研究生: |
樓恩琦 Lou, En-Chi |
---|---|
論文名稱: |
使用者個資之資安危機敏感意識探討:以Instagram為例 Exploring User Awareness of Information Security and Privacy Risks: A Case Study of Instagram |
指導教授: |
袁千雯
Yuan, Chien-Wen |
口試委員: |
袁千雯
Yuan, Chien-Wen 游創文 You, Chuang-Wen 曾元琦 Tseng, Yuan-Chi |
口試日期: | 2024/05/03 |
學位類別: |
碩士 Master |
系所名稱: |
圖書資訊學研究所 Graduate Institute of Library and Information Studies |
論文出版年: | 2024 |
畢業學年度: | 112 |
語文別: | 中文 |
論文頁數: | 74 |
中文關鍵詞: | 社交媒體 、個人資訊 、資訊安全 、隱私 、Instagram |
英文關鍵詞: | Instagram, Social Media, Personal Information, Information Security, Privacy |
研究方法: | 深度訪談法 、 半結構式訪談法 |
DOI URL: | http://doi.org/10.6345/NTNU202401348 |
論文種類: | 學術論文 |
相關次數: | 點閱:285 下載:0 |
分享至: |
查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報 |
Web 2.0 時代使用者可以與其他使用者產生互動,允許使用者不只作為瀏覽者也可以是資訊提供的建立者,進而有了社交媒體的產生。Instagram 是一個主要以圖片和影片分享為主的平台,使用者可以透過各種功能分享日常生活和與他人互動。隨著現今社群平台蓬勃發展,社交媒體也開始結合電子商務功能,使用者不僅能能透過社群媒體與親朋好友交流、維繫感情,更能夠在上頭買到想要的商品或服務;然而,這些行為背後存在著資訊安全的風險。個人資訊、隱私、資訊安全在社交媒體上受到極高的關注,個人資訊以及隱私在社交媒體上尚未有明確區分範疇;資訊安全多半以預防性,像是提醒建置防火牆宣導。本篇研究採取半結構式訪談,試著從使用者角度探討他們認為在Instagram上屬於個人資訊的範疇定義、使用行為上對於個人資訊感到危機風險的意識以及就第264.3版介面使用上個人資訊保護的看法以及給予建議。本研究方向不只針對於自身個人資訊,在社交媒體超連結特性下,整個社群網絡皆是影響範圍;故也會針對使用下對於他人個人資訊的探討。研究發現,使用者對於Instagram個人資訊定義上可以廣義區分成兩大類,也發現在數位化時代下,對於保護個人資訊的理解變得更加重要,需要更加全面地考慮個人資訊的範疇;對於自己的個人資訊有較高的風險意識,然而,人們對於他人的資訊分享則存在著不確定性,這可能受到個人對於資訊敏感度的影響;介面的設計對於提醒使用者注意個人資訊的風險是有幫助的,個人化的功能和提醒視窗可以增加使用者對於個人資訊保護的意識,並給予他們更多思考是否分享的機會。本研究提供對於社交媒體上個人資訊保護的洞察,並給予未來在設計介面和提升用戶風險意識方面的一些方向。這對於社交媒體平台、用戶以及相關利益相關者都具有重要的參考價值。
In the Web 2.0 era, users can interact with other users, allowing users not only to serve as browsers but also as creators of information providers, leading to the emergence of social media. There are more than 19 million social media users in Taiwan, with the main platforms including LINE, Instagram, and Facebook. Instagram is a platform mainly for sharing pictures and videos. Users can share their daily lives and interact with others through various functions. With the rapid development of social platforms today, social media has also begun to incorporate e-commerce functions. Users can communicate and maintain relationships with relatives and friends through social media and purchase the goods or services they want online; however, there are information security risks behind these behaviors. For example, failure to hide personal information in limited-time updates may lead to data theft or the risk of being attacked by hackers. Personal information, privacy, and information security have received great attention on social media. Personal information and privacy have not yet been differentiated on social media. Information security is mostly preventive, such as reminders to build firewalls. The study not only focuses on individual personal information but also considers the impact on the entire community network under the hyperlink features of social media. Findings reveal that users broadly categorize personal information on Instagram into two main types. In the digital age, understanding the protection of personal information becomes increasingly crucial, necessitating a comprehensive consideration of the scope of personal information. Users exhibit a heightened awareness of risks concerning their own personal information. However, uncertainty exists regarding the sharing of others' information, influenced by individual sensitivity to information. Interface design plays a significant role in reminding users of the risks associated with personal information. Personalized features and alert windows can enhance user awareness of personal information protection and provide them with more opportunities to consider whether to share information. This study offers insights into protecting personal information on social media and suggests directions for future interface design and enhancing user risk awareness. It holds significant reference value for social media platforms, users, and relevant stakeholders.
一、中文部分
dumbChat.AI. (2021). Facebook功能大全|這些便捷的Facebook功能你有發現嗎?. https://www.dumbchat.ai/facebook-function-introduction/
Instagram. (n.d.). 在 Instagram 使用驗證應用程式進行雙重驗證. https://help.instagram.com/1582474155197965?cms_id=1582474155197965
iThome. (2019). 2019臺灣資安大調查重點整理. https://www.ithome.com.tw/voice/129723
iThome. (2023a). 【iThome 2023資安大調查系列2】5成多企業員工資安意識不足,3成企業欠缺資安老手. https://www.ithome.com.tw/article/159256
iThome. (2023b). 【iThome 2023資安大調查系列2】社交工程風險超越勒索軟體和駭客,ChatGPT濫用成新威脅. https://www.ithome.com.tw/article/159257
Janet. (2023). TikTok 抖音影片製作教學 | 新手如何讓抖音影片脫穎而出?(2023). https://tw.cyberlink.com/blog/video-editing-instagram-tiktok/535/tiktok-%E8%A3%BD%E4%BD%9C
LINE. (2021). LINE VOOM 重磅登台 正式宣戰影音社群 全面搶攻Z世代直屏商機 聚焦原創IP節目 擴大招募200位短影音創作客 目標創造破億觀看人次 獨創MEME神曲 新生代偶像婁峻碩跳LINE VOOM Dance邀請全民V起來. https://linecorp.com/zh-hant/pr/news/zh-hant/2021/4018
Radar, K. (2022). 品牌不可錯過的 IG 商業帳號全攻略!建立方式、重點功能看完這篇就明白. https://www.kolradar.com/blog/trend-sharing/instagram-business-account/
Research, C. P. (2022). 2022 網路安全報告. https://drive.google.com/file/d/1IB4dGxxZQTapZZfxWuD2D_IjU2eA4eg1/view
TWNIC. (2019). 人工智慧與資料隱私之探討. https://blog.twnic.tw/2019/04/25/3384/
三立新聞網. (2020). 臉書瘋傳「是你嗎?」影片連結一點個資遭竊 必學自保3招. https://www.setn.com/News.aspx?NewsID=782545
方仁威. (2016). 論社交工程安全威脅之研究 [A Study of Security Threat for Social Engineering Attack]. 發展與前瞻學報(11), 33-52. https://doi.org/10.6737/JDP.201603_(11).03
台灣事實查核中心. (2022). 【錯誤】網傳「通過問卷,您將有機會獲得 10000 新臺幣」?. https://tfc-taiwan.org.tw/articles/7509
何煒華、王寶璿. (2018). 社交媒體使用行為與安全設定之關係研究-以Facebook為例.
谷玲玲. (2013). 網路親密關係中的自我揭露 [Self-Disclosure in Online Intimate Relationships]. 資訊社會研究(24), 1-26. https://doi.org/10.29843/jccis.201301_(24).0001
林錦郎, 卓麗香, & 張松山. (2017). 資訊隱私機制與信任對Facebook社群網站使用者行為意圖影響之研究. 全球商業經營管理學報, 9卷, 13-25.
柯秀佳, 劉泯彤, & 詹忠諺. (2014). 從使用與滿足理論探索影響臉書使用者持續使用地標打卡之意圖的因素. 資訊科技國際期刊(8:2期), 59-69.
記者周亭瑋/綜合報導. (2022). 收私訊「違反IG使用規範」 她一填申訴GG了:心血歸零. ETtoday新聞雲. https://www.ettoday.net/news/20221129/2390404.htm
郜敏. (2021). 打完疫苗立刻拍照上傳小黃卡?當心被駭客與詐騙集團盯上. 新頭殼newtalk. https://tw.news.yahoo.com/%E6%89%93%E5%AE%8C%E7%96%AB%E8%8B%97%E7%AB%8B%E5%88%BB%E6%8B%8D%E7%85%A7%E4%B8%8A%E5%82%B3%E5%B0%8F%E9%BB%83%E5%8D%A1-%E7%95%B6%E5%BF%83%E8%A2%AB%E9%A7%AD%E5%AE%A2%E8%88%87%E8%A9%90%E9%A8%99%E9%9B%86%E5%9C%98%E7%9B%AF%E4%B8%8A-092929944.html
國家發展委員會. (2015). 個人資料保護法. https://law.moj.gov.tw/LawClass/LawAll.aspx?PCode=I0050021
教育部全民資安素養網. (2019). 保護社群網站上個資你可以這樣做. https://isafe.moe.edu.tw/article/2101?user_type=4&topic=8
陳嘉玫. (2011). 網路安全的社交工程. 科學發展(461), 16-23.
陳憶寧、溫嘉禾. (2020). 台灣臉書使用者的隱私行為研究:劍橋分析事件之後 [A Study of the Privacy Behavior of Taiwan Facebook Users after the Cambridge Analytica Scandal]. 傳播與社會學刊(54), 27-57. https://doi.org/10.30180/CS.202010_(54).0003
黃明祥、林詠章. (2014). 資訊與網路安全概論:看見比特幣 第五版. 美商麥格羅希爾國際股份有限公司台灣分公司.
黃翊禎. (2022). TikTok連續4年奪下載量冠軍!Instagram、YouTube都強勢進軍短影音,龍頭怎麼應對?. https://www.bnext.com.tw/article/69001/tiktok-youtube-meta-app
楊喬文. (2018). 限時動態如何讓人愛不釋手? 探討暫時性社群媒體之線上自我揭露行為 2018年中華傳播學會年會, 銘傳大學基河校區.
葉俊榮. (2016). 探尋隱私權的空間意涵-大法官對基本權利的脈絡論證. 中研院法學期刊, 18, 1-40.
臺灣傳播調查資料庫. (2021). 男女IG使用習慣大不同?. https://crctaiwan.dcat.nycu.edu.tw/ResultsShow_detail.asp?RS_ID=136
臺灣學術倫理教育資源中心. 憲法與隱私權相關的規定. https://ethics-s.moe.edu.tw/static/ethics/u29/p07.html
劉郁彣、林麗娟. (2017). 大學生對個資之資訊需求與尋求分析 [College Students' Information Needs and Information Seeking Behaviors regarding Personal Information]. 圖書資訊學刊, 15(2), 101-133. https://doi.org/10.6182/jlis.2017.15(2).101
數位時代. (2022). 無聊猿又被偷!官網Instagram遭駭客入侵,遭盜價值數百萬NFT. https://tw.news.yahoo.com/%E7%84%A1%E8%81%8A%E7%8C%BF%E5%8F%88%E8%A2%AB%E5%81%B7-%E5%AE%98%E7%B6%B2instagram%E9%81%AD%E9%A7%AD%E5%AE%A2%E5%85%A5%E4%BE%B5-%E9%81%AD%E7%9B%9C%E5%83%B9%E5%80%BC%E6%95%B8%E7%99%BE%E8%90%ACnft-053825358.html
趨勢科技. (2018). 當你使用社群媒體時,會擔心個人資料安全嗎?. https://blog.trendmicro.com.tw/?p=56030
趨勢科技. (2022). 【詐騙警訊週報】Instagram 流傳「這是你嗎?」詐騙/「你本週出現在5次搜尋裡」LinkedIn 詐騙誘你上成人網站/ MetaMask釣魚郵件. https://blog.trendmicro.com.tw/?p=71992
二、英文部分
Accenture. (2022). The future of shopping and social commerce. https://www.accenture.com/us-en/insights/software-platforms/why-shopping-set-social-revolution?c=acn_glb_socialcommercebusinesswire_12755585&n=mrl_0122
Bayer, J. B., Ellison, N. B., Schoenebeck, S. Y., & Falk, E. B. (2016). Sharing the small moments: ephemeral social interaction on Snapchat. Information, Communication & Society, 19(7), 956-977. https://doi.org/10.1080/1369118X.2015.1084349
Berners-Lee, T. (1998). The World Wide Web: A very short personal history. https://www.w3.org/People/Berners-Lee/ShortHistory.html
Calic, D., Pattinson, M. R., Parsons, K., Butavicius, M. A., & McCormac, A. (2016). Naïve and Accidental Behaviours that Compromise Information Security: What the Experts Think. International Symposium on Human Aspects of Information Security and Assurance,
Cozby, P. C. (1973). Self-disclosure: a literature review. Psychological Bulletin, 79 2, 73-91.
Davidson, B. I., & Joinson, A. N. (2021). Shape Shifting Across Social Media. Social Media + Society, 7(1). https://doi.org/10.1177/2056305121990632
Dienlin, T., & Metzger, M. J. (2016). An Extended Privacy Calculus Model for SNSs: Analyzing Self-Disclosure and Self-Withdrawal in a Representative U.S. Sample. Journal of Computer-Mediated Communication, 21(5), 368-383. https://doi.org/https://doi.org/10.1111/jcc4.12163
Donaldson, T., & Dunfee, T. W. (1994). Toward a Unified Conception of Business Ethics: Integrative Social Contracts Theory. The Academy of Management Review, 19(2), 252-284. https://doi.org/10.2307/258705
Fogel, J., & Nehmad, E. (2009). Internet social network communities: Risk taking, trust, and privacy concerns. Computers in Human Behavior, 25(1), 153-160. https://doi.org/10.1016/j.chb.2008.08.006
Forbes. (2020). There Isn't Enough Privacy On Social Media And That Is A Real Problem. https://www.forbes.com/sites/petersuciu/2020/06/26/there-isnt-enough-privacy-on-social-media-and-that-is-a-real-problem/?sh=5857dcc744f1
Gibbs, J., Ellison, N., & Heino, R. (2006). Self-Presentation in Online PersonalsThe Role of Anticipated Future Interaction, Self-Disclosure, and Perceived Success in Internet Dating. Communication Research - COMMUN RES, 33, 152-177. https://doi.org/10.1177/0093650205285368
Humphreys, L., Gill, P., & Krishnamurthy, B. (2012). How much is too much? Privacy issues on Twitter.
Introna, L., & Pouloudi, N. (1999). Privacy in the Information Age: Stakeholders, Interests and Values. Journal of Business Ethics, 22, 27-38. https://doi.org/10.1023/A:1006151900807
Kaplan, A., & Haenlein, M. (2010). Users of the World, Unite! The Challenges and Opportunities of Social Media. Business Horizons, 53, 59-68. https://doi.org/10.1016/j.bushor.2009.09.003
KEMP, S. (2024). DIGITAL 2024: GLOBAL OVERVIEW REPORT. https://datareportal.com/reports/digital-2024-taiwan
Krämer, N. C., & Schäwel, J. (2020). Mastering the challenge of balancing self-disclosure and privacy in social media. Current Opinion in Psychology, 31, 67-71. https://doi.org/https://doi.org/10.1016/j.copsyc.2019.08.003
Laribee, L. (2006). Development of Methodical Social Engineering Taxonomy Project.
Lewis, K., Kaufman, J., & Christakis, N. (2008). The Taste for Privacy: An Analysis of College Student Privacy Settings in an Online Social Network. Journal of Computer-Mediated Communication, 14(1), 79-100. https://doi.org/10.1111/j.1083-6101.2008.01432.x
McCormac, A., Calic, D., Butavicius, M., Parsons, K., Zwaans, T., & Pattinson, M. (2017). A Reliable Measure of Information Security Awareness and the Identification of Bias in Responses. Australasian Journal of Information Systems, 21. https://doi.org/10.3127/ajis.v21i0.1697
Naik, U., & Shivalingaiah, D. (2009). Comparative Study of Web 1.0, Web 2.0 and Web 3.0. https://doi.org/10.13140/2.1.2287.2961
Norberg, P. A., Horne, D. R., & Horne, D. A. (2007). The Privacy Paradox: Personal Information Disclosure Intentions versus Behaviors. Journal of Consumer Affairs, 41(1), 100-126. https://doi.org/https://doi.org/10.1111/j.1745-6606.2006.00070.x
O'Reilly, T. (2005). What Is Web 2.0? Design Patterns and Business Models for the Next Generation of Software. https://www.oreilly.com/pub/a/web2/archive/what-is-web-20.html
OOSGA. (2023). Social Media in Taiwan - 2023 Stats & Platform Trends. https://oosga.com/social-media/twn/
Point, C. (2020). YOUR CHECK POINT - THREAT INTELLIGENCE REPORT.
Søe, S., Jørgensen, R., & Mai, J.-E. (2021). What is the ‘personal’ in ‘personal information’? Ethics and Information Technology, 23. https://doi.org/10.1007/s10676-021-09600-3
Savings, V. (n.d.). Are More People Public or Private on Social Media? https://www.viasatsavings.com/news/blog/are-more-people-public-or-private-on-social-media/
Sundar, S. S., Kang, H., Wu, M., Go, E., & Zhang, B. (2013). Unlocking the privacy paradox: do cognitive heuristics hold the key? CHI '13 Extended Abstracts on Human Factors in Computing Systems, Paris, France. https://doi.org/10.1145/2468356.2468501
TikTok. (n.d.). TikTok Stories: What It Is and How to Use It. https://www.tiktok.com/creators/creator-portal/zh-tw/tiktok-content-strategy/tiktok-stories-what-it-is-and-how-to-use-it/?enter_method=left_navigation
Wheeless, L. R., & Grotz, J. (1977). THE MEASUREMENT OF TRUST AND ITS RELATIONSHIP TO SELF-DISCLOSURE. Human Communication Research, 3(3), 250-257. https://doi.org/https://doi.org/10.1111/j.1468-2958.1977.tb00523.x
X. (n.d.). Using X. https://help.twitter.com/en/using-x