首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 640 毫秒
1.
Significant U.S. policy initiatives in the late 1990s were intended to control Internet access, privacy, and indecency--specifically among children. This study reflects on these using quantitative data from a computer center in a children's library in the inner city. Researchers gathered 16 weeks of page requests ( n = 203,647) using "click stream" and behavioral data, and analyzed these using nonparametric tests. Findings show that users are highly influenced by each other and browse only a small universe of sites. Game playing and communicating with individuals (via e-mail and chat) were the most popular uses. Children were uninterested in pornography and sites directed toward children. Advertising was extremely common. Children were most likely to engage in sharing when using games and chat. For this population, access, privacy and indecency initiatives to control Internet use fails to achieve its stated goals, but activities that encourage sharing in public places hold some promise for building computer knowledge.  相似文献   

2.
Universal high-speed Internet access can productively transform a nation's economy. However, many municipalities in the United States have been left behind in terms of Internet penetration. Some municipal governments have tried to address this by launching initiatives that aim at offering citywide, universal broadband access. Unfortunately, most of these initiatives either have been discontinued or have ended in failure. Drawing on actor-network theory, we conducted a 3-year study to investigate the evolution of the Internet TV initiative in LaGrange, Georgia, in the United States. The results reveal distinct interpretations of the initiative by different actor groups (the government, the service providers, socioeconomically advantaged residents, and socioeconomically disadvantaged residents), at different stages of implementation, pointing to tensions among the various groups. These tensions reflect the structural problems embedded in the macro political, economic, and societal context. The findings offer insights for policymakers who intend to achieve universal broadband access.  相似文献   

3.
黄丽佳  袁勤俭 《现代情报》2017,37(10):114-121
通过对相关文献的回顾,本文对国际网络隐私研究进行了计量分析,发现现有的研究主题集中在"基于移动位置服务的隐私问题研究"、"隐私保护算法研究"、"隐私保护技术研究"、"云计算的隐私安全研究"、"网络隐私权限控制研究"、"社交网站和电子商务中的用户隐私态度与行为研究"、"青少年敏感信息的隐私与安全保护研究"、"数据公开共享策略与国家治理研究"8个方面。研究发现当前研究中存在"利用数据纵向分析网络隐私主题随时间发展变化的研究较少"、"对于一些发展中国家的隐私问题关注度较低"、"国家的治理与业界的隐私政策相对独立缺乏联系"等问题,"大数据时代移动信息和社交信息挖掘过程中的隐私问题"、"在线医疗的隐私问题"等是未来研究值得关注的领域。  相似文献   

4.
It has been recommended that parents should monitor their children’s Internet use, including what sites their children visit, what messages they receive, and what they post. In this paper, I claim that parents ought not to follow this advice, because to do so would violate children’s right to privacy over their on-line information exchanges. In defense of this claim, I argue that children have a right to privacy from their parents, because such a right respects their current capacities and fosters their future capacities for autonomy and relationships.  相似文献   

5.
Informational privacy, data mining, and the Internet   总被引:3,自引:2,他引:1  
Privacy concerns involving data mining are examined in terms of four questions: (1) What exactly is data mining? (2) How does data mining raise concerns for personal privacy? (3) How do privacy concerns raised by data mining differ from those concerns introduced by ‘traditional’ information-retrieval techniques in computer databases? (4) How do privacy concerns raised by mining personal data from the Internet differ from those concerns introduced by mining such data from ‘data warehouses?’ It is argued that the practice of using data-mining techniques, whether on the Internet or in data warehouses, to gain information about persons raises privacy concerns that (a) go beyond concerns introduced in traditional information-retrieval techniques in computer databases and (b) are not covered by present data-protection guidelines and privacy laws.  相似文献   

6.
以广东省科技报告为例,从科技报告存储和科技报告浏览两个角度,运用文献计量学方法对国家科技报告服务系统的存储数据和浏览日志进行分析,研究科技报告的存储量、地域分布、项目来源、浏览量、呈交机构性质,并针对存在的问题,提出改进和完善的对策和建议。  相似文献   

7.
This article provides a critical comparative analysis of mobile versus personal computer (PC)-based forms of Internet access. Drawing from an interdisciplinary body of literature, it illustrates a wide range of ways in which mobile Internet access offers lower levels of functionality and content availability; operates on less open and flexible platforms; and contributes to diminished levels of user engagement, content creation, and information seeking. At a time when a growing proportion of the online population is “mobile only,” these disparities have created what is termed here a mobile Internet underclass. The implications of this argument for digital divide policymaking and, more broadly, for the evolutionary trajectory of the Internet and the dynamics of Internet usage are discussed.  相似文献   

8.
运用极限编程技术,开发适用于动态Internet信息共享的电子政务考评信息平台.系统采用无记名的网络投票方式,将海量数据进行集成化处理.系统应用表明效果良好.保密性强.  相似文献   

9.
Privacy has largely been equated with every individual's right to privacy. Accordingly, current efforts to protect privacy on the Internet have sought anonymity by breaking, where possible, links with personally identifiable information (PII)—all uses of aggregated data stripped of PII are considered legitimate. This article argues that we need to use a broader concept, general or group identifying information (GII), because even aggregated data stripped of PII violate privacy at the community level. The search engine companies, or anyone else with access to their log files, can use these data to generate a moment-by-moment view of what is on the collective mind. Such a view can be used in a variety of ways, some with deep economic and even political impact. In order to frame this discussion, it is necessary to examine some of the realities of the search engine-mediated associative interface to the World Wide Web. While this interface has enormous benefits for the networked world, it also fundamentally changes a number of issues underlying various current debates about Internet governance.  相似文献   

10.
Whether the Internet Protocol address should be seen as personal data or not remains a contested issue with regard to information privacy. This article explores the question by looking at the technical attributes of the Internet Protocol address, European Union (EU) and U.S. case law, and how the EU's advisory data protection body, the Article 29 Working Party, and some of the world's most influential information and communication technology (ICT) companies consider the IP address. The notion of contextual integrity is then used to show that information privacy regulation must stipulate concrete technical mandates instead of guiding principles, contrary to the ideal of technology neutrality in Internet regulation.  相似文献   

11.
随着我国互联网的高速发展,数据挖掘技术尤其是Web挖掘作为企业搜寻商业信息为客户提供个性化服务的重要手段,不可避免地触到隐私保护这块"雷区"。隐私权保护在网络环境下既是法律界同时也是电子商务研究的热点话题。隐私保护限制了web挖掘数据中数据的搜集及知识的共享和传播,如何在web挖掘和隐私保护之间进行权衡是文章研究的出发点。结合我国网络隐私权保护的现状,通过对隐私权的内容及可能造成侵权形式的研究,探讨了隐私保护面临的挑战,提出了隐私权保护的解决方案框架。  相似文献   

12.
This paper examines empirically the factors that affect the adoption of Internet banking by Tunisian bank customers. As base model, we use the technology acceptance model (TAM) and theory of planned behavior (TPB). The model employs security and privacy, self efficacy, government support, and technology support, in addition to perceived usefulness, perceived ease of use, attitude, social norm, perceived behavior control and intention to use Internet banking. Structural equation modeling is employed to examine the inter-correlations among the proposed constructs. A survey involving a total of 284 respondents is conducted and confirmatory factor analysis was used to determine the measurement efficacies. Theoretically, this study confirms the applicability of the TAM model and TPB in predicting Internet banking adoption by Tunisian bank customers. The results allow banks' decision makers to develop strategies that can encourage the adoption of Internet banking. Banks should improve the security and privacy to protect consumers' personal and financial information, which will increase the trust of users. Government should also play a role to support bank industry by having a clear and solid law on this will ensure that customers are more confident for using Internet banking, ensuring a better Internet infrastructure and helps them to encourage users to use Internet banking. Lastly, Tunisian Banks should focus on those clients who already have a home PC, access Internet and more educated and younger since they are the most likely to adopt Internet banking.  相似文献   

13.
《The Information Society》2007,23(5):383-389
Privacy has largely been equated with every individual's right to privacy. Accordingly, current efforts to protect privacy on the Internet have sought anonymity by breaking, where possible, links with personally identifiable information (PII)—all uses of aggregated data stripped of PII are considered legitimate. This article argues that we need to use a broader concept, general or group identifying information (GII), because even aggregated data stripped of PII violate privacy at the community level. The search engine companies, or anyone else with access to their log files, can use these data to generate a moment-by-moment view of what is on the collective mind. Such a view can be used in a variety of ways, some with deep economic and even political impact. In order to frame this discussion, it is necessary to examine some of the realities of the search engine-mediated associative interface to the World Wide Web. While this interface has enormous benefits for the networked world, it also fundamentally changes a number of issues underlying various current debates about Internet governance.  相似文献   

14.
Biometric technology is rapidly gaining popularity as an access control mechanism in the workplace. In some instances, systems relying on biometric technology for access control have not been well received by employees. One potential reason for resistance may be perceived privacy issues associated with organizational collection and use of biometric data. This research draws on previous organizational information handling and procedural fairness literature to frame and examine these underlying privacy issues. Perceived accountability, perceived vulnerability, and distrust were distilled from the previous literature as the primary dimensions of employee privacy concerns related to biometric technology. This study assesses the effects of these privacy concerns, how they vary based on the cultural influences of Anglos and Hispanics.Fire ground accountability is a critical management objective in the firefighting domain. In multi-unit or multi-agency crisis response scenarios, the on-scene incident commander tracks and accounts for each first responder. This research designed and deployed a new fire ground accountability system that tracked firefighters through finger pattern-based biometric logins to their assigned positions on the firefighting apparatus. An instrument measuring level of privacy concern on three underlying dimensions and demographic data was developed, validated and administered in a quasi-experimental field study. A pre-test–post-test survey methodology was employed to detect potential differences in privacy concerns as familiarity with the system increased. The study shows that Anglo and Hispanic subjects frame privacy issues differently associated with use of biometric technology in a fire ground accountability system. Finally, the study showed that some privacy concerns such as distrust and perceived vulnerability can be alleviated through system use with changes in post-use privacy concerns moderated by ethnic affiliation.  相似文献   

15.
In the United States, Congress has had a long-standing interest in consumer privacy and the extent to which company practices are based on fair information practices. Previously, public policy was largely informed by anecdotal evidence about the effectiveness of industry self-regulatory programs. However, the Internet has made it possible to unobtrusively sample web sites and their privacy disclosures in a way that is not feasible in the offline world. Beginning in 1998, the Federal Trade Commission relied upon a series of three surveys of web sites to assess whether organizations post online privacy disclosures and whether these disclosures represent the U.S. definition of fair information practices. While each year's survey has provided an important snapshot of U.S. web-site practices, there has been no longitudinal analysis of the multiyear trends. This study compares a subset of equivalent individual-level web-site data for the 1998, 1999, 2000, and 2001 web surveys. Implications for using this type of research to inform public policy are discussed.  相似文献   

16.
The widespread use of the computer and the rapid growth of telecommunications technology have sparked debate on the privacy implications of computerized records. Regulations and government programs implemented in response to public pressure for greater protection of records could significantly affect the information system manager and any individual who has personal data recorded in a computerized file. This article considers the implications of possible privacy policy initiatives in the United States in light of Swedish experience.  相似文献   

17.
We examine three possible explanations for differences in Internet privacy concerns revealed by national regulation: (1) These differences reflect and are related to differences in cultural values described by other research; (2) these differences reflect differences in Internet experience; or (3) they reflect differences in the desires of political institutions without reflecting underlying differences in privacy preferences. Using a sample of Internet users from 38 countries matched against the Internet population of the United States, we find support for (1) and (2), suggesting the need for localized privacy policies. Privacy concerns decline with Internet experience. Controlling for experience, cultural values were associated with differences in privacy concerns. These cultural differences are mediated by regulatory differences, although new cultural differences emerge when differences in regulation are harmonized. Differences in regulation reflect but also shape country differences. Consumers in countries with sectoral regulation have less desire for more privacy regulation.  相似文献   

18.
We use the legal framework of captive audience to examine the Federal Trade Commission 2012 privacy guidelines as applied to mobile marketing. We define captive audiences as audiences without functional opt-out mechanisms to avoid situations of coercive communication. By analyzing the current mobile marketing ecosystem, we show that the Federal Trade Commission's privacy guidelines inspired by the Canadian “privacy by design” paradigm fall short of protecting consumers against invasive mobile marketing in at least three respects: (a) The guidelines overlook how, in the context of data monopolies, the combination of location and personal history data threatens autonomy of choice; (b) the guidelines focus exclusively on user control over data sharing, while ignoring control over communicative interaction; and (c) the reliance on market mechanisms to produce improved privacy policies may actually increase opt-out costs for consumers. We conclude by discussing two concrete proposals for improvement: a “home mode” for mobile privacy and target-specific privacy contract negotiation.  相似文献   

19.
美国和欧盟的数据隐私保护策略   总被引:2,自引:0,他引:2  
孙美丽 《情报科学》2004,22(10):1265-1267
Internet用户对数据隐私问题日益关注,对隐私的担忧是用户使用的主要障碍。有效的数据隐私保护对Internet产业的发展极为重要。本文对美国和欧盟的数据隐私保护策略进行了介绍,以期对我国的数据隐私保护起借鉴作用。  相似文献   

20.
数字信息资源开放存取中的法律规范是实现数字信息资源共享的前提。《布达佩斯开放存取计划》中对开放存取的定义使用户在使用该文献时不受经济、法律或技术的限制产生了歧义,导致数字信息资源开放存取行为在实践中经常出现纠纷,引发了一些法律问题。本文对数字信息资源开放存取的法律客体问题、开放存取过程中保持文献的完整性问题、权利人的利益保护问题、复制权问题、合理使用问题以及适当引用问题进行了分析。  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号