簡易檢索 / 詳目顯示

研究生: 陳品軒
Pin-Hsuan Chen
論文名稱: 從科技接受模型、印象管理、隱私顧慮與機器捷思觀點探討機器人在諮商領域之應用
Chatbot Application in Consultation: Examining TAM, Impression Management, Perceived Privacy Risk, and Machine Heuristic
指導教授: 葉峻賓
Chun-Ping Yeh
口試委員: 葉峻賓
Chun-Ping Yeh
何秀青
Hsiu-Ching Ho
蕭義棋
Yi-Chi Hsiao
學位類別: 碩士
Master
系所名稱: 管理學院 - 科技管理研究所
Graduate Institute of Technology Management
論文出版年: 2021
畢業學年度: 109
語文別: 英文
論文頁數: 36
中文關鍵詞: 聊天機器人科技接受模型印象管理隱私顧慮機器捷思諮商
外文關鍵詞: perceived privacy risk, machine heuristic
相關次數: 點閱:293下載:18
分享至:
查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報


Consulting for personally-sensitive issues is still a conservative manner in Taiwan. Despite chatbots have been widely applied in various kinds of commercial fields, uses of chatbots in sexual education and consultation of sensitive topics are still in nascence. This study aims to explore the intention to use consulting chatbots from the perspective of impression management, perceived privacy risks and machine heuristics to enrich the current existing research of the technology acceptance model (TAM), especially providing more insights from the aspects of confidentiality and user’s mental status, rather than from productive use. A scenario-based experiment is designed to simulate real human-machine interaction in attempt to capture the personal impression management effect, perceived privacy risks and machine heuristic that affect individuals’ behavioral intention to use chatbots. A sample of 109 students completed a two-stage survey that measured their impression management differences between paper-based and online-based conditions, which simulated the conditions of face-to-face and chatbot using. Impression management and machine heuristic were found to be positively associated with behavioral intention to use chatbot, while perceived privacy risk was not. Overall, the findings contribute to the existing TAM literature by providing evidences of non-productivity antecedents of behavioral intention, as well as a conceptual guide for applying chatbots to the consultation of sensitive issues in more conservative Asian countries like Taiwan.

Abstract I 誌 謝 II Table of Contents III List of Tables IV 1. Introduction 1 2. Literature Review and Hypotheses 4 2.1. The Technology Acceptance Model (TAM) 5 2.2. Impression Management Concern 6 2.3. Perceived Privacy Risk 7 2.4. Machine Heuristic 9 3. Research Method 11 3.1. Data and Sample 11 3.2. Variables and Measures 15 3.2.1. Dependent Variable 15 3.2.2. Independent Variables 15 3.2.3. Control Variables 16 3.3. Method 16 4. Empirical Finding 24 5. Discussion 26 6. Conclusions and Suggestions 28 Reference 31 Appendix A. 37 Appendix B. 40

Al-Jabri, I. M., & Sohail, M. S. (2012). MOBILE BANKING ADOPTION: APPLICATION OF DIFFUSION OF INNOVATION THEORY. Journal of Electronic Commerce Research, 13(4), 373-385.
Andrew, G., Patel, V., & Ramakrishna, J. (2003). Sex, Studies or Strife? What to Integrate in Adolescent Health Services. Reproductive Health Matters, 11(21), 120-129.
Ashfaq, M., Yun, J., Yu, S. B., & Loureiro, S. M. C. (2020). I, Chatbot: Modeling the determinants of users' satisfaction and continuance intention of AI-powered service agents. Telematics and Informatics, 54, 17.
Banister, E., & Schreiber, R. (2001). Young women's health concerns: Revealing paradox. Health Care for Women International, 22(7), 633-647.
Bansal, H., & Khan, R. (2018). A review paper on human computer interaction. Int. J. Adv. Res. Comput. Sci. Softw. Eng, 8, 53.
Baumel, A., Muench, F., Edan, S., & Kane, J. M. (2019). Objective user engagement with mental health apps: systematic search and panel-based usage analysis. Journal of Medical Internet Research, 21(9), e14567.
Bickmore, T., Gruber, A., & Picard, R. (2005). Establishing the computer–patient working alliance in automated health behavior change interventions. Patient Education and Counseling, 59(1), 21-30.
Brown, P., Levinson, S. C., & Levinson, S. C. (1987). Politeness: Some universals in language usage (Vol. 4): Cambridge university press.
Cheng, Y., & Jiang, H. (2020). How Do AI-driven Chatbots Impact User Experience? Examining Gratifications, Perceived Privacy Risk, Satisfaction, Loyalty, and Continued Use. Journal of Broadcasting & Electronic Media, 64(4), 592-614.
Chin, E., Felt, A. P., Sekar, V., & Wagner, D. (2012). Measuring user confidence in smartphone security and privacy. Paper presented at the Proceedings of the eighth symposium on usable privacy and security.
Crutzen, R., Peters, G. J. Y., Portugal, S. D., Fisser, E. M., & Grolleman, J. J. (2011). An Artificially Intelligent Chat Agent That Answers Adolescents' Questions Related to Sex, Drugs, and Alcohol: An Exploratory Study. Journal of Adolescent Health, 48(5), 514-519.
Davis, F. D. (1989). Technology Acceptance Model: TAM. Al-Suqri, MN, Al-Aufi, AS: Information Seeking Behavior and Technology Adoption, S, 205-219.
Dekker, I., De Jong, E. M., Schippers, M. C., De Bruijn-Smolders, M., Alexiou, A., & Giesbers, B. (2020). Optimizing Students’ Mental Health and Academic Performance: AI-Enhanced Life Crafting. Frontiers in Psychology, 11(1063).
Dunham, P. J., Hurshman, A., Litwin, E., Gusella, J., Ellsworth, C., & Dodd, P. W. (1998). Computer-mediated social support: Single young mothers as a model system. American Journal of Community Psychology, 26(2), 281-306.
Eeuwen, M. v. (2017). Mobile conversational commerce: messenger chatbots as the next interface between businesses and consumers. University of Twente.
Feaster, J. C. (2010). Expanding the Impression Management Model of Communication Channels: An Information Control Scale. Journal of Computer-Mediated Communication, 16(1), 115-138.
Featherman, M. S., & Pavlou, P. A. (2003). Predicting e-services adoption: a perceived risk facets perspective. International Journal of Human-Computer Studies, 59(4), 451-474.
Fiske, S. T., & Taylor, S. E. (1991). Social cognition: Mcgraw-Hill Book Company.
Fulmer, R., Joerin, A., Gentile, B., Lakerink, L., & Rauws, M. (2018). Using psychological artificial intelligence (Tess) to relieve symptoms of depression and anxiety: randomized controlled trial. JMIR mental health, 5(4), e64.
Ginsburg, K. R., Menapace, A. S., & Slap, G. B. (1997). Factors affecting the decision to seek health care: the voice of adolescents. Pediatrics, 100(6), 922-930.
Goffman, E. (1967). Interaction ritual: Essays on face-to-face behavior. New York: Anchor. In: Doubleday.
Hair, J. F. (2009). Multivariate data analysis.
Joinson, A. N., Reips, U.-D., Buchanan, T., & Schofield, C. B. P. (2010). Privacy, trust, and self-disclosure online. Human–Computer Interaction, 25(1), 1-24.
Kamita, T., Ito, T., Matsumoto, A., Munakata, T., & Inoue, T. (2019). A Chatbot System for Mental Healthcare Based on SAT Counseling Method. Mobile Information Systems, 2019, 9517321.
Khanna, A., Pandey, B., Vashishta, K., Kalia, K., Pradeepkumar, B., & Das, T. (2015). A study of today’s ai through chatbots and rediscovery of machine intelligence. International Journal of u-and e-Service, Science and Technology, 8(7), 277-284.
Kobori, Y., Osaka, A., Soh, S., & Okada, H. (2018). NOVEL APPLICATION FOR SEXUAL TRANSMITTED INFECTION SCREENING WITH AN AI CHATBOT. Journal of Urology, 199(4), E189-E190.
Lind, L. H., Schober, M. F., Conrad, F. G., & Reichert, H. (2013). Why do survey respondents disclose more when computers ask the questions? Public Opinion Quarterly, 77(4), 888-935.
Locke, S. E., Kowaloff, H. B., Hoff, R. G., Safran, C., Popovsky, M. A., Cotton, D. J., . . . Slack, W. V. (1992). Computer-based interview for screening blood donors for risk of HIV transmission. Jama, 268(10), 1301-1305.
Lorenzo, C. M., Lezcano, L., & Sanchez-Alonso, S. (2013). Language Learning in Educational Virtual Worlds - a TAM Based Assessment. Journal of Universal Computer Science, 19(11), 1615-1637.
Lucas, G. M., Gratch, J., King, A., & Morency, L. P. (2014). It's only a computer: Virtual humans increase willingness to disclose. Computers in Human Behavior, 37, 94-100.
Miller, C. A., Ott, T., Wu, P., & Vakili, V. (2011). Politeness and etiquette modeling: Beyond perception to behavior. In Handbook of research on culturally-aware information technology: Perspectives and models (pp. 387-411): IGI Global.
Moon, J.-W., & Kim, Y.-G. (2001). Extending the TAM for a World-Wide-Web context. Information & Management, 38(4), 217-230.
Norberg, P. A., Horne, D. R., & Horne, D. A. (2007). The privacy paradox: Personal information disclosure intentions versus behaviors. Journal of Consumer Affairs, 41(1), 100-126.
Norvig, P. R., & Intelligence, S. A. (2002). Artificial Intelligence: A Modern Approach: Prentice Hall Upper Saddle River, NJ, USA.
O'sullivan, B. (2000). What you don't know won't hurt me: Impression management functions of communication channels in relationships. Human Communication Research, 26(3), 403-431.
Paulhus, D. L. (1991). Measurement and control of response bias.
Pickard, M. D., Roster, C. A., & Chen, Y. X. (2016). Revealing sensitive information in personal interviews: Is self-disclosure easier with humans or avatars and under what conditions? Computers in Human Behavior, 65, 23-30.
Prakash, A. V., & Das, S. (2020). Intelligent conversational agents in mental healthcare services: A thematic analysis of user perceptions. Pacific Asia Journal of the Association for Information Systems, 12(2), 1.
Rese, A., Ganster, L., & Baier, D. (2020). Chatbots in retailers’ customer communication: How to measure their acceptance? Journal of Retailing and Consumer Services, 56, 102176.
Rideout, V. (2002). Generation RX. com. Marketing Health Services, 22(1), 26.
Ruoti, S., Kim, N., Burgon, B., Van Der Horst, T., & Seamons, K. (2013). Confused Johnny: when automatic encryption leads to confusion and mistakes. Paper presented at the Proceedings of the Ninth Symposium on Usable Privacy and Security.
Saffarizadeh, K., Boodraj, M., & Alashoor, T. M. (2017). Conversational Assistants: Investigating Privacy Concerns, Trust, and Self-Disclosure. Paper presented at the ICIS.
Shi, P., Xu, H., & Chen, Y. (2013). Using contextual integrity to examine interpersonal information boundary on social network sites. Paper presented at the Proceedings of the SIGCHI Conference on Human Factors in Computing Systems.
Sundar, S. S., & Kim, J. (2019). Machine Heuristic: When We Trust Computers More than Humans with Our Personal Information. Paper presented at the Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems, Glasgow, Scotland Uk.
Sundar, S. S., & Marathe, S. S. (2010). Personalization versus Customization: the Importance of Agency, Privacy, and Power Usage. Human Communication Research, 36(3), 298-322.
Suzuki, L. K., & Calzo, J. P. (2004). The search for peer advice in cyberspace: An examination of online teen bulletin boards about health and sexuality. Journal of Applied Developmental Psychology, 25(6), 685-698.
Turner, C. F. (1992). Effects of mode of administration and wording on reporting of drug use. Survey Measurement of Drug Use: Methodological Issues, 177-219.
Tversky, A., & Kahneman, D. (1974). Judgment under uncertainty: Heuristics and biases. Science, 185(4157), 1124-1131.
Venkatesh, V. (2000). Determinants of perceived ease of use: Integrating control, intrinsic motivation, and emotion into the technology acceptance model. Information Systems Research, 11(4), 342-365.
Venkatesh, V., & Davis, F. D. (2000). A theoretical extension of the technology acceptance model: Four longitudinal field studies. Management Science, 46(2), 186-204.
Venkatesh, V., Thong, J. Y., & Xu, X. (2012). Consumer acceptance and use of information technology: extending the unified theory of acceptance and use of technology. MIS quarterly, 157-178.
Yang, H. C. (2014). Teaching sexual matters in Taiwan: the analytical framework for popular culture and youth sexuality education. Asia Pacific Journal of Education, 34(1), 49-64.

QR CODE