首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 677 毫秒
1.
对于处理行刑衔接案件的程序问题进行了研究,提出了一种不同于传统先进行刑事处罚再进行行政处罚的观点。认为应该先进行行政处罚再进行刑事处罚,并对于其合理性进行了探究。  相似文献   

2.
本文对一种嵌入式操作系统进行覆盖测试的情况进行了探讨,详细描述了这类软件的特性,对这类软件进行覆盖测试的原理、过程和覆盖测试的结果进行了阐述,并对测试过程中的不足进行了分析。  相似文献   

3.
对大学生的阅读倾向进行了分析,从阅读目的、方式、内容等方面进行了综述,提出了对其进行正确引导的有效途径。  相似文献   

4.
舒红宁  徐长红 《科技风》2012,(18):107-108
对专利文献进行了收集整理,对中国和外国的轧辊防偏析文献做了统计,从专利文献出发,阐述了防止轧辊偏析的方法。例如从材料上进行改进,从变质处理上进行改进,从热处理工艺上进行改进;添加磁场等,并对其进行了详细举例。  相似文献   

5.
论述了网络管理系统进行统一的必要性,介绍了进行统一的不同层面,然后简要地分析了网络管理系统进行统一的内容和实现途径。  相似文献   

6.
近期,美国和日本分别对其专利法进行了修改,两国均对新颖性宽限期的保护层次进行了重点调整,在此背景下,本文针对世界不同国家和地区的宽限期规定进行了对比分析,并对我国现行的宽限期规定进行了分析和思考。  相似文献   

7.
系统分析了网吧的火灾危险性进行,对网吧按微机台数进行分级并对人员密度进行了抽样计算,提出了网吧消防安全管理的详细对策,并对农村网吧的快速发现情况进行了论证分析。  相似文献   

8.
简单分析了在HTTP中上传文件的信息格式,并对传统上传文件算法进行了描述,并对这个算法进行了改进及并通过JAVA语言进行了实现。  相似文献   

9.
电子商务技术扩散系统和扩散过程模型研究   总被引:1,自引:0,他引:1  
首先对电子商务技术扩散的涵义进行了研究,对电子商务技术扩散的概念进行了界定,然后对电子商务技术扩散系统的构成要素进行了分析。在以上分析的基础上,以创新扩散理论为基础建立了电子商务技术扩散的过程模型,并且对其扩散过程进行了深入分析。  相似文献   

10.
对燃料电池的工作原理进行了详细的分析;对其演化过程进行了简述;对其最新技术进行了详细的研究;对国内燃料电池技术的发展提供了参考意见。  相似文献   

11.
The increasing prospects of digital piracy has prompted the perceived need by electronic publishers to adopt technical systems of protection, and governments to reform their copyright laws. This article is a preliminary study of the management of intellectual property by electronic publishers, defined as those involved in the production of online databases, and CD-ROMs. It focuses on three main issues: (1) how electronic publishers view the increasing threat of piracy; (2) the methods of protection employed to protect intellectual property in digital format; and (3) the importance of technological protection of intellectual property in electronic publications. The analysis is based on a sample of 23 UK electronic publishers. The interviews revealed an interesting assortment of protection methods and did not show that technological protection was a preferred way. Instead, the means of protection, in addition to copyright law, comprised niche markets, pricing, trust, bad publicity, and nontechnical and technical means.  相似文献   

12.
This paper examines the category of "Woman" within the metastructure of a system of knowledge organization. We trace the subject scheme used to list books about women in a standard bibliographic guide over the first three-quarters of the twentieth century.Building on the feminist critique of subject representation, our analysis documents how the category was continually constructed over time, providing evidence of multiplication, isolation, and confusion in the process. The outcome is a framework that fails to capture the complex nature of knowledge about women and conceals relationships to the larger body of knowledge. The case of this legacy system exemplifies problems associated with representing the complexity and integration of knowledge and provides a basis for considering the potential residual impacts of current information organization and navigation systems.  相似文献   

13.
结合元极学三元学说,剖析《管子》的基本概念如道、宙合、精、德、中、智等的内涵,揭示时间、空间、精等是天地万物的共同特征或本质,注重时、空、精的层次性、无限性,以及人的生命本和本性展发。  相似文献   

14.
The main premise of this article is that in information societies generally, and in virtual social contexts particularly, a distinctive style of interaction to facilitate the communication of difference, heterotopic communication , has emerged. It rests on two cultural foundations: an ideological belief in the positive, socially integrating power of communication, and a prevailing ethic of instrumental rationality, subjective individualism, and strategically practiced self-interest. The former is demonstrated by the use of simulation and spectacle as sources of information; exhibitionism/voyeurism as a communicative style; and the awareness of surveillance. The latter is seen in the competitive use of knowledge as a commodity; a surface globalism masking deep parochialism; lateral as well as vertical information inequity; and the use of public versus private as strategies for engagement rather than as spaces. Those who engage in heterotopic communication resort to their 'own devices' both in the sense of personal agendas, strategies, interests, and interpretations, and in the form of the telecommunication tools that help realize them. These personal and technological devices allow individuals with the right educational and technical resources to avoid exposure to disagreement, difference, or other information that does not serve their direct purposes or reflect their particular views of the world; yet they also help convey the appearance of openness, availability, and cooperation. This style of interaction is used strategically in combination with information and communication technologies to gain social or economic advantages, but it may encourage social separatism and parochialism, inhibit the negotiation of disputes, and emphasize competing interests.  相似文献   

15.
Contrary to the "retro" image often awarded them, and despite their continuing enthusiasm and responsibility for the organization of printed materials, librarians are upbeat about the prospects of an information society driven primarily by electronic technologies, but in which libraries can play an important part. Public librarians detect a natural correlation between the historic democratic mission of their institution and the increased accessibility made possible by digitalized sources. The library community's acceptance of the information society idea as a "given" social phenomenon supports discourses that play down historical continuities and herald the dawn of a new age. Such discourses ignore or reject historical evidence that points to the existence of past information societies, revolutions, and infrastructures defined, in part, by the operation of indirect surveillance, constituted by the bureaucratic information systems of modernity. Victorian Britain serves as a good example of an early information society, to which public libraries, themselves micro-information societies, contributed significantly. The role played by public librarians in the Victorian information society, illustrated in this article by evidence drawn from the contemporary library press, is seen in their preoccupation with the surveillance and ordering of knowledge; their adoption for library operations of the businesslike, bureaucratic procedures described recently by business historians; and their panoptic tracking of users and their activities.  相似文献   

16.
This article presents an account of the process of development of the NSFNET and its significance for the emergence of the Internet of the 1990s. The fact that the development of the interconnected system of computer networks occurred within the realm of academic research is not incidental. The dynamics of the world of scientific research were intimately related to the shaping of the network and to the way in which it spread to other sectors of society. The construction of computer networks crossed the boundaries between science and society in order to build the scientific realm by transforming the world in which it is embedded.  相似文献   

17.
中德海洋学核心期刊论文国际合著的比较分析   总被引:1,自引:0,他引:1  
万琪  华薇娜 《现代情报》2016,36(2):150-156
本研究选取Web of Science数据库,收集中国和德国发表的海洋学论文,将论文分为国际合著组与非国际合著组,利用文献计量学的方法,借助EXCEL、SPSS和UCINET软件,比较两国各年的发文量、论文的篇均作者和篇均参考文献数、收录期刊的影响因子、论文的被引频次以及合著国家。研究结果显示,中国海洋学领域的国际合著起步晚于德国,但发展迅速,近年来中国海洋学国际合著的论文量已超过德国;同时中国海洋学国际合著论文的质量和学术影响力都弱于德国,并且中国海洋学论文合著国家的范围也小于德国海洋学的合著国家。  相似文献   

18.
A computer-mediated group is a complex entity whose members exchange many types of information via multiple means of communication in pursuit of goals specific to their environment. Over time, they coordinate technical features of media with locally enacted use to achieve a viable working arrangement. To explore this complex interaction, a case study is presented of the social networks of interactions and media use among members of a class of computer-supported distance learners. Results show how group structures associated with project teams dominated who communicated with whom, about what, and via which media over the term, and how media came to occupy their own communication niches: Webboard for diffuse class-wide communication; Internet Relay Chat more to named others but still for general communication across the class; and e-mail primarily for intrateam communication. Face-to-face interaction, occurring only during a short on-campus session, appears to have had a catalytic effect on social and emotional exchanges. Results suggest the need to structure exchanges to balance class-wide sharing of ideas with subgroup interactions that facilitate project completion, and to provide media that support these two modes of interaction.  相似文献   

19.
Trust between transaction partners in cyberspace has come to be considered a distinct possibility. In this article the focus is on the conditions for its creation by way of assuming, not inferring trust. After a survey of its development over the years (in the writings of authors like Luhmann, Baier, Gambetta, and Pettit), this mechanism of trust is explored in a study of personal journal blogs. After a brief presentation of some technicalities of blogging and authors’ motives for writing their diaries, I try to answer the question, ‘Why do the overwhelming majority of web diarists dare to expose the intimate details of their lives to the world at large?’ It is argued that the mechanism of assuming trust is at play: authors simply assume that future visitors to their blog will be sympathetic readers, worthy of their intimacies. This assumption then may create a self-fulfilling cycle of mutual admiration. Thereupon, this phenomenon of blogging about one’s intimacies is linked to Calvert’s theory of ‘mediated voyeurism’ and Mathiesen’s notion of ‘synopticism’. It is to be interpreted as a form of ‘empowering exhibitionism’ that reaffirms subjectivity. Various types of ‘synopticon’ are distinguished, each drawing the line between public and private differently. In the most ‘radical’ synopticon blogging proceeds in total transparency and the concept of privacy is declared obsolete; the societal gaze of surveillance is proudly returned and nullified. Finally it is shown that, in practice, these conceptions of blogging are put to a severe test, while authors often have to cope with known people from ‘real life’ complaining, and with ‘trolling’ strangers.  相似文献   

20.
The Principles of Fair Information Practice are almost three decades old and need to be broadened to take account of new technologies for collecting personal information such as drug testing, video cameras, electronic location monitoring, and the Internet. I argue that the ethics of a surveillance activity must be judged according to the means, the context and conditions of data collection, and the uses/goals, and suggest 29 questions related to this. The more one can answer these questions in a way that affirms the underlying principle (or a condition supportive of it), the more ethical the use of a tactic is likely to be. Four conditions are identified that, when breached, are likely to violate an individual's reasonable expectation of privacy. Respect for the dignity of the person is a central factor and emphasis is put on the avoidance of harm, validity, trust, notice, and permission when crossing personal borders.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号