首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 0 毫秒
1.
张岚  钱程 《编辑学报》2017,29(6):562-564
运用SWOT分析法分析医学期刊整合抵制学术不端行为内部条件的优势、劣势及外部环境的机遇、威胁,构建SWOT矩阵分析图,提出逐步整合医学期刊资源、稳妥推进学术行为管理、统筹规划学术监督管理、持续完善科研诚信体系的建议.  相似文献   

2.
《Communication monographs》2012,79(3):281-311
A meta-analysis of 54 cases testing the effectiveness of inoculation theory at conferring resistance and examining the mechanisms of the theory was conducted. The analyses revealed inoculation messages to be superior to both supportive messages and no-treatment controls at conferring resistance. Additionally, the results revealed refutational same and refutational different preemptions to be equally effective at reducing attitude change. However, the data were not consistent with some predictions made in narrative reviews of inoculation. No significant increase in resistance as a function of threat or involvement was found. Further, instead of a curvilinear effect for delay on resistance, the point estimates from our meta-analysis revealed equivalent resistance between immediate and moderate delays between inoculation and attack, with a decay in resistance after two weeks.  相似文献   

3.
Privacy-preserving collaborative filtering algorithms are successful approaches. However, they are susceptible to shilling attacks. Recent research has increasingly focused on collaborative filtering to protect against both privacy and shilling attacks. Malicious users may add fake profiles to manipulate the output of privacy-preserving collaborative filtering systems, which reduces the accuracy of these systems. Thus, it is imperative to detect fake profiles for overall success. Many methods have been developed for detecting attack profiles to keep them outside of the system. However, these techniques have all been established for non-private collaborative filtering schemes. The detection of shilling attacks in privacy-preserving recommendation systems has not been deeply examined. In this study, we examine the detection of shilling attacks in privacy-preserving collaborative filtering systems. We utilize four attack-detection methods to filter out fake profiles produced by six well-known shilling attacks on perturbed data. We evaluate these detection methods with respect to their ability to identify bogus profiles. Real data-based experiments are performed. Empirical outcomes demonstrate that some of the detection methods are very successful at filtering out fake profiles in privacy-preserving collaborating filtering schemes.  相似文献   

4.
This study examined the role and impact of affect in resistance. A three-phase experiment was conducted. The results indicated that inoculation treatments conferred resistance and exerted nuanced outcomes involving cognitive and affective responses to counterarguments and affect. The investigation also compared the effectiveness of cognitive, affective-positive, and affective-negative treatments. The results revealed that affective-negative messages were superior in eliciting threat, issue involvement, and cognitive counterarguing output and in enhancing the cognitive content of associative networks.  相似文献   

5.
《Communication monographs》2012,79(4):414-441
This investigation introduced the concept of associative networks to the resistance domain. A four-phase experiment was conducted involving 298 participants. The results confirmed the role of known elements in the process of resistance: the core elements of threat, issue involvement, and counterarguing output facilitated resistance, as did the more recently introduced element of attitude certainty. Also, the results indicated that inoculation treatments modified the structure of associative networks, planting additional nodes and increasing the linkages between nodes. Subsequently, changes in the structure of associative networks contributed to resistance to counterattitudinal attacks.  相似文献   

6.
This investigation introduced the attitude base (cognitive or affective) as a moderator in the resistance domain and effectively partitioned the role of affect from cognition by properly delineating its function. A three-phase experiment was conducted involving 290 participants. The results confirmed the role of the original elements in the process of resistance introduced by McGuire: threat and counterarguing output. Furthermore, the results indicated that inoculation messages were most effective when their content matched the attitude base. Cognitive inoculation messages generated greater resistance to counterattitudinal attacks when presented to individuals whose attitude base was primarily cognitive, rather than affective, in nature. The reverse was also found to be true as affective inoculation messages generated greater resistance to counterattitudinal attacks when presented to individuals whose attitude base was primarily affective, rather than cognitive, in nature.  相似文献   

7.
This study focuses on the problem of collapsed ‘stay in the market’ (SIM) beliefs during financial crises. More specifically, the goal of this investigation was to ascertain whether or not inoculation messages are a viable preemptive crisis communication strategy to protect the SIM beliefs of inexperienced investors amidst a major stock market downturn. Inoculation messages were compared to both supportive messages and no-message controls to determine their effectiveness in protecting SIM beliefs. Additionally, the impact of inoculation messages on beliefs in the absence of a crisis and the impact of crisis message modality (i.e. video versus print) on inoculation-generated resistance were explored. A between-subjects factorial design (3?×?2 plus one additional condition) was designed to explore three hypotheses and two research questions. Results indicate that inoculation messages can serve as a viable preemptive financial crisis communication strategy and that inoculation messages did not harm SIM beliefs in the absence of a crisis.  相似文献   

8.
This article provides a preliminary assessment of the impact of the September 11, 2001, attacks on public and private information infrastructures. As the events of the day demonstrated, information technology promises to play a critical role in future homeland security initiatives. Over the past two decades, information technology has become increasingly integrated into the day-to-day operations of most organizations. The dependability and continuity of information infrastructures can be a determining factor of how well an organization will be able to respond to a catastrophic event. The article considers some of the lessons learned from September 11 as both government and business move forward to rebuild and reinforce their technology assets. Although many lessons can be identified, they emphasize three general principles: the establishment and practice of comprehensive continuity and recovery plans, the decentralization of operations, and the development of system redundancies to eliminate single points of weakness.  相似文献   

9.
Stephen Rhind-Tutt of Alexander Street Press described his perspective on historical trends in the information industries, particularly publishing, and extrapolates them to the future. The presentation begins with an examination of the current challenges facing the information industries. This is followed by a definition of technology forecasting and its application to the information industries, showing how the Internet lends itself to particular types of development and the wants and needs of information customers drive change. The likely direction of such change in the information industry is outlined. Members of the industry must choose to embrace and evolve with these changes in order to remain relevant.  相似文献   

10.
论如何保障孩子们在图书馆安全使用因特网   总被引:4,自引:0,他引:4  
本文论述了国外图书馆保障孩子安全使用因特网的政策和规定,并从不同角度,向图书馆和图书馆员提出了在图书馆内引导孩子安全上网应采取的不同措施和建议。  相似文献   

11.
The defining trope for the humanities in the last 30 years has been typified by the move from “work” to “text.” The signature text defining this move has been Roland Barthes seminal essay, “From Work to Text.” But the current move in library, archival and information studies toward the “document” as the key term offers challenges for contemporary humanities research. In making our own movement from work to text to document, we can explicate fully the complexity of conducting archival humanistic research within disciplinary and institutional contexts in the twenty-first century. This essay calls for a complex perspective, one that demands that we understand the raw materials of scholarship are processed by disciplines, by institutions, and by the work of the scholar. When we understand our materials as constrained by disciplines, we understand them as “works.” When we understand them as constrained by the institutions of memory that preserve and grant access to them, we understand them as “documents.” And when we understand them as the ground for our own interpretive activity, we understand them as “texts.” When we understand that humanistic scholarship requires an awareness of all three perspectives simultaneously (an understanding demonstrated by case studies in historical studies of the discipline of rhetoric), we will be ready for a richer historical scholarship as well as a richer collaboration between humanists and archivists.  相似文献   

12.
论文从RDA与AACR2、FRBR、ISBD以及MARC21之间的关系等方面分析了RDA,并简要地介绍了RDA的内容大纲和术语以及RDA Online的特点。  相似文献   

13.
一个时代有一个时代的辉煌。 3 0年代的上海 ,是中国现代化进程中迈步最快的城市 ,有中国最为先进的市政管理模式 ,最为发达的工商都市经济 ,最具生机和活力的城市文化 ,因而博得东方的纽约、东方的巴黎之美誉 ,其独特的魅力绵延至今 ,让人缅怀、让人感慨。同样 ,华丽辉煌的背面是腐朽堕落 ,无限的希望紧随着深深的绝望 ,畸形的繁荣饱含了苦力们的血泪。有关这个城市的一切 ,已经成为一个道不尽的话题。但是 ,老上海在每个人的心目中 ,又是各各不同的 ,就象一具多角的棱镜 ,你能感受到的是它折光的一个侧面 ,你能看到的是它的一个剪影。因为…  相似文献   

14.
越来越多的资源以关联数据的形式发布出来并在相关数据集间建立了链接,但是关联数据的动态性带来了链接的有效性和完整性问题。文章介绍了关联链接维护的主要研究领域:链接的动态性描述和通信机制,然后介绍了链接维护技术的典型工具和协议。  相似文献   

15.
数字图书馆实现远程访问方案的探讨   总被引:1,自引:0,他引:1  
本文分析目前实现远程访问的几种技术,对实现VPN的两种主流技术IP Sec VPN与SSL VPN进行了比较,并介绍了我校图书馆采用IP通实现图书馆数字信息资源的远程访问的解决方案.  相似文献   

16.
最近,由北京市档案馆研究室、西城区档案局、西长安街街道主办,中国文物研究所、西城区文委、市规划委员会西城分局协办,民政部档案馆承办的"西交民巷地区历史文化展"又在社会上引起不小的反响,<北京日报>、<北京青年报>、<北京晨报>和<法制晚报>等多家媒体先后就此进行了采访报道.据办展单位有关负责同志介绍,筹办这个展览,是利用档案资源直接参与社区文化建设、为构建和谐社会服务的有益尝试,当地居民踊跃参与的热情以及产生的积极影响都表明,展览取得了圆满成功.  相似文献   

17.
晓章 《北京档案》2007,(3):38-39
最近,由北京市档案馆研究室、西城区档案局、西长安街街道主办,中国物研究所、西城区委、市规划委员会西城分局协办,民政部档案馆承办的“西交民巷地区历史化展”又在社会上引起不小的反响,《北京日报》、《北京青年报》、《北京晨报》和《法制晚报》等多家媒体先后就此进行了采访报道。据办展单位有关负责同志介绍。筹办这个展览,是利用档案资源直接参与社区化建设、为构建和谐社会服务的有益尝试.当地居民踊跃参与的热情以及产生的积极影响都表明,展览取得了圆满成功。[第一段]  相似文献   

18.
??China returning to GATT will lead to the national industries endure a strong pressure froth the-wortd market. The information demands of natiattai industries would change with returning to GATT, but the chinete sxfarmatian servirx can not keep abreast of this change. it is fared with a serious challenge.The ways dealing with it shoutd be to reform information service contents. foster the high-level infarrnatinn staff, etc.  相似文献   

19.
When an archivist talks with the information technology (IT) personnel about providing access to digital collections, the discussion often proceeds smoothly. They have shared assumptions, the common goal of the platform is well understood by both parties, and the vocabulary used to describe actions, tasks, and items is substantially the same, or at least agreed-upon. However, when the discussion turns to digital preservation, there may be a divergence in priorities and understanding. While the archivist’s priority is on making sure their digital assets are preserved and accessible forever, the IT personnel’s focus may be on making current data publicly accessible, making sure that systems are running smoothly right now. To further complicate matters, IT personnel have been performing an activity that sounds very much like digital preservation: archiving, backups, and storage of multiple copies. This column will explore the convergence and divergence of the archival and IT professions in regards to digital preservation, as well as suggest the topics and questions that need to be discussed so that both parties have a mutual understanding of meeting the needs of providing appropriate digital preservation.  相似文献   

20.
如何将方正小样文件转换成PDF格式文件   总被引:4,自引:0,他引:4  
发展了2种将方正小样文件转换成PDF格式文件的技术:一种方法是用飞腾软件中的PDF输出软插件将方正维思小样文件转换成PDF文件;另一种方法是用pdfFactory虚拟打印机将方正飞腾小样文件转换成PDF文件.对这2种方法的优缺点进行了简单比较.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号