摘要
[目的/意义]随着社交网络用户的逐渐增多,社交网络中个人信息安全行为研究对帮助社交网络用户更好地规避社交网络安全风险、推动社交网络平台开发商提高信息安全技术具有积极的作用。[方法/过程]基于社会认知和保护动机理论,构建社交网络个人信息安全行为影响因素模型,并运用问卷调查和结构方程方法对模型的适用性进行检验。[结果/结论]数据结果表明,反应效能是社交网络中个人信息安全保护行为最主要的影响因素,其次是感知威胁和自我效能对个人信息安全保护意愿产生正向影响,而回避行为对信息安全保护意愿产生消极影响,用户信息安全保护意愿对信息安全保护行为产生正向影响。
[Purpose/significance]With the gradual increasing number of social network users,the research on the behavior of personal information security in social network has a positive role in better helping social network users to avoid social network security risks and urging the social network platform developers to improve information security technology.[Method/process]Based on the theory of social cognition and protective motivation,this paper constructs a model of influencing factors of social network personal information security behavior,and tests the applicability of the model by the survey of questionnaire and structural equation method. [Result/conclusion]The results show that response efficiency is the most important factor which influences the behavior of personal information security protection in social networks,and the perceived threat and self-efficacy have a positive effect on personal information security protection willingness. But avoidance behavior has a negative impact on the willingness to protect information security,and the users' willingness to protect information security has a positive impact on the behavior of information security protection.
引文
[1]腾讯科技.2017年度互联网安全报告[EB/OL].[2018-01-19].http://tech.qq.com/a/20180119/012161.htm.
[2]中国互联网络信息中心.第41次中国互联网络发展状况统计报告[EB/OL].[2017-01-22].http://www.cac.gov.cn/2018-01/31/c_1122347026.htm.
[3]孟晓明,贺伟.社交网络大数据商业化开发利用中的个人隐私保护[J].图书馆论坛,2015(6):67-75.
[4]BANDURA A.Human agency in social cognitive theory[J].A-merican psychologist,1989,44(9):1175-1184.
[5]JOHNSTON A C,WARKENTIN M.Fear appeals and information security behaviors:an empirical study[J].MIS quarterly,2010,34(3):549-566.
[6]CHEN Y,ZAHEDI F M.Individuals’Internet security perceptions and behaviors:polycontextual contrasts between the United States and China[J].MIS quarterly,2016,40(1):205-222.
[7]张晓娟.隐私关注对智能手机用户信息安全行为意向的影响研究[J].情报理论与实践,2017(11):3-10.
[8]王璐瑶.恐惧诉求对社交网络用户隐私安全保护行为的影响研究[J].情报杂志,2016(12):2-6.
[9]罗力.社交网络中用户个人信息安全保护研究[J].图书馆学研究,2012(14):36-40.
[10]BOYD D M,ELLISON N B.Social network sites:definition,history,and scholarship[J].Journal of computer-mediated communication,2007,13(1):210-230.
[11]刘志辉,张志强.作者关键词耦合分析方法及实证研究[J].情报杂志,2014(12):268-275.
[12]HOLT B E,BROWN H C.Animal drive and the learning process,an essay toward radical empiricism[J].Journal of nervous and mental disease,1933,78(5):586-600.
[13]LIANG H,XUE Y.Avoidance of information technology threats:a theoretical perspective[J].MIS quarterly,2009,33(1):71-90.
[14]INKELES A.Becoming modern:individual change in six developing countries[J].Ethos,2010,3(2):323-342.
[15]Abbassi A.Culture and anxiety:a cross-cultural study[J].Journal of professional counseling practice theory&research,2007,35(1):26.
[16]WONG P T P,WONG L C J,SCOTT C.Beyond stress and coping:the positive psychology of transformation[A]//Handbook of multicultural perspectives on stress and coping.New York:Routladge,2006:1-26.
[17]ROGERS R W,CACIOPPO J T,PETTY R.Cognitive and physiological processes in fear appeals and attitude change:a revised theory of protection motivation[A]//Social psychophysiology.New York:Guilford Press,1983.
[18]RIPPETOE P A,ROGERS R W.Effects of components of protection-motivation theory on adaptive and maladaptive coping with a health threat[J].Journal of personality and social psychology,1987,52(3):596-604.
[19]LIANG H,XUE Y.Understanding security behaviors in personal computer usage:a threat avoidance perspective[J].Journal of the Association for Information Systems,2010,11(7):394-413.
[20]HEPPNER P P,HEPPNER M J,LEE D G,et al.Development and validation of a collectivistic coping styles inventory[J].Journal of counseling psychology,2006,53(1):107-125.
[21]Economist intelligence unit.Digital economy rankings 2010 beyond e-readiness[EB/OL].[2018-01-19].http://www-935.ibm.com/services/us/gbs/bus/pdf/eiu_digital-economy-rankings-2010_final_web.pdf.
[22]BSA.Sixth annual bsa and idc global software piracy study[EB/OL].[2018-01-19].http://www.global.bsa.org/globalpiracy2008/index.html.
[23]IFINEDO P.Information systems security policy compliance:an empirical study of the effects of socialisation,influence,and cognition[J].Information&management,2014,51(1):69-79.
[24]YOON C,HWANG J W,KIM R.Exploring factors that influence students’behaviors in information security[J].Journal of information systems education,2012,23(4):407-415.
[25]WITTE K.Putting the fear back into fear appeals:the extended parallel process model[J].Communication monographs,1992,59(4):329-349.
[26]SCHAUBROECK J,LAM S S,XIE J L.Collective efficacy versus self-efficacy in coping responses to stressors and control:a crosscultural study[J].Journal of applied psychology,2000,85(4):512-525.
[27]WORKMAN M,BOMMER H H,STRAUB D.Security lapses and the omission of information security measures:a threat control model and empirical test[J].Computers in human behavior,2008,24(6):2799-2816.
[28]HAMAMURA T,MEIJER Z,HEINE S J,et al.Approach-avoidance motivation and information processing:a cross-cultural analysis[J].Personality and social psychology bulletin,2009,35(4):454-462.
[29]KUJUR F,SINGH S.Engaging customers through online participation in social networking sites[J].Asia pacific management review,2017,22(1):16-24.
[30]AJZEN I.The theory of planned behavior[J].Organizational behavior&decision processes,1991,50:179-211.
[31]GOOL E V,OUYTSEL J V,PONNET K,et al.To share or not to share?adolescents’self-disclosure about peer relationships on Facebook:an application of the prototype willingness model[J].Computers in human behavior,2015,44(3):230-239.
[32]张晓娟.基于社会认知理论的智能手机用户信息安全行为意愿研究[J].现代情报,2017(9):2-5.