污名化视角下的网络诈骗风险:媒介信息对进城务工人员诈骗防护的双重影响A Stigma Perspective on Online Fraud Risks: Dual Media Effects on Migrant Workers' Online Fraud Prevention Behaviors
陈宏亮,郭一锦
摘要(Abstract):
媒介中有关网络诈骗的内容成为近年热点,其中既包括反诈的宣教,也包括对于受害者的指责。基于保护动机理论,本研究引入污名化信念、主观规范、感知歧视等维度,旨在探讨媒介信息对于进城务工人员预防诈骗行为的双重影响。对521名进城务工人员的问卷调查发现,指责诈骗受害者的媒介内容一方面增强了进城务工人员的威胁评估和主观规范,同时导致了受害者污名化信念,阻碍了保护策略的采纳。媒介反诈信息则正面影响了进城务工人员的威胁评估、应对评估,并减轻了污名化信念,促进了保护策略的推广。此外,感知歧视程度作为调节变量,放大了污名化信念的负面作用,削弱了应对效能感的积极影响。
关键词(KeyWords): 进城务工人员;网络诈骗;污名化信念;感知歧视;保护动机理论
基金项目(Foundation):
作者(Author): 陈宏亮,郭一锦
参考文献(References):
- 陈宏亮、陈月盈(2023):家长干预、平台规范对青少年手游隐私风险管理影响研究,《新闻春秋》,第1期,53-65页。
- 陈宏亮、蒲韵莎(2023):移动互联网时代老年人的密码风险差异研究,《全球传媒学刊》,第10卷第6期,39-55页。
- 段秋婷、谢兴政(2021):以小共同体本位为特征的社交媒体用户隐私保护意向形成机制,《图书情报工作》,第65卷第6期,118-128页。
- 管成云(2017):网吧里的农民工——新媒体时代新生代农民工城市融入中的新贫困问题研究,《新闻记者》,第5期,4-16页。
- 国家统计局(2024):《2023年农民工监测调查报告》,北京:国家统计局。
- 李锦辉、张缘(2022):信息疫情视角下儿童家长的疫苗犹豫机制研究,《全球传媒学刊》,第9卷第3期,16-34页。
- 宋红岩(2016):“数字鸿沟”抑或“信息赋权”?——基于长三角农民工手机使用的调研研究,《现代传播》,第38卷第6期,132-137页。
- 王璐瑶、李琪、乔志林、刘帅(2019):保护动机对社交网络用户隐私关注和隐私安全保护行为的影响研究,《情报杂志》,第38卷第10期,104-110页。
- 殷猛、李琪(2016):基于保护动机理论的健康APP用户使用研究,《现代情报》,第36卷第7期,63-70页。
- 袁靖华(2015):关系障碍:人际传播视角下的边缘身份融入——基于在浙新生代农民工的社会调查,《新闻与传播研究》,第22卷第5期,58-72,127页。
- 中国互联网络信息中心(2023):第52次《中国互联网络发展状况统计报告》,北京:中国互联网络信息中心。
- Abawajy,J.(2014).User preference of cyber security awareness delivery methods.Behaviour & Information Technology,33(3),237-248.doi:10.1080/0144929X.2012.708787.
- Anderson,C.L.& Agarwal,R.E.(2010).Practicing safe computing:A multimedia empirical examination of home computer user security behavioral intentions.MIS Quarterly,34(3),613-643.
- Anrijs,S.,Mari?n,I.,De Marez,L.& Ponnet,K.(2023).Excluded from essential internet services:Examining associations between digital exclusion,socio-economic resources and internet resources.Technology in Society,73,102211.doi:10.1016/j.techsoc.2023.102211.
- Boss,S.R.,Galletta,D.F.,Lowry,P.B.,Moody,G.D.& Polak,P.(2015).What do systems users have to fear?Using fear appeals to engender threats and fear that motivate protective security behaviors.MIS Quarterly,39(4),837-864.doi:10.25300/MISQ/2015/39.4.5.
- Budenz,A.,Klassen,A.,Purtle,J.,Yom Tov,E.,Yudell,M.& Massey,P.(2020).Mental illness and bipolar disorder on Twitter:Implications for stigma and social support.Journal of Mental Health,29(2),191-199.doi:10.1080/09638237.2019.1677878.
- Button,M.& Cross,C.(2017).Cyber frauds,scams and their victims.London:Routledge.
- Chen,H.L.,Pu,Y.S.& Atkin,D.(2023).Migration stress,risky Internet uses,and scam victimization:An empirical study among Chinese migrant workers.Telematics and Informatics,83,102022.doi:10.1016/j.tele.2023.102022.
- Chen,H.& Yuan,Y.F.(2023).The impact of ignorance and bias on information security protection motivation:A case of e-waste handling.Internet Research,33(6),2244-2275.doi:10.1108/INTR-04-2022-0238.
- Chennamaneni,A.& Gupta,B.(2023).The privacy protection behaviours of the mobile app users:Exploring the role of neuroticism and protection motivation theory.Behaviour & Information Technology,42(12),2011-2029.doi:10.1080/0144929X.2022.2106307.
- Cort,D.A.& Tu,H.F.(2018).Safety in stigmatizing?Instrumental stigma beliefs and protective sexual behavior in Sub-Saharan Africa.Social Science & Medicine,197,144-152.doi:10.1016/j.socscimed.2017.12.007.
- Cort,D.A.,Reynolds,K.& Chakraborty,D.(2023).HIV stigma beliefs and unprotected sex among teenagers and young adults in sub-Saharan Africa:The moderating role of mass media exposure.Social Science & Medicine,317,115615.doi:10.1016/j.socscimed.2022.115615.
- Cross,C.(2015).No laughing matter:Blaming the victim of online fraud.International Review of Victimology,21(2),187-204.doi:10.1177/0269 758015571471.
- Cross,C.(2018).Denying victim status to online fraud victims:The challenges of being a ‘non-ideal victim’.In Duggan,M.(Ed,),Revisiting the ‘Ideal Victim’:Developments in Critical Victimology (pp.243-262).United Kingdom:Policy Press.doi:10.1332/policypress/9781447338765.003.0015.
- De Kimpe,L.,Ponnet,K.,Walrave,M.,Snaphaan,T.,Pauwels,L.& Hardyns,W.(2020).Help,I need somebody:Examining the antecedents of social support seeking among cybercrime victims.Computers in Human Behavior,108,106310.doi:10.1016/j.chb.2020.106310.
- De Kimpe,L.,Walrave,M.,Verdegem,P.& Ponnet,K.(2022).What we think we know about cybersecurity:An investigation of the relationship between perceived knowledge,internet trust,and protection motivation in a cybercrime context.Behaviour & Information Technology,41(8),1796-1808.doi:10.1080/0144929X.2021.1905066.
- Dodel,M.& Mesch,G.(2018).Inequality in digital skills and the adoption of online safety behaviors.Information,Communication & Society,21(5),712-728.doi:10.1080/1369118X.2018.1428652.
- Floyd,D.L.,Prentice-Dunn,S.& Rogers,R.W.(2000).A meta-analysis of research on protection motivation theory.Journal of Applied Social Psychology,30(2),407-429.doi:10.1111/j.1559-1816.2000.tb02323.x.
- Gerbner,G.& Gross,L.(1976).Living with television:The violence profile.Journal of Communication,26(2),172-199.doi:10.1111/j.1460-2466.1976.tb01397.x.
- Hair,J.F.,Black,W.C.,Babin,B.J.& Anderson,R.E.(2010).Multivariate data analysis:A global perspective.Upper Saddle River,NJ:Prentice-Hall.
- Heartfield,R.& Loukas,G.(2018).Detecting semantic social engineering attacks with the weakest link:Implementation and empirical evaluation of a human-as-a-security-sensor framework.Computers & Security,76,101-127.doi:10.1016/j.cose.2018.02.020.
- Hong,S.J.(2018).Gendered cultural identities:The influences of family and privacy boundaries,subjective norms,and stigma beliefs on family health history communication.Health Communication,33(8),927-938.doi:10.1080/10410236.2017.1322480.
- Hu,L.T.& Bentler,P.M.(1999).Cutoff criteria for fit indexes in covariance structure analysis:Conventional criteria versus new alternatives.Structural Equation Modeling:A Multidisciplinary Journal,6(1),1-55.doi:10.1080/10705519909540118.
- Jansen,J.,Veenstra,S.,Zuurveen,R.& Stol,W.(2016).Guarding against online threats:Why entrepreneurs take protective measures.Behaviour & Information Technology,35(5),368-379.doi:10.1080/0144929X.2016.1160287.
- Joffe,H.(1995).Social representations of AIDS:Towards encompassing issues of power.Papers on Social representations,4(1),29-40.
- Lai,F.J.,Li,D.H.& Hsieh,C.T.(2012).Fighting identity theft:The coping perspective.Decision Support Systems,52(2),353-363.doi:10.1016/j.dss.2011.09.002.
- Li,J.& Rose,N.(2017).Urban social exclusion and mental health of China's rural-urban migrants—A review and call for research.Health & Place,48,20-30.doi:10.1016/j.healthplace.2017.08.009.
- Maddux,J.E.& Rogers,R.W.(1983).Protection motivation and self-efficacy:A revised theory of fear appeals and attitude change.Journal of Experimental Social Psychology,19(5),469-479.doi:10.1016/0022-1031(83)90023-9.
- Martens,M.,De Wolf,R.& De Marez,L.(2019).Investigating and comparing the predictors of the intention towards taking security measures against malware,scams and cybercrime in general.Computers in Human Behavior,92,139-150.doi:10.1016/j.chb.2018.11.002.
- Mou,J.,Cohen,J.F.,Bhattacherjee,A.& Kim,J.(2022).A test of protection motivation theory in the information security literature:A meta-analytic structural equation modeling approach.Journal of the Association for Information Systems,23(1),196-236.doi:10.17705/1jais.00723.
- Rogers,R.W.(1975).A protection motivation theory of fear appeals and attitude change.The Journal of Psychology,91(1),93-114.doi:10.1080/00223980.1975.9915803.
- Schmitt,M.T.,Branscombe,N.R.,Postmes,T.& Garcia,A.(2014).The consequences of perceived discrimination for psychological well-being:A meta-analytic review.Psychological Bulletin,140(4),921-948.doi:10.1037/a0035754.
- Smith,R.A.(2007).Language of the lost:An explication of stigma communication.Communication Theory,17(4),462-485.doi:10.1111/j.1468-2885.2007.00307.x.
- Smith,R.A.,Zhu,X.& Quesnell,M.(2016).Stigma and health/risk communication.In Nussbaum,J.F.(Ed.),Oxford Research Encyclopedia of Communication.New York:Oxford University Press.doi:10.1093/acrefore/9780190228613.013.
- Smith,R.A.,Zhu,X.& Fink,E.L.(2019).Understanding the effects of stigma messages:Danger appraisal and message judgments.Health Communication,34(4),424-436.doi:10.1080/10410236.2017.1405487.
- Steinmetz,K.F.,Pimentel,A.& Goe,W.R.(2021).Performing social engineering:A qualitative study of information security deceptions.Computers in Human Behavior,124,106930.doi:10.1016/j.chb.2021.106930.
- Sun,L.(2019).Rural urban migration and policy intervention in China (pp.2160-2184).Singapore:Palgrave.
- Tang,Z.Y.,Miller,A.S.,Zhou,Z.Y.& Warkentin,M.(2021).Does government social media promote users' information security behavior towards COVID-19 scams?Cultivation effects and protective motivations.Government Information Quarterly,38(2),101572.doi:10.1016/j.giq.2021.101572.
- Thompson,N.,McGill,T.J.& Wang,X.Q.(2017).“Security begins at home”:Determinants of home computer and mobile device security behavior.Computers & Security,70,376-391.doi:10.1016/j.cose.2017.07.003.
- Ticona,J.(2022).Red flags,sob stories,and scams:The contested meaning of governance on carework labor platforms.New Media & Society,24(7),1548-1566.doi:10.1177/14614448221099233.
- Tsai,H.Y.S.,Jiang,M.T.,Alhabash,S.,LaRose,R.,Rifon,N.J.& Cotten,S.R.(2016).Understanding online safety behaviors:A protection motivation theory perspective.Computers & Security,59,138-150.doi:10.1016/j.cose.2016.02.009.
- Verkijika,S.F.(2019).“If you know what to do,will you take action to avoid mobile phishing attacks”:Self-efficacy,anticipated regret,and gender.Computers in Human Behavior,101,286-296.doi:10.1016/j.chb.2019.07.034.
- Wang,B.,Li,X.M.,Stanton,B.& Fang,X.Y.(2010).The influence of social stigma and discriminatory experience on psychological distress and quality of life among rural-to-urban migrants in China.Social Science & Medicine,71(1),84-92.doi:10.1016/j.socscimed.2010.03.021.
- Wang,W.R.& Liu,Y.(2015).Communication message cues and opinions about people with depression:An investigation of discussion on Weibo.Asian Journal of Communication,25(1),33-47.doi:10.1080/01292986.2014.989238.
- Wong,D.F.K.& Song,H.X.(2008).The resilience of migrant workers in Shanghai China:The roles of migration stress and meaning of migration.International Journal of Social Psychiatry,54(2),131-143.doi:10.1177/0020764007083877.
- Zhang,M.Q.,Zhu,C.J.& Nyland,C.(2014).The institution of Hukou-based social exclusion:A unique institution reshaping the characteristics of contemporary urban China.International Journal of Urban and Regional Research,38(4),1437-1457.doi:10.1111/j.1468-2427.2012.01185.x.