首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   27篇
  免费   0篇
  国内免费   1篇
教育   9篇
科学研究   13篇
信息传播   6篇
  2019年   1篇
  2016年   1篇
  2015年   1篇
  2014年   2篇
  2013年   5篇
  2012年   2篇
  2011年   1篇
  2008年   1篇
  2006年   1篇
  2004年   1篇
  2003年   1篇
  2002年   3篇
  1999年   3篇
  1997年   1篇
  1996年   3篇
  1992年   1篇
排序方式: 共有28条查询结果,搜索用时 15 毫秒
1.
The end of “information”: Computers,democracy, and the university   总被引:1,自引:0,他引:1  
This paper describes some of the challenges which the growing pervasiveness of computers and electronic communications technology present to liberal democracies. We argue that these technologies, by their influence on the mechanisms of publicity and privacy, make possible the abuse of an under-developed popular epistemology. The confused response of the courts to cases of information crime suggests that the university is a better forum in which to meet and master these challenges.Freedom is not a simple experience. And as technology becomes more sophisticated, living in freedom—which means living with constant, changing choice—will only become more complex.  相似文献   
2.
This article is an examination of the language, structure and imagery of the World Wide Web. It argues that the Web is not just a rich source of information but offers new ways of seeing and engaging with the world. As well as a consideration of the nature of electronically mediated texts, it looks at the World Wide Web as a kind of meta-text itself which has mythopoeic resonances.  相似文献   
3.
Like most things that we take for granted, we rarely pay attention to ethical issues in research until something goes horribly wrong. Focusing on a recent cyberresearch project gone awry, this essay illustrates why ethical issues should be continually confronted and discussed by scholars and nonscholars alike.  相似文献   
4.
网络旅游信息访问量和现实旅游市场客流,不论在时间上还是在空间上都存在紧密关联。运用百度指数“用户关注度”功能,通过关键词搜索,获取福建省永定土楼2011年8月1日至2O12年7月31日期间的网络空间关注度数据,并对其展开统计分析,研究永定土楼网络空间关注度的时空演变特征。  相似文献   
5.
This paper investigates the problem of secure control for networked control systems (NCSs) under randomly occurring zero-value attacks (ROZVAs). Specifically, ROZVAs only offset the true signal without injecting obfuscated information or noises, and possess the minimum energy of the added malicious information. To protect system stability against ROZVA, randomly occurring integrity check protection (ROICP) is introduced which prevents malicious data injection with less energy cost than persistently occurring protection. Besides the random phenomena of ROZVA and ROICP, which are characterized by two mutually independent random variables obeying the Bernoulli distribution, the randomly occurring time delays caused by ROICP are also considered in system modelling. According to the built stochastic linear system model, security analysis of the NCS with ROICP subject to ROZVA is carried out and sufficient condition for stochastic stability is derived via a linear matrix inequality (LMI) approach. Based on the proposed condition, a compensation feedback controller is designed to facilitate system stability. Finally, simulation results show the effectiveness of the proposed method.  相似文献   
6.
This article critically engages the theme of the game as a model for identity, community, and the meaning and function of objects in a recent work by Pierre Levy. Two of Levy's books have recently appeared in English translation, making this a timely moment to return to this theme that resonates throughout cultural modernity, especially in the areas of business, the military, sports, and, of course today, in digital software and network design.  相似文献   
7.
Users of the Internet are stripped of voice inflections, body language, and other common cues of conversation-only their words are left. Some claim that the lack of these social cues and the lack of hierarchy in the structure of the Internet provide the potential for equality in cyberspace. Many others have shown, though, that the issues of power in cyberspace are similar to the issues of power in physical space. This article examines an intersection of feminism and cyberspace in the ethos of online discussion. It is a rhetorical analysis of two popular feminist newsgroups, alt.feminism and soc.feminism. Do these newsgroups create a feminist and inclusive space online? What are the rhetorical strategies that make an online space more or less inclusive of women? Usenet newsgroups reveal the rhetorical power of these bare words. Although no formal means of discrimination is built into Usenet newsgroup discussions, discrimination does occur through the subtle and not so subtle use of language. This article looks at how various characteristics of language are used on the two newsgroups. Though the ethos on such discussion forums is dynamic, the analysis reveals examples of how sarcastic questioning, strong assertions, accusatory disagreements, and sexistcomments can create a hostile and noninclusive ethos.  相似文献   
8.
外语教学中非常注重学生跨文化交流能力的培养,计算机用于教学中以后,广大教师和学生经常地使用到电子邮件、键友、电子论坛、电子聊天、网络视频会议等等资源。因此,网络跨文化交流能力变得尤为重要。作为一名外语教师,特别是担负基础外语教学任务的外语教师,了解一定的网络交流礼仪是十分必要的。  相似文献   
9.
Doing the Right Thing: Ethical Cyberspace Research   总被引:1,自引:0,他引:1  
With increased use of the Internet and other computer-based communications resources, researchers have begun examining interactions in, and uses of, 'cyberspace.' In considering ways to conduct ethical cyberspace research, some have looked to guidelines in their own disciplines. A potentially useful ethics statement for social science researchers to consider is that of the Association of Computing Machinery. Keeping in mind some of the ACM guidelines, as well as the similarities and differences between cyberspace and other communications media, may help researchers to be aware of their ethical responsibilities in conducting their research. The ACM guidelines, especially in consideration with other communications media, help remind researchers of the technological environment within which the social interactions being studied take place.  相似文献   
10.
在《论信息安全、网络安全、网络空间安全》一文的基础上,本文重点运用中英文语料库的词频分析、可视图谱、语义关联、词汇解析等方法,从学科、技术和政策以及中英文语义的比较等维度进一步研究“信息安全”“网络安全”“网络空间安全”概念的丰富内涵及其相互关系,深入分析这些概念中外语义的异同和变化,以期为信息安全的基础理论研究添砖加瓦。图13。表8。参考文献33。  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号