网络隐私泄露事件中用户应对行为的形成机制研究——基于PADM理论模型的扎根分析
详细信息    查看全文 | 推荐本文 |
  • 英文篇名:The Formation Mechanism of User Coping Behavior in User Privacy Leakage Incidents——A Grounded Research Based on PADM Theory
  • 作者:李华强 ; 周雪 ; 万青 ; 范春梅
  • 英文作者:Li Huaqiang;Zhou Xue;Wan Qing;Fan Chunmei;School of Economics and Management,Southwest Jiaotong University;School of Public Administration and Law,Southwest Jiaotong University;
  • 关键词:网络隐私泄露 ; 应对行为 ; PADM理论 ; SARF理论 ; 扎根理论
  • 英文关键词:user privacy leakage;;coping behavior;;PADM theory;;SARF theory;;grounded theory
  • 中文刊名:QBZZ
  • 英文刊名:Journal of Intelligence
  • 机构:西南交通大学公共管理与政法学院;西南交通大学经济管理学院;
  • 出版日期:2018-07-18
  • 出版单位:情报杂志
  • 年:2018
  • 期:v.37
  • 基金:国家自然科学基金青年项目“产品、激励与种子顾客的交互模式对口碑传播效果的影响及机理研究”(编号:71402150)阶段性研究成果;国家自然科学基金重大项目“大数据环境下的顾客洞察与市场营销策略研究”(编号:71490722)
  • 语种:中文;
  • 页:QBZZ201807017
  • 页数:8
  • CN:07
  • ISSN:61-1167/G3
  • 分类号:117-124
摘要
[目的/意义]隐私泄露事件频繁发生造成了社会不安情绪的蔓延,研究用户应对行为是提高隐私风险沟通效果的重要手段。[方法/过程]基于网络隐私泄露事件的微博数据,采用扎根理论分析方法,结合防护性行为决策理论(PADM)、风险的社会放大理论(SARF)和应对行为理论,探究网络隐私泄露事件中用户应对行为的类型特征、发生规律及其形成机制模型。[结果/结论]研究结果表明,用户对网络隐私泄露事件的认知受风险属性、信息源、信息渠道、社会响应的影响,并受到企业特征和用户特征的调节;基于风险传播过程的认知形成感知,包括隐私风险感知、利益相关者感知和防护性行为感知;继而通过启发式路径和系统式路径处理事件信息并制定行为决策,产生相应的问题聚焦应对行为和情绪聚焦应对行为。研究结论对于提高网络隐私泄露事件的风险沟通效果,引导用户形成合理的风险感知、责任归因和应对行为具有重要价值。
        [Purpose/Significance]The frequency of privacy leakage incidents has aroused the spread of user anxious in the society.Hence the study of user coping behavior is an important means to improve the effectiveness of privacy risk communication[Method/Process]Based on related microblogs of user privacy leakage incidents and using grounded theory methods,PADM theory,SARF theory and coping behavior theory,this paper investigates the characteristics and laws of users' coping behavior and develops a model to explain the formation mechanism.[Result/Conclusion]The results indicate that users form their cognition of privacy leakage incidents based on the attributes of risk,information sources,information channels and social responses,and moderated by the characteristics of companies and users. The cognition of the privacy risk spreading process leads to perceptions of privacy risk,stakeholders and behaviors. And further form their problem-focused coping and emotion-focused coping through a behavior decision process. The findings are of great significance to improve the effects of crisis response strategies and risk communication,and to the guidance of reasonable risk perception,responsibility attribution and coping behavior.
引文
[1]Gemalto.Poor Internal Security Practices Take a Toll[EB/OL].[2017-09-20].http://breachlevelindex.com/assets/BreachLevel-Index-Report-H1-2017-Gemalto.pdf.
    [2]Wang Z,Yu Q.Privacy trust crisis of personal data in china in the era of big data:the survey and countermeasures[J].Computer Law&Security Review the International Journal of Technology Law&Practice,2015,31(6):782-792.
    [3]Tomy S,Pardede E.Controlling privacy disclosure of third party applications in online social netw orks[J].International Journal of Web Information Systems,2016,12(2):215-241.
    [4]王忠.大数据时代个人数据隐私泄露举报机制研究[J].情报杂志,2016,35(3):165-168,79.
    [5]李睿,张锐剑,李文立,等.移动互联网环境下的隐私泄露容忍度测度方法[J].管理评论,2016,28(7):102-111.
    [6]汪兴东,景奉杰,涂铭.产品伤害事件中顾客反应的形成机制——基于门户网站微博的扎根研究[J].管理评论,2013,25(9):148-157.
    [7]范春梅,贾建民,李华强.食品安全事件中的公众风险感知及应对行为研究——以问题奶粉事件为例[J].管理评论,2012,24(1):163-168,176.
    [8]徐戈,冯项楠,李宜威,等.雾霾感知风险与公众应对行为的实证分析[J].管理科学学报,2017,20(9):1-14.
    [9]Warren S,Brandeis L.The right to privacy[J].Harvard law review,1890,4(5):193-220.
    [10]Culnan M J,Armstrong P K.Information privacy concerns,procedural fairness,and impersonal trust:an empirical investigation[J].Organization Science,1999,10(1):104-116.
    [11]Westin A F.Social and political dimensions of privacy[J].Journal of Social Issues,2003,59(2):431-453.
    [12]Bansal G,Zahedi F M,Gefen D.Do context and personality matter?trust and privacy concerns in disclosing private information online[J].Information&M anagement,2016,53(1):1-21.
    [13]Pavlou P A,Liang H,Xue Y.Understanding and mitigating uncertainty in online exchange relationships:a principal-agent perspective[J].M is Quarterly,2007,31(1):105-136.
    [14]Xu H,Teo H,Tan B C,et al.The Role of push-pull technology in privacy calculus:The case of location-based services[J].Journal of M anagement Information Systems,2009,26(3):135-174.
    [15]张晓娟,李贞贞.隐私关注对智能手机用户信息安全行为意向的影响研究[J/OL].情报理论与实践:1-12[2017-10-24].http://kns.cnki.net/kcms/detail/11.1762.G3.20171117.1457.012.html.
    [16]Li K,Lin Z,Wang X.An empirical analysis of users’privacy disclosure behaviors on social netw ork sites[J].Information&M anagement,2015,52(7):882-891.
    [17]孙霄凌,程阳,朱庆华.社会化搜索中用户隐私披露行为意向的影响因素研究[J].情报杂志,2017,36(10):172-179,201.
    [18]Morosan C,Defranco A.Disclosing personal information via hotel apps:a privacy calculus perspective[J].International Journal of Hospitality M anagement,2015(47):120-130.
    [19]Dienlin T,Metzger M J.An extended privacy calculus model for SNSs:analyzing self-disclosure and self-w ithdraw al in a representative US sample[J].Journal of Computer-M ediated Communication,2016,21(5):368-383.
    [20]Keshnee P.Taxonomy of compliant information security behavior[J].Computer&Security,2012,31(5):673-680.
    [21]Eirik A.A qualitative study of users’view on information security[J].Computers&Security,2007(26):276-289.
    [22]Bulgurcu B,Cavusoglu H,Benbasat I.Information security policy compliance:An empirical study of rationality based beliefs and information security aw areness[J].M IS Quarterly,2010,34(3):523-548.
    [23]Son J Y,Kim S S.Internet users’information privacy-protective responses:A taxonomy and a nomological model[J].M IS Quarterly,2008,32(3):503-529.
    [24]陆雪梅,古春生.大数据环境下用户信息隐私泄露成因分析和保护对策[J].现代情报,2016,36(11):66-70.
    [25]Prakash M,Singaravel G.An approach for prevention of privacy breach and information leakage in sensitive data mining[J].Computers&Electrical Engineering,2015(45):134-140.
    [26]易红,任竞.图书馆大数据服务环境下用户隐私泄露容忍度的实证研究[J].图书馆论坛,2016,36(4):57-64.
    [27]Lindell M K,Perry R W.Behavioral Foundations of Community Emergency Planning[C]//Hemisphere Publishing Corp,1992:159-166.
    [28]Lindell M K,Perry R W.The protective action decision model:theoretical modifications and additional evidence[J].Risk Analysis,2012,32(4):616-632.
    [29]Kasperson R E,Renn O.The social amplification of risk:A conceptual framew ork[J].Risk Analysis,1988(8):177–187.
    [30]Lazarus R S,Folkman S.Stress:appraisal and coping[M].New York:Springer Press,1984:45.
    [31]Tamres L K,Janicki D,Helgeson V S.Sex Differences in coping behavior:A meta-analytic review and an examination of relative coping[J].Personality and Social Psychology Review,2002,6(1):2-30.
    [32]Strauss A L,Corbin J M.Grounded theory in practice[M].Thousand Oaks:Sage Publications,1997:296.
    [33]常文英,刘冰.基于可信度分析的微博用户个人信息泄露实证研究——以新浪微博为例[J].情报杂志,2015,34(8):169-176.
    [34]Park S A.Consumer health crisis management:Apple's crisis responsibility for ipod-related hearing loss[J].Public Relations Review,2008,34(4):396-398.
    [35]李华强,韩译萱,范春梅.雾霾危机情境下应该如何应对?——基于高阶与低阶应对行为分类的视角[J].中国行政管理,2017(6):121-126.
    [36]Lazarus R S.Emotion and adaptation[J].Journal of Nervous&M ental Disease,1992,181(3):17-23.

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700