首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 187 毫秒
1.
各种各样的心理信息库出现在互联网上。它们收集了有关心理现象、心理学问题、心理疾病和心理学概念等方面的信息资源。这些心理信息库各有特色:(1)普遍性和独特性。一些网站包含了心理学各分支和概念(就像一本百科全书),而另一些则只对某特定心理学科的相关信息进行收集整理。(2)对使用者的专业要求。一些网上心理资源的专业性决定了其用户必须具备相当程度的专业背景。(3)更新频率。由专业组织、政府部门和学术机构维护的网站更新频率较为规律,而其他网站只有在新信息出现的情况下才会得到更新。这就使用户对信息的准确性和可信性提出了质…  相似文献   

2.
打开Fashion Trend Digest(FTD)观潮网站的瞬间,简直带给我难以言喻的惊喜。这种惊喜不仅仅源自它海量的信息汇总,更重要的是,中国原汁原味原创的时尚产业信息扑面而来,让我感觉到,中国时尚网站不再一味临摹国外,我们有了自己的东西,它密集的业内资讯向我们展示,中国时尚产业也正在蓬勃发展着,并且是综合了自己  相似文献   

3.
陈丽冰 《探求》2009,(1):72-75,52
在虚拟参考咨询服务中,图书馆为了为用户提供更好地服务,需要收集大量的信息资料。在收集信息资料的过程中,如何很好的处理用户对隐私权的需求,谨防虚拟参考咨询服务变为用户隐私信息的"漏斗"是至关重要的。本文分析虚拟参考咨询模式中个人隐私权存在问题的成因并提出了解决问题的相应对策。  相似文献   

4.
董希望 《浙江学刊》2006,18(6):210-217
关于学术评价制度的研究,现有文献较多涉及单项制度的描述与评论。本文在描述相关文献的基础上,为了更好地阐明学术评价中涉及的关键问题,就理解学术评价制度提出一个分析框架。首先需要对学术、学术作品、学术水平、学术贡献等进行定义,并对学术评价制度进行分类,在此基础上可对各项制度分别研究,以及分析其相互影响及其后果。  相似文献   

5.
手机音乐铃声下载服务的著作权问题   总被引:1,自引:0,他引:1  
许佳胤 《社科纵横》2004,19(3):77-78
随着电信业及互联网的发展 ,许多网站为用户提供手机铃声下载服务 ,受到用户的欢迎 ,但笔者认为网站提供的手机铃声下载服务不属于合理使用的范围 ,侵犯了音乐作品作者的网络传播权。  相似文献   

6.
《社科纵横》2017,(2):23-26
地级市政府网站不但是上下级政府沟通的桥梁,也是政府与民众交流互动的窗口。地级市政府网站的发展水平是一个地区电子政务发展水平的重要衡量指标。本文在综合国内外政府网站影响力评估体系的基础上,设计出甘肃省地级市政府网站影响力评估指标体系;通过层次分析法确定了指标的单一权重和组合权重,并进行了一致性检验;构建的评价体系具有一定的合理性和实际可操作性。  相似文献   

7.
互联网在中国迅速发展,使搜索引擎成为了一个热门的信息搜寻工具。本文通过问卷调查的方式,了解网络用户搜索引擎使用行为及对其评价,从而了解使用者的真正需求。研究的结果将对搜索引擎运营商制定经营战略、改进搜索服务有参考作用。  相似文献   

8.
学术界学术不端和异化现象已经不再是新鲜事,虽然这种丑陋现象为大多数学者所严厉批评,并且有关部门和教育机构也出台了一些条文予以积极杜绝,但其还是时有发生,特别是在人文学科,这种现象似乎更为严重。现行学术评价非科学性的单一模式,即以核心期刊、来源期刊、权威期刊和课题基金项目数为衡量科研学术的主要依据,是其根本原因中的决定因素。因此,提高学术评价的科学性也就成了根治学术不端和异化现象,使学术回归为对真理的探求,而非为教育主管机构、高校和个人追名逐利的功利性工具最主要的举措。而提高学术评价的科学性在于坚持三项原则:一是重视不同学科科研特质,实事求是地制定长期和短期相结合的评价体系;二是建立多种科研数据综合评价机制;三是对学术腐败者实行解聘,严重者予以法律追究。  相似文献   

9.
一项对美国 75家大中型跨国公司进行的调查表明 ,这些公司的网站在保护客户个人信息隐私方面均未达到国际标准。尽管大部分接受调查的网站在 1~ 2个方面达到了隐私保护标准 ,但没有一家达到了美国和欧盟在去年就隐私保护达成的 6项方针。这 6项方针是 :告知客户公司将对诸如姓名和email地址等个人数据进行何种操作 ;对信息使用的目的要事先声明 ;允许客户对自己的信息进行检查和修改 ;客户可以禁止公司出于营销的目的而使用自己的信息 ;安全妥善地保管数据 ;当客户的隐私受到侵犯时 ,给予客户追索权。调查人员称 ,如果欧盟官员要求美…  相似文献   

10.
我国高校学术评价制度的缺陷与改进思路   总被引:3,自引:0,他引:3  
当前我国高校出现了一些比较严重的学术失范现象,这阻碍了高校学术创新、发展科学、教书育人的职能的发挥,学术评价制度的缺失是导致这一现象发生的主要原因。本文从现行高校学术评价制度的局限性及其原因分析入手,提出了切实改革现行高校学术评价制度的若干对策建议,旨在为营造更公正合理的制度环境铺垫基础,从而最终有效推动高校求真务实的学术研究。  相似文献   

11.
One challenge faced by many family members caring for persons with dementia is lack of information about how to take care of others and themselves. This is especially important for persons from ethnic minority groups, because linguistically and culturally appropriate information is often not available. In response to these needs, we developed a web site for Spanish-speaking caregivers. Cuidatecuidador.com provides bilingual information on dementia and caregiver issues. Content was developed and then evaluated by caregivers residing in 3 countries. Findings suggest trends that exposure to information may be related to a higher sense of mastery and a reduction of depressive symptomatology.  相似文献   

12.
在互联网时代,网络的开放性和匿名性促进了信息发布的繁荣与泛滥,每一个人既可能是信息滥用的始作俑者,又可能是信息滥用的受害者。网络群体性事件是个人信息滥用的重灾区,在程度上可以区分为递进的三级,即对正式发布文本中个人信息的集成;挖掘并发布当事人的日常生活隐私;将当事人的真实信息与虚构和想象结合在一起,以抹黑当事人。针对网络群体性事件中个人信息日益严重的滥用,需要强化互联网个人信息发布规则,建立针对个人信息滥用的纠正机制,强化快速而有力的司法救济措施。  相似文献   

13.
今天,日益增长的全球资本主义经济是一张复杂的动态的网络,这个网络由社会、文化以及反映我们个人和大众的意识的经济体制构成。随着意识创造并联结了所有事物这一观点被人们日渐认可,以及全球责任感的增强,资本主义经济体制可以切实地被改变,从而促进经济的长期繁荣。  相似文献   

14.
试论网络广告的传播优势   总被引:2,自引:0,他引:2  
胡修瑞 《学术交流》2002,(3):145-147
网络广告借助数字化技术 ,对传统的广告媒体进行了重组和创新。作为全新的媒体 ,它否定并抛弃了传统广告所具有的强制性 ,突显了自由与开放的信息传播方式 ,其信息反馈的即时性是以往任何传统广告所不能比拟的。网络广告的传播优势集中体现在受众的国际广泛性、信息交互的反馈性、投放目标的针对性、信息的自愿选择性和时空的延续性。  相似文献   

15.
Consumer privacy is at the center of an ongoing debate among business leaders, privacy activists, and government officials. Although corporations face competitive pressures to collect and use personal information about their customers, many consumers find some methods of collection and use of their personal information unfair. We present a justice theory framework that illustrates how consumer privacy concerns are shaped by the perceived fairness of corporate information practices. We describe a set of global principles, fair information practices, which were developed to balance consumer privacy concerns with an organization's need to use personal information. We conclude by discussing three alternatives for implementing fair information practices with particular attention to the Internet: government regulation, industry self-regulation, and technological solutions .  相似文献   

16.
Objectives. This study examines gender gaps in civic participation by describing gaps in on‐line participation and by explaining whether socialization, situation, or structure best account for gaps. Methods. Cross‐tabulations and OLS regression were used to analyze 2000 GSS data, which show that men are more likely to have used a computer or the web and to use the web or chat rooms more. Results. Few gender differences exist in on‐line civic participation. Men more frequently use government information websites and discuss political views, the economy, foreign affairs, and taxes on the web. Women tend to visit websites to better understand issue complexities and to discuss or learn about gender or women's issues. Marital or work situations do not influence discussion, but the structural variable of education specifies some on‐line civic participation. Conclusion. Social status is better than gender at explaining civic participation in general, political information source gathering, and versatility of political interests pursued on‐line.  相似文献   

17.
This paper reports a study of sources of information about HIV/AIDS and trust of the sources among heterosexuals in 1989 (113 females and 91 males) and 1994 (185 females and 66 males). We also examined whether perceived personal risk of HIV infection was predicted by sources of information about HIV/AIDS, trust of the sources, how informed about AIDS people believed they were, and perceived risk of infection to others, as well as whether there was a relationship between perceived personal risk and safe sex behaviour. Participants received most of their information about AIDS/HIV from magazines, newspapers, and television, but placed most trust on sources such as doctors and HIV/AIDS organisations. Perceived personal risk was influenced most by perceived risk to friends and to people with the same sexual practices. In the 1994 sample, perceived personal risk was correlated with the amount of condom use among participants with sexual experience. These results indicate ther has been relative stability across a five-year period. They also point to the continuing discrepancy among young heterosexuals between the most-used and most-trusted sources of information, as well as to the importance of peer influence on perceptions of personal risk of HIV infection.  相似文献   

18.
Non-compensatory aggregation rules are applied in a variety of problems such as voting theory, multi-criteria analysis, composite indicators, web ranking algorithms and so on. A major open problem is the fact that non-compensability implies the analytical cost of loosing all available information about intensity of preference, i.e. if some variables are measured on interval or ratio scales, they have to be treated as measured on an ordinal scale. Here this problem has been tackled in its most general formulation, that is when mixed measurement scales (interval, ratio and ordinal) are used and both stochastic and fuzzy uncertainties are present. Objectives of this article are first to present a comprehensive review of useful solutions already proposed in the literature and second to advance the state of the art mainly in the theoretical guarantee that weights have the meaning of importance coefficients and they can be summarized in a voting matrix. This is a key result for using non-compensatory Condorcet consistent rules. A proof on the probability of existence of ties in the voting matrix is also developed.  相似文献   

19.
With Internet service providers (ISPs) increasingly demanding personal information to develop personalized services, people have become more vulnerable to privacy infringement. As a way to protect individuals’ privacy, industrialized countries have implemented a “notice-and-consent” requirement, meaning an ISP must obtain users’ consent to collect personal information in the course of the ISP's business. Drawing on prospect theory and earlier work on information privacy and behavioral science, in this study, we administered an online survey experiment to test whether the giving of consent differs between ‘opt-in’ and ‘opt-out’ frames. The framing effect was found to be moderated by personal information type, people's attitudes toward privacy, and people's privacy infringement experience. The results indicate that the opt-in frame better protects users’ information privacy, and the framing effect is magnified when the targeted information concerns online activities, when users have weakly held privacy attitudes, and when users have less experience of privacy infringement.  相似文献   

20.
This study investigated the relationships between client perceptions of therapist use of social influence strategies, therapist burnout, and clients' perceptions of the quality of their therapy. Scales were developed to measure personal coercive power, personal reward power, various forms of expert power, and compromise strategies. A scale was also developed to measure clients' perceptions of their therapists' burnout that contained a combination of modified items from the Maslach Burnout Inventory (Maslach & Jackson, 1986) and original items based on stereotypical burnout behaviors. Research participants were 131 undergraduate students at the University of Pittsburgh who reported their experiences as therapy clients. Therapist use of personal coercive influence strategies and certain types of expert influence strategies were negatively associated with clients' perceptions of the quality of their therapy. Therapist use of personal reward influence strategies, compromise, and the therapist's reputation as an expert were positively related to clients' perceptions of the quality of their therapy. Perceived therapist burnout was positively associated with therapist use of personal coercive influence strategies, direct expert influence strategies, and indirect expert influence strategies. The implications of these findings are discussed.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号