共查询到20条相似文献,搜索用时 0 毫秒
1.
随着科技的发展,手机网络犯罪现象越来越多。文章介绍了新时期手机网络犯罪的概念,分析了手机网络犯罪的表现形式和特点,提出了针对手机网络犯罪的几点防范措施。 相似文献
2.
The present study examines the tele‐cocooning hypothesis in the context of general trust using a nationally representative survey of Japanese youth. We find that although frequency of texting is positively correlated with general trust, this correlation is spuriously caused by how heavy mobile texters interpret the words “most people” in the general trust measurement. Heavy users assume that “most people” only refers to friends, family, and others going to the same school. When the effect of the “most people” assumption is controlled, the positive association between texting and general trust disappears. Further exploration of the data shows that heavy texting nevertheless has negative implications for social tolerance and social caution, both of which are theoretically proximate to general trust. 相似文献
3.
Faith N. Kibere 《Information Technology for Development》2016,22(3):47-67
The Kenyan ICT ecosystem has attracted vast global media and policy attention because of notable mobile phone adoption in the country. However, empirical research of how Kenyans use and appropriate new media and ICTs in the diverse contexts within the country remains limited. In order to contribute to the emerging literature on Sub-Saharan Africa ICT ecosystems as well as the Mobility discussions within Mobiles for Development M4D and Information and Communication Technologies for Development ICT4D, this paper discusses an empirical case of how the youth of Kibera use and appropriate the mobile phone and the mobile Internet. The purpose of this critical realist ethnographic research article is to explicate the events in the historical development of the Kenyan ICT ecosystem as well as the components of social and physical structure in Kibera slum along with the relationships between them. This paper argues that the mobile phone eases communication and strengthens existent social ties for the youth of Kibera. However, it cannot bypass the hierarchical nature of Kenya where “class and place of residence are distinctive social markers in the process of social networking” [Wallis, C. (2011). Mobile phones without guarantees: The promises of technology and the contingencies of culture. New Media & Society, 13(3), 471–485. Wallis, C. (2013). Technomobility in China: Young migrant women and mobile phones. New York, NY: New York University Press]. Therefore, the young Kiberans predominantly use and appropriate the mobile phone to network with those in the same lower income strata. This is because they are widely perceived in Kenyan society as the “other and what does not belong” because they are slum residents [Hall, S. (2013). The spectacle of the other. In S. Hall, J. Evans, & S. Nixon (Eds.), Representation: Cultural representations and signifying practices (2nd ed., pp. 223–283). Sage. p. 257]. 相似文献
4.
Mobile geotagging services offer people new ways to interact with and through urban space. In this paper, we focus on a mobile geotagging service called Socialight and the social practices associated with it. In‐depth interviews and participant observation were conducted in order to explore how Socialight's virtual “sticky notes” were used in everyday life. Findings indicated how users communicate about place to help build social familiarity with urban places and communicate through place to allow users to create place‐based narratives and engage in identity management. Such findings deepen our understanding of the social production of space and have implications for future location‐based mobile services. 相似文献
5.
介绍了移动通信和移动互联网的发展及融合过程,给出了社会网络的变迁和传播的历程,最后分析了移动通信网络下社会网络的特征,提出移动通信网络和社会网络的融合为人类社会交往创造了更为广阔的发展空间。 相似文献
6.
人脸识别技术是近几年在全球范围内迅速发展起来的计算机安全技术。该文以高端智能手机的安全应用为载体,结合主元分析法和多权值函数神经网络在人脸识别中的优势,利用非线性多权值函数神经网络实现多主元提取,以及多权值函数神经网络识别。给出了完成人脸图像的检测、特征向量提取、人脸图像识别相对应的硬件系统架构、人脸识别算法流程和算法实现类图。 相似文献
7.
李伟 《计算机技术与发展》2008,18(1):161-163,215
人脸识别技术是近几年在全球范围内迅速发展起来的计算机安全技术.该文以高端智能手机的安全应用为载体,结合主元分析法和多权值函数神经网络在人脸识别中的优势, 利用非线性多权值函数神经网络实现多主元提取,以及多权值函数神经网络识别.给出了完成人脸图像的检测、特征向量提取、人脸图像识别相对应的硬件系统架构、人脸识别算法流程和算法实现类图. 相似文献
8.
情景感知的P2P移动社交网络构造及发现算法 总被引:1,自引:0,他引:1
如何通过情景感知,获得用户的行为特征,从而自动发现潜在的社会关系,是移动社交网络重要的研究内容之一.该文提出了情景感知的移动P2P社交网络系统架构、聚合模型及发现算法,将用户的位置信息、环境特征、运动轨迹等引入到聚合算法中,智能地聚合成潜在的P2P社交网络,根据用户需求自主发现匹配的社会关系,避免了社交活动的盲目性和随意性.最后对该方案和算法进行了理论分析及实验验证,结果表明该文所提出的方案和算法具有较高的响应速度、准确率及用户满意度. 相似文献
9.
就云计算机在手机软件的应用理论研究及实现进行了深入的分析和探讨,具有一定的参考价值。 相似文献
10.
Considering that privacy paradox is currently an underexplored research area, this study proposes a privacy paradox model to explain the reasons behind such phenomenon. Built upon the theoretical link of belief-intention-behaviour and the idea of multi-mediation, this study seeks to discover the relationship between concern for social media information privacy and usage intention, and the potential mediators that stand between such linkage. The results suggest that perceived mobility and social support do mediate the said linkage, and the model could reasonably explain usage intention, which surprisingly has a negative association with usage behaviour. Theoretical and practical implications are subsequently offered. 相似文献
11.
本文简要介绍了USB KEY和蓝牙的技术特点,提供了一种利用蓝牙技术实现在手机等移动设备上完成身份认证密钥功能的方式,把USB KEY的认证方式向移动智能终端上进行了拓展。 相似文献
12.
Mobile social networks,which consist of mobile users who communicate with each other using cell phones,are reflections of people’s interactions in social lives.Discovering typed communities(e.g.,family communities or corporate communities) in mobile social networks is a very promising problem.For example,it can help mobile operators to determine the target users for precision marketing.In this paper we propose discovering typed communities in mobile social networks by utilizing the labels of relationships between users.We use the user logs stored by mobile operators,including communication and user movement records,to collectively label all the relationships in a network,by employing an undirected probabilistic graphical model,i.e.,conditional random fields.Then we use two methods to discover typed communities based on the results of relationship labeling:one is simply retaining or cutting relationships according to their labels,and the other is using sophisticated weighted community detection algorithms.The experimental results show that our proposed framework performs well in terms of the accuracy of typed community detection in mobile social networks. 相似文献
13.
14.
针对移动社交网络中的缺席隐私保护问题,建立用户自定义隐私保护参数模型。设计用户个性化设置隐私参数的方法,给出运动情况下缺席隐私保护的必要条件,并采用泛化方法实现缺席隐私保护及资源的实时发布。在人造数据集上与WYSE算法进行对比,实验结果表明,在计算时间相当的情况下,该算法的发布延时较少。 相似文献
15.
移动性管理是移动通信技术中的一个关键问题,对于移动通信网络的性能具有决定性的作用。该文提出了一种在移动IP环境下的基于分布式注册服务器的指针优化策略,通过在路由器间建立并调整指针,跟踪移动节点的位置变化,使位置更新过程局部化,仅当连接请求到达时,才进行可能的对移动数据库的更新,从而减少网络中移动性管理的开销。该文中同时给出了指针优化策略的两种实现方案。 相似文献
16.
M. Vandenbroeck G. Verschelden & T. Boonaert 《Journal of Computer Assisted Learning》2008,24(3):181-190
Abstract The literature seems to suggest that women may be at risk from being excluded from adult education programmes, which use e-learning, especially when they have low economic status. Based on a survey of 551 women, family day care providers, we conclude that there is a persistent divide in PC access and use, as well as in perceived PC skills according to age. Yet, this divide seems to run less along traditional lines, suggesting that personal factors play a more important role. Motivation and anxiety are two related but distinct personal factors that influence computer use and skills in this population. We also found that these factors are mediated by the family context: motivation is higher when (young) children are present in the family. Moreover, children may represent an important form of social support for women not yet using computers. This study concludes that the concerns about the gender gap in computer use may benefit from taking the scaffolding possibilities of the family into consideration and that there may be a case for growing optimism in the use of information and communication technology for adult learning in specific, gender-segregated professions with low status. 相似文献
17.
Social networks are increasingly becoming important due to many aspects of everyday life supported and being facilitated through on-line activity. Billions of individuals are enjoying the use of social networks today and, therefore, they are becoming an important innovation in the modern world. However, due to disputes and concerns that are associated with such activities, the social networking world has yet to reach its full potential. When disputes occur in the on-line world, measures need be taken to settle those disputes in the same way that they were created. Through solving these disputes, the social networking world will be assisted in reaching full potential. One way of settling user disputes in the social networking world is the use of online arbitration. There are a number of advantages to using online arbitration as the parties involved will only communicate through the Internet and do not need to travel throughout the process. This helps in lowering the litigation costs to all parties involved. Considering the advantages online, arbitration has and the power that the social networking world bares, it is possible for users' disputes to be resolved and encourage communication between masses of users to build their confidence. With confidence that their disputes can be resolved easily, more users will be willing to publicise their profile for other users to view. 相似文献
18.
本文就移动通信网络的发展趋势,探讨LTE宽带移动通信网络技术的进步,通过网络结构分析探讨LTE宽带移动通信网络的关键技术及其应用. 相似文献
19.
Scott Counts 《Computer Supported Cooperative Work (CSCW)》2007,16(1-2):75-97
Communication on mobile devices plays an important role in people’s use of technology for leisure, but to date this communication has largely been one-to-one. Mobile internet connectivity can support a variety of group-based messaging and media sharing scenarios. Switching to group-based messaging should enhance the social and leisure aspects of the communication, but in what ways and to what extent? An experimental system for text and photo messaging on mobile devices was tested in a research deployment to four groups of 6–8 participants who used both a group-based and one-to-one version of the system. Results highlight a significant increase in message sending, in mobile device “fun”, and in the social qualities of mobile communication when messaging group-wide, along with a few minor costs. Qualitative feedback provides further explanation of the social benefits. 相似文献
20.
Dinuka Wijetunga 《Journal of Computer-Mediated Communication》2014,19(3):712-726
Most discussions on the digital divide have predominantly focused on social disparities in the physical accessibility of information and communication technologies (ICT), and the proposed solutions are related to providing low cost access to the underprivileged. The mobile phone has been considered as a good solution due to its relatively low cost. This paper, based on an empirical study in Sri Lanka, demonstrates that even though the underprivileged population has adopted the mobile phone, most of the computer based communication facilities available in the phones are ‘inaccessible’ to such users due the objectification of broader social inequalities in the design of phones. In other words, the digital divide is objectified in the design. 相似文献