首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 15 毫秒
1.
This paper illustrates the overlap of computer ethics and business ethics by examining two issues. The first is the lack of fit between digitalized information and copyright protection. Although there are moral arguments that can be used to justify protection of intellectual property, including computer software and digitalized data, the way that copyright protection has developed often reflects vested interests rather than the considered weighing of moral considerations. As a result, with respect to downloading MP3s, among other material, what is ethical is largely determined by the appropriately passed laws in each jurisdiction, and what is ethically permissible in one jurisdiction may be ethically impermissible in another. The second issue is the outsourcing of IT jobs from the U.S. While the practice has been politicized, examining it from an all-things-considered perspective, this paper argues it is ethically justified.I wrote this while I was a Resident at the Rockefeller Foundation Bellagio Study and Conference Center and I am pleased to acknowledge the support of the Foundation. I gave an abridged version of this paper at the Third World Congress of Business, Economics and Ethics in Melbourne, Australia, in July, 2004.  相似文献   

2.
The proliferation of information and communication technologies (ICTs) into all aspects of life poses unique ethical challenges as our modern societies become increasingly dependent on the flawless operation of these technologies. As we increasingly entrust our privacy, our well-being and our lives to an ever greater number of computers we need to look more closely at the risks and ethical implications of these developments. By emphasising the vulnerability of software and the practice of professional software developers, we want to make clear the ethical aspects of producing potentially flawed software. This paper outlines some of the vulnerabilities associated with software systems and identifies a number of social and organisational factors affecting software developers and contributing to these vulnerabilities. Scott A. Snook’s theory of practical drift is used as the basis for our analysis. We show that this theory, originally developed to explain the failure of a military organisation, can be used to understand how professional software developers “drift away” from procedures and processes designed to ensure quality and prevent software vulnerability. Based on interviews with software developers in two Norwegian companies we identify two areas where social factors compel software developers to drift away from a global set of rules constituting software development processes and methods. Issues of pleasure and control and difference in mental models contribute to an uncoupling from established practices designed to guarantee the reliability of software and thus diminish its vulnerability.  相似文献   

3.
借助实物期权思想和Hotelling模型,研究了软件企业同时为客户提供类似于实物期权的ISV/ASP业务合同,在价格调整后,两种业务的客户群体分布如何发生改变。并进一步分析了其他相关因素的改变如何影响两种业务的价格、客户群体分布和利润。  相似文献   

4.
Do open source software (OSS) projects represent a new innovation model? Under what conditions can it be employed in other contexts? “Collective invention” regimes usually ended when a dominant design emerged. This is not the case with OSS. Firstly, the OSS community developed the institutional innovation of OSS licenses enabling OSS software to survive as a common property. Secondly, these licenses are mainly enforced by pro-socially motivated contributors. We characterize the conditions under which OSS communities develop and sustain pro-social commitments. We point out the vulnerability of these conditions to developments in patent legislation.  相似文献   

5.
王琼  帅银花  刘敬 《科教文汇》2014,(34):168-169
高职教育的核心在于职业能力的培养,而职业能力的基本要求就是职业资格证的获得。结合岗位工作内容及过程的调研,总结了中药购销员职业资格培训课程的情境化教学经验。  相似文献   

6.
Modern software is infested with flaws having information security aspects. Pervasive computing has made us and our society vulnerable. However, software developers do not fully comprehend what is at stake when faulty software is produced and flaws causing security vulnerabilites are discovered. To address this problem, the main actors involved with software vulnerability processes and the relevant roles inside these groups are identified. This categorisation is illustrated through a fictional case study, which is scrutinised in the light of ethical codes of professional software engineers and common principles of responsibility attribution. The focus of our analysis is on the acute handling of discovered vulnerabilities in software, including reporting, correcting and disclosing these vulnerabilities. We recognise a need for guidelines and mechanisms to facilitate further improvement in resolving processes leading to and in handling software vulnerabilities. In the spirit of disclosive ethics we call for further studies of the complex issues involved.  相似文献   

7.
图书馆系统软件评价模型   总被引:3,自引:0,他引:3  
The paper deals with the assessment of software products for libraries'computers before libraries purchase software products for documentary information management. Based on the Analytic Hierarchy Process, and according to the general evaluation criterions, an analytic hierarchy model is used to evaluate three computer software products for libraries.  相似文献   

8.
Student Attitudes on Software Piracy and Related Issues of Computer Ethics   总被引:1,自引:0,他引:1  
Software piracy is older than the PC and has been the subject of several studies, which have found it to be a widespread phenomenon in general, and among university students in particular. An earlier study by Cohen and Cornwell from a decade ago is replicated, adding questions about downloading music from the Internet. The survey includes responses from 224 students in entry-level courses at two schools, a nondenominational suburban university and a Catholic urban college with similar student profiles. The study found that there has been few if any changes in student opinions regarding the unauthorized duplication of copy- righted materials. Students generally felt that copying commercial software and downloading music from the Internet was acceptable and found that there was no significant correlation between student attitudes and their school’s religious affiliation or lack thereof. Additionally, the study found that a small but significant percentage of respondents considered the other questionable behaviors as ethically acceptable. Finally, the reasons for these attitudes are discussed as well as what colleges can do to correct the situation.  相似文献   

9.
The digital world provides various ethical frames for individuals to become ethical subjects. In this paper I examine – in a Foucauldian and Luhmannian way – the differences between three systems of communication: the proprietary, the open/free and the cracker system. It is argued that all three systems provide a different set of ethical codes which one can be subjected to. The language of each system is restricted and they cannot understand each other, they merely consider each other as the environment. The systems generate a diversity of ethical codes as they give different shapes to digital objects. To proprietary software companies digital objects are an instrument of financial profit. The free software/open source movement emphasises transparency; the end user must be able to view and alter the source code. The cracker scene sees digital objects in a different way. For this particular system, only copy-protected digital objects are appealing. Copy protection binds its target to the world of matter. Breaking the protection is the ultimate challenge and a way to gain honour and status inside the cracker scene. A copy-protected digital object is simultaneously an utmost example of the hidden source code (the open/free system), a perfect artefact that can be owned and sold (the proprietary system) and a challenge to be cracked (the cracker system).  相似文献   

10.
基于2008-2017年中国高新技术上市公司的创新数据,从“达标型”和“避税型”研发操纵这一新视角,研究了高新认定办法对企业技术创新效率的影响。实证结果表明:高新认定激励了企业技术创新效率,而两类研发操纵抑制了这种激励效应;达标型研发操纵集中在高新认定初审阶段,且高新开发区以外、销售收入较高的企业更显著;避税型研发操纵集中在高新认定复审阶段,且高新开发区以内、销售收入较低的企业更显著。本文为高新认定办法提供了政策建议。  相似文献   

11.
丁瑛瑛 《科教文汇》2011,(6):207-208
商品房如同一件商品,经过营销策划后推出市场前,都必须通过有效的宣传渠道和方法将该项目的信息传达给目标消费群。如何通过一系列的视觉形象对商品房进行包装来打动消费者,也是商品房营销推广的一个重要方面。将可视的视觉符号经过统一、系统化的识别设计,塑造一个独特的,有别于其他商品房的视觉形象。通过项目视觉形象的连贯性与系统性,加强消费者对商品的认可度,对促进销售有着积极的意义。  相似文献   

12.
随着信息技术的发展,软件产业将会成为衡量一个国家综合国力的标志之一。选择北京、上海、深圳、成都等13个国内主要软件城市作为研究对象,通过建立城市软件产业竞争力的指标体系对全国主要的软件城市产业竞争力进行对比分析。结果表明,南京市软件行业发展的指标发展属于均衡协调型,在全国重点软件城市中处于中上游水平,存在向上游转移的可能性。  相似文献   

13.
新产品上市后的销售规律研究对于企业非常重要,如今需要重复购买的非耐用品在市场中占有很大的份额,因此研究新产品重复购买扩散模型对于企业有着重要的现实意义。本文在分析现有重复购买产品技术扩散模型基础上,将Logit模型应用于础明公司产品实例上,给出详细的应用过程,用计量经济学研究方法分析解释所得结果,提出Logit模型的不足和需要改进之处,为公司运用模型进行销量预测提供参考。  相似文献   

14.
李存行 《科学学研究》2005,23(Z1):206-209
本文在信息不对称性的条件下,首先分析了创业投资的五种退出方式:首次公开上市(IPO)退出、被其他企业兼并或收购退出、二次出售退出、股本赎回或私人收购退出和破产清算退出方式。在此基础上探讨了在不同的情况下创业投资的全部与部分退出的最佳选择。  相似文献   

15.
基于BP神经网络的旅游经济系统脆弱性省际空间分异   总被引:1,自引:0,他引:1  
马慧强  廉倩文  论宇超  席建超 《资源科学》2019,41(12):2248-2261
开展旅游经济系统脆弱性评价与影响因素研究,是制定旅游经济科学发展策略,提高区域旅游发展质量的客观要求。本文在探讨旅游经济系统脆弱性内涵的基础上,从旅游经济系统敏感性和应对能力两个方面来构建旅游经济系统脆弱性评价指标体系,并运用BP人工神经网络模型、脆弱性评价指数模型、地理探测器等研究方法,对中国30个省级行政单元(不包括西藏和港澳台地区)的旅游经济系统脆弱性空间分异特征及影响因素进行分析。结果表明:①中国旅游经济系统整体处于较高脆弱、中等敏感、较高应对能力状态,且旅游经济系统脆弱性、敏感性和应对能力省际空间分异明显;②中国旅游经济系统脆弱性、敏感性和应对能力均呈现“集群化”和“极差化”分布特征,东部地区旅游经济系统脆弱性较高,且内部差异显著,中部和西部地区脆弱性较低,内部差异较不明显;③中国旅游经济系统脆弱性空间分异是不同影响因素共同作用的结果,其中产业结构多样化指数对脆弱性空间分异的影响最大,旅游外汇收入占旅游总收入比重对脆弱性空间分异的影响最小。研究结果可丰富旅游可持续发展理论,并为解决旅游经济质量提升问题等提供科学依据。  相似文献   

16.
Opening up firms to open source has changed professional programmers’ work in software development. In their work practice they must cope with two modes of software production: one based on proprietary, closed work situations, the other built around open source community ways of cooperation and knowledge sharing. In this article we present a study of how programmers cope with the co-existence of an industrial/commercial and a community/commons based mode of production. We analyze how they develop strategies to handle tensions that arise from contradictions between these two modes, and how it changes programmers’ approach towards open source software development in the company. The study covers proprietary companies that have gradually incorporated open source software (hybrid companies) and SMEs entirely built around open source business concepts (pure-play companies). Four strategies are elaborated and discussed in-depth: Engineering in the lab, Market driven tailoring, Developing the community consortium and Peer-production. At a more general level, the study contributes to our understanding of how the transformation of proprietary production processes into a more open mode of knowledge work is not only associated with company strategies, but also with tensions and new demands on how work is strategically handled by knowledge workers.  相似文献   

17.
软件可移植性工程与度量   总被引:1,自引:0,他引:1  
李娜娜  吴鹏 《情报科学》2005,23(2):268-273
可移植性是软件质量要素之一。本文的工作主要针对当前软件可移植性研究的不足。一方面系统地阐述可移植软件的开发过程,明确软件可移植性工程的概念,提出可移植软件的设计与实现框架;另一方面改进Mooney模型,提出成本一周期模型,从可靠性的角度来分析和预测软件的可移植性,即以软件可靠性为基础,把软件可移植性看作是软件可靠性在目标应用环境下的延伸。  相似文献   

18.
基于构件(Component-Based Software Development,CBSD)的软件系统中的构件可以是COTS(Commercial-Off-the-Shelf)构件,也可以是通过其它途径获得的构件(如自行开发)。CBSD体现了"购买而不是重新构造"的哲学,将软件开发的重点从程序编写转移到了基于已有构件的组装,以便更快地构造系统,减轻用来支持和升级大型系统所需要的维护负担,从而降低软件开发的费用  相似文献   

19.
The Internet has favored the growth of collaborative platforms where marketers and consumers interact to develop more engaging products and services. These platforms are usually centered in a specific brand/product and their members are linked by a shared admiration to that brand. This paper analyzes one of the most powerful online collaborative platforms, the free software (FS) case, which involves a lot of virtual communities developed around products such as Linux or Android, the new Google's mobile operating system. Our purpose is to determine some of the main antecedents and consequences of the consumer involvement in this type of communities. Results have shown that satisfaction with a virtual community may increase the level of consumer participation in that community. At the same time, a greater identification with the virtual community may increase indirectly the consumer participation thanks to the enhancement of his/her satisfaction with the community. We have also found positive and significant effects of consumer identification and participation on the level of community promotion. Finally, positive and significant effects of consumer participation and satisfaction with the community on loyalty to the FS were also found. These findings allow us to conclude some interesting managerial implications.  相似文献   

20.
Many researchers have pointed out that the open source movement is an interesting phenomenon that is difficult to explain with conventional economic theories. However, while there is no shortage on research on individuals’ motivation for contributing to open source, few have investigated the commercial companies’ motivations for doing the same. A case study was conducted at three different companies from the IT service industry, to investigate three possible drivers: sale of complimentary services, innovation and opensourcing (outsourcing). We offer three conclusions.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号