首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 0 毫秒
1.
While there is no question that the commercial development of the World Wide Web is still in its infancy and growing rapidly, this development faces a serious barrier to ultimate commercialization. In this article we develop the argument that the primary barrier to the successful commercial development of the Web is the current lack of consumer trust in this new commercial medium. This lack of trust is engendered primarily by the industry's documented failure to respond satisfactorily to mounting consumer concerns over information privacy in electronic, networked environments. We examine how such concerns are affecting the growth and development of consumer-oriented commercial activity on the World Wide Web and investigate the implications of these concerns for potential industry response. In the short run, the commercial development of the Web depends on giving consumers the opportunity to be anonymous when engaging in information exchanges and online transactions. Ultimately, however, commercial Web providers must come to realize that the Internet dramatically shifts the balance of power between a business and its customers, and therefore, radical new business strategies will be required for long-term success. Because the Web offers unprecedented opportunities for interacting with customers, strategies that take advantage of the medium's unique features are likely to reap important rewards in customer satisfaction, loyalty, and retention. Therefore, in the long run, the most effective way for commercial Web providers to develop profitable exchange relationships with online customers is to gain consumer trust by allowing the balance of power to shift toward more cooperative interactions between firms and their customers.  相似文献   

2.
王丽明 《科技广场》2012,(3):250-253
随着经济的发展和互联网的普及,在电子商务环境下,侵犯消费者隐私权的事件日益增多,引起了业内的广泛关注。本文主要论述了在电子商务环境下消费者隐私权保护的问题,并在分析问题后提出了相应的解决方法。  相似文献   

3.
In the United States, Congress has had a long-standing interest in consumer privacy and the extent to which company practices are based on fair information practices. Previously, public policy was largely informed by anecdotal evidence about the effectiveness of industry self-regulatory programs. However, the Internet has made it possible to unobtrusively sample web sites and their privacy disclosures in a way that is not feasible in the offline world. Beginning in 1998, the Federal Trade Commission relied upon a series of three surveys of web sites to assess whether organizations post online privacy disclosures and whether these disclosures represent the U.S. definition of fair information practices. While each year's survey has provided an important snapshot of U.S. web-site practices, there has been no longitudinal analysis of the multiyear trends. This study compares a subset of equivalent individual-level web-site data for the 1998, 1999, 2000, and 2001 web surveys. Implications for using this type of research to inform public policy are discussed.  相似文献   

4.
[目的/意义]信息隐私关注和信任是影响智能手机用户的个人信息安全行为的重要因素,对智能手机用户的信息隐私关注和信任与其个人信息安全行为意向关系的探讨有助于更好地理解智能手机用户的信息安全行为。[方法/过程]本文引入以往经验变量,构建了智能手机用户信息隐私关注、信任与其信息安全行为意向之间的作用模型,通过调查问卷收集数据,并利用SmartPLS2.0进行验证。[结果/结论]研究发现:智能手机用户的信息隐私关注对其信息安全行为意向具有正向作用;用户对智能手机生产商和服务商的信任在信息隐私关注和信息安全行为意向之间起到中介作用;智能手机用户信息安全方面的以往经验对其信息隐私关注、信任和信息安全行为意向起正向作用。  相似文献   

5.
网络隐私顾虑被认为是阻碍用户披露个人信息的重要影响因素并越来越受到学术界的重视。鉴于隐私是与情境相联系的多维、动态的概念,情境的变化会影响用户对隐私的理解,本文结合现实背景提出了电子商务环境下网络隐私顾虑的理论概念,在以往研究的基础上确定了网络隐私顾虑的构成维度,开发出初始的测量指标,然后通过3套独立的样本数据进行探索式因子分析、验证式因子分析和关联效度分析。结果表明量表具有良好的信度和效度,网络隐私顾虑由控制、收集、二次使用、错误、不当访问与补救5个维度和19个题项构成。  相似文献   

6.
尊重隐私、保护隐私已逐渐被现实社会所认同,然而对为什么要保护隐私以及隐私的价值仍各有歧见。西方社会对隐私保护的辩护主要有绝对价值论和相对价值论两种思路,两种思路都是从自由主义和个人主义的角度出发的,与以集体主义为背景的中国社会不相符合。在集体主义的框架内,也能对隐私的保护提供有力的辩护。保护隐私不仅能增加个体的福利,而且能增进社会的总体福利,促进社会和谐。  相似文献   

7.
Browsing the Web gives one the heady feeling of walking without footprints in cyberspace. Yet data surveillance can be both ubiquitous and transparent to the user. Can those who browse the Web protect their privacy? And does it matter if they cannot? I offer answers to these questions from the American legal tradition. The American legal tradition focuses on a right to privacy, rather than a need for data protection. To answer these questions I begin by delineating the differences among privacy, security, and anonymity. I then discuss what information is transferred during Web browsing. I describe some of the available technology for privacy protection, including public and private key cryptography and Web proxies. I then describe the American tradition of privacy in common, statutory, and constitutional law. With the support of this tradition, I close by arguing that although privacy in Web browsing has no current legal protection in the United States, the right to privacy in the analogue equivalents has been recognized in the American legal tradition.  相似文献   

8.
传统的排名制度存在诸多问题,必须提出科学有效的新方式对其进行变革。但如何结合时下网络时代的特点科学有效地公布学生成绩呢?本文就这一问题具体分析了如何公布学生成绩才是科学有效的,并在此基础之上结合网络技术,研究适合不同网络环境下基于B/S模式在线公布成绩的具体实现,并对实现方案进行了全面的分析与评价。  相似文献   

9.
Domesticating Computers and the Internet   总被引:1,自引:0,他引:1  
The people who use computers and the ways they use them have changed substantially over the past 25 years. In the beginning highly educated people, mostly men, in technical professions used computers for work, but over time a much broader range of people are using computers for personal and domestic purposes. This trend is still continuing, and over a shorter time scale has been replicated with the use of the Internet. This paper uses data from four national surveys to document how personal computers and the Internet have become increasingly domesticated since 1995 and to explore the mechanisms for this shift. Now people log on more often from home than from places of employment and do so for pleasure and for personal purposes rather than for their jobs. Analyses comparing veteran Internet users to novices in 1998 and 2000 and analyses comparing the change in use within a single sample between 1995 and 1996 support two complementary explanations for how these technologies have become domesticated. Women, children, and less well-educated individuals are increasingly using computers and the Internet and have a more personal set of motives than well-educated men. In addition, the widespread diffusion of the PC and the Internet and the response of the computing industry to the diversity in consumers has led to a rich set of personal and domestic services.  相似文献   

10.
网络环境下的隐私与隐私保护   总被引:3,自引:0,他引:3  
刘一兵 《情报科学》2003,21(6):605-608
网络隐私问题已经引起学术界的广泛关注,本文首先分析了网络隐私产生的四种渠道和侵害网络隐私的四种可能方式,然后研究了网络隐私保护的行业自律措施和立法保护措施,最后就我国的网络隐私保护问题给出了建设性的意见。  相似文献   

11.
[目的/意义]智能系统使人们享受便捷数字生活的同时,也对用户隐私产生事实或潜在的威胁。尽管用户对威胁的感知及其规避行为有助于保证隐私信息的安全,但在好奇心和从众动机的驱使下,用户的隐私意识变得脆弱甚至瓦解。文章整合技术威胁规避理论和采纳动机理论中的好奇心与从众要素,探讨智能系统用户隐私意识对隐私保护意愿的作用机制。[方法/过程]收集296份有效问卷数据,采用PLS-SEM方法进行实证检验。[结果/结论]隐私意识通过正向影响感知威胁和感知可规避性对用户隐私保护意愿起积极作用;好奇心和从众对隐私意识产生直接负面影响,并对隐私意识和感知威胁/感知可规避性之间的关系起着间接的调节作用。研究揭示了隐私意识对隐私保护意愿的作用路径和边界条件,加深了对用户隐私决策行为背后障碍类因素的理解,有助于智能系统服务企业进一步完善用户隐私保护措施,为智能信息技术应用提供良好生态。  相似文献   

12.
网上书店(Electronic Commerce)是在Internet开放的网络环境下,基于浏览器/服务器应用方式,实现消费者的网上购书、商户之间的网上交易和在线电子支付的一种新型的商业运营模式。对基于ASP.NET技术网上书店的设计与实现进行了阐述,可以使更多的人对网上购书的实现过程得到进一步的了解。  相似文献   

13.
While recent developments in information and communication technologies have produced heightened concern over privacy issues, technology and privacy have a long history of interaction. The home has served as a key locus for this interaction. By distinguishing inside from outside, the home supports the allocation of particular behaviors and information to different areas, both physical and virtual. This article explores how different technologies, including structural elements, have affected and reflected over time the boundary represented by the home and how that boundary has helped shape the construction of privacy in the West. This illustrates how privacy might be conceptualized as a social condition arising from the interaction of various boundaries, including the principal one separating the public and the private.  相似文献   

14.
Given the expanse of the Internet as a topic for research, the need for transdisciplinary research becomes evident. This paper introduces and expands on the problems of Internet research and how some of those can be resolved by pursuing transdisciplinary research. Issues introduced are the fragmentation of understanding, the disunity of research, and the public reception of that research.  相似文献   

15.

Given the expanse of the Internet as a topic for research, the need for transdisciplinary research becomes evident. This paper introduces and expands on the problems of Internet research and how some of those can be resolved by pursuing transdisciplinary research. Issues introduced are the fragmentation of understanding, the disunity of research, and the public reception of that research.  相似文献   

16.
王丽明 《科技广场》2012,(2):156-159
电子商务市场与传统实体市场有很大的不同,导致消费者的行为发生了很大的变化。这种变化使网络零售商不得不重新寻找适合网络销售的营销策略和营销工具。不同的网络营销策略的制订和网络营销工具的取舍决策,都应基于对网络消费者行为的认识和分析研究。本文分析了网上消费者的心理和行为特征,并提出相应的网络营销策略,对进一步开展现代企业电子商务营销具有重要意义。  相似文献   

17.
电子商务中隐私权与知情权的冲突与协调讨论   总被引:1,自引:0,他引:1  
刘青 《情报科学》2004,22(9):1141-1143,1148
本文在概述电子商务中的隐私权与知情权及其保护问题的基础上,探讨了电子商务中隐私权与知情权的冲突问题,进而提出了解决二者冲突的原则及办法。  相似文献   

18.
美国《隐私权法》与公民个人信息保护   总被引:12,自引:1,他引:12  
周健 《情报科学》2001,19(6):608-611
本文介绍了美国《隐私权法》的立法原则、适用范围、个人记录公开的限制和登记、公民查询与修改个人记录的权利、对行政机关的限制与要求、免除适用的规定、该法与美国《信息自由法》的关系;论述了我国厂家和借鉴国外隐私保护的法律法规,强化政府信息法制建设力度,在确保国家和公共利益的前提下依法保护公民个人信息的必要性。  相似文献   

19.
网络环境下个人隐私的侵犯与保护   总被引:6,自引:0,他引:6  
左艳华 《情报杂志》2002,21(4):24-25,27
论述了网络环境下个人隐私侵犯的形式、个人隐私保护的迫切性,介绍了国外网络环境下个人隐私的保护状况,提出了中国网络环境下个人隐私的保护模式。  相似文献   

20.
在不泄露隐私信息或敏感知识的基础下,如何挖掘出分布式数据中准确的规则信息,已成为数据挖掘领域的重要研究方向之一。本文总结了面向分布式数据挖掘的隐私保护技术的现状,并比较分析了不同方法的优缺点,另外还提出了面向数据挖掘隐私保护技术的性能评估标准,展望了未来进一步的研究方向。  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号