期刊文献+

图书馆大数据服务环境下用户隐私泄露容忍度的实证研究 被引量:22

Empirical Study on Library Users' Privacy Leakage Tolerance under the Background of Library Big Data Service
下载PDF
导出
摘要 科学评估用户隐私泄露容忍度,合理量化可控范围,可为图书馆大数据服务的信息处理和隐私保护提供理论指导和测量工具。文章通过问卷调查,从信息类型敏感性、信息接收敏感性和信息使用敏感性三个维度调查用户隐私泄露容忍度的现状、特点以及影响因素。研究表明,图书馆用户隐私泄露容忍度总体水平偏低,存在显著个体差异,受到年龄、职业等人口统计学因素的显著影响。图书馆应提高大数据服务质量,保障用户合法权益。 Library should scientifically evaluate the users'privacy leakage tolerance and reasonably quantify the controllable range of the users'privacy leakage in order to provide theoretical guidance and a measurement tool for the information processing and privacy protection during library big data service. Through questionnaire survey, this paper investigates the users'privacy leakage tolerance from three dimensions, namely information style sensitivity, information collection sensitivity and information usage sensitivity, and studies empirically the current situation, characteristics and influential factors of privacy leakage tolerance. The result shows that library users' privacy leakage tolerance is overall at a moderately low level, existing significant individual difference and being influenced by demographic factors. Library should improve the quality of big data service and protect users' legitimate interest from five aspects.
作者 易红 任竞
机构地区 重庆图书馆
出处 《图书馆论坛》 CSSCI 北大核心 2016年第4期57-64,共8页 Library Tribune
基金 2015年度国家文化科技提升计划项目"公共文化服务类大数据分析试验系统与应用示范"研究成果之一
关键词 大数据 图书馆 隐私泄露 容忍度 big data library privacy leakage tolerance
  • 相关文献

参考文献4

二级参考文献43

  • 1中国互联网络研究中心网站[EB/OL].[2012-01-02].http://www.cnnic.cn/research/zx/ydhlw/.
  • 2DeLone W H, McLean E R. The DeLene and McLean model of in- formation systems success : A ten-year update [ J ]. Journal of Man- agement Information Systems, 2003,20 ( 3 ) :9 - 30.
  • 3Turel O, Serenko A, Detlo b, et al. Investigating the detenninants of satisfaction and usage of mobile IT services in four countries [ J ]. Journal of Global Information Technology Management, 2006, 9 (4) :6 -29.
  • 4DeLone W H, McLean E R. Information systems success revisited [ EB/OL]. [2012 -01 -02]. http://citeseerx, ist. psu. edu/view- doc/summary? doi = 10.1.1.88. 3031.
  • 5Thompson S H T, Shivastava S C, Li Jiang. Trust and electronic government success: An empirical study [ J ]. Journal of Manage- ment Information Systems, 2008,25 ( 12 ) :99 - 131.
  • 6Strader T, Houle P, Ramaswami S. Spam, spim, and user perception of e-mail and instant messaging usefulness [ J ]. International Joumal of E-business Research, 2005,16 (4) :51 - 57.
  • 7Swartz J. Spam' s irritating cousin, spim, on the loose[ J]. Inter- national Journal of E-business Research, 2004,12 ( 4 ) : 183 - 202.
  • 8Seddon P B. A respecification and extension of the DeLone and McLean model of IS success [ J ]. Information Systems Research, 1997,17 (3) :240 - 253.
  • 9Zhang Dongsong. Delivery of personalized and adaptive content to mobile devices : A framework and enabling technology [ J ]. Com- munications of the Association for Information Systems, 2003,12 (2) :183 -202.
  • 10Chellappa R K, Sin R G. Personalization versus privacy: An empir- ical examination of the online consumer' s dilemma [ J ]. Informa- tion Technology and Management, 2005,18 (6) : 181 - 202.

同被引文献246

引证文献22

二级引证文献141

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部