首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 31 毫秒
1.
《品牌》2015,(12):55-56
随着互联网的发展,企业和用户越来越重视用户的信息,如何提高用户的信息披露意愿对企业而言十分重要。通过对国内外用户隐私信息披露意愿相关文献分析和归纳,从用户特性、用户利益和用户感知三个角度研究影响用户隐私信息披露意愿的因素,从企业角度提出鼓励用户披露隐私信息的相关措施,并对未来的研究方向提出建议。  相似文献   

2.
在互联网迅猛发展的时代,我国对于未成年人网络隐私还缺少有效的手段进行保护.文章从立法模式、权利主体等方面分析了对未成年人网络隐私保护应该采取的法律措施,以期对我国未成年人的网络隐私保护能有所促进.  相似文献   

3.
<正>过度为他人操心和受他人影响的心理情绪,在心理学上称为"心理卷入程度过高"。它是指个人在心理上与环境信息的关联程度过高。例如,有人过分关心朋友,朋友遇到困难,他比朋友还忧心仲忡,朋友办事出现失误,他比朋友  相似文献   

4.
随着计算机网络技术高速发展,信息技术的应用越来越广泛,有效提升了组织信息化的程度,但是也给网络数据库系统带来安全威胁,保护隐私技术逐渐被人们多重视。加之网页都是通过浏览器显示出来,浏览器成为了被攻击的主要目标,因此加强浏览器防御措施即是保护个人用户隐私。本文介绍了采用账户形式给用户提供权限,并严密保护用户浏览历史,进而有效保护个人隐私。  相似文献   

5.
社交网络一经问世便响应无数,注册用户与访问量均占据了网络世界的一席重地.在科技与网络飞速发展的同时,社交网络正发挥着越发重要的作用,甚至逐渐替代了传统的交流与沟通方式.社交网络丰富了人们的生活,为人们的生活提供了更多地可能,而同时解决社交网络的隐私安全问题也刻不容缓.本文重点对社交网络中存在的隐私隐患与隐私保护问题进行思考.  相似文献   

6.
今天电子商务已经成为首选的商务媒介,世界正在走向通过电子商务完成日常工作和享受生活的时代。电子商务作为一个潜在资源汇集成的乐土,随着网上购物业务不断增长,潜在网络监视活动也随之将严重威胁到所有消费者的信息隐私安全,它让更多个人信息在网络数据流转过程中被泄露。在任何电子商务活动,所有个人信息应在可控制状态下,包括披露自己的隐私时也能控制信息的保护。本文讨论了在电子商务应用程序如何使用个人信息,以及如何更好的进行个人信息的隐私保护。  相似文献   

7.
8.
文章对电子商务中消费者隐私问题进行研究,从电子商务发展和消费者隐私之间的关系入手,在此基础上分析消费者隐私被侵犯的原因和具体表现,阐述在电子商务发展中消费者隐私保护的必要性,并针对这些问题提出相应对策。  相似文献   

9.
快递业中的隐私泄露问题备受关注,为了保护用户信息安全,隐私号开始试行和推广.然而,要消除信息披露的风险不能简单地依靠隐私号平台,还需要电商平台、快递公司与发货方等责任主体之间的互相协作.文章在回顾隐私号的产生与应用现状的基础上,分析了隐私号在信息保护过程中的弊端;针对这些问题,基于隐私号平台,分析了各主体的功能与权责划...  相似文献   

10.
王晖 《商场现代化》2008,(5):166-166
上世纪末,电子商务以空前的速度席卷全球,21世纪,电子商务将会以更加迅猛的速度取代传统的商务方式,而相关电子商务中的隐私问题则成为电子商务进一步发展的重要障碍之一。本文针对电子商务中隐私保护的问题进行叙述。  相似文献   

11.
Abstract

Concern about the privacy of online consumers is a global issue. Given the global nature of the Internet, companies planning and implementing e-commerce must understand the differences in privacy concerns of consumers in different cultures with different social/economic contexts to become effective in business. Motivated by this need, this study analyzes and compares the privacy concerns of online consumers in China and the United States, identifies major factors related to these concerns, and discusses the cultural/social/economic backgrounds of the related phenomena found in the study.  相似文献   

12.
13.
Privacy, the Workplace and the Internet   总被引:4,自引:0,他引:4  
This paper examines workplace surveillance and monitoring. It is argued that privacy is a moral right, and while such surveillance and monitoring can be justified in some circumstances, there is a presumption against the infringement of privacy. An account of privacy precedes consideration of various arguments frequently given for the surveillance and monitoring of employees, arguments which look at the benefits, or supposed benefits, to employees as well as to employers. The paper examines the general monitoring of work, and the monitoring of email, listservers and the World Wide Web. It is argued that many of the common justifications given for this surveillance and monitoring do not stand up to close scrutiny.  相似文献   

14.
Concerns with improper collection and usage of personal information by businesses or governments have been seen as critical to the success of the emerging electronic commerce. In this regard, computer professionals have the oversight responsibility for information privacy because they have the most extensive knowledge of their organization’s systems and programs, as well as an intimate understanding of the data. Thus, the competence of these professionals in ensuring sound practice of information privacy is of great importance to both researchers and practitioners. This research addresses the question of whether male computer professionals differ from their female counterparts in their self-regulatory efficacy to protect personal information privacy. A total of 103 male and 65 female subjects surveyed in Taiwan responded to a 10-item questionnaire that includes three measures: protection (protecting privacy information), non-distribution (not distributing privacy information to others), and non-acquisition (not acquiring privacy information). The findings show (1) significant gender differences exist in the subjects’ overall self-regulatory efficacy for information privacy, and, in particular, (2) that female subjects in this study exhibited a higher level of self-regulatory efficacy than males for the protection and non-acquisition of personal privacy information. The identification of the factorial structure of the self-regulatory efficacy concerning information privacy may contribute to future research directed to examining the links between privacy efficacy and psychological variables, such as ethical attitude, ethical intention, and self-esteem. Studies can also be extended to investigate how different cultural practices of morality and computer use in men and women may shape the different development patterns of privacy self-efficacy. Understanding the different cultural practices may then shed light on the social sources of privacy competence and the appropriate remedies that can be provided to improve the situation. Feng-Yang Kuo holds a B.S. degree in Management Science from Chiao-Tung University, Taiwan and a Ph.D.degree in Information Systems from University of Arizona. He was a faculty of Information Systems at University of Colorado at Denver from 1985 to 1997 and is currently an associate professor of Information Management in Sun Yat-Sen University, Taiwan. He has published articles in Communications of ACM, MIS Quarterly, Communications of AIS, Journal of Business Ethics, Information & Management, Journal of Systems and Software, Decision Support Systems, and Sun Yat-Sen Management Review. Among his current interests are information ethics, managerial cognition, and human-computer interfaces. Cathy S.Lin Professor Cathy S.Lin is an assistant professor of Information Management at National University of Kaohsiung, Taiwan. Her Ph.D.is in Management Information Systems from National Sun Yat-Sen University. She has published articles in the Information & Management, Journal of Information Management, and Sun Yat-Sen Management Review. Among her current interests are information ethics, ethical decision making, electronic commerce, and information management. Meng-Hsiang Hsu Professor Meng-Hsiang Hsu is a professor of information management at National Kaohsiung of First University of Science and Technology. His Ph.D. is in Management Information Systems from National Sun Yat-Sen University. He has published articles in the J. of Business Ethics, Behavior & information Technology, Decision Support System, and Industrial Management and Data Systems. Among his current interests are knowledge management, information ethics, strategic information systems, and electronic commerce.  相似文献   

15.
欧美金融隐私保护法律制度比较研究   总被引:3,自引:0,他引:3  
金融隐私权利作为一项重要的民事权利,日益受到世界关注.欧盟对金融隐私的综合保护模式,代表了世界最高的保护水平;美国对金融隐私的分业保护模式,具有很强的实用性.这两种保护模式分别与其特殊的保护理念、社会经济背景相适应,借鉴意义非常大.文章在比较分析这两种金融隐私保护模式的基础上,结合我国金融隐私保护的现状,提出具体的完善措施.  相似文献   

16.
In this research we apply the Theory of Planned Behavior (TPB) to study decisions related to information privacy protection. A TPB-based model was proposed to investigate whether organization-based self-esteem and perceived deindividuation can be employed to measure the strength of the perceived behavioral control construct. In addition, we examined if the addition of a causal path linking subjective norms to attitudes and another causal path linking organization-based self-esteem to subjective norms enhanced our research model's predicting power. Our study shows that information systems (IS) professionals' intentions to protect personal information privacy are influenced by their attitudes, subjective norms, perceived deindividuation, and organization-based self-esteem. It further shows that attitudes are influenced by subjective norms, which, in turn, are influenced by organization-based self-esteem.  相似文献   

17.
陈丽娜 《中国市场》2008,(28):91-92
随着电子商务各种安全技术的发展,网络交易安全成为电子商务发展的核心和关键因素,个人信息保护虽然已是电子商务中早已受到关注的话题,不过到目前为止,电子商务网站对消费者个人因素保护特别是网络隐私权的保护仍存在种种问题,这种状况已经成为电子商务发展的制约因素之一,为此在电子商务环境下如何对网络隐私权实施安全的有效保护,成为电子商务顺利发展的重要因素。  相似文献   

18.
电子商务的发展日新月异,但因为种种原因致使越来越多网络用户的个人信息被窃取、泄露、传播,个人生活安宁被扰乱,隐私权遭受侵害。就我国目前的立法情况来看,保护隐私权采取的是间接方式,保护力度很弱,保护范围很窄,与电子商务时代个人隐私权遭到频繁侵害的现状显得极不协调,受害人很难依据现行法律法规维护合法权益。本文通过剖析我国现行法律对隐私权保护的缺陷,提出从法律层面完善电子商务环境下隐私权保护制度的基本思路,以更好地促进电子商务行业的蓬勃发展。  相似文献   

19.
We investigate the antecedents behind online consumers' attempt to disguise their identities through fabrication. We first develop a general conceptual model that draws on two extant theoretical frameworks: (1) Laufer and Wolfe's Multidimensional Approach to Privacy, and (2) Ajzen's Theory of Planned Behavior (TPB) with Perceived Moral Obligation. Next we conduct an empirical study using SEM to test the portion of the conceptual model based on the TPB framework. Results demonstrate that Attitudes, Perceived Behavioral Control, and Perceived Moral Obligation are significant drivers of fabrication, while Subjective Norms are not. Anonymity, one of the unique characteristics of the Internet compared to in-store environments, likely contributed to the intention to fabricate information. In the concluding section we discuss the implications of our empirical results, industry self-regulation and public policy considerations, and how future research can draw upon the conceptual Laufer and Wolfe framework, particularly the calculus of behavior construct, to further enrich our understanding of fabrication behavior on the Internet.  相似文献   

20.
The Moral Intensity of Privacy: An Empirical Study of Webmaster' Attitudes   总被引:1,自引:0,他引:1  
Webmasters are a key moral agent in the issue of privacy. This study attempts to understand the factors underlying their attitudes about privacy based on the theory of moral intensity. Webmasters of high-traffic sites were invited via email to participate in a web-based survey. The results support the application of moral intensity to the domain of privacy and the population of webmasters – both outcomes and social norms have statistically significant main effects on attitudes. The results also suggest a reconfiguration of the dimensions of moral intensity. This is based on the observation that proximity to the organization has a negative main effect on attitudes, and it moderates the relationship between social norms and attitudes. The original theory of moral intensity did not acknowledge the possibility of this moderating role for proximity. These observations have important implications for future research and practice in the areas of privacy, moral intensity, and ethical decision making.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号