首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 15 毫秒
1.
The positive qualities of the Internet--anonymity, openness, and reproducibility have added a new ethical dimension to the privacy debate. This paper describes a new and significant way in which privacy is violated. A type of personal information, called virtual information is described and the effectiveness of techniques to protect this type of information is examined. This examination includes a discussion of technical approaches and professional standards as ways to address this violation of virtual information.  相似文献   

2.
3.
I describe the emergence of Floridi’s philosophy of information (PI) and information ethics (IE) against the larger backdrop of Information and Computer Ethics (ICE). Among their many strengths, PI and IE offer promising metaphysical and ethical frameworks for a global ICE that holds together globally shared norms with the irreducible differences that define local cultural and ethical traditions. I then review the major defenses and critiques of PI and IE offered by contributors to this special issue, and highlight Floridi’s responses to especially two central problems – the charge of relativism and the meaning of ?entropy’ in IE. These responses, conjoined with several elaborations of PI and IE offered here by diverse contributors, including important connections with the naturalistic philosophies of Spinoza and other major Western and Eastern figures, thus issue in an expanded and more refined version of PI and IE – one still facing important questions as well as possibilities for further development.  相似文献   

4.
Cyberchondria is conceptualized as excessive online searches for medical information, which is typically accompanied by feelings of emotional distress or anxiety. While previous studies in this nascent area have identified various psychological predictors of cyberchondria, a relative dearth of research has explored the role of different online information sources in its development. Informed by the stimulus-organism-response (SOR) model and the literature on cyberchondria, this study proposes a theoretical framework to explain why people develop cyberchondria when seeking medical information via different online sources. Based on a three-wave panel survey (N = 654), our findings suggest that health information seeking via online search engines increases online information overload (β = 0.11, p = .02), while health information seeking via social media platforms and health-specific websites increases online information trust (β = 0.13, p = .005; β = 0.25, p < .001). Additionally, online information overload is negatively related to online information trust (β = -0.39, p < .001). Subsequently, both online information overload and online information trust trigger cyberchondria (β = 0.73, p < .001; β = 0.15, p < .001). This study can contribute to the literature by expanding and deepening our understanding of cyberchondria developmental trajectory as well as emphasizing the pivotal role of online information sources in this complicated and dynamic process.  相似文献   

5.
Social networks provide individuals with diverse or redundant information depending on the network structure. Both types of information offer advantages for generating new ideas. At the same time, network structure and network content are independent. As a result, two individuals with the same network position can access diverse or redundant content from their social peers. In this study, we investigate the function of social networks in innovative endeavors given individuals’ different kinds of information accessing behavior. In accordance with previous research, we argue that individuals with a broker status access more diverse information through non-redundant network structures and develop, on average, more novel ideas. We further propose that redundancy in content complements brokers’ structural non-redundancy by providing familiar knowledge elements and therefore interpretability, while non-redundancy in both content and structure leads to information overload. Thus, we hypothesize that brokers accessing more information depth, and independently, less information breadth generate newer ideas. To test our hypotheses, we collected data from a popular online maker community containing 18,146 ideas, 19,919 profiles, and 52,663 comments. We used topic modeling (Latent Dirichlet Allocation) to extract hidden knowledge elements and social network analysis to identify brokers. In line with our hypotheses, we find that information depth (breadth) strengthens (weakens) a favorable broker position. These findings have implications for the literature on idea generation in social networks and household sector innovation.  相似文献   

6.
Utilizing the assumptions of the Resource-based theory, this study examined how and why new, rare, and inimitable resources in the form of information proactiveness motivation influence operational firm performance. We hypothesized open innovation as a mediator between information proactiveness motivation and operational firm performance. We also hypothesized the interactive effects of an individual’s creative cognitive style and information proactiveness motivation on open innovation whereas climate for innovation and open innovation jointly influence operational firm performance. A temporally segregated data (n = 260) was collected in three-time intervals from employees working in the banking sector of Islamabad, Pakistan. Utilizing the PROCESS approach, the findings of the study indicate that open innovation mediates the relationship between information proactiveness motivation, and operational firm performance. Moreover, the creative cognitive style was found to moderate the relationship between information proactiveness motivation and open innovation whereas climate for innovation emerged as a moderator between open innovation and operational firm performance. This research focused on unique information and contextual resources which directly and indirectly play significant roles in promoting the firm's open innovation and subsequent operational firm performance.  相似文献   

7.
Recent privacy-related incidents of mobile services have shown that app stores and providers face the challenge of mobile users’ information privacy concerns, which can prevent users from installing mobile apps or induce them to uninstall an app. In this paper, we investigate the role of app permission requests and compare the impact on privacy concerns with other antecedents of information privacy concerns, i.e., prior privacy experience, computer anxiety, and perceived control. To test these effects empirically, we conducted an online survey with 775 participants. Results of our structural equation modeling show that prior privacy experience, computer anxiety, and perceived control have significant effects on privacy concerns. However, concerns for app permission requests have approximately twice as much predictive value than the other factors put together to explain mobile users’ overall information privacy concerns. We expect that our findings can provide a theoretical contribution for future mobile privacy research as well as practical implications for app stores and providers.  相似文献   

8.
Modern public transportation companies often record large amounts of information. Privacy can be safeguarded by discarding nominal tickets, or introducing anonymization techniques. But is anonymity at all possible when everything is recorded? In this paper we discuss travel information management in the public transport scenario and we present a revealing case study (relative to the city of Cesena, Italy), showing that even anonymous 10-ride bus tickets may betray a user's privacy expectations. We also propose a number of recommendations for the design and management of public transport information systems, aimed at preserving the users’ privacy, while retaining the useful analysis features enabled by the e-ticketing technology.  相似文献   

9.
Continued integration of technology for the purpose of connecting and exchanging data with other devices and systems over the Internet exposes information security (IS) to growing risks. Organizations can thus achieve a strategic advantage by securing IS as a pivotal information and intelligence asset. This study examined ways of motivating IS professionals to protect information security from potential risks, drawing on the theoretical frameworks of protection motivation theory (PMT) and the theory of planned behavior (TPB) as well as work-related organizational antecedents (e.g., organizational commitment and job satisfaction). This paper proposes structural equation modeling (SEM) in R as a framework for exploring relationships among the variables and determining the overall data fit to the hypotheses. SEM is a multivariate technique which simultaneously executes both factor analysis and aspects of multiple regression in order to estimate interrelated relationships while also allowing path analytic modeling to be performed with latent, unobserved variables. Using 804 questionnaires with SEM analysis, we find support for the following predictors’ associations: (a) information security attitudes and subjective norms, as constituents of TPB, significantly influenced information security protective behaviors; (b) the coping appraisals (self-efficacy and response cost) and threat appraisals (threat susceptibility and threat severity) of PMT were significantly predictive of information security protective behaviors; and (c) organizational commitment positively impacted information security protective behaviors. However, job satisfaction and perceived behavioral control as a construct of TPB were not associated with information security behaviors. The main theoretical contribution of this research is that the addition of organizational commitment allows the behavioral science model to offer a novel understanding of IS professionals’ protection motivation and actual behaviors in the Chinese context. This study has several practical implications for organizations. In order to encourage IS professionals to follow protective security behaviors, organizations should set up the belief that a close relationship with subordinates plays a vital role in ensuring information security, improve IS employees’ perception and cognition of their importance to the organization, constantly highlight the importance of information security protection, and emphasize the severe consequences of information security threats during trainings.  相似文献   

10.
Amartya Sen’s capability approach has become increasingly popular in development studies. This paper identifies controllability and operationalisability as two key stumbling blocks which prevent the capability approach from being used even more widely in development practice. It discusses the origins and application of the Choice Framework, a conceptual tool designed to help operationalise the approach. The framework can be used to deconstruct embedded ideologies and analyse the appropriateness of development goals, to map development as a systemic process, and to plan interventions which can result in increased freedom of choice for people. Three examples of the application of the Choice Framework in the field of information and communication for development (ICT4D) are given. The three technologies which are examined, telecentres (Infocentros), Chilecompra and Fair Tracing, can be placed at different places of a determinism continuum, some reducing the spectrum of choices a user has. The paper argues that while frameworks such as the Choice Framework can be developed further to increase the operationalisability of the capability approach, it is up to development funders to accept the fact that people’s choices are never fully predictable and thus Sen’s ‘development as freedom’ will inevitably be a dynamic and open-ended process.  相似文献   

11.
Good information and records management is assumed to promote organizational efficiency. Despite established management regimes and available technology, many organizations still consider information and records management challenging. The reason may be cultural factors. This study based on a literature review, aims to explore the academic discourse on information culture and to discuss its relevance for records management. The findings show that the concept information culture is used in various ways: as an explanatory framework; as an analytical and evaluative tool; or as normative standard. The research on information culture addresses several areas: business performance, systems implementation, the manifestation of information culture in different organizations, and a few concerns records management practices. The research settings and the objects of study varied, why general conclusions are difficult to draw, but often a positive correlation between culture and performance is assumed. The focus has been on how information is used, shared and disseminated, while the production and management, that is the vital object of records management, has with few exceptions been neglected. If information culture should fully function as an analytical framework concerning records management, a widened and more inclusive conceptualization is required, which also will enrich information culture as a theoretical concept.  相似文献   

12.
This paper investigates whether gamified experiences in a multi-actor service ecosystem can be used to encourage customers’ information exchange behavior. Furthermore, it examines the impact of customers’ knowledge sharing attitude on the relationship between experiential value and customers’ information exchange behavior. Structural equation modeling was used to assess these dynamic relationships and provide a scalable measurement instrument that can be applied to gamified experiences ranging from simple customer-interface interactions, all the way up to multi-actor service ecosystems. Our findings support the notion that managers can use gamification to foster information exchange and thereby value co-creation between customers and employees directly, without necessarily having to change customers attitudes first. The findings also suggest that gamification can be applied successfully in cases of large groups of people with widely varying characteristics, backgrounds, and motivations. Additionally, our research indicates that experiential value is a suitable candidate for a consistent measurement instrument for gamification. This study is the first to apply a holistic experiential value approach to a gamified experience that simultaneously accounts for customers’ interactions with a multisensory physical environment, their personal interactions with employees, and their interactions with other customers.  相似文献   

13.
1. Cohesion and Coherence According to Halliday and Hasan (1976: 4), cohesion is relations of meaning that exist within the text and that define it as a text. Cohe- sion occurs where the interpretation of some element in the discourse is dependent on that of another. Grammar and lexis are two means to realize the goal of cohesion. In other words, there are grammatical co- hesion and lexical cohesion. Coherence refers to the relationships, which link the meanings of utterances in a discourse …  相似文献   

14.
15.
Research into the public’s motivations for, and barriers to, the use of referendum campaign sites was carried out in the final weeks before the 2014 vote on Scottish independence. As a qualitative study, drawing on 54 interactive, electronically-assisted interviews, where participants were observed and questioned as they searched for and used information on the websites and social media sites of the campaign groups, the results enable more precise causal inferences to be drawn about voters’ exposure to campaign sites. Results indicate participants value ‘facts’, what they perceive as authoritative voices, the capacity to compare campaign messages directly, infographics and concise, direct information. They are sceptical, particularly about celebrity contributions, preferring expert messages, and uncertain about their personal capacity to evaluate information they will use to make decisions. The authors set out a new model of levels of user engagement with political discourse during campaigns. Results have relevance for governments, as well as researchers in the fields of politics, communications and information management.  相似文献   

16.
When reporting health risks, the news media are often criticized for omitting "mobilizing" information that allows readers to act on existing attitudes. Using American and British newspaper coverage of the autism-vaccine controversy as a case study, this article takes a "behind the scenes" look at normative pressures that may influence whether such information appears in coverage. In particular, can holding health officials accountable for their actions potentially "crowd out" mobilizing information? A content analysis suggests that mobilizing information (at least one of four examples) was present in only 16% of articles, compared to 38% that mentioned accountability messages (at least one of two examples). US newspapers were significantly more likely to mention at least one mobilization example. Finally, although only 11% discussed both, articles were more likely to discuss certain mobilizing and accountability examples together. Implications for journalism ethics and vaccine risk communication are discussed.  相似文献   

17.
In recent years the academic world has witnessed the mushrooming of journals that falsely pretend to be legitimate academic outlets. We study this phenomenon using information from 46,000 researchers seeking promotion in Italian academia. About 5% of them have published in journals included in the blacklist of ‘potential, possible, or probable predatory journals’ elaborated by the scholarly librarian Jeffrey Beall. Data from a survey that we conducted among these researchers confirms that at least one third of these journals do not provide peer review or they engage in some other type of irregular editorial practice. We identify two factors that may have spurred publications in dubious journals. First, some of these journals have managed to be included in citation indexes such as Scopus that many institutions consider as a guarantee of quality. Second, we show that authors who publish in these journals are more likely to receive positive assessments when they are evaluated by (randomly selected) committee members who lack research expertise. Overall, our analysis suggests that the proliferation of ‘predatory’ journals reflects the existence of severe information asymmetries in scientific evaluations.  相似文献   

18.
Nussbaum’s version of the capability approach is not only a helpful approach to development problems but can also be employed as a general ethical-anthropological framework in ‘advanced’ societies. This paper explores its normative force for evaluating information technologies, with a particular focus on the issue of human enhancement. It suggests that the capability approach can be a useful way of to specify a workable and adequate level of analysis in human enhancement discussions, but argues that any interpretation of what these capabilities mean is itself dependent on (interpretations of) the techno-human practices under discussion. This challenges the capability approach’s means-end dualism concerning the relation between on the one hand technology and on the other hand humans and capabilities. It is argued that instead of facing a choice between development and enhancement, we better reflect on how we want to shape human-technological practices, for instance by using the language of capabilities. For this purpose, we have to engage in a cumbersome hermeneutics that interprets dynamic relations between unstable capabilities, technologies, practices, and values. This requires us to modify the capability approach by highlighting and interpreting its interpretative dimension.  相似文献   

19.
20.
The information revolution has fostered the rise of new ways of waging war, generally by means of cyberspace-based attacks on the infrastructures upon which modern societies increasingly depend. This new way of war is primarily disruptive, rather than destructive; and its low barriers to entry make it possible for individuals and groups (not just nation-states) easily to acquire very serious war-making capabilities. The less lethal appearance of information warfare and the possibility of cloaking the attacker's true identity put serious pressure on traditional just war doctrines that call for adherence to the principles of right purpose, duly constituted authority, and last resort. Age-old strictures about noncombatant immunity are also attenuated by the varied means of attack enabled by advanced information technologies. Therefore, the nations and societies leading the information revolution have a primary ethical obligation to constrain the circumstances under which information warfare may be used -- principally by means of a pledge of no first use of such means against noncombatants.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号