yurchisin, J., Watchravesringkan, K., Mccabe, B. D. (2005). An exploration of identity re-creation in the context of internet dating. Social Behavior and Personality: an international journal, 33(8): 735-750.
Zhao, S., Grasmuck, S., Martin,J. (2008). Identity construction on Facebook: Digital empowerment in anchored relationships. Computers in Human Behavior 24(5): 1816-1836.
論文全文使用權限
校內
校內紙本論文立即公開
同意電子論文全文授權校園內公開
校內電子論文立即公開
校外
同意授權
校外電子論文立即公開

如有問題,歡迎洽詢!
圖書館數位資訊組 (02)2621-5656 轉 2487 或 來信