Skip navigation

DSpace

機構典藏 DSpace 系統致力於保存各式數位資料(如:文字、圖片、PDF)並使其易於取用。

點此認識 DSpace
DSpace logo
English
中文
  • 瀏覽論文
    • 校院系所
    • 出版年
    • 作者
    • 標題
    • 關鍵字
  • 搜尋 TDR
  • 授權 Q&A
  • 幫助
    • 我的頁面
    • 接受 E-mail 通知
    • 編輯個人資料
  1. NTU Theses and Dissertations Repository
  2. 文學院
  3. 圖書資訊學系
請用此 Handle URI 來引用此文件: http://tdr.lib.ntu.edu.tw/jspui/handle/123456789/87209
完整後設資料紀錄
DC 欄位值語言
dc.contributor.advisor蔡天怡zh_TW
dc.contributor.advisorTien-I Tsaien
dc.contributor.author陳思安zh_TW
dc.contributor.authorSih-An Chenen
dc.date.accessioned2023-05-18T16:22:59Z-
dc.date.available2024-09-26-
dc.date.copyright2023-05-10-
dc.date.issued2023-
dc.date.submitted2023-02-20-
dc.identifier.citationFlick, U(2007)。質性研究導論(Qualitative Sozialforschung)(李政賢、廖志恒、林靜如譯)。臺北市:五南。(原作2002年出版)
Kvale, S.(2010)。訪談研究法(陳育含譯)。新北市:韋伯文化科技。(原作2007年出版)
方正璽、林芳羽(2010)。網路上的暴力正義-人肉搜尋的現象與探討。資訊與管理科學,3(2),23-35。
江信宏(2012)。網路社會化運動「人肉搜索」的正義與關懷倫理探討。未出版之碩士論文,華梵大學哲學研究所,新北市。
吳美美、Foster, J.(2009)。探究小組協作資訊尋求的成功與困難因素。教育資料與圖書館學,47(2),123-146。
吳訓孝(2020)。網路隱私權:被遺忘權。法規與遵循,3:1,65-87。
吳裕勝(2011)。人肉搜索:資訊科技與監視社會共謀事件。2011年文化研究年會。台北市。
批踢踢實業坊(2021)。批踢踢實業坊-What is Ptt?。2021年5月1日。檢自:https://www.ptt.cc/index.html
李仲彬(2019)。什麼環境中才敢出聲? 微觀、宏觀、文化、與制度途徑之「信任」 對網路公民參與行為的影響,行政暨政策學報,(69),1-47。
李惠婷(2010)。台灣人肉搜索文化之探討。未出版之碩士論文,國立交通大學理學院科技與數位學習學程,新竹市。
周文玲(2017)。「網路肉搜」對個人隱私侵害之研究。未出版之碩士論文,元智大學資訊管理研究所,桃園市。
林奇秀(2011)。人肉搜索初探。圖書與資訊學刊,79,31-47。
林芬慧、蕭羽廷(2012)。無名小站-We Come, We See, We Blog。管理評論,31(2),81-97。
林思平(2010,12月)。人肉搜索、身體與科技:理論概念的初探,2010新聞的公共性與科技文化學術研討會。台北市。
林嘉昊(2022)。「人肉搜索」刑事規範之研究——從人肉搜索到網路攻擊。未出版之碩士論文,國立中正大學法律系研究所,嘉義縣。
范怡婷(2011)。網路傳播倫理與隱私之初探-以臺灣人肉搜索事件為例。未出版之碩士論文,世新大學新聞學研究所,台北市。
殷俊(2009)。從輿論喧囂到理性回歸-對網絡人肉搜索的多維研究。成都:四川大學。
袁涵郁、陳百齡(2013,7月)。由人肉搜索事件看網路集體行動:情節、角色與協力的尋人行為。2013年中華傳播學會年會論文研討會,台北市。
康竹嫺(2015)。人肉搜索與個人資料保護之研究。未出版之碩士論文,東吳大學法律研究所,台北市。
張俊培(2011)。人肉搜索「遊戲」經驗之初探。未出版之碩士論文,世新大學新聞學研究所,台北市。
莊宜庭(2019)。人肉搜索之法律爭議分析——數位足跡時代下的資訊自主權觀點。未出版之碩士論文,國立交通大學科技法律研究所,新竹市。
莊竣顯、蔡天怡(2019)。以協作意願與資訊來源管道探究大學生個人差異及其小組報告之協作資訊尋求行為。圖書資訊學刊,17(2),103-129。
許富盛、林育昇(2010,7月)。PTT 人肉搜索現象之初探-以 [八八水災佔線惡搞事件] 為例。在2010年中華傳播學會年會。嘉義市。
陳向明(2002)。社會科學質的研究。臺北市:五南。
陳品浩(2016)。失控的正義—探討人肉搜索動機與群體監控之影響。未出版之碩士論文,臺北大學犯罪學研究所,新北市。
凱撒之鷹(2009)。人肉搜索技巧大公開。密技偷偷報,(47)。
黃奕甯(2017)。探討人肉搜索時資訊傳遞之關鍵資訊間相互影響的關係。未出版之碩士論文,國立高雄大學資訊管理學研究所,高雄市。
楊忠威(2012)。論網路人肉搜索之相關法律問題-以隱私權保護為中心。未出版之碩士論文,國立高雄第一科技大學科技法律研究所,高雄市。
楊琬琳、蔡天怡(2018)。合作學習情境中師資培育生教案發展之協作資訊行為。圖書資訊學刊,16 (1),109-139。
劉智維(2009,11月20 日)。旗山10餘犬中毒亡 飼主懸賞萬元緝兇。蘋果日報,A6版。
蕭國維(2014)。人肉搜索行為之影響因素探討。未出版之碩士論文,屏東科技大學資訊管理系所,屏東縣。
鮑家慶(2012)。使用「人肉搜尋」法找尋1969~1979年期間《科學月刊》本土化過程中翻譯、節譯、改寫、取材Scientific American 文字之研究。科學史通訊,(36),1-20。
謝珍妮(2010)。科技機構研究人員協同合作與資訊行為之研究。未出版之碩士論文,國立臺灣大學圖書資訊學研究所,台北市。
顏肇甫(2015)。社群網站與使用者自我揭露現象之研究-以隱私顧慮與人肉搜索為干擾變數。未出版之碩士論文,國立臺東大學資訊管理研究所,台東市。
方正璽、林芳羽(2010)。網路上的暴力正義-人肉搜尋的現象與探討。資訊與管理科學,3(2),23-35。
吳美美、Foster, J.(2009)。探究小組協作資訊尋求的成功與困難因素。教育資料與圖書館學,47(2),123-146。
吳裕勝(2011)。人肉搜索:資訊科技與監視社會共謀事件。2011年文化研究年會。台北市。
吳訓孝(2020)。網路隱私權:被遺忘權。法規與遵循,3:1,65-87。
批踢踢實業坊(2021)。批踢踢實業坊-What is Ptt?。2021年5月1日。檢自:https://www.ptt.cc/index.html
李惠婷(2010)。台灣人肉搜索文化之探討。未出版之碩士論文,國立交通大學理學院科技與數位學習學程,新竹市。
林奇秀(2011)。人肉搜索初探。圖書與資訊學刊,79,31-47。
林思平(2010,12月)。人肉搜索、身體與科技:理論概念的初探,2010新聞的公共性與科技文化學術研討會。台北市。
林嘉昊(2022)。「人肉搜索」刑事規範之研究——從人肉搜索到網路攻擊。未出版之碩士論文,國立中正大學法律系研究所,嘉義縣。
范怡婷(2011)。網路傳播倫理與隱私之初探-以臺灣人肉搜索事件為例。未出版之碩士論文,世新大學新聞學研究所,台北市。
殷俊(2009)。從輿論喧囂到理性回歸-對網絡人肉搜索的多維研究。成都:四川大學。
袁涵郁、陳百齡(2013,7月)。由人肉搜索事件看網路集體行動:情節、角色與協力的尋人行為。2013年中華傳播學會年會論文研討會,台北市。
張俊培(2011)。人肉搜索「遊戲」經驗之初探。未出版之碩士論文,世新大學新聞學研究所,台北市。
莊宜庭(2019)。人肉搜索之法律爭議分析——數位足跡時代下的資訊自主權觀點。未出版之碩士論文,國立交通大學科技法律研究所,新竹市。
莊竣顯、蔡天怡(2019)。以協作意願與資訊來源管道探究大學生個人差異及其小組報告之協作資訊尋求行為。圖書資訊學刊,17(2),103-129。
許富盛、林育昇(2010,7月)。PTT 人肉搜索現象之初探-以 [八八水災佔線惡搞事件] 為例。在2010年中華傳播學會年會。嘉義市。
陳向明(2002)。社會科學質的研究。臺北市:五南。
黃奕甯(2017)。探討人肉搜索時資訊傳遞之關鍵資訊間相互影響的關係。未出版之碩士論文,國立高雄大學資訊管理學研究所,高雄市。
楊琬琳、蔡天怡(2018)。合作學習情境中師資培育生教案發展之協作資訊行為。圖書資訊學刊,16 (1),109-139。
劉智維(2009,11月20 日)。旗山10餘犬中毒亡 飼主懸賞萬元緝兇。蘋果日報,A6版。
謝珍妮(2010)。科技機構研究人員協同合作與資訊行為之研究。未出版之碩士論文,國立臺灣大學圖書資訊學研究所,台北市。
Ahearn, F., & Horan, E. (2010). How to Disappear: Erase Your Digital Footprint, Leave False Trails, and Vanish Without a Trace. Rowman & Littlefield.
Alexy, E. M., Burgess, A. W., Baker, T., & Smoyak, S. A. (2005). Perceptions of cyberstalking among college students. Brief Treatment and Crisis Intervention, 5, 279-289. doi: 10.1093/brief-treatment/mhi020
Bates, M. J. (2010). Information behavior. Encyclopedia of Library and Information Sciences, 3, 2381-2391.
Blackwell, A. F., Stringer, M., Toye, E. F., & Rode, J. A. (2004, April). Tangible interface for collaborative information retrieval. In CHI'04 extended abstracts on Human factors in computing systems (pp. 1473-1476).
Brabham, D. C. (2008). Crowdsourcing as a model for problem solving: An introduction and cases. Convergence, 14(1), 75-90.
Bruce, H., Fidel, R., Pejtersen, A. M., Dumais, S., Grudin, J., & Poltrock, S. (2003). A comparison of the collaborative information retrieval behaviour of two design teams. The New Review of Information Behaviour Research, 4(1), 139-153.
Chang, L. Y., & Poon, R. (2017). Internet vigilantism: Attitudes and experiences of university students toward cyber crowdsourcing in Hong Kong. International journal of offender therapy and comparative criminology, 61(16), 1912-1932. doi: 10.1177/0306624X16639037.
Chao, C. H., & Tao, Y. H. (2012). Human flesh search: A supplemental review. Cyberpsychology, Behavior, and Social Networking, 15(7), 350-356.
Chen, S. A., & Tsai, T.I. (2020, December). Examining Information Behavior in Human Flesh Search through Four Major Newspapers in Taiwan, Poster session presented at the Digital Archives and Digital Humanities, Online.
Chen, S., Wang, T., Feng, Y., Liu, Z., & Huang, J. (2018, June). Comparing Social Influence with Collaborative Influence in Human Flesh Search. In 2018 Eighth International Conference on Information Science and Technology (ICIST) (pp. 444-449). IEEE.
Cheong, P. H., & Gong, J. (2010). Cyber vigilantism, transmedia collective intelligence, and civic participation. Chinese Journal of Communication, 3(4), 471-487.
Chia, S. C. (2020). Seeking justice on the web: How news media and social norms drive the practice of cyber vigilantism. Social Science Computer Review, 38(6), 655-672.
Davis, R., & Smith, R. G. (1983). Negotiation as a metaphor for distributed problem solving. Artificial intelligence, 20(1), 63-109.
Denning, P. J., & Yaholkovsky, P. (2008). Getting to" we". Communications of the ACM, 51(4), 19-24.
Douglas, D. M. (2016). Doxing: a conceptual analysis. Ethics and Information Technology, 18(3), 199-210.
El Ouirdi, M., El Ouirdi, A., Segers, J., & Pais, I. (2016). Technology adoption in employee recruitment: The case of social media in Central and Eastern Europe. Computers in Human Behavior, 57, 240-249. doi: 10.1016/j.chb.2015.12.043
Evans, B. M., & Chi, E. H. (2008, November). Towards a model of understanding social search. In Proceedings of the 2008 ACM conference on Computer supported cooperative work (pp. 485-494).
Fidel, R., Bruce, H., Pejtersen, A. M., Dumais, S., Grudin, J., & Poltrock, S. (2000). Collaborative information retrieval (CIR). The New Review of Information Behaviour Research, 1, 235-247.
Fidel, R., Mark Pejtersen, A., Cleal, B., & Bruce, H. (2004). A multidimensional approach to the study of human‐information interaction: A case study of collaborative information retrieval. Journal of the Association for Information Science and Technology, 55(11), 939-953.
Finn, J. (2004). A survey of online harassment at a university campus. Journal of Interpersonal Violence, 19, 468–483. doi: 10.1177/0886260503262083
Flanagan, J. C. (1954). The Critical Incident Technique. Psychological Bulletin, 51, 327-58.
Foster, A., & Ford, N. (2003). Serendipity and information seeking: an empirical study. Journal of Documentation, 59(3), 321-340.
Foster, J. (2006). Collaborative information seeking and retrieval. Annual Review of Information Science and Technology, 40(1), 329-356.
Frampton, J. R., & Fox, J. (2021). Monitoring, creeping, or surveillance? A synthesis of online social information seeking concepts. Review of Communication Research, 9, 1-42.
Gao, L. (2016). The emergence of the human flesh search engine and political protest in China: Exploring the Internet and online collective action. Media, Culture & Society, 38(3), 349-364.
General, U. A. (1999). Cyberstalking: A new challenge for law enforcement and industry. Report from the Attorney General to the Vice President.
Gray, B. (1989). Collaborating: Finding common ground for multiparty problems. San Francisco: Yossey-Bass.
Han, P. C. (2018, October). Human Flesh Search and a Case of Sexual Assault in Taiwan: A Call for Interdisciplinary Collaborations. In 2018 Pacific Neighborhood Consortium Annual Conference and Joint Meetings (PNC) (pp. 1-6). IEEE.
Hansen, P., & Järvelin, K. (2005). Collaborative information retrieval in an information-intensive domain. Information Processing & Management, 41(5), 1101-1119.
Hansen, P., Shah, C., & Klas, C. P. (2015). Collaborative information seeking: Best practices, new domains and new thoughts. Springer.
Heng, C. S., Lin, Z., Xu, X., Zhang, Y., & Zhao, Y. (2019). Human Flesh Search: what did we find?. Information & Management, 56(4), 476-492.
Hertzum, M. (2008). Collaborative information seeking: The combined activity of information seeking and collaborative grounding. Information Processing & Management, 44(2), 957-962.
Huang, Q. (2021). The mediated and mediatised justice-seeking: Chinese digital vigilantism from 2006 to 2018. Internet Histories, 5(3-4), 304-322.
Hyldegård, J. (2006). Collaborative information behaviour––exploring Kuhlthau’s Information Search Process model in a group-based educational setting. Information processing & management, 42(1), 276-298.
Krasnova, H., Widjaja, T., Buxmann, P., Wenninger, h., Benbasat I. (2015) Research note—why following friends can hurt you: An exploratory investigation of the effects of envy on social networking sites among college-age users. Information Systems Research, 26, 585-605. doi: 10.1287/isre.2015.0588
London, S. (1995). Collaboration and community. Richmond, VA: Pew Partnership for Civic Change, University of Richmond.
Magnier, M. (2008, November 23). Cyberspace gumshoes are afoot. Los Angels Times, p. A12.
March, E., Grieve, R., Clancy, E., Klettke, B., van Dick, R., & Hernandez Bark, A. S. (2021). The role of individual differences in cyber dating abuse perpetration. Cyberpsychology, Behavior, and Social Networking, 24(7), 457-463.
Marcum, C. D., & Higgins, G. E. (2019). Examining the effectiveness of academic scholarship on the fight against cyberbullying and cyberstalking. American Journal of Criminal Justice, 44, 645-655. doi: 10.1007/s12103-019-09482-8
Marcum, C. D., Higgins, G. E., & Poff, B. A. (2016). Exploratory investigation on theoretical predictors of the electronic leash. Computers in Human Behavior, 61, 213-218. doi:10.1016/j.chb.2016.03.010.
Miller, G. A. (1984). Informavores. The study of information: Interdisciplinary messages, 111-113.
Morris, M. R. (2008, April). A survey of collaborative web search practices. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (pp. 1657-1660).
Morris, M. R., & Horvitz, E. (2007, October). SearchTogether: an interface for collaborative web search. In Proceedings of the 20th annual ACM symposium on User interface software and technology (pp. 3-12).
Nhan, J., Huey, L., & Broll, R. (2017). Digilantism: An analysis of crowdsourcing and the Boston marathon bombings. The British journal of criminology, 57(2), 341-361.
Nian, F., Zhang, Y., & Liu, X. (2018, October). A Human Flesh Search Algorithm Based on Information Puzzle. In 2018 IEEE SmartWorld, Ubiquitous Intelligence & Computing, Advanced & Trusted Computing, Scalable Computing & Communications, Cloud & Big Data Computing, Internet of People and Smart City Innovation (SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI) (pp. 1243-1248).
O'Farrell, M., & Bates, J. (2009, May). Student information behaviours during group projects: A study of LIS students in University College Dublin, Ireland. In Aslib proceedings (Vol. 61, No. 3, pp. 302-315). Emerald Group Publishing Limited.
Pan, X. (2010). Hunt by the Crowd: an exploratory qualitative analysis on cyber surveillance in China. Global Media Journal, 9(16), 1-19.
Pirolli, P. (1997, March). Computational models of information scent-following in a very large browsable text collection. In Proceedings of the ACM SIGCHI Conference on Human factors in computing systems (pp. 3-10).
Pirolli, P. (2007). Information foraging theory: Adaptive interaction with information. Oxford University Press.
Pirolli, P., & Card, S. (1995, May). Information foraging in information access environments. In Proceedings of the SIGCHI conference on Human factors in computing systems (pp. 51-58).
Reddy, M. C., & Jansen, B. J. (2008). A model for understanding collaborative information behavior in context: A study of two healthcare teams. Information Processing & Management, 44(1), 256-273.
Roth, P. L., Bobko, P., Van Iddekinge,C. h., & Tatcher, J. B. (2016). Social media in employee-selection-related decisions: A research agenda for uncharted territory. Journal of Management, 42, 269-298. doi: 10.1177/0149206313503018
Sai, H., & Orito, Y. (2011, July). Information offering by anonymous in Japanese Human Flesh Search: Analysis of motivation in social media platform. In 2011 IEEE/IPSJ International Symposium on Applications and the Internet (pp. 592-595). IEEE.
Shah, C. (2009). Toward collaborative information seeking (CIS). arXiv preprint arXiv:0908.0709.
Shah, C. (2010a). Coagmento-a collaborative information seeking, synthesis and sense-making framework. Integrated demo at CSCW 2010, 6-11.
Shah, C. (2010b, November). Working in collaboration-what, why, and how. In Proceedings of Collaborative Information Retrieval Workshop at CSCW 2010.
Shah, C. (2012). Collaborative information seeking: The art and science of making the whole greater than the sum of all. Berlin Heidelberg: Springer Science & Business Media.
Shah, C. (2014a). Collaborative information seeking. Journal of the Association for Information Science and Technology, 65(2), 215-236.
Shah, C. (2014b). Evaluating collaborative information seeking–synthesis, suggestions, and structure. Journal of Information Science, 40(4), 460-475.
Shah, C. (2015). Collaborative information seeking: From ‘what?’and ‘why?’to ‘how?’and ‘so what?’. In Collaborative Information Seeking (pp. 3-16). Springer, Cham.
Shah, C. (2017). Social information seeking: Leveraging the wisdom of the crowd. Springer, Switzerland.
Smoker, M., & March, E. (2017). Predicting perpetration of intimate partner cyberstalking: Gender and the dark tetrad. Computers in Human Behavior, 72, 390-396. doi: 10.1016/j.chb.2017.03.012
Solove, D. J. (2007). The future of reputation: Gossip, rumor, and privacy on the Internet. Yale University Press.
Surowiecki, J. (2004). The Wisdom of Crowds: Why the Many Are Smarter Than the Few and How Collective Wisdom Shapes Business, Economies, Societies and Nations. Doubleday, New York, 2004.
Tao, Y. H., & Chao, C. H. (2011, December). Analysis of human flesh search in the Taiwanese context. In 2011 Second International Conference on Innovations in Bio-inspired Computing and Applications (pp. 187-190). IEEE.
Taylor-Powell, E. (1998). Evaluating collaboratives: Reaching the potential (No. 8). University of Wisconsin--Extension.
Tokunaga, R. S., & Aune, K. S. (2017). Cyber-defense: A taxonomy of tactics for managing cyberstalking. Journal of interpersonal violence, 32(10), 1451-1475.
Twidale, M., & Nichols, D. (1996). Collaborative browsing and visualisation of the search process. In Aslib Proceedings (Vol. 48, No. 7-8, pp. 177-182).
Wang, B., Hou, B., Yao, Y., & Yan, L. (2009, October). Human flesh search model incorporating network expansion and gossip with feedback. In 2009 13th IEEE/ACM International Symposium on Distributed Simulation and Real Time Applications (pp. 82-88). IEEE.
Wang, B., Yao, Y., Hou, B., Liao, D., & Chen, D. (2010, December). Knowledge aggregation in human flesh search. In 2010 IEEE/ACM Int'l Conference on Green Computing and Communications & Int'l Conference on Cyber, Physical and Social Computing (pp. 825-830). IEEE.
Wang, F. Y., Zeng, D., Hendler, J. A., Zhang, Q., Feng, Z., Gao, Y., ... & Lai, G. (2010). A study of the human flesh search engine: crowd-powered expansion of online knowledge. IEEE Computer Architecture Letters, 43(08), 45-53.
Wilson, T. D. (2000). Human information behavior. Informing Science, 3(2), 49-56.
Wise, k., Alhabash, S., & Park. h. (2010). Emotional responses during social information seeking on Facebook. Cyberpsychology, Behavior, and Social Networking, 13, 555-562. doi: 10.1089/cyber.2009.0365
Wolfe, J. M. (1994). Guided search 2.0 a revised model of visual search. Psychonomic bulletin & review, 1(2), 202-238.
Yang, G., & Zhang, Z. (2010, June). Analysis of the privacy issues of human flesh search engine. In 2010 International Conference on Computer and Communication Technologies in Agriculture Engineering (Vol. 1, pp. 51-54). IEEE.
Yardley, E., Lynes, A. G. T., Wilson, D., & Kelly, E. (2018). What’s the deal with ‘websleuthing’? News media representations of amateur detectives in networked spaces. Crime, Media, Culture, 14, 81-109. doi: 10.1177/1741659016674045
Zhang, Q., Wang, F. Y., Zeng, D., & Wang, T. (2012). Understanding crowd-powered search groups: a social network perspective. PLOS ONE, 7(6), e39749.
-
dc.identifier.urihttp://tdr.lib.ntu.edu.tw/jspui/handle/123456789/87209-
dc.description.abstract人肉搜索係伴隨網路發展出現的資訊行為,然過往研究多以法學、傳播學、資訊工程、管理學與社會學等觀點探討人肉搜索之現象,時至今日人肉搜索尚未有明確之定義釐清其內涵。有鑑於現有人肉搜索相關研究之文獻缺口,本研究欲以資訊學角度探究人肉搜索,從人肉搜索參與者之主觀角度理解其所參與之人肉搜索事件情境,及其如何於網路世界眾多資訊中追蹤網路使用者之數位足跡,調查特定個人或事件之資訊,以及過程中其如何與他人互動進行資訊交流。本研究之研究問題包括:一、人肉搜索發生之常見情境為何?二、人肉搜索參與者之資訊尋求策略為何?三、人肉搜索參與者之協作資訊行為特徵為何?
本研究採用半結構式深度訪談法,透過關鍵事件法方式進行訪談,以PTT為主要招募平台公開招募人肉搜索參與者,共計募得20位研究參與者為本研究之研究對象。本研究從事件發生之情境與歷程、參與者之資訊尋求策略以及協作資訊行為等面向,歸納人肉搜索參與者分享之事件經驗及觀點。
研究結果發現,人肉搜索事件類型中包含與自身無關,透過傳播媒體與社群平台催化之公眾事件,以及與自身相關屬日常社交生活之個人事件類型。參與者角色類型中包含嘗試幫助他人之行動者,以及將查找行為視為私密任務之潛水者。人肉搜索之主要動機為好奇心,其資訊需求範圍包含找尋或確認特定人物之真實身份、事件相關之事實性資訊,乃至特定人物之成長背景、個人言論與思考價值觀皆涵蓋其中。
人肉搜索參與者具備資訊覓食者之特性,以自身網路使用之經驗展開調查,設定資訊目標並評估成本效益,主動選擇特定或多元之資訊覓食地帶,以實際線索交叉比對或以直覺聯想推理追蹤過濾資訊氣味。資訊覓食經驗豐富之人肉搜索參與者,以自身特有之富集行為,發展出最佳化的資訊檢索策略以達成資訊濃縮提煉,減少時間成本花費並提高成功率。人肉搜索之事件情境中,包含未協作事件以及協作事件,未協作原因包含個人資訊隱私保護意識、查找能力受限之自我效能因素、成本效益評估避免查找任務重複之競先效應,以及預期他人會完成查找任務之搭便車效應。本研究以協作膠囊理論C5互動層級歸納協作事件,其中溝通、貢獻、協調、合作以及協作層級皆有案例分布,事件主要分布於貢獻層級,參與者多以單方面提供資訊方式進行交流。協作情況之時空分布方面,主要以異時異地以及同時同地情境居多,其中以異時異地為主,協作歷程中多採用等通訊工具以線上資訊傳遞互動方式進行。本研究根據前述發現,從資訊安全等層面提出相關建議,供相關單位參考。
zh_TW
dc.description.abstractHuman flesh search (HFS) can be viewed as an information behavior that grows along with the development of the Internet. Previous studies have mostly discussed the phenomenon of human flesh search from the perspectives of law, communication, information engineering, management, and sociology. Up until now, human flesh search has not yet been clearly defined and clarified. In view of the literature gap in the existing human-flesh-search-related research, this study intends to explore human flesh search from the perspective of information behavior. The current study aims to: 1. understand the contexts of the human flesh search events from the subjective perspective of human flesh search participants; 2. investigate how human flesh search participants trace information of specific individuals or events among a tremendous amount of information; 3. explore how human flesh search participants interact with one another. The research questions include: 1. What are the common situations of human flesh searches? 2. What are the information-seeking strategies of human flesh search participants? 3. What are the collaborative information behavior patterns of human flesh search participants?
Twenty participants were recruited mainly through specific social media forums that attract human flesh search participants. The event experience and opinions shared by the human flesh search participants were categorized based on the situations and processes of the event, participants' information-seeking strategies, and their collaborative information behavior.
The research findings identified self-related and -unrelated human-flesh-search events—Self-related events are personal events in social life, and self-unrelated events are public events catalyzed through media and social platforms. Participant roles are identified as actors and lurkers—Actors try to help others while lurkers feel that the act of searching needs to be kept secret. The major motivation of human flesh search participants is curiosity, and their information needs include finding or confirming the true identity of a specific person, factual information related to the events, sometimes as well as life history, personal background, and values of a specific person.
Human flesh search participants exhibit characteristics of information foragers. They conduct investigations based on their Internet use experience, set information goals and evaluate cost-effectiveness, actively choose specific or diverse foraging in information patches, cross-comparison with actual clues, or use intuition to associate inferential tracking and filtering information scent. Participants with rich experience in human flesh search show their own unique enrichment behavior. They achieve information concentration and refinement through information retrieval strategies, reducing time costs and increasing success rate.
Human flesh search scenarios include non-collaborative mode and collaborative mode. Non-collaborative scenarios typically happened due to personal information privacy protection, limited search capabilities, competitive mentality, and free-rider mentality. In collaborative scenarios, events can be mapped to all levels in the C5 model, including communication, contribution, coordination, cooperation, and collaboration. Nevertheless, most events reached the contribution level. Participants mostly communicate by providing information unilaterally. Most events were asynchronous-remote and synchronous-colocated. In the process of collaboration, human flesh search participants mostly use communication tools for online information sharing and interaction. Suggestions were provided and discussed based on the findings in this work.
According to the aforementioned research findings, this study puts forward relevant suggestions from the perspective of information security policy for reference by relevant units.
en
dc.description.provenanceSubmitted by admin ntu (admin@lib.ntu.edu.tw) on 2023-05-18T16:22:59Z
No. of bitstreams: 0
en
dc.description.provenanceMade available in DSpace on 2023-05-18T16:22:59Z (GMT). No. of bitstreams: 0en
dc.description.tableofcontents第一章 緒論 1
第一節 研究背景與動機 1
第二節 研究問題 6
第三節 研究貢獻 6
第四節 研究範圍與限制 7
第五節 名詞解釋 8
第二章 文獻探討 9
第一節 人肉搜索 9
第二節 人肉搜索的資訊行為特性 20
第三節 協作資訊行為 32
第三章 研究設計與實施 42
第一節 研究方法與工具 42
第二節 研究對象與招募方式 45
第三節 資料分析 50
第四節 研究倫理 54
第四章 研究結果 56
第一節 人肉搜索發生之常見情境 56
第二節 人肉搜索參與者之資訊尋求策略 64
第三節 人肉搜索參與者之協作資訊行為 86
第四節 綜合討論 100
第五章 研究結論與建議 104
第一節 結論 104
第二節 建議 106
參考文獻 110
附錄一 研究招募公告 122
附錄二 研究招募問卷 123
附錄三 研究參與者知情同意書 126
附錄四 研究參與者基本資料表 127
附錄五 訪談大綱 128
附錄六 事件類型編碼表  130
-
dc.language.isozh_TW-
dc.title人肉搜索作為資訊行為之探索性研究zh_TW
dc.titleAn Exploratory Study on “Human Flesh Search” as Information Behavioren
dc.typeThesis-
dc.date.schoolyear111-1-
dc.description.degree碩士-
dc.contributor.oralexamcommittee林奇秀;林雯瑤zh_TW
dc.contributor.oralexamcommitteeChi-Shiou Lin;Wen-Yau Cathy Linen
dc.subject.keyword人肉搜索,資訊行為,協作資訊行為,資訊覓食理論,zh_TW
dc.subject.keywordhuman flesh search,information behavior,collaborative information behavior,information foraging,en
dc.relation.page131-
dc.identifier.doi10.6342/NTU202300604-
dc.rights.note同意授權(全球公開)-
dc.date.accepted2023-02-20-
dc.contributor.author-college文學院-
dc.contributor.author-dept圖書資訊學系-
顯示於系所單位:圖書資訊學系

文件中的檔案:
檔案 大小格式 
ntu-111-1.pdf4.07 MBAdobe PDF檢視/開啟
顯示文件簡單紀錄


系統中的文件,除了特別指名其著作權條款之外,均受到著作權保護,並且保留所有的權利。

社群連結
聯絡資訊
10617臺北市大安區羅斯福路四段1號
No.1 Sec.4, Roosevelt Rd., Taipei, Taiwan, R.O.C. 106
Tel: (02)33662353
Email: ntuetds@ntu.edu.tw
意見箱
相關連結
館藏目錄
國內圖書館整合查詢 MetaCat
臺大學術典藏 NTU Scholars
臺大圖書館數位典藏館
本站聲明
© NTU Library All Rights Reserved