期刊文献+

基于决策树选择模型的物联网隐私信息保护策略研究 被引量:1

Strategy of Privacy Information Protection for Internet of Things Based on the Choice Model of Decision-tree
下载PDF
导出
摘要 结合决策树分析模型和用户新技术采纳行为研究方法,通过情景模拟和现场培训,采用方便样本抽样调查,让被调查者对物联网背景下的个人隐私信息保护的5个策略:销毁标签、用户模式、机器模式、企业自律、法律限制进行选择,并分析了策略间的关系。结果表明,尽管了解到保留RFID标签能够带来很多益处,被调查者依然不相信自动的复杂信息保护方式,而是宁愿销毁标签。为此,建立良好的诚信机制和增加对消费者隐私信息保护的透明度是消除消费者心理障碍的重要措施。 Based on the decision search and with the simulation and tree analysis on-site tralmng, spondents choose the strategies of privacy protection new technology adoption of user's behavior rethis article makes the convenient sample of re- for internet of things, which include kill tags, user model, machine model, the enterprise self-discipline and legal restriction. Then it analyzes the relationship between different strategies. The main conclusion is that users would not trust complex privacy protecting technology as they are envisioned today. Instead, they prefer to kill RFID chips at store even if they appreciate after sales services. Therefore, constructing a credit mechanism and increasing the transparency of information to consumers' privacy is a good way to eliminate psychological harriers of consumers.
作者 吴亮 邵培基
出处 《管理学报》 CSSCI 2011年第12期1872-1878,共7页 Chinese Journal of Management
基金 国家自然科学基金资助项目(60971078) 贵州省科技厅联合基金资助项目(LISS200947)
关键词 决策树 物联网 隐私信息 信息保护策略 实证研究 decision-tree internet of things privacy information strategy of privacy protection empirical study
  • 相关文献

参考文献25

  • 1WESTIN A F. Privacy and Freedom [ M]. New York : Aspen Publishers, 1967.
  • 2POSNER R A. The Right of Privacy[J]. Georgia Law Review, 1978(12) :393-422.
  • 3SMITH H J, M1LBERG S J, BURKE S J. Information Privacy: Measuring Individuals'Concerns about Organizational Practices[J]. MIS Quarterly, 1996,20 (2) :167-196.
  • 4BYFORD K S. Privacy in Cyberspace:Constructing a Model of Privacy for the Electronic Communications Environment[J]. Rutgers Computer and Technology Law Journal, 1998,24(1) :1-74.
  • 5GEFEN D, KARAHANNA E, STRAUB D W. Trust and TAM Online Shopping: An Integrated Model[J]. MIS Quarterly,2003,27(3) :51-90.
  • 6MALHOTRA N K, KIM S S, AGARWAL J. Internet Users' Information Privacy Concerns: The Construct,the Scale,and a Causal Model[J]. Information System Research, 2004,15 (12) : 336-355.
  • 7SON J Y,KIM S S. Internet Users'Information Privacy-Protective Responses:A Taxonomy Nomological Model[J]. MIS Quarterly,2008,32(3) :503-529.
  • 8LI X B,SARKAR S. Privacy Protection in Data Min ing: A Perturbation Approach for Categorical Data [J]. Information Systems Research, 2006, 17 (3) :254-270.
  • 9魏明侠.感知隐私和感知安全对电子商务信用的影响研究[J].管理学报,2005,2(1):61-65. 被引量:16
  • 10杨姝,王刊良,王渊.网络创新背景下隐私关注与保护意图跨情境研究——以购物、招聘、游戏和搜索行业为例[J].管理学报,2009,6(9):1176-1181. 被引量:10

二级参考文献44

共引文献30

同被引文献12

  • 1波特 李明轩 邱如美译.《国家竞争优势》[M].华夏出版社,2002年1月版..
  • 2EpossExpertWorkshoplntemetOfl'hingsln2020 [ R ]. EPOSS. 2008.
  • 3工业和信息化部电信研究院:《物联网白皮书》2011年版.
  • 4http ://it. sohu. corn/20130116/n363658939, shtml.
  • 5http ://news. rfidworld, com. cn/2012_og/676a4ee61db59677, html.
  • 6http://www. beijingit, gov. en/xxh/hydt/201112/t20111207_20905, htm.
  • 7http ://www. doe88.com/p - 645586046792. html.
  • 8曾航:《长三角大战物联网,新兴产业是否坠人圈钱运动》,http://it.sohu.com/20100306/.
  • 9《重庆统计年鉴(2012)》.
  • 10张军杰,杨铸.我国物联网产业发展状况、影响因素及对策研究[J].科技管理研究,2011,31(13):26-29. 被引量:27

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部