中文    English

Journal of Library and Information Science in Agriculture ›› 2024, Vol. 36 ›› Issue (4): 4-20.doi: 10.13998/j.cnki.issn1002-1248.24-0242

    Next Articles

Privacy Protection of Social Network Data: Traceability, Technology, Policy and Perspectives

YANG Ruixian1,2, LI Hangyi1, SUN Zhuo1,*   

  1. 1. Department of Information Management, Zhengzhou University, Zhengzhou 450001;
    2. Zhengzhou Data Science Research Center, Zhengzhou 450001
  • Received:2024-03-01 Online:2024-04-05 Published:2024-07-29

Abstract: [Purpose/Significance] The advent of the Internet and the subsequent evolution of new technologies and applications, such as big data and artificial intelligence, have spurred the exponential growth of a new generation of technologies. China has entered the era of data-driven digital intelligence, with social network data privacy protection playing a crucial role in the country's comprehensive security strategy. By studying the evolution of this field, we gain insights into how to protect personal information, foster the healthy development of social platforms, and facilitate the responsible circulation of data elements. Compared to previous studies, this paper offers a broader range of perspectives, exploring the main directions and roles of each element of privacy protection with the information ecology theory, and more comprehensive research content, and combining causes, technologies, management and metrics.We propose an ecological framework for social network data privacy protection, based on a thorough overview of the subject matter. This framework serves as a reference point for the evolving landscape of privacy protection practices. [Method/Process] This study uses two different approaches: literature review and content analysis. The former is utilized to identify and categorize literature related to CNKI and WOS, while the latter is employed to visually analyze and interpret this corpus using Citespace. This study provides a systematic review of data privacy protection in social networks in four dimensions: privacy protection triggers, privacy leakage, privacy protection technology, and privacy protection management. The review is based on the visualization and analysis of both Chinese and international literature. Furthermore, we present our perspective on information ecology, integrating analyses of research themes and limitations for each information topic. We also explore strategies to promote the sustainable and healthy development of behaviors related to data privacy protection in social networks. [Results/Conclusions] Interdisciplinary exchange on data privacy protection in social networks is essential to advance the digital intelligence era. Relying solely on isolated methods of privacy protection is insufficient in the face of an increasingly complex application environment and the trends towards digitalization and intelligence. It is therefore necessary to establish a comprehensive privacy protection system that integrates technical optimization, legal improvements, platform regulations, and user engagement. Specifically, from a technical perspective, it is essential to leverage a variety of technologies to develop solutions for privacy protection. From a legal perspective, there is a need to refine the content, standardize the adjudication process, and strengthen supervision and sanctions. At the platform level, optimizing the content of privacy policies and ensuring their effectiveness are crucial. Finally, at the user level, it is essential to raise awareness of privacy protection and to enhance privacy protection capabilities. Moreover, it is crutial to examine the inherent relationship between each entity and the methods of protection. A key limitation of this paper is the lack of an in-depth analysis of the interaction mechanisms between stakeholders within the ecological framework of social network data privacy protection. Future iterations will address this by incorporating a background on the complex information environment and conducting a more in-depth analysis of the interaction mechanisms.

Key words: social networks, data privacy, privacy breaches, privacy-protection technologies, privacy management, privacy metrics

CLC Number: 

  • G203
[1] 许一明, 李贺, 余璐. 隐私保护自我效能对社交网络用户隐私行为的影响研究[J]. 图书情报工作, 2019, 63(17): 128-136.
XU Y M, LI H, YU L.Research on the influence of self-efficacy of privacy protection on privacy behaviors of social network users[J]. Library and information service, 2019, 63(17): 128-136.
[2] 戢渼钧. 关于个性化信息服务的隐私保护[J]. 图书情报工作, 2006, 50(2): 49-51, 83.
JI M J.Privacy protection in the personalized information service[J]. Library and information service, 2006, 50(2): 49-51, 83.
[3] 黄如花, 李楠. 美国开放政府数据中的个人隐私保护研究[J]. 图书馆, 2017(6): 19-24, 76.
HUANG R H, LI N.Research on individual privacy protection under open government data in the U.S[J]. Library, 2017(6): 19-24, 76.
[4] 杜超楠, 袁勤俭, 岳泉. 我国隐私问题研究现状及热点主题分析——基于2004—2016年国家自然科学基金立项数据的研究[J]. 情报科学, 2018, 36(3): 99-104.
DU C N, YUAN Q J, YUE Q.Analysis of the current status and hot topics of privacy issues in China - Based on the projects of national natural science foundation of China from 2004 to 2016[J]. Informa-tion science, 2018, 36(3): 99-104.
[5] BATTISTA D, UVA G.Exploring the legal regulation of social media in Europe: A review of dynamics and challenges-current trends and future developments[J]. Sustainability, 2023, 15: 4144.
[6] CLARKE R.Internet privacy concerns confirm the case for intervention[J]. Communications of the ACM, 1999, 42(2): 60-67.
[7] BELANGER, CROSSLER.Privacy in the digital age: A review of information privacy research in information systems[J]. MIS quarterly, 2011, 35(4): 1017.
[8] WARREN S D, BRANDEIS L D. The right to privacy[J]. Harvard law review, 1890, 4(5): 193.
[9] 李效光, 李晖, 李凤华, 等. 差分隐私综述[J]. 信息安全学报, 2018, 3(5): 92-104.
LI X G, LI H, LI F H, et al.A survey on differential privacy[J]. Journal of cyber security, 2018, 3(5): 92-104.
[10] 蒋瀚, 刘怡然, 宋祥福, 等. 隐私保护机器学习的密码学方法[J]. 电子与信息学报, 2020, 42(5): 1068-1078.
JIANG H, LIU Y R, SONG X F, et al.Cryptographic approaches for privacy-preserving machine learning[J]. Journal of electronics & information technology, 2020, 42(5): 1068-1078.
[11] 王晰巍, 相甍甍, 张长亮, 等. 新媒体环境下信息隐私国内外研究动态及发展趋势[J]. 图书情报工作, 2017, 61(15): 6-14.
WANG X W, XIANG M M, ZHANG C L, et al.Research on the development trend of domestic and foreign information privacy under new media environment[J]. Library and information service, 2017, 61(15): 6-14.
[12] 侯海燕, 刘则渊, 陈悦, 等. 当代国际科学学研究热点演进趋势知识图谱[J]. 科研管理, 2006, 27(3): 90-96.
HOU H Y, LIU Z Y, CHEN Y, et al.Mapping of science studies: The trend of research fronts[J]. Science research management, 2006, 27(3): 90-96.
[13] BAO R X, CHEN Z K, OBAIDAT M S.Challenges and techniques in big data security and privacy: A review[J]. Security and privacy, 2018, 1(4): e13.
[14] BERTINO E.Big data security and privacy[C]//2016 IEEE International Conference on Big Data(Big Data). Piscataway, New Jersey: IEEE, 2016: 3.
[15] 胡文彬, 张宏宇, 王晨曦, 等. 社交网络中攻击背景下个人隐私泄露度量研究[J]. 南京大学学报(自然科学), 2021, 57(2): 289-298.
HU W B, ZHANG H Y, WANG C X, et al.Leakage metrics of personal privacy under attack background in social network[J]. Journal of Nanjing university (natural science), 2021, 57(2): 289-298.
[16] DIENLIN T, TREPTE S.Is the privacy paradox a relic of the past? An in-depth analysis of privacy attitudes and privacy behaviors[J]. European journal of social psychology, 2015, 45(3): 285-297.
[17] 金华, 朱靖宇, 王昌达. 视频隐私保护技术综述[J]. 计算机科学, 2022, 49(1): 306-313.
JIN H, ZHU J Y, WANG C D.Review on video privacy protection[J]. Computer science, 2022, 49(1): 306-313.
[18] 杨瑞仙, 许帆, 沈嘉宁, 等. 基于社会渗透理论的社交网络用户隐私披露行为研究[J]. 图书情报工作, 2023, 67(6): 84-95.
YANG R X, XU F, SHEN J N, et al.Research on social network users' privacy disclosure behavior based on social penetration theory[J]. Library and information service, 2023, 67(6): 84-95.
[19] KIM J, NAM C, KIM S.The economic value of personal information and policy implication[C]//Proceedings of the 26th Europe a Regional ITS Conference. Los Angeles: ITS Press, 2015.
[20] SPIEKERMANN S, KORUNOVSKA J, BAUER C.Psychology of ownership and asset defense: Why people value their personal information beyond privacy[J]. SSRN electronic journal, 2012, 4(1): 41-47.
[21] 臧国全, 张凯亮, 闫励. 个人数据价值计量研究——基于改造的BDM机制[J]. 图书情报工作, 2020, 64(7): 103-109.
ZANG G Q, ZHANG K L, YAN L.Research on personal data value measurement based on modified BDM experiment[J]. Library and information service, 2020, 64(7): 103-109.
[22] 臧国全, 张盼盼, 柴文科, 等. 个人通信数据的敏感性识别与隐私计量研究[J/OL]. 图书情报知识, 2023: 1-11.(2023-11-21).https://kns.cnki.net/kcms/detail/42.1085.G2.20231120.1120.004.html.
ZANG G Q, ZHANG P P, CHAI W K, et al. Sensitivity identification and privacy measurement of personal communication data[J/OL]. Documentation, information & knowledge, 2023: 1-11.(2023-11-21). https://kns.cnki.net/kcms/detail/42.1085.G2.20231120.1120.004.html.
[23] 臧国全, 王家振, 毕崇武, 等. 政府数据中敏感数据识别与隐私计量研究[J]. 图书情报工作, 2022, 66(15): 66-75.
ZANG G Q, WANG J Z, BI C W, et al.Research on sensitive data identification and privacy measurement in government data[J]. Library and information service, 2022, 66(15): 66-75.
[24] 肖洋, 臧国全. 个人金融数据的敏感性识别与隐私计量研究[J]. 情报理论与实践, 2023, 46(9): 105-114, 86.
XIAO Y, ZANG G Q.Research on sensitivity identification and privacy measurement of personal financial data[J]. Information studies: Theory & application, 2023, 46(9): 105-114, 86.
[25] 张冰. 社交网络隐私保护技术研究[D]. 北京: 北京工业大学, 2019.
ZHANG B.Research on privacy preservation in social network[D]. Beijing: Beijing University of Technology, 2019.
[26] 付钰, 俞艺涵, 吴晓平. 大数据环境下差分隐私保护技术及应用[J]. 通信学报, 2019, 40(10): 157-168.
FU Y, YU Y H, WU X P.Differential privacy protection technology and its application in big data environment[J]. Journal on communications, 2019, 40(10): 157-168.
[27] 范艳芳. 协作环境下的时空约束强制访问控制模型[J]. 计算机科学, 2017, 44(8): 107-114.
FAN Y F.Temporal-spatial-based mandatory access control model in collaborative environment[J]. Computer science, 2017, 44(8): 107-114.
[28] BUI T, STOLLER S D, LI J J.Greedy and evolutionary algorithms for mining relationship-based access control policies[J]. Computers & security, 2019, 80: 317-333.
[29] LI F H, LI Z F, HAN W L, et al.Cyberspace-oriented access control: A cyberspace characteristics-based model and its policies[J]. IEEE internet of things journal, 2019, 6(2): 1471-1483.
[30] XU L, JIANG C X, HE N Q, et al.Trust-based collaborative privacy management in online social networks[J]. IEEE transactions on information forensics and security, 2019, 14(1): 48-60.
[31] SUSAN S P, SARATH G.A trust network driven user authorization scheme for social cloud[C]//Recent Findings in Intelligent Computing Techniques: Proceedings of the 5th ICACNI 2017, Volume 1. Springer Singapore, 2019: 533-542.
[32] 郭宝霞, 王佳慧, 马利民, 等. 基于零信任的敏感数据动态访问控制模型研究[J]. 信息网络安全, 2022, 22(6): 86-93.
GUO B X, WANG J H, MA L M, et al.Research on dynamic access control model of sensitive data based on zero trust[J]. Netinfo security, 2022, 22(6): 86-93.
[33] 张艺, 田立勤, 毋泽南, 等. 云服务中面向信任的动态访问控制博弈机制[J]. 小型微型计算机系统, 2021, 42(8): 1774-1779.
ZHANG Y, TIAN L Q, WU Z N, et al.Trust oriented dynamic access control game mechanism in cloud services[J]. Journal of Chinese computer systems, 2021, 42(8): 1774-1779.
[34] MA T H, SU Y M, RONG H, et al.Rule fusion of privacy protection strategies for co-ownership data sharing[J]. Mathematics, 2022, 10(6): 969.
[35] 崔炜荣, 杜承烈. 社交网络中基于CP-ABE的隐私保护属性匹配方法[J]. 计算机应用, 2018, 38(4): 1051-1057.
CUI W R, DU C L.Privacy preserving attribute matching method based on CP-ABE in social networks[J]. Journal of computer applications, 2018, 38(4): 1051-1057.
[36] 李宇溪, 周福才, 徐紫枫. 支持K-近邻搜索的移动社交网络隐私保护方案[J]. 计算机学报, 2021, 44(7): 1481-1500.
LI Y X, ZHOU F C, XU Z F.Privacy-preserving k-nearest-neighbor search over mobile social network[J]. Chinese journal of computers, 2021, 44(7): 1481-1500.
[37] HU D H, HU C Y, FAN Y Q, et al.oGBAC - A group based access control framework for information sharing in online social networks[J]. IEEE transactions on dependable and secure computing, 2021, 18(1): 100-116.
[38] 李凤华, 孙哲, 牛犇, 等. 跨社交网络的隐私图片分享框架[J]. 通信学报, 2019, 40(7): 1-13.
LI F H, SUN Z, NIU B, et al.Privacy-preserving photo sharing framework cross different social network[J]. Journal on communications, 2019, 40(7): 1-13.
[39] 谢绒娜, 范晓楠, 袁琳, 等. 在线社交网络中延伸访问控制机制研究[J]. 网络与信息安全学报, 2021, 7(5): 123-131.
XIE R N, FAN X N, YUAN L, et al.Research on extended access control mechanism in online social network[J]. Chinese journal of network and information security, 2021, 7(5): 123-131.
[40] 单芳芳, 李晖, 朱辉. 基于博弈论的社交网络转发控制机制[J]. 通信学报, 2018, 39(3): 172-180.
SHAN F F, LI H, ZHU H.Game theory based forwarding control method for social network[J]. Journal on communications, 2018, 39(3): 172-180.
[41] KIABOD M, DEHKORDI M N, BAREKATAIN B.TSRAM: A time-saving k-degree anonymization method in social network[J]. Expert systems with applications, 2019, 125: 378-396.
[42] YU F H, CHEN M J, YU B L, et al.Privacy preservation based on clustering perturbation algorithm for social network[J]. Multimedia tools and applications, 2018, 77(9): 11241-11258.
[43] 史伟, 王园园, 李刚, 等. 基于KFCMSA的(k, l)加权社交网络匿名算法[J]. 计算机应用研究, 2023, 40(10): 3149-3154.
SHI W, WANG Y Y, LI G, et al.(k, l) weighted anonymous algorithm for social network based on KFCMSA[J]. Application research of computers, 2023, 40(10): 3149-3154.
[44] 周艺华, 张冰, 杨宇光, 等. 基于聚类的社交网络隐私保护方法[J]. 计算机科学, 2019, 46(10): 154-160.
ZHOU Y H, ZHANG B, YANG Y G, et al.Cluster-based social network privacy protection method[J]. Computer science, 2019, 46(10): 154-160.
[45] TIAN H, LU Y, LIU J T, et al.Betweenness centrality based k-anonymity for privacy preserving in social networks[C]//Proceedings of the 16th International Conference on Advances in Mobile Computing and Multimedia. New York: ACM, 2018: 19-21.
[46] ROUSSEAU F, CASAS-ROMA J, VAZIRGIANNIS M.Community-preserving anonymization of graphs[J]. Knowledge and information systems, 2018, 54(2): 315-343.
[47] LIN C, SONG Z H, SONG H B, et al.Differential privacy preserving in big data analytics for connected health[J]. Journal of medical systems, 2016, 40(4): 97.
[48] KOUFOGIANNIS F, PAPPAS G J.Diffusing private data over networks[J]. IEEE transactions on control of network systems, 2018, 5(3): 1027-1037.
[49] ABADI M, CHU A, GOODFELLOW I, et al.Deep learning with differential privacy[C]//Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security. New York: ACM, 2016: 308-318.
[50] WANG S W, HUANG L S, NIE Y W, et al.Local differential private data aggregation for discrete distribution estimation[J]. IEEE transactions on parallel and distributed systems, 2019, 30(9): 2046-2059.
[51] XU C G, REN J, ZHANG D Y, et al.GANobfuscator: Mitigating information leakage under GAN via differential privacy[J]. IEEE transactions on information forensics and security, 2019, 14(9): 2358-2371.
[52] ZHU T Q, LI J, HU X Y, et al.The dynamic privacy-preserving mechanisms for online dynamic social networks[J]. IEEE transac-tions on knowledge and data engineering, 2022, 34(6): 2962-2974.
[53] 高瑞, 陈学斌, 张祖篡. 面向部分图更新的动态社交网络隐私发布方法[J/OL]. 计算机应用, 2024: 1-10.(2024-04-18). https://kns.cnki.net/kcms/detail/51.1307.TP.20240415.0947.014.html.
GAO R, CHEN X B, ZHANG Z C. Dynamic social network privacy publishing method for partial graph updating[J/OL]. Journal of computer applications, 2024: 1-10. (2024-04-18). https://kns.cnki.net/kcms/detail/51.1307.TP.20240415.0947.014.html.
[54] 李凤华, 李晖, 贾焰, 等. 隐私计算研究范畴及发展趋势[J]. 通信学报, 2016, 37(4): 1-11.
LI F H, LI H, JIA Y, et al.Privacy computing: Concept, connotation and its research trend[J]. Journal on communications, 2016, 37(4): 1-11.
[55] 李凤华, 李晖, 牛犇, 等. 隐私计算的学术内涵与研究趋势[J]. 网络与信息安全学报, 2022, 8(6): 1-8.
LI F H, LI H, NIU B, et al.Academic connotation and research trends of privacy computing[J]. Chinese journal of network and in-formation security, 2022, 8(6): 1-8.
[56] 李晖. 隐私计算—面向隐私保护的新型计算[J]. 信息通信技术, 2018, 12(6): 4-6.
LI H.Privacy computing - A new computing oriented to privacy protection[J]. Information and communications technologies, 2018, 12(6): 4-6.
[57] 杨瑞仙, 李兴芳, 王栋, 等. 隐私计算的溯源、现状及展望[J]. 情报理论与实践, 2023, 46(7): 158-167.
YANG R X, LI X F, WANG D, et al.Privacy calculus/privacy computing: Provenance, research status and future prospect[J]. In-formation studies: Theory & application, 2023, 46(7): 158-167.
[58] CULNAN M J, ARMSTRONG P K.Information privacy concerns, procedural fairness, and impersonal trust: An empirical investigation[J]. Organization science, 1999, 10(1): 104-115.
[59] TREPTE S, SCHARKOW M, DIENLIN T.The privacy calculus contextualized: The influence of affordances[J]. Computers in human behavior, 2020, 104: 106115.
[60] GERBER N, GERBER P, VOLKAMER M.Explaining the privacy paradox: A systematic review of literature investigating privacy attitude and behavior[J]. Computers & security, 2018, 77: 226-261.
[61] 闫树, 吕艾临. 隐私计算发展综述[J]. 信息通信技术与政策, 2021, 47(6): 1-11.
YAN S, LYU A L.Overview of the development of privacy preserving computing[J]. Information and communications technology and policy, 2021, 47(6): 1-11.
[62] 焦海涛. 个人信息的反垄断法保护: 从附属保护到独立保护[J]. 法学, 2021(4): 108-124.
JIAO H T.Protection of personal information through anti-trust law-From subsidiary protection to independent protection[J]. Law science, 2021(4): 108-124.
[63] 董玮, 兰旻. 未成年人信息保护: 隐私、权责与公共善[J]. 青年记者, 2021(6): 95-96.
DONG W, LAN M.Information protection for minors: Privacy, power and responsibility and public goodness[J]. Youth journalist, 2021(6): 95-96.
[64] 梁译方, 周丽娜. 疫情信息传播与数据隐私保护——韩国社交媒体相关政策法规调整的考察与思考[J]. 中国广播, 2021(4): 77-80.
LIANG Y F, ZHOU L N.Epidemic information dissemination and data privacy protection - Investigation and reflection on the adjustment of social media-related policies and regulations in South Korea[J]. China broadcasts, 2021(4): 77-80.
[65] 辛文娟, 彭李余. 社交网络环境下大学生隐私保护现状及对策研究——基于对重庆市六所高校的问卷调查[J]. 中国出版, 2013(10): 61-64.
XIN W J, PENG L Y.Research on the current situation and countermeasures of college students' privacy protection under the social network environment - Based on the questionnaire survey of six universities in Chongqing[J]. China publishing journal, 2013(10): 61-64.
[66] XU H, UNIVERSITY P S, DINEV T, et al.Information privacy concerns: Linking individual perceptions with institutional privacy assurances[J]. Journal of the association for information systems, 2011, 12(12): 798-824.
[67] ZHAO L, LU Y B, GUPTA S.Disclosure intention of location-related information in location-based social network services[J]. International journal of electronic commerce, 2012, 16(4): 53-90.
[68] LI H, SARATHY R, XU H.The role of affect and cognition on online consumers' decision to disclose personal information to unfamiliar online vendors[J]. Decision support systems, 2011, 51(3): 434-445.
[69] TADDEI S, CONTENA B.Privacy, trust and control: Which relationships with online self-disclosure?[J]. Computers in human behavior, 2013, 29(3): 821-826.
[70] ZHANG S, MAKEDON F.Privacy preserving learning in negotiation[C]//Proceedings of the 2005 ACM symposium on Applied computing. New York: ACM, 2005: 821-825.
[71] BARUH L, SECINTI E, CEMALCILAR Z.Online privacy concerns and privacy management: A meta-analytical review[J]. Journal of communication, 2017, 67(1): 26-53.
[72] 申琦, 闫玲玲. 社交规模、社交经验与隐私管理边界——基于新浪微博用户的数据挖掘研究[J]. 河北经贸大学学报(综合版), 2021, 21(2): 43-52, 71.
SHEN Q, YAN L L.The boundary of social network scale, experience in using social network media and privacy management[J]. Journal of Hebei University of economics and business (comprehensive edition), 2021, 21(2): 43-52, 71.
[73] 程慧平, 郑雨霏, 闻心珗. 基于扎根理论的社交媒体用户隐私设置意愿影响因素研究[J]. 现代情报, 2021, 41(10): 130-139, 176.
CHENG H P, ZHENG Y F, WEN X Y.Research on influencing factors of privacy setting intention of social media users based on grounded theory[J]. Journal of modern information, 2021, 41(10): 130-139, 176.
[74] 张霁雯. 社交媒体用户隐私关注、自我表露和隐私管理行为的实证研究[J]. 新媒体研究, 2021, 7(4): 39-45.
ZHANG J W.An empirical study on privacy concern, self-disclosure and privacy management behavior of social media users[J]. New media research, 2021, 7(4): 39-45.
[75] READ K, VAN DER SCHYFF K. Modelling the intended use of Facebook privacy settings[J]. SA journal of information manage-ment, 2020, 22(1): 1-9
[76] 熊金波, 王敏燊, 田有亮, 等. 面向云数据的隐私度量研究进展[J]. 软件学报, 2018, 29(7): 1963-1980.
XIONG J B, WANG M S, TIAN Y L, et al.Research progress on privacy measurement for cloud data[J]. Journal of software, 2018, 29(7): 1963-1980.
[77] BAYARDO R J, AGRAWAL R.Data privacy through optimal k- anonymization[C]//21st International Conference on Data Engineer-ing (ICDE'05). Piscataway, New Jersey: IEEE, 2005: 217-228.
[78] 姜火文, 曾国荪, 马海英. 面向表数据发布隐私保护的贪心聚类匿名方法[J]. 软件学报, 2017, 28(2): 341-351.
JIANG H W, ZENG G S, MA H Y.Greedy clustering-anonymity method for privacy preservation of table data-publishing[J]. Journal of software, 2017, 28(2): 341-351.
[79] 龚奇源, 杨明, 罗军舟. 面向关系-事务数据的数据匿名方法[J]. 软件学报, 2016, 27(11): 2828-2842.
GONG Q Y, YANG M, LUO J Z.Data anonymization approach for microdata with relational and transaction attributes[J]. Journal of software, 2016, 27(11): 2828-2842.
[80] XIONG J B, YAO Z Q, MA J F, et al.PRIAM: Privacy preserving identity and access management scheme in cloud[J]. KSII transac-tions on Internet and information systems, 2014, 8(1): 282-304.
[81] JIANG T, HU S J.The elderly and the big data how older adults deal with digital privacy[C]//2016 International Conference on Intelligent Transportation, Big Data & Smart City(ICITBS). Piscataway, New Jersey: IEEE, 2016: 285-288.
[82] SAMI N, MOHAMED E.The impact of privacy concerns and perceived vulnerability to risks on users privacy protection behaviors on SNS: A structural equation model[J]. International journal of advanced computer science and applications, 2016, 7(5): 142-147.
[83] 杨丽丽. 大数据时代信息隐私关注与隐私保护行为研究[J]. 电子商务, 2017(5): 48-49.
YANG L L.Research on information privacy concern and privacy protection behavior in the era of big data[J]. E-business journal, 2017(5): 48-49.
[84] 刘宇涵, 陈红, 刘艺璇, 等. 图数据上的隐私攻击与防御技术[J]. 计算机学报, 2022, 45(4): 702-734.
LIU Y H, CHENG H, LIU Y X, et al.State-of-the-art privacy attacks and defenses on graphs[J]. Chinese journal of computers, 2022, 45(4): 702-734.
[85] 谌涛, 郝于越. 社会化媒体的隐私保护研究: 用户在社会化媒体中自我表露的隐私保护意识——以微博和微信的对比研究为例[J]. 新闻传播, 2017(4): 73, 75.
CHEN T, HAO Y Y. Research on privacy protection of social media: Users' self-revealed privacy protection consciousness in social media-A comparative study of Weibo and WeChat as an example[J]. Journalism & communication, 2017(4): 73, 75.
[86] MAMONOV S, BENBUNAN-FICH R.The impact of information security threat awareness on privacy-protective behaviors[J]. Com-puters in human behavior, 2018, 83: 32-44.
[87] MOSTELLER J, PODDAR A.To share and protect: Using regulatory focus theory to examine the privacy paradox of consumers' social media engagement and online privacy protection behaviors[J]. Journal of interactive marketing, 2017, 39: 27-38.
[88] TANEJA A, VITRANO J, GENGO N J.Rationality-based beliefs affecting individual's attitude and intention to use privacy controls on Facebook: An empirical investigation[J]. Computers in human behavior, 2014, 38: 159-173.
[89] BENAMATI J H, OZDEMIR Z D, SMITH H J.An empirical test of an antecedents-privacy concerns-outcomes model[J]. Journal of information science, 2017, 43(5): 583-600.
[1] LIU Yang, TIAN Huiyi. Application of the EEG Technology in the Field of Library and Information Science: Current Situation and Perspectives [J]. Journal of Library and Information Science in Agriculture, 2024, 36(4): 63-71.
[2] CUI Kai. Analysis of Farmers' Information Acquisition Behavior for Digital Inclusion: Group Focus and Practical Concerns [J]. Journal of Library and Information Science in Agriculture, 2024, 36(1): 33-45.
[3] XIA Yikun, JIANG Jie, ZHANG Xiaheng, WANG Jiandong, ZHOU Wenjie, YANG Xinya, LI Yang. Developing the New Quality Productivity: Responses and Reflections on the Discipline of Information Resource Management [J]. Journal of Library and Information Science in Agriculture, 2024, 36(1): 4-32.
[4] SUN Lili, WANG WeiJie, SHENG Jiefei. Influencing Factors of Scientific Data Value Increment Based on System Dynamics [J]. Journal of Library and Information Science in Agriculture, 2023, 35(9): 28-42.
[5] SHAN Shuyang, XIA Cuijuan, LIU Qianqian. Exploration of Genealogy Public Knowledge Service Model with the Resources and Technology: Taking the Exhibition Project of "AR Surname Wall" as an Example [J]. Journal of Library and Information Science in Agriculture, 2023, 35(6): 83-92.
[6] MA Haiqun, LI Jinling, YU Tongtong, ZHANG Tao. A Framework of Ethics Guidelines on Public Data from a Whole Life Cycle Perspective [J]. Journal of Library and Information Science in Agriculture, 2023, 35(6): 29-42.
[7] MA Lecun, ZHAN Xini, ZHU Qiyu, SUN Rong, LI Baiyang. Digital Intelligence Integration Innovation Development of GLAM Driven by AIGC [J]. Journal of Library and Information Science in Agriculture, 2023, 35(5): 4-15.
[8] LV Ruijuan, ZHANG Jingbei, YAN Dan, CAI Yingchun. Innovative Development of AIGC and GLAM: Review of "Shaping the Future: AIGC and GLAM Innovative Development" Cutting-Edge Academic Forum [J]. Journal of Library and Information Science in Agriculture, 2023, 35(5): 27-36.
[9] LYU Kun, CHEN Yaoyao, XIANG Minhao. Influencing Factors of Sina Weibo Information Service Quality from the Perspective of Users: Exploratory Analysis Based on Grounded Theory [J]. Journal of Library and Information Science in Agriculture, 2022, 34(10): 70-81.
[10] YUAN Fan. The Mechanism of Personal Data Transfers of Social Network Users [J]. Journal of Library and Information Science in Agriculture, 2022, 34(5): 76-91.
[11] GUAN Fang, ZHAO Ketong, REN Wei, LIN Qiang. Model Construction and Empirical Research on Information Searching Behavior of Researchers from the Perspective of Situational Cognition [J]. Journal of Library and Information Science in Agriculture, 2022, 34(4): 94-103.
[12] LI Bo, LI Honglian, GUAN Qing, LIU Yang. Fine-grained Sentiment Analysis of Social Network Platform of University Libraries Based on CNN-BiLSTM-HAN Hybrid Neural Network [J]. Journal of Library and Information Science in Agriculture, 2022, 34(4): 63-73.
[13] SONG Shanshan, BAI Wenlin. A Review of Big Data Governance Research in China [J]. Journal of Library and Information Science in Agriculture, 2022, 34(4): 4-17.
[14] LI Jiawen, QIN Qin, KE Qing. Empirical Research on the Influencing Factors of Users' Knowledge Hiding Behavior in Virtual Question-and-Answer Community [J]. Journal of Library and Information Science in Agriculture, 2022, 34(2): 48-62.
[15] HUANG Jinxia, WANG Xuan, YANG Heng, LIU Jingyu, ZHANG Zhixiong, LIU Xiwen. Summary of the 10th China OA Week: Voices from Some Stakeholders on the Construction of China's Open Scientific Innovation Ecology [J]. Journal of Library and Information Science in Agriculture, 2022, 34(1): 49-61.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!