[1] 腾讯科技.2017年度互联网安全报告[EB/OL].[2018-01-19]. http://tech.qq.com/a/20180119/012161.htm.
[2] 中国互联网络信息中心.第41次中国互联网络发展状况统计报告[EB/OL].[2017-01-22].http://www.cac.gov.cn/2018-01/31/c_1122347026.htm.
[3] 孟晓明,贺伟.社交网络大数据商业化开发利用中的个人隐私保护[J].图书馆论坛,2015(6):67-75.
[4] BANDURA A. Human agency in social cognitive theory[J]. American psychologist,1989,44(9):1175-1184.
[5] JOHNSTON A C,WARKENTIN M. Fear appeals and information security behaviors:an empirical study[J]. MIS quarterly,2010,34(3):549-566.
[6] CHEN Y,ZAHEDI F M.Individuals' Internet security perceptions and behaviors:polycontextual contrasts between the United States and China[J].MIS quarterly,2016,40(1):205-222.
[7] 张晓娟.隐私关注对智能手机用户信息安全行为意向的影响研究[J].情报理论与实践,2017(11):3-10.
[8] 王璐瑶.恐惧诉求对社交网络用户隐私安全保护行为的影响研究[J].情报杂志,2016(12):2-6.
[9] 罗力.社交网络中用户个人信息安全保护研究[J].图书馆学研究,2012(14):36-40.
[10] BOYD D M,ELLISON N B.Social network sites:definition,history,and scholarship[J].Journal of computer-mediated communication,2007,13(1):210-230.
[11] 刘志辉,张志强.作者关键词耦合分析方法及实证研究[J].情报杂志,2014(12):268-275.
[12] HOLT B E, BROWN H C.Animal drive and the learning process, an essay toward radical empiricism[J]. Journal of nervous and mental disease,1933,78(5):586-600.
[13] LIANG H, XUE Y.Avoidance of information technology threats:a theoretical perspective[J].MIS quarterly,2009,33(1):71-90.
[14] INKELES A.Becoming modern:individual change in six developing countries[J].Ethos,2010,3(2):323-342.
[15] Abbassi A.Culture and anxiety:a cross-cultural study[J].Journal of professional counseling practice theory & research,2007,35(1):26.
[16] WONG P T P,WONG L C J, SCOTT C.Beyond stress and coping:the positive psychology of transformation[A]//Handbook of multicultural perspectives on stress and coping. New York:Routladge,2006:1-26.
[17] ROGERS R W,CACIOPPO J T,PETTY R. Cognitive and physiological processes in fear appeals and attitude change:a revised theory of protection motivation[A]//Social psychophysiology. New York:Guilford Press,1983.
[18] RIPPETOE P A,ROGERS R W.Effects of components of protection-motivation theory on adaptive and maladaptive coping with a health threat[J]. Journal of personality and social psychology,1987,52(3):596-604.
[19] LIANG H,XUE Y.Understanding security behaviors in personal computer usage:a threat avoidance perspective[J]. Journal of the Association for Information Systems,2010,11(7):394-413.
[20] HEPPNER P P, HEPPNER M J, LEE D G, et al.Development and validation of a collectivistic coping styles inventory[J]. Journal of counseling psychology,2006,53(1):107-125.
[21] Economist intelligence unit. Digital economy rankings 2010 beyond e-readiness[EB/OL].[2018-01-19].http://www-935.ibm.com/services/us/gbs/bus/pdf/eiu_digital-economy-rankings-2010_final_web.pdf.
[22] BSA.Sixth annual bsa and idc global software piracy study[EB/OL].[2018-01-19]. http://www.global.bsa.org/globalpiracy2008/index.html.
[23] IFINEDO P. Information systems security policy compliance:an empirical study of the effects of socialisation,influence,and cognition[J]. Information & management,2014,51(1):69-79.
[24] YOON C,HWANG J W,KIM R. Exploring factors that influence students' behaviors in information security[J]. Journal of information systems education,2012,23(4):407-415.
[25] WITTE K.Putting the fear back into fear appeals:the extended parallel process model[J]. Communication monographs,1992,59(4):329-349.
[26] SCHAUBROECK J, LAM S S, XIE J L.Collective efficacy versus self-efficacy in coping responses to stressors and control:a cross-cultural study[J]. Journal of applied psychology,2000,85(4):512-525.
[27] WORKMAN M,BOMMER H H,STRAUB D.Security lapses and the omission of information security measures:a threat control model and empirical test[J]. Computers in human behavior, 2008,24(6):2799-2816.
[28] HAMAMURA T, MEIJER Z, HEINE S J,et al.Approach-avoidance motivation and information processing:a cross-cultural analysis[J]. Personality and social psychology bulletin,2009,35(4):454-462.
[29] KUJUR F,SINGH S.Engaging customers through online participa-tion in social networking sites[J]. Asia pacific management review,2017,22(1):16-24.
[30] AJZEN I.The theory of planned behavior[J].Organizational behavior & decision processes,1991,50:179-211.
[31] GOOL E V,OUYTSEL J V,PONNET K,et al.To share or not to share? adolescents' self-disclosure about peer relationships on Facebook:an application of the prototype willingness model[J].Computers in human behavior,2015,44(3):230-239.
[32] 张晓娟.基于社会认知理论的智能手机用户信息安全行为意愿研究[J].现代情报,2017(9):2-5. |