首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 50 毫秒
1.
This article focuses on the emerging online Arab public sphere that the web has enabled. It explores how the “local” interacts with the “global,” critically examining their implications on global politics. Specifically looking at online readers' comments about the Swiss minaret ban the so‐called “Ground Zero Mosque,” how does the Arab online public sphere respond to and frame these issues? What implications do these reader frames portend locally and globally? The study analyzes online comments and responses that readers of Al Arabiya.net and Al Jazeera.net posted on related news articles. The article concludes that the new online public sphere does make it possible for Arab citizens to circumvent and challenge traditional authoritarian controls.  相似文献   

2.
3.
4.
Empirical studies of online debate almost universally observe a “dominant” minority of posters. Informed by theories of deliberative democracy, these are typically framed negatively—yet research into their impact on debate is scant. To address this, a typology of what we call super‐participation (super‐posters, agenda‐setters and facilitators) is developed and applied to the http://www.moneysavingexpert.com/ forum. Focusing on the first of these, we found 2,052 superposters (0.4%) contributing 47% of 25m+ posts. While superposters were quantitatively dominant, qualitative content analysis of the discursive practices of 25 superposters (n=40,044) found that most did not attempt to stop other users from posting (curbing) or attack them (flaming). In fact, in contradiction to the received wisdom, super‐posters discursively performed a range of positive roles.  相似文献   

5.
The threat of cyber attacks motivates the need to monitor Internet traffic data for potentially abnormal behavior. Due to the enormous volumes of such data, statistical process monitoring tools, such as those traditionally used on data in the product manufacturing arena, are inadequate. “Exotic” data may indicate a potential attack; detecting such data requires a characterization of “typical” data. We devise some new graphical displays, including a “skyline plot,” that permit ready visual identification of unusual Internet traffic patterns in “streaming” data, and use appropriate statistical measures to help identify potential cyberattacks. These methods are illustrated on a moderate-sized data set (135,605 records) collected at George Mason University.  相似文献   

6.
7.
This study explores whether in the absence of face‐to‐face interaction individuals rely on mediated “clues” for constructing their perceptions of other individuals. Specifically, we assess whether individuals use the information in email usernames to create basic assumptions about the sender of a message. Ninety‐four male and 206 female participants completed self‐report surveys asking their perceptions of an instructor‐assigned, fictional group member including sex, age, race, and work productivity. A majority of participants assigned biological sex, ethnicity, and age to the fictional member. Participants often identified the creative emails as belonging to Caucasian males, while plain usernames were unknown and perceived as significantly more productive. The majority of participants chose to delete the message, listing lack of recognition as a reason for avoidance. These results suggest that email usernames may shape perceptions when other, nonverbal cues are absent.  相似文献   

8.
Drawing on Michel Foucault's theories of subjectivity, this paper conceptualizes early blogging and online diary writing as “technologies of the self,” that is, procedures through which practitioners enacted certain identities as Internet users. This study combines archival research, close analysis of websites, and interviews with their creators. It analyzes how the most defining practices associated with the emergence of these websites in the second half of the 1990s enabled the performance of specific modes of identification for their users, expressed by concepts such as the “online diarist” and the “blogger.” The study broadens our understanding of technologies of the self by considering the role of websites as artifacts in processes of self‐formation on the Internet.  相似文献   

9.
The aim of the present study was to gain a better understanding of the content characteristics that make online consumer reviews a useful source of consumer information. To this end, we content analyzed reviews of experience and search products posted on Amazon.com (N = 400). The insights derived from this content analysis were linked with the proportion of ‘useful’ votes that reviews received from fellow consumers. The results show that content characteristics are paramount to understanding the perceived usefulness of reviews. Specifically, argumentation (density and diversity) served as a significant predictor of perceived usefulness, as did review valence although this latter effect was contingent on the type of product (search or experience) being evaluated in reviews. The presence of expertise claims appeared to be weakly related to the perceived usefulness of reviews. The broader theoretical, methodological and practical implications of these findings are discussed.  相似文献   

10.
The problem of maximum depth of monotone Boolean functions is investigated when k-input AND and OR gates are used for realisation.  相似文献   

11.
Past research has extensively investigated the effect of media, especially focusing on how anonymity increases risk-related behaviors of groups when using computer-mediated communication (CMC). This study extends prior research by examining the differences in group risk-taking behaviors between face-to-face groups and completely non-anonymous CMC groups (i.e., groups working in a fully identified, synchronous CMC environment similar to popular instant messaging systems utilized widely within organizations). Drawing on the “decision analysis” perspective, a key framework for understanding organizational decision-making, the study also examines the effects of the firm's risk preferences as well as the type of information distribution among group members (i.e., full information known to all group members versus partial information know by only some of the members) on the groups' risk-taking behaviors. Results from a laboratory experiment using student subjects found no differences in risk-taking behaviors between CMC and face-to-face groups; additionally, no differences were found related to how information was distributed among group members. A significant effect was found, however, for the risk preference of the firm, showing that risk-neutral firms influenced groups to make riskier decisions than groups from risk-averse firms. Finally, groups within risk-neutral firms receiving partial information made riskier decisions than groups receiving full information. The implications of these results for future research and practice are examined.  相似文献   

12.
By manipulating the imaginary part of the complex-analytic quadratic equation, we obtain, by iteration, a set that we call the “burning ship” because of its appearance. It is an analogue to the Mandelbrot set (M-set). Its nonanalytic “quasi”-Julia sets yield surprizing graphical shapes.  相似文献   

13.
Consider a binary image containing one or more objects. A signed distance transform assigns to each pixel (voxel, etc.), both inside and outside of any objects, the minimum distance from that pixel to the nearest pixel on the border of an object. By convention, the sign of the assigned distance value indicates whether or not the point is within some object (positive) or outside of all objects (negative). Over the years, many different algorithms have been proposed to calculate the distance transform of an image. These algorithms often trade accuracy for efficiency, exhibit varying degrees of conceptual complexity, and some require parallel processors. One algorithm in particular, the Chamfer distance [J. ACM 15 (1968) 600, Comput. Vis. Graph. Image Process. 34 (1986) 344], has been analyzed for accuracy, is relatively efficient, requires no special computing hardware, and is conceptually straightforward. It is understandably, therefore, quite popular and widely used. We present a straightforward modification to the Chamfer distance transform algorithm that allows it to produce more accurate results without increasing the window size. We call this new algorithm Dead Reckoning as it is loosely based on the concept of continual measurements and course correction that was employed by ocean going vessel navigation in the past. We compare Dead Reckoning with a wide variety of other distance transform algorithms based on the Chamfer distance algorithm for both accuracy and speed, and demonstrate that Dead Reckoning produces more accurate results with comparable efficiency.  相似文献   

14.
Serendipity is defined as the art of discovering an unsought finding. Over a thousand examples have been collected and examined, including material from unpublished work by the American sociologist, Robert Merton. It is suggested that serendipity play a supporting but essential role in discoveries in science, technology, the arts and daily life. The phenomenon deserves more serious attention as it may offer prospects of unsought benefits in all these fields of endeavour.  相似文献   

15.
Academic conferences are places of situated learning dedicated to the exchange of knowledge. Knowledge is exchanged between colleagues who are looking to enhance their future research by taking part in several formal and informal settings (lectures, discussions and social events). We studied the processes of knowledge sharing and the influence of the use of IT at the International Conference of Information Systems (ICIS2007) held in Montréal. We describe the categories of knowledge content shared at the conference. Two forms of knowledge sharing were analyzed: formal, guided, planned knowledge sharing in lectures or discussions, and informal knowledge exchange during social events. Data were collected from 274 participants at the conference. The intensity of knowledge sharing in the formal settings was higher compared to the informal settings and was perceived as contributing to future research and to the creation of social relationships. In contrast, informal knowledge sharing contributed mainly to job enhancement and to the initiation of meetings. The discussion centers on planning and evaluating conferences in terms of seeking, creating and sustaining knowledge sharing.  相似文献   

16.
Let g be any local property (e.g., gray level or gradient magnitude) defined on a digital picture. Let pg(z) be the relative frequency with which g has value z. At each point (x,y) of the picture we can display pg[g(x,y)], appropriately scaled; the result is called the pg transform of the picture. Alternatively, we can use joint or conditional frequencies of pairs of local properties to define transforms. This note gives examples of such transforms for various gs and discusses their possible uses and limitations.  相似文献   

17.
随着网络信息技术的发展和电子商务的普及,商业银行竞争越来越激烈,网上银行已成为商业银行今后发展的重点,网上银行的安全性也成为人们关注的焦点。本文介绍了网上银行的三大风险点,并针对风险介绍了防范的措施。  相似文献   

18.
The main objective of the present article is to improve the bandwidth of a low profile Cylindrical Dielectric Resonator Antenna (CDRA) and operate it for WLAN and “C” band applications. An inverted umbrella shaped CDRA excited by a microstrip feedline with single stub is proposed here. Efficient coupling has been achieved by means of a single stub microstrip feed between DRA and the feed. The new shape of DRA and a single stub microstrip feed improves the bandwidth significantly as high as 28% from 5 to 6.67 GHz which is quite useful for both WLAN and “C” band applications. The proposed antenna is simple in construction, easy to fabricate, low profile and thickness of CDRA is only 5 mm. A parametric study is performed using Ansoft HFSS simulation software to optimize the antenna performance. The proposed CDRA is fabricated and the characteristics of the antenna are measured.  相似文献   

19.
European self‐regulation to ensure children's safety on social networking sites requires that providers ensure children are old enough to use the sites, aware of safety messages, empowered by privacy settings, discouraged from disclosing personal information, and supported by easy to use reporting mechanisms. This article assesses the regulatory framework with findings from a survey of over 25000 9‐ to 16‐year‐olds from 25 European countries. These reveal many underage children users, and many who lack the digital skills to use social networking sites safely. Despite concerns that children defy parental mediation, many comply with parental rules regarding social networking. The implications of the findings are related to policy decisions on lower age limits and self‐regulation of social networking sites.  相似文献   

20.
The efficacy of individual components of an online course on positive course outcome was examined via stepwise multiple regression analysis. Outcome was measured as the student’s total score on all exams given during the course. The predictors were page hits, discussion posts, and discussion reads. The vast majority of the variance of outcome was accounted for by total page hits. Participation in discussion had little to no effect on performance as measured by outcome on exams. The results were double cross-validated with a sample chosen from another class. There was no shrinkage, indicating that the equations derived from the two samples were very reliable.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号