首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 515 毫秒
1.
In studies of people's privacy behavior, the extent of disclosure of personal information is typically measured as a summed total or a ratio of disclosure. In this paper, we evaluate three information disclosure datasets using a six-step statistical analysis, and show that people's disclosure behaviors are rather multidimensional: participants' disclosure of personal information breaks down into a number of distinct factors. Moreover, people can be classified along these dimensions into groups with different “disclosure styles”. This difference is not merely in degree, but rather also in kind: one group may for instance disclose location-related but not interest-related items, whereas another group may behave exactly the other way around. We also found other significant differences between these groups, in terms of privacy attitudes, behaviors, and demographic characteristics. These might for instance allow an online system to classify its users into their respective privacy group, and to adapt its privacy practices to the disclosure style of this group. We discuss how our results provide relevant insights for a more user-centric approach to privacy and, more generally, advance our understanding of online privacy behavior.  相似文献   

2.
This study investigated the role of parents and the Internet in adolescents' online privacy concerns and information disclosing behaviors. Specifically, instructive and restrictive parental mediation, adolescents' self-disclosure to parents about their Internet experiences, time spent on the Internet, and participation in online communication activities were examined as factors that may impact adolescents' concerns about online privacy, willingness to disclose personally identifiable information, and actual disclosure of personal information online. A survey conducted in Singapore with 746 adolescents aged 12–18 revealed that instructive parental mediation based on parent-adolescent communication was more effective than restrictive parental mediation based on rule-making and controlling in reducing information disclosure among adolescents. Adolescents' self-disclosure to parents about their Internet experiences was found to be positively associated with their privacy concerns but did not foster privacy protection behaviors. While online chatting had a positive relationship with privacy concerns, excessive use of the Internet and frequent participation in social networking and online gaming resulted in increased information disclosure.  相似文献   

3.
The success of an online transaction with a government organization depends on citizen's willingness to share personal data relevant for the transaction. However, disclosing personal data online is oftentimes considered risky. It has been substantiated in a number of empirical studies that perceptions of the risks involved in sharing personal data in the virtual environment could hinder Internet users from engaging in online transactions that require the disclosure of personal data. Results of a large-scale online survey with 2,202 Dutch Internet users reveal that trust in government organizations is a very important determinant of personal data disclosure intention among users with and without e-government experience. Low perceptions of risks, high expectations of the benefits of e-government services, and strong beliefs in the adequacy of legal protection mechanisms could also positively influence users' intention to share personal data for e-government services. The negative relation between trust and risk perceptions is also established, as citizens' trust in government organizations could reduce perceptions of the risks involved in disclosing personal data online.  相似文献   

4.
The self-disclosure of personal information by users on social network sites (SNSs) play a vital role in the self-sustainability of online social networking service provider platforms. However, people’s levels of privacy concern increases as a direct result of unauthorized procurement and exploitation of personal information from the use of social networks which in turn discourages users from disclosing their information or encourages users to submit fake information online. After a review of the Theory of Planned Behavior (TPB) and the privacy calculus model, an integrated model is proposed to explain privacy disclosure behaviors on social network sites. Thus, the aim of this paper is to find the key factors affecting users’ self-disclosure of personal information. Using privacy calculus, the perceived benefit was combined into the Theory of Planned Behavior, and after some modifications, an integrated model was prescribed specifically for the context of social network sites. The constructs of information sensitivity and perceived benefit were redefined after reviewing the literature. Through a study on the constructs of privacy concern and self-disclosure, this article aims at reducing the levels of privacy concern, while sustaining online transactions and further stimulating the development of social network sites.  相似文献   

5.
Given the diffusion of the Social Web and increased disclosure of personal information online, the ‘privacy paradox’ suggests that while Internet users are concerned about privacy, their behaviors do not mirror those concerns. This study investigates the potential influence of privacy concerns, psychological traits, attitudes to the Social Web and age on self‐disclosure. Using an online survey of a representative sample of German Internet users (n = 2, 739), the variety and quality of self‐disclosure as well as access were measured. The findings indicate that privacy concerns hardly impact self‐disclosure, but different variables moderate this relation. Perceived social relevance and the number of applications used proved important. Users' general willingness to disclose is most important when providing sensitive information.  相似文献   

6.
The use of mobile applications continues to experience exponential growth. Using mobile apps typically requires the disclosure of location data, which often accompanies requests for various other forms of private information. Existing research on information privacy has implied that consumers are willing to accept privacy risks for relatively negligible benefits, and the offerings of mobile apps based on location-based services (LBS) appear to be no different. However, until now, researchers have struggled to replicate realistic privacy risks within experimental methodologies designed to manipulate independent variables. Moreover, minimal research has successfully captured actual information disclosure over mobile devices based on realistic risk perceptions. The purpose of this study is to propose and test a more realistic experimental methodology designed to replicate real perceptions of privacy risk and capture the effects of actual information disclosure decisions. As with prior research, this study employs a theoretical lens based on privacy calculus. However, we draw more detailed and valid conclusions due to our use of improved methodological rigor. We report the results of a controlled experiment involving consumers (n=1025) in a range of ages, levels of education, and employment experience. Based on our methodology, we find that only a weak, albeit significant, relationship exists between information disclosure intentions and actual disclosure. In addition, this relationship is heavily moderated by the consumer practice of disclosing false data. We conclude by discussing the contributions of our methodology and the possibilities for extending it for additional mobile privacy research.  相似文献   

7.
The buying and selling of goods and services are no longer limited to a general website or a physical store as social networks, such as Facebook or Pinterest, are heavily focusing on social commerce. Prior studies have analyzed impact of trust and culture on social commerce, design and interface aspects of it, and intention to use social commerce by general people. Our study is informed by the literature on information disclosure intention, and Communication Privacy Management theory and is motivated by the fundamental premise that intention to self-disclose in social commerce is affected by perceived ownership of information, privacy apathy, the risks and benefits of disclosure and fairness of information exchange. We analyzed data collected from 252 samples using the scenario method. The results show that shoppers’ information disclosure intention is driven by the fairness of information exchange, privacy benefits and privacy apathy.  相似文献   

8.
多媒体信息易遭受敌手攻击,如恶意应用通过虚假报价来欺诈未采取防护措施的用户,导致用户财产或隐私面临极大的威胁。为解决上述问题,文章提出一种基于议价贝叶斯博弈模型的防欺诈策略来保护用户隐私。首先利用四轮讨价还价确定应用和用户交互时的收益矩阵,引入常规用户的检测率对收益矩阵进行调整,抑制恶意应用虚假报价;然后通过贝叶斯纳什均衡分析确定用户的最优防御策略以防止用户遭受恶意应用的欺骗,避免个人隐私泄露。仿真结果表明,文章方案提高了应用和用户在交易达成时各自的收益,降低了恶意应用采取欺骗策略的概率,增强了用户隐私的安全性。  相似文献   

9.
一个安全、原子的电子商务协议及其形式化验证   总被引:11,自引:0,他引:11  
电子商务的普及与接受主要取决于下述属性的解决:安全、原子、隐私与匿名,形式化描述和分析是描述电子商务协议并验证它各性的有效方法,面向物理商品交易的电子商务协议需要具备3个属性:安全、原子和隐私,介绍了一个安全、可靠的电子商务协议BEARCAT及其形式化描述,并龙有人侵者的情况下,通过用BAN类型的逻辑证明所期望的属性的方式对协议的强度和正确性作形式化分析。  相似文献   

10.
电子商务的流行与接受主要取决于下述属性:安全、原子、隐私与匿名.对于需要安全、原子和隐私等3个属性的物理商品的电子交易还没有合适的电子商务协议.基于此,提出了一个称为ELC的电子商务模型,ELC模型模拟了国际贸易中的电子信用证.然后提出了一个安全、原子的电子商务协议.最后,在有一个入侵者的情况下,通过使用BAN风格的逻辑证明所期望的属性分析了协议的强度和正确性  相似文献   

11.
We examine how two different underlying mechanisms of behavioral loyalty to a brand—attitudinal loyalty and habit—impact smartphone users' privacy management when they browse personalized vs. non-personalized mobile websites. The online experimental study conducted with Amazon Mechanical Turk workers (N = 73) finds different responses of attitudinal loyalty and habit towards personalization in significant three-way interactions between personalization, attitudinal loyalty, and habit on privacy disclosure and protection behaviors. When interacting with a personalized website, highly habitual consumers without high level of attitudinal loyalty disclosed the most personal information on a personalized mobile site, and displayed the least intention of protecting their privacy on their smartphones, whereas consumers with high levels of both habit and attitudinal loyalty reported the highest tendency of privacy protection behavior. However, habit and personalization do not have a significant effect on disclosure behaviors when users have high attitudinal loyalty to a brand. Theoretical and practical implications are discussed.  相似文献   

12.
车联网是一种通过在车辆、行人、路边单元等通信实体之间构建一个网络拓扑来提供高效、安全的信息服务的网络,车联网能够有效满足人们对交通环境日益增长的需求,但由于车联网具有移动性和开放性的特点,容易遭受攻击。在众多的威胁中,车联网用户的隐私泄露可能会造成不可弥补的损失,因此车联网的隐私保护被研究者广泛关注。针对车联网的隐私保护问题展开研究,根据车联网的体系结构总结出车联网需要具备的四个基本性质,并对现有的车联网攻击模型加以分析;通过对近些年车联网隐私保护方案的调查总结对现有研究中常用的方法加以归类,然后将车联网的隐私保护研究依照保护对象分为三类,并对各方案进行了分析评价。最后对现有研究的看法和面临的挑战进行了总结,给出了对未来研究的展望。  相似文献   

13.
The nearly ubiquitous use of online social networks generally entails substantial personal disclosure and elicits significant privacy concerns. This research uses Social Exchange Theory and the impression management (IM) literature to examine how privacy concerns can be counterbalanced by the perceived social benefits afforded by a social network’s ability to support IM. We frame social network use as an attempt to engage in IM, and we highlight the importance of a social network’s IM affordances in predicting social benefits from, and disclosure through, a social network. We test our model with a sample of 244 Facebook users, finding support for the proposed relationships and yielding the following contributions. First, this research provides a novel positioning of perceived IM affordances as a primary driver of both perceived social benefits and IM disclosure propensity. Second, this research illuminates that trust in both the social network provider and social network peers influences privacy concerns, social benefits, and perceived IM affordances. Our theory has important implications for researchers and practitioners interested in privacy issues within social networks.  相似文献   

14.
Technological innovations are increasingly helping people expand their social capital through online networks by offering new opportunities for sharing personal information. Online social networks are perceived to provide individuals new benefits and have led to a surge of personal data uploaded, stored, and shared. While privacy concerns are a major issue for many users of social networking sites, studies have shown that their information disclosing behavior does not align with their concerns. This gap between behavior and concern is called the privacy paradox. Several theories have been explored to explain this, but with inconsistent and incomplete results. This study investigates the paradox using a construal level theory lens. We show how a privacy breach, not yet experienced and psychologically distant, has less weight in everyday choices than more concrete and psychologically-near social networking activities and discuss the implications for research and practice.  相似文献   

15.
The objective of this study was to examine whether content of Facebook profiles differed as a function of priming story and gender. Disclosure of personal information and the use of privacy settings when constructing Facebook profiles were assessed when participants were or were not provided with priming stories that would alert them to potential risks from information sharing on the Internet. Participants read one of three priming stories (anecdotal, legal or neutral), prior to constructing a profile for either a male or female. The anecdotal story described a stalking incident, while the legal story summarized a ‘typical’ online privacy statement. Previously established scoring tools were used to assess disclosure and privacy settings use (see Nosko, Wood, & Molema, 2010). Overall, gender was an important predictor for disclosure. Females disclosed less sensitive information than males after reading the anecdotal privacy story. Less disclosure also was found when participants constructed a profile for someone of the same gender. Disclosure of particular pieces of information also differed by gender of the discloser. Very few participants employed privacy settings. The impact for these outcomes is discussed in terms of their ability to potentially inhibit over-disclosure in personal profiles and to identify users who are at particular risk.  相似文献   

16.
The rapid development of information technology has promoted the popularization of social media applications. Social me- dia has become a platform for users to search for real-time information and communicate and interact. Privacy protection is an im- portant symbol of the progress of human modern civilization. While enjoying the benefits brought by social media, human rights al- so face unprecedented challenges. Therefore, the protection of privacy highlights its importance. This paper analyzes the information leakage of Facebook users in order to discover the various risks faced by the privacy protection of social media users. Then it re- views the user privacy protection measures of major social media platforms at home and abroad. Finally, it is recommended that the government level should speed up the improvement of the social media platform user privacy supervision system, the enterprise lev- el should strengthen the implementation of the social media platform user privacy protection subject responsibility, and the user must improve personal information security literacy and protect personal information and privacy together.  相似文献   

17.
隐私保护的信息熵模型及其度量方法   总被引:1,自引:0,他引:1  
隐私的量化是隐私保护技术的重要支撑,信息熵作为信息的量化手段,自然可以用于解决隐私度量问题. 基于Shannon信息论的通信框架,提出了几种隐私保护信息熵模型,以解决隐私保护系统的相关度量问题,主要包括:隐私保护基本信息熵模型、含敌手攻击的隐私保护信息熵模型、带主观感受的信息熵模型和多隐私信源的隐私保护信息熵模型.在这些模型中,将信息拥有者假设为发送方,隐私谋取者假设为接收方,隐私的泄露渠道假设为通信信道;基于这样的假设,分别引入信息熵、平均互信息量、条件熵及条件互信息等来分别描述隐私保护系统信息源的隐私度量、隐私泄露度量、含背景知识的隐私度量及泄露度量;以此为基础,进一步提出了隐私保护方法的强度和敌手攻击能力的量化测评,为隐私泄露的量化风险评估提供了一种支撑;最后,针对位置隐私保护的应用场景,给出了具体的信息熵模型及隐私保护机制和攻击能力的度量及分析.所提出的模型和隐私量化方法,可以为隐私保护技术和隐私泄露风险分析与评估提供可行的理论基础.  相似文献   

18.
用户向Web服务组合提供隐私数据时,不同用户有自身的隐私信息暴露需求,服务组合应支持用户隐私需求的可满足性验证.首先提出一种面向服务组合的用户隐私需求规约方法,用户能够定义隐私数据及不同使用情境的敏感度,采用敏感度-信誉度函数明确可以使用隐私数据的成员服务,简化隐私需求的同时,提高了隐私需求的通用性.为了验证服务组合是否满足用户隐私需求,首先通过隐私数据项依赖图(privacy data item dependency graph,简称PDIDG)描述组合中隐私数据项的依赖关系,然后采用隐私开放工作流网(privacy open workflow net,简称POWFN)构建隐私敏感的服务组合模型,通过需求验证算法验证服务组合是否满足用户隐私需求,从而能够有效防止用户隐私信息的非法直接暴露和间接暴露.最后,通过实例分析说明了该方法的有效性,并对算法性能进行了实验分析.  相似文献   

19.
Many e-commerce companies collect users’ personal data for marketing purposes despite privacy concerns. Information-collecting companies often offer a monetary reward to users to alleviate privacy concerns and ease the collection of personal information. This study focused on the negative effects of monetary rewards on both information privacy concerns (IPC) and information disclosure. A survey approach was used to collect data and 370 final responses were analysed using a two-way analysis of variance and a binomial logistic regression model. The results show that monetary rewards increase IPC when an information-collecting company requires sensitive information. Additional results indicate that building trust is a more effective way of collecting personal data. This study identifies how organisations can best execute information-collection activities and contributes additional insights for academia and practitioners.  相似文献   

20.
Although it is plausible to assume that the risks of disclosing personal data online are inexorably more prevalent in transactions with commercial organizations than with government organizations, such risks can also thrive in exchanges with the latter. While it is argued that risk perceptions necessitate trust, several studies have also noted that trust in an interaction or an exchange partner could significantly contribute to the reduction of the perceptions of the risks involved in an interaction or an exchange. An Internet-based survey with 208 Internet users from three Dutch cities was conducted to collect the necessary data to test the research hypotheses. Results of the online survey reveal that Dutch Internet users’ trust in a government organization’s ability to protect citizens’ personal data and users’ assessment of the sensitivity of personal data disclosed for e-government transactions are related to the perceived risks of disclosing such data negatively and positively, respectively.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号