首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 125 毫秒
1.
This study aimed to investigate the issue of consumer intention to disclose personal information via mobile applications (apps). Drawing on the literature of privacy calculus theory, this research examined the factors that influence the trade-off decision of receiving perceived benefits and being penalized with perceived risks through the calculus lens. In particular, two paths of the direct effects on perceived benefits and risks that induce the ultimate intention to disclose personal information via mobile apps were proposed and empirically tested. The analysis showed that self-presentation and personalized services positively influence consumers’ perceived benefits, which in turn positively affects the intention to disclose personal information. Perceived severity and perceived control serve as the direct antecedents of perceived risks that negatively affect the intention of consumers to disclose personal information. Compared with the perceived risks, the perceived benefits more strongly influence the intention to disclose personal information. This study extends the literature on privacy concerns to consumer intention to disclose personal information by theoretically developing and empirically testing four hypotheses in a research model. Results were validated in the mobile context, and implications and discussions were presented.  相似文献   

2.
[目的/意义] 当个体(原始所有者)将其敏感信息披露给他人(共同所有者)时,原始所有者的隐私保护不仅取决于本人,还取决于共同所有者,本研究目的在于寻求共同所有者保护原始所有者隐私的动机。[方法/过程] 基于传播隐私管理理论,对信息敏感度的范畴进行扩展,同时包括原始所有者的敏感度和共同所有者的敏感度,并基于该视角分析共同所有者保护原始所有者隐私的影响因素。[结果/结论] 研究表明,共同所有者保护原始所有者隐私的动机取决于共同所有者自身关注的问题和与原始所有者有关的问题,前者包括共同所有者的信息敏感度和感知愉悦,后者包括原始所有者的信息敏感度和遵守意愿。此外,共同所有者的信息敏感度和感知愉悦对结果变量的影响程度与原始所有者的信息敏感水平有关,后者的敏感水平越高,对前者的影响程度越低。  相似文献   

3.
Requesting personal information in frontline service encounters raises privacy concerns among customers. The proximity contact tracing that occurred during the COVID-19 pandemic provides an intriguing context of information requests. Hospitality venues required contact tracing details from customers, and customer cooperation varied with concerns about privacy. Drawing on gossip theory, we investigate the roles of businesses’ data privacy practices and government support in driving customers’ responses to contact tracing. Our findings show that perceived transparency of a business’s privacy practices has a positive effect on customers’ commitment to the business, while perceived control exerts a negative effect on commitment. These effects are mediated by customers’ information falsification rather than disclosure, because the former is a sensitive behavioral indicator of privacy concerns. The results also reveal the moderating roles of government support. This research contributes to the customer data privacy literature by demonstrating the distinct effects of perceived transparency and control on commitment and revealing the underlying mechanism. Moreover, the research extends the conceptual understanding of privacy practices from online contexts to face-to-face contexts of frontline service. The findings offer implications for the management of customer data privacy.  相似文献   

4.
James Rachels’ seminal paper “Why Privacy Is Important” (1975) remains one of the most influential statements on the topic. It offers a general theory that explains why privacy is important in relation to mundane personal information and situations. According to the theory, privacy is important because it allows us to selectively disclose personal information and to engage in behaviors appropriate to and necessary for creating and maintaining diverse personal relationships. Without this control, it is implied, the diversity of relationships would diminish; relationships would “flatten out”, we might say. The aspect of the paper that addresses information flows (what I refer to as his information privacy theory) has been of particular interest to computer information privacy theorists. Despite its continued importance to computer privacy theorists, however, the information privacy theory appears to be contradicted by recent developments in computing. In particular, since the publication of Rachels’ paper we have seen an extensive amount of personal information collected. Further, recent developments in computing falling under the heading of social computing have brought about a new wave of personal information creation and collection. This paper will reassess and resituate Rachels’ information privacy theory in light of these developments. I will argue that the increasing collection of personal data will not flatten relationships as the information privacy theory predicts because such data lack contextual factors important to Rachels’ general theory. The paper will conclude by pointing to some areas where Rachels’ general theory and where his information privacy theory will continue to be relevant.  相似文献   

5.
Collaborative frequent itemset mining involves analyzing the data shared from multiple business entities to find interesting patterns from it. However, this comes at the cost of high privacy risk. Because some of these patterns may contain business-sensitive information and hence are denoted as sensitive patterns. The revelation of such patterns can disclose confidential information. Privacy-preserving data mining (PPDM) includes various sensitive pattern hiding (SPH) techniques, which ensures that sensitive patterns do not get revealed when data mining models are applied on shared datasets. In the process of hiding sensitive patterns, some of the non-sensitive patterns also become infrequent. SPH techniques thus affect the results of data mining models. Maintaining a balance between data privacy and data utility is an NP-hard problem because it requires the selection of sensitive items for deletion and also the selection of transactions containing these items such that side effects of deletion are minimal. There are various algorithms proposed by researchers that use evolutionary approaches such as genetic algorithm(GA), particle swarm optimization (PSO) and ant colony optimization (ACO). These evolutionary SPH algorithms mask sensitive patterns through the deletion of sensitive transactions. Failure in the sensitive patterns masking and loss of data have been the biggest challenges for such algorithms. The performance of evolutionary algorithms further gets degraded when applied on dense datasets. In this research paper, victim item deletion based PSO inspired evolutionary algorithm named VIDPSO is proposed to sanitize the dense datasets. In the proposed algorithm, each particle of the population consists of n number of sub-particles derived from pre-calculated victim items. The proposed algorithm has a high exploration capability to search the solution space for selecting optimal transactions. Experiments conducted on real and synthetic dense datasets depict that VIDPSO algorithm performs better vis-a-vis GA, PSO and ACO based SPH algorithms in terms of hiding failure with minimal loss of data.  相似文献   

6.
泄露他人隐私行为意向的影响要素研究   总被引:1,自引:0,他引:1       下载免费PDF全文
吴娜  李文立  吕欣  柯育龙 《科研管理》2015,36(11):139-147
互联网的发展为人们的生活带来巨大便利,但也带来了隐私安全隐患,通过互联网渠道泄露他人隐私的现象已经引起社会的高度关注。基于犯罪学领域的中和技术理论,分析了否认责任、否认伤害、否认受害者、更高层次效忠、避免更多的伤害和隐私意识对泄露他人隐私行为发生意向的影响,构建了互联网环境下泄露他人隐私意向的研究模型。以人肉搜索这一典型例子进行场景设计,通过问卷调查,收集759份有效问卷,采用Smart PLS2.0软件进行结构方程检验。实证结果表明否认责任、否认受害者和避免更多伤害三类中和技术正向影响泄露他人隐私行为的意向,否认伤害和更高层次效忠技术对泄露他人隐私意向没有显著影响。另外,增强个人隐私意识能有效削弱泄露他人隐私行为的意向。本研究结果有助于了解隐私泄露者的行为动机,为规范互联网用户上网行径和制定隐私保护政策提供借鉴。  相似文献   

7.
Federated learning (FL), as a popular distributed machine learning paradigm, has driven the integration of knowledge in ubiquitous data owners under one roof. Although designed for privacy-preservation by nature, the supposed well-sanitized parameters still convey sensitive information (e.g., reconstruction attack), while existing technical countermeasures provide weak explainability for privacy understanding and protection practices of general users. This work investigates these privacy concerns with an exploratory study and elaborates on data owners’ expectations in FL. Based on the analysis, we design the first interactive visualization system for FL privacy that supports intelligible privacy inspection and adjustment for data owners. Specifically, our proposal facilitates sample recommendation for joint privacy–performance training at cold start. Then it provides visual interpretation and attention rendering of privacy risks in view of multiple attacking channels and a holistic view. Further it supports interactive privacy enhancement involving both user initiative and differential privacy technique, and iterative trade-off with real-time inference accuracy estimation. We evaluate the effectiveness of the system and collect qualitative feedbacks from users. The results demonstrate that 96.7% of users acknowledge the benefits to privacy inspection and adjustment and 90.3% are willing to use our system. More importantly, 87.1% increase the willingness of contributing data for FL.  相似文献   

8.
Despite mobile applications being at the frontier of mobile computation technologies, security issues pose a threat to their adoption and diffusion. Recent studies suggest that security violations could be mitigated through improved security behaviors and attitudes, not just through better technologies. Existing literature on behavioral security suggests that one of the main predictors of users’ perceptions of security is their perceived privacy concerns. Using communication privacy management theory (CPM), this study examines the effects of privacy-related perceptions, such as privacy risk and the effectiveness of privacy policies, on the security perceptions of mobile app users. To empirically test the proposed theoretical model, two survey studies were conducted using mobile apps requesting less sensitive information (n = 487) and more sensitive information (n = 559). The findings show that the perceived privacy risk negatively influences the perceived security of the mobile apps; the perceived effectiveness of a privacy policy positively influences user perceptions of mobile app security; and perceived privacy awareness moderates the effect of perceived privacy risk on the perceived security of mobile apps. The results also suggest that users have different privacy-security perceptions based on the information sensitivity of the mobile apps. Theoretical and practical implications are discussed.  相似文献   

9.
This paper proposes a roadmap for how privacy leakages from outsourced managed security services using intrusion detection systems can be controlled. The paper first analyses the risk of leaking private or confidential information from signature-based intrusion detection systems. It then discusses how the situation can be improved by developing adequate privacy enforcement methods and privacy leakage metrics in order to control and reduce the leakage of private and confidential information over time. Such metrics should allow for quantifying how much information that is leaking, where these information leakages are, as well as showing what these leakages mean. This includes adding enforcement mechanisms ensuring that operation on sensitive information is transparent and auditable. The data controller or external quality assurance organisations can then verify or certify that the security operation operates in a privacy friendly manner. The roadmap furthermore outlines how privacy-enhanced intrusion detection systems should be implemented by initially providing privacy-enhanced alarm handling and then gradually extending support for privacy enhancing operation to other areas like digital forensics, exchange of threat information and big data analytics based attack detection.  相似文献   

10.
The only way to be aware of the risks and threats of Facebook, the most commonly used social networking site in the world and Turkey, is to be a careful user changing the default settings or simply not to have a Facebook account. In Turkey, there is still no study in which personal information shared though social networking sites has been evaluated in terms of privacy. For this reason, the findings obtained of this study have a great importance in the general picture of the current situation and drawing attention to the risks of the issue in Turkey where there are no legal arrangements effectively protecting the users from such sites. This study aims to investigate the Facebook privacy of information professionals who are members of KUTUP-L, and to determine the sensitivity and level of awareness of information professionals in Turkey. Facebook user profiles of 400 information professionals, all KUTUP-L members, have been analyzed in a study examining 32 different privacy settings. A privacy score has been calculated for each user, and the relations between privacy results have been analyzed. The findings at the end of the study show that information professionals in Turkey do pay attention to privacy, and most of the users change the default settings in order to protect their personal information.  相似文献   

11.
Over the past decade, social media technologies have become effective tools not only for entertainment, but also for online health communications. In virtual health communities (VHCs), the members often share their personal health information (PHI) with other members. These information exchanges provide benefits to both the information providers as well as the recipients. The PHI disclosure, however, may entail privacy concerns. Our study used the privacy calculus model to examine the trade-off between individuals’ expected benefits and privacy concerns when disclosing PHI in social media environments. Our results showed that age, health status, and affective commitment influence the balance between the information disclosure drivers and barriers in the privacy calculus model. More specifically, we found that among members of VHCs, healthier people expect to receive fewer personal benefits of communicating PHI in social media environments. Moreover, individuals who are emotionally attached to online communities expect to both receive and provide more benefits while communicating PHI in those communities. We also observed that individuals who are familiar with but not members of VHCs, especially those who are young and healthy, are more concerned about their PHI privacy in online communities.  相似文献   

12.
[目的/意义]信息隐私关注和信任是影响智能手机用户的个人信息安全行为的重要因素,对智能手机用户的信息隐私关注和信任与其个人信息安全行为意向关系的探讨有助于更好地理解智能手机用户的信息安全行为。[方法/过程]本文引入以往经验变量,构建了智能手机用户信息隐私关注、信任与其信息安全行为意向之间的作用模型,通过调查问卷收集数据,并利用SmartPLS2.0进行验证。[结果/结论]研究发现:智能手机用户的信息隐私关注对其信息安全行为意向具有正向作用;用户对智能手机生产商和服务商的信任在信息隐私关注和信息安全行为意向之间起到中介作用;智能手机用户信息安全方面的以往经验对其信息隐私关注、信任和信息安全行为意向起正向作用。  相似文献   

13.
It has been recommended that parents should monitor their children’s Internet use, including what sites their children visit, what messages they receive, and what they post. In this paper, I claim that parents ought not to follow this advice, because to do so would violate children’s right to privacy over their on-line information exchanges. In defense of this claim, I argue that children have a right to privacy from their parents, because such a right respects their current capacities and fosters their future capacities for autonomy and relationships.  相似文献   

14.
With the continuous development of comprehensive technologies in various fields, the cyber-physical systems has been successfully applied in many fields in a large scale. The privacy and security issues in the system have gradually become the focus of attention. This article focuses on privacy protection issues in the area of Internet of Vehicles (IoV). IoV has developed rapidly and come into public consciousness quickly. Radio Frequency Identification (RFID) technology is a safe and reliable sensor data processing system, which is widely used in IoV. However, RFID system often suffers some risks of privacy disclosure. For example the owners are reluctant to disclose their private information such as their precise location information to the public network. Faced with those security risks, it is of great importance for the RFID system applied to IoV to protect private information. In this paper, we propose a cloud-based mutual authentication protocol aiming at ensuring efficient privacy preserving in IoV system, which enables people the efficiently and intelligently travel mode while protecting their privacy from divulging. Moreover, that the anonymity of tag is implemented not only protects the privacy data of the owners, but also prevents the malicious tracking from outside attackers. As to the proposed scheme, the proof based on BAN logic indicates it is of logic security. Security analysis and performance evaluation show that the scheme can be a good security solution for IoV with the feature of good safety and reliability.  相似文献   

15.
Caller ID service continues to be a controversial issue in the U.S. because of its privacy implications. State and federal regulators, legislators, scholars, and the courts have examined and responded to the privacy issue from a policy perspective, but perhaps without a complete understanding of the meaning of privacy in the context of the debate. What types of privacy are involved, how significant are these interests, and how might privacy needs compare and be balanced? This article explores privacy in the context of the Caller ID debate from a social science perspective. It examines motives for seeking and preserving privacy and explores the dynamic relationship between the caller and called party positions. It then provides an analysis of current and proposed Caller ID features and policies with a view toward understanding how these proposals balance competing privacy needs. This article establishes an analytic framework and a foundation for further study of caller and called party privacy that should lead to a better understanding of the privacy debate and the privacy implications of Caller ID.  相似文献   

16.
I begin with a discussion of the value of privacy and what we lose without it. I then turn to the difficulties of preserving privacy for genetic information and other medical records in the face of advanced information technology. I suggest three alternative public policy approaches to the problem of protecting individual privacy and also preserving databases for genetic research: (1) governmental guidelines and centralized databases, (2) corporate self-regulation, and (3) my hybrid approach. None of these are unproblematic; I discuss strengths and drawbacks of each, emphasizing the importance of protecting the privacy of sensitive medical and genetic information as well as letting information technology flourish to aid patient care, public health and scientific research.  相似文献   

17.
姜宁  顾锋 《科技管理研究》2021,41(1):160-165
基于企业非授权信息使用在手机购物APP情境下对消费者的影响,根据收集的269份消费者问卷,对提出的概念模型与研究假设进行检验.研究结果显示,非授权信息使用会增加消费者感知的信息脆弱性,而信息脆弱性则会促进消费者的转换行为;另外,信息设置有效性和信息政策有效性都可以减弱信息脆弱性与转换行为之间的正向关系.研究不仅促进相关...  相似文献   

18.
黄丽佳  袁勤俭 《现代情报》2017,37(10):114-121
通过对相关文献的回顾,本文对国际网络隐私研究进行了计量分析,发现现有的研究主题集中在"基于移动位置服务的隐私问题研究"、"隐私保护算法研究"、"隐私保护技术研究"、"云计算的隐私安全研究"、"网络隐私权限控制研究"、"社交网站和电子商务中的用户隐私态度与行为研究"、"青少年敏感信息的隐私与安全保护研究"、"数据公开共享策略与国家治理研究"8个方面。研究发现当前研究中存在"利用数据纵向分析网络隐私主题随时间发展变化的研究较少"、"对于一些发展中国家的隐私问题关注度较低"、"国家的治理与业界的隐私政策相对独立缺乏联系"等问题,"大数据时代移动信息和社交信息挖掘过程中的隐私问题"、"在线医疗的隐私问题"等是未来研究值得关注的领域。  相似文献   

19.
Consumers can conduct mobile commerce via their smartphones. They can search for products and when ready, they pay and have the products delivered to their homes. By sharing personal information, they receive faster and more customized service. Because of the risk of loss of privacy, consumers need to balance their privacy concerns against the perceived value of enhanced mobile commerce. In this empirical study, the unified theory of acceptance and use of technology (UTAUT2) is modified where perceived value replaces price value to represent the value of an IT artifact that has no direct costs attributable to it. The framework is extended to include constructs from the privacy calculus. In addition, the construct of personal innovativeness is added as a moderator with the anticipation that owners of smartphones who are more personally innovative will be more willing to share information. From an empirical study of Canadian smartphone owners, the results show that perceived privacy concerns influence perceived value and that intention to use is significantly influenced by hedonic motivation and perceived value.  相似文献   

20.
Private information disclosure on social networking sites (SNS) is one of the most important and active issues in the information management arena. The growing phenomenon of platforms requiring users to disclose personal information exposes the limitations of previous studies that only focus on users’ voluntary disclosure. In this study, we define two modes of users’ private information disclosure behavior: voluntary sharing and mandatory provision. Using the Communication Privacy Management theory, we built a framework to explain the impact of individual characteristics, context, motivation, and benefit–risk ratio on the user's willingness to disclose voluntarily or mandatorily. Our research shows that voluntary sharing is more likely to be driven by positive factors, such as perceived benefits, social network size, and personalization, while mandatory provision is affected by individual characteristics such as age, privacy policy, and perceived risks. One of our interesting findings is that perceived risk has less impact on voluntary sharing than previous studies suggested. When encouraging users to share information voluntarily, platforms do not need to pay as much attention to reducing perceived risk as in the mandatory providing mode, but should focus on improving perceived benefits. Being the first to classify and compare the private information disclosure modes of SNS users, our research enriches the existing literature and opens up new avenues for researchers and social networking platforms.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号