首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 15 毫秒
1.
This paper deals with intercultural aspects of privacy, particularly with regard to differences between Japanese and Western conceptions. It starts with a reconstruction of the genealogy of Western subjectivity and human dignity as the basic assumptions underlying Western views on privacy. An analysis of the Western concept of informational privacy is presented. The Japanese topic of ‘‘denial of self” (Musi) as well as the concepts of Seken, Shakai and Ikai (as analyzed by the authors of the companion piece on privacy in Japan) give rise to intercultural comparisons. The paper addresses the question of privacy in cyberspace and mass media. Finally the question of freedom of speech is related to the Japanese concepts of Ohyake and Watakusi.  相似文献   

2.
It is sometimes suggested thatthere is no conception of privacy in Japan orthat, if there is, it is completely differentfrom Western conceptions of privacy. If thiswere so, finding common ground between Japanand the West on which to establish privacypolicies for the internet would be extremelydifficult if not impossible. In this paper wedelineate some of the distinctive differencesin privacy practices in Japan, but we maintainthat these differences do not prevent theestablishment of sound, shared, ethicalinformation privacy policies. We distinguishbetween a minimal conception of privacy that webelieve is shared by Japan and other societiesand richer conceptions of privacy that oftenreflect patterns of behavior distinctive ofparticular cultures. Although Japan and othersocieties share at least a minimal sense ofprivacy, a base on which to build, robustprivacy protection will not exist on theinternet until an internationally accepted richsense of privacy is developed.  相似文献   

3.
孙继周 《现代情报》2016,36(6):140-143
针对"大数据"背景下,我国数据隐私法律缺失的现状,本文以日本数据隐私法律为研究对象,介绍了日本目前2部数据隐私保护适用法律——《个人信息保护法案》和《"通用号码"法案》,从数据操作规定、数据服务规定、执行处罚规定3个方面,对日本数据隐私法律内容进行研究分析,并得出制定数据隐私专门法,鼓励多方机构参与,建立行业部门规范标准,建立数据隐私保护倒逼机制4个方面的启示,以期为我国数据隐私立法提供借鉴参考。  相似文献   

4.
Recent anthropological analyses of Chinese attitudes towards privacy fail to pay adequate attention to more ordinary, but more widely shared ideas of privacy – ideas that, moreover, have changed dramatically since the 1980s as China has become more and more open to Western countries, cultures, and their network and computing technologies. I begin by reviewing these changes, in part to show how contemporary notions of privacy in China constitute a dialectical synthesis of both traditional Chinese emphases on the importance of the family and the state and more Western emphases on individual rights, including the right to privacy. This same synthesis can be seen in contemporary Chinese law and scholarship regarding privacy. A review of recent work in philosophical ethics demonstrates that information ethics in China is in its very early stages. In this work, privacy is justified as an instrumental good, rather than an intrinsic good. I argue by way of conclusion that privacy protections will continue to expand in China, in part under the pressures of globalization, increasing trade with and exposure to Western societies, and the increasing demands for Western-style individual privacy by young people. Even so, I argue that these emerging conceptions of privacy will remain distinctively Chinese – i.e., they will retain a basic consistency with traditional Chinese values and approaches.  相似文献   

5.
[目的]探索医学期刊组织专题的有效途径,为国内医学期刊提供借鉴与参考。[方法]以《放射学实践》杂志为例,介绍其通过与协办单位合作、及时报道重大科研成果、围绕突发公共卫生事件等多种方式进行专题组稿的经验和体会;比较、分析专题论文和非专题论文的质量。[结果]《放射学实践》近3年成功组织了22个专题,极大地扩大了本刊在业内的影响。专题论文的篇均被引频次和篇均下载量均明显高于非专题论文。[结论]医学期刊编辑应该结合自身杂志特点,充分发挥积极性和主动性,勇于探索,敢于创新,不断开拓专题组稿的新方法和新形式,为提高期刊质量不懈努力。  相似文献   

6.
谁在主导中日韩的国际科学合作?   总被引:1,自引:0,他引:1  
陈悦  左佳  宋超  宋凯 《情报杂志》2021,(4):155-162
[目的/意义]为了探究中日韩的国际科学合作中的主导地位及变化趋势。[方法/过程]以"中日"、"中韩"和"中日韩"国际论文合著现象为分析对象,通过科学计量的方法和手段,从重要作者、高影响力论文和资助者三个维度来分析近40年来中日韩科学合作背后的主导力量。[结果/结论]研究结果发现中日科学合作呈现出日本主导趋势由强到弱,而中国主导趋势渐强并超过日本;中韩科学合作呈现双方共同主导的特征;在三国合作中,中国主导的论文影响力较强,但随着论文影响力的增大,中国显示出的主导优势却在减弱;中国作为科研资助者极大地推动了三国的科学合作。  相似文献   

7.
Throughout the period 1951–1972 the source of over two thirds of the world shipbuilding output has been four industrial countries, namely UK, W. Germany, Sweden and Japan, However, during the same period, the relative share of each of the above-mentioned countries in the world's output has changed. During the 1950's the relative share in the world shipbuilding output of the UK and Swedish industries fell, while that of W. Germany and Japan rose. The 1960's witnessed a further fall in the relative share of the UK and Sweden, a fall in the relative share of W. Germany and a sharper rise than during the earlier decade in the relative share of Japan.The dominant position of Japan vis-à-vis other leading shipbuilding countries has been due primarily to its price competitiveness. Japanese shipbuilding prices were lower than those of the UK by a margin that ranged from 7.5–20%. This article attempts to show that this price advantage is due neither to the lower cost of Japanese factors of production, nor to a greater degree of subsidization for the Japanese shipbuilding industry in comparison with those of the UK, W. Germany and Sweden. The theme of this article is that the competitive position enjoyed by the Japanese shipbuilding industry is accounted for by its greater innovativeness compared with the industries in other leading shipbuilding countries. A series of process innovations introduced in Japan has reduced the building cost as well as the operating cost of Japanese built vessels. These process innovations have affected the various components of shipbuilding technology, such as the general engineering aspects, propulsion system, size and manning. This article shows that the greater innovativeness of the Japanese shipbuilding industry is due to several factors: the favourable effect on R & D expenditure of the average size of firms, good management of R & D efforts, and the involvement of management in the production technology side of the business.  相似文献   

8.
Based on our demonstration earlier that ethanol extract, water extract and a compound purified from garlic possessedin vitro antitubercular activity against drug resistant and susceptibleMycobacterium tuberculosis, we tried the effect of garlic extract in 30 patients of tubercular lymphadenitis. For ethical considerations, two groups of patients, 30 each, were given antitubercular therapy (ATT) consisting of isoniazid, rifampicin, ethambutol and pyrazinamide for 30 days. For the next 15 days (31 to 45 days) group 1 patients received 3–6 garlic pearls per day in addition to ATT while group 2 patients received ATT only. From 46th day onwards both the groups received ATT only for 6–8 months. Antitubercular activity of the serum samples collected on 45th day was assessed by its effect on the growth ofM. tuberculois. The serum of group 1 patients showed significantly much higher antitubercular activity than that of group 2 patients. Further, there was relief of dyspeptic symptoms caused by ATT therapy in patients of group 1 with garlic plus ATT therapy but no change in group 2 patients with ATT only. Liver function and hematological tests were normal in both the groups after 6 months of therapy. Garlic extracts or compounds have a good potential as antitubercular(s) drug if given as a supplement to ATT.  相似文献   

9.
The proliferation of information and communication technologies (ICTs) into all aspects of life poses unique ethical challenges as our modern societies become increasingly dependent on the flawless operation of these technologies. As we increasingly entrust our privacy, our well-being and our lives to an ever greater number of computers we need to look more closely at the risks and ethical implications of these developments. By emphasising the vulnerability of software and the practice of professional software developers, we want to make clear the ethical aspects of producing potentially flawed software. This paper outlines some of the vulnerabilities associated with software systems and identifies a number of social and organisational factors affecting software developers and contributing to these vulnerabilities. Scott A. Snook’s theory of practical drift is used as the basis for our analysis. We show that this theory, originally developed to explain the failure of a military organisation, can be used to understand how professional software developers “drift away” from procedures and processes designed to ensure quality and prevent software vulnerability. Based on interviews with software developers in two Norwegian companies we identify two areas where social factors compel software developers to drift away from a global set of rules constituting software development processes and methods. Issues of pleasure and control and difference in mental models contribute to an uncoupling from established practices designed to guarantee the reliability of software and thus diminish its vulnerability.  相似文献   

10.
日本图书馆协会通过制定完备的行业政策,充分发挥协会的领导作用和组织作用。同时,各图书馆根据法律和行业政策,普遍制定了在图书馆业务活动中保护读者隐私的具体规则和措施,使尊重读者隐私权落到实处。日本图书馆界诸多宝贵经验值得我们学习、借鉴。  相似文献   

11.
目的】探讨异地终审会提高科技期刊学术质量和影响力的效果。【方法】 2015年4-6月,在总结《中国实用妇科与产科杂志》8年来异地终审会效果的基础上,通过查阅既往文献,比较异地终审会与本地终审会的差异,以及异地终审会在提高期刊学术质量及影响力方面的优势。【结果】与本地终审会相比,异地终审会专家学科知识涵盖更全面,可减小审稿的地域局限性;减轻本地编委终审压力,调动异地编委审稿积极性;更加强了编辑部与编委的沟通和联系;扩大了期刊的学术质量和影响力,提高了被引频次和影响因子。【结论】异地终审会可以达到提高期刊学术质量和影响力的目的。  相似文献   

12.
James Rachels’ seminal paper “Why Privacy Is Important” (1975) remains one of the most influential statements on the topic. It offers a general theory that explains why privacy is important in relation to mundane personal information and situations. According to the theory, privacy is important because it allows us to selectively disclose personal information and to engage in behaviors appropriate to and necessary for creating and maintaining diverse personal relationships. Without this control, it is implied, the diversity of relationships would diminish; relationships would “flatten out”, we might say. The aspect of the paper that addresses information flows (what I refer to as his information privacy theory) has been of particular interest to computer information privacy theorists. Despite its continued importance to computer privacy theorists, however, the information privacy theory appears to be contradicted by recent developments in computing. In particular, since the publication of Rachels’ paper we have seen an extensive amount of personal information collected. Further, recent developments in computing falling under the heading of social computing have brought about a new wave of personal information creation and collection. This paper will reassess and resituate Rachels’ information privacy theory in light of these developments. I will argue that the increasing collection of personal data will not flatten relationships as the information privacy theory predicts because such data lack contextual factors important to Rachels’ general theory. The paper will conclude by pointing to some areas where Rachels’ general theory and where his information privacy theory will continue to be relevant.  相似文献   

13.
This paper analyzes ethical aspects of the new paradigm of Ambient Intelligence, which is a combination of Ubiquitous Computing and Intelligent User Interfaces (IUI’s). After an introduction to the approach, two key ethical dimensions will be analyzed: freedom and privacy. It is argued that Ambient Intelligence, though often designed to enhance freedom and control, has the potential to limit freedom and autonomy as well. Ambient Intelligence also harbors great privacy risks, and these are explored as well.  相似文献   

14.
The concept of privacy as a basic human right which has to be protected by law is a recently adopted concept in Thailand, as the protection of human rights was only legally recognized by the National Human Rights Act in 1999. Moreover, along with other drafted legislation on computer crime, the law on privacy protection has not yet been enacted. The political reform and the influences of globalization have speeded up the process of westernization of the urban, educated middle-class professionals. However, the strength of traditional Thai culture means that a mass awareness of the concept of privacy rights remains scarce. This paper explicates the Thai cultural perspective on privacy and discusses the influence of Buddhism on privacy rights, including the impacts of globalization and the influence of Western values on the country’s political and legal developments. The paper also discusses the legal provisions regarding privacy protection, and the debates on the smart ID cards policy and SIM cards registration for national security.  相似文献   

15.
16.
以中日茶叶贸易为研究对象,分析日本对茶叶实施技术贸易壁垒对中国茶叶出口的影响,认为日本频繁提高茶叶进口标准,对茶叶实施技术贸易壁垒致使我国对日茶叶出口数量和金额上有着明显的下降以及茶叶出口价格上涨,也使得我国茶叶在日本茶叶进口比重中有所下降,可以通过认真实施茶叶农残留标准体系、提高中国茶叶的深加工能力、提高茶叶附加值,构建茶叶产业科技创新体系等措施来推动中国对包括日本在内的国家茶叶出口。  相似文献   

17.
The paper outlines a new interpretation of informational privacy and of its moral value. The main theses defended are: (a) informational privacy is a function of the ontological friction in the infosphere, that is, of the forces that oppose the information flow within the space of information; (b) digital ICTs (information and communication technologies) affect the ontological friction by changing the nature of the infosphere (re-ontologization); (c) digital ICTs can therefore both decrease and protect informational privacy but, most importantly, they can also alter its nature and hence our understanding and appreciation of it; (d) a change in our ontological perspective, brought about by digital ICTs, suggests considering each person as being constituted by his or her information and hence regarding a breach of one’s informational privacy as a form of aggression towards one’s personal identity.  相似文献   

18.
This paper provides an in-depth analysis of the privacy rights dilemma surrounding radio frequency identification (RFID) technology. As one example of ubiquitous information system, RFID has multitudinous applications in various industries and businesses across society. The use of this technology will have to lead to a policy setting dilemma in that a balance between individuals’ privacy concerns and the benefits that they derive from it must be drawn. After describing the basic RFID technology some of its most prevalent uses, a definition of privacy is derived in the context of information systems. To illustrate current attempts at controlling the undesirable side effects of RFID, Lessig’s cyberspace framework is presented. It is found that each of Lessig’s components is inadequate at preventing individual privacy violations in RFID. The main focus within this framework is on the norms of society. The social norm mechanism that addresses privacy issues in cyberspace is the Fair Information Practices Principles (FIPP). After an analysis of these principles, it is posited that the FIPP only deal with procedural justice issues related to data collection and omit distributive and interactional justice reasoning related to the actual beneficial and detrimental outcomes to the individuals whose data is being obtained. Thus, RFID is presented in the context of the tension between the many benefits that are provided by the technology in social exchanges, and the risk it carries of the loss of privacy. The new, expanded framework recognizes both sides of the issue with the ultimate goal of providing a greater understanding of how privacy issues can be addressed with RFID technology.  相似文献   

19.
Reviewer assignment is an important task in many research-related activities, such as conference organization and grant-proposal adjudication. The goal is to assign each submitted artifact to a set of reviewers who can thoroughly evaluate all aspects of the artifact’s content, while, at the same time, balancing the workload of the reviewers. In this paper, we focus on textual artifacts such as conference papers, where both (aspects of) the submitted papers and (expertise areas of) the reviewers can be described with terms and/or topics extracted from the text. We propose a method for automatically assigning a team of reviewers to each submitted paper, based on the clusters of the reviewers’ publications as latent research areas. Our method extends the definition of the relevance score between reviewers and papers using the latent research areas information to find a team of reviewers for each paper, such that each individual reviewer and the team as a whole cover as many paper aspects as possible. To solve the constrained problem where each reviewer has a limited reviewing capacity, we utilize a greedy algorithm that starts with a group of reviewers for each paper and iteratively evolves it to improve the coverage of the papers’ topics by the reviewers’ expertise. We experimentally demonstrate that our method outperforms state-of-the-art approaches w.r.t several standard quality measures.  相似文献   

20.
In this essay, I argue that popular entertainment can be understood in terms of Husserl’s concepts of epochē, reduction and constitution, and, conversely, that epochē, reduction and constitution can be explicated in terms of popular entertainment. To this end I use Husserl’s concepts to explicate and reflect upon the psychological and ethical effects of an exemplary instance of entertainment, the renowned Star Trek episode entitled “The Measure of a Man.” The importance of such an exercise is twofold: (1) to demonstrate, once again, the fecundity of the methodological procedures Husserl bequeathed to us; more than any other philosopher, he tapped into the fundamental manners in which we lose, make and remake the meanings of our lives; and (2) to demonstrate how popular entertainment, similarly, plays a central role in the making and remaking of the meanings of our lives. If my zig-zag procedure between Husserl’s philosophy and popular entertainment is productive and cogent, in addition to elucidating Husserl’s philosophy, it will demonstrate the reality-generating potency and the constitutive power of entertainment in the contemporary world. Entertainment, via ourselves, has become the primary producer of the meanings via which consciousness constitutes the world.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号