首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 15 毫秒
1.
This essay focuses on the language of domestic radicalization as it has been invoked in recent debates regarding homeland security and the specter of homegrown Islamic terrorism. The language of radicalization is not new. However, beginning in 2004 and 2005 this language began to be appropriated into legislative and law enforcement discussions of domestic terrorism and national security. Using the rhetorical figure of polyptoton as a critical frame, this essay explores how the language of radicalization has evolved and how it has come to shape available arguments and define the legitimacy of participants (and non-participants) within recent congressional hearings and legislation.  相似文献   

2.
Homeland security is a recent symbol in the American political lexicon. As an outgrowth of the idea of national security, it evokes certain meanings for politicians, administrators, and the public. However, these meanings do not provide much guidance about how domestic safety can be assured, nor how American political and administrative institutions should be organized to meet threats to citizens. Using a general model of governmental information use, this study traces the political and administrative construction of meaning for ‘homeland security.’ First, through a qualitative analysis of contemporary documents, it traces the development and institutionalization of the term in the Federal Executive and Congress. Secondly, employing software-based content analysis, it analyzes how four groups described administrative needs for homeland security. It identifies areas where tensions regarding implementation of administrative measures for homeland security are likely to occur.  相似文献   

3.
4.
In the era of Web 2.0, managing risk communication on social networking sites has increasingly become crucial and complicated issues in the field of homeland security. The response to the 2013 nuclear test in North Korea was largely based on a coordinated effort by Korea's Ministry of Defense, the United Nations, and many countries from around the globe. By analyzing risk communication networks emerged from Twitter users for the period from January 30 to February 24, 2013, this study investigates the way in which citizens' risk communication is formulated through social media and how they transmit risk information in homeland security. Analysis results show the dynamic evolution of risk communication networks based on influential actors with critical information who played pivotal roles in distributing this information to other actors.  相似文献   

5.
Data mining is emerging as one of the key features of many homeland security initiatives. Often used as a means for detecting fraud, assessing risk, and product retailing, data mining involves the use of data analysis tools to discover previously unknown, valid patterns and relationships in large data sets. In the context of homeland security, data mining is often viewed as a potential means to identify terrorist activities, such as money transfers and communications, and to identify and track individual terrorists themselves, such as through travel and immigration records. However, compared to earlier uses of data mining by government, some of the homeland security data mining applications represent a significant expansion in the quantity and scope of data to be analyzed. Three of the higher profile initiatives include the now defunct Terrorism Information Awareness (TIA) project, the recently canceled Computer-Assisted Passenger Prescreening System II (CAPPS II), and the Multistate Anti-Terrorism Information Exchange (MATRIX) pilot project. This article examines the evolving nature of data mining for homeland security purposes, the limitations of data mining, and some of the issues raised by its expanding use, including data quality, interoperability, mission creep, and privacy.  相似文献   

6.
The provision of public Internet access and related networked services by public libraries is affected by a number of information policy issues. This article analyzes the policy dimensions of Internet connectivity in public libraries in light of the data and findings from a national survey of public libraries conducted by the authors of this article. After providing a summary of the study methodology and findings, this article examines key policy issues that include the nature of sufficient bandwidth and broadband, the perpetuation of the digital divide of Internet access in libraries, the role of libraries as e-government access points, the complexities of funding Internet access, the impacts and contradictions of filtering, and the chilling effect of homeland security legislation in public libraries. This article concludes with a discussion of how examining these policy issues can lead to a better understanding of public libraries and the Internet access they offer within the context of public policy.  相似文献   

7.
Why should we care about our information? As we enter the era of homeland security, one can see a new premium being placed on the role of information to fight terrorism while the policies related to government information practices are in a state of flux. Exactly how these policies are evolving is not always clear. Yet, the decisions being made now will likely have a lasting impact for years to come. In an attempt to better understand dynamics underlying these changes, a number of questions regarding the use, control, and protection of personal and public information are posed in this introduction to the symposium issue. We also review some of the major themes examined in greater detail by the contributors to the symposium. These issues include the role of e-government in homeland security, the emphasis on information sharing, the emergence of new information classification categories, the growth of data mining, and the eroding sense of privacy. While a number of reasons can be offered to justify one policy alternative over another, we conclude that the importance of these issues suggests that they are best debated and implemented during a time not under duress when decisions made in the heat of the moment can lead to unintended consequences.  相似文献   

8.
Federally-funded research and development (R&D) represents a significant annual investment (approximately $79 billion in fiscal year 1996) on the part of U.S. taxpayers. Based on the results of a 10-year study of knowledge diffusion in the U.S. aerospace industry, the authors take the position that U.S. competitiveness will be enhanced if knowledge management strategies, employed within a capability-enhancing U.S. technology policy framework, are applied to diffusing the results of federally-funded R&D. In making their case, the authors stress the importance of knowledge as the source of competitive advantage in today's global economy. Next, they offer a practice-based definition of knowledge management and discuss three current approaches to knowledge management implementation—mechanistic, “the learning organization,” and systemic. The authors then examine three weaknesses in existing U.S. public policy and policy implementation—the dominance of knowledge creation, the need for diffusion-oriented technology policy, and the prevalence of a dissemination model—that affect diffusion of the results of federally-funded R&D. To address these shortcomings, they propose the development of a knowledge management framework for diffusing the results of federally-funded R&D. The article closes with a discussion of some issues and challenges associated with implementing a knowledge management framework for diffusing the results of federally-funded R&D.  相似文献   

9.
Who reads literature? Using national survey data, Nicholas Zill and Marianne Winglee analyze the audience for quality fiction, poetry, and drama—its size, potential for growth, demographic composition, and reading preferences. They discuss the factors that affect literary participation and investigate the mechanisms of these effects. They then examine the policy implications of their findings and suggest several ways that publishers, book-sellers, and librarians can use the survey results to increase the reading of quality fiction, poetry, and drama.  相似文献   

10.
Summary

Front-line library staff members often encounter “problem patrons” —those patrons who put others in fear for their own physical security, whether or not that fear is ultimately justified. This article identifies the risks and suggests some precautions, including: defusing anger at the service points through improved interpersonal communication techniques and staff training, drafting policies and procedures to help guide staff as they deal with incidents, and improving the security of library buildings. Legal issues surrounding library security also are examined.  相似文献   

11.
12.
We augment naive Bayes models with statistical n-gram language models to address short-comings of the standard naive Bayes text classifier. The result is a generalized naive Bayes classifier which allows for a local Markov dependence among observations; a model we refer to as the C hain A ugmented N aive Bayes (CAN) Bayes classifier. CAN models have two advantages over standard naive Bayes classifiers. First, they relax some of the independence assumptions of naive Bayes—allowing a local Markov chain dependence in the observed variables—while still permitting efficient inference and learning. Second, they permit straightforward application of sophisticated smoothing techniques from statistical language modeling, which allows one to obtain better parameter estimates than the standard Laplace smoothing used in naive Bayes classification. In this paper, we introduce CAN models and apply them to various text classification problems. To demonstrate the language independent and task independent nature of these classifiers, we present experimental results on several text classification problems—authorship attribution, text genre classification, and topic detection—in several languages—Greek, English, Japanese and Chinese. We then systematically study the key factors in the CAN model that can influence the classification performance, and analyze the strengths and weaknesses of the model.  相似文献   

13.
《图书馆管理杂志》2013,53(4):29-36
Abstract

Academic libraries with public access computers are faced with the challenge of balancing patron privacy rights with accountability and system security. What should libraries do when a patron uses a public Internet connection to send harassing email messages or hack into a remote network, or into the library's own system? This article examines the conflicting values of privacy and security. It examines patron authentication as a security measure and the safeguards that should accompany such a system. Several options are offered for addressing this dilemma. A summary of university appropriate use policies is presented with recommendations and a sample policy statement.  相似文献   

14.
This article studies the internet's impact on expert–citizen interactions in the process of public policymaking. It examines a possible solution to a classical democratic dilemma of citizens' right to participate versus citizens' ability to participate. Through a meta-analysis of the past studies on internet's impact on citizen participation in public policy making, the authors find that the internet has successfully reduced resource difference between policy experts and the citizens as promised. However, the technology itself does not provide all the answers. Exogenous factors such as personal characteristics, decision environment, and institutional factors all play a role in enhancing the impact of the internet. Continued education and institutional innovations are necessary to encourage citizen–expert collaboration and reduce resource difference between the citizens and policy experts. Also, more clearly defined and systematic theoretical and empirical studies are needed to help facilitate our understanding of efficient citizen–expert interactions in public policy making by way of the internet technology. 1  相似文献   

15.

Kenneth Harwood is professor and dean of the School of Communications and Theater at Temple University in Philadelphia. In the following paper, he provides a definition for programming variety—a key issue in the current public policy debate over various aspects of broadcasting including the role of advertisers, and media ownership patterns.  相似文献   

16.
We have developed a (freeware) routine for “Referenced Publication Years Spectroscopy” (RPYS) and apply this method to the historiography of “iMetrics,” that is, the junction of the journals Scientometrics, Informetrics, and the relevant subset of JASIST (approx. 20%) that shapes the intellectual space for the development of information metrics (bibliometrics, scientometrics, informetrics, and webometrics). The application to information metrics (our own field of research) provides us with the opportunity to validate this methodology, and to add a reflection about using citations for the historical reconstruction. The results show that the field is rooted in individual contributions of the 1920s to 1950s (e.g., Alfred J. Lotka), and was then shaped intellectually in the early 1960s by a confluence of the history of science (Derek de Solla Price), documentation (e.g., Michael M. Kessler's “bibliographic coupling”), and “citation indexing” (Eugene Garfield). Institutional development at the interfaces between science studies and information science has been reinforced by the new journal Informetrics since 2007. In a concluding reflection, we return to the question of how the historiography of science using algorithmic means—in terms of citation practices—can be different from an intellectual history of the field based, for example, on reading source materials.  相似文献   

17.
Between 1977 and 1981, Federal Communications Commission (FCC) Chairman Charles Ferris directed the FCC as it made history by modifying U.S. radio and telecommunications law. It was a revolutionary time, but for the most part neither Ferris, nor the man who appointed him, President Jimmy Carter, has received much credit for their role in remaking regulatory policy. Perhaps even more importantly, Ferris changed the philosophy of how the FCC went about rulemaking, which continues to guide the Commission to this day. This study—utilizing, in part, Ferris' own words—seeks to correct the record regarding the impact he had.  相似文献   

18.
In response to the increased construction of digital scholarship infrastructure in academic libraries this article articulates a new staffing model for the management of digital platforms in the academic library environment. Based on two cases, this article discusses the increased use of digital infrastructure in pedagogy by Library Special Collections at UCLA, and the workflow pressures these infrastructures created that challenge traditional staff roles. Digital infrastructures are then framed as types of boundary object, catering to multiple communities of practice. In order to tend to these boundary infrastructures, a new staffing model has been introduced—that of the boundary staff—whose primary purpose would be to support these hybrid infrastructures and more effectively integrate them into the general library environment. This approach to digital project collaboration can set the stage for more flexible and innovative digital instruction, building on the current skillsets of library staff to facilitate new modes of faculty and librarian partnerships.  相似文献   

19.
20.
Purpose: Building on its 1995 research policy statement, the Medical Library Association (MLA) has issued a new research policy, The Research Imperative. This paper shares the background research that informed the new policy.Methods: Semi-structured interviews were conducted with fifty-one key informants representing various library types, functions, geographic locations, ages, and ethnicities. The grounded theory approach was used to analyze the resulting textual database. Additionally, to gather input from the membership as a whole, two open forums were held at MLA annual meetings.Results: Key informant data indicated that the policy should provide roles for MLA in leadership, advocacy, collaboration, services, education, publishing, and development of a research agenda. Evidence-based library and information practice was emphasized. Six themes emerged to center the new policy: creation of a research culture, challenges, domains of research, research skills set, roles of stakeholders, and measurement of progress.Conclusion: Reflecting the interests and beliefs of the membership, The Research Imperative challenges MLA members to build a supportive culture that values and contributes to a research base that is recognized as an essential tool for future practice.

Highlights

  • The Research Imperative reaffirms the Medical Library Association''s (MLA''s) commitment to research and emphasizes the need to develop health sciences librarianship''s own knowledgebase as a solid foundation for best practices.
  • Informants described a growing recognition that health sciences librarians should base their practice decisions on evidence just as the health care practitioners and researchers they serve should.
  • A research process that gathered data systematically from the membership guided the policy''s development.
  • Members expect the association to monitor progress toward its research goals and report on it annually.

Implications

  • The Research Imperative challenges the association and its members to build a culture of reflective practice in which the profession''s evidence base is routinely used.
  • To advance the vision articulated in its research policy, MLA must lead by inculcating research throughout the association, identifying a research agenda, advocating for improved access to and support of library and information science research, fostering collaborations, and educating members to better use and conduct their own applied research.
  • MLA should leverage its Center of Research and Education (CORE) as a repository for member-generated research, tools, and datasets.
  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号