首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   47篇
  免费   0篇
民族学   1篇
人口学   2篇
丛书文集   1篇
理论方法论   2篇
综合类   8篇
社会学   24篇
统计学   9篇
  2023年   1篇
  2021年   1篇
  2020年   1篇
  2018年   2篇
  2017年   4篇
  2016年   1篇
  2014年   2篇
  2013年   9篇
  2012年   1篇
  2011年   1篇
  2010年   1篇
  2009年   4篇
  2008年   2篇
  2007年   2篇
  2006年   3篇
  2005年   2篇
  2004年   1篇
  2003年   3篇
  2002年   2篇
  2001年   2篇
  2000年   1篇
  1999年   1篇
排序方式: 共有47条查询结果,搜索用时 156 毫秒
21.

This article explores the relationship between surveillance techniques and the production of sovereign statehood in an effort to track the day-to-day practices through which state authority is constituted in the context of globalization. This article explicitly probes the processes through which new forms of sovereignty come into being within the life of the state. It takes as its point of departure the operations of Ghana's Customs Service, a body charged with policing the nation's frontiers and collecting the bulk of state revenue. Contrasting the work of a multinational firm contracted by the government of Ghana to carry out Customs duties and the conventional roles of Ghanaian Customs officers, this article examines the ways in which the manifold technologies of neo-liberalism (from contractual forms and modes of accountability, to the apparatuses of surveillance) redefine the capacities, authority, and imagination of both state and self, held by state agents. Here we see a sovereignty that is increasingly derived outside of the state even as the play of sovereign power is intensified and deeply diffused within it.  相似文献   
22.
Arguing for social movement-based critiques of public surveillance, this article proposes an alternative approach to the established parameters of research on the contemporary surveillance society. As cities become increasingly organized around a logic of insecurity and fear, there has been an eruption of concern and debate about the expansion of urban public surveillance. But most of the research on this subject has paid little attention to the deliberate, collective forms of political critique raised by anti-surveillance activism. Rather, the predominant focus has been on concerns about privacy rights, civil liberties, and the dilemmas of balancing freedom with security. Moreover, the prevailing critical narrative contends that the radical expansion of surveillance has been largely met with consent from the public. Moving beyond such a discourse of consent, this article examines two examples of cultural interventions that seek to contest the growth of public surveillance, not as a problem limited to the violation of privacy rights but as a process that signifies the metastasizing weaponization of everyday life and the authoritarian circulation of fear. I suggest that the significance of contemporary anti-surveillance activism is found in its embeddedness in broader struggles rather than in the opposition to surveillance as an autonomous political aim.  相似文献   
23.
Summary. We describe a model-based approach to analyse space–time surveillance data on meningococcal disease. Such data typically comprise a number of time series of disease counts, each representing a specific geographical area. We propose a hierarchical formulation, where latent parameters capture temporal, seasonal and spatial trends in disease incidence. We then add—for each area—a hidden Markov model to describe potential additional (autoregressive) effects of the number of cases at the previous time point. Different specifications for the functional form of this autoregressive term are compared which involve the number of cases in the same or in neighbouring areas. The two states of the Markov chain can be interpreted as representing an 'endemic' and a 'hyperendemic' state. The methodology is applied to a data set of monthly counts of the incidence of meningococcal disease in the 94 départements of France from 1985 to 1997. Inference is carried out by using Markov chain Monte Carlo simulation techniques in a fully Bayesian framework. We emphasize that a central feature of our model is the possibility of calculating—for each region and each time point—the posterior probability of being in a hyperendemic state, adjusted for global spatial and temporal trends, which we believe is of particular public health interest.  相似文献   
24.
This article offers an account of information and communication technologies (ICTs) that draws upon the tradition of critical theory, arguing that an application of the latter to the former can be categorized as a theory of 'cyber criticalism'. Its aim is not to provide an exhaustive theoretical analysis or any kind of literature review, but to suggest that such a theorization is possible because cyber criticalism (1) offers an account of social power and (2) suggests how and why alternatives to existing social practices and institutions can be formed. The first section relates the debate about information society to that concerning globalization and argues that two main theories square off against each other in the race to explain that society: one which, in Castells's terminology, emphasizes the power of flows and the other which emphasizes the flows of power. If the former is inadequate in crucial respects then the way is clear for critical theorists to explore the latter. Cyber criticalism is then sketched in outline and the article proceeds to identify information systems, the flows of power, as potential sites of resistance. The final section focuses upon biometrics and argues that the way forward for cyber critical theorists lies in exploiting the cultural insecurities of informatic capitalism. Ultimately, then, cyber criticalism is critical theory updated for the information age. Unlike those such as Castells it identifies flows of power and the intensification of those flows around the dominant nodes of the informational net. It insists that information systems constitute potential sites of resistance. Nevertheless, acts of resistance are still relatively marginal and fragmented events due to they way in which social problems are pathologized and criminalized.  相似文献   
25.
In exploring the implications of information and communication technologies (ICTs), Fitzpatrick has suggested the need for a new category of rights—virtual rights. To explore this claim, we consider how developments in information management and processing differentially impact on citizens. Using examples from the public and private sectors we explore the dangers posed by the emergent surveillance society and agree these may require new rights. But we suggest that the state has by no means been an exemplar and, moreover, that many of the “surveilling” practices employed by commercial organizations might be used by the state to pursue socially just ends. We argue against a criticalist perspective that narrowly focuses on the dangers posed by new ICTs. Indeed, from a realist perspective we argue that a positive cybercriticalism that seeks to tackle exclusion by harnessing and constraining the surveillance qualities of ICTs is a pressing policy priority.  相似文献   
26.
Private corporations have grown rapidly in numbers worldwide and their increasing power and involvement in human life needs to be more fully and critically understood. This ethnographic inquiry draws on studies of very large U.S. corporations, the work of Aristotle, Bacon, Bakhtin, and others to evoke an increasing use of rhetoric and self-consciously designed social organizations developed for profit by the private sector. Companies, it is shown, have historically and now theorize the social order, seek to totalize aspects of it, impose arbitrary orders, critique one another, and influence more effectively subsequent human behavior in the marketplace.  相似文献   
27.
West Nile virus (WNV) is endemic in the Po valley area in northern Italy. Regional health authorities have implemented integrated WNV surveillance following a One Health approach, based on collaboration between human, animal and environmental health institutions. We evaluated this integrated WNV surveillance system in Emilia-Romagna, Lombardy and Piedmont regions by means of a process evaluation. We examined the system’s implementation fidelity, dose delivered and received, reach, and we identified strengths and weaknesses in the system. Qualitative and semi-quantitative data were obtained from three regional focus groups. Data were discussed in a follow up focus group, where participants suggested recommendations for improving the surveillance system.Inter-institutional and interdisciplinary integration and the creation of a 'community of practice' were identified as key elements for effective surveillance. We identified differences in the degree of interdisciplinary integration in the three regions, likely due to different epidemiological situations and years of experience in surveillance implementation. Greater collaboration and sharing of information, public engagement and economic assessments of the integrated surveillance approach would facilitate its social recognition and guarantee its sustainability through dedicated funding. We demonstrate that a transdisciplinary research approach based on process evaluation has value for designing and fine-tuning integrated health surveillance systems.  相似文献   
28.
We study, by means of simulations, the performance of the Shewhart method, the Cusum method, the Shiryaev-Roberts method and the likelihood ratio method in the case when the true shift differs from the shift for which the methods are optimal. The methods are compared for a fixed expected time until false alarm. The comparisons are made with respect to some measures associated with power such as probability of alarm when the change occurs immediately, expected delay of true alarm and predictive value of an alarm.  相似文献   
29.
Society's increased surveillance needs are accelerating the spread of biometric security solutions (new authentication and identification technologies based on individual physical characteristics). There are two opposing lines of argument regarding the question of whether biometrics are a threat to privacy or not. This paper analyses the two views on their tacit assumptions regarding the nature of biometric technology. It argues that the different assessments of biometric technology involve different conceptualizations and constructions of the technology in terms of its demarcation as a stabilized object. On a second level, the analysis deals with the philosophical issue of technological determinism. The opposition between deterministic and voluntarist views of technology is shaped by an underlying opposition between reification of technology on the one hand, and a conception of technology as a multifactor contingent human practice on the other . In this paper deterministic and voluntarist constructions of technology are considered as rhetorical devices , and as discursive strategies. This allows me to show how distinctions between inherent features and contingent aspects of biometric technologies, as well as demarcations between human and non-human agency are made, that imply particular distributions of responsibility and negotiating space for human choices and values. Examples are presented showing how each construction of biometric technology serves its own purpose in the political process of shaping biometrics.  相似文献   
30.
权力的腐败是滋生腐败的重点环节和重点部位。其产生有着深刻的政治、经济和社会根源,预防和治理权力腐败,要健全制度,严格管理,进一步完善权力监督制约机制和运行机制。  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号