移动互联网时代老年人的密码风险差异研究Exploring the Differences in Password Risk Perception of the Elderly in the Mobile Internet Era
陈宏亮,蒲韵莎
摘要(Abstract):
移动互联网的普及为老年人带来了便利,同时也蕴含着一定的风险。在移动互联网应用的使用过程中,老年人易采用简单的密码组合,密码被盗会造成个人信息泄露、财产损失,给老年人的生活带来极大的困扰。本研究结合数字鸿沟和保护动机理论,探究了老年人采用不安全的密码策略的原因,考察了老年群体的人口统计因素对密码风险感知和管理策略的影响,并进一步验证了高风险密码管理策略和网络诈骗信息暴露之间的关联。通过问卷调查法,本研究发现,风险暴露性感知不足易导致老年人采用高风险密码组合,对互联网平台的信任与不安全的密码策略呈正相关关系。此外,学历和收入较低的老年人易使用简单、易被破解的密码;相比男性,女性老年人的密码使用风险更高。
关键词(KeyWords): 密码风险;数字鸿沟;保护动机理论;老年群体;网络诈骗信息暴露
基金项目(Foundation): 2020年国家社会科学基金青年项目“老年人网络风险认知及防御研究”(项目编号:20CXW017)阶段性研究成果
作者(Author): 陈宏亮,蒲韵莎
参考文献(References):
- 刘雅辉、张铁赢、靳小龙、程学旗(2015):大数据时代的个人隐私保护,《计算机研究与发展》,第52卷第1期,229-247页。
- 陆杰华、韦晓丹(2021):老年数字鸿沟治理的分析框架、理念及其路径选择——基于数字鸿沟与知沟理论视角,《人口研究》,第45卷第3期,17-30页。
- 孟晓明、贺敏伟(2015):社交网络大数据商业化开发利用中的个人隐私保护,《图书馆论坛》,第6期,67-75页。
- 韦路、张明新(2006):第三道数字鸿沟:互联网上的知识沟,《新闻与传播研究》,第13卷第4期,43-53页。
- 徐芳、马丽(2020):国外数字鸿沟研究综述,《情报学报》,第39卷第11期,1232-1244页。
- 徐越、韵卓敏、王婧媛、景荣杰、黄黎明、沈勤(2020):智能化背景下,老年人数字鸿沟的影响因素及其形成过程分析,《智能计算机与应用》,第10卷第2期,75-82页。
- Al-Saggaf,Y.& Nielsen,S.(2014).Self-disclosure on Facebook among female users and its relationship to feelings of loneliness.Computers in Human Behavior,36,460-468.doi:10.1016/j.chb.2014.04.014.
- Alves,L.M.& Wilson,S.R.(2008).The effects of loneliness on telemarketing fraud vulnerability among older adults.Journal of Elder Abuse & Neglect,20(1),63-85.doi:10.1300/J084v20n01_04.
- Bonfadelli,H.(2002).The Internet and knowledge gaps:A theoretical and empirical investigation.European Journal of Communication,17(1),65-84.doi:10.1177/0267323102017001607.
- Button,M.,Lewis,C.& Tapley,J.(2014).Not a victimless crime:The impact of fraud on individual victims and their families.Security Journal,27(1),36-54.doi:10.1057/sj.2012.11.
- Byrnes,J.P.,Miller,D.C.& Schafer,W.D.(1999).Gender differences in risk taking:A meta-analysis.Psychological bulletin,125(3),367.doi:10.1037/0033-2909.125.3.367.
- Chakraborty,R.,Vishik,C.& Rao,H.R.(2013).Privacy preserving actions of older adults on social media:Exploring the behavior of opting out of information sharing.Decision Support Systems,55(4),948-956.doi:10.1016/j.dss.2013.01.004.
- Chen,H.L.,Beaudoin,C.E.& Hong,T.(2017).Securing online privacy:An empirical test on Internet scam victimization,online privacy concerns,and privacy protection behaviors.Computers in Human Behavior,70,291-302.doi:10.1016/j.chb.2017.01.003.
- Cho,H.,Lee,J.S.& Chung,S.(2010).Optimistic bias about online privacy risks:Testing the moderating effects of perceived controllability and prior experience.Computers in Human Behavior,26(5),987-995.doi:10.1016/j.chb.2010.02.012.
- Golla,M.,Wei,M.,Hainline,J.,Filipe,L.,Dürmuth,M.,Redmiles,E.& Ur,B.(2018).“What was that site doing with my Facebook password?”:Designing password-reuse notifications.In Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security (pp.1549-1566).Toronto,Canada:ACM.doi:10.1145/3243734.3243767.
- Grimes,G.A.,Hough,M.G.,Mazur,E.& Signorella,M.L.(2010).Older adults' knowledge of internet hazards.Educational Gerontology,36(3),173-192.doi:10.1080/03601270903183065.
- Hong,H.(2011).An extension of the extended parallel process model (EPPM) in television health news:The influence of health consciousness on individual message processing and acceptance.Health Communication,26(4),343-353.doi:10.1080/10410236.2010.551580.
- Huang,H.Y.& Bashir,M.(2018).Surfing safely:Examining older adults' online privacy protection behaviors.Proceedings of the Association for Information Science and Technology,55(1),188-197.doi:10.1002/pra2.2018.14505501021.
- Kaye,J.J.(2011).Self-reported password sharing strategies.In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (pp.2619-2622).Vancouver,BC,Canada:ACM.doi:10.1145/1978942.1979324.
- Maddux,J.E.& Rogers,R.W.(1983).Protection motivation and self-efficacy:A revised theory of fear appeals and attitude change.Journal of Experimental Social Psychology,19(5),469-479.doi:10.1016/0022-1031(83)90023-9.
- Mohamed,N.& Ahmad,I.H.(2012).Information privacy concerns,antecedents and privacy measure use in social networking sites:Evidence from Malaysia.Computers in Human Behavior,28(6),2366-2375.doi:10.1016/j.chb.2012.07.008.
- Olmstead,K.& Smith,A.(2017).Americans and cybersecurity.Retrieved from https://www.pewresearch.org/internet/2017/01/26/americans-and-cybersecurity/
- Peduzzi,P.,Dao,H.,Herold,C.& Mouton,F.(2009).Assessing global exposure and vulnerability towards natural hazards:The disaster risk index.Natural Hazards and Earth System Sciences,9(4),1149-1159.doi:10.5194/nhess-9-1149-2009.
- Tanriverdi,H.& Chen,H.(2018) Government's digital surveillance and citizens' self-censorship of technology use.Proceedings of 39th International Conference on Information Systems (Societal Impact of IS & The Future of Work),1(7),1-17.
- Van Deursen,A.J.A.M.& Van Dijk,J.A.G.M.(2010).Measuring internet skills.International Journal of Human-Computer Interaction,26(10),891-916.doi:10.1080/10447318.2010.496338.
- Zeissig,E.M.,Lidynia,C.,Vervier,L.,Gadeib,A.& Ziefle,M.(2017).Online privacy perceptions of older adults.In 3rd International Conference on Human Aspects of IT for the Aged Population (pp.181-200).Vancouver,BC,Canada:Springer.doi:10.1007/978-3-319-58536-9_16.