[1] 微博. 2017微博用户发展报告[EB/OL].[2018-02-10].http://www.chinaz.com/news/2017/1226/841664.shtml.
[2] 腾讯. 2017年微信数据报告[EB/OL].[2018-02-10].https://www.sohu.com/a/203437993_667510.
[3] BARNES S B. A privacy paradox:social networking in the United States[EB/OL].[2018-02-20].http://firstmonday.org/article/view/1394/1312#author.
[4] DIENLIN T, TREPTE S. Is the privacy paradox a relic of the past? an in-depth analysis of privacy attitudes and privacy behaviors[J]. European journal of social psychology, 2015, 45(3):285-297.
[5] TSAI J Y, EGELMAN S, CRANOR L, et al. The effect of online privacy information on purchasing behavior:an experimental study[J]. Information systems research, 2011, 22(2):254-268.
[6] MOSTELLER J, PODDAR A. To share and protect:using regulatory focus theory to examine the privacy paradox of consumers' social media engagement and online privacy protection behaviors[J]. Journal of interactive marketing, 2017, 39(1):27-38.
[7] 管家娃, 张玥, 朱庆华,等. 国外社交网站隐私悖论问题研究综述与国内研究建议[J]. 图书情报工作, 2016,60(22):126-134.
[8] 张玥, 朱庆华. 国外信息隐私研究述评[J]. 图书情报工作,2014,58(13):140-148.
[9] 薛可, 何佳, 余明阳. 社会化媒体中隐私悖论的影响因素研究[J]. 当代传播(汉文版), 2016(1):34-38.
[10] HIGGINS E T. Beyond pleasure and pain[J]. American psychologist, 1997, 52(12):1280-1300.
[11] HIGGINS E T. Making a good decision:value from fit[J]. American psychologist, 2000, 55(11):1217-1230.
[12] SMITH H J, DINEV T, XU H. Information privacy research:an interdisciplinary review[J]. MIS quarterly, 2011, 35(4):989-1016.
[13] MOURALI M, BÖCKENHOLT U, LAROCHE M. Compromise and attraction effects under prevention and promotion motivations[J]. Journal of consumer research, 2007, 34(2):234-247.
[14] BRODIE R J, ILIC A, JURIC B, et al. Consumer engagement in a virtual brand community:an exploratory analysis[J]. Journal of business research, 2013, 66(1):105-114.
[15] DOORN J V, LEMON K N, MITTAL V, et al. Customer engagement behavior:theoretical foundations and research directions[J]. Social science electronic publishing, 2010, 13(3):253-266.
[16] 张晓娟, 李贞贞. 基于社会认知理论的智能手机用户信息安全行为意愿研究[J]. 现代情报, 2017, 37(9):16-22.
[17] STEWART K A, SEGARS A H. An empirical examination of the concern for information privacy instrument[J]. Information systems research, 2002, 13(1):36-49.
[18] TAYLOR D G, LEWIN J E, STRUTTON D. Friends, fans, and followers:do ads work on social networks?:how gender and age shape receptivity[J]. Journal of advertising research, 2011, 51(1):258-275.
[19] SHEEHAN K B, HOY M G. Flaming, complaining, abstaining:how online users respond to privacy concerns[J]. Journal of advertising, 1999, 28(3):37-51.
[20] COOK K S, EMERSON R M. Power, equity and commitment in exchange networks[J]. American sociological review, 1978,43(5):721-739.
[21] ROTHBAUM F, WWEISZ J R, SNYDER S S. Changing the world and changing the self:a two-process model of perceived control[J]. Journal of personality and social psychology, 1982, 42(1):5-37.
[22] MORLING B, EVERED S. Secondary control reviewed and defined[J]. Psychological bulletin, 2006, 132(2):269-296.
[23] 杨沈龙, 郭永玉, 李静,等. 控制还是适应:次级控制研究的两种取向[J]. 心理科学进展, 2013, 21(5):857-866.
[24] HAJLI M. Information sharing on social networking sites:the role of perceived control of information and gender[C]//Proceedings of the eighth precis workshop on information security and privacy.Milano:AISel,2013:1-20.
[25] TSAI H Y S, JIANG M, ALHABASH S, et al. Understanding online safety behaviors:a protection motivation theory perspective[J]. Computers & security, 2016, 59(1):138-150.
[26] BANDURA A. Social learning theory of aggression[J]. Journal of communication, 1978, 28(3):12-29.
[27] PODDAR A, MOSTELLER J, ELLEN P S. Consumers' rules of engagement in online information exchanges[J]. Journal of consumer affairs, 2009, 43(3):419-448.
[28] BANSAL G, ZAHEDI F M. Trust violation and repair:the information privacy perspective[J]. Decision support systems, 2015, 71(1):62-77.
[29] MALHOTRA N K, KIM S S, AGARWAL J. Internet users' information privacy concerns (IUIPC):the construct, the scale, and a causal model[J]. Information systems research, 2004, 15(4):336-355.
[30] HOFSTEDE G. Culture's consequences:international differences in work-related values[M]. London:Sage, 1984.
[31] HALL E T. Beyond culture[M]. New Jersey:Anchor Books, 1989.
[32] JAMES T L, WALLACE L, WARKENTIN M, et al. Exposing others' information on online social networks (OSNs):perceived shared risk, its determinants, and its influence on OSN privacy control use[J]. Information & management, 2017, 54(7):851-865.
[33] PETRONIO S. Boundaries of privacy[M]. New York:State University of New York Press, 2002.
[34] ALTMAN I. Privacy regulation:culturally universal or culturally specific?[J]. Journal of social issues, 1977, 33(3):66-84.
[35] LAUFER R S, WOLFE M. Privacy as a concept and a social issue:a multidimensional developmental theory[J]. Journal of social Issues, 1977, 33(3):22-42.
[36] DINEV T, BELLOTTO M, HART P, et al. Privacy calculus model in e-commerce-a study of Italy and the United States[J]. European journal of information systems, 2006, 15(4):389-402.
[37] HSEE C K, WEBER E U. Cross-national differences in risk preference and lay predictions[J]. Journal of behavioral decision making,1999, 12(2):165-179.
[38] WARKENTIN M, CHARLES-PAUVERS B, CHAU P Y K. Cross-cultural IS research:perspectives from eastern and western traditions[J]. European journal of information systems, 2015, 24(3):229-233.
[39] XU H, TEO H H. Alleviating consumers' privacy concerns in location-based services:a psychological control perspective[C]//ICIS 2004 proceedings. Washington:AISel,2004:793-806.
[40] SMITH H J, MILBERG S J, BURKE S J. Information privacy:measuring individuals' concerns about organizational practices[J]. MIS quarterly, 1996, 20(2):167-196.
[41] ZHAO L, LU Y B, GUPTA S. Disclosure intention of location-related information in location-based social network services[J]. International journal of electronic commerce, 2012, 16(4):53-90.
[42] MCKNIGHT D H, CHOUDHURY V, KACMAR C. Developing and validating trust measures for e-commerce:an integrative typology[J]. Information systems research, 2002, 13(3):334-359.
[43] BROWN J D. Likert items and scales of measurement[J]. Statistics, 2011, 15(1):10-14.
[44] HAIR JR J F, BLACK W C, BABIN B J, et al. Multivariate data analysis, a global perspective[M]. New Jersey:Pearson education, 2010.
[45] FORNELL C, LARCKER D F. Evaluating structural equation models with unobservable variables and measurement error[J]. Journal of marketing research, 1981,18(1):39-50.
[46] KOLLAT J, FARACHE F. Achieving consumer trust on Twitter via CSR communication[J]. Journal of consumer marketing, 2017, 34(6):505-514.
[47] CHUNG Y W, MOON H K. The moderating effects of collectivistic orientation on psychological ownership and constructive deviant behavior[J]. International journal of business and management, 2011, 6(12):65-77.