Exploration of Social Media for Observing Improper Tourist Behaviors in a National Park
Abstract
:1. Introduction
- (1)
- What are the types of improper behavior displayed by FB users who visited Yushan National Park and logged into FB from Taiwan? Different types of improper behavior create various impacts on the park. Knowing what types of improper behavior are likely to occur will help park managers identify the potential impact of specific behaviors, and adopt appropriate measures accordingly to alleviate the impact and prevent the occurrence of such behaviors.
- (2)
- What are the message modes that the visitors used to post their improper behaviors on FB? FB messages can be presented by text, links, videos, and photos. Realizing which message modes are frequently used by visitors will direct park managers to specific modes, and make their observation of visitors’ behaviors more efficient.
- (3)
- What are the other FB users’ responses and intensity of response to the posts that involve improper behaviors? FB responses include Likes, Comments, and Shares. These responses reflect users’ different attitudes toward other’s posts [19]. Moreover, improper online behaviors are frequently imitated offline, and the receiving of online support strengthens the acceptability of misconduct in real life [26]. Therefore, understanding FB users’ responses and intensity of responses will alert park managers to the likelihood of occurrence of specific improper behavior in the park.
2. Methods
2.1. Study Setting
2.2. Studied Content
2.3. Data Collection
3. Results
4. Discussion and Suggestions
- (1)
- Prompt monitoring and prohibition of illegal camping. The posts of park visitors indicated that the Tataka parking lot is a popular but a nondesignated camping site. This parking lot is a popular camping site because of convenience in terms of proximity to many recreational sites, beautiful scenery, and availability at no cost to the users. Given the park’s insufficient workforce, patrolling in the parking lot is only conducted between 8:00 AM and noon. Many visitors take advantage of this period to use the Tataka parking lot as a free camping site. Thus, video cameras should be installed in this area for prompt and round-the-clock monitoring to prevent illegal camping. This would enable the park staff to locate improper behaviors promptly without patrolling the vast park in person. Therefore, manpower will be used more efficiently.
- (2)
- Establishing camping sites in recreational areas. In recent years, camping has gained popularity in Taiwan, thereby resulting in an increase in frequency of such activities in the park. However, camping in nondesignated areas violates park regulations. Although 29 camping sites are provided within the park, the majority of these sites are situated at high latitude, which caters more to mountaineers than general visitors. Therefore, camping sites can be provided within the recreational area to accommodate general visitors given the availability of land.
- (3)
- Providing affordable meals by flexible reservation. Many mountaineers cooked at the parking lot in the Dongpu recreational area. Mountaineers are frequently cold and hungry when they descend from the top of the mountain. Although they invariably pass by the Paiyun Lodge where hot meals are available, they prefer to cook in the nearby parking lot because meals served in the lodge are expensive. Moreover, the meals must be reserved and paid in advance, that is, 7–10 days before mountaineers begin their journey. This reservation policy is problematic for the mountaineers because they frequently cannot control their arrival time due to their physical condition and the constantly changing weather in the mountain. Therefore, advance reservation should be discussed to determine its necessity or minimize the required time. In addition, meal prices should be reevaluated to ascertain their reasonability.
- (4)
- Informing visitors of consequences of improper behaviors through various approaches. Few visitors engaged in improper behaviors that are legal but inappropriate. Manning [4] indicated that careless, unskilled, and uninformed actions can be minimized through information education. Thus, the park can inform visitors about the consequences of these actions through various approaches, such as promotional videos and brochures at the Visitor Center, an official website, a FB fan page, and a list of “do’s and don’ts” for mountain climbers. These approaches should similarly be applied to unavoidable actions, such as unexpected contact with wild animals. In addition, warning signs can be posted along the roads and parking lots in the Tataka area frequented by Formosan macaques.
5. Conclusions
Author Contributions
Funding
Conflicts of Interest
References
- National Parks of Taiwan. The Impact of Visitors on Muntjac (Muntiacus Reevesi Micrurus) at Walami Area in Yushan National Park. Available online: http://np.cpami.gov.tw/%E9%97%9C%E6%96%BC%E5%9C%8B%E5%AE%B6%E5%85%AC%E5%9C%92/%E7%B5%B1%E8%A8%88%E8%B3%87%E6%96%99.html (accessed on 10 August 2017). (In Chinese)
- Tang, L.-C. Dispatched Employment in the Public Sector in Taiwan With Special Reference to the Practices in National Parks. Master’s Thesis, Department of Political Science, National Taiwan University, Taipei, Taiwan, 2011. (In Chinese). [Google Scholar]
- Tsai, H.-M. The Role and Problems of National Parks Regarding the Promotion of Bio-Diversity Education. Available online: http://biodiv.ntu.edu.tw/biodivctr/upload/conf_200109/11.htm (accessed on 2 February 2015). (In Chinese).
- Manning, R. Emerging principles for using information/education in wilderness management. Int. J. Wilderness 2003, 9, 20–27. [Google Scholar]
- National Parks of Taiwan. The Strategies for the Management of Recreational Impacts in the Areas of Tataka, Dongpu, Meishan in Yushan National Park. Available online: http://np.cpami.gov.tw/%E6%9C%8D%E5%8B%99%E9%81%B8%E5%96%AE/%E4%B8%8B%E8%BC%89%E5%B0%88%E5%8D%80.html?view=dl&layout=type1&sid=3&start=140 (accessed on 11 June 2015). (In Chinese)
- Young, C. The impact of outdoor recreation on wild animals. Taiwan For. J. 2000, 26, 35–44. (In Chinese) [Google Scholar]
- Chen, Y.; Wang, Y. The impact of visitors on Muntjac Muntiacus reevesi micrurus at Walami Area in Yushan National Park. J. Natl. Pk. 2001, 21, 86–95. (In Chinese) [Google Scholar]
- Wu, W.H.; Huang, K.C. Eco-Design: The Application of Environmental Engineering in National Parks; The Report of Yushan National Park: Nantou, Taiwan, 2000. (In Chinese)
- Thevenot, G. Blogging as a social media. Tour. Hosp. Res. 2007, 7, 287–289. [Google Scholar] [CrossRef]
- Li, X.; Wang, Y. China in the eyes of western travelers as represented in travel blogs. J. Travel Tour. Mark. 2011, 28, 689–719. [Google Scholar] [CrossRef]
- O’Reilly, T. What Is Web 2.0. Available online: http://www.oreillynet.com/pub/a/oreilly/tim/news/2005/09/30/what-is-web-20.html?page=1 (accessed on 12 July 2015).
- Shirky, C. Here Comes Everybody: The Power of Organizing without Organizations; Penguin Books: London, UK, 2008. [Google Scholar]
- Pudliner, B.A. Alternative literature and tourist experience: Travel and tourist weblogs. J. Tour. Cult. Change 2007, 5, 46–59. [Google Scholar] [CrossRef]
- Tussyadiah, I.P.; Fesenmaier, D.R. Mediating tourist experiences: Access to places via shared videos. Ann. Tour. Res. 2009, 36, 24–40. [Google Scholar] [CrossRef]
- Kwok, L.; Yu, B. Spreading social media messages on Facebook: An analysis of restaurant business-to-consumer communications. Cornell Hosp. Q. 2013, 54, 84–94. [Google Scholar] [CrossRef]
- Colley, K.L.; Collier, A. An overlooked social media tool? Making a case for wikis. Public Relat. Strateg. 2009, 19, 110–122. [Google Scholar]
- Buck, S. What Type of Social Media Personality Are You? Available online: http://mashable.com/2012/08/13/what-type-of-social-media-personality-are-you-infographic/ (accessed on 25 June 2015).
- Wu, H.-H.; Lo, W.-F. Why do you want to do “like”, “comment” or “share” on Facebook: The study of antecedent on Facebook user’s behavioral intentions. Mark. Rev. 2014, 11, 107–131. [Google Scholar]
- Fu, P. The Behavior of Word of Mouth on Facebook. Master’s Thesis, National Sun Yat-Sen University, Kaohsiung, Taiwan, July 2011. Unpublished (In Chinese). [Google Scholar]
- Berger, J.; Buechel, E. Facebook therapy? Why do people share self-relevant content online? NA Adv. Consum. Res. 2012, 40, 203–208. [Google Scholar] [CrossRef]
- Pöyry, E.; Parvinen, P.; Malmivaara, T. Can we get from liking to buying? Behavioral differences in hedonic and utilitarian Facebook usage. Electron. Commer. Res. Appl. 2013, 12, 224–235. [Google Scholar] [CrossRef]
- De Vries, L.; Gensler, S.; Leeflang, P.S. Popularity of brand posts on brand fan pages: An investigation of the effects of social media marketing. J. Interact. Mark. 2012, 26, 83–91. [Google Scholar] [CrossRef]
- Bogard, W. Surveillance assemblages and lines of flight. In Theorizing Surveillance: The Panopticaon and Beyond, 1st ed.; Lyon, D., Ed.; Willan Publishing: Cullompton, UK, 2006; pp. 111–136. [Google Scholar]
- Trottier, D.; Lyon, D. Key features of social media surveillance: The challenges of Web 2.0 abd sicial media. In Internet and Surveillance: The Challenges of Web 2.0 and Social Media, 1st ed.; Fuchs, C., Boersma, K., Albrechtslund, A., Sandoval, M., Eds.; Cambridge University Press: Cambridge, UK, 2012; pp. 109–125. [Google Scholar]
- Bauman, Z. Liquid Modernity; Polity Press: Cambridge, UK, 2000. [Google Scholar]
- Selwyn, N. A safe haven for misbehaving? An investigation of online misbehavior among university students. Soc. Sci. Comput. Rev. 2008, 26, 446–465. [Google Scholar] [CrossRef]
- Asghar, I. Boston Police Used Social Media Surveillance for Years without Informing City Council. Available online: https://www.aclu.org/blog/privacy-technology/internet-privacy/boston-police-used-social-media-surveillance-years-without (accessed on 25 February 2018).
- Uldam, J. Corporate management of visibility and the fantasy of the post-political: Social media and surveillance. New Media Soc. 2016, 18, 201–219. [Google Scholar] [CrossRef]
- Ginsberg, J.; Mohebbi, M.H.; Patel, R.S.; Brammer, L.; Smolinski, M.S.; Brilliant, L. Detecting influenza epidemics using search engine query data. Nature 2009, 457, 1012–1014. [Google Scholar] [CrossRef] [PubMed]
- Gerber, M.S. Predicting crime using Twitter and kernel density estimation. Decis. Support Syst. 2014, 61, 115–125. [Google Scholar] [CrossRef]
- Valenzuela, S.; Arriagada, A.; Scherman, A. The social media basis of youth protest behavior: The case of Chile. J. Commun. 2012, 62, 299–314. [Google Scholar] [CrossRef]
- Hawn, C. Take two aspirin and tweet me in the morning: How Twitter, Facebook, and other social media are reshaping health care. Health Affairs 2009, 28, 361–368. [Google Scholar] [CrossRef]
- Castells, M. The Internet Galaxy: Reflections on the Internet, Business, and Society; Oxford University Press: Oxford, UK, 2001. [Google Scholar]
- National Parks of Taiwan. Searching of the Biospecies of National Park. Biodiversity Data Bank and Knowledge Platform. Available online: http://npgis.cpami.gov.tw/public/park/park.aspx?park=ES (accessed on 14 September 2016). (In Chinese)
- Yushan National Park. The Numbers of Visitors and Vehicles in the Recreational Sites of Yushan National Parks in 2016. Available online: https://www.ysnp.gov.tw/modules/download.aspx?path=738&c=45d57490-6d98-4a23-9011-5bbfbf52f2bf (accessed on 16 August 2018). (In Chinese)
- Epochtimes.com. Facebook Active Users Reaches 1650 Millions Worldwide, 18 Millions in Taiwan. Available online: http://www.epochtimes.com/b5/16/7/19/n8115301.htm (accessed on 16 August 2016). (In Chinese).
- Common Wealth Magazine. Who Is Your Cloud Lovers? Available online: http://www.cw.com.tw/article/article.action?id=5070178 (accessed on 23 July 2016). (In Chinese).
- Neuman, W.L. Social Research Methods: Qualitative and Quantitative Approaches; Pearson Education Limited: Harlow, UK, 2010. [Google Scholar]
- Kaplan, A.M.; Haenlein, M. Users of the world, unite! The challenges and opportunities of social media. Bus. Horizons 2010, 53, 59–68. [Google Scholar] [CrossRef]
- Pantelidis, I.S. Electronic meal experience: A content analysis of online restaurant comments. Cornell Hosp. Q. 2010, 51, 483–491. [Google Scholar] [CrossRef]
- Berger, J.; Milkman, K.L. What makes online content viral? J. Mark. Res. 2012, 49, 192–205. [Google Scholar] [CrossRef]
- Veal, A.J. Research Methods for Leisure and Tourism; Pearson Education Limited: Harlow, UK, 2006. [Google Scholar]
Variables | Groups | Count | % |
---|---|---|---|
Types of improper behavior | Illegal action | 25 | 40.3 |
Careless action | 19 | 30.6 | |
Unskilled action | 3 | 4.8 | |
Uninformed action | 6 | 9.7 | |
Unavoidable action | 2 | 3.2 | |
Illegal, careless, and uninformed action | 2 | 3.2 | |
Uninformed and unavoidable action | 5 | 8.1 | |
Message modes | Text | 5 | 8.1 |
Photo | 27 | 43.5 | |
Text and photo | 30 | 48.4 | |
Number of Likes | 0 | 0 | 0 |
1–50 | 25 | 40.3 | |
51–100 | 16 | 25.8 | |
101–150 | 13 | 21.0 | |
151–200 | 4 | 6.5 | |
201–400 | 4 | 6.5 | |
Number of Shares | 0 | 57 | 91.9 |
1–5 | 5 | 8.1 | |
Types of Comments | None | 6 | 9.7 |
Supported | 18 | 29.0 | |
Not supported | 6 | 9.7 | |
Supported and not supported | 32 | 51.6 | |
Number of Comments | 1–10 | 40 | 72.7 |
11–20 | 10 | 18.2 | |
21–30 | 2 | 3.6 | |
31–40 | 2 | 3.6 | |
41 and above | 1 | 1.8 |
Types of Improper Behavior | Examples |
---|---|
Illegal action | Camping in nondesignated camping areas, cooking in nondesignated camping areas, feeding wild monkeys, provoking wild monkeys |
Careless action | Going near wild monkeys, drinking alcohol while mountain climbing, taking photographs at the edge of a cliff, jumping at the top of steep rocks |
Unskilled action | Mountain climbing during a typhoon |
Uninformed action | Food exposure in wild monkey frequented areas, rolling down car windows in wild animals frequented areas |
Unavoidable action | Wild monkeys snatching food, wild monkeys approaching visitors unexpectedly |
Types of Improper Behavior | Message modes | Text | Photo | Text and Photo | Total |
---|---|---|---|---|---|
Illegal action | Count | 1 | 11 | 13 | 25 |
% within improper behavior | 4.0% | 44.0% | 52.0% | 100.0% | |
Careless action | Count | 0 | 11 | 8 | 19 |
% within improper behavior | 0.0% | 57.9% | 42.1% | 100.0% | |
Unskilled action | Count | 3 | 0 | 0 | 3 |
% within improper behavior | 100.0% | 0.0% | 0.0% | 100.0% | |
Uninformed action | Count | 0 | 3 | 3 | 6 |
% within improper behavior | 0% | 50.0% | 50.0% | 100.0% | |
Unavoidable action | Count | 1 | 1 | 0 | 2 |
% within improper behavior | 50.0% | 50.0% | 0.0% | 100.0% | |
Illegal, careless, and uninformed action | Count | 0 | 1 | 1 | 2 |
% within improper behavior | 0.0% | 50.0% | 50.0% | 100.0% | |
Uninformed and unavoidable action | Count | 0 | 0 | 5 | 5 |
% within improper behavior | 0.0% | 0.0% | 100.0% | 100.0% | |
Total | Count | 5 | 27 | 30 | 62 |
% within improper behavior | 8.1% | 43.5% | 48.4% | 100.0% |
Types of Improper Behavior | Number of Likes | 1–50 | 51–100 | 101–150 | 151–200 | 201–400 | Total |
---|---|---|---|---|---|---|---|
Illegal action | Count | 11 | 6 | 6 | 0 | 2 | 25 |
% within improper behavior | 44.0% | 24.0% | 24.0% | 0.0% | 8.0% | 100.0% | |
Careless action | Count | 6 | 7 | 4 | 1 | 1 | 19 |
% within improper behavior | 31.6% | 36.8% | 21.1% | 5.3% | 5.3% | 100.0% | |
Unskilled action | Count | 0 | 1 | 0 | 2 | 0 | 3 |
% within improper behavior | 0.0% | 33.3% | 0.0% | 66.7% | 0.0% | 100.0% | |
Uninformed action | Count | 1 | 1 | 2 | 1 | 1 | 6 |
% within improper behavior | 16.7% | 16.7% | 33.3% | 16.7% | 16.7% | 100.0% | |
Unavoidable action | Count | 1 | 0 | 1 | 0 | 0 | 2 |
% within improper behavior | 50.0% | 0.0% | 50.0% | 0.0% | 0.0% | 100.0% | |
Illegal, careless, and uninformed actions | Count | 2 | 0 | 0 | 0 | 0 | 2 |
% within improper behavior | 100.0% | 0.0% | 0.0% | 0.0% | 0.0% | 100.0% | |
Uninformed and unavoidable actions | Count | 4 | 1 | 0 | 0 | 0 | 5 |
% within improper behavior | 80.0% | 20.0% | 0.0% | 0.0% | 0.0% | 100.0% | |
Total | Count | 25 | 16 | 13 | 4 | 4 | 62 |
% within improper behavior | 40.3% | 25.8% | 20.9% | 6.5% | 6.5% | 100.0% |
Types of Improper Behavior | Types of Comment | None | Support | Not Support | Support and Not Support | Total |
---|---|---|---|---|---|---|
Illegal action | Count | 2 | 7 | 5 | 12 | 26 |
% within improper behavior | 7.7% | 27.0% | 19.2% | 46.1% | 100.0% | |
Careless action | Count | 1 | 8 | 1 | 9 | 19 |
% within improper behavior | 5.3% | 42.1% | 5.3% | 47.4% | 100.0% | |
Unskilled action | Count | 0 | 0 | 0 | 3 | 3 |
% within improper behavior | 0.0% | 0.0% | 0.0% | 100.0% | 100.0% | |
Uninformed action | Count | 0 | 2 | 0 | 3 | 5 |
% within improper behavior | 0.0% | 40.0% | 0.0% | 60.0% | 100.0% | |
Unavoidable action | Count | 1 | 0 | 0 | 1 | 2 |
% within improper behavior | 50.0% | 0.0% | 0.0% | 50.0% | 100.0% | |
Illegal, Careless, and Uninformed actions | Count | 1 | 0 | 0 | 1 | 2 |
% within improper behavior | 50.0% | 0.0% | 0.0% | 50.0% | 100.0% | |
Uninformed and Unavoidable actions | Count | 1 | 1 | 0 | 3 | 5 |
% within improper behavior | 20.0% | 20.0% | 0.0% | 60.0% | 100.0% | |
Total | Count | 6 | 18 | 6 | 32 | 62 |
% within improper behavior | 9.7% | 29.0% | 9.7% | 51.6% | 100.0% |
Types of Improper Behavior | Number of Shares | 0 | 1–5 | Total |
---|---|---|---|---|
Illegal action | Count | 23 | 2 | 25 |
% within improper behavior | 92.0% | 8.0% | 100.0% | |
Careless action | Count | 18 | 1 | 19 |
% within improper behavior | 94.7% | 5.3% | 100.0% | |
Unskilled action | Count | 3 | 0 | 3 |
% within improper behavior | 100.0% | 0.0% | 100.0% | |
Uninformed action | Count | 4 | 2 | 6 |
% within improper behavior | 66.7% | 33.3% | 100.0% | |
Unavoidable action | Count | 2 | 0 | 2 |
% within improper behavior | 100.0% | 0.0% | 100.0% | |
Illegal, careless, and uninformed action | Count | 2 | 0 | 2 |
% within improper behavior | 100.0% | 0.0% | 100.0% | |
Uninformed and unavoidable action | Count | 5 | 0 | 5 |
% within improper behavior | 100.0% | 0.0% | 100.0% | |
Total | Count | 57 | 5 | 62 |
% within improper behavior | 91.9% | 8.1% | 100.0% |
© 2019 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).
Share and Cite
Huang, S.-C.L.; Sun, W.-E. Exploration of Social Media for Observing Improper Tourist Behaviors in a National Park. Sustainability 2019, 11, 1637. https://doi.org/10.3390/su11061637
Huang S-CL, Sun W-E. Exploration of Social Media for Observing Improper Tourist Behaviors in a National Park. Sustainability. 2019; 11(6):1637. https://doi.org/10.3390/su11061637
Chicago/Turabian StyleHuang, Shu-Chun L., and Wan-En Sun. 2019. "Exploration of Social Media for Observing Improper Tourist Behaviors in a National Park" Sustainability 11, no. 6: 1637. https://doi.org/10.3390/su11061637
APA StyleHuang, S. -C. L., & Sun, W. -E. (2019). Exploration of Social Media for Observing Improper Tourist Behaviors in a National Park. Sustainability, 11(6), 1637. https://doi.org/10.3390/su11061637