Assessment of Personal Information Value and Individual Differences Under the Situation of Information Leakage: An Empirical Study Based on Discrete Choice Experiment
Deng Shengli, Zhao Haiping
Center for Studies of Information Resources, Wuhan University, Wuhan 430072
邓胜利, 赵海平. 信息泄露情境下的个人信息价值评估及个体差异:基于离散选择模型的实证研究[J]. 情报学报, 2019, 38(3): 266-276.
Deng Shengli, Zhao Haiping. Assessment of Personal Information Value and Individual Differences Under the Situation of Information Leakage: An Empirical Study Based on Discrete Choice Experiment. 情报学报, 2019, 38(3): 266-276.
1 AcquistiA, BrandimarteL, LoewensteinG. Privacy and human behavior in the age of information[J]. Science, 2015, 347(6221): 509-514. 2 李林. 2009法治蓝皮书——中国法治发展报告No. 7(2009)[M]. 北京: 社会科学文献出版社, 2009. 3 互联网法治研究中心. 中国个人信息安全和隐私保护报告[R/OL]. [2018-03-20]. http://www.199it.com/archives/540836.html. 4 Morrison, FoersterLLP. Are you ready for the amended Japanese privacy law?[EB/OL]. [2018-04-10]. https://www.lexology.com/library/detail.aspx?g=883f053e-24cc-43be-bc18-86fececc2993 5 ConsultingIntersoft. General Data Protection Regulation (GDPR) (EU)2016/679[EB/OL]. [2018-04-14]. https://gdpr-info.eu/. 6 中国人大网. 中华人民共和国网络安全法[EB/OL]. [2018-04-09]. http://www.npc.gov.cn/npc/xinwen/2016-11/07/content_2001605.htm. 7 SmithH J, DinevT, XuH. Information privacy research: an interdisciplinary review[J]. MIS Quarterly, 2011, 35(4): 989-1016. 8 YongJ P, CampbellS W, N. AffectKwak, cognition and reward: Predictors of privacy protection online[J]. Computers in Human Behavior, 2012, 28(3): 1019-1027. 9 WuK W, HuangS Y, YenD C, et al. The effect of online privacy policy on consumer privacy concern and trust[J]. Computers in Human Behavior, 2012, 28(3): 889-897. 10 WoodmanR W, GansterD C, AdamsJ, et al. A survey of employee perceptions of information privacy in organizations[J]. Academy of Management Journal, 1982, 25(3): 647-663. 11 BainbridgeD, PearceG. The UK data protection act 1998—Data subjectsrights[J]. Computer Law & Security Review, 1998, 14(6): 401-406. 12 PhelpsJ E, Souza GD, NowakG J. Antecedents and consequences of consumer privacy concerns: An empirical investigation[J]. Journal of Interactive Marketing, 2001, 15(4): 2-17. 13 LimS, WooJ R, LeeJ, et al. Consumer valuation of personal information in the age of big data[J]. Journal of the Association for Information Science and Technology, 2018, 69(1): 60-71. 14 OtsukiM, SoneharaN. Estimating the value of personal information with SNS utility[C]// Proceedings of the Eighth International Conference on Availability, Reliability and Security. Los Alamitos: IEEE Computer Society Press, 2013: 512-516. 15 HannI H, HuiK L, LeeS Y T, et al. Analyzing online information privacy concerns: An information processing theory approach[J]. Journal of Management Information Systems, 2007, 24(2): 13-42. 16 SteinfeldN. Trading with privacy: the price of personal information[J]. Online Information Review, 2015, 39(7): 923-938. 17 MinJ, KimB. How are people enticed to disclose personal information despite privacy concerns in social network sites? The calculus between benefit and cost[J]. Journal of the Association for Information Science and Technology, 2015, 66(4): 839-857. 18 BauerC, KorunovskaJ. Spiekermann S. On the value of information—What Facebook users are willing to pay[C]// Proceedings of the European Conference on Information Systems. 2012: 217-223. 19 MichelS, ThomasH, FaranakF. On the willingness to pay for privacy as a freemium model: First empirical evidence[J]. Journal of Chemical Physics, 2013, 124(2): 43-50. 20 SpiekermannS, KorunovskaJ, BauerC. Psychology of ownership and asset defense: Why people value their personal information beyond privacy[C]// Proceedings of the International Conference on Information Systems. 2012: 41-47. 21 GrossklagsJ, AcquistiA. When 25 cents is too much: An experiment on willingness-to-sell and willingness-to-protect personal information[OL]. https://www.econinfosec.org/archive/weis2007/papers/66.pdf. 22 RacherlaP, BabbJ, KeithM. Pay-what-you-want pricing for mobile applications: The effect of social information and privacy assurances[C]// Proceedings of the Conference for Information Systems Applied Research, Wilmington North Carolina, USA. 2011, 4: n1833. 23 KimJ E, YeoJ. Valuation of consumerspersonal information: A South Korean example[J]. Journal of Family and Economic Issues, 2010, 31(3): 297-306. 24 KwonH, LeeE, KimT, et al. Estimating compensation for personal information infringement in Korea using contingent valuation methods[J]. Journal of the Korea Institute of Information Security and Cryptology, 2012, 22: 367-377. 25 黄逸珺, 陆桐, 闫强. 电子商务网站个人信息价值评估[J]. 北京邮电大学学报(社会科学版), 2017(5): 33-41. 26 BeresfordA R, KüblerD, PreibuschS. Unwillingness to pay for privacy: A field experiment[J]. IZA Discussion Papers, 2012, 117(1): 25-27. 27 EgelmanS, FeltA P, WagnerD. Choice architecture and smartphone privacy: There s a price for that[M]// B?hme R. (eds) The Economics of Information Security and Privacy. Heidelberg: Springer, 2013: 211-236. 28 RiceD, D’ArcyJ. A personal information auction: Measuring the differential value of privacy[C]// Proceedings of Americas Conference on Information Systems, 2007: 206. 29 BenndorfV, NormannH T. The willingness to sell personal data[OL]. [2018-04-12]. https://www.econstor.eu/bitstream/10419/100663/1/79530904X.pdf. 30 BarakO, CohenG, GazitA, et al. The price is right? Economic value of location sharing[C]// Proceedings of the 2013 ACM Conference on Pervasive and Ubiquitous Computing Adjunct Publication. New York: ACM Press, 2013: 891-900. 31 KimJ, NamC, KimS. The economic value of personal information and policy implication[C]// Proceedings of the 26th European Regional ITS Conference. International Telecommunications Society, 2015. 32 AdamsJ S. Inequity in social exchange[J]. Advances in Experimental Social Psychology, 1965, 2(4): 267-299. 33 安徽省人民代表大会常务委员会. 安徽省消费者权益保护条例[J]. 安徽省人民政府公报, 2004(18): 10-18. 34 刘文卿. 应用统计学系列教材: 实验设计[M]. 北京: 清华大学出版社, 2005. 35 GlasgowG, ButlerS. The value of personal information to consumers of online services: Evidence from a discrete choice experiment[OL]. [2018-03-25]. http://www.nera.com/content/dam/nera/publications/archive2/PUB_Value_Personal_Info_0714.pdf. 36 AcquistiA, GrossklagsJ. Privacy and rationality in individual decision making[J]. IEEE Security & Privacy, 2005, 3(1): 26-33. 37 RoseJ, RehseO, R?berB. The value of our digital identity[EB/OL]. [2018-03-28]. https://www.bcg.com/publications/2012/digital-economy-consumer-insight-value-of-our-digital-identity.aspx. 38 FogelJ, NehmadE. Internet social network communities: Risk taking, trust, and privacy concerns[J]. Computers in Human Behavior, 2009, 25(1): 153-160. 39 HeraviA, MubarakS, ChooK K R. Information privacy in online social networks: Uses and gratification perspective[J]. Computers in Human Behavior, 2018, 84: 441-459. 40 BarthS, de JongM D T. The privacy paradox–Investigating discrepancies between expressed privacy concerns and actual online behavior–A systematic literature review[J]. Telematics and Informatics, 2017, 34(7): 1038-1058. 41 艰难维权: 五起个人信息泄露案件分析[OL]. [2018-04-10]. http://tech.sina.com.cn/i/2015-01-19/doc-ichmifpx4644951.shtml.