理论研究

个人云存储用户的信息隐私感知威胁及应对策略研究

  • 鲁馨蔓 ,
  • 李艳霞 ,
  • 张初兵
展开
  • 1. 天津财经大学管理科学与工程学院 天津 300222;
    2. 天津财经大学商学院 天津 300222
鲁馨蔓(ORCID:0000-0001-5329-9585),讲师,博士后,硕士生导师,E-mail:xinman_lu@163.com;李艳霞(ORCID:0000-0001-7393-3002),硕士研究生;张初兵(ORCID:0000-0003-4743-1492),教授,博士后,博士生导师。

收稿日期: 2019-07-14

  修回日期: 2019-09-20

  网络出版日期: 2020-03-20

基金资助

本文系教育部人文社会科学研究项目"基于契约机制的云服务供应链风险治理研究"(项目编号:17YJC630097)研究成果之一。

Research on Personal Cloud Storage Users' Information Privacy Perceived Threats and Coping Strategy

  • Lu Xinman ,
  • Li Yanxia ,
  • Zhang Chubing
Expand
  • 1. School of Management Science and Engineering, Tianjin University of Finance and Economics, Tianjin 300222;
    2. Business School, Tianjin University of Finance and Economics, Tianjin 300222

Received date: 2019-07-14

  Revised date: 2019-09-20

  Online published: 2020-03-20

摘要

[目的/意义] 泛在信息环境下,云内的共享性、个性化服务过程及泛在接入使得用户的隐私威胁不断加大,探索用户感知威胁的削弱因素及应对策略,将有助于解析泛在信息环境下用户自身复杂的信息保护行为,促进云存储服务的进一步发展和规模化应用。[方法/过程] 结合心理学中的乐观偏差及应对理论,基于削弱因素——感知威胁——应对策略的研究逻辑,从乐观偏差、使用经验、官方认证3个维度分析对云存储用户感知威胁的不同影响,并验证乐观偏差对感知威胁到应对策略的调节作用。通过在线问卷调查,采用偏最小二乘法对结构模型进行估计。[结果/结论] 研究发现,使用经验、乐观偏差负向影响感知威胁,而官方认证的作用并不显著。此外,乐观偏差会负向调节感知威胁与问题应对之间的关系,但不会影响其与情绪应对的关系。研究结果可有助于揭示云储存用户感知威胁与应对策略的发生规律及内在机理,并为云服务提供商的风险管控以及国家工信部门的监管政策提供建议和参考。

本文引用格式

鲁馨蔓 , 李艳霞 , 张初兵 . 个人云存储用户的信息隐私感知威胁及应对策略研究[J]. 图书情报工作, 2020 , 64(6) : 10 -19 . DOI: 10.13266/j.issn.0252-3116.2020.06.002

Abstract

[Purpose/significance] Under ubiquitous information environment, the sharing of the cloud, personalized service process and ubiquitous access increase the privacy threat of users. Exploring the weaken factors on perceived threats of personal cloud storage users and their coping strategies will help to analyze users' complicated information protection action, and promote the further development and large-scale application of cloud storage services.[Method/process] Drawing upon the optimism bias and coping theories in psychology, based on the research logic "weaken factors→perceived threat→coping", we analyzed different influences on perceived threat of 3 factors (i.e., optimism bias, prior experience and the official certification), and verified the moderating effect of optimism bias between perceived threats and coping behavior. Through the online questionnaire survey, we tested the model with the partial least square method.[Result/conclusion] The results reveal that prior experience and optimistic bias negatively affect perceived threat of cloud storage users, while official certification does not play a significant role. Besides, optimistic bias will be negative to adjust the relationship between perceived threat and emotion-focused coping, but will not affect the relationship between perceived threat and emotion-focused coping. The results help reveal the law and internal mechanism of personal cloud storage users' perceived threats and coping strategy, and provide advices and references for risk control of the cloud service providers and regulatory policies of Industry and Information Technology Ministry.

参考文献

[1] WANG S C, WU J H. Proactive privacy practices in transition:toward ubiquitous services[J]. Information & management, 2014, 51(1):93-103.
[2] 王晰巍, 相甍甍, 张长亮, 等. 新媒体环境下信息隐私国内外研究动态及发展趋势[J]. 图书情报工作, 2017, 61(15):6-14.
[3] 王世伟, 赵付春. 企业用户感知视角下的云计算信息安全策略研究[J]. 图书情报工作, 2012, 56(6):29-32.
[4] SINGH A, CHATTERJEE K. Cloud security issues and challenges:a survey[J]. Journal of network & computer applications, 2017, 79:88-115.
[5] TRENZ M, HUNTGEBURTH J, VEIT D. Uncertainty in cloud service relationships:uncovering the differential effect of three social influence processes on potential and current users[J]. Information & management,2018,55(8):971-983.
[6] ALI A, WARREN D, MATHIASSEN L. Cloud-based business services innovation:a risk management model[J]. International journal of information management, 2017, 37(6):639-649.
[7] LACITY M C, REYNOLDS P. Cloud services practices for small and medium-sized enterprises[J]. MIS quarterly executive, 2014, 13(1):31-44.
[8] 程慧平,彭琦. 个人云存储服务的技术安全风险关键影响因素识别与分析[J]. 图书情报工作, 2019, 63(16):43-53.
[9] SCHNEIDER S, SUNYAEV A. Determinant factors of cloud-sourcing decisions:reflecting on the IT outsourcing literature in the era of cloud computing[J]. Journal of information technology, 2016, 31(1):1-31.
[10] CHANDRASHEKAR J, GANGADHARAN G R, RAJKUMAR B. Optimal fitness aware cloud service composition using an adaptive genotypes evolution based genetic algorithm[J]. Future generation computer systems, 2019, 94:185-198.
[11] LIANG H, XUE Y. Avoidance of information technology threats:a theoretical perspective[J]. MIS quarterly, 2009, 33(1):71-90.
[12] CHO E H, LEE D G, LEE T H, et al. Meaning in life and school adjustment:testing the mediating effects of problem-focused coping and self-acceptance[J]. Procedia-social and behavioral sciences, 2014, 114(8):777-781.
[13] SPEKMAN M L C, KONJIN E A, HOORN J F. Perceptions of healthcare robots as a function of emotion-based coping:the importance of coping appraisals and coping strategies[J]. Computers in human behavior, 2018,85(8):308-318.
[14] DELAHAIJ R, DAM K V. Coping with acute stress in the military:the influence of coping style, coping self-efficacy and appraisal emotions[J]. Personality & individual differences, 2017, 119(12):13-18.
[15] CHO H, CHUNG S, LEE J S. Optimistic Bias about online privacy risks:testing the moderating effects of perceived controllability and prior experience[J]. Computers in human behavior, 2010, 26(5):987-995.
[16] 王志英, 葛世伦, 苏翔. 云用户数据安全风险感知乐观偏差及其影响实证[J]. 管理评论, 2016, 28(9):121-133.
[17] VLEK C, STALLEN P J. Judging risks and benefits in the small and in the large[J]. Organizational behavior & human performance, 1981, 28(2):235-271.
[18] WIRTZ P W, ROHRBECK A. The dynamic role of perceived threat and self-efficacy in motivating terrorism preparedness behaviors[J]. International journal of disaster risk reduction, 2018, 27:366-372.
[19] BAEK Y M, KIM E M, BAE Y. My privacy is okay, but theirs is endangered:why comparative optimism matters in online privacy concerns[J]. Computers in human behavior, 2014, 31(2):48-56.
[20] TSOHOU A, KARYDA M, KOKOLAKIS S. Analyzing the role of cognitive and cultural biases in the internalization of information security policies recommendations for information security awareness programs[J] Computers & security, 2015, 52:128-141.
[21] DUELLMAN S, HURWITZ H, SUN Y. Managerial overconfidence and audit fees[J]. Journal of contemporary accounting & economics, 2015, 11(2):148-165.
[22] GAALANTI S, VAUBOURG A G. Optimism bias in financial analysts' earnings forecasts:do commissions sharing agreements reduce conflicts of interest?[J]. Economic modelling, 2017, 67(8):325-337.
[23] LAZARUS R S. Coping theory and research:past, present, and future[J]. Psychosomatic medicine, 1993, 55(3):234-247.
[24] LAI F J, LI D H, HESIEH C. Fighting identity theft:the coping perspective[J]. Decision support systems, 2012,52(2):353-363.
[25] 王念新, 施慧, 王志英等. 信息安全威胁的应对行为——基于云计算情境的实证研究[J]. 系统管理学报, 2018, 27(4):86-96.
[26] D'ARCY J, TEH P. Predicting employee information security policy compliance on a daily basis:the interplay of security-related stress, emotions, and neutralization[J]. Information & management, 2019, 56(7):1-14.
[27] JUNG Y, PARK J. An investigation of relationships among privacy concerns, affective responses, and coping behaviors in location-based services[J]. International journal of information management, 2018, 43:15-24.
[28] BAMBERG S, MASSON T, BREWITT K, et al. Threat, coping and flood prevention-a meta-analysis[J]. Journal of environmental psychology, 2017, 54(6):116-126.
[29] CAMPBELL W K, SEDIKIES C. Self-threat magnifies the self-serving bias:a meta-analytic integration[J]. Review of general psychology, 1999, 3(1):23-43.
[30] BAUMEISTER R F, SMART L, BODEN J M. Relation of threatened egotism to violence and aggression:the dark side of high self-esteem[J]. Psychological review, 1996, 103(1):5-33.
[31] LAZARUS R S, FOLKMAN S. Stress:appraisal and coping[M]. New York:Springer, 2013.
[32] BURDA D, TEUTEBERG F. The role of trust and risk perceptions in cloud archiving-results from an empirical study[J]. Journal of high technology management research, 2014, 25(2):172-187.
[33] WEHELE K, KLEHE U C, KIRA M, et al. Can I come as I am? refugees' vocational identity threats, coping, and growth[J]. Journal of vocational behavior, 2018, 105(2):83-101.
[34] CARVALHO S W, FAZEL H, TRIFTS V. Transgressing a group value in a transcultural experience:immigrants' affective response to perceived social identity threats[J]. Journal of business research, 2018, 91:326-333.
[35] ÖZPOLAT K, JANK W. Getting the most out of third party trust seals:an empirical analysis[J]. Decision support systems, 2015, 73(5):47-56.
[36] HOFFMAN Y, ROSENBLOOM T. Driving experience moderates the effect of implicit versus explicit threat priming on hazard perception test[J]. Accident analysis & prevention, 2016, 92(7):82-88.
[37] SINGH S, JEONG Y S, PARK J H. A survey on cloud computing security:issues, threats, and solutions[J]. Journal of network and computer applications, 2016, 75(17):200-222.
[38] CASAS P, SCHATZ R. Quality of experience in cloud services:survey and measurements[J]. Computer networks, 2014, 68(11):149-165.
[39] SCHMITT M T, AKNIN L B, AXSEN J, et al. Unpacking the relationships between pro-environmental behavior, life satisfaction, and perceived ecological threat[J]. Ecological economics, 2018, 143(1):130-140.
[40] 李华强,周雪,万青,等.网络隐私泄露事件中用户应对行为的形成机制研究——基于PADM理论模型的扎根分析[J]. 情报杂志,2018, 37(7):113-120.
[41] WEINSTEIN N D. Unrealistic optimism about future life events[J]. Journal of personality & social psychology, 1980, 39(5):806-820.
[42] BURNS A J, POSEY C, ROBERTS T L, et al. Examining the relationship of organizational insiders' psychological capital with information security threat and coping appraisals[J]. Computers in human behavior, 2017, 68(3):190-209.
[43] 范亚丽, 甘怡群, 郑威. 乐观悲观与应对灵活性的关系[J]. 中国临床心理学杂志, 2010, 18(6):775-779.
[44] JAMES T L, WALLACE L, WARKENTIN M, et al. Exposing others' information on Online Social Networks (OSNs):perceived shared risk, its determinants, and its influence on OSN Privacy control use[J]. Information & management, 2017, 54(7):851-865.
[45] CUE K L, GEORGE W H, NORRIS J. Women's appraisals of sexual -assault risk in dating situations[J]. Psychology of women quarterly, 2010, 20(4):487-504.
[46] BRUCE R, SMITH K T, SMITH L M. Implications of web assurance services on e-commerce[J]. Accounting forum, 2008, 32(1):46-61.
[47] AWAD N F, KRISHNAN M S. The personalization privacy paradox:an empirical evaluation of information transparency and the willingness to be profiled online for personalization[J]. MIS quarterly, 2006, 30(1):13-28.
[48] STANTON A L, KIRK S B, CAMERON C L, et al. Coping through emotional approach:scale construction and validation[J]. Journal of personality & social psychology, 2000, 78(6):1150-69.
[49] 王建亚.个人云存储用户采纳行为研究[M]. 北京:北京邮电大学出版社,2017:163,166.
[50] HAIR J F, RINGLE C M, SARSTEDT M. PLS-SEM:indeed a silver bullet[J]. Journal of marketing theory & practice, 2011, 19(2):139-152.
文章导航

/