首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 390 毫秒
1.
Because of rapid developments in information technology, abuses of sovereignty by authoritarian governments have received much publicity in recent years, raising public consciousness of massive human rights violations to new levels. Contributing to the dialogue on the influence of information technology on social systems, this article explores (1) the contested role of information in disaster relief efforts, (2) the clash of political and social values emerging from the use of information within the international community's involvement in high-profile crises, such as those in Somalia, Bosnia, and Rwanda, and (3) the resultant rethinking of government's power within national borders, sovereignty. With life-anddeath stakes, international affirmation of a free flow of information during disasters is emerging as a global human rights mandate.  相似文献   

2.
《Research Policy》2023,52(6):104765
In recent years, global technology-based competition has not only intensified, but become increasingly linked to a more comprehensive type of competition between different political and value systems. The globalist assumptions of the post-Cold War era that reliable mutually beneficial agreements could be reached with all nations, regardless of ideology, have been shattered. A previously less visible, mostly political, risk dimension has been brought to the fore by recent geopolitical and geo-economic developments. Against this background, the notion of technology sovereignty has gained prominence in national and international debates, cutting across and adding to established rationales of innovation policy.In this paper, we propose and justify a concise yet nuanced concept of technology sovereignty to contribute to and clarify this debate. In particular, we argue that technology sovereignty should be conceived as state-level agency within the international system, i.e. as sovereignty of governmental action, rather than (territorial) sovereignty over something. Against this background, we define technology sovereignty not as an end in itself, but as a means to achieving the central objectives of innovation policy - sustaining national competitiveness and building capacities for transformative policies. By doing so, we position ourselves between a naive globalist position which largely neglects the risks of collaboration and the promotion of near autarky which disregards the inevitable costs of creating national redundancies and reducing cooperative interdependencies. We finish by providing a set of policy suggestions to support technology sovereignty in line with our conceptual approach.  相似文献   

3.
Contemporary information technologies such as social media have invigorated the way knowledge is shared within organizations to the extent that we have to rethink and reassess our understanding of the role and influence of technology in organizational processes and knowledge sharing. This paper uses the strategy as practice lens guided by the interpretivist philosophy to understand the influence of informal social media practices on knowledge sharing and work processes within an organization. The paper uses empirical evidence from the case study of a telecom organization in Tanzania to gain theoretical insight into informal social media practices and knowledge sharing. This research contributes to the Information Systems (IS) literature by asserting that organizational processes are achieved by mundane knowledge sharing mediated by informal social media use within the organization. Also, the study contributes to IS literature by highlighting how emerging informal practices are essential to daily processes within organizations.  相似文献   

4.
In the public debate, social implications of information technology are mainly seen through the privacy lens. Impact assessments of information technology are also often limited to privacy impact assessments, which are focused on individual rights and well-being, as opposed to the social environment. In this article, I argue that this perspective is too narrow, in terms of understanding the complexity of the relation between information technology and society, as well as in terms of directions for managing this relation. I use systems theory to show that current approaches focus mostly on individual impact of information technology developments rather than their mediating role in society itself. I argue that this should be complemented by an analysis of impact on individuals (psychic systems) via co-construction of the environment (social system). I then take up the question of what the role of information technology in social systems would look like in terms of the social relations of trust and power, and how this can complement privacy in discussions on impacts of information technology.  相似文献   

5.
新兴技术治理无法回避的是如何应对新兴技术的不确定性,而既定的精英决策模式不仅难以应对新兴技术不确定性带来的社会问题,而且制定的新兴技术政策受到了广泛社会公众的强烈质疑和争议。网络制度下,通过多元行动者协商和互动制定的新兴技术政策消减新兴技术不确定性成为新兴技术治理的关键。研究将治理网络理论作为一个经验工具来分析中国转基因作物治理应对不确定性的政策博弈过程,研究结果表明政府、市场、社会公众之间经过协商和互动的治理行动是应对新兴技术不确定性的消解因素。研究启示是新兴技术政策制定需要社会价值前置,是过程导向治理的体现,也是社会公众权利的回归。  相似文献   

6.
Abstract

This article investigates how an account of hidden, internal properties of an everyday technology became a framework to interpret human action as a serious crime. Using a case study situated in the New York subway system, I examine the criminalization of a practice of New York’s poor known as “selling swipes” performed by so-called “swipers”. A high court came to classify the practice as felony forgery, interpreting it though an expert-witness account of how objects physically manipulated by swipers interact with a secretive, proprietary digital information system. Thousands of felony arrests – overwhelmingly of nonwhite men – have been legitimated under this theory, in which the crime occurs on a plane of technical interactions to which swipers have no access. Through close examination of the underlying technology (known as MetroCard), however, I show considerable problems in the authorities’ understanding of the technology, illustrating the hazards of interpreting human action through proprietary or complex systems, especially as they are represented solely through expert accounts. The case demonstrates fresh connections between technology and unequal outcomes in the U.S. criminal justice system, and suggests an emerging form of social vulnerability, to interpretations of our actions through the logic of technologies black-boxed to us.  相似文献   

7.
The design and use of information technologies are not as easily separated as they may seem. Designers have much at stake in the use of their software, while users are greatly influenced by the design of the software that they use. In this article, I explore the complex relationships built up between the designers and users of human anatomy simulations, including processes of cooperation and conflict. I develop and apply a three-step process for studying the design and use of a software product in its social context. First, it is important to focus on the social worlds of designers and users that influence the development of the technology. Next, the emphasis shifts to the technology itself, which can be viewed as a boundary object emerging from the intersection of the contributing social worlds. Finally, the technology exhibits agency by reshaping the relationships and interactions among the contributing social worlds.  相似文献   

8.
数据权属国内外研究述评与发展动态分析   总被引:1,自引:0,他引:1  
付伟  于长钺 《现代情报》2017,37(7):159-165
随着大数据时代的到来,世界各国对数据资源的争夺日趋激烈,数据确权已成为保障国家安全、促进产业发展和保护个人隐私的关键。该文从数据权属构成、数据产权、数据主权、数据人格权等四个研究视角,对国内外数据权属问题的研究成果进行了综述,并认为数据主权从根本上讲不是一个权属问题,而是一个技术发展问题,归根结底是对数据的控制和分析能力;国内在数据产权方面的研究存在不足,制约了数据产业发展;同时,国内尚未充分认识到个人隐私和数据保护对于维护数据主权和促进数字经济发展的重要性。  相似文献   

9.
21世纪以来,新兴技术显现出对人类主体性与生态系统的渗透性干预,引发了两方面的社会困境:一是科技创新性发展向社会涉入了实验性,打破了知识生产与知识应用的线性两分法,对此应倡导知识生产与治理效用的结合,重塑面向科技治理的社会实验范式;二是科技的不确定性削弱了现实秩序建构的稳健性,理性立法的优先性与经验知识作为决策基础的权威性受到挑战,传统的行为规范在新社会情境下的行动效力受到约束,需要通过高效率的探索性社会实验寻求人类可持续发展的新机制,为此应倡导一种反思性发展的科技治理理念。  相似文献   

10.
In this essay, a new approach to the ethics of emerging information technology will be presented, called anticipatory technology ethics (ATE). The ethics of emerging technology is the study of ethical issues at the R&D and introduction stage of technology development through anticipation of possible future devices, applications, and social consequences. In the essay, I will first locate emerging technology in the technology development cycle, after which I will consider ethical approaches to emerging technologies, as well as obstacles in developing such approaches. I will argue that any sound approach must centrally include futures studies of technology. I then present ATE and some applications of it to emerging information technologies. In ATE, ethical analysis is performed at three levels, the technology, artifact and application levels, and at each levels distinct types of ethical questions are asked. ATE analyses result in the identification and evaluation of a broad range of ethical issues that can be anticipated in relation to an emerging information technology. This ethical analysis can then be used for ethical recommendations for design or governance.  相似文献   

11.
摘要:第四次工业革命的到来,催生了新兴技术的快速发展。社会公众在享受新科技带来的便利同时,会对新兴技术所引发的未知风险产生一定的恐慌与抗拒心理,并经由特定的渠道进行扩散,产生风险感知的耦合效应。因此,掌握社会系统中新兴技术风险感知的扩散规律,对于新兴技术风险的治理具有重要的理论与实践意义。本文界定了风险感知扩散的耦合概念,分析了新兴技术风险感知在社会系统中的“耦合—演化”扩散机理,构建了风险感知的社会扩散量化模型,并通过数值仿真,探讨了内、外部不同要素对新兴技术风险感知扩散的耦合影响及风险感知社会扩散效率。研究结果表明,随着个体对新兴技术风险的心理距离与公众参与新兴技术风险治理程度的增加,风险感知在社会系统中扩散的叠加效应逐渐减弱,独立效应逐渐增强,风险感知的扩散效率逐渐降低;而随着个体对传播者信任程度的提高,风险感知在社会系统中扩散的吸引效应作用逐渐凸显。  相似文献   

12.

The design and use of information technologies are not as easily separated as they may seem. Designers have much at stake in the use of their software, while users are greatly influenced by the design of the software that they use. In this article, I explore the complex relationships built up between the designers and users of human anatomy simulations, including processes of cooperation and conflict. I develop and apply a three-step process for studying the design and use of a software product in its social context. First, it is important to focus on the social worlds of designers and users that influence the development of the technology. Next, the emphasis shifts to the technology itself, which can be viewed as a boundary object emerging from the intersection of the contributing social worlds. Finally, the technology exhibits agency by reshaping the relationships and interactions among the contributing social worlds.  相似文献   

13.
基于动态能力的新兴技术企业知识产权管理思维变革   总被引:4,自引:0,他引:4  
萧延高  李平  刘炬 《科技与管理》2006,8(5):102-105
提出了新兴技术的本质特征是高度不确定性和创造性毁灭,高度不确定的技术和市场环境要求企业具备动态能力的观点。并根据技术和市场的变化吸纳和集成企业内外部资源,获得可持续的竞争优势,指出知识产权是新兴技术领域企业形成和保持动态能力的柔性资源。最后,在新兴技术背景下,给出了管理知识产权需要确立系统思维、组合思维和分享思维的方法。  相似文献   

14.
李牧南  王流云 《科研管理》2019,40(1):89-104
在智能制造和工业互联网的体系架构中,三维打印(增材制造)是重要的核心技术之一。但是,当前大部分针对三维打印的相关研究更多聚焦于创新和市场潜力。针对三维打印技术普及和产业化可能带来的健康、环境和生态风险等问题,相关研究则较为零散,而且分布在化学、材料、物理、生物和环境等不同专业和研究领域。这给相关的科技政策制定和预防式公共治理措施出台带来了一定的信息阻塞和决策障碍。此外,目前有关新兴技术潜在风险识别的理论和实证研究均较少,相关的量化分析尤甚,可以认为是当前科技评价和技术管理研究领域的盲点之一。针对当前有关新兴技术潜在风险识别与评估的相关科学问题,本文提出了一个基于朴素机器学习思想的跨学科主题词挖掘框架,并结合当前较为热点的三维打印技术进行了实证分析。理论和实证分析显示,本文提出的跨学科主题词挖掘框架对于某个具体新兴技术潜在风险的分析,具有一定的内容识别效果,这对于相关的公共治理决策和科技政策制定,或许具有一定的参考价值和积极意义。  相似文献   

15.
管勤 《科教文汇》2012,(6):58-58,68
当今社会日新月异的科学技术的进步,新生事物的不断涌现,社会文化的多元性与开放性,巨大的信息资源充满于我们的生产生活之中,随着社会信息化程度的加深,获取整合有效信息已成为人们学习、工作中不可缺少的部分,教师作为学生的引路人,对学生利用信息能力的培养已是义不容辞的职责。  相似文献   

16.
[目的/意义]为提高新兴技术主题识别的全面性、准确性,在专利、论文信息的基础上,融入舆情信息,提出一种复合型的新兴技术主题识别方法,以期能为微观层面新兴技术主题识别方法的研究提供参考。[方法/过程]面向专利、期刊论文、学位论文、会议论文、舆情共5种不同的科技文献类型,运用LDA模型从多源异构文本中获取主题词,并进行融合分析,提取候选新兴技术主题;设计识别指标体系,弥补现有指标体系缺乏未来前景相应指标的不足;运用CRITIC法进行综合评价,确定最终的新兴技术主题。[结果/结论]以智能网联汽车为实验对象,成功识别出多传感器融合信息技术这项新兴技术,实验结果与业界分析保持一致,说明多源信息视角下的多指标新兴技术主题识别方法能有效地对多源异构文本开展新兴技术的主题识别。  相似文献   

17.
知识产权保护、国际技术溢出与区域经济增长   总被引:2,自引:0,他引:2       下载免费PDF全文
孔伟杰  苏为华 《科研管理》2012,33(6):120-127
文章基于Malmquist生产率指数研究知识产权保护、国际技术溢出与区域经济增长之间的关系。通过对1995-2007年省际面板数据的实证研究,得到如下结论:国内R&D研发投入和人力资本是我国经济增长的主要推动力,人力资本是东部经济快速发展的最主要因素,R&D研发投入对中西部地区经济发展尤为重要;现阶段各区域知识产权保护强度对通过国际贸易渠道的技术溢出均有显著的促进作用;而知识产权保护对通过FDI渠道的技术溢出表现出明显的区域差异性,西部地区当前的知识产权保护强度有利于FDI渠道的知识溢出,而东部和中部并不确定,东部地区甚至可能由于知识产权执法强度不足而出现负向效应。对此,文章得出了相应的政策建议。  相似文献   

18.
Abstract

Several information processing technologies which are capable of augmenting human performance in handling a range of emergency situations are featured in this discussion. Among the more sophisticated systems which have proven useful in enhancing information collection, transmission, and selective processing are packet radio networks, “expert planning systems,” multiple‐satellite technology, and such related emerging developments as “internetting” and “machine intelligence.”  相似文献   

19.
This article initiates exploratory empirical research on how civil society collective action has reacted to and affected communication–information policy (CIP), a policy domain that has been reshaped by technological and industrial change. It reviews the relevant theory on social movements, citizens groups, and interest groups from political science. Data are gathered on two dimensions of the research question: (1) We quantify the number of public interest advocacy groups focused on CIP in the United States from 1961 to the present, using organizational ecology methods. (2) We track the number of U.S. Congressional hearings held each year on CIP issues. The results show that CIP now exceeds other social movement issues (women, civil rights, the environment, human rights) as a major concern of Congressional activity, that the issues are becoming more interdependent, and that modes of citizens advocacy have undergone drastic changes in recent years.  相似文献   

20.
杨锦琦 《科技广场》2014,(5):203-206
二氧化碳捕集、利用与封存(CCUS)技术是一项新兴的,被广泛认为是应对全球气候变化、控制温室气体排放的重要技术之一,应积极进推动我国CCUS技术的研发与示范,制定权责清晰的CCUS安全法律法规等。  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号