[1] YAHIA I B, AL-NEAMA N, KERBACHE L. Investigating the drivers for social commerce in social media platforms: importance of trust, social support and the platform perceived usage[J]. Journal of retailing and consumer services,2018,41:11-19.
[2] 曾伏娥, 邹周, 陶然. 个性化营销一定会引发隐私担忧吗: 基于拟人化沟通的视角[J].南开管理评论,2018,21(5):83-92.
[3] 赵红, 孙倬, 张莎, 等. 基于文献计量分析的社交商务研究脉络与热点演化[J].管理学报,2019,16(6): 923-931.
[4] TONG S, LUO X, XU B. Personalized mobile marketing strategies[J]. Journal of the Academy of Marketing Science,2020,48(1):64-78.
[5] BéLANGER F, CROSSLER R E. Privacy in the digital age: a review of information privacy research in information systems[J]. MIS quarterly,2011,35(4):1017-1042.
[6] PEW R C. Privacy and information sharing [EB/OL]. [2022-01-14]. https://www.pewresearch.org/internet/2016/01/14/privacy-and-information-sharing/.
[7] ACQUISTI A, BRANDIMARTE L, LOEWENSTEIN G. Privacy and human behavior in the age of information[J]. Science,2015,347(6221):509-514.
[8] DINEV T, HART P. An extended privacy calculus model for e-commerce transactions[J]. Information systems research,2006,17(1):61-80.
[9] 李贺, 余璐, 许一明, 等.解释水平理论视角下的社交网络隐私悖论研究[J].情报学报,2018, 37(1):1-13.
[10] LIAO G, CHEN X, HUANG J. Prospect theoretic analysis of privacy-preserving mechanism[J]. IEEE/ACM transactions on networking,2019,28(1):71-83.
[11] BARTH S, DE JONG M D. The privacy paradox-investigating discrepancies between expressed privacy concerns and actual online behavior-a systematic literature review[J]. Telematics and informatics,2017, 34(7):1038-1058.
[12] LI Y. Theories in online information privacy research: a critical review and an integrated framework[J]. Decision support systems,2012,54(1):471-481.
[13] LAUFER R S, WOLFE M. Privacy as a concept and a social issue: a multidimensional developmental theory[J]. Journal of social issues,1977,33(3):22-42.
[14] SMITH H J, DINEV T, XU H. Information privacy research: an interdisciplinary review[J]. MIS quarterly, 2011,35(4):989-1015.
[15] KOLOTYLO-KULKARNI M, XIA W, DHILLON G. Information disclosure in e-commerce: a systematic review and agenda for future research[J]. Journal of business research,2021,126:221-238
[16] AWAD N F, KRISHNAN M S. The personalization privacy paradox: an empirical evaluation of information transparency and the willingness to be profiled online for personalization[J]. MIS quarterly, 2006,30(1):13-28.
[17] BANSAL G, GEFEN D. The impact of personal dispositions on information sensitivity, privacy concern and trust in disclosing health information online[J]. Decision support systems,2010,49(2): 138-150.
[18] ROGERS R W. A protection motivation theory of fear appeals and attitude change1[J]. The journal of psychology,1975,91(1):93-114.
[19] FLOYD D L, PRENTICE-DUNN S, ROGERS R W. A meta‐analysis of research on protection motivation theory[J]. Journal of applied social psychology,2000,30(2):407-429.
[20] TANNER JR J F, HUNT J B, EPPRIGHT D R. The protection motivation model: a normative model of fear appeals[J]. Journal of marketing,1991,55(3):36-45.
[21] MADDUX J E, ROGERS R W. Protection motivation and self-efficacy: a revised theory of fear appeals and attitude change[J]. Journal of experimental social psychology,1983,19(5):469-479.
[22] JUNGLAS I A, JOHNSON N A, SPITZMüLLER C. Personality traits and concern for privacy: an empirical study in the context of location-based services[J]. European journal of information systems, 2008,17(4):387-402.
[23] CHAI S, BAGCHI-SEN S, MORRELL C, et al. Internet and online information privacy: an exploratory study of preteens and early teens[J]. IEEE transactions on professional communication, 2009,52(2):167-182.
[24] ZHANG L, MCDOWELL W C. Am I really at risk? Determinants of online users’ intentions to use strong passwords[J]. Journal of Internet commerce,2009,8(3/4):180-197.
[25] HROMATKO I, TONKOVIC' M, VRANIC A. Trust in science, perceived vulnerability to disease, and adherence to pharmacological and non-pharmacological COVID-19 recommendations[J]. Frontiers in psychology,2021,12:664554.
[26] WANG Y, HERRANDO C. Does privacy assurance on social commerce sites matter to millennials?[J]. International journal of information management,2019,44:164-177.
[27] BRADLEY G L, BABUTSIDZE Z, CHAI A, et al. The role of climate change risk perception, response efficacy, and psychological adaptation in pro-environmental behavior: a two nation study[J]. Journal of environmental psychology,2020,68:101410.
[28] MOUSAVI R, CHEN R, KIM D J, et al. Effectiveness of privacy assurance mechanisms in users’ privacy protection on social networking sites from the perspective of protection motivation theory[J]. Decision support systems,2020,135:113323.
[29] XU H, DINEV T, SMITH J, et al. Information privacy concerns: linking individual perceptions with institutional privacy assurances[J]. Journal of the Association for Information Systems, 2011, 12(12): 798-824.
[30] FOLKMAN S, LAZARUS R S. If it changes it must be a process: study of emotion and coping during three stages of a college examination[J]. Journal of personality and social psychology, 1985, 48(1): 150-170.
[31] LUHMANN M, FASSBENDER I, ALCOCK M, et al. A dimensional taxonomy of perceived characteristics of major life events[J]. Journal of personality and social psychology, 2021, 121(3): 633-668.
[32] IOANNOU A, TUSSYADIAH I, MARSHAN A. Dispositional mindfulness as an antecedent of privacy concerns: a protection motivation theory perspective[J]. Psychology & marketing,2021,38(10): 1766-1778.
[33] CHEN M F. To combine or not to combine? Applying protection motivation theory and the theory of reasoned action to explain and predict intention to reduce meat consumption[J]. Journal of applied social psychology, 2022,52(2):115-130.
[34] RUAN W, KANG S, SONG H. Applying protection motivation theory to understand international tourists’ behavioural intentions under the threat of air pollution: a case of Beijing, China[J]. Current issues in tourism, 2020,23(16):2027-2041.
[35] 李海丹, 洪紫怡, 朱侯.隐私计算与公平理论视角下用户隐私披露行为机制研究[J].图书情报知识,2016(6):114-124.
[36] KIM D, PARK K, PARK Y, et al.Willingness to provide personal information: perspective of privacy calculus in IoT services[J].Computers in human behavior,2019,92:273-281.
[37] HANNA K, SARAH S, KSENIA K, et al.Online social networks: why we disclose[J].Journal of information technology (Palgrave Macmillan),2010,25(2):109-125.
[38] 续继, 王于鹤.数字经济中的隐私保护和数据共享——基于隐私顾虑与个人信息虚构的视角[J].统计研究,2022,39(2):48-63.
[39] 郭海玲, 马红雨, 许泽辉.社会化媒体用户信息披露意愿影响模型构建与实证——以微信用户为例[J].图书情报工作,2019,63(15):111-120.
[40] ROCHER L, HENDRICKX J M, DE MONTJOYE Y-A.Estimating the success of re-identifications in incomplete datasets using generative models[J].Nature communications,2019,10(1):1-9.
[41] 张伟.提高防范意识,信息安全需多方共治[EB/OL].[2022-04-11] http://www.cac.gov.cn/2015-01/12/c_1113965037.htm.
[42] 百度时代网络技术(北京)有限公司. 2020网络黑灰产犯罪研究报告[EB/OL]. [2022-03-13]. http://www.360doc.com/content/20/1105/22/40280294_944318675.shtml.
[43] WANG J, LIU-LASTRES B, RITCHIE B W, et al. Travellers’ self-protections against health risks: an application of the full Protection Motivation Theory[J]. Annals of tourism research,2019,78:102743.
[44] SHIN Y H, IM J, JUNG S E, et al. The theory of planned behavior and the norm activation model approach to consumer behavior regarding organic menus[J]. International journal of hospitality management, 2018,69: 21-29.
[45] VAN GOOL E, VAN OUYTSEL J, PONNET K, et al. To share or not to share? Adolescents’ self-disclosure about peer relationships on Facebook: an application of the Prototype Willingness Model[J]. Computers in human behavior,2015,44:230-239.
[46] KIM Y, ADLER M. Social scientists’ data sharing behaviors:investigating the roles of individual motivations, institutional pressures, and data repositories[J].International journal of information management,2015,35(4): 408-418.
[47] SAERI A K, OGILVIE C, LA MACCHIA S T, et al. Predicting Facebook users’ online privacy protection: risk, trust, norm focus theory, and the theory of planned behavior[J]. The journal of social psychology, 2014,154(4):352-369.
[48] KRAFT P, RISE J, SUTTON S, et al. Perceived difficulty in the theory of planned behaviour: perceived behavioural control or affective attitude? [J]. British journal of social psychology,2005, 44(3):479-496.
[49] 王洪伟, 周曼, 何绍义.影响个人在线提供隐私信息意愿的实证研究[J].系统工程理论与实践, 2012,32(10):2186-2197.
[50] 张晓丹, 龚艳萍, 张琴.网络嵌入对消费者团购意愿影响的实证研究[J].系统管理学报,2017, 26(4):624-637.
[51] AJZEN I. The theory of planned behavior[J]. Organizational behavior and human decision processes, 1991,50(2):179-211.
[52] XU H, TEO H-H, TAN B C, et al. The role of push-pull technology in privacy calculus: the case of location-based services[J]. Journal of management information systems,2009,26(3):135-174.
[53] ZHANG X, LIU S, CHEN X, et al. Health information privacy concerns, antecedents, and information disclosure intention in online health communities[J]. Information & management,2018,55(4):482-493.
[54] KAUSHIK K, JAIN N K, SINGH A K. Antecedents and outcomes of information privacy concerns: role of subjective norm and social presence[J]. Electronic commerce research and applications, 2018,32:57-68.
[55] CHENG X, HOU T, MOU J. Investigating perceived risks and benefits of information privacy disclosure in IT-enabled ride-sharing[J]. Information & management,2021,58(6):103450.
[56] WANG T, DUONG T D, CHEN C C. Intention to disclose personal information via mobile applications: a privacy calculus perspective[J]. International journal of information management,2016,36(4):531-542.
[57] PODSAKOFF P M, ORGAN D W. Self-reports in organizational research: problems and prospects[J]. Journal of management,1986,12(4):531-544.
[58] FULLER C M, SIMMERING M J, ATINC G, et al. Common methods variance detection in business research[J]. Journal of business research,2016,69(8):3192-3198.
[59] KIM H-Y. Statistical notes for clinical researchers: assessing normal distribution (2) using skewness and kurtosis[J]. Restorative dentistry & endodontics,2013,38(1):52-54.
[60] ACQUISTI A. Privacy in electronic commerce and the economics of immediate gratification[C]// Proceedings of the 5th ACM conference on electronic commerce. New York: Association for Computing Machinery, 2004:21-29.
[61] 管家娃, 张玥, 朱庆华, 等.国外社交网站隐私悖论问题研究综述与国内研究建议[J].图书情报工作,2016,60(22):126-134.