共查询到20条相似文献,搜索用时 187 毫秒
1.
Jennifer Bussell 《The Information Society》2013,29(1):51-52
There is an increasing rhetoric from politicians for universities to become more involved in policy analysis and policy research. In this article, we reflect on our experiences of the analysis we conducted into the legislation to introduce biometric identity cards in the United Kingdom. We highlight how our work had direct consequences for the ongoing policy deliberation around this controversial piece of legislation. In particular, we highlight our role in the debate surrounding the government's figures for identity fraud and the concerns about the likely cost of the scheme to the government and taxpayer. We end the article by discussing some of the practical realities of such a foray into real politik. 相似文献
2.
Information and Communication Technology Challenges to Scientific Professional Identity 总被引:2,自引:0,他引:2
Increasingly, information and communication technology (ICT) uses are transforming professional activities and interactions in ways that challenge traditional assumptions about professional identity. In this article, we consider the ways in which the professional identities of research scientists in oceanography and marine biology are shaped by the use of ICTs. We draw empirical data from an ongoing study of scientific research collaborations that examines uses of basic communication technologies, as well as scientific technologies with embedded ICT components. Our analysis suggests that development and use of ICT-enabled scientific technologies are identity enhancing for many scientists, facilitating their development of unique areas of scientific knowledge. ICT-related changes in data collection, collaborative coordination, and scientific interaction also challenge traditional definitions of expertise and professional identity. An examination of these challenges directs attention to the project identities that form around ICT-enabled scientific technologies and the ways that those project identities are enacted through ICTs. 相似文献
3.
《Research Policy》2023,52(1):104646
While technology transfer at universities has received considerable attention in the innovation and entrepreneurship literature, we know much less about technology transfer at national/federal labs and (non-university) public research institutes. In this article and the related special section, we aim to fill this void. We provide a rationale for our special section on technology transfer from national/federal labs and public research institutes, summarize the papers in the special section, highlight research questions, theories, data and methods, key findings and conclusions. We conclude by outlining a research agenda for multi-level research on agents, institutions, and regions to improve our understanding of the managerial and public policy implications of technology transfer from these institutions. 相似文献
4.
Nascent academic entrepreneurs need to acquire entrepreneurial competencies to create successful spin-off ventures. In this article, we examine difficulties in this pursuit prior to venture formation and offer a systematic classification of inhibitors. We confirm, combine, and extend two previously identified inhibiting mechanisms into a relational inhibitor category, classify additional structural and cultural-cognitive inhibitors, and highlight how these inhibitors exist both at the individual and the organizational level. We then advance theoretical understanding of the interrelated, multilevel functions of inhibitors on the development of entrepreneurial competencies, and offer policy insights on how universities can mitigate their effects. 相似文献
5.
J. C. Buitelaar 《The Information Society》2014,30(4):266-281
Individuals try to guard their right to privacy by exercising their right to informational self-determination. They thereby hope to retain control over their identity, which they construct over time by interpreting how their past relates to their present. In a similar vein, historians try to make sense of the past by way of interpreting past events. The theory of narrative identity helps to understand these processes. By an explorative discussion of narrative techniques, historiographical methods including the art of (auto)biography, and the role they play in identity construction, this article aims to give fresh insights into the theory of informational self-determination. An analysis is presented of three types of attempts by individuals to gain control of their digital double, in an effort to maintain their personal dignity. With the lessons learned, an indication is given of the viability of the principle of informational self-determination in the Internet era. 相似文献
6.
Academics or entrepreneurs? Investigating role identity modification of university scientists involved in commercialization activity 总被引:3,自引:0,他引:3
Establishing the microfoundations of academic entrepreneurship requires closer scrutiny of a key actor contributing to this phenomenon—the university scientist. We investigate the sense-making that scientists engage in as part of their participation in technology transfer and postulate that this process involves a potential modification in their role identity. We analyzed more than 70 h of interview data at a premier U.S. public research university. We observe that scientists invoke rationales for involvement that are congruent with their academic role identity. They typically adopt a hybrid role identity that comprises a focal academic self and a secondary commercial persona. We delineate two mechanisms – delegating and buffering – that these individuals deploy to facilitate such salience in their hybrid role identity. Overall, these patterns suggest that university scientists take active steps to preserve their academic role identity even as they participate in technology transfer. Our findings clarify the social psychological processes underlying scientist involvement in commercialization activity, and offer fresh insights to the academic entrepreneurship, science policy and role identity literatures. 相似文献
7.
我国农业各政策变量对粮食产量提高的效果及对策研究 总被引:4,自引:0,他引:4
叶堂林 《科学.经济.社会》2005,23(1):20-23
在人类赖以存在的生活资料中,食物是最基本和最重要的,因此提高粮食产量具有重要的经济和社会意义。本文通过粮食产量对各农业政策变量敏感性的分析研究,目的在于从众多农业政策变量中萃取出较为有效的政策或政策组合来提高我国粮食产量,使政府在进行相关决策时把重点放在敏感性大的政策变量上,为我国农业发展政策的制定提供科学依据。 相似文献
8.
我国的主流意识形态是以马克思主义为指导的社会主义意识形态。它对我国社会主义制度提供合法性支撑的同时,还为大众构筑着精神家园。大学生作为我国现代建设的接班人和实现“中国梦”的中坚力量,就有必要对我国主流意识形态进行高度认同。然而,由于我国社会处于急剧转型阶段,各种复杂状况势必会对大学生主流意识形态认同产生阻碍和消极作用。基于此,在分析大学生主流意识形态认同价值的基础上,对于社会转型期大学生主流意识形态认同的主要困境、原因及对策进行分析,以期把大学生主流意识形态认同工程落到实处。 相似文献
9.
Analyzing the functional dynamics of technological innovation systems: A scheme of analysis 总被引:6,自引:0,他引:6
Various researchers and policy analysts have made empirical studies of innovation systems in order to understand their current structure and trace their dynamics. However, policy makers often experience difficulties in extracting practical guidelines from studies of this kind. In this paper, we operationalize our previous work on a functional approach to analyzing innovation system dynamics into a practical scheme of analysis for policy makers. The scheme is based on previous literature and our own experience in developing and applying functional thinking. It can be used by policy makers not only to identify the key policy issues but also to set policy goals. 相似文献
10.
学术创业企业的成长伴随着从科研网络向产业网络的跨越,为了解析其成长机理,本文以中美两国共14个学术创业案例为依据,从“社会网络—合法性”视角分析企业网络的动态演化,并着重探讨了各阶段合法性约束的种类、身份转化劣势的作用机制以及合法性策略选择的情境条件。研究发现:(1)学术创业者在创业者存在身份转换劣势,并给企业带来合法性约束。(2)根据网络边界跨越方式的不同,创业者建立合法性的策略可分为直驱型策略和迂回型策略。(3)合法性策略的选择受到企业所在网络的多样性和自身技术新颖性的影响。基于学术创业的特殊情境,论文提出身份转换劣势的概念,并为企业成长理论和合法性理论做出贡献。 相似文献
11.
当前,学前教育日益受到各国重视,学前教育是我国比较薄弱的环节,我国学前教育的发展也迫在眉睫。因此,学前教育以及对学前教育专业大学生专业认同的关注也成为必须。根据调查研究显示,整体上,学前教育专业大学生专业认同的现状并不令人满意,不论从学前教育专业大学生对学前教育的认识,还是学前教育专业大学生的理念来说,学前教育专业大学生都需要在专业认同等方面有一定提升。本项目从以下几个方面提出了对应的策略建议:鼓励男学生加入学前教育专业的队伍;报考前对学生进行关于本专业的引导,加强其认识;通过报考前宣传、引导,入学后专业训练等途径,提高学生的专业认同水平。 相似文献
12.
This article analyses the real cause of the tragedy of Othello. From the perspective of his social status, the article points out that the implication of his collapse into murderous violence is actually his constant worries about the threats to his social identity as a black hero in a white world. 相似文献
13.
AbstractThere is a paucity of granular, high-resolution broadband data in the United States, which limits the prospects of informed telecommunications policy debates. In the absence of regulation requiring telecommunication providers to accurately report service footprints, pricing, and service quality data, providers refuse to disclose this information, routinely citing competition as the primary reason for keeping network and pricing data obfuscated. In addition, many secondary datasets needed for broadband planning and policy research, such as parcel or address point data, are equally challenging to gather. These datasets are often controlled by county governments, with no overarching access policy, resulting in neighboring counties with widely divergent policies for the release of these important data. In this article we explore the challenges of open data and its impacts on telecommunication policy development. A recent project which explored the spatial provision of Google Fiber in the Kansas City metropolitan area helps to highlight these difficulties. Basic strategies for mitigating information asymmetries and the lack of data transparency for telecommunication policy analysis are discussed. 相似文献
14.
15.
将横向实地调查资料和纵向流动史案例结合考量,开拓认同感研究的新途径。将新生代农民工的认同感分为自我认同、职业认同和社会认同三种类型,发现职业认同是沟通自我认同和社会认同的桥梁。若新生代农民工能尽早建立职业发展规划,顺利生成职业认同,则有助于其个体成长,完成社会成人。而目前新生代农民工普遍缺乏职业认同,使其自我认同与社会认同不能同步发展,阻碍了他们适应并融入城市的进程。 相似文献
16.
Information Technology and Social Transformation: GIS for Forestry Management in India 总被引:2,自引:0,他引:2
In this article, we examine an in-depth case of the introduction of geographical information systems (GIS) in the Indian forestry sector and associated social transformations. Our study is informed by Giddens's recent theoretical developments on globalizing influences at the institutional level and their interconnectedness to new trust systems and self-identity at the individual level. We examine how some elements of our case analysis are illuminated by Giddens's theoretical concepts, and also highlight some potential areas for further theoretical development. In particular, our case suggests that there are ongoing processes of stability as well as reflexivity, and we also develop the concept of trust systems to support interactions with new groups of people. Finally, our analysis notes some limitations of Giddens's ideas, especially the somewhat homogeneous form of his theory in suggesting the nature of social transformations in current times. Instead, the case emphasizes the need to examine more closely cultural and other sociocultural characteristics in particular contexts, and how they play out with global influences. 相似文献
17.
我国产学研合作创新法制建设的评估与展望 总被引:1,自引:0,他引:1
从我国产学研合作创新的法制需求和现行法制供给出发,对相关政策和立法进行系统归类,评估其实施效果,指出技术转移立法的缺位、知识产权利益分享的立法引导、专利法与反垄断的回应是亟待突破的瓶颈问题.今后法制建设的重点是立足国家创新体系构建,积极制定<技术转移法>和<产学研合作促进法>,并实现二者的分工协同. 相似文献
18.
The purpose of this article and the special issue is to improve our understanding of the theoretical, managerial, and policy implications of entrepreneurial innovation. We accomplish this objective by examining the role of context in stimulating such activity, as well as its impact on the outcomes of entrepreneurial innovation. Our analysis begins by outlining an overarching framework for entrepreneurial innovation and context. With reference to this framework we then compare the attributes of national innovation systems, entrepreneurship and entrepreneurial innovation, and categorize contextual influences on entrepreneurial innovation. We then situate the papers presented in this special issue within this framework. We conclude by outlining an agenda for additional research on this topic, focusing on the relationships between contexts and entrepreneurial innovation and then discuss policy implications, focusing on how public and private actors can meet these challenges. 相似文献
19.
Gabe Ignatow 《The Information Society》2013,29(3):158-171
Researchers have found a number of economic, technological, and political factors to be associated with the diffusion of information technology in developing countries. But cultural factors generally, and national identity in particular, have almost never been viewed as consequential. Castells and Himanen's 2002 study of the information society in Finland, in which the authors identify Finnish national culture as an impetus to the development of the country's informational welfare state, is the most prominent exception to this pattern. This article provides a critical overview of Castells and Himanen's research and revises their conceptual framework to focus on the specific choices states make in constructing their national identities and the effects of these choices on information policy and information technology diffusion. It demonstrates the value of this revised framework through a comparison of the historical trajectories of Turkey and Malaysia's nation-building projects, the incentives these projects have created for the two countries’ social and political elites, and the public information policies and programs that have resulted. 相似文献