李贺, 余璐, 许一明, 解梦凡. 解释水平理论视角下的社交网络隐私悖论研究[J]. 情报学报, 2018, 37(1): 1-13.
Li He, Yu Lu, Xu Yiming, Xie Mengfan. Research on Privacy Paradox in Social Network Sites under the Perspective of Construal Level Theory. 情报学报, 2018, 37(1): 1-13.
[1] 《中国网民权益保护调查报告2016》:54%的网民认为个人信息泄露严重[EB/OL]. (2016-06-26) [2017-05-04]. http://www. isc.org.cn/zxzx/xhdt/listinfo-33759.html. [2] Kokolakis S.Privacy attitudes and privacy behaviour: A review of current research on the privacy paradox phenomenon[J]. Computers & Security, 2017, 64: 122-134. [3] Spiekermann S, Grossklags J, Berendt B.E-privacy in 2nd generation E-commerce: privacy preferences versus actual behavior[C]// Proceedings of the 3rd ACM Conference on Electronic Commerce. New York: ACM Press, 2001: 38-47. [4] Barnes S B.A privacy paradox: Social networking in the United States[J]. First Monday, 2006, 11(9). [5] Lee H, Park H, Kim J.Why do people share their context information on Social Network Services? A qualitative study and an experimental study on users’ behavior of balancing perceived benefit and risk[J]. International Journal of Human-Computer Studies, 2013, 71(9): 862-877. [6] Staddon J, Acquisti A, LeFevre K. Self-reported social network behavior: Accuracy predictors and implications for the privacy paradox[C]// Proceedings of the International Conference on Social Computing. IEEE, 2014: 295-302. [7] Bake Y M.Solving the privacy paradox: A counter-argument experimental approach[J]. Computers in Human Behavior, 2014, 38: 33-42. [8] Tönnies F.Community and society[M]. New York: Courier Dover Publications, 2002: 33-61. [9] Lutz C, Strathoff P. Privacy concerns and online behavior-not so paradoxical after all? Viewing the privacy paradox through different theoretical lenses[J/OL]. (2014-04-15) [2017-05-10]. http://dx.doi.org/10.2139/ssrn.2425132. [10] Zafeiropoulou A M, Millard D E, Webber C, et al.Unpicking the privacy paradox: can structuration theory help to explain location-based privacy decisions?[C]// Proceedings of the 5th Annual ACM Web Science Conference. New York: ACM Press, 2013: 463-472. [11] Jiang Z H, Heng C S, Choi B C F. Privacy concerns and privacy-protective behavior in synchronous online social interactions[J]. Information System Research, 2013, 24(3): 579-595. [12] Debatin B, Lovejoy J P, Ann-Kathrin H M A, et al. Facebook and online privacy: Attitudes, behaviors, and unintended consequences[J]. Journal of Computer-Mediated Communication, 2009, 15(1): 83-108. [13] Acquisti A, Grossklags J.What can behavioral economics teach us about privacy[C]// Digital Privacy: Theory, Technology, and Practices. Washington DC: Auerbach Publications, 2007. [14] Cho H, Lee J S, Chung S.Optimistic bias about online privacy risks: Testing the moderating effects of perceived controllability and prior experience[J]. Computers in Human Behavior, 2010, 26(5): 987-995. [15] Jensen C, Potts C, Jensen C.Privacy practices of Internet users: Self-reports versus observed behavior[J]. International Journal of Human-Computer Studies, 2005, 63(1-2): 203-227. [16] Kehr F, Kowatsch T, Wentzel D, et al.Blissfully ignorant: the effects of general privacy concerns, general institutional trust, and affect in the privacy calculus[J]. Information Systems Journal, 2015, 25(6): 607-635. [17] Wilson D W, Valacich J S.Unpacking the privacy paradox: irrational decision-making within the privacy calculus[C]// Proceedings of the 33rd International Conference on Information Systems. Florida: AIS/ICIS Administrative Office, 2012. [18] 管家娃, 张玥, 朱庆华, 等. 国外社交网站隐私悖论问题研究综述与国内研究建议[J]. 图书情报工作, 2016, 60(22): 126-134. [19] 黄俊, 李晔, 张宏伟. 解释水平理论的应用及发展[J]. 心理科学进展, 2015, 23(1): 110-119. [20] Trope Y, Liberman N.Construal-level theory of psychological distance[J]. Psychological Review, 2010, 117(2): 440-463. [21] Liberman N, Sagristano M D, Trope Y.The effect of temporal distance on level of mental construal[J]. Journal of Experimental Social Psychology, 2002, 38(6): 523-534. [22] Trope Y, Liberman N, Wakslak C.Construal levels and psychological distance: Effects on representation, prediction, evaluation, and behavior[J]. Journal of Consumer Psychology, 2007, 17(2): 83-95. [23] Lynch Jr J G, Zauberman G. Construing consumer decision making[J]. Journal of Consumer Psychology, 2007, 17(2): 107-112. [24] Trope Y, Liberman N.Temporal construal and time-dependent changes in preference[J]. Journal of Personality and Social Psychology, 2000, 79(6): 876-889. [25] 李雁晨, 周庭锐, 周琇. 解释水平理论: 从时间距离到心理距离[J]. 心理科学进展, 2009, 17(4): 667-677. [26] Gamliel E, Kreiner H, McElroy T. The effect of construal level on unethical behavior[J]. The Journal of Social Psychology, 2017, 157(2): 211-222. [27] 张梦, 杨颖, 叶作亮. 酒店网络评论内容特征对消费者购买意愿的影响——基于时间距离和社会距离情景的实验研究[J]. 旅游学刊, 2012, 27(11): 97-104. [28] Henderson M D, Trope Y, Carnevale P J.Negotiation from a near and distant time perspective[J]. Journal of Personality and Social Psychology, 2006, 91(4): 712-729. [29] Lynch J G, Zauberman G.When do you want it? Time, decisions, and public policy[J]. Journal of Public Policy & Marketing, 2006, 25(1): 67-78. [30] Gurtner S, Reinhardt R.Ambidextrous idea generation—antecedents and outcomes[J]. Journal of Product Innovation Management, 2016, 33(S1): 34-54. [31] Jones C, Hine D W, Marks A D G. The future is now: Reducing psychological distance to increase public engagement with climate change[J]. Risk Analysis, 2017, 37(2): 331-341. [32] Acquisti A, Grossklags J.Losses, gains, and hyperbolic discounting: an experimental approach to information security attitudes and behavior[C]// Proceedings of the 2nd Annual Workshop on Economics and Information Security (WEIS 2003). Maryland: Economics of Information Security, 2003. [33] Hallam C, Zanella G.Online self-disclosure: The privacy paradox explained as a temporally discounted balance between concerns and rewards[J]. Computers in Human Behavior, 2017, 68: 217-227. [34] 袁金巧. 基于隐私计算理论的移动医疗服务用户采纳意愿研究[D]. 哈尔滨: 哈尔滨工业大学, 2013: 16-18. [35] Jiang Z H, Heng C S, Choi B C F. Privacy concerns and privacy-protective behavior in synchronous online social interactions[J]. Information System Research, 2013, 24(3): 579-595. [36] Yao M Z.Self-protection of online privacy: A behavioral approach[M]// Trepte S, Reinecke L.(eds) Privacy Online. Heidelberg: Springer, 2011: 111-125. [37] Pentina I, Zhang L, Bata H, et al.Exploring privacy paradox in information-sensitive mobile app adoption: A cross-cultural comparison[J]. Computers in Human Behavior, 2016, 65: 409-419. [38] Lwin M O, Williams J D.A model integrating the multidimensional developmental theory of privacy and theory of planned behavior to examine fabrication of information online[J]. Marketing Letters, 2003, 14(4): 257-272. [39] Eyal T, Sagristano M D, Trope Y, et al.When values matter: Expressing values in behavioral intentions for the near vs. distant future[J]. Journal of Experimental Social Psychology, 2009, 45(1): 35-43. [40] Salo J, Karjaluoto H.A conceptual model of trust in the online environment[J]. Online Information Review, 2007, 31(5): 604-621. [41] Gefen D, Karahanna E, Straub D W.Trust and TAM in online shopping: An integrated model[J]. MIS Quarterly, 2003, 27(1): 51-90. [42] Zafeiropoulou A M.A paradox of privacy: unravelling the reasoning behind online location sharing[D]. University of Southampton, 2014. [43] 杨腾蛟. 基于消费者感知的企业品牌权益对品牌忠诚的作用研究[D]. 杭州: 浙江大学, 2008: 38-43. [44] Anderson C L, Agarwal R.The digitization of healthcare: Boundary risks, emotion, and consumer willingness to disclose personal health information[J]. Information Systems Research, 2011, 22(3): 469-490. [45] Premazzi K, Castaldo S, Grosso M, et al.Customer information sharing with e-vendors: The roles of incentives and trust[J]. International Journal of Electronic Commerce, 2010, 14(3): 63-91. [46] Bansal G, Zahedi F, Gefen D.The moderating influence of privacy concern on the efficacy of privacy assurance mechanisms for building trust: A multiple-context investigation[C]// Proceedings of International Conference on Information Systems. Paris: ICIS Doctoral Consortium, 2008. [47] 朱侯. 社交媒体用户隐私关注的心理机制研究[J]. 图书情报知识, 2016(2): 75-82. [48] Zlatolas L N, Welzer T, Heričko M, et al.Privacy antecedents for SNS self-disclosure: The case of Facebook[J]. Computers in Human Behavior, 2015, 45: 158-167. [49] 郭龙飞. 社交网络用户隐私关注动态影响因素及行为规律研究[D]. 北京: 北京邮电大学, 2013: 3-64. [50] Lutz C, Strathoff P.Privacy concerns and online behavior - Not so paradoxical after all? Viewing the privacy paradox through different theoretical lenses[J]. SSRN Electronic Journal, 2014: 81-99. [51] Davison W P.The third-person effect in communication[J]. Public Opinion Quarterly, 1983, 47(1): 1. [52] Krasnova H, Günther O, Spiekermann S, et al.Privacy concerns and identity in online social networks[J]. Identity in the Information Society, 2009, 2(1): 39-63. [53] Metcalfe J, Mischel W.A hot/cool-system analysis of delay of gratification: Dynamics of willpower[J]. Psychological Review, 1999, 106(1): 3-19. [54] 朱侯, 王可, 严芷君, 等. 基于隐私计算理论的SNS用户隐私悖论现象研究[J]. 情报杂志, 2017, 36(2): 134-139, 121. [55] Förster J, Friedman R S, Liberman N.Temporal construal effects on abstract and concrete thinking: Consequences for insight and creative cognition[J]. Journal of Personality & Social Psychology, 2004, 87(2): 177-189. [56] Alsaad A, Mohamad R, Ismail N A.The moderating role of trust in business to business electronic commerce (B2B EC) adoption[J]. Computers in Human Behavior, 2017, 68: 157-169. [57] 王雪芬, 赵宇翔, 朱庆华. 社交媒体环境下的用户隐私关注研究现状[J]. 情报学报, 2015, 34(12): 1322-1334. [58] Lo J.Privacy concern, locus of control, and salience in a trust-risk model of information disclosure on social networking sites[C]// AMCIS 2010 Proceedings, 2010: 110-122. [59] Barry M.Applying the theory of planned behavior to cadastral systems[J]. Survey Review, 2005, 38(296): 124-137. [60] Malhotra N K, Kim S S, Agarwal J.Internet users’ information privacy concerns (IUIPC): The construct, the scale, and a causal model[J]. Information Systems Research, 2004, 15(4): 336-355. [61] Dienlin T, Trepte S.Is the privacy paradox a relic of the past? An in-depth analysis of privacy attitudes and privacy behaviors[J]. European Journal of Social Psychology, 2015, 45(3): 285-297. [62] Sutanto J, Palme E, Tan C H, et al.Addressing the personalization-privacy paradox: an empirical assessment from a field experiment on smartphone users[J]. MIS Quarterly, 2013, 37(4): 1141-1164. [63] Baron R M, Kenny D A.The moderator-mediator variable distinction in social psychological research: Conceptual, strategic, and statistical considerations[J]. Journal of Personality and Social Psychology, 1986, 51(6): 1173-1182. [64] Cohen J.Statistical power analysis for the behavioral sciences[J]. Journal of the American Statistical Association, 1988, 2(4): 19-74. [65] Smith H J, Dinev T, Xu H.Information privacy research: An interdisciplinary review[J]. MIS Quarterly, 2011, 35(4): 989-1015. [66] 孙晓玲. 大学生自我透视的时间距离效应[D]. 上海: 华东师范大学, 2008: 1-2. [67] Sun Y, Wang N, Shen X L, et al.Location information disclosure in location-based social network services: Privacy calculus, benefit structure, and gender differences[J]. Computers in Human Behavior, 2015, 52: 278-292. [68] Gurung A, Raja M K.Online privacy and security concerns of consumers[J]. Information and Computer Security, 2016, 24(4): 348-371.