[1] WANG S C, WU J H. Proactive privacy practices in transition:toward ubiquitous services[J]. Information & management, 2014, 51(1):93-103.
[2] 王晰巍, 相甍甍, 张长亮, 等. 新媒体环境下信息隐私国内外研究动态及发展趋势[J]. 图书情报工作, 2017, 61(15):6-14.
[3] 王世伟, 赵付春. 企业用户感知视角下的云计算信息安全策略研究[J]. 图书情报工作, 2012, 56(6):29-32.
[4] SINGH A, CHATTERJEE K. Cloud security issues and challenges:a survey[J]. Journal of network & computer applications, 2017, 79:88-115.
[5] TRENZ M, HUNTGEBURTH J, VEIT D. Uncertainty in cloud service relationships:uncovering the differential effect of three social influence processes on potential and current users[J]. Information & management,2018,55(8):971-983.
[6] ALI A, WARREN D, MATHIASSEN L. Cloud-based business services innovation:a risk management model[J]. International journal of information management, 2017, 37(6):639-649.
[7] LACITY M C, REYNOLDS P. Cloud services practices for small and medium-sized enterprises[J]. MIS quarterly executive, 2014, 13(1):31-44.
[8] 程慧平,彭琦. 个人云存储服务的技术安全风险关键影响因素识别与分析[J]. 图书情报工作, 2019, 63(16):43-53.
[9] SCHNEIDER S, SUNYAEV A. Determinant factors of cloud-sourcing decisions:reflecting on the IT outsourcing literature in the era of cloud computing[J]. Journal of information technology, 2016, 31(1):1-31.
[10] CHANDRASHEKAR J, GANGADHARAN G R, RAJKUMAR B. Optimal fitness aware cloud service composition using an adaptive genotypes evolution based genetic algorithm[J]. Future generation computer systems, 2019, 94:185-198.
[11] LIANG H, XUE Y. Avoidance of information technology threats:a theoretical perspective[J]. MIS quarterly, 2009, 33(1):71-90.
[12] CHO E H, LEE D G, LEE T H, et al. Meaning in life and school adjustment:testing the mediating effects of problem-focused coping and self-acceptance[J]. Procedia-social and behavioral sciences, 2014, 114(8):777-781.
[13] SPEKMAN M L C, KONJIN E A, HOORN J F. Perceptions of healthcare robots as a function of emotion-based coping:the importance of coping appraisals and coping strategies[J]. Computers in human behavior, 2018,85(8):308-318.
[14] DELAHAIJ R, DAM K V. Coping with acute stress in the military:the influence of coping style, coping self-efficacy and appraisal emotions[J]. Personality & individual differences, 2017, 119(12):13-18.
[15] CHO H, CHUNG S, LEE J S. Optimistic Bias about online privacy risks:testing the moderating effects of perceived controllability and prior experience[J]. Computers in human behavior, 2010, 26(5):987-995.
[16] 王志英, 葛世伦, 苏翔. 云用户数据安全风险感知乐观偏差及其影响实证[J]. 管理评论, 2016, 28(9):121-133.
[17] VLEK C, STALLEN P J. Judging risks and benefits in the small and in the large[J]. Organizational behavior & human performance, 1981, 28(2):235-271.
[18] WIRTZ P W, ROHRBECK A. The dynamic role of perceived threat and self-efficacy in motivating terrorism preparedness behaviors[J]. International journal of disaster risk reduction, 2018, 27:366-372.
[19] BAEK Y M, KIM E M, BAE Y. My privacy is okay, but theirs is endangered:why comparative optimism matters in online privacy concerns[J]. Computers in human behavior, 2014, 31(2):48-56.
[20] TSOHOU A, KARYDA M, KOKOLAKIS S. Analyzing the role of cognitive and cultural biases in the internalization of information security policies recommendations for information security awareness programs[J] Computers & security, 2015, 52:128-141.
[21] DUELLMAN S, HURWITZ H, SUN Y. Managerial overconfidence and audit fees[J]. Journal of contemporary accounting & economics, 2015, 11(2):148-165.
[22] GAALANTI S, VAUBOURG A G. Optimism bias in financial analysts' earnings forecasts:do commissions sharing agreements reduce conflicts of interest?[J]. Economic modelling, 2017, 67(8):325-337.
[23] LAZARUS R S. Coping theory and research:past, present, and future[J]. Psychosomatic medicine, 1993, 55(3):234-247.
[24] LAI F J, LI D H, HESIEH C. Fighting identity theft:the coping perspective[J]. Decision support systems, 2012,52(2):353-363.
[25] 王念新, 施慧, 王志英等. 信息安全威胁的应对行为——基于云计算情境的实证研究[J]. 系统管理学报, 2018, 27(4):86-96.
[26] D'ARCY J, TEH P. Predicting employee information security policy compliance on a daily basis:the interplay of security-related stress, emotions, and neutralization[J]. Information & management, 2019, 56(7):1-14.
[27] JUNG Y, PARK J. An investigation of relationships among privacy concerns, affective responses, and coping behaviors in location-based services[J]. International journal of information management, 2018, 43:15-24.
[28] BAMBERG S, MASSON T, BREWITT K, et al. Threat, coping and flood prevention-a meta-analysis[J]. Journal of environmental psychology, 2017, 54(6):116-126.
[29] CAMPBELL W K, SEDIKIES C. Self-threat magnifies the self-serving bias:a meta-analytic integration[J]. Review of general psychology, 1999, 3(1):23-43.
[30] BAUMEISTER R F, SMART L, BODEN J M. Relation of threatened egotism to violence and aggression:the dark side of high self-esteem[J]. Psychological review, 1996, 103(1):5-33.
[31] LAZARUS R S, FOLKMAN S. Stress:appraisal and coping[M]. New York:Springer, 2013.
[32] BURDA D, TEUTEBERG F. The role of trust and risk perceptions in cloud archiving-results from an empirical study[J]. Journal of high technology management research, 2014, 25(2):172-187.
[33] WEHELE K, KLEHE U C, KIRA M, et al. Can I come as I am? refugees' vocational identity threats, coping, and growth[J]. Journal of vocational behavior, 2018, 105(2):83-101.
[34] CARVALHO S W, FAZEL H, TRIFTS V. Transgressing a group value in a transcultural experience:immigrants' affective response to perceived social identity threats[J]. Journal of business research, 2018, 91:326-333.
[35] ÖZPOLAT K, JANK W. Getting the most out of third party trust seals:an empirical analysis[J]. Decision support systems, 2015, 73(5):47-56.
[36] HOFFMAN Y, ROSENBLOOM T. Driving experience moderates the effect of implicit versus explicit threat priming on hazard perception test[J]. Accident analysis & prevention, 2016, 92(7):82-88.
[37] SINGH S, JEONG Y S, PARK J H. A survey on cloud computing security:issues, threats, and solutions[J]. Journal of network and computer applications, 2016, 75(17):200-222.
[38] CASAS P, SCHATZ R. Quality of experience in cloud services:survey and measurements[J]. Computer networks, 2014, 68(11):149-165.
[39] SCHMITT M T, AKNIN L B, AXSEN J, et al. Unpacking the relationships between pro-environmental behavior, life satisfaction, and perceived ecological threat[J]. Ecological economics, 2018, 143(1):130-140.
[40] 李华强,周雪,万青,等.网络隐私泄露事件中用户应对行为的形成机制研究——基于PADM理论模型的扎根分析[J]. 情报杂志,2018, 37(7):113-120.
[41] WEINSTEIN N D. Unrealistic optimism about future life events[J]. Journal of personality & social psychology, 1980, 39(5):806-820.
[42] BURNS A J, POSEY C, ROBERTS T L, et al. Examining the relationship of organizational insiders' psychological capital with information security threat and coping appraisals[J]. Computers in human behavior, 2017, 68(3):190-209.
[43] 范亚丽, 甘怡群, 郑威. 乐观悲观与应对灵活性的关系[J]. 中国临床心理学杂志, 2010, 18(6):775-779.
[44] JAMES T L, WALLACE L, WARKENTIN M, et al. Exposing others' information on Online Social Networks (OSNs):perceived shared risk, its determinants, and its influence on OSN Privacy control use[J]. Information & management, 2017, 54(7):851-865.
[45] CUE K L, GEORGE W H, NORRIS J. Women's appraisals of sexual -assault risk in dating situations[J]. Psychology of women quarterly, 2010, 20(4):487-504.
[46] BRUCE R, SMITH K T, SMITH L M. Implications of web assurance services on e-commerce[J]. Accounting forum, 2008, 32(1):46-61.
[47] AWAD N F, KRISHNAN M S. The personalization privacy paradox:an empirical evaluation of information transparency and the willingness to be profiled online for personalization[J]. MIS quarterly, 2006, 30(1):13-28.
[48] STANTON A L, KIRK S B, CAMERON C L, et al. Coping through emotional approach:scale construction and validation[J]. Journal of personality & social psychology, 2000, 78(6):1150-69.
[49] 王建亚.个人云存储用户采纳行为研究[M]. 北京:北京邮电大学出版社,2017:163,166.
[50] HAIR J F, RINGLE C M, SARSTEDT M. PLS-SEM:indeed a silver bullet[J]. Journal of marketing theory & practice, 2011, 19(2):139-152.