[1] BECKER G M, DEGROOT M H, MARSCHAK J. Measuring utility by a single response sequential method[J]. Behavioral science,1964,9(3):226-232.
[2] LUSK J L, ALEXANDER C, ROUSU M C. Designing experimental auctions for marketing research:the effect of values, distributions, and mechanisms on incentives for truthful bidding[J]. Review of marketing science,2007,5(1):1-30.
[3] HUBERMAN B A, ADAR E, FINE L R. Valuating privacy[J].IEEE security & privacy,2005,3(5):22-25.
[4] GROSSKLAGS J, ACQISTI A, HEINZ H J. When 25 cents is too much:an experiment on willingness-to-sell and willingness-to-protect personal information[C]//The 6th workshop on the economics of information security. Pittsburgh:WEIS Press,2007:206-214.
[5] OTSUKI M, SONEHARA N. Estimating the value of personal information with SNS utility[C]//Eighth international conference on availability, reliability and security. Pisscataway:IEEE Press,2013:512-516.
[6] LIM S, WOO J R, LEE J, et al. Consumer valuation of personal information in the age of big data[J].Journal of the Association for Information Science & Technology,2018,69(1):60-71.
[7] STAIANO J, OLIVER N, LEPRI B, et al. Money walks:a human-centric study on the economics of personal mobile data[C]//Proceedings of the 2014 ACM international joint conference on pervasive and ubiquitous computing. New York:ACM Press,2014:583-594.
[8] KIM J E, YEO J.Valuation of consumers' personal information:a South Korean example[J].Journal of family & economic issues,2010,31(3):297-306.
[9] BOWEN H R. The interpretation of voting in the allocation of economic resources[J]. The quarterly journal of economics,1943,58(1):27-48.
[10] DAVIS R K. The value of outdoor recreation:an economic study of the maine woods[D]. Cambridge:Harvard University,1963.
[11] HARRISON G W, RUTSTROM E E. Experimental evidence on the existence of hypothetical bias in value elicitation methods[J]. Handbook of experimental economics results, 2008,1(5):752-767.
[12] 朱淀,蔡杰.消费者食品安全信息需求与支付意愿研究——基于可追溯猪肉不同层次安全信息的BDM机制研究[J].公共管理学报,2013,10(3):129-143.
[13] BOHM P, LINDEN J, SONNEGARD J. Eliciting reservation prices:becker degroot marschak mechanisms vs markets[J], Economic journal,1997,97(7):1079-1089.
[14] 新浪微博数据中心. 2018微博用户发展报告[EB/OL].[2019-05-22]. http://data.weibo.com/report/reportDetail?id=433.
[15] 中国互联网信息中心.2016年中国社交应用用户行为研究报告[EB/OL].[2019-05-25]. http://www.cnnic.cn/hlwfzyj/hlwxzbg/sqbg/201712/t20171227_70118.htm.
[16] LAWRENCE N W.社会研究方法:定性和定量的取向[M].郝大海,译.北京:中国人民大学出版社, 2000.
[17] HANDEL BLATT RESEARCH INSTITUTE. Big data and data protection[EB/OL].[2019-05-10]. https://research.handelsblatt.com/de.
[18] 北大法宝. 最高检发布六起侵犯公民个人信息犯罪典型案例之一:韩某等侵犯公民个人信息案[EB/OL].[2019-06-15]. http://www.pkulaw.cn/case/pfnl_a25051f3312b07f3977ceb19c9a17c0e061a8e39da44970bbdfb.html?keywords=%E4%B8%AA%E4%BA%BA%E4%BF%A1%E6%81%AF&match=Exact.
[19] 北大法宝.最高检发布六起侵犯公民个人信息犯罪典型案例之二:张某某、姚某某侵犯公民个人信息案[EB/OL].[2019-06-15]. http://www.pkulaw.cn/case/pfnl_a25051f3312b07f3bd20d4e36aaf5617f38a63b8add9cfaabdfb.html?keywords=%E4%B8%AA%E4%BA%BA%E4%BF%A1%E6%81%AF&match=Exact.
[20] 北大法宝.最高检发布六起侵犯公民个人信息犯罪典型案例之三:章某某等诈骗、侵犯公民个人信息案[EB/OL].[2019-06-15]. http://www.pkulaw.cn/case/pfnl_a25051f3312b07f3a98143a51dda8ce5879440e0fa015a1abdfb.html?keywords=%E4%B8%AA%E4%BA%BA%E4%BF%A1%E6%81%AF&match=Exact.
[21] 北大法宝.最高检发布六起侵犯公民个人信息犯罪典型案例之四:郭某某侵犯公民个人信息案[EB/OL].[2019-06-15]. http://www.pkulaw.cn/case/pfnl_a25051f3312b07f359613bb3b7e7aed6ab31cb24a5d2b4fcbdfb.html?keywords=%E4%B8%AA%E4%BA%BA%E4%BF%A1%E6%81%AF&match=Exact.
[22] 北大法宝. 最高检发布六起侵犯公民个人信息犯罪典型案例之五:鲁某等侵犯公民个人信息案[EB/OL].[2019-06-15]. http://www.pkulaw.cn/case/pfnl_a25051f3312b07f36e05bdf10bcf150d41a4cd1f0130783bbdfb.html?keywords=%E4%B8%AA%E4%BA%BA%E4%BF%A1%E6%81%AF&match=Exact.
[23] 北大法宝.最高检发布六起侵犯公民个人信息犯罪典型案例之六:籍某某、李某某侵犯公民个人信息案[EB/OL].[2019-06-15]. http://www.pkulaw.cn/case/pfnl_a25051f3312b07f3807c3db9ca5036e664a7f2e1cd636fadbdfb.html?keywords=%E4%B8%AA%E4%BA%BA%E4%BF%A1%E6%81%AF&match=Exact. |