首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 562 毫秒
1.
An experimental, all-day Workshop on Freedom and Privacy by Design took place on 4 April 2000, as part of the 10th annual Conference on Computers, Freedom, and Privacy. It invited more than 30 well-known systems architects, implementors, and experts in privacy and usability to investigate, in depth, three different proposals for creating political artifacts: technology intended to bring about particular types of political change--in this case, the reinforcement of certain civil liberties. This article summarizes the rationale and structure of the workshop, the three proposals investigated, and what the workshop and audience members had to say about the issues. It concludes with some information on the workshop's impact to date and what lessons were learned by running such an experiment.  相似文献   

2.
Privacy has largely been equated with every individual's right to privacy. Accordingly, current efforts to protect privacy on the Internet have sought anonymity by breaking, where possible, links with personally identifiable information (PII)—all uses of aggregated data stripped of PII are considered legitimate. This article argues that we need to use a broader concept, general or group identifying information (GII), because even aggregated data stripped of PII violate privacy at the community level. The search engine companies, or anyone else with access to their log files, can use these data to generate a moment-by-moment view of what is on the collective mind. Such a view can be used in a variety of ways, some with deep economic and even political impact. In order to frame this discussion, it is necessary to examine some of the realities of the search engine-mediated associative interface to the World Wide Web. While this interface has enormous benefits for the networked world, it also fundamentally changes a number of issues underlying various current debates about Internet governance.  相似文献   

3.
《普罗米修斯》2012,30(2):125-132

Privacy is universal value. But according to The Economist in 1999 it is finished - killed off by the remarkable capacity of information technology to analyse, trace and re-assemble personal data: affording an unprecedented insight into individual attitudes and activities. Based on the progress made in implementing the OECD Guidelines on Privacy (1980), the author, who chaired the OECD group that devised those Guidelines, reviews their impact, the need to update them and contemporary proposals for new privacy protections suitable to the current technologies. He concludes that the capacity to uphold human values in the context of new technologies, such as informatics and genomics, presents one of the largest ethical questions for the 21st century.  相似文献   

4.
美国《隐私权法》与公民个人信息保护   总被引:9,自引:1,他引:9  
周健 《情报科学》2001,19(6):608-611
本文介绍了美国《隐私权法》的立法原则、适用范围、个人记录公开的限制和登记、公民查询与修改个人记录的权利、对行政机关的限制与要求、免除适用的规定、该法与美国《信息自由法》的关系;论述了我国厂家和借鉴国外隐私保护的法律法规,强化政府信息法制建设力度,在确保国家和公共利益的前提下依法保护公民个人信息的必要性。  相似文献   

5.
In 1974 a British biologist, John Randal Baker (1900-1984), published a large and controversial book simply entitled Race that reiterated persistent eugenicist themes concerning the relation between race, intelligence, and progress. The history of Baker's book is a case study in the politics of scientific publishing, and his ideas influenced scholars associated with later works such as The Bell Curve. Baker, a student of Julian Huxley, was a longtime participant in the British eugenics movement and opponent of what he took to be a facile belief in human equality. In 1942, together with Michael Polanyi, he founded the Society for Freedom in Science to oppose those who advocated the central planning of scientific research. Baker's eugenics, political activities, and views on race express an elitist individualism, associated with the conservative wing of the eugenics movement, that this paper explores in the context of his career as a whole.  相似文献   

6.
本文通过对大学生思想政治教育模式接受度的调查,从思想政治教育模式的现状、学生对线下传统思想政治教育模式和线上网络思想政治教育模式的接受度、思想政治教育模式改进方向等四个维度,剖析了当代大学生对目前思想政治教育模式的接受态度,并提出针对性建议。  相似文献   

7.
Innovation in digital technologies is central to contemporary debates about the need for policy and regulatory adjustment in response to the consequences of the centrality of these technologies in contemporary societies. Christopher Freeman's research in relation to changes in techno-economic paradigm and, specifically, in relation to the information and communication technology (ICT) paradigm, cautioned that assessments of these changes needed to go beyond market dynamics to examine social, cultural and political issues. In this paper several predominant themes in his work are foregrounded – the ambiguity of changes within the ICT paradigm; the role of guiding principles in influencing expectations about societal outcomes; and the importance of political factors in shaping the consequences of technological innovation. These three themes are then deployed in a discussion of recent innovations – two technical (5G mobile networks and artificial intelligence-as-a-service) and one institutional (proposals for changes in the international taxation regime in response to claims that the existing regime is inappropriate in the face of global online service provision). In each instance, the aim is to illustrate how following Freeman by giving attention to the themes operates as an important guide to analysis of adjustments to novel deployments of digital technology. The conclusion emphasizes the value of Freeman's contributions to shaping research agendas that acknowledge the need to humanize technology, to consider alternatives to taken-for-granted principles and practices, and to take into account the role of political power in tandem with concentrated economic power.  相似文献   

8.
Informational privacy, data mining, and the Internet   总被引:3,自引:2,他引:1  
Privacy concerns involving data mining are examined in terms of four questions: (1) What exactly is data mining? (2) How does data mining raise concerns for personal privacy? (3) How do privacy concerns raised by data mining differ from those concerns introduced by ‘traditional’ information-retrieval techniques in computer databases? (4) How do privacy concerns raised by mining personal data from the Internet differ from those concerns introduced by mining such data from ‘data warehouses?’ It is argued that the practice of using data-mining techniques, whether on the Internet or in data warehouses, to gain information about persons raises privacy concerns that (a) go beyond concerns introduced in traditional information-retrieval techniques in computer databases and (b) are not covered by present data-protection guidelines and privacy laws.  相似文献   

9.
We examine three possible explanations for differences in Internet privacy concerns revealed by national regulation: (1) These differences reflect and are related to differences in cultural values described by other research; (2) these differences reflect differences in Internet experience; or (3) they reflect differences in the desires of political institutions without reflecting underlying differences in privacy preferences. Using a sample of Internet users from 38 countries matched against the Internet population of the United States, we find support for (1) and (2), suggesting the need for localized privacy policies. Privacy concerns decline with Internet experience. Controlling for experience, cultural values were associated with differences in privacy concerns. These cultural differences are mediated by regulatory differences, although new cultural differences emerge when differences in regulation are harmonized. Differences in regulation reflect but also shape country differences. Consumers in countries with sectoral regulation have less desire for more privacy regulation.  相似文献   

10.
We examine three possible explanations for differences in Internet privacy concerns revealed by national regulation: (1) These differences reflect and are related to differences in cultural values described by other research; (2) these differences reflect differences in Internet experience; or (3) they reflect differences in the desires of political institutions without reflecting underlying differences in privacy preferences. Using a sample of Internet users from 38 countries matched against the Internet population of the United States, we find support for (1) and (2), suggesting the need for localized privacy policies. Privacy concerns decline with Internet experience. Controlling for experience, cultural values were associated with differences in privacy concerns. These cultural differences are mediated by regulatory differences, although new cultural differences emerge when differences in regulation are harmonized. Differences in regulation reflect but also shape country differences. Consumers in countries with sectoral regulation have less desire for more privacy regulation.  相似文献   

11.
《The Information Society》2007,23(5):383-389
Privacy has largely been equated with every individual's right to privacy. Accordingly, current efforts to protect privacy on the Internet have sought anonymity by breaking, where possible, links with personally identifiable information (PII)—all uses of aggregated data stripped of PII are considered legitimate. This article argues that we need to use a broader concept, general or group identifying information (GII), because even aggregated data stripped of PII violate privacy at the community level. The search engine companies, or anyone else with access to their log files, can use these data to generate a moment-by-moment view of what is on the collective mind. Such a view can be used in a variety of ways, some with deep economic and even political impact. In order to frame this discussion, it is necessary to examine some of the realities of the search engine-mediated associative interface to the World Wide Web. While this interface has enormous benefits for the networked world, it also fundamentally changes a number of issues underlying various current debates about Internet governance.  相似文献   

12.
朱侯  李佳纯 《现代情报》2009,40(3):169-177
[目的/意义] 为研究中国情境下社交媒体用户隐私设置行为的影响机制,为隐私设置功能的设计与开发提供参考依据。[方法/过程] 本文以微信活跃用户为研究对象,基于计划行为理论和技术接受模型,构建了隐私设置行为影响因素理论模型。[结果/结论] 研究结果表明:隐私设置行为主要受到隐私设置意愿和感知控制影响;隐私关注、感知有用性、感知易用性正向影响隐私设置意愿;感知易用性、信任、交互公平正向影响感知控制;隐私关注和感知易用性都正向影响感知有用性。  相似文献   

13.
对教育部评定的高等学校重点学科以及上海高校中重点学科的分布情况进行分析,对上海高校今后学科的发展提出了一些建议,期望能为上海高校的学科建设产生一定的借鉴作用。  相似文献   

14.
徐德志 《科教文汇》2011,(31):18-18,55
近年来,高等教育在改革和发展方面取得了重大进展,给高校思想政治教育工作带来了新的机遇与挑战。然而,高校的思想政治教育工作在新时期仍然存在着一定的问题。因此,我们必须对当前思想政治教育工作所遇到的难点和问题提出解决对策,才能促进高等教育改革发展的长足进步。本文通过分析当代大学生思想政治教育面临的主要问题,从提高队伍建设、创新教育内容、发挥自我教育功能、探索有效途径等方面提出了有针对性的对策建议,以期进一步加强和改进大学生思想政治教育。  相似文献   

15.
黄朝椿 《中国科学院院刊》2022,37(10):1402-1409
数据要素市场建设是发展数字经济的基础。文章遵循习近平总书记关于数据要素“分类分级分置”确权利用的思路,围绕为什么建、建什么、怎么建3个问题,研究了数据要素市场建设的主要理论和实践问题。文章研究发现,数字经济呈现出3个阶段的发展趋势,随着企业数据主导阶段的到来,为数据要素市场建设提出了现实要求和发展机遇。突破数据要素市场建设面临的障碍,需要从供给侧入手,坚持顶层设计,充分运用市场机制,重点解决好权属界定、交易模式、数据供给3个问题。综合理论研究和实践需要,最后提出了设立国家数据管理局、建立国家数据中心、制定数字经济促进法的政策建议。  相似文献   

16.
Data-driven campaigning has been in the spotlight over several years. Yet, we still have a limited understanding of political data analytics companies: how they envision data analytics and voter targeting, their role in electoral processes and what promises they make to their clients. This article focuses on the way in which such issues are conceived of in the marketing rhetoric of the political data analytics industry. Drawing on a sample of 19 political data analytics companies it systematically explores the ways in which data analytics is envisioned and marketed as a powerful tool in electoral processes, exposing a fundamental disconnect between scholarly discourse on the one hand – often critical of the claims of these companies about the efficacy of their methods – and a highly functionary data imaginary on the other hand, actively fostered by the political data-analytics industry and the media.  相似文献   

17.
In this paper we propose a computational approach that applies data mining techniques to analyze the citizen participation recorded in an online digital platform. Differently to previous work, the approach exploits external knowledge extracted from Open Government Data for processing the citizens’ proposals and debates of the platform, enabling to characterize targeted issues and problems, and analyze the levels of discussion, support and controversy raised by the proposals. As a result of our analysis, we derive a number of insights and conclusions of interest and value for both citizens and government stakeholders in decision and policy making tasks. Among others, we show that proposals targeting issues that affect large majorities tend to be supported by citizens and ultimately implemented by the city council, but leave aside other very important issues affecting minority groups. Our study reveals that most controversial, likely relevant, problems do not always receive sufficient attention in e-participation. Moreover, it identifies several types of controversy, related to ideological and socioeconomic factors and political attitudes.  相似文献   

18.
This article attempts to clarify the murky conceptual water of “interactivity,” arguing that the term refers to two distinct phenomena: interactivity between people and interactivity between people and computers or networks. The former orients research on the process of interactivity. The latter orients research on the product of interactivity. That two distinct phenomena have been labeled with the same term causes problems when one wants to move from theorizing about interactivity in the abstract to investigating what effects interactivity has and then to operationalizing measurement terms. Studying interactivity-as-process entails a research focus on human interaction. Studying interactivity-as-product entails a research focus on user interactions with technology. In wading into the murky waters of what interactivity is, we must not lose sight of why it matters. In research focused on the opportunities and constraints for citizen participation in the political process afforded by communication technology, for example, interactivity is a variable of importance.  相似文献   

19.
This article attempts to clarify the murky conceptual water of “interactivity,” arguing that the term refers to two distinct phenomena: interactivity between people and interactivity between people and computers or networks. The former orients research on the process of interactivity. The latter orients research on the product of interactivity. That two distinct phenomena have been labeled with the same term causes problems when one wants to move from theorizing about interactivity in the abstract to investigating what effects interactivity has and then to operationalizing measurement terms. Studying interactivity-as-process entails a research focus on human interaction. Studying interactivity-as-product entails a research focus on user interactions with technology. In wading into the murky waters of what interactivity is, we must not lose sight of why it matters. In research focused on the opportunities and constraints for citizen participation in the political process afforded by communication technology, for example, interactivity is a variable of importance.  相似文献   

20.
《Research Policy》2023,52(3):104706
Concern that the selection of research projects by peer review disfavors risky science has called attention to ways to incorporate risk into the evaluation of research proposals. This discussion often occurs in the absence of well-defined and developed concepts of what risk and uncertainty mean in science. This paper sets out to address this void with the goal of providing building blocks to further the discussion of the meaning of risk and uncertainty in science. The core contributions of the paper are fourfold. First, we outline the meaning of risk in science, drawing on insights from literatures on risk and uncertainty. Second, based on this outline, we discuss possible ways in which programs can embrace a more comprehensive concept of risk and embed it in peer review of proposals, with the goal of not penalizing risky research proposals with the potential of high return when funding decisions are made. Third, we make an important distinction between research projects involving high-risk and research projects whose evaluation is subjected to ambiguity/radical uncertainty. Fourth, we discuss possible ways of addressing ambiguity/radical uncertainty by funding agencies.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号