請用此 Handle URI 來引用此文件:
http://tdr.lib.ntu.edu.tw/jspui/handle/123456789/26129完整後設資料紀錄
| DC 欄位 | 值 | 語言 |
|---|---|---|
| dc.contributor.advisor | 謝清佳 | |
| dc.contributor.author | Chien-nai Lin | en |
| dc.contributor.author | 林千乃 | zh_TW |
| dc.date.accessioned | 2021-06-08T07:00:56Z | - |
| dc.date.copyright | 2009-06-02 | |
| dc.date.issued | 2009 | |
| dc.date.submitted | 2009-05-20 | |
| dc.identifier.citation | 參考文獻
一、. 中文書目 1. 吳曲輝等譯,張家銘校閱,Johnthan H. Turner著,1996,社會學理論的結構,台北市,桂冠。 2. 尚榮安譯,陳禹辰校閱,Robert K. Yin著,2001,個案研究,台北市,弘智。 3. 林千乃、謝清佳、謝定助、尤國任,2006『科技中介之組織溝通理論反思:研究典範與後設理論之重建』,資訊管理學報,第十三卷,第三期:197~216頁。 4. 唐士哲,2004,『網際網路的民族誌學』,收錄於質性研究方法及其超越,林本炫等(編),23~52頁,嘉義:南華大學教社所。 5. 黃瑞祺著,2001,批判社會學,台北市,三民。 6. 陳宇芬,2002,資訊人員的系統開發與組織結構互動之探索性研究—以結構行動理論為基礎,國立台灣大學資訊管理研究所博士論文。 7. 賴文福譯,David M. Fetterman著,2000,民族誌學,台北市,弘智。 8. 薛絢譯,Margaret Wertheim著,1999,空間地圖,台北市,台灣商務。 二、. 英文書目 1. Agre, Philip E. “Life after Cyberspace,” EASST Review 18(3) 1999, http://www.easst.net/review/sept1999/agre. 2. Aiken, M and Alonzo, M. “Flaming in Electronic Communication,” Decision Support Systems, 36(3) 2004, pp.205-213. 3. Allen, G.N., Burk, D.L. and Davis, G.B. “Academic Data Collection in Electronic Environments: Defining Acceptable Use of Internet Resources,” MIS Quarterly 30(3) 2006, pp. 599-610. 4. Andrews, Dorine C “Audience-Specific Online Community Design,” Communications of the ACM 45(4) 2002, pp. 64-68. 5. Armstrong, H.L. and Forde, P.J. “Internet Anonymity Practices in Computer Crime,” Information Management & Computer Security 11(5) 2003, pp. 209-215. 6. Bechar-Israeli, Haya “From <Bonehead> to <cLoNehEAd>: Nicknames, Play, and Identity on Internet Relay Chat,” Journal of Computer-Mediated Communication 1(2) 1995, http://jcmc.indiana.edu/vol1/issue2/bechar.html 7. Baird, Ellen “Ain't Gotta Do Nothin But Be Brown and Die,” CMC Magazine 5(7) 1998, http://www.december.com/cmc/mag/1998/jul/baird.html. 8. Bakardjieva, M. and Feenberg, A. “Involving the Virtual Subject,” Ethics and Information Technology 2(4) 2001, pp. 233-240. 9. Barley, Stephen R. “Images of Imaging: Notes on Doing Longitudinal Field Work,” Organization Science 1(3) 1990, pp. 220-247. 10. Barton, Ellen “Discourse Methods and Critical Practice in Professional Communication: The Front-Stage and Back-Stage Discourse of Prognosis in Medicine,” Journal of Business and Technical Communication 18(1) 2004, pp. 67-111. 11. Baym, Nancy K. “The Performance of Humor in Computer-Mediated Communication,” Journal of Computer-Mediated Communication 1(2) 1995, http://jcmc.indiana.edu/vol1/issue2/baym.html. 12. Boland, Jr., Richard J. “Information System Use as a Hermeneutic Process,” in Qualitative Research in Information Systems: A Reader, M.D. Myers&D. Avison (eds.), Sage, London, 2002, pp. 225-240. 13. Bennett, Colin “Cookies, Web Bugs, Webcams and Cue Cats: Patterns of Surveillance on the World Wide Web,” Ethics and Information Technology 3(3) 2001, pp. 197-210. 14. Berman, J. and Bruckman, A.S. “Exploring Identity in an Online Environment,” Convergence 7(3) 2001, pp. 83-102. 15. Bowker, N. and Tuffin, K. “Disability Discourses for Online Identities,” Disability&Society 17(3) 2002, pp. 327-344. 16. ------ and ------- “Dicing with Deception: People with Disabilities’ Strategies for Managing Safety and Identity Online,” Journal of Computer-Mediated Communication 8(2) 2003, http://jcmc.indiana.edu/vol8/issue2/bowker.html. 17. Broom, Alex “The eMale: Prostate Cancer, Masculinity and Online Support as a Challenge to Medical Expertise,” Journal of Sociology 41(1) 2005, pp. 87-104. 18. Brunet, P.M. and Schmidt, L.A. “Are Shy Adults Really Bolder Online? It Depends on the Context,” CyberPsychology&Behavior 11(6) 2008, pp. 707-709. 19. Chiu, C.M., Hsu, M.H. and Wang, E.T.G. “Understanding Knowledge Sharing in Virtual Communities: An Integration of Social Capital and Social Cognitive Theories,” Decision Support Systems 42(3) 2006, pp. 1872-1888. 20. Clark, T. and Mangham, I. “From Dramaturgy to Theatre as Technology: The Case of Corporate Theatre,” Journal of Management Studies 41(1) 2004, pp. 37-59. 21. Correll, Shelley “The Ethnography of an Electronic Bar: The Lesbian Café,” Journal of Contemporary Ethnography 24(3) 1995, pp. 270-298. 22. Cranor, L.F. “Internet Privacy,” Communications of the ACM. 42(2) 1999, pp. 28-31. 23. Cummings, J.N., Sproull, L., and Kiesler, S.B. “Beyond Hearing: Where Real-World and Online Support Meet,” Group Dynamics: Theory, Research and Practice 6(1) 2002, pp. 78-88. 24. Da Cunha, J.V. and Orlikowski, W.J. “Performing Catharsis: The Use of Online Discussion Forums in Organizational Change,” Information and Organization 18(2), 2008, pp. 132-156. 25. Danet, Brenda “Text as Mask: Gender, Play, and Performance on the Internet,” in Cybersociety 2.0: Revisting Computer-Mediated Communication and Community, Steven G. Jones (ed.), Sage, Thousand Oaks, California, 1998, pp. 129-158. 26. Daft, R.L. and Lengel, R.H. “Organizational Information Requirements, Media Richness and Structural Design,” Management Science 32(5) 1986, pp. 554-571. 27. Daft, R.L., Lengel, R.H., and Trevino, L.K. “Message Equivocality, Media Selection, and Manager Performance: Implications for Information Systems,” MIS Quarterly 11(3) 1987, pp. 355-366. 28. Dominick, Joseph R. “Who Do You Think You Are? Personal Home Pages and Self-Presentation on the World Wide Web,” Journalism&Mass Communication Quarterly 76(4) 1999, pp. 646-658. 29. Donaldson, Thomas “Ethics in Cyberspace: Have We Seen This Movie Before?” Business and Society Review 106(4) 2001, pp.273-291. 30. Eisenhardt, Kathleen M. “Building Theories from Case Study Research,” The Academy of Management Review 14(4) 1989, pp. 532-549. 31. Ellison, N., Heino R. and Gibbs, J. “Managing Impressions Online: Self-Presentation Processes in the Online Dating Environment,” Journal of Computer-Mediated Communication 11(2) 2006, pp. 415-441. 32. El-Shinnawy, M. and Markus, M.L. “The Poverty of Media Richness Theory: Explaining People’s Choice of Electronic Mail vs. Voice Mail,” International Journal of Human-Computer Studies 46(4) 1997, pp. 443-467. 33. Etzioni A. and Etzioni O. “Face-to-Face and Computer-Mediated Communities, A Comparative Analysis,” The Information Society 15(4) 1999, pp. 241-248. 34. Fayard, Anne-Laure “Interacting on a Video-Mediated Stage: The Collaborative Construction of an Interactional Video Setting,” Information Technology & People 19(2) 2006, pp. 152-169. 35. Fjermestad, J. “An Analysis of Communication Mode in Group Support Systems Research,” Decision Support Systems 37(2) 2004, pp.239-263. 36. Froomkin, A. Michael “Legal issues in anonymity and pseudonymity,” Information Society 15(2) 1999, pp. 113-127. 37. Galegher, J., Sproull, L. and Kiesler, S. “Legitimacy, Authority, and Community in Electronic Support Groups,” Written Communication 15(4) 1998, PP. 493-530. 38. Gardner, Carol Brooks “Fine Romances: Two Arrangements between the sexes in public places,” in Goffman and Social Organization: Studies in a Sociological Legacy, Greg Smith (ed.), Routledge, London, 1999, pp. 42-63. 39. Garfinkel, Harold Studies in Ethnometholology, Polity Press, Cambridge, 1984. 40. Goffman, Erving The Presentation of Self in Everyday Life, Anchor Books, New York, 1959. 41. ------ “Role Distance” in Encounters: Two Studies in the Sociology of Interaction, The Bobbs-Merrill Company, Indianapolis, 1961, pp. 85-152.. 42. ------ Stigma: Notes on the Management of Spoiled Identity, Prentice-Hall Inc., Englewood Cliffs, New Jersey, 1963. 43. ------“Strategic Interaction,” in Strategic Interaction, University of Pennsylvania Press, Philadelphia, 1969, pp. 83-145. 44. ------Frame Analysis, Harvard University Press, Cambridge, 1974. 45. ------“The Interaction Order: American Sociological Association, 1982 Presidential Address,” American Sociological Review 48(1) 1983, pp. 1-17. 46. Gotterbarn, Donald “Privacy lost: The Net, Autonomous Agents, and 'Virtual Information',” Ethics and Information Technology 1(2) 1999, pp. 147-154. 47. Grisē M.L. and Gallupe, B. “Information Overload: Addressing the Productivity Paradox in Face-to-Face Electronic Meetings,” Journal of Management Information Systems 16(3) 1999, pp. 157-185. 48. Habermas, Jürgen Knowledge and Human Interests, Beacon Press, Boston, 1971. 49. Hiltz, S.R. and Turoff, M. “Structuring Computer-Mediated Communication Systems to Avoid Information Overload,” Communications of the ACM 28(7) 1985, pp. 680-689. 50. Hine, Christine Virtual Ethnography, Sage, London, 2000. 51. Jacobson, David “Contexts and Cues in Cyberspace: The Pragmatics of Naming in Text-Based Virtual Realities,” Journal of Anthropological Research 52(4) 1996, pp. 461-472. 52. Joinson, A.N. and Dietz-Uhler, B. “Explanations for the Perpetration of and Reactions to Deception in a Virtual Community,” Social Science Computer Review 20(3) 2002, pp. 275-289. 53. Joinson, Adam N. “Self-Disclosure in Computer-Mediated Communication: The Role of Self-Awareness and Visual Anonymity,” European Journal of Social Psychology 31(2) 2001, pp. 177-192. 54. Klein, H.K. and Myers, M.D. “A Set of Principles for Conducting and Evaluating Interpretive Field Studies in Information Systems,” MIS Quarterly 23(1) 1999, pp. 67-93. 55. Kock, Ned “Can Communication Medium Limitations Foster Better Group Discussion? An Action Research Study,” Information & Management 34(5) 1998, pp. 295-305. 56. ------ “Compensatory Adaptation to Lean Medium: An Action Research Investigation of Electronic Communication in Process Improvement Group,” IEEE Transactions on Professional Communication 44(4) 2001, pp. 267-285. 57. Kock, N. and Davison, R. “Can Lean Media Support Knowledge Sharing? Investigating a Hidden Advantage of Process Improvement,” IEEE Transactions on Engineering Management 50(2) 2003, pp. 151-163. 58. Kolko, B. and Reid, E. “Dissolution and Fragmentation: Problems in On-Line Communities,” in Cybersociety 2.0: Revisting Computer-Mediated Communication and Community, Steven G. Jones (ed.), Sage, Thousand Oaks, California, 1998, pp. 212-229. 59. Lash, Scott Critique of Information, Sage, London, 2002. 60. Lee, Allen S. “Electronic Mail as a Medium for Rich Communication: An Empirical Investigation Using Hermeneutic Interpretation,” MIS Quarterly 18(2) 1994, pp. 143-157. 61. Leimeister, J.M. Schweizer, K. Leimeister, S. and Krcmar, H.” Do Virtual Communities Matter for the Social Support of Patients?; Antecedents and Effects of Virtual Relationships in Online Communities,” Information Technology & People, 21(4) 2008, pp. 350-374. 62. Lindlof, T.R. and Shatzer, M.J. “Media Ethnography in Virtual Space: Strategies, Limits, and Possibilities,” Journal of Broadcasting & Electronic Media 42(2) 1998, pp. 170-189. 63. Linton, Ralph The Study of Man, Appleton-Century, New York, 1936. 64. Ma, M. and Agarwal, R. “Through a Glass Darkly: Information Technology Design, Identity Verification, and Knowledge Contribution in Online Communities,” Information Systems Research 18(1) 2007, pp. 42-67. 65. Manning, Peter K. “Information Technology in the Police Context: The ‘Sailor’ Phone,” in Information Technology and Organizational Transformation: History, Rhetoric, and Practice, Yates J. & Maanen J.V. (eds.), Sage, Thousand Oaks, CA., 2001, pp. 205-222. 66. McCullagh, Karen “Blogging: Self Presentation and Privacy,” Information & Communications Technology Law, 17(1) 2008, pp. 3-23. 67. McCormick, Donald W. “Dramaturgical Analysis of Organizational Change and Conflict,” Journal of Organizational Change 20(5) 2007, pp. 685-599. 68. McCreary, Lew “What was Privacy?” Harvard Business Review 86(10) 2008, pp. 123-131. 69. McGinity, Meg “Surfing Your Turf,” Communications of the ACM 43(4) 2000, pp. 19-21. 70. Myers, Michael D. “A Disaster for Everyone to See: An Interpretive Analysis of A Failed IS Project,” Accounting Management & Information Technology 4(4) 1994, pp.185-201. 71. ------ “Hermeneutics in Information Systems Research,” in Social Theory and Philosophy for Information Systems, J. Mingers&L. Willcocks (eds.), John Wiely&Sons, England, 2004, pp.103-128. 72. Myers, M.D. and Newman, M “The Qualitative Interview in IS Research: Examining the Craft,” Information and Organization 17(1) 2007, pp. 2-26. 73. Ngwenyama, O.K. and Lee, A.S. “Communication Richness in Electronic Mail: Critical Social Theory and the Contextuality of meaning,” MIS Quarterly 21(2) 1997, pp. 145-167. 74. Ocker, R., Fjermestad, J., Hiltz, S.R. and Johnson, K. “Effects of Four Modes of Group Communication on the Outcomes of Software Requirements Determination,” Journal of Management Information Systems 15(1) 1998, pp. 99-118. 75. Orlikowski, W.J. and Baroudi, J.J. “Studying Information Technology in Organizations: Research Approach and Assumptions,” Information Systems Research 2(1) 1991, pp. 1-28. 76. Orlikowski, W.J. and Robey, D. “Information Technology and the Structuring of Organizations,” Information Systems Research 2(2) 1991, pp. 143-169. 77. Orlikowski, Wanda J. “CASE Tools as Organzaitonal Change: Investigating Incremental and Radical Change in Systems Development,” MIS Quarterly 17(3) 1993, pp. 309-340. 78. Panteli, N. and Duncan, E. “Trust and Temporary Virtual Teams: Alternative Explanations and Dramaturgical Relationships,” Information Technology&People 17(4) 2004, pp. 423-441. 79. Papacharissi, Zizi “The Self Online: The Utility of Personal Home Pages,” Journal of Broadcasting & Electronic Media 46(3) 2002(a), pp. 346-368. 80. ------ “The Presentation of Self in Virtual Life: Characteristics of Personal Home Pages,” Journalism and Mass Communication Quarterly 79(3) 2002(b), pp. 643-660. 81. Philippson, Steven “Money laundering on the Internet,” Computers & Security 20(6) 2001, pp. 485-490. 82. Poritz, Jonathan “Who Searches the Searchers? Community Privacy in the Age of Monolithic Search Engines,” Information Society 23(5) 2007, pp.383-389. 83. Ramirez, Jr., A., Walther, J.B. and Sunnafrank, M. “Information-Seeking Strategies, Uncertainty, and Computer-Mediated Communication Toward a Conceptual Model,” Human Communication Research 28(2) 2002, pp. 213-228. 84. Rice, Ronald “Task Analyzability, Use of New Media, and Effectiveness: A Multi-Site Exploration of Media Richness,” Organization Science 3(4) 1992, pp. 475-500. 85. ------ “Media Appropriateness: Using Social Presence Theory to Compare Traditional and New Organizational Media,” Human Communication Research 19(4) 1993, pp. 451-484. 86. Robert, L.P. and Dennis, A.R. “Paradox of Richness: A Cognitive Model of Media Choice,” IEEE Transactions on Professional Communication 48(1) 2005, pp. 10-21. 87. Robey, D. and Markus, M.L. “Information Technology and Organizational Change: Causal Structure in Theory and Research,” Management Science 34(5) 1988, pp. 583-598. 88. Ross, Drew A.R. “Backstage with the Knowledge Boys and Girls: Goffman and Distributed Agency in an Organic Online Community,” Organization Studies 28(3) 2007, pp. 307-325. 89. Sannicolas, Nikki “Erving Goffman, Dramaturgy, and On-Line Relationships,” Cybersociology Magazine (1) 1997, http://www.cybersociology.com/files/1_2_sannicolas.html. 90. Sharrock, Wes “The Omnipotence of the Actor: Erving Goffman on ‘the definition of the situation’,” in Goffman and Social Organization: Studies in a Sociological Legacy, Greg Smith (ed.), Routledge, London, 1999, pp. 119-137. 91. Sia, C.L., Tan, B.C.Y. and Wei, K.K. “Group Polarization and Computer-Mediated Communication: Effects of Communication Cues, Social Presence, and Anonymity,” Information Systems Research, 13(1) 2002, pp.70-90. 92. Smith, Greg “Introduction: Interpreting Goffman’s Sociological Legacy,” in Goffman and Social Organization: Studies in a Sociological Legacy, Greg Smith (ed.), Routledge, London, 1999, pp. 1-18. 93. Sproll, L. and Kiesler, S. “Reducing Social Context Cues: Electronic Mail in Organizational Communication,” Management Science 32(1) 1986, pp. 1492-1512. 94. Swann, Jr., W.B., Polzer, J.T., Seyle, D.C. and Ko, S.J. “Finding Value in Diversity: Verification of Personal and Social Self-Views in Diverse Groups,” Academy of Management Review 29(1) 2004, pp. 9-27. 95. Tayor, J. and MacDonald, J. “The Effects of Asynchronous Computer-Mediated Group Interaction on Group Processes,” Social Science Computer Review 20(3) 2002, pp. 260-274. 96. Thomas, W.I. and Thomas, D.S. The Child in America: behavior problems and programs, A.A. Knopf, New York, 1928. 97. Trammell, K.D. and Keshelashvili A. “Examining the New Influencers: A Self-Presentation Study of A-List Blogs,” Journalism & Mass Communication Quarterly 82(4) 2005, pp. 968-982. 98. Trevino, L.K., Lengel, R.H.. and Daft, R.H. “Media Symbolism, Media Richness, and Media Choice in Organizations: A Symbolic Interactionist Perspective,” Communication Research 14(5) 1987, pp. 553-574. 99. Trevino, L.K., Daft, R.L. and Lengel, R.H. “Understanding Managers’ Media Choices: A Symbolic Interactionist Perspective,” in Organizations and Communication Technology, J. Fulk and C. Steinfield (eds.), Sage, Thousand Oaks, CA, 1990, pp. 71-94 100. Turner, J.W., Grube, J.A. and Meyers, J. “Developing an Optimal Match Within Online Communities: An Exploration of CMC support Communities and Traditional Support,” Journal of Communication 51(2) 2001, pp. 231-251. 101. Turner Ralph H. “Role-Taking: Process versus Conformity” in Human Behavior and Social Processes: An Interactionist Approach, A.M. Ross (ed.), Houghton Mifflin, Boston, 1962. 102. Turkle, Sherry Life on the Screen: Identity in the Age of the Internet, Simon&Schuster, New York, 1995. 103. Vaast, Emmanuelle “Playing with Masks: Fragmentation and Continuity in the Presentation of Self in an Occupational Online Forum,” Information Technology & People 20(4) 2007, pp.334-351. 104. Van Maanen, John “The Fact of Fiction in Organizational Ethnography,” Administrative Science Quarterly 24(4) 1979, pp. 539-550. 105. Walsham, Geoff “Interpretive Case Studies in IS Research: Nature and Method,” European Journal of Information Systems 4(2) 1995, pp. 74-81. 106. Walther, Joseph B. “Interpersonal Effects in Computer-Mediated Interaction: A Relational Perspective,” Communication Research 19(1) 1992, pp. 52-90. 107. ------“Computer-Mediated Communication: Impersonal, Interpersonal, and Hyperpersonal Interaction,” Communication Research 23(1) 1996, pp. 3-43. 108. Weisband, S.P., Schneider, S.K. and Connolly, T. “Computer-Mediated Communication and Social Information: Status Salience and Status Differences,” Academy of Management Journal 38(4) 1995, pp. 1124-1995. 109. Wertheim, Margaret The Pearly Gates of Cyberspace, Norton, New York, 1999. 110. Wilshire, Bruce W. Role Playing and Identity: The Limits of Theatre as Metaphor, Indiana University Press, Bloomington, 1982. 111. Wilson, S.M. and Peterson, L.C. “The Anthropology of Online Communities,” Annual Review Anthropology 31 2003, pp. 449-467. 112. Winter, S.J., Saunders, C. and Hart P. “Electronic Window Dressing: Impression Management with Websites,” European Journal of Information Systems 12(4) 2003, pp. 309-322. 113. Wynn, E. and Katz, J.E. “Hyperbole over Cyberspace: Self-Presentation and Social Boundaries in Internet Home Pages and Discourse,” The Information Society 13(4) 1997, pp. 297-327. 114. Yates, J. and Orlikowski, W.J. “Genres of Organizational Communication: A Structurational Approach to Studying Communication and Media,” Academy of Management Review 17(2) 1992, pp. 299-326. 115. Yoo, Y. and Alavi, M. “Media and Group Cohesion: Relative Influence on Social Presence, Task Participation, and Group Consensus,” MIS Quarterly 25(3) 2001, pp. 371-390. | |
| dc.identifier.uri | http://tdr.lib.ntu.edu.tw/jspui/handle/123456789/26129 | - |
| dc.description.abstract | 網路社群的互動,因為個人的實體形象與身分皆隱匿在電腦之後,人際互動的場域和實體世界互不干涉,人們很容易把網路社群做為獨立於實體世界之外的管道,在這裡建構實體世界未能達成的理想形象,實踐實體世界之外的人際關係,或是抒發無法在實體世界充分表露的言語。但在另一方面,網路具有搜尋與互相連結的功能,網路社群中私密的發言、隱匿的身分和理想化的人格,很容易在互相參照中與實體世界發生連結,成為公開流傳的訊息,或是暴露個人的實體資料。此外,當個人希望能將實體形象在網路社群中傳遞,或是社群貼文的閱覽人希望了解發文者的實體形象時,往往因為缺乏情境脈絡和社會暗示而顯得困難重重。然而,過去研究似乎都偏重於強調網路互動的私密性:參與者在其間可以抒發實體世界不得表露的言語,可以自由塑造理想中的形象並且隱藏不欲人知的部分,甚至創造一個和現實中不一致的身分;對於因網路強大的搜尋和連結功能所造成的私下發言被公開的流傳,個人實體資料被查閱,以及網路身分和實體身分互相延續的部分較少著墨。
本研究以劇場理論觀點為研究指引,觀察網路社群中的文字互動,從「公開表述與私下議論」、「理想形象的塑造與真實形象的揭露」、「網路身分與實體身分之關連性」三方面來探討網路社群互動中對立現象並存的狀況,並且超越劇場理論以面對面互動為解釋範圍的侷限,歸結出網路文字互動特有的現象。在研究方法的部分,本研究為求對個案在情境下的個殊現象有較為深入的探討,採取詮釋性哲學的研究立場,使用網路俗民誌學的資料採集方式,並經過三次的釋義循環來理解觀察社群中的互動現象。 本研究將研究主題放在空間和時間的脈絡下詮釋,看到了「公開表述與私下議論」、「理想形象的塑造與真實形象的揭露」、「網路身分與實體身分之關連性」在空間、時間延展下,表現出不同於過往研究論述專注於網路互動某個「時空點」的現象。平衡了過去學術上偏向於認為網路社群適合私密交流、有利於主導形象的研究觀點,以及偏重於網路身分與實體身分間斷裂性的研究興趣;同時,也提醒了未來擬採用劇場理論觀點的網路互動研究,跳脫過去研究直接套用理論隱喻,未對理論前提實為面對面互動進行思辯的疏漏。 | zh_TW |
| dc.description.abstract | Past studies mostly suggest that virtual community be the platform especially applicable for private exchange and for people to build up their ideal images because people express themselves through hiding their real images and identities behind computers. However, few studies mentioned that the anonymously private opinions at cyberspace are easily cited and forwarded as public ones because of the powerful search engines and hyperlink connections of internet; the elaborate internet images may also easily collapse because of the cross reference at cyberspace.
This study considers that the virtual community can be both public and private channel at the same time, its superior situation for individuals to dominate personal images is marginalized as time pass by, and the personal virtual identity and real identity is not only continuous but complimentary. The study is conducted as an interpretive research and takes the views of dramaturgical theory to unobtrusively observe a virtual community. The field data is collected in the light of virtual ethnography and analyzed upon hermeneutic circle. With the arguments in this study, the author expects to provide an alternative perspective for academic research in virtual community, and the administrative team of every virtual community will recognize the said characteristics in online interaction and elaborate appropriate online environment for their members. | en |
| dc.description.provenance | Made available in DSpace on 2021-06-08T07:00:56Z (GMT). No. of bitstreams: 1 ntu-98-D89725006-1.pdf: 984766 bytes, checksum: 69dde3abb3aa7017ec6158b30c520a04 (MD5) Previous issue date: 2009 | en |
| dc.description.tableofcontents | 目錄
口試委員會審定書 ……………………………………………………i 誌謝 ……………………………………………………………………ii 中文摘要 ………………………………………………………………iv 英文摘要 ………………………………………………………………vi 第壹章 緒論…………………………………………………………1 第一節 研究動機 …………………………………………………1 第二節 研究目的 …………………………………………………2 第三節 研究範圍 …………………………………………………5 第四節 內容概要 …………………………………………………7 第貳章 文獻探討……………………………………………………9 第一節 劇場理論及其評論 ………………………………………9 (一) 劇場理論(dramaturgical theory)梗概…………………9 (二) 有關劇場理論的一般性批評 ……………………………14 (三) 小結 ………………………………………………………18 第二節 網路互動現象的文獻回顧………………………………19 (一) 探討網路空間之私密性與公開性的相關研究 …………19 (二) 探討網路空間自我表現的相關研究 ……………………26 (三) 網路身分(virtual identity)與實體身分(real identity)關連性的研究……………………………………………36 (四) 小結………………………………………………………41 第參章 研究方法 …………………………………………………42 第一節 詮釋性研究 ……………………………………………42 (一) 研究典範…………………………………………………42 (二) 研究特徵…………………………………………………43 (三) 理論的定位………………………………………………44 (四) 研究者的角色……………………………………………45 第二節 網路俗民誌學(virtual ethnography)的資料收集方式47 (一) 網路俗民誌學和傳統俗民誌學的差異 ………………47 (二) 個案選擇與資料收集……………………………………49 (三) 資料收集方式所涉及的研究倫理………………………50 第三節 透過釋義循環(hermeneutic circle)的資料分析 ……51 (一) 釋義學與釋義循環………………………………………51 (二) 詮釋性研究的評估標準…………………………………54 第肆章 個案背景資料……………………………………………57 第一節 社群成立緣起 …………………………………………57 第二節 觀察標的 ………………………………………………58 第三節 社群文化 ………………………………………………59 第伍章 個案分析與詮釋結果 ……………………………………63 第一節 網路社群的公開表述與私下議論 …………………63 (一) 「美國生產經驗」話題之詮釋 ………………………63 (二) 「爭取監護權」話題之詮釋 …………………………66 (三) 詮釋結果 ………………………………………………67 第二節 理想形象的塑造與真實形象的揭露 ………………73 (一) 社員大會前的和諧與衝突之詮釋 ……………………73 (二) 柔柔的溫和與剛烈之詮釋 ……………………………77 (三) 詮釋結果 ………………………………………………78 第三節 網路身分與實體身分的關連性………………………82 (一) 艾瑪談醫療技術的詮釋 ………………………………82 (二) 實體世界會面的詮釋 …………………………………85 (三) 詮釋結果 ………………………………………………86 第陸章 結論 ……………………………………………………91 第一節 綜合整理………………………………………………91 第二節 在理論上的意涵………………………………………93 第三節 在研究方法上的意涵…………………………………94 第四節 在實務上的意涵………………………………………96 第五節 研究限制與未來研究方向……………………………97 參考文獻 ……………………………………………………………99 表次 表一 劇場理論常用之隱喻 ……………………………………13 表二 學界對於劇場理論的批評…………………………………16 表三 以劇場理論探討網路空間之私密性與公開性的相關研究25 表四 以劇場理論探討網路空間自我表現的相關研究…………34 表五 以劇場理論探討網路身分和實體身分關連性的研究……40 表六 研究典範及其關注取向之對照表…………………………42 表七 學域內詮釋性研究之理論定位舉例………………………45 表八 研究者的角色及其特性……………………………………46 表九 網路俗民誌學和傳統俗民誌學的差異對照表……………48 表十 本研究之釋義循環…………………………………………54 | |
| dc.language.iso | zh-TW | |
| dc.subject | 網路形象 | zh_TW |
| dc.subject | 網路社群 | zh_TW |
| dc.subject | 詮釋性研究 | zh_TW |
| dc.subject | 劇場理論 | zh_TW |
| dc.subject | 網路隱私 | zh_TW |
| dc.subject | 網路身分 | zh_TW |
| dc.subject | virtual community | en |
| dc.subject | internet privacy | en |
| dc.subject | dramaturgical theory | en |
| dc.subject | virtual image | en |
| dc.subject | virtual identity | en |
| dc.subject | interpretive research | en |
| dc.title | 網路社群互動現象之詮釋性研究 | zh_TW |
| dc.title | A World of Paradox: An Interpretive Study in Virtual Community | en |
| dc.type | Thesis | |
| dc.date.schoolyear | 97-2 | |
| dc.description.degree | 博士 | |
| dc.contributor.oralexamcommittee | 許士軍,沈佩蒂,陳海鳴,翁崇雄 | |
| dc.subject.keyword | 網路社群,詮釋性研究,劇場理論,網路隱私,網路形象,網路身分, | zh_TW |
| dc.subject.keyword | virtual community,interpretive research,dramaturgical theory,internet privacy,virtual image,virtual identity, | en |
| dc.relation.page | 113 | |
| dc.rights.note | 未授權 | |
| dc.date.accepted | 2009-05-22 | |
| dc.contributor.author-college | 管理學院 | zh_TW |
| dc.contributor.author-dept | 資訊管理學研究所 | zh_TW |
| 顯示於系所單位: | 資訊管理學系 | |
文件中的檔案:
| 檔案 | 大小 | 格式 | |
|---|---|---|---|
| ntu-98-1.pdf 未授權公開取用 | 961.69 kB | Adobe PDF |
系統中的文件,除了特別指名其著作權條款之外,均受到著作權保護,並且保留所有的權利。
