[1] 必胜客被黑致六万用户信息泄露个人数据安全如何保障?[EB/OL].[2017-10-20].http://sh.qihoo.com/pc/detail?check=30f997d3de1f6669&sign=360_e39369d1&url=http://www.csdn.net/article/a/2017-10-20/15828374.
[2] WANG T, DUONG T D, CHEN C C. Intention to disclose personal information via mobile applications:a privacy calculus perspective[J]. International journal of information management, 2016, 36(4):531-542.
[3] HAJLI N, LIN X. Exploring the security of information sharing on social networking sites:the role of perceived control of information[J]. Journal of business ethics, 2016, 133(1):111-123.
[4] 肖海清. 电商个性化推荐采纳中用户隐私风险感知的影响因素分析[D]. 武汉:华中师范大学, 2015.
[5] FOGEL J, NEHMAD E. Internet social network communities:Risk taking, trust, and privacy concerns[J]. Computers in human behavior, 2009, 25(1):153-160.
[6] MATT C, PECKELSEN P. Sweet idleness, but why? How cognitive factors and personality traits affect privacy-protective behavior[C]//System Sciences (HICSS), U.S.A:201649th Hawaii international conference on. Washington:IEEE Computer Society, 2016:4832-4841.
[7] 朱光, 崔维军, 张薇薇. 信息生命周期视角下的大数据隐私风险管理框架研究[J]. 情报资料工作, 2016,36(1):99-103.
[8] 迪莉娅. 大数据环境下隐私泄露影响评估研究[J]. 情报杂志, 2016(4):141-146.
[9] WU T, GANG Z. A new security and privacy risk assessment model for information system considering influence relation of risk elements[C]//Broadband and Wireless Computing, Communication and Applications (BWCCA), 2014 Ninth International Conference.Washington:IEEE Computer Society, 2014:233-238.
[10] FRIGINAL J, GUIOCHET J, KILLIJIAN M O. Towards a privacy risk assessment methodology for location-based systems[C]//International conference on mobile and ubiquitous systems:computing, networking, and services.Japan:Springer, Cham, 2013:748-753.
[11] JIANG R, LUO J, WANG X. An attack tree based risk assessment for location privacy in wireless sensor networks[C]//Wireless communications, networking and mobile computing (WiCOM), China:20128th International conference on. Washington:IEEE Computer Society, 2012:1-4.
[12] 王侃. 基于证据理论的移动商务交易风险评估与控制决策研究[D]. 武汉:华中科技大学, 2009.
[13] 张秋瑾. 云计算隐私安全风险评估[D]. 昆明:云南大学, 2015.
[14] 邝青青. 基于个人隐私泄露的风险评估[D]. 贵阳:贵州大学,2016.
[15] 朱光, 丰米宁, 陈叶, 等. 大数据环境下社交网络隐私风险的模糊评估研究[J]. 情报科学, 2016, 34(9):94-98.
[16] 朱义杰. 基于位置服务中的隐私泄露风险分析与评估[D]. 贵阳:贵州大学, 2016.
[17] 陈鍊, 胡作进, 蔡淑珍. 信息系统安全风险评估模型研究[J]. 计算机应用与软件, 2007, 24(6):73-77.
[18] 中文互联网数据咨询中心. 2013移动隐私安全评测报告[EB/OL].[2017-12-13].http://www.199it.com/archives/99542.html.
[19] 张丞. 移动互联网隐私泄露研究[D]. 北京:北京邮电大学, 2012.
[20] 邱均平, 李艳红. 社交网络中用户隐私安全问题探究[J]. 情报资料工作, 2012, 33(6):34-38.
[21] 陈云海, 黄兰秋. 大数据处理对电子商务的影响研究[J]. 电信科学, 2017, 29(3):17-21.
[22] ISO/IEC 17799.Information technology-Code of practice for information security management. Switzerland:International Organization for Standardization (ISO)[EB/OL].[2017-11-20].http://bastille-linux.sourceforge.net/jay/iso.pdf.
[23] WU Y, FENG G, WANG N, et al. Game of information security investment:impact of attack types and network vulnerability[J]. Expert systems with applications, 2015, 42(15/16):6132-6146.
[24] 吴明隆. 结构方程模型:AMOS的操作与应用[M]. 重庆:重庆大学出版社, 2009.
[25] 艾瑞咨询.《2017年中国移动电商行业研究报告》[EB/OL].[2017-02-20]. http://www.askci.com/news/hlw/20170313/10453493170.shtml.
[26] 王晰巍, 李嘉兴, 杨梦晴, 等. 移动社交软件隐私安全对使用意愿的影响因素研究[J]. 图书情报工作, 2016, 60(15):21-27. |