共查询到20条相似文献,搜索用时 15 毫秒
1.
Anonymous communication on the Internet offers new opportunities but has ill-understood risks. This article helps to ground the policy debates by examining some fundamental aspects of anonymous social behavior and current controversies over anonymous communications. It is a companion to the article in this issue, \"Anonymous Communication Policies for the Internet: Results and Recommendations of the AAAS Conference.\" It examines the social character of anonymous communication and the ways that anonymous communication has played important roles for professionals such as journalists and the police. It also explains some of the new technological supports for anonymous communication on the Internet. The openness, decentralization, and transnational character of the Internet challenge the efficacy of traditional control mechanisms and have raised issues related to accountability, law enforcement, security and privacy, governmental empowerment, and e-commerce. Yet, to ban or restrict all anonymous communication online because of the harms it could bring would deny its benefits to those people who may legitimately gain from it. This article helps to understand how to balance these positions. 相似文献
2.
Anonymous communication on the Internet offers new opportunities but has ill-understood risks. This article helps to ground the policy debates by examining some fundamental aspects of anonymous social behavior and current controversies over anonymous communications. It is a companion to the article in this issue, \"Anonymous Communication Policies for the Internet: Results and Recommendations of the AAAS Conference.\" It examines the social character of anonymous communication and the ways that anonymous communication has played important roles for professionals such as journalists and the police. It also explains some of the new technological supports for anonymous communication on the Internet. The openness, decentralization, and transnational character of the Internet challenge the efficacy of traditional control mechanisms and have raised issues related to accountability, law enforcement, security and privacy, governmental empowerment, and e-commerce. Yet, to ban or restrict all anonymous communication online because of the harms it could bring would deny its benefits to those people who may legitimately gain from it. This article helps to understand how to balance these positions. 相似文献
3.
4.
5.
因特网上学术会议信息组织与利用的探索 总被引:1,自引:0,他引:1
以因特网为平台组织利用学术会议信息有着非常重要的意义,但这方面的工作目前做的远非完善。该文对当前因特网上学术会议信息组织利用的现状进行了分析,指出了存在的问题,提出了改进的措施,并对学术会议信息的查询利用进行了导航。 相似文献
6.
Gisle Hannemyr 《The Information Society》2003,19(2):111-121
It seems to be a generally accepted belief that the adoption rate of the Internet has exceeded that of earlier mass communication technologies by several magnitudes. This article reviews the historic data related to some of these technologies, draws on actor-network theory as a framework for interpreting such data, traces the transformations and translation of this data throughout the public, political, and scientific discourse, and discusses the use of "facts" in modern society. 相似文献
7.
Researching Internet Communities: Proposed Ethical Guidelines for the Reporting of Results 总被引:4,自引:0,他引:4
Storm A. King 《The Information Society》1996,12(2):119-128
Communication researchers and social scientists are quickly discovering the value of data that exists in the postings of members of Internet e-mail, Usenet, and real-time groups. The ability to communicate with one's peers, no matter how esoteric the interests, is causing an explosion in the number of new virtual communities. The interpersonal dynamics of these groups are increasingly coming under the scrutiny of academic research. The publicly available archived records of Internet virtual communities are being analyzed for a wide variety of research interests. The ability to do naturalistic observations of group dynamics, as they are exhibited in these exchanges of text, has captured the attention of many researchers. The institutional review boards of major universities are granting researchers exempt or expedited (exempt from full review) status for this work, due to the public nature of the notes being analyzed. These studies often involve the lack of informed consent, where the group members under study are unaware they are being monitored. There is a potential for psychological harm to the members of these groups, depending on the way results are reported. This article explores the ethical considerations that must be taken into account to protect cyberspace participants. The guidelines proposed are based on the American Psychological Association ethical guidelines for use of human subjects in research. An explanation is offered as to how such guidelines can best be applied to the study of Internet communities. The constructs of Group Accessibility (the public/private nature of the actual cyberspace occupied by a group) and Perceived Privacy (the level of privacy that group members assume they have) are defined and proposed as two dimensions by which individual Internet communities may be evaluated in order to assure the ethical reporting of research findings. 相似文献
8.
Modern information systems not only capture a seemingly endless amount of transactional data, but also tend to retain it for indefinite periods of time. We argue that privacy policies must address not only collection and access to transactional information, but also its timely disposal. One unintended side effect of data retention is the disappearance of social forgetfulness, which allows individuals a second chance, the opportunity for a fresh start in life. We examine three domains in which social policy has explicitly recognized the importance of such a principle: bankruptcy law, juvenile crime records, and credit reports. In each case, we frame the issue in terms of the social benefits of forgetfulness, rather than in terms of individual privacy protection. We examine how different policy approaches to privacy might handle the retention of data and propose a comprehensive policy that includes a variety of strategies. The broad conclusion of the article is that data retention and disposal should be addressed as a part of a broader and comprehensive policy approach, rather than in a piecemeal fashion or as an afterthought. 相似文献
9.
We develop an adoption model of infrastructure technologies and test it with survey data collected from companies in six industries in South Korea (hereafter: Korea). The implementation of a new Internet standard such as Internet Protocol version 6 (IPv6) depends on the usefulness of the technology to the adopting organizations and the environment in which they operate. The adoption of IPv6 in Korea is mostly driven by a governmental strategy that created user demand, and normative pressure. IPv6 adoption in Korea is also driven by perceived resource concentration and power due to the uneven allocation of IPv4 addresses. Conversely, killer applications, technical sponsorship and financial factors had no influence on the adoption decision by Korean companies. Taken together, the findings of our explorative study suggest the need to consider technical as well as social and policy factors to understand the adoption dynamics of infrastructure technologies. 相似文献
10.
Geo-Policy Barriers and Rural Internet Access: The Regulatory Role in Constructing the Digital Divide 总被引:2,自引:0,他引:2
Kyle Nicholas 《The Information Society》2003,19(4):287-295
A combination of geography, public policy, and commercial investment in information infrastructure combines to create geo-policy barriers that in turn structure the ability of rural citizens to access the Internet. A statistical study of 208 rural telephone exchanges in Texas combined with case studies from rural counties explores the impact of distance and policies aimed at enabling rural telephone connection on the presence of Internet service providers. Market territories, including exchange areas and LATAs, and the distance requirements of expanded local calling policy in Texas can both help and hinder Internet access in remote areas. 相似文献
11.
We employ Lessig's framework of regulation to conceptualize the relationship between the Internet and democracy. Lessig defines four classes of regulators, forces that control and define systems such as the Internet. They are markets, architectures, norms, and laws. We propose that a “democratic regulator” is a force that serves to enhance civil or political liberties. And we argue by example that there are democratic (and, indeed, anti-democratic) regulators that control aspects of cyberspace. Expressing the democratic effects of the Internet in this manner may prove useful for future comparisons across existing Internet and democracy theories, especially in the realm of quantitative analyses. 相似文献
12.
Hans Klein 《The Information Society》2002,18(3):193-207
The Internet Corporation for Assigned Names and Numbers (ICANN) was created in 1998 to perform technical coordination of the Internet. ICANN also lays the foundations for governance, creating capabilities for promulgating and enforcing global regulations on Internet use. ICANN leverages the capabilities in the Internet domain name system (DNS) to implement four mechanisms of governance: authority, law, sanctions, and jurisdictions. These governance-related features are embodied in seemingly technical features of ICANN's institutional design. Recognition of ICANN's governance mechanisms allows us to better understand the Internet's emerging regulatory regime. 相似文献
13.
14.
政府资助对技术创新的作用:理论分析与政策工具选择 总被引:15,自引:0,他引:15
这篇论文主要阐述了政府资助对私人部门技术创新的影响。政府对私人部门进行资助的政策工具主要有政府担保、贴息、贷款,税收刺激和公共研究,这些政策工具除了能促进私人部门的技术创新活动外,也有相互之间的牵制、替代和补充作用。政府资助的效果随总量增加而增加,达到某一极值后就会下降,论文的结论对于政府制订促进私人部门技术创新的资助政策有着一定的参考价值。 相似文献
15.
16.
In the United States, Congress has had a long-standing interest in consumer privacy and the extent to which company practices are based on fair information practices. Previously, public policy was largely informed by anecdotal evidence about the effectiveness of industry self-regulatory programs. However, the Internet has made it possible to unobtrusively sample web sites and their privacy disclosures in a way that is not feasible in the offline world. Beginning in 1998, the Federal Trade Commission relied upon a series of three surveys of web sites to assess whether organizations post online privacy disclosures and whether these disclosures represent the U.S. definition of fair information practices. While each year's survey has provided an important snapshot of U.S. web-site practices, there has been no longitudinal analysis of the multiyear trends. This study compares a subset of equivalent individual-level web-site data for the 1998, 1999, 2000, and 2001 web surveys. Implications for using this type of research to inform public policy are discussed. 相似文献
17.
信息时代,互联网是人们生活必不可少的部分。网络上前所未有的丰富资源和其跨越时空的互动性为外语教和学带来了革命性的改变。在英语跨文化教学中,运用网络资源已经成了势不可挡的潮流。但是怎样更好地将其纳入跨文化外语教学,是需要不断地理论联系实际地加以探讨的。本文着重阐述了互联网上有哪些可以利用的资源和怎样利用这些资源,以及网络资源运用于英语跨文化教学的优点。 相似文献
18.
Eric Brousseau 《The Information Society》2013,29(1):45-57
France's early adoption of Minitel and EDI in the 1980s was both a stimulus and an inhibitor to Internet-based e-commerce. It hindered the adoption of the Internet, but it also created the conditions for a rapid catch up when France switched to the Internet in 1997. The French were already open to the use of IT, a dense network of online specialists and information service providers already existed, and many investments required to go digital were already made. On the other hand, by mid-2001 France was still far behind the early adopters of e-commerce over the Internet. This is because the French catch-up was checked by the implosion of the Internet financial bubble in 2000. Second, many Internet-based business models did not fit the French distribution channels. These differences suggest that e-commerce paths of development can be differentiated among nations, because both needs and solutions differ. This conclusion goes against the conventional wisdom that e-commerce will lead to the emergence of an integrated global marketplace in which common commercial practices will be implemented. 相似文献
19.
Steve Jones 《The Information Society》2005,21(4):233-237
This article examines the history and future prospects of the formation of Internet studies. It is argued that although a traditional field or disciplinary structure is not yet in place, the current interdisciplinary aggregations may have the makings of institutionalized academic units. Through comparison with the institutionalization of other interdisiciplinary areas of study (primarily that of communication and cultural studies), an argument is made for the need to create a firm intellectual foundation on which an Internet/studies can be built. Such a foundation should not only include sufficient and clear understanding of cognate fields but also include a foregrounding of power (as theoretical construct and practice) as a means of engaging the field in the world. 相似文献
20.
What explains the resurgence of U.S. international competitiveness in the 1990s? The previous decade can be characterized as one of intense U.S. concern about its declining international competitiveness. In this article, we argue that U.S. industry adopted a new industrial paradigm called "Wintelism" in response to competitive pressures from western Europe and East Asia. The essence of Wintelism is a reliance on open but owned technical standards and extensive outsourcing of component production to enable industrial structures to become less vertically and more horizontally integrated. Countries like the United States that pursued a modified regulatory state approach to structuring state-societal relationships found it easier to adopt this new paradigm than countries that pursued the developmental state approach. 相似文献