首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 15 毫秒
1.
The paper gives an overview of the evolution of the laws protecting personal data privacy in the UK over the last 30 years. Against this background, the author considers: the compromises to personal data privacy brought about by the electronic age; individual motivations for using e-services and the balance of risks and benefits; the place of identity management in e-transactions; and, the ways that data guardianship can be improved by an understanding of the roles and responsibilities of those responsible for personal data in organisations, data handlers and individual citizens. The conclusions reached are that once personal data has been recorded electronically it persists and the divide between public and private space is blurred. Citizens should retain rights to personal data including the right to be asked for their consent before it is shared or linked for commercial or administrative purposes. This puts a particular duty on government to behave (and be perceived to behave) responsibly and transparently with regard to the collection, use and disposal of personal data so as to create trust and support democracy.  相似文献   

2.
This article focuses on the concept of empowerment and the ways in which the Internet is being utilized as an empowering tool. This analysis ranges from the personal to the global levels and the consequences of that empowerment are also discussed. We propose a four-level model that serves to explain what we term E-empowerment and the effects that can be observed at each of the four levels, ranging from (1) the personal; (2) the interpersonal; (3) group; and (4) citizenship. The potential for future development of E-empowerment is also discussed.  相似文献   

3.
基于AD7745的微电容加速度计测量电路设计与实现   总被引:1,自引:0,他引:1  
AD7745是世界上首款24bit数字输出的电容读取芯片,可以测量一对差分电容。它的输入共模偏置电容最大可到17PF,输入电容变化范围为±4pF,采样频率/通频带为10Hz到90Hz。基于AD7745的微电容加速度计测量电路系统有两种输出方式:一方面通过16bit的D/A将数字信号转换成模拟电压信号,实时输出到示波器;另一方面可将AD7745的24bit输出结果通过串口输入到计算机里,由计算机实现波形显示、分析。对PCB布线进行优化后,试验测得采样频率为90.9Hz时,AD7745数据的实际有效位数为14.5bit,对应分辨率为0.37fF。  相似文献   

4.
《Information & Management》2005,42(8):1081-1093
The Internet has made a significant impact on work and the personal lives of people around the world. While access to the Internet has changed the ways work can be carried out, it has also increased the opportunities for people to cyberloaf, while under the guise of doing work. Cyberloafing is the act of employees using their companies’ Internet access for personal purposes during work hours. Our study examined the perceived prevalence and seriousness of various cyberloafing activities through a survey of 226 working adults. We examined how employees justify cyberloafing and the organizational regulation of personal Web usage at their workplace. Results suggest that cyberloafing activities that are perceived to be more serious tend to be less prevalent. We also found that the Internet has made the boundary between work and non-work (home) less distinct, facilitating the intrusion of work into home and personal activities into the work domain. Implications of the results are discussed.  相似文献   

5.
This article questions how people will interact with a quantified past—the growing historical record generated by the increasing use of sensor-based technologies and, in particular, personal informatics tools. In a qualitative study, we interviewed 15 long-term users of different self-tracking tools about how they encountered and made meaning from historical data they had collected. Our findings highlight that even if few people are self-tracking as a form of deliberate lifelogging, many of them generate data and records that become meaningful digital possessions. These records are revealing of many aspects of people’s lives. Through considerable rhetorical data-work, people can appropriate such records to form highly personal accounts of their pasts. We use our findings to identify six characteristics of a quantified past and map an emerging design space for the long-term and retrospective use of personal informatics. Principally, we propose that design should seek to support people in making account of their data and guard against the assumption that more, or “better,” data will be able to do this for them. To this end, we speculate on design opportunities and challenges for experiencing, curating, and sharing historical personal data in new ways.  相似文献   

6.
The ethical monitoring of brain-machine interfaces (BMIs) is discussed in connection with the potential impact of BMIs on distinguishing traits of persons, changes of personal identity, and threats to personal autonomy. It is pointed out that philosophical analyses of personhood are conducive to isolating an initial thematic framework for this ethical monitoring problem, but a contextual refinement of this initial framework depends on applied ethics analyses of current BMI models and empirical case-studies. The personal autonomy-monitoring problem is approached by identifying various ways in which the inclusion of a robotic controller in the motor pathway of an output BMI may limit or jeopardize personal autonomy.  相似文献   

7.
Recent research has illuminated some of the ways in which multilingual writers project multiple identities in their writing, conveying disciplinary allegiances as well as more personal expressions of individuality. Such work has focused on the writers’ uses of various verbal expressions, but has to this point overlooked the ways in which they manipulate the visual mode as a means for identity expression. The present study examines expressions of identity in a corpus of multimodal texts written by four multilingual graduate student writers. I consider how the writers’ uses of various verbal and visual expressions in their Microsoft PowerPoint presentation slides project both disciplinarity and individuality and how each individual's habitus has been influenced by both the discourses they have encountered and their personal reactions towards those discourses.  相似文献   

8.
In higher education, instruction is typically teacher-directed through traditional lecture formats and assignments with predetermined criteria. Through hypermedia-based materials, new ways of learning are possible based on learner control and self-directed instruction; such approaches require personal goal-setting, nonlinear exploration of materials, context-based problem solving, and progress monitoring. For students to learn in new ways, instructors have to teach in new ways. Teachers cannot simply take new hypermedia applications and implement them within existing approaches if higher level outcomes are to be realized. The findings in this study are consistent with previous research studies which demonstrate equal or better learning using hypermedia-based instructional materials when students are allowed learner control. If the learning profile for each student determines the effective use of an application, then hypermedia is best implemented as a learning tool.  相似文献   

9.
The present work, through an ethnographic study of MySpace (N = 96), examines the ways in which authenticity is accomplished within a labor-exposing space. To maintain authenticity, actors must make invisible the extensive labor of self-presentation. Certain online spaces, such as social network sites and personal interactive homepages, can be thought of as labor-exposing spaces, in that they give actors clear and explicit control over self-representations, making impressions of spontaneity difficult to accomplish ( ,  and ). I discuss and delineate several strategies used by participants to maintain authenticity on MySpace. I conclude that while the priorities of identity processes remain stable over time, the ways in which we accomplish identity are culturally, historically and materially contingent.  相似文献   

10.
网络已逐渐深入人们的生活,它在带来便利的同时也带来了各种问题,个人信息和隐私的泄露成了网络对人们最大的伤害,认清个人信息泄露危害,分析个人信息泄露途径以及提出如何有效保护个人信息的建议是本文主要探讨的内容。  相似文献   

11.
Social media provides a great deal of information about the users; whether it is personal likes or dislikes, social connections and networks, or general emotional states in ways not previously available to others. As a result, judgments and perceptions of a person’s credibility can be made from examining posts, tweets, or other indicators on social media (Westerman, Spence, & Van Der Heide, 2012). Because social media users create their own content, the question of how others make judgments about credibility is important (Haas & Wearden, 2003). However, until recently, a single indicator of a person’s influence on social media networks did not exist. Klout.com developed an popular indicator of this influence that creates a single score based on the idea that “everyone has influence—the ability to drive action”. The purpose of the study is to determine whether and to what degree a Klout score can influence perceptions of credibility. Results demonstrated that the mock Twitter page with a high Klout score was perceived as higher in dimensions of credibility than the identical mock Twitter page with a moderate or low Klout score.  相似文献   

12.
The rapid growth of contemporary social network sites (SNSs) has coincided with an increasing concern over personal privacy. College students and adolescents routinely provide personal information on profiles that can be viewed by large numbers of unknown people and potentially used in harmful ways. SNSs like Facebook and MySpace allow users to control the privacy level of their profile, thus limiting access to this information. In this paper, we take the preference for privacy itself as our unit of analysis, and analyze the factors that are predictive of a student having a private versus public profile. Drawing upon a new social network dataset based on Facebook, we argue that privacy behavior is an upshot of both social influences and personal incentives. Students are more likely to have a private profile if their friends and roommates have them; women are more likely to have private profiles than are men; and having a private profile is associated with a higher level of online activity. Finally, students who have private versus public profiles are characterized by a unique set of cultural preferences—of which the “taste for privacy” may be only a small but integral part.  相似文献   

13.
信用卡公司是一个服务性的金融企业,如何提高在服务过程中的服务质量,改进服务方法,使公司的决策更为准确及时,是信用卡公司追求的一个目标。本文介绍了神经网络方法及数据挖掘技术在信用卡公司对用户评分中的应用,对比分析了几种个人信用评分模型建模方法的特点,建立了一种决策树-神经网络个人信用评分模型,并针对该模型提出了一种近邻聚类算法,该算法在信用评分应用中可以得到较理想的结果。  相似文献   

14.
Biometrics R&D has to deal with personal data. From the Universal Declaration of Human Rights, privacy of a human being shall be protected, and this is addressed in different ways in each region of the world. In the case of the European Union, Data Protection Directives, Laws and Regulations have been established, and interpreted in different ways by each European Member State. Such a diversity has pushed the European Union to generate an improved regulation that will be mandatory from May 2018. Biometric R&D shall not only comply with the current Directive, but also has to adapt its work to the new Regulation. This work is intended to describe the situation and provide a recommended procedure when having to acquire personal data. The recommended procedure is illustrated by the implementation of a Biometric Data Acquisition Platform, used to acquire fingerprints from nearly 600 citizens using different sensors.  相似文献   

15.
This study expands on the ‘internet-attribute-perception’ model that explains how online attributes (i.e. reduced cues and controllability) and the disinhibition effect mediate the relationship between personal characteristics and online self-disclosure. The current study tested this model for two distinct modes of Facebook communication: private and public, focussing on the personal characteristic of social anxiety. Using path analysis on a sample of 306 participants (Mean age = 20.52 years, SD = 1.45, 65.69% female), the model was partially replicated showing support in private but not public modes of Facebook communication. Although there was a positive relationship between social anxiety and the perceived value of the online attributes in public Facebook communication, this did not lead to the disinhibition effect. The study discusses potential differences between these two ways of communication but highlights that more private ways of online communication may be vital for socially anxious individuals in terms of relational development.  相似文献   

16.
This essay focuses on the blogs authored by students in interdisciplinary, writing-intensive seminars on the art and science of dreaming at Queens College and Princeton University. The writing for these courses requires students to “invent the university” in the sense that they must find ways to bridge the public and private, or the theoretical and the personal. I argue that blogs have the potential to help students develop strong and distinctive voices in the pursuit of intellectual inquiry—and that because of this, they can help teachers and scholars overcome the intellectual divides between the “expressivist” and “constructivist” pedagogies represented by Peter Elbow and David Bartholomae respectively. In the concluding section, I examine blog entries in which students recount instances in which they dreamed about our course readings (and other materials). These accounts are striking because they offer evidence that students were internalizing and synthesizing course material. To explain this internalization and synthesis, I turn to recent developments in cognitive theory that offer new ways of thinking about learning that I believe will help bridge the expressivist-constructivist divide and develop methods for teaching voice as a rhetorical element of writing, one that is essential to intellectual inquiry.  相似文献   

17.
Privacy policies are widely used by online service providers to regulate the use of personal data they collect, but users often skip on reading them and are unaware of the way information about them is being treated, and how they can control the ways in which that information is collected, stored or shared. Eye tracking methodology was used to test if a default presentation of a policy encourages reading it, and how the document is being read by users. Results show that when a privacy policy is presented by default, participants tend to read it quite carefully, while when given the option to sign their agreement without reading the policy, most participants skip the policy altogether. Surprisingly, participants who actively choose to read the policy spend significantly less time and effort on reading it than participants in the default condition. Finally, default policy presentation was significantly related to understanding user rights and restrictions on the use of personal data.  相似文献   

18.
PLC和计算机间串行通讯方式及程序设计   总被引:8,自引:2,他引:8  
在PLC与计算机间通讯规约的基础上,具体解释了CQMl型PLC与计算机间通讯的通讯命令与响应命令格式,给出了PLC和计算机间通讯的两种通讯方法和使用这两种通讯方法是相应的程序设计。  相似文献   

19.
提出一种成本低、实用性高、通用性强的大学生宿舍监控与报警系统,该系统利用学生宿舍普通摄像头、个人电脑、手机和互联网实现。系统能自动检测异常情况并发出报警信息,报警信息主要包括:手机信息报警、声音信息报警、电子邮箱信息报警等。实验结果表明,系统运行良好,报警信息准确。系统可以推广到办公室、商铺、煤矿等其它场所。  相似文献   

20.
Personal Identity,Agency and the Multiplicity Thesis   总被引:1,自引:0,他引:1  
I consider whether there is a plausible conception of personal identity that can accommodate the ‘Multiplicity Thesis’ (MT), the thesis that some ways of creating and deploying multiple distinct online personae can bring about the existence of multiple persons where before there was only one. I argue that an influential Kantian line of thought, according to which a person is a unified locus of rational agency, is well placed to accommodate the thesis. I set out such a line of thought as developed by Carol Rovane, and consider the conditions that would have to be in place for the possibility identified by MT to be realised. Finally I briefly consider the prospects for MT according to neo-Lockean and animalist views of personhood.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号