首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 978 毫秒
1.
The mobile Internet (MI) has been hyped as the next big thing by telecom operators, handset manufacturers, and content providers. However, recent studies indicate that the usage of Internet via mobile phones has remained quite flat. The authors inquire into this discrepancy by focusing on actual usage of the MI and the motivating factors behind its use. Based on focus-group interviews in Norway and Hungary, they argue that MI usage is interrelated with and is an extension of the personal computer (PC)–based Internet. The key motivation behind MI use is to attain information in situations in which the PC is out of reach. In effect, MI has not led to the development of new usages. The expectation that the development of new killer applications will lead to an explosion of new usage is therefore misguided. MI usage is and will perhaps continue to be a mere extension of PC-based Internet usage—and such use activities are the very nature of MI.  相似文献   

2.
This practical study aims to enrich the current literature by providing new practical evidence of the positive and negative influence factors of the Internet on generations (Gens) Y and Z in Australia and Portugal. The Internet has become a powerful force among these Gens in relation to communication, cooperation, collaboration and connection, but numerous problems from cognitive, social and physical developments' perspective are developed throughout the Internet usage. A quantitative approach was used to collect new, practical evidence from 180 Australian and 85 Portuguese respondents, with a total of 265 respondents completing an online survey. This study identifies new positive factors to the Internet usage, as problem-solving skills, proactive study, information gathering, and awareness globally and locally; communication and collaboration with their peers and family were improved and enhanced. Alternatively, this study identifies new negative factors as physical contact and physical activities were prevented, thinking, concentrating and memory skills were reduced, depressed and isolated, laziness having increased, nevertheless; the Internet encourages Gens Y and Z to play physical and virtual games (e.g. Wii). Finally, this study concluded that the Internet is becoming an essential part of the everyday routines and practices of Gens Y and Z.  相似文献   

3.
Anonymous communication on the Internet offers new opportunities but has ill-understood risks. This article helps to ground the policy debates by examining some fundamental aspects of anonymous social behavior and current controversies over anonymous communications. It is a companion to the article in this issue, "Anonymous Communication Policies for the Internet: Results and Recommendations of the AAAS Conference." It examines the social character of anonymous communication and the ways that anonymous communication has played important roles for professionals such as journalists and the police. It also explains some of the new technological supports for anonymous communication on the Internet. The openness, decentralization, and transnational character of the Internet challenge the efficacy of traditional control mechanisms and have raised issues related to accountability, law enforcement, security and privacy, governmental empowerment, and e-commerce. Yet, to ban or restrict all anonymous communication online because of the harms it could bring would deny its benefits to those people who may legitimately gain from it. This article helps to understand how to balance these positions.  相似文献   

4.
Anonymous communication on the Internet offers new opportunities but has ill-understood risks. This article helps to ground the policy debates by examining some fundamental aspects of anonymous social behavior and current controversies over anonymous communications. It is a companion to the article in this issue, "Anonymous Communication Policies for the Internet: Results and Recommendations of the AAAS Conference." It examines the social character of anonymous communication and the ways that anonymous communication has played important roles for professionals such as journalists and the police. It also explains some of the new technological supports for anonymous communication on the Internet. The openness, decentralization, and transnational character of the Internet challenge the efficacy of traditional control mechanisms and have raised issues related to accountability, law enforcement, security and privacy, governmental empowerment, and e-commerce. Yet, to ban or restrict all anonymous communication online because of the harms it could bring would deny its benefits to those people who may legitimately gain from it. This article helps to understand how to balance these positions.  相似文献   

5.
Domesticating Computers and the Internet   总被引:1,自引:0,他引:1  
The people who use computers and the ways they use them have changed substantially over the past 25 years. In the beginning highly educated people, mostly men, in technical professions used computers for work, but over time a much broader range of people are using computers for personal and domestic purposes. This trend is still continuing, and over a shorter time scale has been replicated with the use of the Internet. This paper uses data from four national surveys to document how personal computers and the Internet have become increasingly domesticated since 1995 and to explore the mechanisms for this shift. Now people log on more often from home than from places of employment and do so for pleasure and for personal purposes rather than for their jobs. Analyses comparing veteran Internet users to novices in 1998 and 2000 and analyses comparing the change in use within a single sample between 1995 and 1996 support two complementary explanations for how these technologies have become domesticated. Women, children, and less well-educated individuals are increasingly using computers and the Internet and have a more personal set of motives than well-educated men. In addition, the widespread diffusion of the PC and the Internet and the response of the computing industry to the diversity in consumers has led to a rich set of personal and domestic services.  相似文献   

6.
Statistics show that the number of identity theft victims in the US increased by 12% in 2009, to 11.1 million adults, while the total annual fraud amount increased by 12.5%, to $54 billion. As the e-commerce volume is increasing and various online services are becoming more popular, the number of sites to which an average Internet user subscribes is increasing rapidly. Given the limited memory capacity of human beings, an Internet user's login credentials (in the form of a combination of a user ID and a password) are usually reused over multiple accounts, which can cause significant security problems. In this study, we address the vulnerability of login credentials. First, based on a unique Internet user data set, we analyze the behavioral characteristics of login credentials usage. We find that the same login credentials are used for many more accounts and reused much more often than previously expected. Furthermore, usage patterns are found to be quite skewed. Second, building on a network perspective of login credentials usage, we suggest a vulnerability measure of an individual's login credentials and analyze the vulnerability of current Internet users. The resulting information is valuable not only to the research community but also to managers and policy makers striving to reduce security vulnerability.  相似文献   

7.
自从李克强总理首次提出"互联网+"行动计划以来,各行各业都迎来了新的一轮变革。"互联网+"也为档案工作带来了新的挑战。本文从如何利用"互联网+"解决档案工作现存的问题,以及如何避免服务模式创新所带来的新的问题着手,对档案工作的服务模式提出了一些建议。本文的结论对于"互联网+档案工作"业态的建设和完善有着深刻的借鉴意义。  相似文献   

8.
Because of the increasing significance of social communication technologies within an organization, they have become a new form of information processing, resulting in business process transitions and increased benefits. By applying media richness theory and social theories, this study investigated how social communication technologies (SCTs) can be used by an employee to fit his/her task characteristics. Additionally, it also examined how the employee's social relationships moderated media usage in the current job environment and how this usage influenced the task performance. Five media were selected in this study (telephone, video conferencing, email, instant messaging, and blog). Using a hierarchical regression approach, we found that task characteristics were related to media usage, whereas social factors (social influence and social affinity) moderated the degree of the relationships. A few particular media and technologies seemed to perform well, however these are influenced by the social aspects. Moreover, the usage of social technologies results in positive task performance. The performance of a few specific technologies demonstrated binding effects (email performance was associated with instant messenger performance). In summary, we found that the usage of SCTs is instrumentally determined by the interaction between the task and social relationships.  相似文献   

9.
The aim of this paper is twofold. First, it discusses the use of the Internet and the World Wide Web for marketing and compares Internet and World Wide Web Marketing with traditional media Marketing. Then it discusses the impacts of Internet and World Wide Web marketing, how large they are, and how marketing and organizations are going to respond to these, which leads to the need for new business strategies. A presentation on how the Internet is currently being used in business serves as the anchor for the above discussion.  相似文献   

10.
进入21世纪,网络改变了传统的社会结构和功能以及社会安全的方式,并向创新社会管理提出了新的挑战:即舆论在网络社会中如何形成、演化,又该以何种有效方式调控。本文基于超网络概念,建立了具有社交、心理、环境和观点4层子网的超网络,设计各层子网以及子网之间的舆论演化动力学模型,以期对舆论的演化机理进行深入探讨,为社会管理中舆论的引导、干预提供模型支撑。  相似文献   

11.
随着当前互联网的飞速发展,当前使用的基于IPv4网络协议下的地址数显得越来越匮乏,因此IETF提出用IPv6协议取代IPv4协议。IPv6具有诸如海量地址、组播、邻居发现、自动配置等许多新特性。然而,怎样实现IPv4向IPv6的平滑过渡,以及怎样在现有IPv4网络上进行IPv6组网仍然是目前有待解决的问题。本文对目前常用的三种过渡技术双协议栈、隧道和地址翻译机制进行分析比较。  相似文献   

12.
Understanding the main determinants of Internet banking adoption is important for banks and users; our understanding of the role of users’ perceived risk in Internet banking adoption is limited. In response, we develop a conceptual model that combines unified theory of acceptance and use of technology (UTAUT) with perceived risk to explain behaviour intention and usage behaviour of Internet banking. To test the conceptual model we collected data from Portugal (249 valid cases). Our results support some relationships of UTAUT, such as performance expectancy, effort expectancy, and social influence, and also the role of risk as a stronger predictor of intention. To explain usage behaviour of Internet banking the most important factor is behavioural intention to use Internet banking.  相似文献   

13.
朱丽萍 《科教文汇》2014,(15):210-211
国内移动互联网技术和通信技术的快速发展,推动了各行各业的发展和崛起,我国图书馆基于移动互联技术,已经进入了一个新领域的开发---移动图书馆。移动阅读促进了移动图书馆的建设,给移动图书馆的设置提供了更广阔的机遇。移动图书馆的建设,打破了传统的读书阅览模式,而是采取手持设备,不受到时间、空间的影响的一种全新的阅读方式。但是目前我国移动图书馆的建设依然存在问题,如何解决这一系列的问题是工作重点。  相似文献   

14.
随着Internet的普及和广泛应用,大学生对网络的依赖性渐增,这给高校开展思想政治教育工作带来了新的挑战。本文探讨了在Internet环境中,如何整合各种资源进行高校阵地建设,并对高校的网络阵地系统化、职能化和持续化发展提出了建议。  相似文献   

15.
Cell phone usage has grown phenomenally in Africa, and particularly in South Africa where initial growth forecasts have been greatly exceeded. This technology therefore provides opportunities for services such as banking to reach critical mass. All major retail banks in South Africa provide cell phone banking, but very few customers actually use it. This study examines the factors that influence the adoption of cell phone banking in South Africa, as a means of understanding how to possibly increase the rate of adoption. A framework developed in Singapore identifying factors influencing the adoption of Internet banking was used as a basis, and amended to assess cell phone banking. Factors identified as influences included relative advantage, trialability, and consumer banking needs, with perceived risk having a major negative influence.  相似文献   

16.
网络环境下企业并购的动因与绩效分析   总被引:1,自引:0,他引:1  
徐康宁  夏辉 《科研管理》2004,25(5):90-93,59
企业并购是市场竞争机制的内在要求,是一种市场行为,在西方市场经济国家已经演进了一百多年。20世纪90年代后期至新世纪初,发生在网络环境下的新一轮并购浪潮已经对世界经济产生了深刻的影响。本文全面分析了本次全球企业并购浪潮的主要动因,并深入探讨了网络环境下企业并购绩效缺乏的内在原因。  相似文献   

17.
Puay Tang 《Research Policy》2005,34(6):852-871
This exploratory article sets out to examine if and how the new digital copyright laws in the U.S. and Europe are affecting innovation on the Internet. It argues that these laws, in balance, at least to date, are having a positive effect on Internet innovation, despite the strident argument that these laws will inhibit innovation. The innovations the article discusses are peer-to-peer (P2P) file sharing technology and the new business models for music retailing that P2P has spawned. It concludes that digital copyright laws could create perverse incentives for innovation and wonders if legislators may not require a better understanding of the innovation process when crafting IP laws.  相似文献   

18.
新一代中文智能搜索引擎尤里卡研究   总被引:3,自引:1,他引:3  
李村合 《情报科学》2003,21(1):86-88
本文介绍了Internet新一代中文智能搜索引擎尤里卡的基本情况,它能对自然语言查询进行语义理解,克服了传播搜索方法与语义无关的缺点。研究了该搜索引擎的使用方法与技巧,同时客观地评价了它的优劣得失,指出需进一步完善之处。  相似文献   

19.
廖仕宝 《科教文汇》2013,(20):12-12,19
网络时代给现代教育带来了一定的困扰,但也为现代教育开辟了新的教学模式,关键是看如何运用。中职学生对网络的应用已达到100%,上网已成为学生生活的一部分,有效地利用网络模式开展学生德育教学,可以收到良好的教学效果。  相似文献   

20.
田文艳 《科教文汇》2014,(28):164-165
随着社会经济的飞速发展,网络已成为人们生活中不可缺少的一部分,网络渗透到人们生活的方方面面,网络教学、网络聊天、网络购物以及网络游戏等都有力地说明了这一点。在教育事业高速发展的现代社会,利用网络教学已成为不可阻挡的趋势,网络技术的发展为高职思政教学开辟了新的路径。网络是一把双刃剑,在给高职思政教学提供便利的同时,也带来了巨大的挑战。因此,如何正确利用网络为教学工作服务是当前我们需要思考的问题。本文就网络环境中高职思政教学的路径选择分析进行探索。  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号