期刊文献+

网络用户的信息隐私边界及其敏感度等级研究 被引量:15

Research on Information Privacy Boundaries and Sensitivity of Net Users
下载PDF
导出
摘要 互联网下应用系统服务质量的提升与用户的信息隐私是一对矛盾,如何协调是信息系统一个热门的研究前沿.本文对这一领域中有关信息隐私的心理边界以及敏感度等级问题研究作了综述.主要有3个方面的内容:一是总结不同领域对隐私的定义;二是分析信息隐私与其相似概念的区别;三是从信息敏感度这一视角对信息隐私划分等级问题的研究. The contradiction between quality improvement of service (QoS) of Internet application sys tems and users' information privacy is one of the hottest topics in the information system research. It sum marizes the research on information privacy psychological boundaries and sensitivity in this field, and in cludes three main aspects as follows. Firstly, it presents a summary of the definition of privacy in differ ent fields; Secondly, it analyzes the difference between information privacy and similar concepts; Third ly, it classifies the level of user information privacy from the perspective of information sensitivity.
出处 《广东工业大学学报》 CAS 2013年第4期26-32,共7页 Journal of Guangdong University of Technology
基金 国家自然科学基金资助项目(70971027) 广东省哲学社会科学规划项目(GD10YGL09) 广东省普通高校人文社会科学重点研究项目(12ZS0112)
关键词 隐私 信息隐私 隐私态度 信息敏感度 隐私等级 privacy information privacy privacy attitudes information sensitivity privacy level
  • 相关文献

参考文献27

  • 1Smith H J, Dinev T, Xu H. Information privacy research: An interdisciplinary review [J]. MIS Quarterly, 2011,35 (4) : 989-1016.
  • 2Hui K, Teo H H, Lee S T. The value of privacy assurance: an exploratory field experiment [J]. MIS Quarterly, 2007,31 (1) : 19-33.
  • 3Belanger F, Crossler R E. Privacy in the digital age: a review of information privacy research in information systems [J]. MIS Quarterly, 2011,35(4): 1017-1042.
  • 4Warren S D, Brandeis L D. The right to privacy[J]. Harvard law review, 1890,4(5): 193-220.
  • 5阮智富,郭忠新.现代汉语大词典[G].上海:汉语大词典出版社.
  • 6张振亮.个人信息权及其民法保护[J].南京邮电大学学报(社会科学版),2007,9(1):41-46. 被引量:29
  • 7曹玉平.图书馆网络空间的个人数据与隐私权保护[J].情报理论与实践,2006,29(2):185-188. 被引量:15
  • 8胡凌.评“人肉搜索”第一案的三个初审判决[J].法律适用,2009(7):65-69. 被引量:9
  • 9Campbell J E, Carlson M. Panopticon. com: online surveillance and the commodification of privacy [J]. Journal of Broadcasting & Electronic Media, 2002 ,46( 4) :586-606.
  • 10Davies S G. Re-engineering the right to privacy: how privacy has been transformed from a right to a commodity [J]. Technology and privacy, 1997: MIT Press.

二级参考文献37

共引文献74

同被引文献170

  • 1黄沛,徐海兵.中、美、法三国消费者的信息敏感度比较分析[J].系统工程理论方法应用,2005,14(3):259-263. 被引量:8
  • 2李庆扬,王能超,易大义.数值分析[M].北京:清华大学出版社,2001.
  • 3石硕.社交网站用户隐私披露行为探究:隐私计算理论与TPB模型的整合[D].南京:南京大学,2011.
  • 4申卯兴,许进.求解线性规划的单纯形法的直接方法[J].计算机工程与应用,2007,43(30):94-96. 被引量:19
  • 5Goldreich O. Foundations of Cryptography : Volume 2, Bas- ic Applications [ M ]. Cambridge:England Cambridge uni- versity press,2009:332410.
  • 6Yao A C. Protocols for secure computations [ C ]//M Tho- rup :2013 IEEE 54th Annual Symposium on Foundations of Computer Science. Berkeley : IEEE Computer Society, 1982 : 160-164.
  • 7Goldreich O, Micali S, Wigderson A. How to play any men- tal game [ C ]// Alfred V A : Proceedings of the nineteenth annual ACM symposium on Theory of computing. New York :ACM, 1987:218-229.
  • 8Du W, Atallah M J. Privacy-preserving cooperative scientif- ic computations [ C ]//Smith G: Proceedings of the 14th IEEE Computer Security Foundations Workshop. Nova Sco- tia : IEEE Computer Society, 2001 : 0273-0273.
  • 9Paillier P. Public-key cryptosystems based on composite degree residuosity classes [ C ]// Jacques Stern : Advances in cryptology--EUROCRYPT' 99. Berlin: Springer Berlin Heidelberg, 1999:223-238.
  • 10Zhang Z H, Li J J, Jiang W, et al. A new anonymous au- thentication scheme for cloud computing[ C]// The 7th In- ternational Conference on Computer Science& Education, Melbourn: 2012 : 14-17.

引证文献15

二级引证文献98

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部