首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 23 毫秒
1.
In 2014, a large archive of hacked nude photos of female celebrities was released on 4chan and organized and discussed primarily on Reddit. This paper explores the ethical implications of this celebrity nude photo leak within a frame of gendered privacy violations. I analyze a selection of a mass capture of 5143 posts and 94,602 comments from /thefappening subreddit, as well as editorials written by female celebrities, feminists, and journalists. Redditors justify the photo leak by arguing the subjects are privileged because they are celebrities; that the celebrities are at fault for failing to appropriately protect their information; and that the only person ethically responsible for the leak is the hacker. The popular press primarily took a feminist perspective, linking the photo leak to institutionalized sexism and misogyny. I argue that the Reddit participants frame the privacy violations within a context of geek masculinity, in which references to masturbation and pornography and casually misogynist language are used to signify a normative masculine self. Privacy violations are de-emphasized when the victims are women and gender or feminist concerns are rejected. Entitlement to viewing women’s bodies and male sexual desire are prioritized over ethical concerns over privacy violations. The paper contributes to understanding how privacy violations are normatively gendered and reinforced by gender inequality.  相似文献   

2.
It is widely assumed that gendered wording in job advertisements can be a source of unconscious gender bias that contributes to occupational gender segregation, and gender lexicons have been developed and employed to detect gendered wording in job advertisements. The goal of this study is to create a Chinese job advertisement gender lexicon, the lack of which has impeded related research in China. Based on 53,786 job advertisements collected from a large employment website in China, the lexicon creation process enabled by supervised learning mainly involved identifying candidate gender words and determining their gender scores. The combination of Word2Vec and SVR yielded the highest performance and generated a new Chinese gender lexicon consisting of 1,429 masculine words and 1,064 feminine words with varying gender scores. The lexicon was successfully applied in gendered wording detection, revealing that masculinely and femininely worded job advertisements dominated different occupations in China. The superiority of the proposed lexicon creation method and the resultant lexicon are verified through comparisons.  相似文献   

3.
利用支持SIP和H.323协议的软硬件可以为基于IP协议的无线传输设备增加工程勤务电话功能。虽然支持点对点VoIP的软件大都遵循SIP或H.323协议,但在互通时仍可能有部分功能无法兼容,因此,对常用VoIP软件进行互通测试,以利于跨平台应用。  相似文献   

4.
Stanley Milgram's study of "obedience to authority" is one of the best-known psychological experiments of the twentieth century. This essay examines the study's special charisma through a detailed consideration of the intellectual, cultural, and gender contexts of Cold War America. It suggests that Milgram presented not a "timeless" experiment on "human nature" but, rather, a historically contingent, scientifically sanctioned "performance" of American masculinity at a time of heightened male anxiety. The essay argues that this gendered context invested the obedience experiments with an extraordinary plausibility, immediacy, and relevance. Immersed in a discourse of masculinity besieged, many Americans read the obedience experiments not as a fanciful study of laboratory brutality but as confirmation of their worst fears. Milgram's extraordinary success thus lay not in his "discovery" of the fragility of individual conscience but in his theatrical flair for staging culturally relevant masculine performances.  相似文献   

5.
伍宏龙 《科教文汇》2020,(15):166-167
电视台的核心工作之一就是确保广播电视节目的安全播出。而机房作为广播电视台的“硬件核心”所在,其维护与管理是保障广播电视安全播出的前置条件。基于此认识,本文着力阐述电视台安全播出的含义、机房的维护技术,并结合工作实际,对县级广播电视台安全播出方面存在的问题,提出可行的改进措施,以期提高广播电视台机房的维护管理水平、保证电视节目的安全播出,为广大受众提供更为优质的视听服务。  相似文献   

6.
射频卡数据读写及其在软件设计中的应用   总被引:1,自引:0,他引:1  
本文提出了一种对射频卡读写器提供的接口函数进行抽象和封装的方法,通过抽象与封装向应用系统提供独立于硬件的射频卡读写操作,使得应用系统的开发可以独立于射频卡硬件系统。文章通过对实验室管理系统的设计说明该方法的应用。  相似文献   

7.
This study explores the gendered discourse of social-based computer-mediated contexts. Specifically, the critical ethnography explicates the patterns of discourse of both a sports-related (masculine-dominated) chatroom and a female-based (feminine-dominated) chatroom. Through the participant observations, the researcher discovered that traditionally masculine and feminine forms of discourse dominate the chatrooms. Furthermore, the groups constructed and maintained normative forms of behavior. Masculine participants were aggressive, argumentative, and power oriented. While feminine participants sought relationships and intimacy, they were often dominated and overpowered by the aggressive discourse of the masculine members. The findings have significant implications for the construction of gender in cyberspace, the normative behavior of computer-mediated communication, and power and gender in the use of technology.  相似文献   

8.
无线局有着光荣而悠久的历史,担负着广播电视节目的传输和发射任务,然而无线局各发射台站多年来分散的、人工的、封闭的物资管理模式始终没有得到改善,只能用人工或简单的单机软件进行管理,存在管理工作量大,查找、统计困难,资源的利用率低下等缺点。为了解决陈旧的物资管理模式,由561台自主开发的KTABRS-A6物资管理系统,结合当前先进的管理模式,智能化、网络化管理物资。本文从软、硬件两方面相结合,结合物资管理工作,应用物资管理模式科学、智能管理大型电台物资。  相似文献   

9.
USRP作为软件无线电外设的杰出代表,因其价格较低,通用性好、性能强大等特点,受到了无线电研究者和爱好者的广泛关注。文章介绍了USRP2母板及RFX2400射频子板的硬件结构、主要芯片及配置方法。采用底层开发的方式,在USRP2平台上实现了带宽为12.5MHz,速率为2.5Mbps的ChirpBOK扩频发射机设计,为在USRP平台上进行大带宽信号通信系统设计进行了新的尝试。  相似文献   

10.
吴欣桐  陈劲  梁琳 《科学学研究》2018,36(9):1659-1667
性别化创新是一种新兴的创新范式,能够反哺科学研究、提升研究成果的质量和对两性的责任。性别化创新的分析逻辑,是从逻辑起点和过程演进两方面来解构性与性别分析法的嵌入。性别化创新的逻辑起点是对科学研究进行性别维度的反思,性别化创新的过程演进是将性与性别分析法嵌入科学研究全过程,涵盖了对性别数据、女性经验与经历的收集、汇总、分析、挖掘和转换方法,并与外部的科学研究与创新环境形成互动。性别化创新的分析逻辑强调了性与性别要素在科学研究中的作用,完成女性数量修正、制度修正和知识修正,从而对科学研究本身进行反思与逻辑重构、输出对两性的责任与普惠价值取向,并实现“包容互惠的发展前景”。  相似文献   

11.
为了保障机载无线电设备的正常工作,完成对机载无线电设备进行定期检测和维修,我们提出了机载无线电设备测试系统的一种优化设计,配合软件系统以后,使大部分信号分析比较,以及对输入信号,电源控制等方面充分实现智能化,本文主要介绍了用Protel99来实现此机载无线电设备综合检测系统的硬件设计方案以及基本设计框图。  相似文献   

12.
In just 15 years, Taiwan has emerged as a leading producer of hardware for nearly every major computer vendor in the world, despite little previous experience in high technology industries. By 1995, Taiwan ranked fourth in the world in computer hardware production and exports through its strategy of being a 'fast follower.' Taiwan's success in the computer industry has been due to a coordinated government strategy to support private entrepreneurship by a large number of small, flexible, innovative companies. Taiwan's computer companies have responded rapidly and effectively to continuing changes in the international market and avoided many of the problems encountered by their counterparts in Japan and South Korea in recent years. They have done so by emphasizing close supplier relationships with multinational computer companies all over the world as a means of promoting exports and keeping apprised of market conditions. They continue to show great adaptability as Taiwan's computer industry moves toward diversification both upstream and downstream, full-service OEM (original equipment manufacturing) for multinationals, and industry consolidation for scale economies. The government has closely complemented the efforts of industry by carrying out research and development and transferring technology to the private sector, by conducting market intelligence for private sector use, and by providing engineering and technical manpower. As a result, Taiwan is probably Asia's best positioned country for continued success in the global computer industry.  相似文献   

13.
The genetic algorithm (GA) is a computational procedure that 'evolves' solutions to optimization problems by generating populations of possible solutions, and then by treating these solutions metaphorically as individuals that can 'mate' and 'compete' to 'survive' and 'reproduce'. In this paper, I explore how culturally specific notions of evolution, population, reproduction, sex/gender, and kinship inflect the ways GAs are assembled and understood. Combining the results of fieldwork among GA workers with analysis of GA texts, I contend that the picture of 'nature' embedded in GAs is resonant with the values of secularized Judeo-Christian white middle-class US-American and European heterosexual culture. I also maintain that GA formulations are accented by languages inherited from sociobiology. I argue that examining GAs can help us track how dominant meanings of 'nature' are being stabilized and refigured in an age in which exchanges of metaphor between biology and computer science are increasingly common.  相似文献   

14.
The present study was carried out to explore the altered lipid, lipoprotein and apoprotein abnormalities along with lipoprotein (a) in chronic kidney disease patients with stage I to V which were further divided into group 1 (stage I and II), group 2 (stage III and IV) and group 3 (stage V). 50 chronic kidney disease patients with stage I to V and 20 healthy normal subjects as controls were recruited for this study. Among the various parameters tested triglyceride levels were high in group 1 and 2, whereas VLDL cholesterol, Lp (a) and apo B levels were significantly high in all the groups when compared to controls (P<0.05). However, LDL cholesterol level was significantly low in group 3 only as compared to control group (P<0.05). Apoprotein AI values also showed significant decrease in all groups as compared to controls (P<0.05). Though total cholesterol levels in group 1 and LDL levels in group 1 and 2 were higher than controls, but the values attained not statistically significant (P>0.05). In conclusion high levels of VLDL cholesterol, Lp (a), apo B and low levels of apoprotein AI as reported in this study are the major lipid disorders in the development of cardiovascular complications at all the stages in these patients.  相似文献   

15.
Young fathers, like all parents, have a range of information needs, such as learning how to introduce their babies to solid foods. Yet compared to young mothers and older parents, they have fewer resources available to them. To date, young fathers have not been identified as a priority population in need of parenting-related information and face unequal access to information resources. This inequality is in part related to gender stereotypes and social biases about young men who become parents at “too early” an age. Through interviews and field observation conducted during a longitudinal ethnographic study of young mothers, fathers, their parents, and service providers in two cities in British Columbia, Canada, we examined young fathers’ gendered experiences accessing parenting information and resources. Using an ecological model of information needs, we identified factors at different levels: micro (e.g., personal), meso (e.g., relational) and macro (e.g., access to city/provincial parenting programs and resources) that revealed information inequalities for young fathers. Our findings illustrate that young fathers often have unexpressed and unaddressed information needs due to barriers they encounter when accessing services, the stigma they experience as early age parents, and social pressures that result in avoiding asking for help in order to adhere to traditional masculine values.  相似文献   

16.
I explore philosophically the phenomenon of home wireless networks as used to share broadband Internet connections. Because such networks are frequently unsecured, third parties can use them to access the Internet. Here I consider carefully whether this kind of behaviour should be properly called theft. I begin with a brief non-technical introduction to 802.11 wireless networks. Subsequently, I present a four part argument – appealing to the unsecured nature of the networks discussed, entrenched software and hardware behaviours, trespass law, and the openness of ‹public park’ spectrum – suggesting that this kind of behaviour is permissible and should not be construed as theft. Substantively, I conclude that, despite the quite compelling considerations that these arguments bring to bear, this behaviour is theft. Additionally, I draw attention to significant flaws in the design and implementation of wireless technology (specifically in the out-of-the-box configuration for wireless access points and in the wireless connectivity of early versions of Windows XP) that facilitate the intentional and unintentional theft of Internet bandwidth. I suggest some simple mechanisms that could be incorporated into the technology which would serve to remove the ethical ambiguity in its usage by third parties, including adding the ability for a network owner to explicitly mark her network as not for public use,␣and changes to default hardware and software behaviours. I conclude by encouraging increased use of value-sensitive design practices in the development of future wireless technologies.  相似文献   

17.
Abstract

“At present, the majority of [radio] programs heard are from sources outside of Canada. It has been emphasized to us that the continued reception of these has a tendency to mold the minds of the young people in the home to ideals and opinions that are not Canadian. In a country of the vast geographical dimensions of Canada, braodcasting will undoubtedly become a great force in fostering national spirit and in interpreting national citizenship.”1

This statement, written fifty years ago, could just as well have been written today. But, while the basic issue has remained unchanged over time, the uses to which information and communications can be put have steadily grown. The scope of the issue has also therefore increased.

Included under the heading of communications and information today are such diverse but interconnected matters as broadcasting both by TV and radio, the newspaper, magazine, and book publishing industries, the film industry, advertising, computers and all computer communications, telephone and telecommunications, communications satellites, remote sensing, and, to a point, industrial know‐how and research and development.

In this paper, I shall examine how communications and information affect such issues as Canadian unity, Canadian cultural identity, and Canadian economic viability. I shall concentrate on how Canadian governments have seen this issue, and, to a lesser degree, will show where the views of individuals and other interest groups may differ from government policy.  相似文献   

18.
In this paper, I discuss whether in a society where the use of artificial agents is pervasive, these agents should be recognized as having rights like those we accord to group agents. This kind of recognition I understand to be at once social and legal, and I argue that in order for an artificial agent to be so recognized, it will need to meet the same basic conditions in light of which group agents are granted such recognition. I then explore the implications of granting recognition in this manner. The thesis I will be defending is that artificial agents that do meet the conditions of agency in light of which we ascribe rights to group agents should thereby be recognized as having similar rights. The reason for bringing group agents into the picture is that, like artificial agents, they are not self-evidently agents of the sort to which we would naturally ascribe rights, or at least that is what the historical record suggests if we look, for example, at what it took for corporations to gain legal status in the law as group agents entitled to rights and, consequently, as entities subject to responsibilities. This is an example of agency ascribed to a nonhuman agent, and just as a group agent can be described as nonhuman, so can an artificial agent. Therefore, if these two kinds of nonhuman agents can be shown to be sufficiently similar in relevant ways, the agency ascribed to one can also be ascribed to the other—this despite the fact that neither is human, a major impediment when it comes to recognizing an entity as an agent proper, and hence as a bearer of rights.  相似文献   

19.
超高频读写器的便携式设计是射频识别(RFID)系统广泛应用的关键.为实现超高频RFID读写器的便携式设计,提出一种超高频RFID读写器的设计方案.硬件系统主要包括读写器的射频前端、功率放大器、功率检测、天线阻抗调谐电路等,在设计过程中考虑信道指标并对其进行评估;在对ISO/IEC18000-6的三种协议标准进行比较的基础上选用ISO/IEC 18000-6C协议,设计相应软件系统主要包括基带模块及防冲突碰撞模块.对硬件进行评估计算并结合硬件对软件进行验证及测试,结论如下:该读写器具有功率消耗低、体积小、接口丰富等便携式优点;硬件系统性能稳定;软件功能运行良好.上述设计有效实现了射频识别系统的便携式设计.  相似文献   

20.
《Research Policy》2023,52(6):104758
We investigate the participation of male and female applicants to a competition for research funding, using an original dataset with detailed information on both successful and unsuccessful applicants to 21 calls by a mission-oriented funding agency. We use this information to construct a fictitious pool of 277,464 potential applicants and to model their probability to submit an application. We find that, even after controlling for productivity, quality of research, seniority, years of career discontinuity, number of prior applications, affiliation, and ethnicity, women were still less likely to apply than men. The lower likelihood of females to apply was not explained by the use of masculine language in the text of the calls. Instead, women's research interests were more distant from the topics of the calls than men's. Topic proximity fully mediated female penalization in the likelihood to apply for research funding. These results are an important heads-up, in view of the increasing focus of governments in mission-oriented programs.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号