首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 31 毫秒
1.
Technological convergence has challenged the wisdom of regulators around the world for years, especially since the boom of the internet in the early 1990s. Different approaches have been proposed to replace the legacy “silo” regulatory model. This is now a compelling issue in China, the world's largest developing country. The historical separation between telecommunications and television and the strict “silo” type of regulation have resulted in an asymmetric market where phone companies control the conduit and broadcasters dominate the content. However, the Chinese government has turned the convergence of telecommunication, television and internet into a national strategy. According to the State Council's ambitious plan, the Chinese government aims to achieve a competitive converged information industry and an accompanying clear, scientific and efficient regulatory regime by 2015. Drawing on the theory of fragmented authoritarianism, this paper examines China's uneven path to triple-network convergence. Theoretically, this paper complements the existing research on China's information policy, which is mostly one-shot and sector-specific, with a complete treatment of convergence policy evolution that involves both telecommunications and television. Practically, this paper finds that there are two remarkable characteristics in China's convergence policy-making, namely, the causal relationship between institutional and policy change and the consistent policy objectives, which will continue to shape to future to come. Based on the above findings, a sketch of the future regulatory regime and relevant policy recommendations are provided.  相似文献   

2.
The increasing use of the Internet for service delivery has paralleled an increase of e-service users' privacy concerns as technology offers ample opportunities for organizations to store, process, and exploit personal data. This may reduce individuals' perceived ability to control their personal information and increase their perceived privacy risk. A systematic understanding of individuals' privacy concerns is important as negative user perceptions are a challenge to service providers' reputation and may hamper service delivery processes as they influence users' trust and willingness to disclose personal information. This study develops and validates a model that examines the effect of organizational privacy assurances on individual privacy concerns, privacy control and risk perceptions, trust beliefs and non-self-disclosure behavior. Drawing on a survey to 547 users of different types of e-services – e-government, e-commerce and social networking – in Rwanda, and working within the framework of exploratory analysis, this study uses partial least square-structural equation modeling to validate the overall model and the proposed hypotheses. The findings show that perceptions of privacy risks and privacy control are antecedents of e-service users' privacy concerns, trust and non-self-disclosure behavior. They further show that the perceived effectiveness of privacy policy and perceived effectiveness of self-regulations influence both perceptions of privacy risks and control and their consequences; users' privacy concerns, trust and non-self-disclosure behavior. The hypotheses are supported differently across the three types of e-services, which means that privacy is specific to context and situation. The study shows that the effect of privacy assurances on trust is different in e-government services than in other services which suggest that trust in e-government may be more complex and different in nature than in other contexts. The findings serve to enhance a theoretical understanding of organizational privacy assurances and individual privacy concerns, trust and self-disclosure behavior. They also have implications for e-service providers and users as well as for regulatory bodies and e-services designers.  相似文献   

3.
Access to Information regimes are under unremitting challenge from state actors. This article is the first to directly explore the ‘cost limit’ often included in Access to Information regimes, where requests can be refused by a Public Authority on the basis of an estimate that it would take too long to locate and extract the requested information. The validity of such estimates is particularly important in light of electronic information systems where search times are dependant upon technological expertise. This article presents a qualitative study of decisions made by the United Kingdom's Information Commissioner, where decision notices concerning the ‘cost limit’ are examined to identify technological errors. These technological errors were found to arise from specific practices of the Commissioner in 40% of cases where an estimate of the Public Authority was accepted. The author demonstrates that the concept of estimating the time taken to find information from an electronic information system is an objectively inappropriate means for estimating the burden placed on a Public Authority. Through the use of mathematics, it is demonstrated an estimation regime based on the volume of information requested is more appropriate as an alternative. From a wider regulatory perspective, this article also demonstrates that it would be highly desirable for Access to Information regimes to be regulated alongside data protection concerns, given the strong overlap in respect of the relevant technological issues.  相似文献   

4.
With today's big data and analytics capability, access to consumer data provides competitive advantage. Analysis of consumers' transactional data helps organizations to understand customer behaviors and preferences. However, prior to capitalizing on the data, organizations ought to have effective plans for addressing consumers' privacy concerns because violation of consumer privacy brings long-term reputational damage. This paper proposes and tests a Privacy Boundary Management Model, explaining how consumers formulate and manage their privacy boundary. It also analyzes the effect of the five dimensions of privacy policy (Fair Information Practices) on privacy boundary formation to assess how customers link these dimensions to the effectiveness of privacy policy. Survey data was collected from 363 customers who have used online banking websites for a minimum of six months. Partial Least Square results showed that the validated research model accounts for high variance in perceived privacy. Four elements of the Fair Information Practice Principles (access, notice, security, and enforcement) have significant impact on perceived effectiveness of privacy policy. Perceived effectiveness in turn significantly influences perceived privacy control and perceived privacy risk. Perceived privacy control significantly influences trust and perceived privacy. Perceived privacy concern and trust also significantly influence perceived privacy.  相似文献   

5.
Government agencies are increasingly using social media to connect with those they serve. These connections have the potential to extend government services, solicit new ideas, and improve decision-making and problem-solving. However, interacting via social media introduces new challenges related to privacy, security, data management, accessibility, social inclusion, governance, and other information policy issues. The rapid adoption of social media by the population and government agencies has outpaced the regulatory framework related to information, although the guiding principles behind many regulations are still relevant. This paper examines the existing regulatory framework and the ways in which it applies to social media use by the U.S. federal government, highlighting opportunities and challenges agencies face in implementing them, as well as possible approaches for addressing these challenges.  相似文献   

6.
《Journalism Practice》2013,7(3):298-313
This paper explores debate within Puerto Rico's journalistic community regarding the journalistic role of La Comay, a full-sized puppet host of the popular information and entertainment show SuperXclusivo, which faced a boycott in late 2012 and cancelation in early 2013. Calls to boycott and shutter the daily TV show came from the island's LGBT advocates because of comments made by La Comay that they considered homophobic. This analysis of 58 texts from four of Puerto Rico's island-wide news outlets provides an opportunity to examine how a region's dominant cultural archetype—that of the motherly and controversial comadre, after which La Comay is named—appeared in boundary work conducted by local journalists as they determined whether La Comay should have been awarded journalistic status. This paper is not meant to be yet another examination of satirical journalism as much as it is a chance to explore the appearance of a region's culture in the construction or maintenance of its journalistic community.  相似文献   

7.
This paper addresses a new case for the convergent regulatory institution for broadcasting and telecommunications in Korea. This paper emphasizes that, when considering a convergent regulatory body, Korea's main principle to establish is a reflection of the paradigm shift of convergence and IT industry. The proposal of the Korean Communications Commission addresses that as a prior factor. This paper deals with three characteristics in establishing the KCC: accommodating policy making and regulation together within a single institution; choosing a commission model as a new organizational type, which inherits a broadcasting legacy to ensure diversity and independence; combining content and network sector together. This paper attempts to show that the Korean model gives a power to the convergent regulatory institution to make the country remain one of the leading countries in information and communication sector as well as implement convergence of broadcasting and telecommunications successfully.  相似文献   

8.
[目的/意义] 探究硬规则下移动社交媒体用户隐私政策阅读感知情况,并构建合理的用户隐私政策阅读感知测度分析模型,为隐私政策的制定和完善提供理论与实践指导。[方法/过程] 结合国内外隐私政策相关研究文献,通过用户对十大常用移动社交媒体隐私政策阅读感知的调查,结合物元可拓分析方法,从隐私政策的外观形态、隐私保障、信息的收集与存储、信息的使用与共享和用户权利5个维度进行用户隐私政策阅读的感知测度。[结果/结论] 文本的外观和内容均对用户的隐私政策阅读感知产生影响,且内容完整,篇幅和行距大小适中,小标题数量和注释说明越详细的隐私政策对用户阅读感知评价结果越高。  相似文献   

9.
Though seldom read or consulted, privacy statements are often the only means for users to know how their personal data will be used by collecting organizations. While the length and the legalistic nature of most privacy statements are often blamed for people's reluctance to consult such documents, studies on the factors that influence users' intention to read privacy statements are still non-existent. For this survey, respondents from the Netherlands were presented with the situation of registering a child for a basic school through their municipalities' websites. The scenario was selected since it was assumed that it would be one that would require a significant amount of personal data from registrants, and not just the usual contact information. Results of the conducted online survey reveal that although not all users consult a privacy statement on a municipal website before they would disclose personal data, the availability and the ease of finding them on a municipal website strongly contribute to users' belief that a municipality can be trusted with their personal data whenever they are shared for a particular online transaction. This study also shows that users' perceptions of the risks involved in the online disclosure of their personal data influenced their intention to read online privacy statements on municipal websites. Older users were also more likely to consult privacy statements than their younger counterparts, while those with lower levels of education and internet experience expressed a higher tendency to read such online documents than those with higher levels of education and internet experience.  相似文献   

10.
In response to the terrorist attacks of September 11, 2001, there have been several statutory and regulatory changes that enhance the collection and use of personal information for intelligence and law enforcement purposes. This article first examines how particular sectors, including financial, educational, libraries, and transportation, have been affected by these changes, with particular attention to the requirements of the USA PATRIOT Act. Next, five common themes and trends, including the lowering of standards for individualized suspicion and the weakening of judicial safeguards, are identified and their effects on privacy and due process are explored. Finally, the article analyzes several political and social implications of the omnibus reduction in privacy protections in the face of terrorism, including the proposal for a national identification system.  相似文献   

11.
This paper focuses on the impact of ICTs, the Internet, and the Web on the life and work of people and mentions new services available through the convergence of computer and communication technologies. Also discussed are “digital determinism” in general and India's growing “digital divide” in particular. The paper discusses the promises and perils of the digital revolution. Comments are made on the library and information infrastructure, superstructure, and digitization initiatives in India. The paper concludes with the observation that only a suitable national policy for library and information systems can contain the emerging “digital divide” in India. Otherwise, networked information and library networks will have no meaning for the 47·79% Indians who are totally illiterate.  相似文献   

12.
This research examines privacy law and Human Flesh Search (HFS) on the Chinese Internet. HFS is spontaneous, widely participated search and publication of targeted individuals’ personal information on the Internet. This research sees HFS as an important form of non-institutional information gathering and publication, and argues that the regulation of HFS is not only about privacy but also line-drawing for information collection and dissemination in the digital setting. Therefore, legal instruments and court cases in relation to HFS and online privacy must be assessed as important components of the Chinese state’s Internet regulatory scheme. This research finds that the paired concepts of ‘flexibility and populism,’ key features of legal reform and development in contemporary China, are highly relevant to analyze the growth of digital privacy laws in China. The political-legal authorities’ experimentation and innovation in the development of the law shed important light on how China’s Internet governance adapts to changing circumstances and strives to keep pace with profound social transformations in new technological environments.  相似文献   

13.
This paper focuses on the impact of ICTs, the Internet, and the Web on the life and work of people and mentions new services available through the convergence of computer and communication technologies. Also discussed are “digital determinism” in general and India's growing “digital divide” in particular. The paper discusses the promises and perils of the digital revolution. Comments are made on the library and information infrastructure, superstructure, and digitization initiatives in India. The paper concludes with the observation that only a suitable national policy for library and information systems can contain the emerging “digital divide” in India. Otherwise, networked information and library networks will have no meaning for the 47·79% Indians who are totally illiterate.  相似文献   

14.
The article argues that the Privacy Act of 1974 requires revision during the 1980s to reflect more fully the challenges posed to personal privacy by new forms or applications of information technology. The revised Privacy Act should establish a permanent mechanism for the articulation of privacy interests at the federal level in the form of the kind of Privacy Protection Commission originally proposed in the Senate version of the Privacy Act of 1974. The appropriate characteristics of such a regulatory mechanism, and the consequences of not having such an agency at present, are discussed.  相似文献   

15.
East and southeast Asia has become a regional production platform for the manufacture of Western media and information commodities, primarily driven by transnational institutions but also with the participation of domestic and regional conglomerates. Still bearing the heavy imprint of the colonial era, most of the region's communications systems continue to function as spokes within an international wheel of production and labor and, in fact, at a now-increased level of industrial and financial integration. Despite some impressive economic statistics and relative social improvement, the world communications economy has left little space for the region's urban and rural working people.  相似文献   

16.
《图书馆管理杂志》2013,53(4):29-36
Abstract

Academic libraries with public access computers are faced with the challenge of balancing patron privacy rights with accountability and system security. What should libraries do when a patron uses a public Internet connection to send harassing email messages or hack into a remote network, or into the library's own system? This article examines the conflicting values of privacy and security. It examines patron authentication as a security measure and the safeguards that should accompany such a system. Several options are offered for addressing this dilemma. A summary of university appropriate use policies is presented with recommendations and a sample policy statement.  相似文献   

17.
Facial recognition technology has been adopted for the better delivery of m-government services, but the ease and frequency with which users' personal information is being accessed and misused have inevitably increased. This has recently triggered a new phenomenon of privacy fatigue in e-governance, which makes people feel powerless to protect their privacy. A comprehensive understanding of users' privacy fatigue is important, since negative user perceptions may lead to disengagement and the distrust of the government. Drawing on the Person-Environment fit theory and user agency perspective, this study examines the antecedents of privacy fatigue, manifested as emotional exhaustion and cynicism. A large-scale telephone survey allowed data to be collected from 3, 436 users of facial recognition-based m-Gov services in China. The Partial Least Squares (PLS) results reveal that: (1) privacy fatigue indeed occurs among the users of facial recognition-based m-Gov services in China; (2) the perceptions of privacy control is the core antecedent of users' privacy fatigue, which influences two dimension—emotional exhaustion and cynicism—in different directions; (3) the effectiveness of both privacy self-efficacy and government legislation positively influences perceived privacy control, while the effect of the effectiveness of privacy policies on it is insignificant. This study contributes to the research by empirically testing the notion and antecedents of privacy fatigue in the context of facial recognition-based m-Gov services, and provides a mechanism analysis with an overarching theoretical framework. In addition, the findings may generate new research avenues related to privacy fatigue under an AI-enabled government.  相似文献   

18.
This paper provides an analytical overview of related literature published during the past decade on rural population's information needs and acquisition in China, with a view to informing the world research community and policy makers of what has been found about the information needs of the world's largest rural population and to promoting dialogue between interested researchers within and outside China. Results from related studies are summarized; major methodological features of these studies are noted; practical and theoretical implications of major findings are critically analyzed. Although the results from related studies are not directly comparable due to their differences in research methods and contexts, it is nevertheless possible to draw some common conclusions regarding the rural population's information needs and information source preferences. Related research has overwhelmingly showed that rural residents have an extensive range of information needs, with agricultural technological information, market information, income generation information and policy information being the most needed; and that they rely very much on interpersonal relationships for acquiring both general information and information for agriculture production. The primary objectives of most studies are pragmatic rather than theoretical.  相似文献   

19.
SUMMARY

The privacy and confidentiality of library use are often at odds with efficiency in and customization of library public services. When librarians make decisions about services and privacy, they should consider strategic approaches to defining and discussing privacy and become familiar with the law of library privacy and their ethical commitment to privacy in library use. A wide range of library services and efficiencies threaten privacy and introduce the potential for secondary uses of personally identifying information collected by the library. Market failure for privacy weakens the value of consumer surveys and consent as substitutes for librarians' choices between privacy and services. Compromises such as those outlined by the ALA Intellectual Freedom Committee offer reasonable approaches to libraries and librarians struggling with the uncertainties that characterize the challenge of meeting both service and privacy interests.  相似文献   

20.
一种敏感信息共享隐私保护框架   总被引:1,自引:0,他引:1  
刘小波 《图书情报工作》2011,55(13):116-120
通过对敏感信息共享中的隐私威胁分析,探讨敏感信息共享的隐私保护技术策略,并在此基础上提出一种敏感信息共享隐私保护框架,该框架可实现隐私访问策略的形式化表示以及基于语义的信息匿名化计算。最后,对实现该框架的关键技术进行简要介绍。  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号