[1] TREPTE S, SCHARKOW M, DIENLIN T. The privacy calculus contextualized:the influence of affordances[J]. Computers in human behavior, 2020, 104(3):106-115.
[2] 李伟娟,林升栋.社交媒体隐私侵犯后的信任修复机制探究[J].图书情报工作, 2021, 65(17):33-44.
[3] GUO J, LI N, WU Y, et al. Examining help requests on social networking sites:integrating privacy perception and privacy calculus perspectives[J]. Electronic commerce research and applications, 2020, 39:100828.
[4] JAMES T L, WALLACE L, WARKENTIN M, et al. Exposing others'information on online social networks (OSNs):perceived shared risk, its determinants, and its influence on OSN privacy control use[J]. Information & management, 2017, 54(7):851-865.
[5] KOOHIKAMALI M, PEAK D A, PRYBUTOK V R. Beyond self-disclosure:disclosure of information about others in social network sites[J]. Computers in human behavior, 2017, 69:29-42.
[6] THOMPSON N, BRINDLEY J. Who are you talking about?Contrasting determinants of online disclosure about self or others[J]. Information technology & people, 2020, 34(3):999-1017.
[7] BÉLANGER F, JAMES T L. A theory of multilevel information privacy management for the digital era[J]. Information systems research, 2020, 31(2):510-536.
[8] 池毛毛,王俊晶,王伟军.突发重大疫情下基层政府信任对公民信息不披露意愿的影响机制研究[J].情报学报, 2021, 40(6):666-678.
[9] CHOI C F, JIANG Z. Trading friendship for value:An investigation of collective privacy concerns in social application usage[C]//Proceedings of thirty fourth international conference on information systems. Milano:AIS Electronic Library, 2013:1-10.
[10] XU H. Reframing privacy 2.0 in online social network[J]. Journal of constitutional law, 2012, 14:1077-1102.
[11] DAVIS J F. Property rights to consumer information[J]. Journal of direct marketing, 1997, 11(3):32-43.
[12] LIPINSKI T A, BRITZ J. Rethinking the ownership of information in the 21st century:Ethical implications[J]. Ethics and information technology, 2000, 2(1):49-71.
[13] FANG X, BENAMATI J, LEDERER A L. Coping with rapid information technology change in different national cultures[J]. European journal of information systems, 2011, 20(5):560-573.
[14] LAZARUS R S, FOLKMAN S. Stress, appraisal, and coping[M]. New York:Springer, 1984.
[15] 张艳丰,刘亚丽,彭丽徽.硬规则下移动社交媒体用户隐私政策阅读感知测度实证研究[J].图书情报工作, 2021, 65(4):49-60.
[16] ELLISON N B, STEINFIELD C, LAMPE C. Connection strategies:social capital implications of Facebook-enabled communication practices[J]. New media & society, 2011, 13(6):873-892.
[17] BLOUSTEIN E J. Group privacy:the right to huddle[J]. Rutgers law journal, 1976(8):219-243.
[18] RAVINDRAN T, YEOW KUAN A C, HOE LIAN D G. Antecedents and effects of social network fatigue[J]. Journal of the Association for Information Science and Technology, 2014, 65(11):2306-2321.
[19] FURNELL S, THOMSON K L. Recognising and addressing'security fatigue'[J]. Computer fraud & security, 2009(11):7-11.
[20] 王珉,侯贵生,尤志珑.网络用户隐私疲劳的影响因素与行为选择研究——基于S-S-O理论与扎根理论[J].情报理论与实践, 2021, 44(9):149-154, 128.
[21] CHOI H, PARK J, JUNG Y. The role of privacy fatigue in online privacy behavior[J]. Computers in human behavior, 2018, 81(4):42-51.
[22] DHIR A, KAUR P, CHEN S, et al. Antecedents and consequences of social media fatigue[J]. International journal of information management, 2019, 48:193-202.
[23] KEITH M J, MAYNES C, LOWRY P B, et al. Privacy fatigue:the effect of privacy control complexity on consumer electronic information disclosure[J]. Social science electronic publishing, 2014, 7(4):14-17.
[24] HOPSTAKEN J F, VAN DER LINDEN D, BAKKER A B, et al. A multifaceted investigation of the link between mental fatigue and task disengagement[J]. Psychophysiology, 2015, 52(3):305-315.
[25] BARLETTE Y, JAOUEN A, BAILLETTE P. Bring Your Own Device (BYOD) as reversed IT adoption:insights into managers'coping strategies[J]. International journal of information management, 2021, 56:102-112.
[26] D'ARCY J, TEH P L. Predicting employee information security policy compliance on a daily basis:the interplay of securityrelated stress, emotions, and neutralization[J]. Information & management, 2019, 56(7):103-151.
[27] JOINSON A N, PAINE C B. Self-disclosure, privacy and the Internet[J]. The Oxford handbook of Internet psychology, 2007(5):237-252.
[28] DAVIS J F. Property rights to consumer information[J]. Journal of direct marketing, 1997, 11(3):32-43.
[29] 刘裕,周毅,农颜清.网络信息服务平台用户个人信息安全风险及其治理——基于117个APP隐私政策文本的内容分析[J].图书情报工作, 2022, 66(5):33-43.
[30] MILNE G R, BAHL S. Are there differences between consumers'and marketers'privacy expectations? a segment-and technologylevel analysis[J]. Journal of public policy & marketing, 2010, 29(1):138-149.
[31] GABISCH J A, MILNE G R. The impact of compensation on information ownership and privacy control[J]. Journal of consumer marketing, 2014, 31(1):13-26.
[32] TARAFDAR M, MAIER C, LAUMER S, et al. Explaining the link between technostress and technology addiction for social networking sites:a study of distraction as a coping behavior[J]. Information systems journal, 2020, 30(1):96-124.
[33] BONO J E, GLOMB T M, SHEN W, et al. Building positive resources:effects of positive events and positive reflection on work stress and health[J]. Academy of management journal, 2013, 56(6):1601-1627.
[34] GAUDIOSO F, TUREL O, GALIMBERTI C. The mediating roles of strain facets and coping strategies in translating technostressors into adverse job outcomes[J]. Computers in human behavior, 2017, 69(4):189-196.
[35] LIN S, LIN J, LUO X R, et al. Juxtaposed effect of social media overload on discontinuous usage intention:the perspective of stress coping strategies[J]. Information processing & management, 2021, 58(1):102-119.
[36] CHO H, LI P, GOH Z H. Privacy risks, emotions, and social media:a coping model of online privacy[J]. ACM transactions on computer-human interaction, 2020, 27(6):1-28.
[37] LI P, CHO H, GOH Z H. Unpacking the process of privacy management and self-disclosure from the perspectives of regulatory focus and privacy calculus[J]. Telematics and informatics, 2019, 41(8):114-125.
[38] XIAO L, MOU J. Social media fatigue-technological antecedents and the moderating roles of personality traits:the case of WeChat[J]. Computers in human behavior, 2019, 101:297-310.
[39] LUTZ C, HOFFMANN C P, RANZINI G. Data capitalism and the user:an exploration of privacy cynicism in Germany[J]. New media & society, 2020, 22(7):1168-1187.
[40] DINEV T, HART P.An extended privacy calculus model for e-commerce transactions[J]. Information systems research, 2006, 17(1):61-80.
[41] CONSTANT D, KIESLER S, SPROULL L. What's mine is ours, or is it?a study of attitudes about information sharing[J]. Information systems research, 1994, 5(4):400-421.
[42] CHO H, KNIJNENBURG B, KOBSA A, et al. Collective privacy management in social media:a cross-cultural validation[J]. ACM transactions on computer-human interaction (TOCHI), 2018, 25(3):1-33.
[43] TSAI H T, BAGOZZI R P. Contribution behavior in virtual communities:cognitive, emotional, and social influences[J]. MIS quarterly, 2014, 38(1):143-164.
[44] FORNELL C, LARCKER D F. Evaluating structural equation models with unobservable variables and measurement error[J]. Journal of marketing research, 1981, 18(1):39-50.
[45] HSU C L, LIN J C C. Acceptance of blog usage:the roles of technology acceptance, social influence and knowledge sharing motivation[J]. Information & management, 2008, 45(1):65-74.
[46] JIANG J J, KLEIN G, CARR C L. Measuring information system service quality:SERVQUAL from the other side[J]. MIS quarterly, 2002:145-166.
[47] PODSAKOFF P M, MACKENZIE S B, LEE J Y, et al. Common method biases in behavioral research:a critical review of the literature and recommended remedies[J]. Journal of applied psychology, 2003, 88(5):879-903.
[48] LIANG H, SARAF N, HU Q, et al. Assimilation of enterprise systems:the effect of institutional pressures and the mediating role of top management[J]. MIS quarterly, 2007, 31(1):59-87.