淡江大學覺生紀念圖書館 (TKU Library)
進階搜尋


下載電子全文限經由淡江IP使用) 
系統識別號 U0002-2307201218591800
中文論文名稱 從匿名到實名:描繪網路人際互動的新圖像
英文論文名稱 From anonymity to nominalism : Depicting new images of human interactions on the internet
校院名稱 淡江大學
系所名稱(中) 資訊傳播學系碩士班
系所名稱(英) Department of Information and Communication
學年度 100
學期 2
出版年 101
研究生中文姓名 黃培育
研究生英文姓名 Pei-Yu Huang
學號 697040029
學位類別 碩士
語文別 中文
口試日期 2012-06-13
論文頁數 145頁
口試委員 指導教授-劉慧娟
委員-王盈勛
委員-許傳陽
中文關鍵字 網路身分  隱藏性  匿名性  假名性  多名性  實名性  網路人際關係  網路人際互動 
英文關鍵字 Online-identity  Nonymity  Anonymity  Pseudonymity  Polynymity  Eponymity  Online-relationship  Online-Interactions 
學科別分類
中文摘要 本研究以Facebook為實名網路背景,旨在探討人們如何在實名制的網路環境進行人際互動與關係維持,並且瞭解網路人際關係在實名制與匿名制的環境會產生那些差異情況。資料蒐集方式以深度訪談為主,再結合參與觀察的資料進行比較分析,以了解匿名與實名網路互動情形的差異。
研究結果顯示:
一、 過半數的受訪者在實名網路環境選擇以真實身分與人進行人際互動,而各式各樣的實名互動功能則有助於網路身分的辨識。只是在實名網路環境也可能出現匿名網路身分,不過匿名網路身分會隨著在網路裡與人的互動,而使得匿名程度逐漸降低。
二、 當真實關係延伸至網路後,半數以上的受訪者仍希望進行相同的真實互動,而且實名環境能夠同時存在匿名與實名互動,並可能以個人自身的需求,混合重疊匿名和實名的網路人際關係,這也顯示匿名和實名網路人際關係不一定會根據網路環境的設定而有所區隔。
英文摘要 The research purpose is to analysis how people using online nominal identity to intercommunicate and interconnect with each other on FACBOOK as research real-name internet platform; in the meantime, the research aims to compare the results of the differences between online anonymous identity and nominal identity to maintain online relationship. In order to discover the discrepancy, frequently interviews were the mainly research resources and being observation to proceed analysis and compare needed data.
The research results show that more than 50% interviewees choose to interact with others by real name under real-name internet platform and it’s more effective and helpful to indentify others’ online identities under all kinds of eponymity interactive function. In the fact of that, the anonymous identities do exist in real-name internet environment; however, the degree of online anonymity is going down when people have more frequently interactions with others.
Moreover, more than 50% interviewees expect to maintain the same relationship as in the real world when the interactions to be extended into internet environment. Furthermore, the anonymous and real-name interacts are not only able to exist in real-name environment, but possible to mix and overlap the anonymous and real-name relationship according to their own demand. Above all, the online relationship of anonymous and real-name is possible correlative and unnecessarily separated in internet environment.
論文目次 第一章 緒論......................................... 1
第一節 研究背景與動機................................. 1
第二節 研究問題...................................... 4
第二章 文獻探討...................................... 7
第一節 網路人際關係匿名/實名的身份類型 .................. 8
第二節 網路人際互動.................................. 19
第三節 網路人際關係發展.............................. 36
第四節 小結........................................ 41
第三章 研究方法..................................... 45
第一節 研究設計..................................... 46
第二節 資料蒐集方法................................. 47
第三節 Facebook介紹 ............................... 50
第四章 網路環境的人際互動關係......................... 65
第一節 匿名性人際互動關係........................... 66
第二節 假名性人際互動關係............................. 76
第三節 多名性人際互動關係.............................. 82
第四節 實名性人際互動關係.............................. 89
第五章 討論......................................... 105
第一節 實名網路環境的網路人際互動....................... 106
第二節 匿名與實名網路環境的人際關係差異.................. 109
第三節 匿名與實名網路人際關係的移動..................... 113
第六章 結論........................................ 123
第一節 研究結果..................................... 123
第二節 研究限制與建議................................ 128
參考文獻 ………………………………………………………………………129
附錄一 Facebook人們訪談前問卷…………………………………………139
附錄二 Facebook人們訪談大綱……………………………………………143
附錄三 受訪者基本資料……………………………………………………144
圖目錄
圖 1 網路人際互動的沉浸狀態 39
圖 2 研究架構 43
圖 3 Facebook註冊頁面 51
圖 4 Facebook個人資料編輯頁面 52
圖 5 Fccebook首頁 54
圖 6 Facebook個人頁面 56
圖 7 Facebook訊息隱私設定 58
圖 8 Facebook自訂隱私設定 58
圖 9 台灣Facebook人們男女比例 60
圖 10 台灣Facebook人們年齡比例 61
圖 11 Facebook朋友連結的過程 62
圖 12 Facebook互動的方式 62
圖 13 實名網路環境人際互動示意一 108
圖 14 網路身分辨識示意 120
圖 15 實名網路環境人際互動示意二 121
參考文獻 一、 中文部份
Facebook以小遊戲找回失散的朋友(2009年6月1日)。數位時代。2010年11月23日,取自:http://www.bnext.com.tw/article/view/cid/0/id/10554
李蕙如(2009)。匿名性、訊息屬性對網路訊息傳遞意願之影響—以五大人格為干擾變數。靜宜大學國際企業學系碩士論文,未出版,台中市。
社會科學研究方法(9版)(李美華、孔祥明、李明寰、林嘉娟、王婷玉、李承宇等譯)(2005)。台北市:時英出版社。(原著出版年2004年)
陳向明(2008)。社會科學質的研究。台北市:五南。
孫昱涵(2009年9月7日)。【調查報告】Facebook的社群遊戲讓人潮變錢潮?動腦電子報。2010年11月23日,取自:http://www.brain.com.tw/news/RealNewsContent.aspx?ID=13062
陳俞霖(2002)。網路人際互動主要特色—網路化名(匿名)。網路社會學通訊期刊,21。2010年11月23日,取自:http://www.nhu.edu.tw/~society/e-j/21/21-19.htm
財團法人台灣網路資訊中心(TWNIC)(2011年7月1日)。台灣網際網路使用調查。2011年11月23日,取自:http://www.twnic.net.tw/download/200307/200307index.shtml
當代社會研究法:質化與量化途徑(王佳煌、潘中道、郭俊賢、黃瑋瑩、邱怡薇等譯)(2008)。台北市:學富文化。(原著出版年2000年)
楊潔茹(2008)。名譽權侵害之研究。中正大學法律所碩士論文,未出版,嘉義縣。
潘淑滿(2008)。質性研究:理論與應用。台北市:心理。
簡恆信(1998)。虛擬社群匿名行為模式研究---以網際網路電子布告欄為例。東吳大學社會系碩士論文,未出版,台北市。

二、 西文部份
Abdul-Rahman, A. & Hailes, S. (2000). Supporting trust in virtual communities. Proceedings of the 33rd Hawaii International Conference on System Sciences, 1-9, Maui, Hawaii, January 4–7, 2000.
Altheide, D. L. (2000). Identity and the definition of the situation in a mass-mediated context. Symbolic Interaction, 23(1), 1–27.
Amichai-Hamburger, Y. (Ed.). (2005). The social net: Understanding human behavior in cyberspace. Oxford, UK: Oxford University Press.
Amichai-Hamburger, Y. & McKenna, K. Y. A. (2006). The contact hypothesis reconsidered: Interacting via the Internet. Journal of Computer-Mediated Communication, 11(3), 825-843.
Aringhieri, R., Damiani, E., Vimercati, S. D. C. D., Paraboschi, S., & Samarati, P. (2006).Fuzzy techniques for trust and reputation management in anonymous peer-topeer systems. Journal of the American Society for Information Science and Technology, 57(4), 528–537
Azechi, S. (2005) Informational humidity model: explanation of dual modes of community for social intelligence design. AI & Society, 19:110–122
Bargh, J. A., McKenna, K. Y. A., & Fitzsimons, G. M. (2002). Can you see the real me? Activation and expression of the ‘‘true self” on the Internet. Journal of Social Issues, 58(1), 33–48.
Barnes, S. B.(2003). Computer-mediated Communication: Human-to-Human Communication Across the Internet. Boston: Allynand Bacon.
Baym, N. K. (2010). Personal connections in the digital age. Cambridge, UK: Polity Press.
Berki, E. & Jakala, M. (2009). Cyber-Identities and Social Life in Cyberspace . In Hatzipanagos, S. & Warburton, S.(Eds.), Handbook of Research on Social Software and Developing Community Ontologies, 27-39. Pennsylvania: IGI Global.
Bosma, H. A., Graafsma, T. L., Grotevant, H. D., & de Levita, D. J. (1994). Identity and Development: An Interdisciplinary Approach.(Sage Focus ed.), 172, 103-117.
boyd, d. (2007). Why youth ♥ social network sites: The role of networked publics in teenage social life. In D. Buckingham (Ed.) Youth, identity, and digital media (pp. 119–142). Cambridge: MIT Press.
Boyd, D. M., & Ellison, N. B. (2007). Social network sites: Definition, history, and scholarship. Journal of Computer-Mediated Communication, 13(1), 210-230.
Christopherson, K. M. (2007).The Positive and Negative Implications of Anonymity in Internet Social Interactions: On the Internet, Nobody Knows You’re a Dog. Computers in Human Behavior, 23(6), 3038-3056.
Douglas K, & McGarty, C. (2001) Identifiability and self-presentation: computer-mediated communication and intergroup interaction. British Journal of Social Psychology, 40(3), 399-416.
Ebner, W., Leimeister, J. M., & Krcmar, H. (2004). Trust in virtual healthcare communities: Design and implementation of trust-enabling functionalities. Proceedings of the 37th Hawaii International Conference on System Sciences, Big Island, Hawaii, January 5–8, 2004.
Ellison, N., Heino, R., & Gibbs, J. (2006). Managing impressions online: Self-presentation processes in the online dating environment. Journal of Computer-Mediated Communication, 11(2), 415-441.
Facebook(2012). Facebook timeline . Retrieved January 4, 2012, from:http://www.Facebook.com/press/info.php?timeline
Facebook(2012). Facebook statistics. Retrieved January 4, 2012, from: http://www.Facebook.com/press/info.php?statistics
Fisher, B. A. & Adams, K. L.(1994). Interpersonal communication: Pragmatics of human relationships. New York: McGraw-Hill.
Gibbs, J. L., Ellison, N. B., & Heino, R. D. (2006). Self-presentation in online personals: The role of anticipated future interaction, self-disclosure, and perceived success in Internet dating. Communication Research, 33(2),152–177.
Goffman, E. (1959). The presentation of self in everyday life. New York: Doubleday.
Goffman, E. (1963). Behavior in public places. New York: The Free Press.
Grijpink, J. H. A. M. & Prins, J. E. J. (2001). New Rules for Anonymous Electronic Transactions? An Exploration of the Private Law Implications of Digital Anonymity. Journal of Information, Law and Technology, 2. Retrieved November 23, 2010, from: http://www2.warwick.ac.uk/fac/soc/law/elj/jilt/2001_2/grijpink/
Gumpert, G. & Drucker, S. J. (1998). The demise of privacy in a private world: From front porches to chat rooms. Communication Theory, 8, 408–425.
Heino, R. D., Ellison, N. B., & Gibbs, J. L. (2010). Relationshopping: Investigating the market metaphor in online dating. Journal of Social and Personal Relationships, 27, 427–447.
Holmstrom, H. & Henfridsson, O.(2002). Customer role ambiguity in community management. Proceedings of the 35th Annual Hawaiian International Conference on System Sciences, Big Island, Hawaii, January 7-10, 2002.
Higgins, E. T. (1987). Self-discrepancy theory. Psychological Review, 94, 1120–1134.
Jakala, M. & Berki, E. (2004). Cyber-Identities and Social Life in Cyberspace. In Information Resources Management Association (Eds.), Virtual communities :concepts, methodologies, tools and applications, 13-25. USA: Information Resources Management Association.
Jakala, M. & Berki, E. (2004). Exploring the Principles of. Individual and Group Identity in Virtual Communities. 1st IADIS Conference on Web-based Communities, 19-26, Lisbon, Portugal, March 24-26, 2004..
Joinson, Adam N.(2003) Understanding the psychology of internet behavior: virtual worlds, real lives. Palgrave: Basingstoke.
Joinson, A., McKenna, K., Postmes, T., & Reips, U.-D. (Eds.). (2007). The Oxford handbook of Internet psychology. Oxford, UK: Oxford University Press.
Jones, Q. (1997) Virtual-Communities, Virtual-Settlements & Cyber-Archaeology: a theoretical outline. Journal of Computer Mediated Communication. 3(3). Retrieved November 23, 2010, from: http://jcmc.indiana.edu/vol3/issue3/jones.html
Katz, J. E., & Rice, R. E. (2002). Social consequences of Internet use: Access, involvement, and interaction. Cambridge: MIT Press.
Knapp, M. L.(1984). Interpersonal communication and human relationships. Boston: Allyn & Bacon.
Konijn, E. A., Utz, S., Tanis, M., & Barnes, S. B. (Eds.). (2008). Mediated interpersonal communication. New York: Routledge.
Lea, M., Spears, R., & de Groot, D. (2001) Knowing me, knowing you: anonymity effects on social identity processes within groups. Personality and Social Psychology Bulletin, 27(5), 526–357.
Leimeister, J. M., & Krcmar, H. (2005). Evaluation of a systematic design for a virtual patient community. Journal of Computer-Mediated Communication, 10(4). Retrieved November 23, 2010, from: http://jcmc.indiana.edu/vol10/issue4/leimeister.html
Li, L., Helenius, M., Berki, E. (2007). Phishing- Resistant information Systems-Security Handling with Misuse-Cases. The Proceedings of Berki, E., J., Nummenmaa, I. S., M. R., & Staples, G.(Eds.), Software Quality Management XV: Software Quality in the Knowledge Society, 389-404, UK: BSB(GB).
Marx, G. T. (1999). What's in a name? Some reflections on the sociology of anonymity. The Information Society, 15(2), 99-112.
Marx, G. T. (2001). Identity and anonymity: Some conceptual distinctions and issues for research. In Caplan, J. & Torpey, J.(Eds.), Documenting Individual Identity, 311-327. Princeton, NJ: Princeton University.
Maureen, W. (2006). [Name withheld]: Anonymity and its implications. Proceedings of the American Society for Information Science and Technology, 43(1), 1–11.
McKenna, K. Y. A., Green, A. S., & Gleason, M. E. J. (2002). Relationship formation on the Internet: What’s the big attraction? Journal of Social Issues, 58(1), 9–31.
Morio, H., & Buchholz, C., (2007) How anonymous are you online? Examining online social behaviors from a cross-cultural perspective. AI & Society, 23(2), 297-307.
Papacharissi, Z. (Ed.). (2010). A networked self: Identity, community and culture on social network sites. New York: Routledge.
Pedersen, D. M.(1979). Dimensions of privacy. Perceptual and Motor Skills, 48(3), 1291–1297.
Preece, J. (1999). Emphatic communities: Balancing emotional and factual communication. Interacting with Computers, 12(1), 63-77.
Preece, J. (2000). Online Communities: Designing Usability and Supporting Sociability. New York: John Wiley and Sons.
Preece, J., & Maloney-Krichmar, D. (2003). Online communities: Focussing on sociability and usability. In Jacko, J. & Sears, A.(Eds.), Handbook of Human-Computer Interaction, 596-620, Mahwah, NJ: Lawrence Earlbaum Associates Inc.
Qian, H., & Scott, C. R. (2007). Anonymity and self-disclosure on weblogs. Journal of Computer-Mediated Communication, 12(4),1428-1451.
Rabby, M. & Walther, J. B.(2002).Computer- Mediated Communication Effects on Relationship Formation and Maintenance. In Canary, D. & Dainton, M. (Eds.), Maintaining Relationships Through Communication: Relational, Contextual, and Cultural Variations, 141- 162, Mahwah, NJ: Lawrence Erlbaum Associates.
Rheingold, H. (1993). The Virtual Community. New York: HarperCollins.
Rheingold, H. (1995). The virtual community: Finding connection in a computerized world. London: Secker & Wargurg.
Rosenberg, M. (1986). Conceiving the self. Malabar. FL: Robert E. Krieger.
Rosenmann, A., & Safir, M. P. (2006). Forced online: Push factors of Internet sexuality: A preliminary study of online paraphilic empowerment. Journal of Homosexuality, 51(3), 71–92.
Shiue, Y.C., Chiu, C.M., & Chang, C.C.(2010). Exploring and Mitigating Social Loafing in Online Communities. Computers in Human Behavior, 26(4),768-777.
Shneiderman, B. (2000) Designing trust into online experiences. Communications of the ACM, 43 (12), 57-59.
Socialbakers (2012). Taiwan Facebook Statistics, Penetration, Demography. Retrieved January 4, 2012, from: http://www.socialbakers.com/facebook-statistics/taiwan
Stone, G. (1981). Appearance and the self: A slightly revised version. In G. Stone & H. A. Farberman (Eds.), Social psychology through symbolic interaction (2nd ed.),187–20, New York: John Wiley and Sons.
Suler, J. R. (2002). Identity management in cyberspace. Journal of Applied Psychoanalytic Studies, 4(4), 455–459.
Surratt, C. G. (1998). Netlife: Internet citizens and their communities. New York: Nova Science.
Turkle S (1995). Life on the screen: identity in the age of the internet. New York: Simon & Schuster.
Turkle, S. (1995). Life on the screen: Identity in the age of the Internet. New York: Simon & Schuster.
Universal McCann(October 17, 2010). Social media tracker – 2010 wave5 The Socialisation of Brands. Retrieved November 23, 2010, from: http://www.umww.com/global/knowledge/download?id=1791&hash=F1C9F17E9E5CB4A2681D744A9AD018B3413C00BFad20708460e44685b4e8a7cb5612c496&fileName=Wave%205%20-%20The%20Socialisation%20Of%20Brands.pdf
Uwe, M. (2009). Quality of information in academic e-mailing lists. Journal of the American Society for Information Science and Technology, 60(9), 1–12.
Walker, K. (2000). ‘‘It’s difficult to hide it”: The presentation of self on Internet home pages. Qualitative Sociology, 23(1), 99–120.
Walther, J. B. (1994). Anticipated ongoing interaction versus channel effects on relational communication in computer-mediated interaction. Human Communication Research, 20(4), 473-501.
Walther, J. B. (2006). Nonverbal dynamics in computer-mediated communication, or: (and the net: ('s with you,:) and you:) alone. In Manusov, V. & Patterson, M. L. (Eds.), The Sage handbook of nonverbal communication, 461–479, Thousand Oaks, CA: Sage.
Walther, J. B.(2008). Personal Communication by CMC. In Donsbach, W. (Ed.), The international encyclopedia of communication, 8, 3564-3570, Oxford, UK: Blackwell Publishing.
Walther, J. B. (2011). Theories of computer-mediated communication and interpersonal relations. In M. L. Knapp & J. A. Daly (Eds.), The handbook of interpersonal communication (4th ed., pp. 443-479). Thousand Oaks, CA: Sage.
Walther, J. B., & Burgoon, J. K. (1992). Relational communication in computer-mediated interaction. Human Communication Research, 19(1), 50-88.
Walther, J. B.,& Parks, M. R.(2002).Cues Filtered Out, Cues Filter In: Computer-Mediated Communication and Relationships. In Knapp, M. L. & Daly, J. A.(Eds.), Handbook of Interpersonal Communication(3rd ed.), 529-563. Thousand Oaks, LA: Sage.
Webster, J., Trevino, L.K., & Ryan, L.(1993). The dimensionality and correlates of flow in human-computer interactions. Computers in Human Behavior, 9(4), 411-426.
Wellman, B. (2001). Computer networks as social networks. Science, 293(5537), 2031–2034.
Whitty, M., & Carr, A. (2006). Cyberspace romance: The psychology of online relationships. New York: Palgrave MacMillan.
Wright, K. B., & Webb, L. M. (Eds.). (2011). Computer-mediated communication in personal relationships. New York: Peter Lang.
Yurchisin, J., Watchravesringkan, K., & McCabe, D. B. (2005). An exploration of identity re-creation in the context of Internet dating. Social Behavior and Personality, 33(8), 735–750.
Zhao, S. (2006). Cyber-gathering places and online-embedded relationships. In Paper presented at the annual meetings of the eastern sociological society, Boston: Eastern Sociological Society.
Zhao, S., Grasmuck, S., & Martin, J.(2008). Identity construction on Facebook: Digital empowerment in anchored relationships. Computers in Human Behavior,24(5), 1816–1836.
論文使用權限
  • 同意紙本無償授權給館內讀者為學術之目的重製使用,於2012-07-24公開。
  • 同意授權瀏覽/列印電子全文服務,於2012-07-24起公開。


  • 若您有任何疑問,請與我們聯絡!
    圖書館: 請來電 (02)2621-5656 轉 2281 或 來信