泄露他人隐私行为意向的影响要素研究

吴娜, 李文立, 吕欣, 柯育龙

科研管理 ›› 2015, Vol. 36 ›› Issue (11) : 139-147.

科研管理 ›› 2015, Vol. 36 ›› Issue (11) : 139-147.
论文

泄露他人隐私行为意向的影响要素研究

  • 吴娜, 李文立, 吕欣, 柯育龙
作者信息 +

An empirical study of the influencing factors of the intention in leaking the privacy of others

  • Wu Na, Li Wenli, Lv Xin, Ke Yulong
Author information +
文章历史 +

摘要

互联网的发展为人们的生活带来巨大便利,但也带来了隐私安全隐患,通过互联网渠道泄露他人隐私的现象已经引起社会的高度关注。基于犯罪学领域的中和技术理论,分析了否认责任、否认伤害、否认受害者、更高层次效忠、避免更多的伤害和隐私意识对泄露他人隐私行为发生意向的影响,构建了互联网环境下泄露他人隐私意向的研究模型。以人肉搜索这一典型例子进行场景设计,通过问卷调查,收集759份有效问卷,采用SmartPLS2.0软件进行结构方程检验。实证结果表明否认责任、否认受害者和避免更多伤害三类中和技术正向影响泄露他人隐私行为的意向,否认伤害和更高层次效忠技术对泄露他人隐私意向没有显著影响。另外,增强个人隐私意识能有效削弱泄露他人隐私行为的意向。本研究结果有助于了解隐私泄露者的行为动机,为规范互联网用户上网行径和制定隐私保护政策提供借鉴。

Abstract

The development of the Internet has brought great convenience to citizens' lives, but also caused a series of privacy security problems. The netizens' leakage of other's privacy is a major concern for information security government. In efforts to understand this problem, we employed the neutralization theory, a theory prominent in criminology but not yet applied in the context of privacy leakage. It offers new insight into how netizens rationalize their leakage behaviors. Choosing the human flesh search as a typical example of our research object, we proposed a research model to test the influence factors of the intention to leak other' privacy under the Internet. Using data from a sample of 759 valid questionnaires, the relevance of neutralization theory was tested via SmartPLS2.0. The findings indicated that the techniques associated with denial of responsibility, denial of victim, and avoidance of greater harm positively influenced the intention of leaking other's privacy, the technologies of denial of injury and appeal to higher loyalties had no significant effect on the intention. Furthermore, enhancing personal privacy awareness can effectively weaken the behavior intention to disclose the privacy of others. Our empirical results highlight neutralization and privacy awareness as important factors to take into account with regard to developing and implementing netizens' behavior policies and practices.

关键词

泄露他人隐私行为 / 中和技术理论 / 隐私意识 / 人肉搜索

Key words

leak the privacy of others / neutralization theory / privacy awareness / human flesh search

引用本文

导出引用
吴娜, 李文立, 吕欣, 柯育龙. 泄露他人隐私行为意向的影响要素研究[J]. 科研管理. 2015, 36(11): 139-147
Wu Na, Li Wenli, Lv Xin, Ke Yulong. An empirical study of the influencing factors of the intention in leaking the privacy of others[J]. Science Research Management. 2015, 36(11): 139-147
中图分类号: C939   

参考文献

[1]瑞星网.瑞星2012年中国信息安全综合报告[DB/OL]. http://www.rising.com.cn/about/news/rising/2013-01-15/13051.html. 2012.Rising.Chinese information security comprehensive report in 2012[DB/OL]. http://www.rising.com.cn/about/news/rising/2013-01-15/13051.html. 2012. [2] Chao C H, Tao Y H. Human flesh search:A supplemental review[J]. Cyberpsychology, Behavior, and Social Networking. 2012, 15(7):350-356. [3] Phelps J E, D'Souza G, Nowak G J. Antecedents and consequences of consumer privacy concerns:An empirical investigation[J]. Journal of Interactive Marketing. 2001, 15(4):2-17. [4] Li Y. Theories in online information privacy research:A critical review and an integrated framework[J]. Decision Support Systems. 2012, 54(1):471-481. [5] Moon Y. Intimate exchanges:Using computers to elicit self-disclosure from consumers[J]. Journal of Consumer Research. 2000, 26(4):323-339. [6]王洪伟,周曼,何绍义.影响个人在线提供隐私信息意愿的实证研究[J].系统工程理论与实践. 2012, 32(10):2186-2197.Wang H W,Zhou M,He S Y. Empirical research of individual's intention to provide privacy information online[J].Sytems engineering-theory and practice. 2012, 32(10):2186-2197. [7] Special W P, Li-Barber K T. Self-disclosure and student satisfaction with facebook[J]. Computers in Human Behavior. 2011. [8] Sykes G M, Matza D. Techniques of neutralization:A theory of delinquency[J]. American Sociological Review. 1957, 22(6):664-670. [9] Garrett D E, Bradford J L, Meyers R A, et al. Issues management and organizational accounts:An analysis of corporate responses to accusations of unethical business practices[J]. Journal of Business Ethics. 1989, 8(7):507-520. [10] Eliason S L, Dodder R A. Techniques of neutralization used by deer poachers in the western united states:A research note[J]. Deviant Behavior. 1999, 20(3):233-252. [11] Priest T B, Mcgrath Iii J H. Techniques of neutralization:Young adult marijuana smokers[J]. Criminology. 1970, 8(2):185-194. [12] Thurman Q C, John C S, Riggs L. Neutralization and tax evasion:How effective would a moral appeal be in improving compliance to tax laws?[J]. Law & Policy. 1984, 6(3):309-327. [13] Pershing J L. To snitch or not to snitch? Applying the concept of neutralization techniques to the enforcement of occupational misconduct[J]. Sociological Perspectives. 2003, 46(2):149-178. [14] Harrington S J. The effect of codes of ethics and personal denial of responsibility on computer abuse judgments and intentions[J]. MIS Quarterly. 1996:257-278. [15] Lim V K G. The IT way of loafing on the job:Cyberloafing, neutralizing and organizational justice[J]. Journal of Organizational Behavior. 2002, 23(5):675-694. [16] Harris L C, Dumas A. Online consumer misbehaviour:An application of neutralization theory[J]. Marketing Theory. 2009, 9(4):379-402. [17] Siponen M, Vance A. Neutralization:New insights into the problem of employee information systems security policy violations[J]. MIS Quarterly. 2010, 34(3):487. [18] Mccabe D L. The influence of situational ethics on cheating among college students[J]. Sociological Inquiry. 1992, 62(3):365-374. [19]雍自元.犯罪心理的解析与启示——以许霆案为例[J].安徽师范大学学报(人文社会科学版). 2008, 36(5).Yong Z Y. Parsing and revelations of the criminal mentality-xu ting case as an example. Journal of Anhui Normal University(Humanities and Social Sciences). 2008, 36(5). [20] Choi N, Kim D, Goo J, et al. Knowing is doing:An empirical validation of the relationship between managerial information security awareness and action[J]. Information Management & Computer Security. 2008, 16(5):484-501. [21] Tsohou A, Kokolakis S, Karyda M, et al. Investigating information security awareness:Research and practice gaps[J]. Information Security Journal:A Global Perspective. 2008, 17(5-6):207-227. [22] Bulgurcu B, Cavusoglu H, Benbasat I. Information security policy compliance:An empirical study of rationality-based beliefs and information security awareness.[J]. MIS Quarterly. 2010, 34(3). [23] Goodhue D L, Straub D W. Security concerns of system users:A study of perceptions of the adequacy of security[J]. Information & Management. 1991, 20(1):13-27. [24] Siponen M T. Five dimensions of information security awareness[J]. Computers and Society. 2001, 31(2):24-29. [25] Kumar N, Mohan K, Holowczak R. Locking the door but leaving the computer vulnerable:Factors inhibiting home users' adoption of software firewalls[J]. Decision Support Systems. 2008, 46(1):254-264. [26] Phelps J, Nowak G, Ferrell E. Privacy concerns and consumer willingness to provide personal information[J]. Journal of Public Policy & Marketing. 2000:27-41. [27] P tzsch S. Privacy awareness:A means to solve the privacy paradox?[M]. The Future of Identity in the Information Society, Springer, 2009, 226-236. [28] Dinev T, Hu Q. The centrality of awareness in the formation of user behavioral intention toward protective information technologies.[J]. Journal of the Association for Information Systems. 2007, 8(7). [29] Ingram J R, Hinduja S. Neutralizing music piracy:An empirical examination[J]. Deviant Behavior. 2008, 29(4):334-366.

基金

国家自然科学基金项目:员工信息安全违规意愿的社会控制要素及实证研究(项目编号:71272092,起止时间:2013.3.1-至今)。


Accesses

Citation

Detail

段落导航
相关文章

/