首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 9 毫秒
1.
This research examines privacy law and Human Flesh Search (HFS) on the Chinese Internet. HFS is spontaneous, widely participated search and publication of targeted individuals’ personal information on the Internet. This research sees HFS as an important form of non-institutional information gathering and publication, and argues that the regulation of HFS is not only about privacy but also line-drawing for information collection and dissemination in the digital setting. Therefore, legal instruments and court cases in relation to HFS and online privacy must be assessed as important components of the Chinese state’s Internet regulatory scheme. This research finds that the paired concepts of ‘flexibility and populism,’ key features of legal reform and development in contemporary China, are highly relevant to analyze the growth of digital privacy laws in China. The political-legal authorities’ experimentation and innovation in the development of the law shed important light on how China’s Internet governance adapts to changing circumstances and strives to keep pace with profound social transformations in new technological environments.  相似文献   

2.
余英 《四川档案》2012,(3):13-15
该文分析了诉讼电子档案网络查询服务中的隐私权问题,并从法律、技术、教育三个方面提出了隐私权的保护策略。  相似文献   

3.
人肉搜索体现了网民欲通过网络追求和实现社会公平及道德正义的理想,但是在实际运用时也带来了侵犯个人隐私权的问题。文章介绍了人肉搜索的演变过程和个人隐私、个人隐私权的界定及国内外相关的法律法规,分析了人肉搜索与个人隐私权的冲突,探讨正确运用人肉搜索的途径。  相似文献   

4.
刘军 《北京档案》2010,(6):23-24
在现行<档案法>中增加电子文件的内容,是<档案法>修改的重点内容之一.本文分析了电子文件的法律效力,提出了在修改<档案法>时增加电子文件立法的几点建议.  相似文献   

5.
The increasing use of the Internet for service delivery has paralleled an increase of e-service users' privacy concerns as technology offers ample opportunities for organizations to store, process, and exploit personal data. This may reduce individuals' perceived ability to control their personal information and increase their perceived privacy risk. A systematic understanding of individuals' privacy concerns is important as negative user perceptions are a challenge to service providers' reputation and may hamper service delivery processes as they influence users' trust and willingness to disclose personal information. This study develops and validates a model that examines the effect of organizational privacy assurances on individual privacy concerns, privacy control and risk perceptions, trust beliefs and non-self-disclosure behavior. Drawing on a survey to 547 users of different types of e-services – e-government, e-commerce and social networking – in Rwanda, and working within the framework of exploratory analysis, this study uses partial least square-structural equation modeling to validate the overall model and the proposed hypotheses. The findings show that perceptions of privacy risks and privacy control are antecedents of e-service users' privacy concerns, trust and non-self-disclosure behavior. They further show that the perceived effectiveness of privacy policy and perceived effectiveness of self-regulations influence both perceptions of privacy risks and control and their consequences; users' privacy concerns, trust and non-self-disclosure behavior. The hypotheses are supported differently across the three types of e-services, which means that privacy is specific to context and situation. The study shows that the effect of privacy assurances on trust is different in e-government services than in other services which suggest that trust in e-government may be more complex and different in nature than in other contexts. The findings serve to enhance a theoretical understanding of organizational privacy assurances and individual privacy concerns, trust and self-disclosure behavior. They also have implications for e-service providers and users as well as for regulatory bodies and e-services designers.  相似文献   

6.
7.
8.
Commonly recognized computer-mediated communication (CMC) tools include virtual environments, bibliographic databases, listservers, newsgroups, group teleconferencing, interactive messaging systems and electronic mail. The use of these technologies in libraries has grown exponentially over the past decade. Electronic mail has emerged as an especially popular communication tool for librarians, and their colleagues and patrons. This paper explores the use of a reference department electronic mail service and its impact on reference services and librarian-client interactions. Several issues related to the implementation of CMC technologies are presented, including the maintenance and monitoring of reference electronic mail systems, the types of questions that are typically posted, and potential barriers to the implementation and use of reference e-mail.  相似文献   

9.
On May 19, 1998, the Israeli Knesset voted unanimously to pass a proposed “Freedom of Information Law.” Israel has been slow to adopt the concept of freedom of information, and although it has been acknowledged in various court rulings, it has not been embodied in legislation. The purpose of this study is to examine the Israeli Freedom of Information Law (FOIL) and to analyze it in respect to the U.S. Freedom of Information Act (FOIA). More specifically, this article looks closely at the purpose of the law, the circumstances that permit exemptions to be exercised, the provisions made within FOIL that will enable its execution, and court cases dealing with freedom of information.  相似文献   

10.
This study analyzed observations and interviews of 31 participants, who were divided into six age groups, to understand the influence of end-user goals and experience on Internet search approaches. Users who lacked experience approached the Internet similarly no matter what the age group. Children and older adults were more likely to lack online search experience than other users. In addition, children and older adults were more homogeneous than other users in that they had a narrow range of situational goals, whereas users in other groups had a wide range of situational goals. The study has implications for user services and research in end-user searching. An understanding of the influence of age, experience, and goals on Internet search patterns might guide how, how much, and in what format information should be presented in the future. Knowledge gained from this study can also form the basis of hypotheses for larger studies.  相似文献   

11.
高校数字图书馆建设中的科技情报服务   总被引:4,自引:0,他引:4  
石慧 《津图学刊》2001,(2):12-13
本文从对数字图书馆基本特征的探讨出发,论述了数字图书馆建设中科技情报服务环境的变化,提出了高校图书馆科技情报服务工作在数字图书馆建设中的目标与任务。  相似文献   

12.
This article discusses political interests and maneuvering that went on among professional trade associations, government agencies, and public interest groups and the ultimate effects that it had on the outcome of the Government Printing Office Electronic Information Act of 1993, also known as the WINDOW bill. Insight is provided into the increasingly contentious politics of information in the United States. With the trend toward the explosive growth in availability of and access to government information in electronic formats, it is recognized that access to and control of government information has tremendous economic and political rewards for libraries, businesses, and politicians alike.  相似文献   

13.
Privacy information transparency is generally considered desirable and should be enabled and upheld. It has gained increasing attention giving the emergence of new information technologies and their affordances for e-governance and governments. This study examines the proposition that privacy information transparency is amiable to mitigating privacy fatigue in e-government. The study identifies the antecedents of privacy information transparency of an e-government website, and its influence on privacy fatigue manifested in emotional exhaustion and cynicism. A survey conducted in Cyprus harnessed user responses, and the data analyzed using a partial least square structural equation analysis method. Findings reveal that; (1) user data collection and data use information aspects of online privacy significantly impact privacy information transparency; and (2) privacy information transparency positively impacts both cynicism behaviour and emotional exhaustion. This study extends the concept of privacy fatigue into e-government and contributes to an empirical evaluation of its relationship with privacy information transparency.  相似文献   

14.
Over the past few decades, public relations has developed significantly in the West into a sophisticated management function which is recognized as an integral part of any organization's attempt to communicate with various persons, both within and outside the organization, in order to achieve its goals and objectives. However, this is not the case in the Arab world where public relations remains underdeveloped and, even when practised, is relatively unsophisticated. This paper deals with the public relations function in a prominent though controversial Arab media organization: Al Jazeera Satellite Channel. It explores how Al Jazeera has been dealing with internal and external communication issues impelled initially by its role as a satellite broadcaster spearheading changes in a vibrant Arab mediascape and subsequently by its expansion into a global broadcaster. Drawing on James Grunig's four models of communication to analyze Al Jazeera's public relations practices, the case study at hand outlines some of the communication challenges and opportunities the organization has been facing during its 10 years of existence. The case of an indigenous organization like Al Jazeera operating in a culturally distinct environment puts into perspective communications issues and complicates our understanding of how public relations is understood and practised outside the normative Western public relations paradigm.  相似文献   

15.
16.
This article asserts that the United States federal government should adopt a centralized governmental structure for the privacy protection of personal information and data. There are a number of significant reasons, ranging from facilitation of the international dealings of United States corporations to the interactions of the United States government with other governments, for creating a centralized privacy protection structure for the United States federal government. This article examines the rise of centralized governmental privacy protection structures, identifies reasons for adopting such structures, and analyzes a selection of the structures used by various nations and states at present. From this analysis, the article presents a number of models of centralized governmental privacy protection structures. These models then form the basis of a discussion of what type of structural models of privacy protection would be most appropriate for the U.S. federal government.  相似文献   

17.
The acquisition of electronic resources presented many new issues for staff at the Texas Tech University Library. Traditional communication pathways between acquisitions and other departments were inadequate to address the increasingly complex questions that were raised in the process of acquiring the electronic resources that were increasingly in demand by the university community. While it was possible to handle decision making for electronic resources through the library’s departmental structure, the process was hampered by a lack of speed and focus. To resolve this problem, six library staff members were brought together to form an electronic resources group (ERG). This cross-functional team is composed of library staff from four different departments, each of whom had experience with different aspects of acquiring electronic resources. Members continue to work within their departments and report to their functional managers, but they also report to the ERG project manager and are expected to contribute substantially to the accomplishment of group goals. This paper describes how Texas Tech has successfully used the cross-functional team approach for managing the acquisition of materials in electronic formats.  相似文献   

18.
李小冰 《北京档案》2006,(10):27-29,36
政府信息是指各级人民政府及其职能部门以及依法行使职权的组织在其管理或提供公共服务过程中制作、获得或拥有的信息.政府信息公开是对法治政府的一个要求,世界上法治国家的政府都重视政府信息公开,目前我国也正着手制定政府信息公开法.  相似文献   

19.
在办公自动化中正在形成越来越多的电子文件,其归档保管问题引起了档案界的极大关注。目前在科技工作中电子科技文件的形成、归档和管理问题也提到了日程,但似乎论及的人还不多。实际上在科技工作中,电子科技文件的发展速度与一般电子文件相比,可能更快、更具有普遍性,其归档、保管价值也绝不亚于一般电子文件。   一、科学技术工作中的电子科技文件   随着科学技术,特别是计算机技术的发展,电子科技文件正在迅速地形成和发展。我们知道,科学试 (实 )验是进行科学研究和探索自然规律的最基本手段。在过去,大约在 90年代初期以…  相似文献   

20.
Introduction: Locating reports of trials from journals not indexed in the major databases presents difficulties to systematic reviewers, and may be a factor in improving the reliability of the reviews. Objectives: To identify and make available reports of controlled trials from the Australasian Medical Index (AMI). To measure the quality of indexing of trials in AMI. Methods: Using a highly sensitive search strategy consisting of methodology indexing and free‐text terms, records from AMI were read for reports of controlled trials. Trials meeting the criteria were submitted for inclusion in The Cochrane Controlled Trials Register (CCTR) and assessed for the quality of their indexing. Results: 3621 records were downloaded, of which 512 were identified as reports of controlled trials (317 RCTs; 195 CCTs) and submitted to CCTR. The precision of methodology indexing terms was 60%, but sensitivity just 18%. The quality of indexing of trials was generally poor with only 50 tagged with the RCT/CCT publication type term. 453 reports (88%) were not previously available in CCTR. Conclusions: The large proportion of trials found to be unique to the AMI database increases the pool of studies available to systematic reviewers, and helps ensure CCTR remains the most comprehensive source of trials.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号