[1] CHEN D, ZHAO H. Data security and privacy protection issues in cloud computing[C]//ICCSEE'12 proceedings of the 2012 international conference on computer science and electronics engineering. Washington, DC:IEEE Computer Society, 2012:647-651.
[2] PEARSON S. Taking account of privacy when designing cloud computing services[C]//Proceedings of the 2009 ICSE workshop on software engineering challenges of cloud computing. Washington, DC:IEEE Computer Society, 2009:44-52.
[3] SMITH H J, DINEV T, XU H. Information privacy research:an interdisciplinary review[J]. MIS quarterly, 2011, 35(4):989-1016.
[4] Risk Based Security. Data breach quickview 2016[EB/OL].[2018-10-30] https://pages.riskbasedsecurity.com/2016-ye-breach-quickview.
[5] GIGYA. The 2017 state of consumer privacy and trust[EB/OL].[2018-10-30] http://www.199it.com/wp-content/uploads/2017/05/201704-Gigya-DS-Privacy_Survey_Report-web.pdf.
[6] 郭敏. 2018年凯度中国社交媒体影响报告[EB/OL].[2019-03-06] https://cn.kantar.com/媒体动态/社交/2018/2018年凯度中国社交媒体影响报告/.
[7] ANDERSON B B, VANCE A, KIRWAN C B, et al. From warning to wallpaper:why the brain habituates to security warnings and what can be done about it[J]. Journal of management information systems, 2016, 33(3):713-743.
[8] JUHEE K, ERIC J.The market effect of healthcare security:do patients care about data breaches?[EB/OL].[2018-10-30].https://www.econinfosec.org/archive/weis2015/papers/WEIS_2015_kwon.pdf.
[9] KEITH M J, MAYNES C, LOWRY P B, et al. Privacy fatigue:the effect of privacy control complexity on consumer electronic information disclosure[C]//International Conference on Information Systems (ICIS 2014). Auckland:Social Science Electronic Publishing, 2014.
[10] SON J Y, KIM S S. Internet users' information privacy-protective responses:a taxonomy and a nomological model[J]. Mis quarterly, 2008, 32(3):503-529.
[11] CARVER C S, SCHEIER M F, WEINTRAUB J K. Assessing coping strategies:a theoretically based approach[J]. Journal of personality and social psychol, 1989, 56(2):267-283.
[12] KAHN W A. Psychological conditions of personal engagement and disengagement at work[J]. Academy of management journal, 1990, 33(4):692-724.
[13] CHOI H, PARK J, JUNG Y. The role of privacy fatigue in online privacy behavior[J]. Computers in human behavior, 2018, 81(4):42-51.
[14] BIEN D O, TORRES A M. Social networking and online privacy:Facebook users' perceptions[J]. Irish journal of management, 2012, 31(2):63-97.
[15] PEMPEK T A, YERMOLAYEVA Y A, Calvert S L. College students' social networking experiences on Facebook[J]. Journal of applied developmental psychology, 2009, 30(3):227-238.
[16] PREIBUSCH S, KROL K, BERESFORD A R. The privacy economics of voluntary over-disclosure in web forms[M]//RAINER B. The economics of information security and privacy. Berlin:Springer, 2013.
[17] XU H, DINEV T, SMITH H J, et al. Information privacy concerns:linking individual perceptions with institutional privacy assurances[J]. Journal of the Association for Information Systems, 2011, 12(12):798-824.
[18] BANDURA A. Self-efficacy:toward a unifying theory of behavioral change[J]. Advances in behaviour research & therapy, 1977, 1(4):139-161.
[19] RIFON N J, LAROSE R, CHOI S M. Your privacy is sealed:effects of web privacy seals on trust and personal disclosures[J]. Journal of consumer affairs, 2005, 39(2):339-362.
[20] RHEE H S, KIM C, RYU Y U. Self-efficacy in information security:Its influence on end users' information security practice behavior[J]. Computers & Security, 2009, 28(8):816-826.
[21] LEE H H, HILL J T. Moderating effect of privacy self-efficacy on location-based mobile marketing[J]. International journal of mobile communications, 2013, 11(4):330-350.
[22] LAROSE R, RIFON N J. Promoting i-safety:effects of privacy warnings and privacy seals on risk assessment and online privacy behavior[J]. Journal of consumer affairs, 2007, 41(1):127-149.
[23] BANDURA A. Social foundations of thought and action:a social cognitive theory[M]. Englewood Cliffs:Prentice-Hall, 1986.
[24] SUNG H N, JEONG D Y, JEONG Y S, et al. The relationship among self-efficacy, social influence,performance expectancy, effort expectancy, and behavioral intention in mobile learning service[J]. International journal of u-and e-service, science and technology, 2015, 8(1):1-8.
[25] ZHU Y Q, CHEN L Y, CHEN H G, et al. How does Internet information seeking help academic performance? The moderating and mediating roles of academic self-efficacy[J]. Computers & education, 2011, 57(4):2476-2484.
[26] LANE J, LANE A M, KYPRIANOU A. Self-efficacy, self-esteem and their impact on academic performance[J]. Social behavior & personality an international journal, 2004, 32(3):247-256.
[27] YOUN S. Determinants of online privacy concern and its influence on privacy protection behaviors among young adolescents[J]. Journal of consumer affairs, 2009, 43(3):389-418.
[28] ROTTER J B. Generalized expectancies for internal versus external control of reinforcement.[J]. Psychol monogr, 1965, 80(1):1-28.
[29] WEINER B. An attributional theory of achievement motivation and emotion[J]. Psychological review, 1985, 92(4):548.
[30] THATCHER J B, ZIMMER J C, GUNDLACH M J, et al. Internal and external dimensions of computer self-efficacy:an empirical examination[J]. IEEE transactions on engineering management, 2008, 55(4):628-644.
[31] ZIMMERMAN B. Self-efficacy and educational development[M]//BANDURA A.Self-efficacy in changing societies. New York:Cambridge University Press, 1995:202-231.
[32] MARAKAS G M, JOHNSON R D, PALMER J W. A theoretical model of differential social attributions toward computing technology:when the metaphor becomes the model[J]. International journal of human-computer studies, 2000, 52(4):719-750.
[33] VOHS K D,BAUMEISTER R F,SCHMEICHEL B J, et al. Making choices impairs subsequent self-control:a limited-resource account of decision making, self-regulation, and active initiative[J]. Journal of personality and social psychology, 2008, 94(5):883-898.
[34] ACQUISTI A, TELANG R, FRIEDMAN A. Is there a cost to privacy breaches? An event study[C]//Twenty Seventh International Conference on Information Systems. Milwaukee:WI, 2006:1563-1580.
[35] LEVAV J, HEITMANN M, HERRMANN A, et al. Order in product customization decisions:evidence from field experiments[J]. Journal of political economy, 2010, 118(2):274-299.
[36] SCHERMER B W,CUSTERS B, SIMONE V D H. The crisis of consent:how stronger legal protection may lead to weaker consent in data protection[J]. Ethics and information technology, 2014, 16(2):171-182.
[37] 朱侯,张明鑫,路永和.社交媒体用户隐私政策阅读意愿实证研究[J].情报学报,2018,37(4):362-371.
[38] AX S, GREGG V H, JONES D.Coping and illness cognitions:chronic fatigue syndrome[J]. Clinical psychology review, 2001, 21(2):161-182.
[39] HOPSTAKEN J F,LINDEN D V D, BAKKER A B, et al. A multifaceted investigation of the link between mental fatigue and task disengagement[J]. Psychophysiology, 2015, 52(3):305-315.
[40] DEMEROUTI E, MOSTERT K, BAKKER A B. Burnout and work engagement:a thorough investigation of the independency of both constructs[J]. Journal of occupational health psychology, 2010, 15(3):209-222.
[41] BAKKER A, DEMEROUTI E, VERBEKE W. Using the job demands-resources model to predict burnout and performance[J]. Human resource management, 2004, 43(1):83-104.
[42] IGBARIA M, ⅡVARI J. The effects of self-efficacy on computer usage[J]. Omega, 1995, 23(6):587-605.
[43] COMPEAU D, HIGGINS C A, HUFF S. Social cognitive theory and individual reactions to computing technology:a longitudinal study[J]. MIS quarterly, 1999, 23(2):145-158.
[44] 陈昊,李文立.基于情绪中介的信息安全保护行为研究[J].科研管理,2018,39(6):48-56.
[45] MORIN L, LATHAM G. The effect of mental practice and goal setting as a transfer of training intervention on supervisors' self-efficacy and communication skills:an exploratory study[J]. Applied psychology, 2000, 49(49):566-578.
[46] SCHAEFERS K G, EPPERSON D L, NAUTA M M. Women's career development:can theoretically derived variables predict persistence in engineering majors?[J]. Journal of counseling psychology, 1997, 44(2):173-183.
[47] BANDURA A, WOOD R. Effect of perceived controllability and performance standards on self-regulation of complex decision making[J]. Journal of personality & social psychology, 1989, 56(5):805-814.
[48] JOHANSSON A C, BRINK E, CLIFFORDSON C, et al. The function of fatigue and illness perceptions as mediators between self-efficacy and health-related quality of life during the first year after surgery in persons treated for colorectal cancer[J]. Journal of clinical nursing, 2018,27(7):1537-1548.
[49] ZUCKERMAN M. Attribution of success and failure revisited:or the motivational bias is alive and well in attribution theory[J]. Journal of personality, 1979, 47(2):245-287.
[50] BANDURA A. Self-efficacy:the exercise of control[J]. Journal of cognitive psychotherapy, 1997, 13(2):158-166.
[51] CHO H, LEE J S, CHUNG S. Optimistic bias about online privacy risks:testing the moderating effects of perceived controllability and prior experience[J]. Computers in human behavior, 2010, 26(5):987-995.
[52] BAEK Y M, KIM E M, BAE Y. My privacy is okay, but theirs is endangered:why comparative optimism matters in online privacy concerns[J]. Computers in human behavior, 2014, 31(31):48-56.
[53] JR N K, DICKSON P R. How believing in ourselves increases risk taking:perceived self-efficacy and opportunity recognition[J]. Decision sciences, 1994, 25(3):385-400.
[54] MILNE G R, LABRECQUE L I, CROMER C. Toward an understanding of the online consumer's risky behavior and protection practices[J]. Journal of consumer affairs, 2009, 43(3):449-473.
[55] BARTH S, DE JONG M. The privacy paradox-investigating discrepancies between expressed privacy concerns and actual online behavior-a systematic literature review[J]. Telematics and informatics, 2017,34(7):1038-1058.
[56] KOKOLAKIS S. Privacy attitudes and privacy behaviour:a review of current research on the privacy paradox phenomenon[J]. Computers & security, 2017, 64(1):122-134.
[57] WarpPLS 5.0 User Manual[EB/OL].[2018-11-23]. http://cits.tamiu.edu/WarpPLS/UserManual_v_5_0.pdf.
[58] BARON R M, KENNY D A. The moderator-mediator variable distinction in social psychological research:conceptual, strategic, and statistical considerations[J]. Journal of personality and social psychology, 1986, 51(6):1173-1182.
[59] 李贺, 余璐, 许一明,等. 解释水平理论视角下的社交网络隐私悖论研究[J]. 情报学报, 2018, 37(1):1-13.
[60] STANTON B, THEOFANOS M F, PRETTYMAN S S, et al. Security fatigue[J]. IT professional, 2016, 18(5):26-32.
[61] MORRISON E W. Newcomer information seeking:exploring types, modes, sources, and outcome[J]. Academy of management journal, 1993, 36(3):557-589.
[62] 谢兴政,蔡念中,黄志铭,等.社交媒体用户隐私悖论行为影响因素初探[J].图书情报工作,2018,62(18):55-63.
[63] DINEV T, HART P. An extended privacy calculus model for e-commerce transactions[J]. Information systems research, 2006, 17(1):61-80.
[64] 李睿,张锐剑,李文立,等.移动互联网环境下的隐私泄露容忍度测度方法[J].管理评论,2016,28(7):102-111.
[65] ZHANG S, ZHAO L, LU Y, et al. Do you get tired of socializing? An empirical explanation of discontinuous usage behaviour in social network services[J]. Information & management, 2016:53(7):904-914.
[66] 曾伏娥,邹周,陶然.个性化营销一定会引发隐私担忧吗:基于拟人化沟通的视角[J].南开管理评论,2018,21(5):83-92.
[67] 沈洪洲,汤雪婷,周莹.我国移动社会化媒体隐私保护功能的可用性研究[J].图书情报工作,2017,61(4):23-30.
[68] SPOKANE A R, MEIR E I, CATALANO M. Person-Environment congruence and Holland's theory:a review and reconsideration[J]. Journal of vocational behavior, 2000, 57(2):137-187.
[69] WEINER B. Human motivation[M]. New York:Springer, 1985.
[70] CHEN I S. Computer self-efficacy, learning performance, and the mediating role of learning engagement[J]. Computers in human behavior, 2017, 72(7):362-370.