首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 62 毫秒
1.
尊重隐私、保护隐私已逐渐被现实社会所认同,然而对为什么要保护隐私以及隐私的价值仍各有歧见。西方社会对隐私保护的辩护主要有绝对价值论和相对价值论两种思路,两种思路都是从自由主义和个人主义的角度出发的,与以集体主义为背景的中国社会不相符合。在集体主义的框架内,也能对隐私的保护提供有力的辩护。保护隐私不仅能增加个体的福利,而且能增进社会的总体福利,促进社会和谐。  相似文献   

2.
探讨影响浙江省共同富裕示范区建设的相关主要科技活动的潜在伦理风险。以“互联网+”、生命健康和新材料科学领域代表技术为研究对象,基于Web of Science、PubMed、Scopus、中国知网、万方、维普等数据库筛选出143篇相关中英文文献,梳理、分析和预判其中有关信息资源公平、生物资源公平、公共安全等问题,揭示其中所隐含的人体安全、隐私保护、受试者尊重等伦理风险;基于此,以浙江省数字一体化建设为例,阐析浙江省政府作为元治理者行使三阶治理职能,为多元主体共治提供基础治理平台、促进多元主体参与一二阶治理的实践措施,如建立自纠自查伦理生态、伦理治理信息化平台等,为研判新兴科技共性伦理风险、探索科技伦理治理新模式提供参考。  相似文献   

3.
隐私一般指个人免于被打扰和干预的权利。它是流动社会的个体性得以发展的必要条件。隐私权是一种随着技术的发展而变迁的一种开放性与扩充性的权利赋予,并在不同的法律文化背景中被视为一种基本的个人权利或人权。信息隐私是隐私在信息时代的新发展,信息隐私权指个人拥有控制或限制他人获悉或披露个人信息的权利。在网络与大数据时代,信息隐私的保护建立在对个人数据的规制之上。在不同的规制架构下,个人许可与数据使用者的责任担当日益受到重视,它们是提升消费者对信息服务信心必不可少的前提。  相似文献   

4.
网络隐私问题研究综述   总被引:2,自引:0,他引:2  
随着计算机的广泛使用和网络技术的不断进步,在网络交易过程中收集、利用和出售个人隐私数据的现象十分普遍.网络隐私的侵犯问题已成为信息社会的最大困扰之一,如何有效地保护个人的网络隐私成为亟待解决的问题.本文首先介绍了网络隐私保护的出现及其发展;其次,对网络隐私的价值问题以及电子商务中的信任问题进行讨论,重点探讨了目前网络隐私保护的4种方式;最后给出了网络隐私问题未来的研究方向.  相似文献   

5.
刘松 《现代情报》2007,27(7):190-192
基于现行数据隐私问题日益严重,如何防止数据挖掘过程中隐私信息的泄漏,将是一个重要的研究议题。本文主要针对关联规则挖掘技术,从数据挖掘资源共享方面探讨隐私信息的保护,提出数据汇总概念的保护机制.将欲公开的内容隐藏到汇总内容中。此机制不仅确保公开内容的隐私,还可以从汇总内容中获取有用信息,从而在隐私保护和知识获取间取得一个平衡。  相似文献   

6.
实质损害原则——美国信息隐私保护利益平衡原则   总被引:2,自引:0,他引:2  
潘建珊 《情报科学》2007,25(11):1723-1728
欧盟平衡个人信息隐私权和公共利益的原则是充分利益原则,只有在证明公共利益是充分必要时,才能适当减损个人信息隐私权;美国则更为重视信息自由流动的价值意义,在平衡个人信息隐私权与公共利益的冲突时,采取实质损害原则,保护个人信息隐私免于披露必须证明披露信息对个人造成实质损害或实质损害的威胁。本文在分析我国建设征信体系时所处的背景及所面临的主要矛盾后,建议借鉴美国信息隐私保护的利益平衡观,在个人信用信息的采集和利用方面,采取“宽进严出”的方式。  相似文献   

7.
占南  闫香玉 《现代情报》2023,(10):35-53
[目的/意义]电商智能推荐服务帮助电商平台挖掘用户潜在需求,为用户进行商品和服务选择提供便利,但同时也引发了用户对于隐私和数据安全的担忧。本文通过探究智能化信息技术时代用户信息隐私披露意愿的影响机理,为缓解用户信息隐私担忧,促进电子商务平台持续健康发展提供参考和建议。[方法/过程]本文基于APCO模型、隐私计算理论和人格五因素模型,结合信息隐私披露的相关文献,构建了电商智能推荐用户信息隐私披露意愿的理论模型。通过问卷调查收集596份有效问卷,利用Smart PLS3.0软件进行数据分析和假设检验。[结果/结论]研究结果发现:(1)隐私素养和隐私社会规范均显著正向影响用户隐私关注;(2)隐私关注显著正向影响感知风险,显著负向影响信息隐私披露意愿;(3)感知利益显著正向影响信息隐私披露意愿;(4)智能推荐商品相关性、外向性人格特质和宜人性人格特质显著负向调节用户隐私关注和信息隐私披露意愿的关系。信息隐私安全和算法公平是信息时代重要的管理实践问题,本文关注智能推荐和关联分析给用户信息隐私保护带来的问题和挑战,从理论上拓展了信息隐私披露领域的研究视角,从实践上为电子商务平台保护用户信息隐私安全...  相似文献   

8.
【目的】 细化医学期刊伦理相关审查及处理流程,为完善我国医学期刊相关规范提供参考。【方法】 比对出版伦理委员会规范,结合国外相关案例,提出目前国内医学期刊伦理审查存在的问题及相应解决流程。【结果】 国内医学期刊应注意对论文的伦理审批、患者知情同意、保护患者隐私、临床试验注册信息等方面的审查,对作者文中未说明是否获得患者知情同意、未保护患者隐私、未说明是否经过伦理审查等进行相应处理。【结论】 医学期刊编辑规范和完善医学伦理相关审查规定和处理流程,可推进期刊国际化进程。  相似文献   

9.
[目的/意义]本研究通过对国外代表性数字人文众包项目中隐私政策框架及内容的梳理,为我国数字人文众包项目中个人信息保护及隐私政策制定提供参考。[方法/过程]采用扎根理论以及LDA主题建模对国外47个代表性数字人文众包平台网站的隐私政策进行主题鉴别和编码分析,梳理隐私政策的文本框架,并对不同发起平台、国家(地区)以及不同类型的数字人文众包隐私政策的结构框架与内容进行比较分析;与此同时,探索我国代表性数字人文众包项目中个人信息保护隐私政策方面的现状。[结果/结论]研究发现:国外数字人文众包隐私政策框架涉及信息内容、信息安全、信息存储、信息共享、信息使用、信息收集及用户权利7个维度,其中对信息收集、信息安全、信息内容3个维度关注度较高,对“用户权利”这一维度的关注度均相对较低;不同发起平台、国家(地区)及项目类型所属维度内容特征存在差异,相对来说,发起平台中档案馆和博物馆,发起国中英国和新西兰,在数字人文众包项目隐私政策的指标完整度较高,转录型指标完整度相对较低;较之国内数字人文众包隐私政策,国外政策的类目体系更加完整,内容覆盖面广,尤其是开始重视14岁以下未成年人群体;最后从隐私政策框架、隐...  相似文献   

10.
互联网对现行的隐私保护制度的根本影响主要体现在它使隐私的经济价值得到极大地提升,从而使得现代社会中的人与人之间的隐私利益依存关系变得更加紧密,同时也使得现代社会对包括个人隐私在内的信息的需求与个人需要保护(自己的)隐私之间的矛盾更加突出;它改变了隐私传播、加工和利用的技术条件,使得现行整个隐私保护制度赖以建立和存在的基本条件发生变化。  相似文献   

11.
Aresearch group led by Prof. ZHAI Qiwei from the Institute for Nutritional Sciences under the CAS Shanghai Institutes for Biological Sciences has discovered that even relatively low doses of resveratrol--a chemical found in the skins of red grapes and in red wine--can improve the sensitivity of mice to the hormone insulin, according to a report in the October,2007 issue of Cell Metabolism. As insulin resistance is often characterized as the most critical factor contributing to the development of Type 2 diabetes, the findings“provide a potential new therapeutic approach for preventing or treating” both conditions, the researchers said.  相似文献   

12.
CAS should stick to the principle of rendering service to, and giving impetus for, the development of China's science enterprise by making S&T innovations, said CAS President LU Yongxiang. The CAS president made the remarks in a recent talk to communicate the gist of the winter session of the Party's Leading-member Group at CAS, which was held from 7 to 11 January in Beijing.  相似文献   

13.
This study examined how students who had no prior experience with videoconferencing would react to the use of videoconferencing as an instructional medium. Students enrolled in seven different courses completed a questionnaire at the beginning of the semester and again at the end of the semester. Students at the origination and remote sites did not differ in their reactions toward videoconferencing but there was a significant difference for gender. Women reacted less favorably to videoconferencing. Compared to the beginning of the semester, students reported significantly less positive attitudes toward taking a course through videoconferencing at the end of the semester. There were no significant differences in students' attitudes toward videoconferencing across courses at the beginning of the semester but there were significant differences across the courses at the end of the semester. The results suggest the need for better preparation for both students and instructors.  相似文献   

14.
With great care, Dr. ZHOU Zhonghe takes out a package wrapped by cotton tissue from a drawer and says: "This is the gem of our collections: the fossil of a bird that lived 125 million years ago!" Then, pointing at a tiny mound, he explains: "Look, this is the claw and that is the head. It was in the egg shell and ready to hatch ... The species fell into a family of waterside inhabitants."  相似文献   

15.
Ajoint study by Prof. ZHANG Zhibin from the CAS Institute of Zoology and his co-workers from Norway, US and Swiss have indicated that historical outbreaks of migratory locusts in China were associated with cold spells, suggesting that China's projected climate warming could decrease the pest's numbers. The study was published in Proceedings of theNational Academy of Sciences on 17 September, 2007.  相似文献   

16.
A computer-mediated group is a complex entity whose members exchange many types of information via multiple means of communication in pursuit of goals specific to their environment. Over time, they coordinate technical features of media with locally enacted use to achieve a viable working arrangement. To explore this complex interaction, a case study is presented of the social networks of interactions and media use among members of a class of computer-supported distance learners. Results show how group structures associated with project teams dominated who communicated with whom, about what, and via which media over the term, and how media came to occupy their own communication niches: Webboard for diffuse class-wide communication; Internet Relay Chat more to named others but still for general communication across the class; and e-mail primarily for intrateam communication. Face-to-face interaction, occurring only during a short on-campus session, appears to have had a catalytic effect on social and emotional exchanges. Results suggest the need to structure exchanges to balance class-wide sharing of ideas with subgroup interactions that facilitate project completion, and to provide media that support these two modes of interaction.  相似文献   

17.
Active biological molecules and functional structures can be fabricated into a bio-mimetic system by using molecular assembly method. Such materials can be used for the drug delivery, disease diagnosis and therapy, and new nanodevice construction.  相似文献   

18.
Electronic data interchange (EDI) provides means for interorganizational communication, creates network externalities, requires an advanced information technology (IT) infrastructure, and relies on standards. In the diffusion of such innovations, institutional involvement is imperative. Such institutions contain governmental agencies, national and global standardization organizations, local government, and nonprofit private organizations like industry associations. The last type of organizations we call intermediating institutions. They intermediate or coordinate ("inscribe") the activities of a group of would-be adopters. Unfortunately, little is known of how these organizations shape the EDI diffusion trajectory. In this article we examine one specific type of intermediating organizations?industry associations?and how they advanced the EDI diffusion process in the grocery sectors of Hong Kong, Denmark and Finland. We identify six institutional measures, placed into a matrix formed by the mode of involvement (influence vs. regulation) and the type of diffusion force (supply push vs. demand pull), that can be mobilized to further the EDI diffusion. Industry associations were found to be active users of all these measures to varying degrees. Their role was critical especially in knowledge building, knowledge deployment, and standard setting. Furthermore, institutional involvement varied due to policy and cultural contingencies and power dependencies.  相似文献   

19.
The increasing prospects of digital piracy has prompted the perceived need by electronic publishers to adopt technical systems of protection, and governments to reform their copyright laws. This article is a preliminary study of the management of intellectual property by electronic publishers, defined as those involved in the production of online databases, and CD-ROMs. It focuses on three main issues: (1) how electronic publishers view the increasing threat of piracy; (2) the methods of protection employed to protect intellectual property in digital format; and (3) the importance of technological protection of intellectual property in electronic publications. The analysis is based on a sample of 23 UK electronic publishers. The interviews revealed an interesting assortment of protection methods and did not show that technological protection was a preferred way. Instead, the means of protection, in addition to copyright law, comprised niche markets, pricing, trust, bad publicity, and nontechnical and technical means.  相似文献   

20.
This essay focuses on universal service and the Internet as means to support social and political participation. The emphasis on access to telecommunications systems in conventional approaches to universal service is contrasted with access to content. A model of the information environment is described that accounts for the roles of content and conduit, both of which are necessary conditions to achieve true access. A method is outlined for employing information indicators to observe or measure the information environment.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号