The electronic mail (EM) network in a large, multi-campus community college district was used by some employees to gain support for positions contrary to those of the leadership. The case study offered an opportunity to look at technology within an organizational setting. It raised questions about the loose coupling of the educational organization's technical and authority systems, about the strength of coupling among employee groups during the incident, about the boundaries of the EM political activists, and about the power manifested within educational organization's technical and authority systems. A variety of research methods (stages of event progression, fantasy types associated with consciousness-building, and evidence of user technical and rhetorical skills) were used to answer questions about the organization's loosely coupled systems during the EM political incident. Notes were taken of conversations and more formal interviews. From this the technical and authority systems of the institution were described and compared. Results indicated that (1) the loose coupling of the technical and the authority systems made the EM political incident possible; (2) employees were more tightly coupled on organizational goals and more loosely coupled on organizational means; (3) political activists did not make full use of the EM's political medium potential; and (4) when the college district's administration refused to limit anyone's use of the EM network, they reinforced the integrity of both the authority and the technical systems.
Implications included: (1) the potential of some of the research methods for EM study, especially fantasy theme analysis; (2) a political interpretation of EM language, especially flaming; (3) the importance of technical and rhetorical skills for mature EM users; and (4) the role of the authority and technical systems in the debate about appropriate EM network use within an organization. 相似文献
Client/server, open systems, joint application development, and legacy systems—what happens when the silver bullet meets the glass house? And what does all of this have to do with end-user computing, anyway? Read this column and find out. 相似文献
We present a number of alternative ways of handling transitive binary relations that commonly occur in first-order problems, in particular equivalence relations, total orders, and transitive relations in general. We show how such relations can be discovered syntactically in an input theory, and how they can be expressed in alternative ways. We experimentally evaluate different such ways on problems from the TPTP, using resolution-based reasoning tools as well as instance-based tools. Our conclusions are that (1) it is beneficial to consider different treatments of binary relations as a user, and that (2) reasoning tools could benefit from using a preprocessor or even built-in support for certain types of binary relations.
Cubature formulae of degree 11 with minimal numbers of knots for the integral $$\int\limits_{ - 1}^1 { \int\limits_{ - 1}^1 {(1 - x^2 )^\alpha } } (1 - y^2 )^\alpha f(x,y) dxdy \alpha > - 1$$ which are invariant under rotation over an angle π/2 are determined by a system of 18 nonlinear equations in 18 unknowns. We start with a known solution for this system for α=0. By varying α smoothly, the knots and weights of the cubature formula vary smoothly except in the singular solutions such as turning points and bifurcation points where new solutions branches arise. We use for this purpose the program AUTO. We obtain surprisingly many branches of cubature formulae. 相似文献
Contends that Freud discovered transference in connection with material derived from his treatment of Emma Eckstein. The last chapter of Studies on Hysteria by J. Breuer and S. Freud (1895) in which Freud's 1st published use of the term transference occurs, can be read as a working through of the crisis that occurred when Eckstein nearly died. This concept, it is argued, explained Freud's patient's disturbed feelings toward him as a "false connection" and thereby helped to free him of feelings of personal involvement in her libidinal demands. The story of the troubled circumstances under which Freud discovered transference provides insight into the defensive nature of the concept. (PsycINFO Database Record (c) 2010 APA, all rights reserved) 相似文献
The morphology, composition and the electrical and electrochemical behaviour of the anodic microporous layer, prepared by the galvanostatic anodisation of Ti after sparking, followed by galvanostatic deposition of Pt or Ir have been investigated. These electrodes are proposed to function as dimensionally stable anodes (DSAs). For Ti/TiO2/Pt electrodes, Pt is deposited within some of the micropores of the oxide film. In contrast, for Ti/TiO2/Ir, the metal is deposited preferentially on the top surface. This difference is thought to result from the position of the metal deposition potential with respect to the flat band potential of n-TiO2. Optical imaging of both types of DSA suggests that only a few sites on the surface are responsible for electron exchange at the DSA-electrolyte interface. C-AFM measurements of Ti/TiO2/Pt samples subjected to long-term anodic polarisation, suggest that the Ti-noble metal contact is progressively insulated by thickening of the TiO2 barrier layer, promoting passivation of the DSA. For Ir coated anodes, catalytic activity is directly related to the presence of Ir and to the stability of the catalytic oxide layer. Under Cu electrowinning conditions, the electrochemically formed hydrated Ir oxide was found to be catalytically less stable, than the iridium oxide film subjected to a heat treatment. 相似文献