首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 234 毫秒
1.
伴随网络技术的发展,互联网已全面渗透到青少年的日常生活中,革新青少年的生活方式,网络消费、网络交往、网络闲暇娱乐、网络政治参与成为青少年生活方式的新时尚和新主流。新型的生活方式给青少年带来全新的生活体验;同时给青少年行为带来异化等问题。社会需要加强虚拟网络社会管理,引导青少年正确利用网络平台,选择健康、合理的生活方式。  相似文献   

2.
No abstract available for this article.  相似文献   

3.
Internet communities have received mostly negative appraisals among psychologists. Being on line is viewed as damaging to one's social relationships. In 1996, a group of therapists studying relational theory formed an online community. Our group has been a positive influence, expanding the idea that it is possible to have a vibrant and socially enhancing community online. Entre psicologos, han sido principalmente negativas las evaluaciones de las comunidades internet. Estar 'online' se considera perjudicial para las relaciones sociales. En el ano 1996, un grupo de terapeutas que estudiaban teoria relacional formaron una comunidad online. Nuestro grupo ha sido una influencia positiva, extendiendo asi la idea que puede existir una comunidad online efervescente y de realce social.  相似文献   

4.
Abstract

Among gay men, serious health risks (unsafe sex, compulsivity) are associated with seeking sex on the Internet. To better understand the repercussions of this activity from a user's perspective, qualitative interviews with 22 gay men reporting Internet use for sexual purposes were submitted to Interpretative Phenomenological Analysis. The repercussions perceived clustered around themes of sociability (making contact and meeting consequences), sexuality (discovering and deviating), identity (becoming and concealing), and dependency. Findings may help improve the relevance and appeal of online interventions with gay men and sensitize professionals to health issues not traditionally reported in the scientific and clinical literature on gay men and Internet use.  相似文献   

5.
This paper analyzes the factors contributing to the relative success of the recent mobilizations against war despite the peace movement organizations' weakness and unfavorable political opportunity structures. I argue that these anti-war protests were shaped by two factors: first, by trigger events which created new grievances and, second, by the use of new information technologies such as the Internet. These factors contributed to what I call miscible mobilizations, or simultaneous mobilization efforts by movements with compatible ideologies and shared activist communities and SMOs. Results from an extensive study of the anti-war protests from September 2001 in the USA support this notion and call attention to the need to develop a synthesis between traditional resource mobilization, political process, and new social movement theories of mobilization and to focus research on the fluid processes of miscible mobilizations.  相似文献   

6.
The authors argue that individuals, rather than family solidarities, have become the primary unit of household connectivity. Many households do not operate as traditional densely knit groups but as more sparsely knit social networks where individuals juggle their somewhat separate agendas and schedules. At a time when many people enact multiple, individual roles at home, in the community and at work, the authors ask: how do adult household members communicate with each other? How do adult household members use information and communication technologies (ICTs) to organize, communicate and coordinate their leisure and social behavior both inside and outside the home? Interviews and surveys conducted in 2004-2005 in the Toronto, Canada area of East York show that households remain connected - but as networks rather than solidary groups. The authors describe how networked individuals bridge their relationships and connect with each other inside and outside the home. ICTs have afforded household members the ability to go about on their separate ways while staying more connected - by mobile phone, email and IM - as well as by traditional landlines. In such ways, rather than pulling families apart, ICTs often facilitate communication, kinship and functional integration.  相似文献   

7.
物联网是发展智慧城市的新工具,在城市市政管理、农业园林、医疗保健、智能楼宇、智能交通等方面将有广阔的应用前景,但目前在政策支持、标准化建设、信息化建设、应用模式和技术创新、人才培养等方面还存在不足,阻碍了物联网在建设智慧城市中的应用和推广。  相似文献   

8.
In this study, an integrated quantitative and qualitative research design was employed. From over 900 telephone interviews a typology of family types based on possession of media appliances was constructed, then divided into 'traditional' (low media density), 'intermediate' (average media density) and 'multimedia' (high media density) families. This typology was then used as a basis for selecting thirty-eight families for in-depth interviews. Of these, thirty-one contained children and it is these that form the basis for this article. The results of the family interviews indicate that children are a very important factor in the acquisition and use of the Internet. It was apparent from our interviews that Internet access and use become major issues in family discussions and conflicts - both between parents and children and between siblings.  相似文献   

9.
SUMMARY

Despite limited preparation through formal and non-formal education, local people throughout the world are engaged in the common work of building healthier communities. Some core competencies-including community assessment, planning, mobilization, and evaluation-are needed to address the variety of issues that matter to local communities. This report describes an Internet-based support system for community work known as the Community Tool Box (CTB) [http://ctb.lsi.ukans.edu/]. We examine the idea and origins of the CTB and its core content, access features, and applications. We review evidence for its use, implementation and dissemination strategies, and discuss core values that guide this internet-based work.  相似文献   

10.
The disability divide in internet access and use   总被引:2,自引:0,他引:2  
The increasing spread of the Internet holds much potential for enhancing opportunities for people with disabilities. However, scarce evidence exists to suggest that people with disabilities are, in fact, participating in these new developments. Will the spread of information technologies (IT) increase equality by offering opportunities for people with disabilities? Or will a growing reliance on IT lead to more inequality by leaving behind certain portions of the population including people with disabilities? In this paper, the authors draw on nationally representative data regarding Americans' Internet uses to (1) identify the extent to which people with disabilities are embracing use of the Internet; (2) how their use of the Internet compares with the Internet uses of the rest of the population; (3) how having a disability relates to and interacts with other social statuses (e.g. socioeconomic status, age, gender) with regard to Internet use; and (4) what explains these trends. They draw on representative data collected by the Bureau of Labor Statistics and the Census of the United States to answer these questions. It is found that people with disabilities are less likely to live in households with computers, are less likely to use computers and are less likely to be online. However, once socioeconomic background is controlled for, it is found that people with hearing disabilities and those who have limited walking ability are not less likely to be Internet users. This research enables a deeper understanding of both the use of the Internet by people with disabilities and the spread of new IT more generally.  相似文献   

11.
SUMMARY

This paper argues that in addition to the substantial benefits they provide for members, on-line support groups create the potential for harm. Qualitative discourse analysis methods are used to examine messages exchanged in three distinct groups comprised of sexual abuse survivors, persons with disabilities, and parents. Examples of on-line practices with the potential to be harmful to individuals, dyadic relationships, and the larger group are identified. Several protective practices used by these groups that appear uniquely adapted for on-line support environments are also documented. Tentative guidelines are suggested for human services professionals interested in developing on-line support groups or referring clients to existing groups. The paper concludes with a discussion of the need for more research and a caution about the ethical responsibilities of researchers and practitioners who venture into this rapidly developing context of human service work.  相似文献   

12.
This article analyzes how law enforcement agencies, cyber security labs (i.e., in universities), and other departments or organizations (i.e., the private sector and the U.S. military) create their own networks—and even join forces between one another—in their fight against cyberterrorists. By and large, cyberterrorism refers to electronic attacks against the Internet, information technologies, or other critical infrastructures. In order to engage in malicious activities against the Internet (as well as computer technologies, networks, and infrastructures), cyberterrorists create networks themselves. Hence, this idea of analyzing the social networks of two opposing sides rests on the premise that it takes networks to fight networks.  相似文献   

13.
"代际特征"是拥有相同历史经历的一代人在认识和处置某些问题时表现出有别于其它时代人的显著特征。网络依赖是20世纪90年代出生的青少年的重要代际特征。先锋性、独立性和叛逆性是形成青少年网络依赖的重要心理原因,巨大的升学压力和严厉的家庭管束构成了青少年网络依赖的社会学原因。加大对青少年的理解和关照力度,增强青少年自我监督和管理能力,提高青少年网络素养是理性应对青少年网络依赖的主要举措。  相似文献   

14.
Professionals in the area of sexual violence often use humor, both lighthearted and gallows humor, in an attempt to counteract the effects of the work on their well-being. There is little research, however, on whether the use of humor is effective in reducing symptoms of secondary traumatic stress. In the current study, more than 500 Internet Crimes Against Children task force personnel were surveyed about their level of secondary traumatic stress and the coping techniques utilized to mitigate work-related stressors. The use of gallows and light-hearted humor were independently related to secondary traumatic stress scores, even controlling for other coping strategies. The two types of humor were not related to secondary traumatic stress in the same direction, nor at the same magnitude.  相似文献   

15.
China has established a comprehensive cross-border data flow regulatory regime, the core of which is “local storage, outbound assessment.” This article offers a theoretical framework for exploring the forces that have driven China’s data localization. Under the guidance of technological nationalism and the ideology of the Holistic National Security Concept, practical security needs, industrial benefits, and technological development have been the main forces that have driven localization, which has been institutionalized by means of the proposed Internet sovereignty and the government-led regime. China’s data localization, which is a typical product of Internet sovereignty, is based on the external environment and its domestic endowments. By understanding China’s data localization, we can comprehend China’s Internet governance.  相似文献   

16.
This paper explores the impact of the Internet on offline social movement mobilization from the perspective of identity building. It is based on a case study of a women's group in Hong Kong, the Queer Sisters, and the bulletin board it created on the World Wide Web. Content analysis, an online survey, interviews and observation conducted between September 1999 and December 2000 found that the bulletin board helped to foster a sense of belonging to the Queer Sisters among participants. Bulletin board participants also shared a culture of opposition to the dominant order. But a collective consciousness was absent, so the bulletin board fell short of building a collective identity among its participants. This paper, however, argues that the absence of a collective identity on the bulletin board is the result of the way the board was administered, constrained by the resources and the aims of the Queer Sisters. It suggests that the potential for the Internet to build collective identities for social movements differs for different types of social movements.  相似文献   

17.
ABSTRACT

There are several models for the delivery of etherapy on the Internet. This article presents a case study of one model, the LivePerson website. The model is based on a privately owned infrastructure through which etherapy is practiced by licensed counselors using chat or e-mail for service delivery. A content analysis of the website is presented, including policies, number of consumers, consumer ratings, and therapists’ degrees, licensure, age, sex, race, fees, and languages offered. In addition, the experiences of one LivePerson practitioner are presented to highlight methods, processes, and ethical concerns. This case study of the LivePerson model for service delivery highlights many of the benefits and concerns previously discussed in the literature related to etherapy. In addition, concerns are raised that there may be some conflict of interest when ethical standards of practice are delivered within the context of a profit-making company.  相似文献   

18.
It has been noted that adolescents may be more susceptible to pathological gambling. Not only is it usually illegal, but it appears to be related to high levels of problem gambling and other delinquent activities such as illicit drug taking and alcohol abuse. This paper examines risk factors not only in adolescent gambling but also in videogame playing (which shares many similarities with gambling). There appear to be three main forms of adolescent gambling that have been widely researched. Adolescent gambling activities and general risk factors in adolescent gambling are provided. As well, the influence of technology on adolescents in the form of both videogames and the Internet are examined. It is argued that technologically advanced forms of gambling may be highly appealing to adolescents.  相似文献   

19.
Drawing on historical methods, this study assesses the conventional “cyber-sovereignty” framework, which has been used to capture and interpret China’s stance toward global Internet governance. This framework focuses on political control and tends to reduce China’s policies to the attempts by an authoritarian state to elevate governments and intergovernmental organizations to be the only legitimate governors of global cyberspace. As it traces the evolution of China’s relationship with the global Internet in the past three decades, the study demonstrates that China’s stance is more complex than the prevalent framework allows and that it is both built upon and different from the US-centric, market-oriented Internet governance scheme. This study recognizes the inadequacy of the conventional framework and invokes a theory of critical political economy of communication, thereby offering an alternative model to explicate the complex power dynamics behind China’s changing strategies. The alternative model advanced in this study is based on the understanding of China’s evolving approach as the product of multifaceted interactions among a group of power-holders that include both state agencies and business units on the transnational level.  相似文献   

20.
Abstract

When an outbreak of conjunctivitis was identified at a rural New England college early in 2002, the college health center medical staff used various information management and communication systems to alert the community to the situation. They called upon the state Department of Human Services and the Centers for Disease Control and Prevention to help them understand and manage the outbreak. Technological systems already in place at the college allowed for rapid collection of data by means of a survey delivered over the Internet and a carriage study facilitated by a Web-based appointment and communication system. Within days, the data were collected and analyzed and an immediate response to contain the outbreak was launched.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号