首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 156 毫秒
1.
论个性化信息服务中的隐私保护   总被引:3,自引:0,他引:3  
刘颖 《情报科学》2007,25(12):1794-1798
探讨了个性化信息服务发展中的用户隐私保护问题,分析了目前保护用户隐私权的措施,并针对个性化信息服务网站如何在提供更好的个性化服务和保护用户隐私之间保持平衡,提出了几点建议。  相似文献   

2.
宗喆  鲁俊群 《科技管理研究》2021,41(17):162-169
梳理欧美相关法律中的相关条款,专注于分析疫情爆发初期主要国家采用科技抗疫的案例,提出在疫情等公共安全事件突发时,各国应在内部明确数据保护与公共利益优先的临界点,并尽快建立平衡数据保护与公共利益的国际合作机制.  相似文献   

3.
Significant U.S. policy initiatives in the late 1990s were intended to control Internet access, privacy, and indecency--specifically among children. This study reflects on these using quantitative data from a computer center in a children's library in the inner city. Researchers gathered 16 weeks of page requests ( n = 203,647) using "click stream" and behavioral data, and analyzed these using nonparametric tests. Findings show that users are highly influenced by each other and browse only a small universe of sites. Game playing and communicating with individuals (via e-mail and chat) were the most popular uses. Children were uninterested in pornography and sites directed toward children. Advertising was extremely common. Children were most likely to engage in sharing when using games and chat. For this population, access, privacy and indecency initiatives to control Internet use fails to achieve its stated goals, but activities that encourage sharing in public places hold some promise for building computer knowledge.  相似文献   

4.
Significant U.S. policy initiatives in the late 1990s were intended to control Internet access, privacy, and indecency--specifically among children. This study reflects on these using quantitative data from a computer center in a children's library in the inner city. Researchers gathered 16 weeks of page requests ( n = 203,647) using "click stream" and behavioral data, and analyzed these using nonparametric tests. Findings show that users are highly influenced by each other and browse only a small universe of sites. Game playing and communicating with individuals (via e-mail and chat) were the most popular uses. Children were uninterested in pornography and sites directed toward children. Advertising was extremely common. Children were most likely to engage in sharing when using games and chat. For this population, access, privacy and indecency initiatives to control Internet use fails to achieve its stated goals, but activities that encourage sharing in public places hold some promise for building computer knowledge.  相似文献   

5.
【目的/意义】随着互联网的迅速发展,网络媒体成为反映社会舆论的主要载体。如何有效地从网络媒体获取公共政策相关的社情民意以引导公共政策的传播议程设置是政府职能部门所关注的重要问题之一。【方法/过程】本文基于网络媒体数据,应用数据挖掘、机器学习等数据分析技术,提出了一个面向公共政策的网络媒体内容文本分析框架。利用文本语义分析方法,从主题识别、情感分析等角度对网络主流媒体的公共政策传播议程设置与社交媒体网民舆论进行挖掘和对比,并以新能源汽车政策为例对该分析框架的有效性进行了验证。【结果/结论】通过实证发现当下网络媒体报道的议题与社交媒体上公众对有关公共政策的关注焦点之间存在较大偏差,就新能源汽车政策为例,公众对于其政策的关注偏向于衡量自身获利的多少,而网络媒体报道更多以描述政策传递信息为主。建议政府职能机构针对公共政策使用网络媒体进行传播时,可根据公众关注焦点话题进行议程的设置和调整,以增强公众对此政策的认可度。  相似文献   

6.
The widespread use of the computer and the rapid growth of telecommunications technology have sparked debate on the privacy implications of computerized records. Regulations and government programs implemented in response to public pressure for greater protection of records could significantly affect the information system manager and any individual who has personal data recorded in a computerized file. This article considers the implications of possible privacy policy initiatives in the United States in light of Swedish experience.  相似文献   

7.
ABSTRACT

Higher education institutions have started using big data analytics tools. By gathering information about students as they navigate information systems, learning analytics employs techniques to understand student behaviors and to improve instructional, curricular, and support resources and learning environments. However, learning analytics presents important moral and policy issues surrounding student privacy. We argue that there are five crucial questions about student privacy that we must address in order to ensure that whatever the laudable goals and gains of learning analytics, they are commensurate with respecting students' privacy and associated rights, including (but not limited to) autonomy interests. We address information access concerns, the intrusive nature of information-gathering practices, whether or not learning analytics is justified given the potential distribution of consequences and benefits, and issues related to student autonomy. Finally, we question whether learning analytics advances the aims of higher education or runs counter to those goals.  相似文献   

8.
Transgenic crops among the most controversial "science and society" issues of recent years. Because of the complex techniques involved in creating these crops and the polarized debate over their risks and beliefs, a critical need has arisen for accessible and balanced information on this technology. World Wide Web sites offer several advantages for disseminating information on a fast-changing technical topic, including their global accessibility; and their ability to update information frequently, incorporate multimedia formats, and link to networks of other sites. An alliance between two complementary web sites at Colorado State University and the University of Nebraska-Lincoln takes advantage of the web environment to help fill the need for public information on crop genetic engineering. This article describes the objectives and features of each site. Viewership data and other feedback have shown these web sites to be effective means of reaching public audiences on a complex scientific topic.  相似文献   

9.
旅游网站顾客信任感影响因素的实证研究   总被引:1,自引:0,他引:1  
本文讨论影响旅游电子商务网站顾客信任感的主要因素。在文献研究和访谈调查的基础上,笔者进行了问卷调查。通过对所得的有效数据进行因子分析和多元回归分析,结果表明:(1)顾客对旅游电子商务网站的信任感主要受到网站的服务质量(其中包括网站设计、服务可靠性、隐私和安全、客户服务)、顾客对网站的熟悉程度、网站的声誉等6个因子的影响。(2)这6个因子对顾客网上信任感的影响程度从大到小依次为:网站的声誉、隐私和安全、熟悉程度、服务可靠性、客户服务、网站设计。  相似文献   

10.
KDD, data mining, and the challenge for normative privacy   总被引:3,自引:1,他引:2  
The present study examines certain challenges that KDD (Knowledge Discovery in Databases) in general and data mining in particular pose for normative privacy and public policy. In an earlier work (see Tavani, 1999), I argued that certain applications of data-mining technology involving the manipulation of personal data raise special privacy concerns. Whereas the main purpose of the earlier essay was to show what those specific privacy concerns are and to describe how exactly those concerns have been introduced by the use of certain KDD and data-mining techniques, the present study questions whether the use of those techniques necessarily violates the privacy of individuals. This question is considered vis-à-vis a recent theory of privacy advanced by James Moor (1997). The implications of that privacy theory for a data-mining policy are also considered.  相似文献   

11.
I begin with a discussion of the value of privacy and what we lose without it. I then turn to the difficulties of preserving privacy for genetic information and other medical records in the face of advanced information technology. I suggest three alternative public policy approaches to the problem of protecting individual privacy and also preserving databases for genetic research: (1) governmental guidelines and centralized databases, (2) corporate self-regulation, and (3) my hybrid approach. None of these are unproblematic; I discuss strengths and drawbacks of each, emphasizing the importance of protecting the privacy of sensitive medical and genetic information as well as letting information technology flourish to aid patient care, public health and scientific research.  相似文献   

12.
Caller ID service continues to be a controversial issue in the U.S. because of its privacy implications. State and federal regulators, legislators, scholars, and the courts have examined and responded to the privacy issue from a policy perspective, but perhaps without a complete understanding of the meaning of privacy in the context of the debate. What types of privacy are involved, how significant are these interests, and how might privacy needs compare and be balanced? This article explores privacy in the context of the Caller ID debate from a social science perspective. It examines motives for seeking and preserving privacy and explores the dynamic relationship between the caller and called party positions. It then provides an analysis of current and proposed Caller ID features and policies with a view toward understanding how these proposals balance competing privacy needs. This article establishes an analytic framework and a foundation for further study of caller and called party privacy that should lead to a better understanding of the privacy debate and the privacy implications of Caller ID.  相似文献   

13.
This research tracked web sites posting or linking to software known as DeCSS over a 26-month period coinciding with a U.S. lawsuit that found posting and linking to the DeCSS software to be illegal. Results showed a decrease in the number of web pages posting the DeCSS software, and a decrease in the number of web pages linking to DeCSS. Seven web sites retained their DeCSS posting for the entire 26-month study period. An increasing number of sites posted nonexecutable forms of DeCSS, and results show a large percentage of web sites contained political speech. The persistence of DeCSS linking and posting was surprising given the prohibition on linking and posting within the United States and given the obsolescence of DeCSS as a DVD decrypter. We suggest that DeCSS linking and posting persists primarily as a political symbol of protest.  相似文献   

14.
This research tracked web sites posting or linking to software known as DeCSS over a 26-month period coinciding with a U.S. lawsuit that found posting and linking to the DeCSS software to be illegal. Results showed a decrease in the number of web pages posting the DeCSS software, and a decrease in the number of web pages linking to DeCSS. Seven web sites retained their DeCSS posting for the entire 26-month study period. An increasing number of sites posted nonexecutable forms of DeCSS, and results show a large percentage of web sites contained political speech. The persistence of DeCSS linking and posting was surprising given the prohibition on linking and posting within the United States and given the obsolescence of DeCSS as a DVD decrypter. We suggest that DeCSS linking and posting persists primarily as a political symbol of protest.  相似文献   

15.
Recent disclosures suggest that many governments apply indiscriminate mass surveillance technologies that allow them to capture and store a massive amount of communications data belonging to citizens and non-citizens alike. This article argues that traditional liberal critiques of government surveillance that center on an individual right to privacy cannot completely capture the harm that is caused by such surveillance because they ignore its distinctive political dimension. As a complement to standard liberal approaches to privacy, the article develops a critique of surveillance that focuses on the question of political power in the public sphere.  相似文献   

16.
随着我国互联网的高速发展,数据挖掘技术尤其是Web挖掘作为企业搜寻商业信息为客户提供个性化服务的重要手段,不可避免地触到隐私保护这块"雷区"。隐私权保护在网络环境下既是法律界同时也是电子商务研究的热点话题。隐私保护限制了web挖掘数据中数据的搜集及知识的共享和传播,如何在web挖掘和隐私保护之间进行权衡是文章研究的出发点。结合我国网络隐私权保护的现状,通过对隐私权的内容及可能造成侵权形式的研究,探讨了隐私保护面临的挑战,提出了隐私权保护的解决方案框架。  相似文献   

17.
詹映 《科研管理》2011,32(11):77-83
以飞利浦CD-R专利池案的最终裁决以及美国司法部和联邦贸易委员会联合发布的《反垄断执法与知识产权:促进创新与竞争》报告为标志,美国针对专利池的反垄断政策近年来开始由相对宽松变得更为宽容,甚至走向纵容,不仅摒弃了国际公认的"公平、合理、非歧视"的专利许可原则,对专利费率不再加以限制,而且允许专利池进行强制性一揽子许可,在专利池反垄断审查中仅采"合理原则"而排除适用"当然违法原则"。此外,美国对于专利池中非必要专利的认定标准也发生了变化。受此影响,作为国际专利池的主要许可对象,我国企业将更难抵御专利池的专利费盘剥和强制性一揽子许可,在美国发起专利池反垄断诉讼的难度将进一步增大。这一影响在我国无锡多媒体诉DVD3C专利池一案在美国屡遭驳回的裁决结果中已初现端倪,我国加快建立和完善符合本国利益的专利池反垄断制度显得更为紧迫。  相似文献   

18.
陈玲  薛澜  赵静  林泽梁 《科学学研究》2010,28(9):1281-1289
以中国转基因水稻审批过程为例,探讨了后常态科学下的中国公共政策决策机制,指出专家委员会的内部咨询模式和技术官僚为主体的内部决策模式存在一定的局限性。之后,对比分析了美国和欧盟的转基因生物管理制度,探索在科学不确定性下公共决策机制的改进方向,即充分的信息公开和广泛的公众参与、政策实施中的审慎预防原则,以及有效的政策纠偏和损害救济机制。  相似文献   

19.
Web2.0时代网络信息资源管理隐私权保护已严重影响用户对网站的安全度和信任度。网络信息资源管理中的隐私权侵权行为主要有:对网络用户个人信息使用不当,个人活动隐私的侵犯,个人网络痕迹隐私的侵犯以及个人网络空间隐私权的侵犯;网络信息资源管理中的隐私权保护对策主要有:完善网络隐私权保护的立法,加强网络信息产业的行业自律,提高网络用户的自我保护意识,最大限度地利用信息安全技术、成立网络隐私权保护的专门机构以及融入国际网络隐私权保护体系等。  相似文献   

20.
电子政府信息公开隐私权保护制度   总被引:1,自引:0,他引:1  
隐私信息是政府信息公开的例外,但有时政府信息公开又在无形中侵害公民隐私权。公民既要保护自己的隐私权,免受他人获取、公开和传播隐私信息,又希望政府信息全面公开,以充分保障自己的知情权。尤其在人们越来越注重保护个人隐私权的数字时代。因此,政府机关在公开政府信息的同时,如何能够做到既合理公开政府信息又保护公民的隐私权就值得思考。  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号