首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 30 毫秒
1.
In Japan, the mobile phone has become an increasingly popular medium of accessing the Internet and e-mail, especially among those who may not have affordable access to a computer. The lower startup costs and the easier overall accessibility of mobile phones relative to personal computers suggest that the mobile phone may be a possible alternative for overcoming unequal access to information communication technology in Japan and elsewhere. Using microdata from 2001, we compare and contrast the determinants of mobile versus computer-based Internet in Japan. Our findings show that mobile Internet access, as compared to computer access, is determined less by demographics, socioeconomic status, and technological readiness, suggesting that barriers to Internet access are lower for mobile phones than is the case for computers.  相似文献   

2.
Information technology (IT)—computers and related technologies—is the latest technology to enter the household. Like other technologies, gender is a major factor in its adoption and use as well as its perceived usefulness. Unlike prior household technologies, the computer's entry into the household has followed a different pattern. Early statistics revealed a vast gender divide, with men using computers and related technologies much more in the household. More recent statistics show a narrowing of the divide, perhaps even a reversal, particularly in the United States, with women outnumbering men in the access to and use of the Internet. In this article, the role of gender and its relationship with Internet use in the home are reviewed. In addition to overall adoption and access, the review focuses on specific Internet applications and examines the factors that contribute to gender differences in adoption and use of computers and Internet applications in the home.  相似文献   

3.
由于信息技术的飞速发展,个人电脑应用也由过去的孤军奋战。慢慢地变成了网络中的一员,不管在何种环境下工作,能使电脑正常运转成了越来越现实的问题,本文从多个方面介绍了如何使个人电脑运行起来更安全更稳定。  相似文献   

4.
互联网的迅猛发展和网民数量的剧增,使基于各类个人在线应用产品或服务的个人信源信息显得日益重要。互联网传播的特殊性使准确鉴别个人信源的可信度成为所有信息利用者需要解决的突出问题,指出了网上个人信源信息的重要意义,并探讨了对其信誉进行有效论证、评估的多种手段和方法。  相似文献   

5.
Technological progress is often at the heart of improvements in quality of life. The development of personal computers (PCs) and the Internet are among the most important technological advances of the last century. PCs and the Internet have profoundly changed the way we access information, shop, view media, communicate, socialize, and spend our time. Despite the many benefits of computer and Internet use, certain population groups – especially low-educated and older consumers – have not yet fully adopted computer technology and the Internet in their daily lives. This paper estimates the effects of early-life education on computer and Internet use among older Italians. Using data on early-life educational attainment and computer and Internet use of older adults from the 2013 Survey of Health, Ageing and Retirement in Europe (SHARE), we exploit a historical increase in compulsory schooling in Italy as an instrumental variable for education to estimate the effects of early-life education on the adoption of PCs and on current use of the Internet. We find large and statistically significant effects of early-life education on later-life technology use among older persons who obtained additional education due to increased schooling requirements. In our benchmark estimations, one additional year of schooling resulted in an eight percentage point increase in the probability of having ever used a computer and in a 12 percentage point increase in the probability of reporting to have at least good computer skills. Individuals affected by the reform were also six percentage points more likely to have used the Internet in the last week. These findings are robust across different sample selection and model specification strategies. Our analysis also suggests that occupational choice and computer use at work are important channels through which education affects the adoption and use of computers and the Internet. Our findings thus highlight the likely importance of early-life education for later-life computer and the Internet use and perhaps technology adoption more broadly.  相似文献   

6.
Grier DA 《Endeavour》2001,25(1):28-32
Before computers were machines, they were people. They were men and women, young and old, well educated and common. They were the workers who convinced scientists that large-scale calculation had value. Long before Presper Eckert and John Mauchly built the ENIAC at the Moore School of Electronics, Philadelphia, or Maurice Wilkes designed the EDSAC for Manchester University, human computers had created the discipline of computation. They developed numerical methodologies and proved them on practical problems. These human computers were not savants or calculating geniuses. Some knew little more than basic arithmetic. A few were near equals of the scientists they served and, in a different time or place, might have become practicing scientists had they not been barred from a scientific career by their class, education, gender or ethnicity.  相似文献   

7.
随着近年来互联网技术越来越发达,网约车进入大众视野,网约车的出现可以进一步缓解人们的出行压力,这种既简单又便捷、可以满足不同顾客需要的出行方式,日益受到大众喜爱。然而,网约车市场的监管不严格,治安和刑事案件频发、网约车司机的素质高低不等、网约车平台管理模式混乱等现象,给当前高校大学生的人身安全造成了一定的威胁。基于网约车环境下,大学生的安全如何得到保障是我们需要重点思考的问题。  相似文献   

8.
闻波 《现代情报》2011,31(4):174-177
随着信息管理理论和技术的发展,人们逐渐重视个人信息管理的理论及实践应用。本文运用综述的方法,主要梳理了国内外关于个人信息管理理论与实践发展历程和现状,进一步分析了国内个人信息管理研究领域的不足,以期推动我国个人信息管理研究的发展。  相似文献   

9.
Within media theory the worldwide shift from a 19th-century print culture via a 20th-century electronic culture to a 21st-century digital culture is well documented. In this essay the emergence of a digital culture as amplified and accelerated by the popularity of networked computers, multiple-user software, and Internet is investigated in terms of its principal components. A digital culture as an underdetermined praxis is conceptualized as consisting of participation, remediation, and bricolage. Using the literature on presumably “typical” Internet phenomena such as the worldwide proliferation of independent media centers (indymedia) linked with (radical) online journalism practices and the popularity of (individual and group) weblogging, the various meanings and implications of this particular understanding of digital culture are explored. In the context of this essay, digital culture can be seen as an emerging set of values, practices, and expectations regarding the way people (should) act and interact within the contemporary network society. This digital culture has emergent properties with roots in both online and offline phenomena, with links to trends and developments predating the World Wide Web, yet having an immediate impact and particularly changing the ways in which we use and give meaning to living in an increasingly interconnected, always on(line) environment.  相似文献   

10.
改善农村环境已成为实现乡村振兴的重要支撑,调动农村居民个体参与意愿是提升农村环境整体治理水平的有力抓手.本文以农村生活垃圾分类治理为例,基于中国劳动力动态调查数据(CLDS),通过构建Manski互动效应模型和递归双变量Probit(RBP)模型,实证检验社会互动、互联网使用对居民生活垃圾分类意愿的影响,旨在为推动农村...  相似文献   

11.
The internet of things is increasingly spreading into the domain of medical and social care. Internet-enabled devices for monitoring and managing the health and well-being of users outside of traditional medical institutions have rapidly become common tools to support healthcare. Health-related internet of things (H-IoT) technologies increasingly play a key role in health management, for purposes including disease prevention, real-time tele-monitoring of patient’s functions, testing of treatments, fitness and well-being monitoring, medication dispensation, and health research data collection. H-IoT promises many benefits for health and healthcare. However, it also raises a host of ethical problems stemming from the inherent risks of Internet enabled devices, the sensitivity of health-related data, and their impact on the delivery of healthcare. This paper maps the main ethical problems that have been identified by the relevant literature and identifies key themes in the on-going debate on ethical problems concerning H-IoT.  相似文献   

12.

Communities with high levels of social capital are likely to have a higher quality of life than communities with low social capital. This is due to the greater ability of such communities to organize and mobilize effectively for collective action because they have high levels of social trust, dense social networks, and well-established norms of mutuality (the major features of social capital). Communities with “bridging” social capital (weak ties across groups) as well as “bonding” social capital (strong ties within groups) are the most effective in organizing for collective action. People who belong to multiple groups act as bridging ties. When people with bridging ties use communication media, such as the Internet, they enhance their capability to educate community members and to organize, as needed, for collective action. This article summarizes evidence from stratified household survey data in Blacksburg, VA, showing that people with weak (bridging) ties across groups have higher levels of community involvement, civic interest, and collective efficacy than people without bridging ties among groups. Moreover, heavy Internet users with bridging ties have higher social engagement, use the Internet for social purposes, and have been attending more local meetings and events since going online than heavy Internet users with no bridging ties. These findings may suggest that the Internet—in the hands of bridging individuals–is a tool for enhancing social relations and information exchange, and for increasing face-to-face interaction, all of which help to build both bonding and bridging social capital in communities.  相似文献   

13.
Abstract

This paper first reviews the development of record‐keeping privacy, together with its legislative attention and major studies of it. It then identifies new dimensions of personal privacy and illustrates them with electronic mail. It notes the intricacy of policy issues arising from large‐scale use of computers and communications for systems that provide a variety of services, many of them oriented toward the individual. The legislative awkwardness of providing protection to the individual and the role of the federal government in the entire issue is described. Other systems that will create new privacy issues are touched on. The “privacy future” is discussed in terms of access‐without‐action, information representation, information protection, exploitation of information such as computer matching, the large‐scale availability of personal information to many people, and the widespread appearance of systems that deal with information about people but for other than record‐keeping purposes. Finally, two broad policy issues are identified: (1) In an information‐intensive future, how can the country establish societally acceptable usage patterns for information but at the same time provide protection for its citizens? (2) How can the country create an appropriate mechanism for addressing such a pervasive and complex issue?  相似文献   

14.
Communities with high levels of social capital are likely to have a higher quality of life than communities with low social capital. This is due to the greater ability of such communities to organize and mobilize effectively for collective action because they have high levels of social trust, dense social networks, and well-established norms of mutuality (the major features of social capital). Communities with “bridging” social capital (weak ties across groups) as well as “bonding” social capital (strong ties within groups) are the most effective in organizing for collective action. People who belong to multiple groups act as bridging ties. When people with bridging ties use communication media, such as the Internet, they enhance their capability to educate community members and to organize, as needed, for collective action. This article summarizes evidence from stratified household survey data in Blacksburg, VA, showing that people with weak (bridging) ties across groups have higher levels of community involvement, civic interest, and collective efficacy than people without bridging ties among groups. Moreover, heavy Internet users with bridging ties have higher social engagement, use the Internet for social purposes, and have been attending more local meetings and events since going online than heavy Internet users with no bridging ties. These findings may suggest that the Internet—in the hands of bridging individuals-is a tool for enhancing social relations and information exchange, and for increasing face-to-face interaction, all of which help to build both bonding and bridging social capital in communities.  相似文献   

15.
Recent studies have shown that adolescents use the Internet not only to maintain social relationships with distant relatives and friends but also to create new relationships online; some of these friendships become integrated into their social circle. Research has focused mainly on the effect of the Internet on existing relationships or the nature of online-only ties, so studies comparing the quality of online and face-to-face relationships are missing. The goal of this study is to bridge this gap. In keeping with previous studies on social association, we argue that the quality of social relationships is dependent on duration and diversity of topics and activities carried together. Time is important, as it facilitates the development of a collective shared history and identity. Intimacy develops through the participation in shared activities and discussion of diverse issues of personal concern. Using a representative sample of the adolescent population in Israel, we find that closeness to a friend is a function of social similarity, content and activity multiplexity, and duration of the relationships. Friendships originated in the Internet are perceived as less close and supportive because they are relatively new and online friends are involved in less joint activities and less topics of discussion. The implications of the findings are discussed.  相似文献   

16.
How does Internet use affect well-being? This paper presents a survey of the literature investigating this question, and it develops a framework to analyze both positive effects and potential risks. We point out four distinct channels through which Internet can shape well-being: it changes time use patterns, creates new activities, facilitates access to information, and acts as powerful communication tool. We show how these four channels impact well-being in distinct domains of life. A central point emerging from the literature review is that the effects of Internet on well-being are mediated by a set of personal characteristics that are specific to each individual: psychological functioning, capabilities, and framing conditions (culture and beliefs). Hence, it is the interaction between human beings’ activities in distinct domains of life and their own personal characteristics that explains why the use of Internet has stronger positive effects for some individuals and social groups than others.  相似文献   

17.
Internet platforms increasingly rely on personal data to maintain user base and attract potential users. However, users might misrepresent their personal information in response to the requests when they expect their personal information to be used for unstated purposes. Misrepresenting of personal information (MPI), as a regular deviant behavior on online platforms, leads to data noises and service failures and needs further investigation. Drawing on the neutralization theory and online scenario survey, this study constructs a model to examine the factors of MPI. The results show that techniques of neutralization, such as denial of injury, defense of necessity, metaphor of the ledger, and avoidance of greater harm, are positively associated with users’ intention of MPI. In particular, avoidance of greater harm has a stronger effect on MPI intention than other neutralization techniques. Furthermore, we also explore the contingent role of personality traits. The results show that extraversion negatively moderates the relationships between denial of injury, avoidance of greater harm and MPI, whereas neuroticism plays a positive role in moderating the relationships between denial of injury, metaphor of the ledger, avoidance of greater harm and MPI. Moreover, post-hoc analysis results show that users do some differernces regarding justify their deviant disclosure behavior by using neutralization techniques between e-commerce platform and social networking site. Focusing on the dark side of disclosure behavior, this study enriches the current literature by applying neutralization theory and provides a new direction for academia and Internet practitioners to understand users’ deviant disclosure behavior.  相似文献   

18.
随着Web2.0时代的到来,越来越多的人涌入到互联网的大潮之中。更加庞大、繁杂、凌乱的资源被上传、发布和下载,存储在网民的个人电脑里,并且在网民之间频繁的传递、交换和更新。传统的资源管理系统已经不能有效的对这些资源进行管理和提供新的功能需求上的支持。该系统创新性的引入了标签的概念对资源进行分类式管理,以树型结构展示资源,管理起来高效而便捷。系统采用先进的MVC设计模型,在微软.NET框架下构建,具有极强的功能扩展性。  相似文献   

19.

Recent studies have shown that adolescents use the Internet not only to maintain social relationships with distant relatives and friends but also to create new relationships online; some of these friendships become integrated into their social circle. Research has focused mainly on the effect of the Internet on existing relationships or the nature of online-only ties, so studies comparing the quality of online and face-to-face relationships are missing. The goal of this study is to bridge this gap. In keeping with previous studies on social association, we argue that the quality of social relationships is dependent on duration and diversity of topics and activities carried together. Time is important, as it facilitates the development of a collective shared history and identity. Intimacy develops through the participation in shared activities and discussion of diverse issues of personal concern. Using a representative sample of the adolescent population in Israel, we find that closeness to a friend is a function of social similarity, content and activity multiplexity, and duration of the relationships. Friendships originated in the Internet are perceived as less close and supportive because they are relatively new and online friends are involved in less joint activities and less topics of discussion. The implications of the findings are discussed.  相似文献   

20.
随着互联网的普及,越来越多的人利用网络不再局限于网上聊天、查看邮件、看电影,而是利用网络进行电子商务活动,和客观世界中的商务活动一样,电子商务同样可能面临泄密和欺诈行为。特别是在开放的互联网上进行交易,如何安全地进行网上交易,确保商务活动中的信息安全已成为构建电子商务网站时的重中之重。本文论述了采用基于表现层、业务层、数据层的三层分离松耦合技术的SSH(Struts+Hibernate+Spring)技术构建电子商务网站时应采取的安全措施。  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号