首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 248 毫秒
1.
初生型创业者职业选择研究:基于自我效能的观点   总被引:2,自引:0,他引:2  
为什么现实中有人会选择创业,而其他人则选择就业,这是创业研究领域一直关注的问题。学者们从不同的角度进行了大量理论和实证研究,但一直未获得公认的结论。运用社会心理学家Bandura的自我效能观点和三元交互理论,从自我效能与创业环境互动的角度考察初生型创业者的职业选择,为该领域的实证研究提供理论基础。  相似文献   

2.

Self-driving cars promise solutions to some of the hazards of human driving but there are important questions about the safety of these new technologies. This paper takes a qualitative social science approach to the question ‘how safe is safe enough?’ Drawing on 50 interviews with people developing and researching self-driving cars, I describe two dominant narratives of safety. The first, safety-in-numbers, sees safety as a self-evident property of the technology and offers metrics in an attempt to reassure the public. The second approach, safety-by-design, starts with the challenge of safety assurance and sees the technology as intrinsically problematic. The first approach is concerned only with performance—what a self-driving system does. The second is also concerned with why systems do what they do and how they should be tested. Using insights from workshops with members of the public, I introduce a further concern that will define trustworthy self-driving cars: the intended and perceived purposes of a system. Engineers’ safety assurances will have their credibility tested in public. ‘How safe is safe enough?’ prompts further questions: ‘safe enough for what?’ and ‘safe enough for whom?’

  相似文献   

3.
In this paper, I approach the question of mobiles in Asian countries by considering the case of Australia. I do so by way of a preliminary inquiry that seeks to explore the intersection between the emergence of mobiles in Australia with transformations in that country's sense of its relationship with Asia. First I discuss the history of the mobile phone in Australia, noting some important uses and representations that formed part of its social shaping. Second, I explore mobiles and the paradoxes of multiculturalism, and also how digital technologies became central to political culture and identity debates in Australia in the early to-mid 1990s. Third, I look at some important moments in the social shaping of text messaging, in which questions of cultural difference were decisive. Finally, I offer concluding remarks about future research on mobiles in Australia and how they are tied into Asian identities.  相似文献   

4.
方静  姜爽  孙瀚 《科教文汇》2012,(20):7-7,9
本文主要分析和阐述了什么是辅导员和怎样做好辅导员两个问题。对于第一个问题即辅导员的角色定位问题,笔者认为辅导员同时担任着五大角色:思想指导员、日常事务管理员、职业指导员、就业服务员、心理咨询员,五大角色合为一员就是辅导员。对于第二个问题,笔者认为辅导员工作中有七个着力点,并形象地将其与音乐中七大基本音符相联系,阐述了弹奏好辅导员工作中的七个基本音符就可以更好地做好辅导员工作的观点。  相似文献   

5.
Generally, QA systems suffer from the structural difference where a question is composed of unstructured data, while its answer is made up of structured data in a Knowledge Graph (KG). To bridge this gap, most approaches use lexicons to cover data that are represented differently. However, the existing lexicons merely deal with representations for entity and relation mentions rather than consulting the comprehensive meaning of the question. To resolve this, we design a novel predicate constraints lexicon which restricts subject and object types for a predicate. It facilitates a comprehensive validation of a subject, predicate and object simultaneously. In this paper, we propose Predicate Constraints based Question Answering (PCQA). Our method prunes inappropriate entity/relation matchings to reduce search space, thus leading to an improvement of accuracy. Unlike the existing QA systems, we do not use any templates but generates query graphs to cover diverse types of questions. In query graph generation, we put more focus on matching relations rather than linking entities. This is well-suited to the use of predicate constraints. Our experimental results prove the validity of our approach and demonstrate a reasonable performance compared to other methods which target WebQuestions and Free917 benchmarks.  相似文献   

6.
This paper discusses the ramifications of the problem of proving that the design of a symbol manipulating processor conclusively does what the designer intended. More specifically, it explores such questions as: (1) What different interpretations can be given to the expression “the intent of the process”? (2) Does the process, or should the process end? In either event, how do we prove it? (3) If the process does end, how do we prove that it does what was intended? This question may be meaningful even if the process does not end. (4) Is there a whole class of processes that stand or fall together? Can we adapt our proof of conclusiveness to cover the whole class? (5) Do the processes of the class yield the same or different results, and whichever it is, how do we prove it? The example of formal differentiation from the calculus is used to illustrate these problems; and question number four is developed in detail to illustrate the mixture of mathematical, logical, linguistic, computer science, procedural and even psychological insights involved. References are given for the methods of attack on the other questions.  相似文献   

7.
Currently, the central questions in the philosophical debate surrounding the ethics of automated warfare are (1) Is the development and use of autonomous lethal robotic systems for military purposes consistent with (existing) international laws of war and received just war theory?; and (2) does the creation and use of such machines improve the moral caliber of modern warfare? However, both of these approaches have significant problems, and thus we need to start exploring alternative approaches. In this paper, I ask whether autonomous robots ought to be programmed to be pacifists. The answer arrived at is “Yes”, if we decide to create autonomous robots, they ought to be pacifists. This is to say that robots ought not to be programmed to willingly and intentionally kill human beings, or, by extension, participate in or promote warfare, as something that predictably involves the killing of humans. Insofar as we are the ones that will be determining the content of the robot’s value system, then we ought to program robots to be pacifists, rather than ‘warists’. This is (in part) because we ought to be pacifists, and creating and programming machines to be “autonomous lethal robotic systems” directly violates this normative demand on us. There are no mitigating reasons to program lethal autonomous machines to contribute to or participate in warfare. Even if the use of autonomous lethal robotic systems could be consistent with received just war theory and the international laws of war, and even if their involvement could make warfare less inhumane in certain ways, these reasons do not compensate for the ubiquitous harms characteristic of modern warfare. In this paper, I provide four main reasons why autonomous robots ought to be pacifists, most of which do not depend on the truth of pacifism. The strong claim being argued for here is that automated warfare ought not to be pursued. The weaker claim being argued for here is that automated warfare ought not to be pursued, unless it is the most pacifist option available at the time, and other alternatives have been reasonably explored, and we are simultaneously promoting a (long term) pacifist agenda in (many) other ways. Thus, the more ambitious goal of this paper is to convince readers that automated warfare is something that we ought not to promote or pursue, while the more modest—and I suspect, more palatable—goal is to spark sustained critical discussion about the assumptions underlying the drive towards automated warfare, and to generate legitimate consideration of its pacifist alternatives,in theory, policy, and practice.  相似文献   

8.
This essay opens up the question of what difference the history of science makes. What is the value of the history of science, beyond its role as an academic pursuit that we historians of science know and love? It introduces the set of essays that follow as explorations that grew out of a seminar on this topic and that arise from the authors' particular concerns both that historians of science do not work hard enough to make their work of value and that others do not know of the potential. That seminar, at the Marine Biological Laboratory, was funded for nineteen years by the Dibner Institute and last year by Brent Dibner. It will continue and carry such discussions forward in new ways as the Arizona State University-Marine Biological Laboratory History of Biology Seminar Series. This set of focused essays seeks to invite lively discussion and response.  相似文献   

9.
What Are the New Implications of Chaos for Unpredictability?   总被引:1,自引:0,他引:1  
From the beginning of chaos research until today, the unpredictabilityof chaos has been a central theme. It is widely believed andclaimed by philosophers, mathematicians and physicists alikethat chaos has a new implication for unpredictability, meaningthat chaotic systems are unpredictable in a way that other deterministicsystems are not. Hence, one might expect that the question ‘Whatare the new implications of chaos for unpredictability?’has already been answered in a satisfactory way. However, thisis not the case. I will critically evaluate the existing answersand argue that they do not fit the bill. Then I will approachthis question by showing that chaos can be defined via mixing,which has never before been explicitly argued for. Based onthis insight, I will propose that the sought-after new implicationof chaos for unpredictability is the following: for predictingany event, all sufficiently past events are approximately probabilisticallyirrelevant.
  1. Introduction
  2. Dynamical Systems and Unpredictability
    2.1 Dynamical systems
    2.2 Natural invariant measures
    2.3Unpredictability
  3. Chaos
    3.1 Defining chaos
    3.2 Definingchaos via mixing
  4. Criticism of Answers in the Literature
    4.1 Asymptotic unpredictability?
    4.2 Unpredictability dueto rapid or exponential divergence?
    4.3 Macro-predictabilityand Micro-unpredictability?
  5. A General New Implication ofChaos for Unpredictability
    5.1Approximate probabilistic irrelevance
    5.2 Sufficiently pastevents are approximately probabilisticallyirrelevant for predictions
  6. Conclusion
  相似文献   

10.
Trust between transaction partners in cyberspace has come to be considered a distinct possibility. In this article the focus is on the conditions for its creation by way of assuming, not inferring trust. After a survey of its development over the years (in the writings of authors like Luhmann, Baier, Gambetta, and Pettit), this mechanism of trust is explored in a study of personal journal blogs. After a brief presentation of some technicalities of blogging and authors’ motives for writing their diaries, I try to answer the question, ‘Why do the overwhelming majority of web diarists dare to expose the intimate details of their lives to the world at large?’ It is argued that the mechanism of assuming trust is at play: authors simply assume that future visitors to their blog will be sympathetic readers, worthy of their intimacies. This assumption then may create a self-fulfilling cycle of mutual admiration. Thereupon, this phenomenon of blogging about one’s intimacies is linked to Calvert’s theory of ‘mediated voyeurism’ and Mathiesen’s notion of ‘synopticism’. It is to be interpreted as a form of ‘empowering exhibitionism’ that reaffirms subjectivity. Various types of ‘synopticon’ are distinguished, each drawing the line between public and private differently. In the most ‘radical’ synopticon blogging proceeds in total transparency and the concept of privacy is declared obsolete; the societal gaze of surveillance is proudly returned and nullified. Finally it is shown that, in practice, these conceptions of blogging are put to a severe test, while authors often have to cope with known people from ‘real life’ complaining, and with ‘trolling’ strangers.  相似文献   

11.
Don Lamberton’s research interests were broad. They centred on information and innovation, those elusive drivers of growth and change in the economy, as well as life. Information and innovation require some degree of receptiveness – openness – and Don was always open. His openness permitted me to become his student, as a mid-career practitioner in the film industry. It was, in a sense, his principal teaching. Under his tutelage, I began a reading program that led me a long way from my starting point, and taught me to question views that had seemed settled. Openness, of course, is a fundamental issue in information policy. To what extent should information be proprietary? And when should it be free? These questions were central to my research, which was about copyright and its consequences for authors. The policy tensions in copyright turn exactly on this question of degree of openness. As I studied the question, Don’s example came to matter. I mean the way he personally modelled scholarship: his willingness to listen, his constant sifting, his mode of freely sharing books, data and connections. This was scholarship as openness, and it was persuasive.  相似文献   

12.
How does openness affect the importance of incentives for innovation?   总被引:1,自引:0,他引:1  
Xiaolan Fu 《Research Policy》2012,41(3):512-523
When firms open up to external resources for innovation, do internal incentives still matter? This paper investigates the moderating effect of open innovation on the relationship between incentives and innovation using a survey database of British firms. Whilst both openness and incentives are positively associated with innovation efficiency, a substitution effect is found between openness and incentives. Whilst long-term incentives appear to enhance efficiency to a greater extent than short-term incentives, the substitution effect of openness is stronger regarding long-term incentives.  相似文献   

13.
How do knowledge-intensive business services (KIBS) protect their inventions from imitation by rival firms when choosing among various protection mechanisms? Data from the 2003 Statistics Canada Innovation Survey on services are used to investigate this issue by looking into complementarities, substitution and independence among eight protection mechanisms. A Multivariate Probit (MVP) model is estimated to take into account the fact that KIBS simultaneously consider many alternative intellectual property (IP) protection methods when they attempt to protect their innovations. Results show that patents, registration of design patterns, trademarks, secrecy and lead-time advantages over competitors constitute legal and informal methods that are used jointly. These complementarities suggest that IP protection mechanisms that are interdependent and reinforce each other to protect innovations from imitation by rival firms constitute a pattern on which firms rely to protect their innovations from imitation. A second pattern is based on the fact that KIBS rely on patents and complexity of designs as substitutes, and tend to use registration of design patterns and complexity of designs as substitutes in protecting their innovations from imitation. A third emerging pattern concerns protection mechanisms that are independent from each other and exhibit no synergy, and do not reinforce each other to protect innovations from imitation by other firms.  相似文献   

14.
15.
科技型中小企业是提升自主创新能力,推动科技成果转化的重要力量之一,而它在创业初期却面临着资金短缺的问题,地方政府财政资金在支持和推动其发展过程中如何发挥引导作用?从财政资金的性质和定位,支持重点和方式等方面进行了探讨,希望为省市级财政资金推动科技型中小企业发展提供一定的思路。  相似文献   

16.
In recent years, Western governments have come under sharp criticism for their use of surveillance technology. They have been accused of sweeping up massive amounts of information without evidence of the technologies being effective in improving security. The view of critics is clear, but what do intelligence officials themselves say? This paper analyzes statements of intelligence officials in the U.S. and U.K. from 2006 to 2016, examines what criteria officials use in their discourse on effectiveness, and investigates how considerations of cost and proportionality factor into the equation. It identifies seven measures of effectiveness in the statements of intelligence officials, and finds that cost, though rarely discussed, is the driver behind formalized evaluations of surveillance programs.  相似文献   

17.
Abstract

Over some seven decades, a rather mundane transition that in its thoroughness and consequences has gone largely unacknowledged, has taken place, namely the revolution in modern information systems (IS) that guide organizations in their actions. Today, it is fair to say that IS have come to rule the world. They do this literally, by the rules they embody, which dictate how much of everyday life, as it relates to individuals and organizations and the transactions they engage in, takes place around the globe. In essence, IS have become important social and economic infrastructure. Seeking an understanding of how this has come about, I review historical developments in IS, focusing in particular on accounting systems, enterprise systems, retail automation, and electronic commerce. I argue that it is transactions and their facilitation that lie at the heart of IS and its development as a field of practice. I reflect on why this has gone mostly overlooked as such. I consider where we have now arrived with transaction facilitation as infrastructure and its importance in the light of current issues. I suggest how future studies might contribute to our learning more about where we should want to be with our transaction facilitation infrastructure.  相似文献   

18.
Sanjay Jain 《Research Policy》2012,41(9):1643-1654
Technology standards refer to the specifications that provide users and vendors with a common platform and ensure compatibility between components of a technological system. These technical “rules of the game” are being increasingly set in standards development organizations (SDOs). In this paper, I ask the question: how do actors operating in these venues address the challenges posed by the anticipatory and collective nature of the specifications they are establishing? Through an in-depth analytic narrative of the Ethernet LAN (local area network) standard, I indicate how actors engage in an ongoing process of extension generation, ratification and incorporation. In imagining alterations to a specification, approving timely modifications and crafting an identity for a rule even as it changes, they manifest “pragmatic agency” in these contexts. In exercising such agency, SDO's substantially increase the functionality of an existing standard as well as boost its long-term competitive viability.  相似文献   

19.
财务杠杆是财务管理中的基本名词,如果企业决策者未能深刻领悟其含义和作用机理,将致危机重重。分别从几道简单的实例计算入手,从其结论出发,阐明了对财务杠杆的认识,并对财务和杠杆的运用问题进行了分析。  相似文献   

20.
Internet companies place a high priority on the safety of their services and on their corporate social responsibility towards protection of all users, especially younger ones. However, such efforts are undermined by the large numbers of children who circumvent age restrictions and lie about their age to gain access to such platforms. This paper deals with the ethical issues that arise in this not-so-hypothetical situation. Who, for instance, bears responsibility for children’s welfare in this context? Are parents/carers ethically culpable in failing to be sufficiently vigilant or even facilitating their children’s social media use? Do industry providers do enough to enforce their own regulations and remove those users they know to be underage? How far does a duty of care extend? Regulation of age restrictions has, it is argued, created unintended consequences that heighten online dangers for young people. While children are inevitably drawn to new online spaces for entertainment and fun, should their rights to participate in the social world around them be curtailed to ensure their best interests and those of the wider community? Such questions now pose significant practical and ethical dilemmas for policy makers and other stakeholders involved in internet governance. It especially highlights the question of responsibility for protection of minors online and calls into question whether the current model of shared responsibility is working.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号