Publications-Theses

Article View/Open

Publication Export

Google ScholarTM

NCCU Library

Citation Infomation

Related Publications in TAIR

題名 隱私悖論的功能性磁振造影研究
An fMRI Study on Information Privacy Paradox
作者 侯雅晴
Hou, Ya-Ching
貢獻者 梁定澎<br>林怡伶
Liang, Ting-Peng<br>Lin, Yi-Ling
侯雅晴
Hou, Ya-Ching
關鍵詞 隱私矛盾
隱私悖論
雙邊系統理論
功能性磁振造影
Privacy Concern
Privacy Paradox
Dual Process Theory
Functional Magnetic Resonance Imaging
日期 2019
上傳時間 5-Sep-2019 15:46:08 (UTC+8)
摘要 隨著大數據分析技術的進步,隱私問題越來越受到大家的關注。特別是在 移動應用程式的時代裡,人們雖然注重個人資訊隱私,實際上卻有許多人不經 意地透露自己的隱私資訊,而這種思想與行為不一致的現象則被稱作隱私悖論, 亦稱作隱私矛盾。過往文獻透過隱私相關研究理論,對於隱私顧慮的信念與意 圖實際行為之間的不一致提出了許多解釋,並以問卷與訪談等方式作為研究方 法,讓使用者回溯在特定情境中是否有過隱私揭露行為的經驗。
然而,一個人的決策行為並非是絕對理性思維,個人之心理層面因素與情 緒因素皆會影響決策結果。因此,本實驗透過雙邊系統理論(dual process theory)定義個人在做決策時會受到兩個不同的系統的影響,進而推論個人發生 隱私矛盾現象時,比起沒有隱私矛盾現象發生時所採用的決策方式有所不同。 除此之外,最近神經科學的進步讓研究者可以透過觀察腦部影像的變化,了解 實際決策時的腦部反應機制,可以更客觀的了解產生這種現象的神經機制,有 助於更深入的理解造成這種現象的原因。因此,本研究從神經科學的角度驗證 隱私悖論的現象,基於心理學領域的雙邊系統理論(Dual Process Theory)並透 過功能性磁造振影(functional Magnetic Resonance Imaging, fMRI)了解使用者在手 機應用程式下載的情境下,其影響個人隱私顧慮的潛在因素與發生隱私矛盾時 的腦區反應。
With the advancement of big data analytics technology, privacy issues are getting more and more attention. Although people report that they pay attention to personal information privacy, many people inadvertently disclose their privacy information in actual behavior. This phenomenon is called “privacy paradox” which means the inconsistency between the attitude and the actual behavior in the privacy related decision-making.
In previous literature, a few theories have been proposed to explain the inconsistency between reported privacy concerns and the actual self-disclosure behavior and been evaluated with questionnaires and interviews. Recent advancement in neuroscience allows researchers to observe brain activations in the decision process to explore the neural mechanisms associated with certain behavior. Therefore, based on the Dual Process Theory, the objective of this study is to apply functional Magnetic Resonance Imaging (fMRI) to explore the neural mechanisms associated with privacy paradox.
參考文獻 一、中文部分
韓承靜(2004 年)。認知神經科學的形成背景與範圍概述。科學教育月刊

蕭文龍,黃莉君,&楊雅雯(2016)。神經資訊系統文獻匯整分析。東吳經濟
商學學報,(92),37-56。

梁曉丹,李穎灝,&劉芳(2018)。在線隱私政策對消費者提供個人信息意願
的影響機制研究 - 信息敏感度的調節作用。管理評論,30(11),97-107。

管家娃,張玥,朱慶華,&趙宇翔(2016)。國外社交網站隱私悖論問題研 究綜述與國內研究建議。圖書情報工作,60(22),126-134。

陳乃嘉,&任維(2019)。認知神經科學研究的文獻計量分析。
Researches of Cognitive Neuroscience Based on Bibliometric Analysis. Advances in
Psychology, 9(02), 313.

陳韋亭(2014)。大腦決策機制之資料探勘研究。中山大學資訊管理學系研究所學位論文,1-83。

徐亦礽. (2016). 複合與簡單風險決策之神經差異. 成功大學經濟學系學位論文,1-69.

白麗英,袁博,張蔚,張振,蘭姣,&王益文。 (2014)。人際合作與衝突影響博弈決策的結果評價。心理學報,46(11),1760-1771。

劉燁,付秋芳,&傅小蘭。 (2009 年)。認知與情緒的交互作用。科學通
報,54(18),2783-2796。

汪蕾,沉翔宇,&林志萍。 (2010 年)。基於決策神經科學的風險決策與含
糊決策研究進展(博士論文)。

二、英文部分
Acquisti, A., & Grossklags, J. (2005). Privacy and rationality in individual decision making. IEEE security & privacy, 3(1), 26-33.

Acquisti, A., Brandimarte, L., & Loewenstein, G. (2015). Privacy and human behavior in the age of information. Science, 347(6221), 509-514.

Barnes, S. B. (2006). A privacy paradox: Social networking in the United States. First Monday, 11(9).

Barth, S., & De Jong, M. D. (2017). The privacy paradox–Investigating discrepancies between expressed privacy concerns and actual online behavior–A systematic literature review. Telematics and Informatics, 34(7), 1038-1058.

Bhattacherjee, A., & Sanford, C. (2006). Influence processes for information technology acceptance: An elaboration likelihood model. MIS quarterly, 805-825. Buck, C., Horbel, C., Germelmann, C. C., &

Eymann, T. (2014). The unconscious app
consumer: Discovering and comparing the information-seeking patterns among mobile application consumers.

Cai, H., & Liu, C. (2004). Anterior Cingulate Cortex and Executive Function. Advances in Psychological Science, 12(05), 643-650.

Camara, E., Rodriguez-Fornells, A., Ye, Z., & Münte, T. F. (2009). Reward networks in the brain as captured by connectivity measures. Frontiers in neuroscience, 3, 34.

Choi, H., Park, J., & Jung, Y. (2018). The role of privacy fatigue in online privacy behavior. Computers in Human Behavior, 81, 42-51.

Delgado, M. R., Tricomi, E., Vartanian, O., & Mandel, D. (2011). Reward processingand decision making in the human striatum. Neuroscience of decision making, 145-172.

Evans, J. S. B. (2003). In two minds: dual-process accounts of reasoning. Trends in cognitive sciences, 7(10), 454-459.

Glenn, A. L., Raine, A., & Schug, R. A. (2009). The neural correlates of moral decision-making in psychopathy. Molecular psychiatry, 14(1), 5.

Glöckner, A., & Witteman, C. (2010). Beyond dual-process models: A categorisation of processes underlying intuitive judgement and decision making. Thinking & Reasoning, 16(1), 1-25.

Glöckner, A., & Witteman, C. (2010). Beyond dual-process models: A categorisation of processes underlying intuitive judgement and decision making. Thinking & Reasoning, 16(1), 1-25.

Gu, J., Xu, Y. C., Xu, H., Zhang, C., & Ling, H. (2017). Privacy concerns for mobile app download: An elaboration likelihood model perspective. Decision Support Systems, 94, 19-28.

Halchenko, Y. O., Hanson, S. J., & Pearlmutter, B. A. (2005). Multimodal integration: fMRI, mri, EEG, MEG. Advanced image processing in magnetic resonance imaging,223-265.

Hargittai, E., & Marwick, A. (2016). “What can I really do?” Explaining the privacy paradox with online apathy. International Journal of Communication, 10, 21.

Kokolakis, S. (2017). Privacy attitudes and privacy behaviour: A review of current research on the privacy paradox phenomenon. Computers & security, 64, 122-134.

Lai, C. Y., Liang, T. P., & Hui, K. L. (2018). Information Privacy Paradox: A NeuralScience Study. Information Privacy, 6, 26-2018.

Lee, J. M., Gebremariam, A., Wu, E. L., LaRose, J., & Gurney, J. G. (2011).Evaluation of nonfasting tests to screen for childhood and adolescentdysglycemia. Diabetes Care, 34(12), 2597-2602.

Lieberman, M. D. (2007). Social cognitive neuroscience: a review of core processes. Annu. Rev. Psychol., 58, 259-289.

Martinez-Selva, J. M., Sanchez-Navarro, J. P., Bechara, A., & Roman, F. (2006). Brain mechanisms involved in decision-making. Revista de neurologia, 42(7), 411.

Mohammed, Z., & Tejay, G. (2015). The role of cognitive disposition indeconstructing the privacy paradox: a neuroscience study.

Ortiz, J., Chih, W. H., & Tsai, F. S. (2018). Information privacy, consumer alienation, and lurking behavior in social networking sites. Computers in Human Behavior, 80, 143-157.

Petty, R. E., Cacioppo, J. T., & Goldman, R. (1981). Personal involvement as a determinant of argument-based persuasion.Journal of personality and social psychology, 41(5), 847.

Sahlin, N. E., Wallin, A., & Persson, J. (2010). Decision science: from Ramsey to dual process theories. Synthese, 172(1), 129-143.

Sarraf, S., & Sun, J. (2016). Functional brain imaging: A comprehensive survey. arXiv preprint arXiv:1602.02225.

Simon, H. A. (1955). A behavioral model of rational choice. The quarterly journal of economics, 69(1), 99-118.

Smith, H. J., Milberg, S. J., & Burke, S. J. (1996). Information privacy: 
measuringindividuals` concerns about organizational practices. MIS quarterly, 
20(2), 167-196.

Spiekermann, S., Grossklags, J., & Berendt, B. (2001, October). E-privacy in 2nd generation E-commerce: privacy preferences versus actual behavior. In Proceedings of the 3rd ACM conference on Electronic Commerce (pp. 38-47). ACM.

Udo, G. J. (2001). Privacy and security concerns as major barriers for e-commerce: a survey study. Information Management & Computer Security, 9(4), 165-174. 74

Van den Broeck, E., Poels, K., & Walrave, M. (2015). Older and wiser? Facebook use, privacy concern, and privacy protection in the life stages of emerging, young, and middle adulthood. Social Media+ Society, 1(2), 2056305115616149.

Wang, T., Duong, T. D., & Chen, C. C. (2016). Intention to disclose personal information via mobile applications: A privacy calculus perspective. International Journal of Information Management, 36(4), 531-542.

Weinberger, M., Bouhnik, D., & Zhitomirsky-Geffet, M. (2017). Factors Affecting Students’ Privacy Paradox and Privacy Protection Behavior. Open Information Science, 1(1), 3-20.

Wijesekera, P., Baokar, A., Hosseini, A., Egelman, S., Wagner, D., &

Beznosov, K. (2015). Android permissions remystified: A field study on contextual integrity. In 24th {USENIX} Security Symposium ({USENIX} Security 15) (pp. 499-514).

Wirtz, J., Lwin, M. O., & Williams, J. D. (2007). Causes and consequences of consumer online privacy concern. International Journal of Service Industry Management, 18(4), 326-348.

Zhang, S., Wang, G., Liu, Q., & Abawajy, J. H. (2018). A trajectory privacy- preserving scheme based on query exchange in mobile social networks. Soft Computing, 22(18), 6121-6133.
描述 碩士
國立政治大學
資訊管理學系
1063560201
資料來源 http://thesis.lib.nccu.edu.tw/record/#G1063560201
資料類型 thesis
dc.contributor.advisor 梁定澎<br>林怡伶zh_TW
dc.contributor.advisor Liang, Ting-Peng<br>Lin, Yi-Lingen_US
dc.contributor.author (Authors) 侯雅晴zh_TW
dc.contributor.author (Authors) Hou, Ya-Chingen_US
dc.creator (作者) 侯雅晴zh_TW
dc.creator (作者) Hou, Ya-Chingen_US
dc.date (日期) 2019en_US
dc.date.accessioned 5-Sep-2019 15:46:08 (UTC+8)-
dc.date.available 5-Sep-2019 15:46:08 (UTC+8)-
dc.date.issued (上傳時間) 5-Sep-2019 15:46:08 (UTC+8)-
dc.identifier (Other Identifiers) G1063560201en_US
dc.identifier.uri (URI) http://nccur.lib.nccu.edu.tw/handle/140.119/125536-
dc.description (描述) 碩士zh_TW
dc.description (描述) 國立政治大學zh_TW
dc.description (描述) 資訊管理學系zh_TW
dc.description (描述) 1063560201zh_TW
dc.description.abstract (摘要) 隨著大數據分析技術的進步,隱私問題越來越受到大家的關注。特別是在 移動應用程式的時代裡,人們雖然注重個人資訊隱私,實際上卻有許多人不經 意地透露自己的隱私資訊,而這種思想與行為不一致的現象則被稱作隱私悖論, 亦稱作隱私矛盾。過往文獻透過隱私相關研究理論,對於隱私顧慮的信念與意 圖實際行為之間的不一致提出了許多解釋,並以問卷與訪談等方式作為研究方 法,讓使用者回溯在特定情境中是否有過隱私揭露行為的經驗。
然而,一個人的決策行為並非是絕對理性思維,個人之心理層面因素與情 緒因素皆會影響決策結果。因此,本實驗透過雙邊系統理論(dual process theory)定義個人在做決策時會受到兩個不同的系統的影響,進而推論個人發生 隱私矛盾現象時,比起沒有隱私矛盾現象發生時所採用的決策方式有所不同。 除此之外,最近神經科學的進步讓研究者可以透過觀察腦部影像的變化,了解 實際決策時的腦部反應機制,可以更客觀的了解產生這種現象的神經機制,有 助於更深入的理解造成這種現象的原因。因此,本研究從神經科學的角度驗證 隱私悖論的現象,基於心理學領域的雙邊系統理論(Dual Process Theory)並透 過功能性磁造振影(functional Magnetic Resonance Imaging, fMRI)了解使用者在手 機應用程式下載的情境下,其影響個人隱私顧慮的潛在因素與發生隱私矛盾時 的腦區反應。
zh_TW
dc.description.abstract (摘要) With the advancement of big data analytics technology, privacy issues are getting more and more attention. Although people report that they pay attention to personal information privacy, many people inadvertently disclose their privacy information in actual behavior. This phenomenon is called “privacy paradox” which means the inconsistency between the attitude and the actual behavior in the privacy related decision-making.
In previous literature, a few theories have been proposed to explain the inconsistency between reported privacy concerns and the actual self-disclosure behavior and been evaluated with questionnaires and interviews. Recent advancement in neuroscience allows researchers to observe brain activations in the decision process to explore the neural mechanisms associated with certain behavior. Therefore, based on the Dual Process Theory, the objective of this study is to apply functional Magnetic Resonance Imaging (fMRI) to explore the neural mechanisms associated with privacy paradox.
en_US
dc.description.tableofcontents 目錄4
表目錄 6
圖目錄 8
第一章 緒論 9
第一節 研究背景與動機 9
第二節 研究目的 11
第三節 研究流程 12
第二章 文獻探討 13
第一節 隱私矛盾 13
第二節 雙邊系統理論 15
第三節 認知神經科學 18
第四節 隱私悖論之認知神經科學 20
第五節 雙邊系統理論之認知神經科學 22
第三章 研究架構與方法 25
一、研究架構 25
二、研究假說 25
第一節 實驗設計 27
一、實驗內容 27
二、材料篩選機制 32
三、實驗流程與設計 39
四、實驗對象與招募管道 42
五、實驗儀器與場地 43
六、實驗日期 43
第二節 資料分析與前測結果 44
一、資料分析方法 44
二、前測分析與結果 47
第四章 研究分析結果 53
第一節 敘述性統計 53
第二節 fMRI 影像資料分析 55
一、資料分析方法與篩選標準 55
二、隱私矛盾現象之腦區反應 57
三、無隱私矛盾現象之腦區反應 61
四、隱私矛盾現象與決策機制之驗證 63
五、無隱私矛盾現象與決策機制之驗證 65
六、問卷與手機應用程式下載情境之差異 67
第五章 結論與建議 70
第一節 研究結論 70
一、問卷與手機應用程式下載情境之差異 70
二、隱私矛盾現象之腦區反應 71
二、隱私矛盾現象之決策機制驗證 71
第二節 貢獻 72
一、學術貢獻 72
二、實務貢獻 73
第三節 研究限制 73
第四節 未來研究方向 73
參考文獻 74
附錄一 問卷 78
附錄二 手機應用程式變數平均值表.95
附錄三 IRB 同意書 98
附錄四 台灣心智科學腦造影中心實驗同意書 103
附錄五 fMRI 實驗示意圖-問卷情境 105
附錄六 fMRI 實驗示意圖-手機應用程式下載情境 110
附錄七 腦區活化影像 120
zh_TW
dc.format.extent 19139289 bytes-
dc.format.mimetype application/pdf-
dc.source.uri (資料來源) http://thesis.lib.nccu.edu.tw/record/#G1063560201en_US
dc.subject (關鍵詞) 隱私矛盾zh_TW
dc.subject (關鍵詞) 隱私悖論zh_TW
dc.subject (關鍵詞) 雙邊系統理論zh_TW
dc.subject (關鍵詞) 功能性磁振造影zh_TW
dc.subject (關鍵詞) Privacy Concernen_US
dc.subject (關鍵詞) Privacy Paradoxen_US
dc.subject (關鍵詞) Dual Process Theoryen_US
dc.subject (關鍵詞) Functional Magnetic Resonance Imagingen_US
dc.title (題名) 隱私悖論的功能性磁振造影研究zh_TW
dc.title (題名) An fMRI Study on Information Privacy Paradoxen_US
dc.type (資料類型) thesisen_US
dc.relation.reference (參考文獻) 一、中文部分
韓承靜(2004 年)。認知神經科學的形成背景與範圍概述。科學教育月刊

蕭文龍,黃莉君,&楊雅雯(2016)。神經資訊系統文獻匯整分析。東吳經濟
商學學報,(92),37-56。

梁曉丹,李穎灝,&劉芳(2018)。在線隱私政策對消費者提供個人信息意願
的影響機制研究 - 信息敏感度的調節作用。管理評論,30(11),97-107。

管家娃,張玥,朱慶華,&趙宇翔(2016)。國外社交網站隱私悖論問題研 究綜述與國內研究建議。圖書情報工作,60(22),126-134。

陳乃嘉,&任維(2019)。認知神經科學研究的文獻計量分析。
Researches of Cognitive Neuroscience Based on Bibliometric Analysis. Advances in
Psychology, 9(02), 313.

陳韋亭(2014)。大腦決策機制之資料探勘研究。中山大學資訊管理學系研究所學位論文,1-83。

徐亦礽. (2016). 複合與簡單風險決策之神經差異. 成功大學經濟學系學位論文,1-69.

白麗英,袁博,張蔚,張振,蘭姣,&王益文。 (2014)。人際合作與衝突影響博弈決策的結果評價。心理學報,46(11),1760-1771。

劉燁,付秋芳,&傅小蘭。 (2009 年)。認知與情緒的交互作用。科學通
報,54(18),2783-2796。

汪蕾,沉翔宇,&林志萍。 (2010 年)。基於決策神經科學的風險決策與含
糊決策研究進展(博士論文)。

二、英文部分
Acquisti, A., & Grossklags, J. (2005). Privacy and rationality in individual decision making. IEEE security & privacy, 3(1), 26-33.

Acquisti, A., Brandimarte, L., & Loewenstein, G. (2015). Privacy and human behavior in the age of information. Science, 347(6221), 509-514.

Barnes, S. B. (2006). A privacy paradox: Social networking in the United States. First Monday, 11(9).

Barth, S., & De Jong, M. D. (2017). The privacy paradox–Investigating discrepancies between expressed privacy concerns and actual online behavior–A systematic literature review. Telematics and Informatics, 34(7), 1038-1058.

Bhattacherjee, A., & Sanford, C. (2006). Influence processes for information technology acceptance: An elaboration likelihood model. MIS quarterly, 805-825. Buck, C., Horbel, C., Germelmann, C. C., &

Eymann, T. (2014). The unconscious app
consumer: Discovering and comparing the information-seeking patterns among mobile application consumers.

Cai, H., & Liu, C. (2004). Anterior Cingulate Cortex and Executive Function. Advances in Psychological Science, 12(05), 643-650.

Camara, E., Rodriguez-Fornells, A., Ye, Z., & Münte, T. F. (2009). Reward networks in the brain as captured by connectivity measures. Frontiers in neuroscience, 3, 34.

Choi, H., Park, J., & Jung, Y. (2018). The role of privacy fatigue in online privacy behavior. Computers in Human Behavior, 81, 42-51.

Delgado, M. R., Tricomi, E., Vartanian, O., & Mandel, D. (2011). Reward processingand decision making in the human striatum. Neuroscience of decision making, 145-172.

Evans, J. S. B. (2003). In two minds: dual-process accounts of reasoning. Trends in cognitive sciences, 7(10), 454-459.

Glenn, A. L., Raine, A., & Schug, R. A. (2009). The neural correlates of moral decision-making in psychopathy. Molecular psychiatry, 14(1), 5.

Glöckner, A., & Witteman, C. (2010). Beyond dual-process models: A categorisation of processes underlying intuitive judgement and decision making. Thinking & Reasoning, 16(1), 1-25.

Glöckner, A., & Witteman, C. (2010). Beyond dual-process models: A categorisation of processes underlying intuitive judgement and decision making. Thinking & Reasoning, 16(1), 1-25.

Gu, J., Xu, Y. C., Xu, H., Zhang, C., & Ling, H. (2017). Privacy concerns for mobile app download: An elaboration likelihood model perspective. Decision Support Systems, 94, 19-28.

Halchenko, Y. O., Hanson, S. J., & Pearlmutter, B. A. (2005). Multimodal integration: fMRI, mri, EEG, MEG. Advanced image processing in magnetic resonance imaging,223-265.

Hargittai, E., & Marwick, A. (2016). “What can I really do?” Explaining the privacy paradox with online apathy. International Journal of Communication, 10, 21.

Kokolakis, S. (2017). Privacy attitudes and privacy behaviour: A review of current research on the privacy paradox phenomenon. Computers & security, 64, 122-134.

Lai, C. Y., Liang, T. P., & Hui, K. L. (2018). Information Privacy Paradox: A NeuralScience Study. Information Privacy, 6, 26-2018.

Lee, J. M., Gebremariam, A., Wu, E. L., LaRose, J., & Gurney, J. G. (2011).Evaluation of nonfasting tests to screen for childhood and adolescentdysglycemia. Diabetes Care, 34(12), 2597-2602.

Lieberman, M. D. (2007). Social cognitive neuroscience: a review of core processes. Annu. Rev. Psychol., 58, 259-289.

Martinez-Selva, J. M., Sanchez-Navarro, J. P., Bechara, A., & Roman, F. (2006). Brain mechanisms involved in decision-making. Revista de neurologia, 42(7), 411.

Mohammed, Z., & Tejay, G. (2015). The role of cognitive disposition indeconstructing the privacy paradox: a neuroscience study.

Ortiz, J., Chih, W. H., & Tsai, F. S. (2018). Information privacy, consumer alienation, and lurking behavior in social networking sites. Computers in Human Behavior, 80, 143-157.

Petty, R. E., Cacioppo, J. T., & Goldman, R. (1981). Personal involvement as a determinant of argument-based persuasion.Journal of personality and social psychology, 41(5), 847.

Sahlin, N. E., Wallin, A., & Persson, J. (2010). Decision science: from Ramsey to dual process theories. Synthese, 172(1), 129-143.

Sarraf, S., & Sun, J. (2016). Functional brain imaging: A comprehensive survey. arXiv preprint arXiv:1602.02225.

Simon, H. A. (1955). A behavioral model of rational choice. The quarterly journal of economics, 69(1), 99-118.

Smith, H. J., Milberg, S. J., & Burke, S. J. (1996). Information privacy: 
measuringindividuals` concerns about organizational practices. MIS quarterly, 
20(2), 167-196.

Spiekermann, S., Grossklags, J., & Berendt, B. (2001, October). E-privacy in 2nd generation E-commerce: privacy preferences versus actual behavior. In Proceedings of the 3rd ACM conference on Electronic Commerce (pp. 38-47). ACM.

Udo, G. J. (2001). Privacy and security concerns as major barriers for e-commerce: a survey study. Information Management & Computer Security, 9(4), 165-174. 74

Van den Broeck, E., Poels, K., & Walrave, M. (2015). Older and wiser? Facebook use, privacy concern, and privacy protection in the life stages of emerging, young, and middle adulthood. Social Media+ Society, 1(2), 2056305115616149.

Wang, T., Duong, T. D., & Chen, C. C. (2016). Intention to disclose personal information via mobile applications: A privacy calculus perspective. International Journal of Information Management, 36(4), 531-542.

Weinberger, M., Bouhnik, D., & Zhitomirsky-Geffet, M. (2017). Factors Affecting Students’ Privacy Paradox and Privacy Protection Behavior. Open Information Science, 1(1), 3-20.

Wijesekera, P., Baokar, A., Hosseini, A., Egelman, S., Wagner, D., &

Beznosov, K. (2015). Android permissions remystified: A field study on contextual integrity. In 24th {USENIX} Security Symposium ({USENIX} Security 15) (pp. 499-514).

Wirtz, J., Lwin, M. O., & Williams, J. D. (2007). Causes and consequences of consumer online privacy concern. International Journal of Service Industry Management, 18(4), 326-348.

Zhang, S., Wang, G., Liu, Q., & Abawajy, J. H. (2018). A trajectory privacy- preserving scheme based on query exchange in mobile social networks. Soft Computing, 22(18), 6121-6133.
zh_TW
dc.identifier.doi (DOI) 10.6814/NCCU201900915en_US