首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 31 毫秒
1.
We use the legal framework of captive audience to examine the Federal Trade Commission 2012 privacy guidelines as applied to mobile marketing. We define captive audiences as audiences without functional opt-out mechanisms to avoid situations of coercive communication. By analyzing the current mobile marketing ecosystem, we show that the Federal Trade Commission's privacy guidelines inspired by the Canadian “privacy by design” paradigm fall short of protecting consumers against invasive mobile marketing in at least three respects: (a) The guidelines overlook how, in the context of data monopolies, the combination of location and personal history data threatens autonomy of choice; (b) the guidelines focus exclusively on user control over data sharing, while ignoring control over communicative interaction; and (c) the reliance on market mechanisms to produce improved privacy policies may actually increase opt-out costs for consumers. We conclude by discussing two concrete proposals for improvement: a “home mode” for mobile privacy and target-specific privacy contract negotiation.  相似文献   

2.
Privacy has largely been equated with every individual's right to privacy. Accordingly, current efforts to protect privacy on the Internet have sought anonymity by breaking, where possible, links with personally identifiable information (PII)—all uses of aggregated data stripped of PII are considered legitimate. This article argues that we need to use a broader concept, general or group identifying information (GII), because even aggregated data stripped of PII violate privacy at the community level. The search engine companies, or anyone else with access to their log files, can use these data to generate a moment-by-moment view of what is on the collective mind. Such a view can be used in a variety of ways, some with deep economic and even political impact. In order to frame this discussion, it is necessary to examine some of the realities of the search engine-mediated associative interface to the World Wide Web. While this interface has enormous benefits for the networked world, it also fundamentally changes a number of issues underlying various current debates about Internet governance.  相似文献   

3.
Psychological factors have been widely used in existing empirical studies to understand individuals’ decisions regarding HIV disclosure. However, limited studies have examined disclosure by applying a comprehensive interpersonal communication framework to understand information behaviors relevant to disclosing one's HIV status, including seeking information and sharing information. Thus the mediating role of information flow and its relationship with disclosure uncertainty for those living with HIV have been largely overlooked. We propose an integrated conceptual framework to connect the antecedent factors of disclosure decision-making, the potential route of the disclosure process, and the consequences of disclosure through integrating components from key interpersonal communication theories including the theory of communication privacy management and social influence theory and adding mediating mechanisms of “uncertainty” and “information behaviors.” Applying interpersonal communication theory and a comprehensive information management model to HIV disclosure may offer novel opportunities to support individuals living with HIV through the development of theory-based disclosure interventions to facilitate this complicated but critical process.  相似文献   

4.
杨灵  张效通 《资源科学》2020,42(12):2406-2418
当今社会,人口老龄化及老龄化城市已成为世界范围所普遍关注的问题。通过梳理近年来老年友好城市相关理论与实践研究,本文提出了老龄化城市建成环境友好度的概念,在建立老龄化城市建成环境友好度指标体系的基础上,创新性地提出了一种在城市大范围内、以实际客观数据为基础、以老年人口分布特征为导向的老龄化城市建成环境友好度多元量化评价方法,并以台湾省老龄化城市——台北市与新北市为例进行评价。通过评价结果,可看出友好度最高及较高的“里”约占18%,且主要集中在台北市市区、新北市西部部分地区;友好度中等的“里”约占64%,且主要集中在新北市市区、台北市东北部近郊区;友好度较低及最低的“里”约占18%,且主要集中在新北市北部及南部的城市外围地区。同时,对台北市与新北市老龄化城市建成环境友好度各个等级的老龄化程度,与其他各项评价指标的平均值进行交叉比对,从而提出有效的政策建议。总体来说,该量化评价方法有助于提升老龄化城市建成环境总体规划策略,同时可为相似的老龄化城市提供借鉴。  相似文献   

5.
Statistics have long shaped the field of visibility for the governance of development projects. The introduction of big data has altered the field of visibility. Employing Dean's “analytics of government” framework, we analyze two cases—malaria tracking in Kenya and monitoring of food prices in Indonesia. Our analysis shows that big data introduces a bias toward particular types of visualizations. What problems are being made visible through big data depends to some degree on how the underlying data is visualized and who is captured in the visualizations. It is also influenced by technical factors such as distance between mobile phone towers and the truth claims that gain legitimacy.  相似文献   

6.
This study identified the influence of the main concepts contained in Zipf's classic 1949 book entitled Human Behavior and the Principle of Least Effort (HBPLE) on library and information science (LIS) research. The study analyzed LIS articles published between 1949 and 2013 that cited HBPLE. The results showed that HBPLE has a growing influence on LIS research. Of the 17 cited concepts that were identified, the concept of “Zipf's law” was cited most (64.8%), followed by “the principle of least effort” (24.5%). Although the concept of “the principle of least effort,” the focus of HBPLE, was not most frequently observed, an increasing trend was evident regarding the influence of this concept. The concept of “the principle of least effort” has been cited mainly by researchers of information behavior and served to support the citing authors’ claims. By contrast, the concept of “Zipf's law” received the most attention from bibliometrics research and was used mainly for comparisons with other informetrics laws or research results.  相似文献   

7.
8.
In the age of big data we need to think differently about privacy. We need to shift our thinking from definitions of privacy (characteristics of privacy) to models of privacy (how privacy works). Moreover, in addition to the existing models of privacy—the surveillance model and capture model—we need to also consider a new model: the datafication model presented in this article, wherein new personal information is deduced by employing predictive analytics on already-gathered data. These three models of privacy supplement each other; they are not competing understandings of privacy. This broadened approach will take our thinking beyond current preoccupation with whether or not individuals’ consent was secured for data collection to privacy issues arising from the development of new information on individuals' likely behavior through analysis of already collected data—this new information can violate privacy but does not call for consent.  相似文献   

9.
具有开放性、可供性等特征的数字技术使得传统企业形成了数字化转型企业开放式创新生态系统的新组织型态。然而,当前对其研究还处于概念探讨和特征归纳的初级阶段,急需对其构建研究形成系统性理论框架。因此,首先基于相关概念的梳理,尝试明晰“何为”数字化转型企业开放式创新生态系统,即其内涵界定;其次,结合当前开放式创新生态系统、数字化转型企业两大研究基础,厘清“为何”急需开展数字化转型企业开放式创新生态系统构建的研究;最后,初步提出包括“型态识别→构建动因→构建逻辑→构建过程”的研究框架,指出未来“如何”开展数字化转型企业开放式创新生态系统构建的研究,以期为数字化转型企业开放式创新生态系统构建研究夯实理论基础并指明未来研究方向。  相似文献   

10.
Why are ongoing legal, design, and policy debates around information privacy often divorced from the lived experience of everyday digital media use? This article argues that human emotion is a critical but undertheorized element in users' subjective sense of information privacy. The piece advocates for a greater attention to the phenomenology of feeling and to the concept of “visceral” design in information privacy scholarship, policy, and design practice.  相似文献   

11.
This paper aims to provide new insights to debates on group privacy, which can be seen as part of a social turn in privacy scholarship. Research is increasingly showing that the classic individualistic understanding of privacy is insufficient to capture new problems in algorithmic and online contexts. An understanding of privacy as an “interpersonal boundary-control process” (Altman, The environment and social behavior, Brooks and Cole, Monterey, 1975) framing privacy as a social practice necessary to sustain intimate relationships is gaining ground. In this debate, my research is focused on what I refer to as “self-determined groups” which can be defined as groups whose members consciously and willingly perceive themselves as being part of a communicative network. While much attention is given to new forms of algorithmically generated groups, current research on group privacy fails to account for the ways in which self-determined groups are affected by changes brought about by new information technologies. In an explorative case study on self-organized therapy groups, I show how these groups have developed their own approach to privacy protection, functioning on the basis of social practices followed by all participants. This informal approach was effective in pre-digital times, but online, privacy threats have reached a new level extending beyond the scope of a group’s influence. I therefore argue that self-determined sensitive topic groups are left facing what I present as a dilemma: a tension between the seemingly irreconcilable need for connectivity and a low threshold, on the one hand, and the need for privacy and trust, on the other. In light of this dilemma, I argue that we need new sorts of political solutions.  相似文献   

12.
Industry 4.0 places a premium on cloud security since more and more companies are moving their activities to the cloud to reap the benefits of the Fourth Industrial Revolution.The term “cloud computing” refers to a collection of Internet-based hardware and software tools. Providers of cloud services use data centers situated in various physical locations. Cloud computing makes life easier for users by making remote, simulated resources available over the internet. Google Apps and Microsoft SharePoint are two examples of popular cloud applications. In addition to its exciting potential, the “cloud computing” industry's lightning-fast expansion raises serious security concerns. When discussing security, cloud really suffers from Open Systems' and the internet's perennial problem. The only thing stopping the widespread use of cloud computing is the lack of trust in the system. There are a number of security concerns with cloud computing, including protecting user data and vetting cloud service providers' practices. Using encryption, confidential information can be sent over an unsecured channel without fear of data loss or manipulation. Data encryption using various protocols has been used in various settings. Different cryptosystems were developed and used at various times. Additionally, cloud computing enables multiple users to access and retrieve data simultaneously through their own personal Internet connections, which increases the risk of confidential data loss and exposure in a number of different places. Elliptic Curve Cryptography and other cryptographic algorithms have been used to develop numerous methods and protocols that guarantee the security and privacy of transmitted data. In this paper, we suggest a safe and efficient method for sharing information in the cloud without compromising its safety or integrity. The proposed system is able to guarantee authentication and data integrity because it uses a hybrid of the ECC and the Advanced Encryption Standard (AES) technique. The experimental results confirm the proposed approach outperforms the current gold standard.  相似文献   

13.
This paper distinguishes between two main questions regarding the notion of privacy: “What is privacy?” and “Why do/should we value privacy?”. In developing a social-ontological recognitional model of privacy (SORM), it gives an answer to the first question. According to the SORM, Privacy is a second order quality of roles within social practices. It is a function of who is or should be recognized as a “standard authority”. Enjoying standard authority means to have the right to interpret and contest role behavior and role obligations within a specific practice (first level), as well as evaluate the normative structure, the fundamental practice norms as well as the roles and their status (second level). The SORM utilizes the concept of standard authority to explicate privacy with regard to two categories that capture the relevant phenomena of privacy: decisional and informational privacy. Within a practice, an actor is said to have decisional privacy if she as a BCR does not (or does not have to) recognize bearers of accidental roles as standard authorities. Vice versa, an actor is said to enjoy informational privacy if all other BCRs (and especially data collecting actors) recognize her as a standard authority. Additionally, the requirement of mutual recognition by the practice participants as standard authorities introduces a “weak normativity” into the theory, which can be used to identify deficient privacy arrangements within practices.  相似文献   

14.
This article investigates the ways in which the reporting of technological developments in artificial intelligence (AI) can serve as occasions in which Occidental modernity's cultural antinomies are played out. It takes as its reference point the two chess tournaments (in 1996 and 1997) between the then world champion Gary Kasparov and the IBM dedicated chess computers Deep Blue and Deeper Blue and shows how these games of chess came to be seen as an arena where fundamental issues pertaining to human identity were contested. The article considers the dominant framing of these encounters in terms of a conflict between two opposed categories—“human” and “machine”—and argues the essential role of human agency, the human supplement, in the performances of machine intelligence.  相似文献   

15.
Significant results of a project carried out by the Studiengruppe für System-forschung e.V. (Heidelberg, W. Germany) on the “Economy of Information and Documentation Systems” are described. The aims of this project in the framework of the German national “Program of the Federal Government for the Promotion of Information and Documentation (I&D-Program) 1974–1977” were to develop methods for measuring the efficiency of information and documentation systems and services and to test such methods in actual practice.  相似文献   

16.
This paper provides an in-depth analysis of the privacy rights dilemma surrounding radio frequency identification (RFID) technology. As one example of ubiquitous information system, RFID has multitudinous applications in various industries and businesses across society. The use of this technology will have to lead to a policy setting dilemma in that a balance between individuals’ privacy concerns and the benefits that they derive from it must be drawn. After describing the basic RFID technology some of its most prevalent uses, a definition of privacy is derived in the context of information systems. To illustrate current attempts at controlling the undesirable side effects of RFID, Lessig’s cyberspace framework is presented. It is found that each of Lessig’s components is inadequate at preventing individual privacy violations in RFID. The main focus within this framework is on the norms of society. The social norm mechanism that addresses privacy issues in cyberspace is the Fair Information Practices Principles (FIPP). After an analysis of these principles, it is posited that the FIPP only deal with procedural justice issues related to data collection and omit distributive and interactional justice reasoning related to the actual beneficial and detrimental outcomes to the individuals whose data is being obtained. Thus, RFID is presented in the context of the tension between the many benefits that are provided by the technology in social exchanges, and the risk it carries of the loss of privacy. The new, expanded framework recognizes both sides of the issue with the ultimate goal of providing a greater understanding of how privacy issues can be addressed with RFID technology.  相似文献   

17.
An interdisciplinary introduction to postevolutionary performance artist Stelarc and aspects of some human-technology hybrid tropes in which he works: Obsolete Body Suspensions with hooks in the skin; an expanding, beeping, Stomach Sculpture, which he ingested and filmed; the “Ping Body” event during which his limbs (arm, leg) were controlled with electric stimulation by an Internet audience, while simultaneously Stelarc controlled a prosthetic robotic “Third Hand” with repurposed muscles in his abdomen and leg; and a tissue-culture installment under the skin of his forearm—his Third Ear—which is meant to contain a microphone and relay audio to an online audience. The article reviews critical contexts such as cyberpunk literature, biological and data networks, embodiment, scientific practices, electric body manipulation, and aesthetic and interpretive concerns. It closes with an account of the author's personal encounter with Stelarc at a dinner party, and the role of emotions, such as fear, in postevolution.  相似文献   

18.
Machine learning applications must continually utilize label information from the data stream to detect concept drift and adapt to the dynamic behavior. Due to the computational expensiveness of label information, it is impractical to assume that the data stream is fully labeled. Therefore, much research focusing on semi-supervised concept drift detection has been proposed. Despite the large research effort in the literature, there is a lack of analysis on the information resources required with the achievable concept drift detection accuracy. Hence, this paper aims to answer the unexplored research question of “How many labeled samples are required to detect concept drift accurately?” by proposing an analytical framework to analyze and estimate the information resources required to detect concept drift accurately. Specifically, this paper disintegrates the distribution-based concept drift detection task into a learning task and a dissimilarity measurement task for independent analyses. The analyses results are then correlated to estimate the required number of labels within a set of data samples to detect concept drift accurately. The proximity of the information resources estimation is evaluated empirically, where the results suggest that the estimation is accurate with high amount of information resources provided. Additionally, estimation results of a state-of-the-art method and a benchmark data set are reported to show the applicability of the estimation by proposed analytical framework within benchmarked environments. In general, the estimation from the proposed analytical framework can serve as guidance in designing systems with limited information resources. This paper also hopes to assist in identifying research gaps and inspiring new research ideas regarding the analysis of the amount of information resources required for accurate concept drift detection.  相似文献   

19.
20.
ABSTRACT

This article examines one of the largest interventions in computer-based learning currently underway, the One Laptop per Child (OLPC) project, with 2.5 million laptops in use worldwide. Drawing on 2010 and 2013 fieldwork investigating a project in Paraguay with 10,000 of OLPC's “XO” laptops, I explore the ways in which participants interpreted leisure laptop use as “learning.” I show that the most captivating uses of the laptops were not “productive” or programming-centric, as OLPC's developers hoped, but “consumptive” and media-centric, focused on music, videos, and video games. I discuss the learning benefits and drawbacks of this use, as understood by participants and in light of education research, and in light of the broader context of transnational corporations interested in marketing to these children. In the process, I weigh OLPC's utopian dreams against the interests of the child beneficiaries, concerns of media imperialism, and a potential shift in the meaning of computers.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号