用户名: 密码: 验证码:
社交网络用户隐私关注动态影响因素及行为规律研究
详细信息    本馆镜像全文|  推荐本文 |  |   获取CNKI官网全文
摘要
随着互联网、移动互联网愈发深刻地影响着人们的社会行为,用户暴露在网络环境中的维度和几率大大增加,隐私威胁已经成为关乎每个网络用户切身利益的重要问题。特别是在功能强大的智能终端、丰富多彩的服务应用、日益增长的网络关联等因素作用下,用户越来越多的隐私不可避免地主动、无意或被恶意泄露。用户需要将控制隐私的权利把握在自己手中,网络应用提供商则希望利用尽可能多的隐私信息获取更多的利益,其他利益相关方也想从中赚取更多价值。可见,隐私问题的深入研究具有重大的现实意义。
     由于隐私概念具有人类社会属性,故隐私的研究可以依托社会网络,而社交网络的出现为隐私问题提供了很好的研究环境,它不仅拥有与现实社会极为接近的用户规模、相互关系、复杂结构、行为规律,还拥有现实社会无法相比的易获取、易分析、易验证等特征。因此,本文以社交网络为研究对象,聚焦于用户隐私关注产生影响的关键因素以及由此引发的用户行为规律等相关问题,具体研究内容包括以下三部分:
     (1)社交网络用户隐私关注动态影响因素研究。
     以往对于用户隐私关注影响因素的研究,大都认为影响因素是静态的,但随着网络将人们的社交活动数量加大、频率提高,原本变化缓慢的隐私感知开始更容易被用户察觉到,特别是更密集、更重大的隐私负面事件直接或间接地被用户接收到时,其对隐私威胁的判断势必发生变化。基于此,本研究站在动态的视角,结合以往理论基础和当前研究热点,建立隐私关注动态影响模型。考虑用户所受直接和间接影响、不同类型社交网站的不同作用特征,发现与隐私相关的突发事件和媒体宣传对用户的隐私关注有着非常明显的影响。在对比情感性、工具性、混合性、无连带性社交网站后,发现各类社交网站中,用户隐私关注受动态因素影响的结果有很大不同,其中新浪微博为代表的混合性社交网站呈现出最贴近假设、最贴近用户社会行为特征的结果。因此,后续隐私行为规律研究选取了新浪微博平台作为实证研究对象。
     (2)社交网络利益驱动下的隐私行为演化博弈研究。
     以往对于隐私悖论的探讨,大都集中在局中人当下利益的博弈,但社交网络环境下,人们具有长期的社会行为,博弈局中人面对利益时采取的策略更多是长期策略。因此,本研究采用演化博弈思想,将用户和网站双方看成两个群体,基于前部分用户利益感知对其行为的影响以及以往研究对利益成本和收益的描述,通过搭建收益矩阵和群体复制者动态方程,得到隐私利益博弈的演化博弈模型。进而,引入突发事件干扰因素后,调整演化博弈模型,获得不同条件下的演化结果,结合仿真后的结果对比图,清晰地观察到演化规律。最后,通过对比用户方与网站方期望结果,讨论出社会意义最大的隐私利益博弈的演化规律,为网站方、利益相关方、媒体、监管方等角色提出建议,以期保护用户利益,并最大化社会效益。后续研究将此部分结论放到真实社交网络环境中进行观察,所得结果更有实践指导意义。此外,基于此部分宏观规律的指导,后续部分深入分析了微观层面用户隐私行为演化规律。
     (3)社交网络动态隐私关注条件下的用户行为规律研究。
     以往复杂网络中用户行为规律研究方法及思路已经比较成熟,但与隐私相关的用户行为规律研究还不多见。近年来,一些具有隐私属性的网络应用快速发展,使得新环境下的隐私研究更为迫切。本研究聚焦于LBS典型隐私信息应用,借助与新浪微博平台的合作,通过社会网络分析方法及大数据处理软件对大量隐私信息进行深入分析,从而获得用户隐私行为与业务采纳扩散规律以及突发事件对隐私行为影响规律。最后,结合以上各部分研究结果,以社会网络中隐私相关行为规律为依据,对社交网络发展、隐私业务应用、隐私监管策略、用户隐私安全策略等问题提出相应建议。
     本研究的创新之处有三点:(1)构建了社交网络隐私关注动态影响因素模型。以突发事件和媒体曝光为考察对象,在动态环境中观察用户隐私关注的变化,对比个人和群体对隐私关注的不同作用效果,讨论不同功能社交网络对隐私关注的不同作用结果,发现用户社交网络隐私关注的影响规律;(2)构建了社交网络突发事件影响下隐私行为演化博弈模型。考虑在突发事件扰动下,用户群体和网站群体在不同利益策略下,用户的选择和突变行为演化规律,以此讨论用户与网站以及第三方策略对社交网络发展所起作用;(3)探究了社交网络隐私业务采纳行为规律。通过新浪微博最新、最典型的隐私属性业务LBS应用,获取研究数据,利用社会网络分析方法,发现隐私业务采纳规律受隐私相关突发事件的影响。
Along with the development of the Internet and mobile Internet, human's social behaviors have been deeply influenced. People are more easily to be exposed to a net environment. Therefore, privacy threat has become been a very crucial issue which is related to the interest of every consumer consumers. Gradually, an even increasing amount of Privacy has been unavoidablyrevealed by accident or by malice, especially under the effect of intelligent terminal, service application and network association. Users want to own the right of privacy controlling, while the internet application providers wish for users'privacy in order to gain more profit, the same as the other interested parties. As we can see, it is significant to do deep researches in the area of privacy.
     The concept of privacy has the attribute of human society, so the research of privacy can be rely on social network. The appearance of social network provides a very good environment for privacy researching. It not only has the scale of users, interrelation, complex construction, behavior rules which are nearly the same as the real society, but also owns the characteristics of accessibility, analyzability and verifiability which cannot be get in the real society. Thus, taken social network as the research object, this paper focuses on the factors that influence privacy concerns and the behavior rules which are related to privacy concerns. The specific research contents are as follows:
     (i)Research on Dynamic Factors that Influence Privacy Concern of-Social Network.
     Researches on factors that influence privacy concern before are mainly based on static factors, but with the increase of the number and frequency of social activities, privacy awareness is more likely to be aware. Particularly when some great negative events are faced by users, they will strengthen the judgment of privacy threats. Based on-this background, this paper combines classic theory with new research hotspots and sets up a model of factors that influence privacy concern from the view of dynamic. Taking the direct and indirect influence, different features in different kinds of social networks into consideration, the author found out that emergency and media exposure do great impact on users'privacy concerns. After comparing different kinds of social networks (emotional, instrumental, uncorrelated, mixed), the author findsfigured out that the results are quite different toward different websites. Among them, Sina Weibo, which represents mixed websites, obtains the best result in users'characteristics of social activity. So the following research on behavior rules will rely on the platform of Sina Weibo.
     (ii)Evolutionary Game Research on Privacy Behaviors based on Profit-Driven in Social Network.
     Researches on privacy paradox before mainly focus on immediate interest, but in the environment of social network, people's pattern of social behaviors is likely to last longer and strategies are mostly in long-term. Therefore, this paper proposes an evolutionary game which contains users and website service providers. Consulting the above results that explained the users'interest perception and its effect on behavior and former researches on cost and profit, the author sets up a privacy evolution game model through constructing a pay-off matrix and group replication dynamic equation. Moreover, the author adds the factor of emergency and adjusts the game model, further gets results that are in different conditions. We can clearly obtain the evolutionary rules by combining with the simulation experiment. At last, through comparing the results in different groups, we pointed out the significant evolutionary rules in privacy interests which can be good advices to website service providers, stakeholders, media and supervisors, in order to protect the interests of consumers and maximize social benefits. Follow-up study will test the conclusion which is drawn in this part by observing in the real social network environment. The results will be more significant in practicalness. In addition, the next part will deeply analyze the evolutionary rules of users'privacy behaviors in micro-level, based on macro-level rules from this part.
     (iii)Research on Users'Behavior Rules in the Condition of Dynamic Privacy Concern in Social Network.
     There have been a lot of researches on users'behavior rules in complex network. The research methods are already mature, but users' behavior rules with privacy are immature now. In recent years, privacy researches are imperative because of the rapid development of web applications which may cause privacy disclosure. This research mainly focuses on classic LBS applications. Via the cooperation with Sina Weibo, we obtain the rules of privacy behaviors and business adoption diffusion, as well as the effect rules of how emergencies affect privacy behaviors by analyzing a lot of privacy information through social network analysis methods and data processing softwares. Finally, by summarizing the above research results, the author proposes some suggestions on development of social network, privacy business application, strategies on privacy supervision, strategies on privacy safety etc. according to the privacy behavior rules in social network.
     The innovation points in this research are as follows.(1) We set a model of dynamic factors that influence privacy concerns in social network. We select emergency and media exposure to be main factors, and observe the change of users'privacy concern in a dynamic environment, as well as compare the influence extent of different factors from both personal view and group view. Then we discuss different results from different social networks and find out the effect rules of users' privacy concerns in social network;(2) An evolutionary game model under the influence of emergencies in social network is set. Considering that under the disturbance of emergency, the users'group and the website service providers'group will choose different interest strategies, so that we can gain an evolutionary rule of users'choices and behavioral mutation. On this account, we can discuss how different strategies from diverse groups will promote the development of social network;(3) explore behavior rules of privacy business adoption in social network. We gain data from the latest and the most classic LBS application which featured in privacy attribute through Sina Weibo. Through analysis method in social network, we find out privacy-related emergencies will affect the privacy business adoption rules.
引文
[1]Krackhart, D, J. R. Hanson. Informal Networks:The Company Behind the Charts. Harvard Business Review,1993.71(4):104-111.
    [2]Krackhart, D, D. J. Brass.1994. Intraorganizational Networks:The Micro Side. In S. Wasserman and J. Galaskiewicz, Advances in Social Network Analysis. Thousand Oaks, Calif: Sage.
    [3]lin, N, W. M. Ensel,J. C. Vaughn. Social Resources and Strength of Ties:Structural Factors in Occupational Status Attainment. American Sociological Review,1981,46(4):393-405.
    [4]Watts, Duncan. Dynamics and the Small world Phenomenon. American Journal of Sociology, 1999,105:493-527.
    [5]Chang Fu, Luo, Jar Der. System Catastrophe:A Distributive Model for Organizational Collective Phenomenon. Journal of Mathematical Sociology,2002,26:1-17.
    [6]Granovetter, Mark. Economic Institutions as Social Structure:The Problem of Embeddedness. American Journal of Sociology,1985,91:481-510.
    [7]Tan X, Qin L, Kim Y, Hsu J. Impact of Privacy Concern in Social Networking Websites. Internet Research,2012,22(2),5.
    [8]王利明.人格权法新论.长春:吉林人民出版社,1994年.
    [9]康晓红.论隐私、隐私权的概念和特征.西南政法大学学报,1999年第2卷,第2期:第35-41页.
    [10]Chang Liua, Jack T. Marchewkaa, June Lub, Chun-Sheng Yub. Beyond concern:a privacy-trust-behavioral intention model of electronic commerce. Information & Management.2004, (42):127-142.
    [11]Stephen, J.F. Liberty, Equality, Fraternity, ed. Stuart D. Warner. Indianapolis:Liberty Fund, (1993),4.
    [12]Bok, S.On the Ethics of Concealment and Revelation. In:New York:Patheon Books,1982.
    [13]Fried, C. An anatomy of values:problems of personal and social choice.Harvard University Press,1970.
    [14]Shin D H. The effects of trust, security and privacy in social networking:A security-based approach to understand the pattern of adoption. Interacting with Computers,2010,22(5), 428-438.
    [15]Altman I. Privacy Regulation. Journal of Social Issues,1977:66-84.
    [16]Alan F Westin. Social and Political Dimensions of Privacy. Journal of Social Issues,2003, 59(2):431-453.
    [17]Luo, X.M. Trust Production and Privacy Concerns on the Internet-A framework Based on Relationship Marketing and Social Exchange Theory.Industrial Marketing Management, 2002,31(2):111-118.
    [18]Clarke R A. Information Technology and Dataveillance. Communications of the ACM.1998, 31(5):498-512.
    [19]O Nell D. Analysis of Internet Users'level of Online Privacy Concerns. Social Science Computer Review,2001,19(1):17-31.
    [20]Phelps J, Nowak G, Ferrell, E. Privacy concernsand consumer willingness to provide personal information. Journal of Public Policy & Marketing,2000,27-41.
    [21]Chung W, Paynter J. Privacy issues on the Internet.Proceedings of the 35th Hawaii International Conference on System Sciences,2002.
    [22]Chen J, Park Y. Trust and privacy in electronic commerces. IEEE International Conference on e-Technology, e-Commerce and e-Service,2004:1-4.
    [23]Chen J. Trust and privacy in electronic monitoring workplaces. Honolulu, HI:University of Hawaii at Manoa,2001.
    [24]Kim D, Ferrin D. Antecedents of consumer trust in B-to-C electronic commerce. Proceedings of the Ninth Americas Conference on Information Systems,2003:157-167.
    [25]Hoffman D, Novak T, Peralta T. Building consumer trust online. Communications of the ACM,1999,42(4):80-85.
    [26]巩震.网络消费者感知隐私的构面研究.北京邮电大学博士研究生学位论文,2010年.
    [27]马晓君.面向社会网络的用户隐私分析与保护.山东大学硕士学位论文,2012年.
    [28]凡菊,姜元春,张结魁.网络隐私问题研究综述.情报理论与实践,2008年,第31卷,第1期:153-157.
    [29]刘一兵.网络环境下的隐私与隐私保护.情报科学,2003年,第21卷,第6期:605-608.
    [30]辛建军.个人信息价值的黑灰白.商业价值,2012年,第]0卷.
    [31]CAVERLEE J, WEBB S. A large scale study of Myspace:observations and implications for online social networks.Proc of International Conference on Weblogs and Social Media,2008.
    [32]GROSS R, ACQUISTI A. Information revelation and privacy in online social networks. Proc of ACM Workshop on Privacy in the Electronic Society,2005:71-80.
    [33]HUBERMAN B A, ADAR E, FINE L R. Valuating privacy. IEEE Security and Privacy, 2005,3(5):22-25.
    [34]Chung W, Paynter J. Privacy issues on the Internet. Proceedings of the 35th Hawaii International Conference on System Sciences,2002.
    [35]张军,熊枫.网络隐私保护技术综述.计算机应用研究,2005年,第7卷,9-12.
    [36]韩晓燕,朱晨海.人类行为与社会环境.上海:格致出版社,2009年,第28-31页.
    [37]曹杰.行为科学.北京:科学技术文献山版社,1987年,第2-5页.
    [38]王瑞鸿.人类行为与社会环境.上海:华尔理工大学山版社,2002年,第1-2页.
    [39]马克·格兰诺维特.社会网与经济行动.罗家德泽.北京:社会科学文献出版社,2007年.
    [40]罗家德.社会网分析讲义.北京:社会科学文献出版社,2010年,第7页.
    [41]Grannovetter, Mark. Problems of Explanation in Economic Socialogy. Networks andOrganizations. Boston, Harvard Businness School Press,1992.
    [42]Grannovetter, Mark. Economic Action and Social Structure:The Problem of Embeddedness. American Journal of Sociology,1985,91(3):481-510.
    [43]Florin, Juan, Michael Luabatkin and William Schulze. A Social Capital Model of High-grouwh Ventures. Academy of Management Journal,2003,46:374-284.
    [44]Peng, Mike W, Yadong Luo. Managerial Ties and Firm Performance in a Transition Economy: The Nature of a Micro-macro Llink. Academy of Management Journal,2000,43:486-501.
    [45]Suarez, Fernando F. Network Effects Revisited:The role of Strong Ties in Technology Selection. Academy ofManagement Journal,2005.48:10-720.
    [46]Gersick, Connie J. G, JeanM, Bartunek and Jane E. Dutton. Learning from academia:The Importance of Relationships in Professional Life. Academy of Management Journal,2000,43: 1026-1044.
    [47]Lin, Nan. Social Capital:A Theory of Social Structure and Action. NY:Cambridg University Press,2001.
    [48]边燕杰、张文宏.经济体制、社会网络与职业流动.中国社会科学,2001年,第2期.
    [49]边燕杰、丘海雄.企业的社会资本及其功效.中国社会科学,2000年,第2期,第87-99页.
    [50]Burt, Ronald. Structural Holes:The Social Structure of Competition.Cambridge:Harvard University Press,1992.
    [51]Cross, Rob and Jonathon N. Cummings. Tie and Network Correlates of Individual Performance in Knowledge Intensive Work. Academy ofManagement Journal,2004,47: 928-937.
    [52]Reagans, Ray and BillMcEvily. Network Structure and Knowledge Transfer:The Effects of Cohesion and Range. Administrative Science Quarterly,2003,48:240-267.
    [53]Perry-Smith, J ill E. Social yet Creative:The Role of Social Relationships in Facilitating Individual Creativity. Academy of Management Journal,2006,49 (1):85-101.
    [54]罗家德.华人的人脉——个人中心信任网络.关系管理研,2006年,第6卷,第3期,第1-24贝.
    [55]Warren S.D, Brandeis L.D.The Right to Privacy.Harvard Law Review,1980,5(4).
    [56]Westin AF (1968), Privacy and Freedom. Washington and Lee Law Review,1968,25(1).
    [57]Miller A. The Assault on Privacy. Harvard University Press. Cambridge,1971.
    [58]Mason RO. Four ethical issues of the information age. MIS Quarterly,1986,10 (1):4-12.
    [59]Stone EF, Stone DL. Privacy in organizations:Theoretical issues, research findings, and protection mechanisms. Research in personnel and human,1990.
    [60]Culnan MJ. How did you get my name? An exploratory investigation of consumer attitudes toward secondary information use, MIS Quarterly,1993,17 (3):341-363.
    [61]Smith H J, Milberg S J, Burke S. Information Privacy:Measuring Individuals'Concerns about Organizational Practices. MIS Quarterly,1996,20(2):167-196.
    [62]Dinev, T., Hart, P. Internet Privacy Concerns and Social Awareness as Determinants of Intention to Transact. International Journal of Electronic Commerce,2005,10(2):7-29.
    [63]Awad, N. F., Krishnan, M. S. The Personalization Privacy Paradox:An Empirical Evaluation of Information Transparency and the Willingness to be Profiled Online for Personalization. MIS Quarterly.2006,30(1):13-28.
    [64]Goodwin, C. Privacy:Recognition of a Consumer Right. Journal of Public Policy and Marketing,1991,10(1):149-166.
    [65]Jones, M. G. Privacy:A Significant Marketing Issue for the 1990s. Journal of Public Policy and Marketing,1991,10(1):133-148.
    [66]Culnan, M. J. Consumer Awareness of Name Removal Procedures:Implications for Direct Marketing. Journal of Direct Marketing,1995(9):10-19.
    [67]Foxman, E. R., Kilcoyne, P. Information technology, marketing practice, and consumerprivacy: Ethical issues. Journal of Public Policy & Marketing,1993,12(1):106-119.
    [68]Nowak, G. J.,& Phelps, J. Direct marketing and the use of individual-level consumer information:Determining how and when "Privacy" Matters. Journal of Direct Marketing, 1997,11(4):94-108.
    [69]Clifton C, Kantarcioglu M, Vaidya J.Defining privacy for data mining Proceedings of the National Science Foundation Workshop on Next Generation Data Mining. Baltimore, MD, USA,2002:1262133.
    [70]Directive 95/46/ec of the European parliament an d of the council of 24 October 1995 on the protection of individuals with regard to the processing of personal data and on the free movement of such data. Official Journal of the European Communities,1995, (281):31250.
    [71]Galanxhi-Janaqi, H., Nah, F. F. H. U-commerce:Emerging trends and research issues.Industrial Management & Data Systems,2004 (104):744-755.
    [72]Lessig, L. Code and other laws of cyberspace. New York, NY, USA:Basic books,1999.
    [73]Adams, A. Users' perception of privacy in multimedia communication. Proceedings of CHI'99 Conference,1999:15-20.
    [74]何道宽.简论中国人的隐私.深圳大学学报(人文社会科学版),1996年,第13期,第82-89页.
    [75]翟石磊,李灏.隐私与跨文化交际.大连大学学报,2007年,第28卷,第5期,第119页.
    [76]翟石磊,李灏.全球化背景下的中西方“隐私”之比较.河北理工大学学报(社会科学版),2008年,第8卷,第1期,第112页.
    [77]殷丽娟.专家谈履行网上合同及保护网络隐私权.检察日报,1999年.
    [78]李国梁.网络隐私权的保护.四川大学,2005年.
    [79]Chung W, Paynter J. Privacy issues on the Internet. Proceedings of the 35th Hawaii International Conference on System Sciences,2002.
    [80]蒋骁,季绍波.网络隐私关注与行为意向影响因素的概念模型.科技与管理,2009年,第11卷,第5期,第71-74页.
    [81]魏明侠.感知隐私和感知安全对电子商务信用的影响研究.管理学报,2005年,第2卷,第1期,第61-65页.
    [1]Davis, F.D. Perceived usefulness, Perceived ease of use, and user acceptance of information technology. MIS Quarterly,1989,13(3):319-337.
    [2]Amoako-Gyampah, K., Salam, A. F. An extension of the technology acceptance model in an ERP implementation environment. Information & Management,2004,41(6):731-745.
    [3]Shang, R.A., Chen, Y.C., Shen, L. Extrinsic versus intrinsic motivations for consumers to shop on-line. Information & Management,2005,42(3):401-413.
    [4]代蕾,徐博艺.移动电子政务的公众持续使用行为研究.情报杂志,2011年1月,第30卷,第1期.
    [5]Mathieson, K. Predicting user intentions:comparing the technology acceptance model with the theory of planned behavior. Information Systems Research,2002,2(3):173-91.
    [6]Venkatesh, V., Davis, F.D. A theoretical extension of the technology acceptance model:four longitudinal field studies. Management Science,2000,46(2):186-204.
    [7]Gefen, D., Karahanna, E. and Straub, D.W. Inexperience and experience with online stores:the importance of TAM and trust. IEEE Transactions on Engineering Management,2003,50(3): 307-321.
    [8]Shih, Y. and Fang, K. The use of a decomposed theory of planned behavior to study internet banking in Taiwan. Internet Research,2004,14(3):213-231.
    [9]Willis, T.J. An evaluation of the technology acceptance model as a means of understanding online social networking behavior", theses and dissertations,2008, Paper 568, University of South Florida, Tampa, FL, available at:http://scholarcommons.usf.edu/etd/568.
    [10]Shin, D.H., Kim, W.Y. Applying the technology acceptance model and flow theory to Cyworld user behavior:implication of the Web2.0 user acceptance. Cyber Psychology and Behavior, 2008,11(3):378-82.
    [11]Shin, D.H. Applying the technology acceptance model and flow theory to Cyworld user behavior. Cyber Psychology and Behavior,2008,11(4):12-20.
    [12]Shin, D.H. The effects of trust, security and privacy in social networking:a security-based approach to understand the pattern of adoption. Interacting with Computers,2010,22(5): 428-38.
    [13]Lee, M. The effect of cognitive absorption and network externalities on technology acceptance:an empirical study of social networking sites in Indonesia, theses and dissertations,2010, Business Administration Department, University of Ming Chuan, Taipei.
    [14]Ohbyung Kwon, Yixing Wen. An empirical study of the factors that affecting social network service use. Computers in Human Behavior, March 2010,26(2):254-263.
    [15]M. Fishbein, I. Ajzen. Beliefs Attitude, Intention and Behavior:An Introduction to Theory and Research. Addison-Wesley Publishing Company, Philippines,1975.
    [16]J.K. Liker, A.A. Sindi. User acceptance of expert systems:a test of the theory of reasoned action. Journal of Engineering and Technology,1997, Management 14:147-173.
    [17]H.P. Lu, J.C.C. Lin. Predicting customer behavior in the market-space:a study of Rayport and Sviokla's framework.2003, Information & Management 40:1-10.
    [18]G.W. Bock, Y.G. Kim. Breaking the myths of rewards:an exploratory study of attitudes about knowledge sharing. Information Resources Management,2002:14-21.
    [19]K.E. Kolekofski, A.R. Heminger. Beliefs and attitudes affecting intentions to share information in an organizational setting. Information & Management,2003,40:521-532.
    [20]Pelling, E. L., White, K. M. The theory of planned behavior applied to young people's use of social networking web sites. Cyber psychology* Behavior,2009,12(6):755-759.
    [21]Sutton, S. Predicting and explaining intentions and behavior:How well arewe doing. Journal of Applied Social Psychology,1998,28 (15):1317-1338.
    [22]Tohidinia, Z., Mosakhani, M. Knowledge sharing behaviour andits predictors. Industrial Management & Data Systems,2010,110(3/4):611-631.
    [23]Ya Ping Chang, Dong Hong Zhu. Understanding social networking sites adoption in China:A comparison of pre-adoption and post-adoption. Computers in Human Behavior,2011,27: 1840-1848.
    [24]Ajzen, I. Theory of planned behavior:Some unresolved issues. Organizational Behavior and Human Decision Processes,1991,50(2):179-211.
    [25]Baker, R. K., White, K. M. Predicting adolescents'use of social networking sites from an extended theory of planned behavior perspective. Computers in Human Behavior,2010,26(6): 1591-1597.
    [26]Cheung, C. M. K., Lee, K. O. A theoretical model of intentional social action in online social networks. Decision Support Systems,2010,49 (1):24-30.
    [27]V.A. Zeithaml. Consumer perceptions of price, quality and value:a means-end model and synthesis of evidence. Journal of Marketing,1988,52 (3).
    [28]Hee-Woong Kim, Hock Chuan Chan, Sumeet Gupta. Value-based Adoption of Mobile Internet: An empirical investigation. Decision Support Systems,2007,43:111-126.
    [29]Shu YANG, Kanliang WANG. The influence of information sensitivity compensation on privacy concern and behavioral intention. ACM SIGMIS Database,2009,40(1):38-51.
    [30]Andrade, E.B., Kaltcheva, V., Weitz, B. Self-disclosure on the Web:the impact of privacy policy, reward, and company reputation. Advances in Consumer Research,2002,29:350-353.
    [31]Milne, G.R.,Boza, M.E. Trust and concern in consumers:perceptions of marketing information management practices. Journal of Interactive Marketing,2009,13(1):5-24.
    [32]Boyd, D.M., Ellison, N.B. Social network sites:Definition, history, and scholarship. Journal of Computer-Mediated Communication,2007,13(1).
    [33]Yuta, K., Ono, N., Fujiwara, Y. A gap in the community-size distribution of a large-scale social networking site.2007, Arxiv preprintarxiv./physics/0701168, arxiv.org.
    [34]N. Ellison, C. Steinfield, C. Lampe. The benefits of Facebook "friends":Social capital and college students'use of online social network sites. Journal of Computer-Mediated Communication,2007,12:1143-1168.
    [35]C. Steinfield, N.B. Ellison, C. Lampe. Social capital, self-esteem, and use of online social network sites:A longitudinal analysis. Journal of Applied Developmental Psychology,(2008, 29(6):434-445.
    [36]P.P. Rau, Q. Gao, Y. Ding. Relationship between the level of intimacy and lurking in online social network services. Computers in Human Behavior,2008,24(6):2757-2770.
    [37]Ohbyung Kwon, Yixing Wen. An empirical study of the factors affecting social network service use. Computers in Human Behavior,2010,26(2):254-263.
    [38]彭希羡,孙霄凌,朱庆华.国内社交网络服务研究的文献计量温习.情报科学,2012,第30卷第3期.
    [39]阎幸,常亚平.SNS研究综述.情报杂志,2010,第29卷第11期.
    [40]Chang Liua, Jack T. Marchewkaa, June Lub, Chun-Sheng Yub. Beyond concern:a privacy-trust-behavioral intention model of electronic commerce. Information & Management,2004, 42:127-142.
    [41]Stephen, J.F. Liberty, Equality, Fraternity, ed. Stuart D. Warner,1993,4.
    [42]Bok, S. On the Ethics of Concealment and Revelation. In:New York:Patheon Books,1982.
    [43]Fried, C. An anatomy of values:problems of personal and social choice. Harvard University Press,1970.
    [44]Shin,D.H. The effects of trust, security and privacy in social networking:A security-based approach to understand the pattern of adoption. Interacting with Computers,2010,22(5), 428-438.
    [45]Altman I. Privacy Regulation. Journal of Social Issues,1977:66-84.
    [46]Alan F Westin. Social and Political Dimensions of Privacy. Journal of Social Issues,2003, 9(2):431-453.
    [47]Luo, X.M. Trust Production and Privacy Concerns on the Internet-A framework Based on Relationship Marketing and Social Exchange Theory. Industrial Marketing Management, 2002,31(2):111-118.
    [48]Clarke R A. Information Technology and Dataveillance. Communications of the ACM,1998, 31(5):498-512.
    [49]O'Nell,D. Analysis of Internet Users'level of Online Privacy Concerns. Social Science Computer Review,2001,19(1):17-31.
    f50]Phelps, J., Nowak, G., Ferrell, E. Privacy concernsand consumer willingness to provide personal information. Journal of Public Policy & Marketing,2000,27-41.
    [51]巩震.网络消费者感知隐私的构面研究.北京邮电大学博十研究生学位论文,2010.
    [52]Campbell A J. Relationship Marketing in Consumer Markets:A Comparison of Managerial and Consumer Attitudes About Information Privacy. Journal of Direct Marketing, 1997,11(3):44-57.
    [53]Culnan M J. How did they know my name An Exploratory Investigation of Consumer Attitudes Toward Secondary Information use. MIS Quarterly,1993,17(3):341-363.
    [54]Malhotrs N K, Kim S S, Agarwal J. Internet Users'Information Privacy Concerns(IUIPC):The Construct, the Scale-and a Causal Model. Information Systems Research,2004,15(4): 336-355.
    [55]Dinev T, Hart P. Internet Privacy Concerns and Social Awareness as Determinants of Intention to Transact. International Journal of Electronic Commerce,2005,10(2):7-29.
    [56]Rifon N J, LaRose R,Choi S M. Your Privacy Is Sealed:Effects of Web Privacy Seals on Trust and Personal Disclosures. Journal of Consumer Affairs,2005,39(2):339-362.
    [57]杨妹,王刊良,王渊.网络创新背景下隐私关注与保护意图跨情境研究.管理学报,2009,第6卷第9期:1176-1181.
    [58]D.L. Hoffman, T. Novak. Building Consumer Trust Online. Communications of the ACM, 1999,42(4):80-85.
    [59]Smith.H.J, S.J. Milberg, S.J. Burke. Information privacy:Measuring individuals'concerns about organizational practices. MIS Quart,1996,20(2):167-196.
    [60]Malhotra, N.K, Kim, S.S, Agarwal,J. Internet Users Information Privacy Concerns (IU1PC): The Construct, the Scale, and a Causal Model. Information Systems Research,2004,15(4): 336-355.
    [61]杨姝,王渊,于刊良.互联网环境中适合中国消费者的隐私关注量表研究.情报杂志,2008,第27卷第10期:3-7.
    [62]Coye Cheshlre, Judd Antln, Ellzabeth.C. Behaviors, Adverse Events, and Dispositions:An Empirical study of Online Discretion and Information Control. Journal of the American Society for Information Science and Technology,2010,61(7):1487-1501.
    [63]Chyng-Yang Jang, Michael A. Stefanone. Factors Influencing Bloggers'Perceived Indentifiability. IEEE International Conference on Intelligence and Security Informatics,2009: 31-36.
    [64]Mike Z. Yao, Jinguang Zhang. Predicting User Concerns about Online Privacy in Hong Kong. Cyber Psychology & Behavior,2008,11(6):779-781.
    [65]David G. Taylor, Donna F. Davis, Ravi Jillapalli. Privacy concern and online personalization:the moderating effects of information control and compensation. Electronic Commerce Research,2009,9(3):203-223.
    [66]Chai Sangmi, Bagchi-sen Sharmistha, Morrell Claudia, Rao, H. R, Upadhyaya Andshambhu J. Internet and Online Information Privacy:An Exploratory Study of Preteens and Early Teens. Professional Communication,2009,52(2):167-182.
    [67]Juan Antonio, Carrasco Eric J. Miller. Exploring the propensity to perform social activities:a social network approach. Journal of Transportation,2006,33(5):463-480.
    [68]Sae Sol Choi, Mun-Kee Choi. Consumer's Privacy Concerns and Willingness to Provide Personal Information in Location-Based Services. Advanced Communication Technology International Conference-ICACT,2007,3:2196-2199.
    [69]杨姝,任利成,王刊良.个性特征变量对隐私关注影响的实证研究.现代教育技术,2008,第18期:54-59.
    [70]杨康.影响互联网用户网络隐私保护行为的因素分析.情报杂志,2011,第30卷第4期:39-42.
    [71]Awad, N. F, Krishnan, M. S. The personalization privacy paradox:An empirical evaluation of information transparency and the willingness to be profiled online for personalization. MIS Quarterly,2006,30(1):13-28.
    [72]Nam, C, Song, C, Lee, E, Park, C. I. Consumers'Privacy Concerns and Willingness to Provide Marketing-Related Personal Information Online. Advances in Consumer Research,2006,33: 212-217.
    [73]Milne, G. R, Culnan, M. J. Strategies for reducing online privacy risks:Why consumers read (or don't read) online privacy notices. Journal of Interactive Marketing,2004,18(3):15-29.
    [74]Dinev, T, Hart, P. An Extended Privacy Calculus Model for E-Commerce Transactions. Information Systems Research,2006,17(1):61-80.
    [75]Wirtz, J, Lwin, M. O, Williams, J. D. Causes and consequences of consumer online privacy concern. International Journal of Industry Management,2007,18(4):326-348.
    [76]Van Slyke, C, Shim, J.T, Johnson, R, Jiang, J. Concerns for information privacy and online consumer purchasing, information privacy and online consumer purchasing. Journal of the Association for Information Systems.2006,7(6):415-444.
    [77]Li, N, Chen, G. Sharing location in online social networks. Network, IEEE,2010, 24(5):20-25.
    [78]Gong, Z, Jin, Y.The Influence of Perceived Privacy upon the Trust in E-commerce. International Conference on Future Information Technology and Management Engineering, 2008:141-143.
    [79]Venkatesh, V, Morris, M.G, Davis, G.B, Davis, F.D. User acceptance of information technology:Toward a unified view. MIS quarterly,2003,27(3):425-478.
    [80]Lenhart, A, Fox, S. Bloggers:A portrait of the internet's new storytellers. Pew Internet& American Life Project,2006.
    [81]Granovetter, M. The strength of weak tie. American Journal of Sociology.1973, 78:1360-1380.
    [82]Krackhardt, D. The strength of strong ties:The importance of philos in organizations. Networks and Organization:Boston:Harvard Business School Press,1992:25-56.
    [83]黄光国.中国人的权力游戏.台北:巨流图书公司,1988.
    [84]罗家德,周超文.中国人不同关系的信任程度.社会网暨社会资本论坛,2008.
    [85]Preece, J. Etiquette online:From nice to necessary. Communications of the ACM,2004, 47(4):56-61.
    [86]LaRose, R. Rifon, N. Liu, S. Lee, D. Understanding online safety behavior:A multivariate model. International Communication Association,2005:27-30.
    [87]宋艺秋.论突发事件中的个人信息保护.河南师范大学学报(哲学社会科学版),2010,第37卷第5期:131-133.
    [88]百度百科:密码外泄门.http://baike.baidu.com/view/7167245.htm
    [89]网络素养:这个话题不轻松.解放军报,2011.
    [90]韩静.社会化网络时代提升高中生网络素养的实践研究.华东师范大学硕士学位论文,2011.
    [91]Sheehan, K. Hoy, M. G. Dimensions of privacy concern among online consumers. Journal of Public Policy & Marketing,2000,19(1):62-73.
    [92]Greenberg, P. A. E-shoppers choose personalization over privacy. E-Commerce Times, January 4 edition.
    [93]Wu, K.W, Huang, S.Y, Yen, D.C, Popova, I. The effect of online privacy policy on consumer privacy concern and trust. Computers in Human Behavior,2012.
    [94]Valentine, D.A. Privacy on the Internet:The evolving legal landscape. Santa Clara Computer & High Tech,2000,16:401.
    [95]Kandra, A, Brandt, A. The great American privacy makeover. PC World,2003, 21(11):144-161.
    [96]Faja, S, Trimi, S. Influence of the Web Vendor's Interventions on Privacy-Related Behaviors in E-commerce. Communications,2006,17(1):2-68.
    [97]Choi, S.S, Choi, M.K. Consumer's privacy concerns and willingness to provide personal information in location-based services. IEEE,2006,3:2196-2199.
    [98]Korzaan, M.L, Boswell, K.T. The influence of personality traits and information privacy concerns on behavioral intentions. Journal of Computer Information Systems,2008,48(4): 15-24.
    [1]索尔其己.隐私与利益的博弈.软件工程师,2007年.
    [2]祁金华.隐私与便利的博弈.网络世界,2008年9月,第35卷.
    [3]张胜兵,蔡皖东,李勇军.一种基于博弈论的社交网络控制方法.西北:I:业大学学报,2011年,第29卷第4期.
    [4]Charles A. Kamhoua, Niki Pissinou, Kia Makki.Game Theoretic Modeling and Evolution of Trust in Autonomous Multi-Hop Networks.IEEE ICCC,2011.
    [5]Jeremiah Blocki, Nicolas Christin, Anupam Datta, Arunesh Sinha.Regret Minimizing Audits:A Learning-theoretic Basis for Privacy Protection.24th Computer Security Foundations Symposium,2011.
    [6]Yi Ren, Zhiting Xiao.A Privacy Data Release Method based on Game Theory.IEEE,2010.
    [7]关树明,吕绪华,郭红.BtoC电子商务中诚信问题的进化博弈论分析.河北工程大学学报,2007年3月,第24卷第1期.
    [8]吕帅儿,陈朝阳,孙华丽,赵晓敏.OEM模式下企业间的演化博弈研究.情报杂志,2009年,第29卷第12期.
    [9]罗安国.创新博弈中政府与企业的互动演化均衡.科技和产业,2006年7月,第6卷第7期.
    [101马鹤丹,袁长峰.创业企业与创投之间逆向选择产生的演化博弈分析.生产力研究,2010年,第5卷第3期.
    [11]孙锐, 赵大丽.动态联盟知识共享的演化博弈分析.运筹与管理,2009年2月,第18卷第1期.
    [12]李志洁,程春田,黄飞雪.仿真网格中资源分配的进化博弈研究.系统仿真学报,2008年6月,第20卷第11期.
    [13]樊斌,李翠霞.基于质量安全的乳制品加工企业隐蔽违规行为演化博弈分析.农业技术经济,2012年,第1卷.
    [14]于全辉,孟卫东.企业群落中创新行为的进化博弈分析.科技管理研究,2007年第1卷第3期.
    [15]赵君,廖建桥.团队成员知识共享的进化博弈分析.情报杂志,2009年9月,第28卷第9期.
    [16]韩璐,金永生.隐性知识共享的进化博弈分析.北京邮电大学学报.2008年,第10卷第6期.
    [17]付小勇,朱庆华,窦一杰.政府管制下处理商选择拆解方式的演化博弈研究.中国人口资源与环境,2012年,第22卷第1期.
    [18]Bauch C. T., S. Bhattacharyya.Evolutionary game theory and social learning can determine how vaccine scares unfold. PLoS Computational Biology,2010,8(04).
    [19]Ding, F, Y. Liu, et al. Co-evolution of opinion and strategy in persuasion dynamics:an evolutionary game theoretical approach. International Journal of Modern Physics C,2009, 20(03):479-490.
    [20]Hernandez, D. and D. Zanette.Critical transition induced by neighbourhood size in evolutionary spatial games.The European Physical Journal B-Condensed Matter and Complex Systems,82(03):361-366.
    [21]Luo, L.N. Chakraborty, et al. An evolutionary game-theoretic model for ethno-religious conflicts between two groups. Computational & Mathematical Organization Theory,2011, 17(04):379-401.
    [22]Ohdaira, T. and T. Terano.The diversity in the decision facilitates cooperation in the sequential prisoner's dilemma game.Advances in Complex Systems,2011,14(03):377-401.
    [23]Safarzynska, K. and J. C. J. M. van den Berg.Evolutionary models in economics:a survey of methods and building blocks.Journal of Evolutionary Economics,2010,20(03):329-373.
    [24]Sorrentino, F. and N. Mecholsky. Stability of strategies in payoff-driven evolutionary games on networks. arXiv preprint arXiv,2011年,11(06).
    [25]杨涵新,汪秉宏.复杂网络上的演化博弈研究.上海理工大学学报,2012年.
    [26]杨阳,荣智海,李翔.复杂网络演化博弈理论研究综述.复杂系统与复杂性科学,2008年.
    [27]韩少春,刘云.基于动态演化博弈论的舆论传播羊群效应.系统工程学报,2011年,第29卷,第2期.
    [1]Watts, D. and S. Strogatz (1998). The small world problem. Collective Dynamics of Small-World Networks 393:440-442.
    [2]沃瑟曼.社会网络分析:方法与应用.北京:中国人民大学出版社,2012:2-11.
    [3]杰克逊.社会与经济网络.北京:中国人民大学出版社,2011:3-25.
    [1]Xuerui Wang, Natasha Mohanty, Andrew McCallum. Group and Topic Discovery from Relations and Text.LiIkKDD,2005
    [2]Christianson B. Why isn't trust transitive.Security Protocols,1997,171 (176)
    [3]Josang Audun, Pope Simon.Semantic constraints for trust transitivity Proc of the 2nd Asia-Pacific Conf on Conceptual modeling. Sydney:Australian Computer Society,2005, 59 (68)
    [4]Newman, M. E. Scientific collaboration networks. II. Shortest paths, weighted networks, and centrality. Physical review,64(1).
    [5]胡海波,王科,徐玲等.基于复杂网络理论的在线社会网络分析.复杂系统与复杂性科学,2008年,第1卷第14期.
    [6]胡海波,徐玲,汪小凡等.大型在线社会网络结构分析.上海交通大学学报,2009年,第4卷第589期.
    [7]Fu F, Chen x, Liu L, et al. Social dilemmas in an online social network:the structure and evolution of cooperation. Physics Letters A,2007,371(1-2):58-64.
    [8]刘婷,胡宝清.基于聚类分析的复杂网络中的社团探测.复杂系统与复杂性科学,2007年,第4卷第1期:28—35.
    [9]Newman, M. E. Fast algorithm for detecting community structure in networks. Physical review,2004,69(6):066133.
    [10]Girvan, M. and M. E. Newman. Community structure in social and biological networks. Proceedings of the National Academy of Sciences,2002,99(12):7821-7826.
    [11]Newman, M. E. Detecting community structure in networks. The European Physical Journal B-Condensed Matter and Complex Systems,2004,38(2):321-330.
    [12]汪小帆,李翔,陈关荣.复杂网络理论及其应用.清华人学出版社.
    [13]White S, Smyth P.A spectral clustering approach to finding communities in graphs.SIAM International Conference on Data Mining,2005.
    [14]Donetti, L, M. A. Munoz. Detecting network communities:a new systematic and efficient algorithm. Theory and Experiment,2004(10):P10012.
    [15]淦文燕,,赫南,,李德毅等.一种基于拓扑势的社区发现方法.软件学报,2009.
    [16]段晓东,王存睿,刘向东等.基于粒子群算法的web社区发现.计算机科学,2008,35(3).
    [17]柳助民,李绍滋,林达真等.基于PCM聚类算法的Blog社区发现.厦门大学学报(自然科学版),2009,48(4).
    [18]燕飞,张铭,谭裕韦等.综合社会行动者兴趣和网络拓扑的社区发现方法.计算机研究与发展,2010,47(21).
    [19]Ye Wu, Jurgen Kurths, Human comment dynamics in on-line social systems.458th WE-Heraeus-Seminar SYNCLINE,2010.
    [20]周涛.在线电影点播中的人类动力学模式.复杂系统与复杂性科学,2008,3:1-5.
    [211王晓光.微博客用户行为特征与关系特征实证分析——以“新浪微博”为例.竞争情报,2010,54(14):66-70.
    [22]Dezso Z.Almaas E.Lukacs A.Fifteen minutes of fame:the dynamics of information access on the Web Physieal,2006(06).
    [23]高锡荣,杨康.影响互联网用户网络隐私保护行为的因素分析[J].情报杂志,2011,4:39-42.
    [24]蒋骁,季绍波.网络隐私关注与行为意向影响因素的概念模型[J].科技与管理,2009, 11(5):71-74
    [25]张志杰.移动LBS用户接受模型的实证研究.北京邮电大学学报,2012,第14卷第二期.
    [26]王斌,段友祥.面向普适计算的用户隐私量化方法研究.计算机工程与应用,2011,27期.
    [27]张志杰,吕廷杰.移动LBS用户接受模型的实证研究.北京邮电大学学报:社会科学版,2012,14(1):56-61.
    [28]柴彦威,赵莹,马修军等.基于移动定位的行为数据采集与地理应用研究.地域研究与开发,2010,29(6):1-7.
    [29]姚长青,张连均.基于NSTL原文索取数量的空间自相关性分析.图书情报工作杂志社、图书情报工作研究会第21次学术研讨会论文集.2009,106(112)
    [30]Goldenberg J, Han S,, Lehmann D, et al. The role of hubs in the adoption processes. Journal of Marketing,2009,73(2).
    [31]杨璨.网络“圈子”的群体交往特点研究.安徽大学,2011.
    [32]Bass, F. M., T. V. Krishnan, et al. Why the Bass model fits without decision variables. Marketing science 13(3):203-223.
    [33]孟繁东,何明升.Bass模型参数估计方法研究综述.航天控制,2009,27(1):104-108.
    [34]杨敬辉,武春友.基于Bass模型的两种参数估算算法比较研究.数量经济技术经济研究,2006,22(12):125-132.

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700