首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 422 毫秒
1.
随着互联网的普及,越来越多的人利用网络不再局限于网上聊天、查看邮件、看电影,而是利用网络进行电子商务活动,和客观世界中的商务活动一样,电子商务同样可能面临泄密和欺诈行为。特别是在开放的互联网上进行交易,如何安全地进行网上交易,确保商务活动中的信息安全已成为构建电子商务网站时的重中之重。本文论述了采用基于表现层、业务层、数据层的三层分离松耦合技术的SSH(Struts+Hibernate+Spring)技术构建电子商务网站时应采取的安全措施。  相似文献   

2.
信息产业的发展使网络技术的应用越来越广,已渗透到我们生活的方方面面,培养具有综合专业技能的实用型计算机网络技术人才已成为信息社会的迫切需要。本文以江西经济管理职业学院计算机网络技术专业为例从课程建设、师资建设和实训室建设等方面谈谈高职院校中网络专业的建设。  相似文献   

3.
《普罗米修斯》2012,30(3):229-236

This paper examines how Estonians dealt with the news concerning the September 11 attacks in the new electronic communication space of the Internet. This work will summarize people's discussions on the Internet relating to the September 11 attacks by outlining the different narratives that carried people's attitudes and knowledge. The paper aims to show that the Internet was used, not only as a medium for obtaining more information about the attacks, but also as a medium for discussion and crisis support. This research is based on: (1) a survey amongst Tartu University students and follow-up semi-structured interviews; (2) an analysis of the comment pages on Estonian electronic newspapers; and (3) an analysis of three chat logs from Estonian talkers.  相似文献   

4.
Significant U.S. policy initiatives in the late 1990s were intended to control Internet access, privacy, and indecency--specifically among children. This study reflects on these using quantitative data from a computer center in a children's library in the inner city. Researchers gathered 16 weeks of page requests ( n = 203,647) using "click stream" and behavioral data, and analyzed these using nonparametric tests. Findings show that users are highly influenced by each other and browse only a small universe of sites. Game playing and communicating with individuals (via e-mail and chat) were the most popular uses. Children were uninterested in pornography and sites directed toward children. Advertising was extremely common. Children were most likely to engage in sharing when using games and chat. For this population, access, privacy and indecency initiatives to control Internet use fails to achieve its stated goals, but activities that encourage sharing in public places hold some promise for building computer knowledge.  相似文献   

5.
Significant U.S. policy initiatives in the late 1990s were intended to control Internet access, privacy, and indecency--specifically among children. This study reflects on these using quantitative data from a computer center in a children's library in the inner city. Researchers gathered 16 weeks of page requests ( n = 203,647) using "click stream" and behavioral data, and analyzed these using nonparametric tests. Findings show that users are highly influenced by each other and browse only a small universe of sites. Game playing and communicating with individuals (via e-mail and chat) were the most popular uses. Children were uninterested in pornography and sites directed toward children. Advertising was extremely common. Children were most likely to engage in sharing when using games and chat. For this population, access, privacy and indecency initiatives to control Internet use fails to achieve its stated goals, but activities that encourage sharing in public places hold some promise for building computer knowledge.  相似文献   

6.
基于Internet/Intranet的预测支持系统的设计   总被引:1,自引:0,他引:1  
蔡启明 《情报科学》2004,22(7):857-861
预测在决策中起着十分重要的作用,但作出准确的预测是非常困难的。随着Internet的普及,研究利用Internet技术来开发先进的预测支持系统具有十分重要的实际意义,本文对基于Internet/Intranet的顶测支持系统进行详细的论述。该系统由多个Agent子系统及其运行的网络环境组成,系统中包括系统管理、信息、集成、集成评估、专家预测、专家预测集成、执行、预测、预测评估、交互10种Agent子系统构成.各个Agent有自己的功能,可以独立自主地运行,还可以协同工作完成系统整体目标。  相似文献   

7.
Cultured Technology: The Internet and Religious Fundamentalism   总被引:1,自引:0,他引:1  
In this article we identify four principal dimensions of religious fundamentalism as they interact with the Internet: hierarchy, patriarchy, discipline, and seclusion. We also develop the concept of cultured technology, and analyze the ways communities reshape a technology and make it a part of their culture, while at the same time changing their customary ways of life and unwritten laws to adapt to it. Later, we give examples for our theoretical framework through an empirical examination of ultra-Orthodox Jewish communities in Israel. Our empirical study is based on a data set of 686,192 users and 60,346 virtual communities. The results show the complexity of interactions between religious fundamentalism and the Internet, and invite further discussions of cultured technology as a means to understand how the Internet has been culturally constructed, modified, and adapted to the needs of fundamentalist communities and how they in turn have been affected by it.  相似文献   

8.
整合性软件开发作为目前最热门的一种模式,体现了整合性软件在应用中具有较强的目的性和针对性。面向大学生这一特殊群体,采取整合性软件开发模式,从学生作业记录、QQ聊天记录随身带、论坛账号登陆、日记流水帐以及上网流量记录等日常功能的整合,方便大学生群体更好地管理大学生活,进一步推动了整合性软件的发展。  相似文献   

9.
The focus of this paper is to investigate the possibility of predicting several user and message attributes in text-based, real-time, online messaging services. For this purpose, a large collection of chat messages is examined. The applicability of various supervised classification techniques for extracting information from the chat messages is evaluated. Two competing models are used for defining the chat mining problem. A term-based approach is used to investigate the user and message attributes in the context of vocabulary use while a style-based approach is used to examine the chat messages according to the variations in the authors’ writing styles. Among 100 authors, the identity of an author is correctly predicted with 99.7% accuracy. Moreover, the reverse problem is exploited, and the effect of author attributes on computer-mediated communications is discussed.  相似文献   

10.
蒋小飞 《大众科技》2012,(7):253-255
采用Yong的网络成瘾量表和郑日昌编制的人际关系综合诊断量表对安庆师范学院的200名学生进行问卷调查,结果表明:男大学生在网络成瘾上显著高于女大学生;大学生网络成瘾在年级上差异显著,大三、大四在网络成瘾度上显著高于大一;并且随着年级增高,网络成瘾有上升趋势;交谈行为、待人接物对大学生网络成瘾具有很好的预测作用.结论:大学生人际关系对网络成瘾具有良好的预测作用.  相似文献   

11.
朱峰  王刚  徐琳 《资源科学》2016,38(9):1672-1680
互联网结伴旅游是当前自助旅游的一种常见方式,结伴旅游时往往由活动召集者在网上发出旅游活动倡议,为参加者安排旅游行程,发挥着类似旅行社旅游代理的作用,本文旨在揭示召集者发挥代理作用的条件和过程。借助于案例研究,通过深入访谈,研究发现召集者和参与者在出游前信息搜寻的渠道、内容和努力程度以及参加活动的动机均不同,这些差异导致了召集者相对参与者拥有信息优势,信息优势是代理作用发挥的条件,互联网口碑使其代理角色固化。这种代理不同于传统旅行社基于商业合同的代理,是基于信息优势、旅游经验并借助于互联网口碑形成的,因此本文将其命名为“不完全代理”,借助于不完全代理这一概念本文进一步分析了互联网结伴旅游的特征,并将之与科恩的旅游者类型进行比较,尝试对科恩的旅游者类型划分方法进行修正。  相似文献   

12.
因特网上的信息安全问题   总被引:18,自引:0,他引:18  
郭晓苗 《情报理论与实践》2000,23(2):136-138,135
  相似文献   

13.
曾杨婷 《大众科技》2014,(6):295-296,307
隐喻的出现,主要针对的是对语言内部结构组成进行学习探索。现如今,隐喻研究范畴已经不再局限于语言自身,人们开始站在认知的角度来探讨隐喻的本质。1980年外国语言学家提出一全新的观念,认为隐喻不单单是一种语言现象,也是一种思维模式。从语用学角度来解读隐喻将能更好地促进交流,更好地理解语言的语用作用。文章将从隐喻的本质和特点出发,分析隐喻所具有的会话含义的一般特征,对隐喻的语用作用进行探讨。  相似文献   

14.
班级网站系统是一个典型的集团体交友、信息管理、论坛、留言板、实时聊天、网上新闻信息、资源共享等为一体的系统,用于班级成员或团体间的信息交流。下文主要针对该网站系统功能进行分析设计。  相似文献   

15.
高玉霞 《科技风》2014,(7):186-186
幽默效果的产生,不仅在于语言的组织运用,更重要的是依靠相应语境、会话含义与合作原则的应用。本文从会话含义与合作原则方面分析幽默如何产生。在实践中,人们理解和赞赏幽默经过,就是推理会话涵义的过程。  相似文献   

16.
如今,网络已经成为大多数企业日常办公的必备工具,工作中经常要求在办公室、会议室及会客室等办公场所可以非常方便地接入互联网,无线网络独具优势。AP作为WLAN的核心作用越来越大。对企业组建WLAN 中无线AP的应用进行了研究和探讨。  相似文献   

17.
Persuasion and argumentation are possibly among the most complex examples of the interplay between multiple human subjects. With the advent of the Internet, online forums provide wide platforms for people to share their opinions and reasonings around various diverse topics. In this work, we attempt to model persuasive interaction between users on Reddit, a popular online discussion forum. We propose a deep LSTM model to classify whether a conversation leads to a successful persuasion or not, and use this model to predict whether a certain chain of arguments can lead to persuasion. While learning persuasion dynamics, our model tends to identify argument facets implicitly, using an attention mechanism. We also propose a semi-supervised approach to extract argumentative components from discussion threads. Both these models provide useful insight into how people engage in argumentation on online discussion forums.  相似文献   

18.
熊曙光  王涛 《科教文汇》2012,(31):45-46
教育部2010年批准全国30个高校设置物联网工程专业,目前该专业的各方面建设尚需完善.要培养物联网专业应用型人才,培养模式必须要以实践能力、创新能力为核心,并建立健全科学的课程体系,特别是要强调实践能力和科研能力的培养.  相似文献   

19.
为了正确评估网络实名制对公民权利义务和社会秩序实现的重要影响,本文在研究总结国内外网络实名制经验和教训基础上,认为网络实名制是确立虚拟社会秩序的必要手段,具有平衡权利和秩序两种不同价值的作用。认为我国网络实名制应该以国情为基础,借鉴国外经验,在切实解决实践中面临的重大问题后全面展开。网络实名制应兼顾个人、社会和国家利益,以人权保障为基础,保证公民的基本权利得到实现,这样,网络实名制才会真正达到目的。  相似文献   

20.
物联网业务形态研究   总被引:6,自引:0,他引:6  
物联网是在互联网的基础上延伸出的物与物相连的网络。随着物联网概念的提出,新技术的应用和新产品和服务的普及,一个崭新的物联网时代即将兴起。然而,在即将到来的物联网时代,业务形态具有至关重要的作用,决定着物联网推广的成败。本文不但借鉴了国内外关于物联网业务形态的经验,而且对我国物联网业务形态进行了准确定位,进而推导出了由政府主导、以系统集成商和电信运营商为核心的新型业务形态。  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号