共查询到20条相似文献,搜索用时 15 毫秒
1.
Miriam J. Metzger 《Journal of Computer-Mediated Communication》2007,12(2):335-361
This study applies Petronio's Communication Privacy Management theory (CPM) to understand the tension between information disclosure and privacy within e-commerce relationships. It proposes that consumers manage their privacy concerns through decisions to reveal or conceal information about themselves in interactions with online retailers. The study investigates the degree to which privacy management strategies identified by CPM theory to regulate privacy and disclosure within interpersonal relationships, including withholding and falsifying information, as well as seeking information seeking from a relational partner, operate in the computer-mediated context of e-commerce relational transactions. Findings suggest that online consumers do erect boundaries around personal information and form rules to decide when to reveal information that are consistent with CPM theory. Overall, this study provides knowledge about privacy in online commercial transactions, serves as a basis for more directed theory construction in this arena, and has important practical and policy implications. 相似文献
2.
几乎所有的电话保密系统都使用回波抵消技术来实现全双工通信。不幸的是,由于受实际电话信道特性的影响,该技术至今尚未完全解决这一全双工难题。本文在此介绍一种改进方法,实验表明,使用该方法,可获得类似明话的全双工通信效果。 相似文献
3.
The primary purpose of the current study is to explore whether emotional-display behavior varies on different forms of CMC in a context of one-to-one online chat. Eighty college students (40 males and 40 females) participated in this experiment, and participants were randomly and equally assigned to one of the four different chat conditions (i.e., joint-view, no-view, view-in, and view-out), manipulating visibility (whether or not participants could see their chat partner) and monitorability (whether or not participants could be monitored by their chat partner). In an assigned chat condition, participants were asked to read, consecutively, two different emotional (happy and disgusting) stories typed by their chat partner. The emotional behavior participants displayed while reading the emotional stories was measured by self-reports and a facial-action coding system. Results reveal (1) no main effects for visibility and monitorability on the degree of social presence; (2) significant differences in the use of emotion-management techniques in response to happy and disgust emotions, respectively; and (3) less likelihood of a facial expression of disgust in the monitored conditions than in the unmonitored conditions. The results indicate that there are some differences between text-based chat and video-based chat in terms of emotional-display behavior. These findings make meaningful contributions to the ongoing debate regarding communication behavior in CMC. 相似文献
4.
车联网可有效提高交通的效率和安全性,但通信过程中存在的隐私泄露问题严重阻碍了其应用落地。提出一种面向车联网V2X通信的条件隐私保护认证协议。针对现有协议大多仅支持车辆认证的局限性,基于用户身份和车辆身份信息生成车与用户绑定的生物密钥,使协议支持单车多用户或单用户多车认证。在保护用户和车辆身份的条件下完成对消息发送方的身份认证,并在特定情况下追溯车辆和用户的真实身份,从而实现对车辆和用户的条件隐私保护。同时,在协议中添加批量验证功能以提高验证效率。形式化的安全性分析和性能评估结果表明,该协议是安全且高效的。 相似文献
5.
Aaliya Rajah‐Carrim 《Journal of Computer-Mediated Communication》2009,14(3):484-508
New technologies have affected language use and attitudes in many communities. Kreol, a French‐lexified Creole and the nonstandardised first language of the majority of Mauritians, is now gaining ground as a written language in the specific context of electronic‐mediated communication. This has led to the emergence of writing norms among users of the language. These norms are founded on etymological phonemic and mixed conventions. This study based on data gathered through questionnaires analyses the attitudes of 66 young Mauritians towards the three orthographies used in electronically mediated communication and the standardisation of the language in new technologies. It also briefly discusses some of the spelling conventions used in Internet postings. I show that the etymological system is perceived as most readable, learnable and closest to French. Users believe that Kreol can act as a unifying factor among different ethnolinguistic groups in Mauritius. Responses also highlight the potential of users and electronic‐mediated communication in bringing about the standardisation of Kreol. 相似文献
6.
本文主从防雷与接地两方面对通信电源系统的雷电防护做了简单概述。接地和防雷是保证通信电源系统良好运行的两个重要组成部分,一般包括地网、避雷针(避雷带)、动力防雷系统、监控防雷系统、设备地线等方面,这些措施可以为设备供电系统的正常运行提供保障。 相似文献
7.
为解决因通信网络加密执行能力有限而造成的隐私信息识别异常问题,提升网络体系对于隐私文本的加密处理能力,设计基于区块链的通信网络节点位置隐私加密控制模型;在区块链技术的支持下,建立密码共识机制,再根据智能合约中协议条文的编码形式,求解节点加密差值,完成基于区块链的通信网络节点加密验证;按照信息序列定义条件,建立P盒、S盒两类信息数列处理结构,完成对通信网络节点位置隐私信息数列产生器的设计;规范隐私信息的数据帧格式,根据密钥内容查询结果,确定熵值控制系数的取值范围,再实施熵值校验处理,实现基于区块链的通信网络节点位置隐私加密控制模型的设计;实验结果表明,区块链技术作用下,通信网络在单位时间内所能加密处理的信息样本总量达到了9.8×1013bit,因加密执行能力有限造成的隐私信息识别异常问题得到较好解决,隐私信息样本加密准确性为96.5%,能够加强网络体系在加密处理隐私文本方面的能力。 相似文献
8.
在电力变压器运行过程中,为了预防因铁心多点接地导致接地电流超标而造成的铁心过热和烧毁故障,设计了一种基于无线数据传输技术的变压器铁心接地电流在线监测系统;该系统能够实现对变压器铁心接地电流的实时或定时监测和历史数据的存储,能够在检测到接地线电流超过国家标准后发出报警信号,同时根据电流的大小实现限流电阻的自动投切,最终将接地电流限制在规程要求的范围之内;应用nRF905无线射频收发芯片设计了无线通讯模块,实现了下位机与上位机的无线数据传输。 相似文献
9.
10.
11.
12.
Grounding language in perception 总被引:1,自引:0,他引:1
Jeffrey Mark Siskind 《Artificial Intelligence Review》1994,8(5-6):371-391
This paper describes an implemented computer program that recognizes the occurrence of simple spatial motion events in simulated video input. The program receives an animated line-drawing as input and produces as output a semantic representation of the events occurring in that animation. This paper suggests that the notions ofsupport, contact, andattachment are crucial to specifying many simple spatial motion event types and presents a logical notation for describing classes of events that incorporates such notions as primitives. It then suggests that the truth values of such primitives can be recovered from perceptual input by a process of counterfactual simulation, predicting the effect of hypothetical changes to the world on the immediate future. Finally, it suggests that such counterfactual simulation is performed using knowledge of naive physical constraints such assubstantiality, continuity, gravity, andground plane. This paper describes the algorithms that incorporate these ideas in the program and illustrates the operation of the program on sample input. 相似文献
14.
15.
16.
17.
We study private computations in information-theoretical settings on networks that are not 2-connected. Non-2-connected networks
are “non-private” in the sense that most functions cannot privately be computed on them. We relax the notion of privacy by
introducing lossy private protocols, which generalize private protocols. We measure the information each player gains during
the computation. Good protocols should minimize the amount of information they lose to the players. Throughout this work,
privacy always means 1-privacy, i.e. players are not allowed to share their knowledge. Furthermore, the players are honest
but curious, thus they never deviate from the given protocol. 相似文献
18.
随着车联网不断地发展,车联网为驾乘者提供便捷服务的同时,也带来了相应的隐私保护问题.轨迹数据发布将可能泄露用户位置隐私,从而危害用户人身安全;为改变已有差分隐私保护方法中添加随机噪音的弊端,提出一种基于统计差分隐私的轨迹隐私保护方法.车辆行驶轨迹具有Markov过程的特点,根据车辆轨迹的特征计算轨迹中位置节点敏感度;并根据位置敏感度,统计阈值和敏感度阈值添加适量Laplace噪音;使用平均相对误差评价轨迹数据的可用性大小.实验证实了基于统计差分隐私的轨迹隐私保护方法的可用性和有效性. 相似文献
19.
在移动互联网发展的今天,基于位置服务(LBS)技术在移动互联上取得显著进展。针对个人用户进行精确定位时,数据信息隐私存在着泄露风险的问题,本文提出一种基于本地化差分隐私的地理不可区分性的扰动方法。在用户的真实位置数据信息流出客户端前采用地理不可区分性位置扰动方式,作用于真实位置以得到近似位置数据,服务器端收到后制成二级区域网格图,之后采用差分隐私对该图的工人计数进行扰动,最后在空间范围查询下进行实验验证,并与满足ε-本地化差分隐私扰动算法进行对比,精确度提高2.7%,同时与平均划分隐私预算分配方式进行实验对比,提高区域计数精确度4.57%。 相似文献
20.