簡易檢索 / 詳目顯示

研究生: 林欣潔
Hsin-Chieh Lin
論文名稱: 數位監控系統在校園之接受度研究
A study on the acceptance of applying video surveillance system on campus
指導教授: 欒斌
Pin Luarn
口試委員: 盧希鵬
none
詹前隆
none
學位類別: 碩士
Master
系所名稱: 管理學院 - 管理學院MBA
School of Management International (MBA)
論文出版年: 2008
畢業學年度: 96
語文別: 中文
論文頁數: 60
中文關鍵詞: 數位監控系統隱私侵犯分解式計畫行為理論
外文關鍵詞: Video surveillance system, Privacy invasion, Decomposed Theory of Planned Behavior
相關次數: 點閱:276下載:0
分享至:
查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報
  • 近年來,由於911事件發生,全球安全議題隨之加溫,數位監控系統之應用範圍也日益越來越廣。本研究以認知監控系統模型作為研究架構之基礎,並結合分解式計畫行為理論之主觀規範變數;擬探討使用者在校園採用數位監控系統之影響因素。研究結果發現,使用意願會正向受到態度、有用性認知與主觀規範影響;主觀規範會正向受到主管影響及同儕影響;態度會正向受到有用性認知與公平感影響;隱私侵犯會負向影響公平感、有用性認知及態度。


    This study examined the acceptance of applying video surveillance system on campus. We combined awareness system acceptance model with measured variables, subjective norm, in decomposed theory of planned behavior as our theoretical basis.
    Results found that attitudes, usefulness and subjective norm have positive influence for the intention to use. The subjective norm is affected by the opinions from supervisors and peers. Fairness and usefulness will increase the attitudes to use. In addition, Privacy invasion has negative impacts on fairness, usefulness and attitudes.

    中文摘要I AbstractII 目錄III 圖目錄IV 表目錄IV 第一章緒論1 第一節研究動機2 第二節 研究目的3 第三節研究流程4 第四節論文架構6 第二章 文獻探討7 第一節 數位監控系統7 第二節 隱私權理論10 第三節 電子績效監控系統文獻13 第四節 認知監控系統模型15 第五節 分解式計畫行為理論18 第六節 本章小結19 第三章 研究方法20 第一節 研究模型20 第二節 研究假說24 第三節 研究變數的定義與衡量25 第四節 研究設計與研究工具29 第五節 資料分析方法31 第四章分析結果32 第一節 樣本基本資料分析32 第二節 信效度分析35 第三節 迴歸分析36 第四節 檢驗模型42 第五章 結論與建議46 第一節 研究結論46 第二節 研究貢獻49 第三節管理意涵51 第四節研究範圍與限制52 第五節 後續研究建議53 參考文獻54 附錄一57

    一、中文部份
    1.黃俊英 (1999),『行銷研究-管理與技術』,第六版,華泰書局
    2.林清河、吳萬益(2000),『企業研究方法』,第二版,華泰書局
    3.林俊名(民91)。電子監控系統對員工隱私侵犯與程序公平感認知之影響。國立中央大學資訊管理系碩士論文。
    4.王淑娟(民91)。資訊系統採用行為之研究-以某大學資訊系統為例。國立雲林科技大學資訊管理研究所碩士論文
    5.邱惠雯(民91)網際網路使用行為之限制─從隱私權保護觀之探討。國立中正大學/犯罪防治研究所
    6.DIGITIMES 2007/4/20報導-林宗輝:數位監控的新時代
    7.聯合報2007/7/20報導-錢震宇:北市15億裝新監視器 「比貓纜還貴」
    8.新電子 2005 年 11 月號 236 期報導-王智弘:數位監控市場競爭更趨白熱化,創造產品差異性成致勝關鍵
    9.國際邊緣網站-隱私專題報導:http://intermargins.net/Forum/2001%20July-Dec/privacy/privacy_index.htm
    10.聯合報2003/12/18報導編譯-王麗娟:處處監視器 英國堪稱「老大哥」之最
    11.蘋果日報2003/01/23報導:英人一天被側錄三百次

    二、英文部份
    1.Alge, B. J., & Ballinger, G. (2001). Electronic Workplace Surveillance: The Effects of Advanced Notice and Task Discretion on Perceptions of Privacy and Procedural Justice. Paper presented at the 16thAnnual Conference of the Society of Industrial and Organizational Psychology, San Diego, CA.
    2.Altman, I., 1975. The Environment and Social Behaviour Privacy, Personal space, Territory, Crowding. Cole Publish-ing Company, Monterey, CA.
    3.Ambrose, M. L., & Alder, G. S. (2000). Designing, implementing, and utilizing computerized performance monitoring: enhancing organizational justice. Research in personnel and human resource management, 18, 187–219.
    4.Bies, R. J. (1993). Privacy and procedural justice in organizations. Social Justice Research, 6, 69–86.
    5.Burgoon, J., 1982. Privacy and communication. Communication Yearbook 6, 206–249.
    6.Cropanzano, R., & Greenberg, J. (1997). Progress in organizational justice: iunneling through the maze. In C. L. Cooper, & I. T. Robertson (Eds.), International review of industrial and organizational psychology (Vol. 12, pp. 317–372). London: Wiley.
    7.Curtin, L., 1981. Privacy: belonging to oneself. Perspectives in Psychiatry Care 19 (3–4), 112–115.
    8.Davis, F. D., Bagozzi, R. P., & Warshaw, P. (1989). User acceptance of computer technology. Management Science, 35, 982–1003.
    9.Eddy, E. R., Stone, D. L., & Stone-Romero, E. F. (1999). The effects of information management on reactions to human resource information systems: an integration of privacy and procedural justice perspectives. Personnel Psychology, 52, 335–358.
    10.Fishbein, M., & Azjen, I. (1975). Belief, attitude, intention, and behavior: An introduction to theory and research. Reading, MA: Addison-Wesley.
    11.Greenberg, S., & Kuzuoka, H. (2000). Using digital but physical surrogates to mediate awareness, communication and privacy in media spaces. Personal Technologies, 4, 182–198.
    12.Hudson, S. E., & Smith, I. (1996). Techniques for addressing fundamental privacy and disruption tradeoffs in awareness support systems. In Proceedings of Computer Supported Cooperative Work ’96 Conference (pp. 248–257).
    13.Lee, A., & Girgensohn, A. (2002). Design, experiences and user preferences for a web-based awareness tool. International Journal of Human–Computer Studies, 56, 75–107.
    14.Lee, A., Schlueter, K., & Girgensohn, A. (1997). Sensing activity in video images. CHI’97 extended abstracts (pp. 319–320). ACM Press.
    15.Leino-Kilpi H.1; Valimaki M.; Dassen T.; Gasull M.; Lemonidou C.; Scott A.; Arndt M.,2001. Privacy: a review of the literature. Journal of Nursing Studies 38 (2001) 663-671.
    16.Rawnsley, M., 1980. The concept of privacy. Advances in Nursing Science 2 (2), 25–31.
    17.Stanton, J. M., & Barnes-Farrell, J. L. (1996). Effects of electronic performance monitoring on personal control. Journal of Applied Psychology, 81, 738–745.
    18.Stone, E. F., & Stone, D. L. (1990). Privacy in organizations: theoretical issues, research findings, and protection mechanisms. Research in Personnel and Human Resources Management, 8, 349–411.
    19.Taylor, S., & Todd, P. A., “Understanding Information Technology Usage: A
    Test of Competing Models,” Information Systems Research, Vol.6, No.2, 1995a, pp. 144-176.
    20.Venkatesh, V. & Davis, F. D., “A Model of the Antecedents of Perceived Ease of Use: Development and Test.” Decision Sciences, Vol.27, No.3, 1996 pp.451-481.
    21.Webster, J. (1998). Desktop videoconferencing: experiences of complete users, wary users and non-users. MIS Quarterly, 22, 257–286.
    22.Zweig, D. I., & Webster, J. (2002) Where is the line between benign and invasive? An examination of psychological barriers to the acceptance of awareness monitoring systems. Journal of Organizational Behavior, 23(5), 605-633
    23.Zweig, D. I., & Webster, J. (2003) “Personality as a moderator of monitoring acceptance,” Computers in Human Behavior 19 (2003) 479-493

    無法下載圖示 全文公開日期 2013/06/10 (校內網路)
    全文公開日期 本全文未授權公開 (校外網路)
    全文公開日期 本全文未授權公開 (國家圖書館:臺灣博碩士論文系統)
    QR CODE