首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 31 毫秒
1.
This article first introduced the current technology of the privacy protection model, and analyzed their characteristics and deficiencies. Afterwards, from the point of view of revenue, the shortcomings of the traditional privacy protection model have analyzed through the group intelligent computing method. Based on this, this paper proposes a research and application of virtual user information of security strategy based on group intelligent computing, through the collection of visitor's private information historical access data, intelligent calculation of the strategy group between the visitor and the interviewee. The setting of the threshold of the visited person can protect the privacy information of the user more effectively. In this paper, the implementation flow, algorithm implementation process, and specific architecture design of the proposed virtual user of privacy protection model based on group intelligent computing are introduced respectively. The specific algorithms include PCA, BP neural network, and genetic algorithm. Finally, the proposed privacy has verified through experiments. Protection model can protect user privacy more effectively than traditional privacy protection model. In the future, we will further expand and improve the privacy protection model of virtual users based on group intelligent computing, including considering the dynamic and inconsistency of access to the privacy information, that is, accessing different private information will produce different overlay effects and parallelism. We will also study how to apply this model to actual systems such as shopping websites and social platforms, and use commercial data to evaluate the performance of the model and further improve it.  相似文献   

2.
This exploratory technology assessment examines how educational characteristics of health information seekers are associated with access to computers, the Internet, and online health information. Specifically, we examine (1) if there exists significant variation across identified health technology user groups regarding access to online health information, and (2) if differences between education levels have narrowed, remained constant, or widened over recent years, following national educational initiatives to narrow the technology gap for low-education user groups. Using a stratified sample from national tracking survey data, we find that recent policy initiatives under national technology access and other programs have demonstrated little effect in narrowing the digital divide for low-education users of web-based technologies.  相似文献   

3.
This paper investigates the relationship between the role that information technology (IT) has played in the development of women’s employment, the possibility of women having a significant influence on the technology’s development, and the way that the IT industry perceives women as computer scientists, users and consumers. The industry’s perception of women and men is investigated through the portrayal of them in computing advertisements. While women are increasingly updating their technological skills and know-how, and through this process are entering some positions in the workplace traditionally occupied by men, these achievements are not mirrored in their social and occupational status. The computer industry and higher education have worryingly low numbers of women, while the possibility of women influencing the development of computer technology is just emerging in feminist research. This paper argues that, though the IT industry, through their self-regulatory codes, subscribes to equal treatment of sexes, races and persons with disabilities, the industry nevertheless paints a stereotyped picture of inequality when portraying men and women in computer advertisements. As long as such a perception of women prevails within the industry, it will stand as a barrier to women having equal access to computer technology. If advertisements influence the way society perceives major social constructs and issues, then the computing industry has a social responsibility to portray men and women in an equal and non-stereotypical fashion. An earlier version of this paper was presented at the ETHICOMP98 Conference, Rotterdam, Holland, March 1998.  相似文献   

4.
Drexel University requires entering freshmen to have access to a personal microcomputer. Part of the faculty development effort was a faculty newsletter,boot. The newsletter published information about microcomputers and their applications and about microcomputer-related events on campus. Unlike newsletters produced by academic computing centers,boot was edited by faculty, most of its pieces were written by faculty, and it was addressed to all members of the university community, not just that subgroup with a prior interest in, or prior record of, computer use. This article describes the publication and presents data indicating that the faculty found it to be clearly worthwhile.  相似文献   

5.
The convergence of computing, sensing, and communication technology will soon permit large-scale deployment of self-driving vehicles. This will in turn permit a radical transformation of traffic control technology. This paper makes a case for the importance of addressing questions of social justice in this transformation, and sketches a preliminary framework for doing so. We explain how new forms of traffic control technology have potential implications for several dimensions of social justice, including safety, sustainability, privacy, efficiency, and equal access. Our central focus is on efficiency and equal access as desiderata for traffic control design. We explain the limitations of conventional traffic control in meeting these desiderata, and sketch a preliminary vision for a next-generation traffic control tailored to address better the demands of social justice. One component of this vision is cooperative, hierarchically distributed self-organization among vehicles. Another component of this vision is a priority system enabling selection of priority levels by the user for each vehicle trip in the network, based on the supporting structure of non-monetary credits.  相似文献   

6.
《Ethics & behavior》2013,23(2):153-160
As computer-based information systems start to have a great impact on people, organizations, and society as a whole, there is much debate about information technology in relation to social control and privacy, security and reliability, and ethics and professional responsibilities. However, more often than not, these debates reveal some fundamental disagreements, sometimes about first principles. In this article the authors suggest that a fruitful and interesting way to conceptualize some of these moral and ethical issues associated with the use of information technology is to apply the principles of Aristotle's ethics to this topic. They argue that framing the moral and ethical choices associated with information technology in Aristotelian terms draws attention to the fact that there are fundamental dilemmas to be addressed. These dilemmas are discussed in relation to the four areas suggested by Dejoie, Fowler, and Paradice (1991): (a) privacy, (b) information accuracy, (c) access to information, and (d) intellectual property rights. The dilemmas associated with all four areas are illustrated with references to recent legal developments in Australia and New Zealand.  相似文献   

7.
Information technology has played a remarkably important role in developing the contemporary educational system. It not only provides easy access to enormous stores of information but also increases students' scientific efficiency. However, the availability of this technology has also led to increased plagiarism. This study attempted to explore how access to Internet technology contributes to plagiarism problems from the perspective of university students in Iran. A qualitative method to semistructured interviews with 20 students suggested important themes: uncertainty avoidance, tendency to use shortcuts to progress, symbolic certification, social learning and modeling of faculty members as mentors, and plagiarism in the name of justice. Survey data from 180 university students suggest that the personality characteristic of conscientiousness had a negative effect on using information technology to commit plagiarism.  相似文献   

8.
In a time of rapid technological and social change, business organizations must help their employees develop a new appreciation of how social and ethical values are being shaped and challenged by evolving information technologies. Many ethical and social conflicts have arisen around the advanced information technology used today. The emerging technologies continue to create situations not previously encountered. There are numerous risks facing corporations involved in the use of computing technology. Leaders of organizations looking ahead to assess the impact of technological changes can try to prepare their employees for the future. This paper addresses the urgent need for individuals in corporations to become more knowledgeable about computing technologies and their impact.  相似文献   

9.
Student perceptions of barriers, facilitating factors, and information needs related to the consideration of careers in science and technology were investigated with a nationwide sample of talented high school senior women (N = 1017). Data were collected through a mailed questionnaire as part of a broader National Science Foundation project. Results of the study suggest that relatively few girls choose careers in science and technology because: They have doubts about combining family life with a science career; they lack information about steps in preparing for a science career; they believe influential adults; and they see few examples of the important role women can play in science. The data describing the students' perceptions of facilitating factors and information needs suggest that encouragement from family, access to role models, extra help and encouragement from science teachers, and information about careers in science, including the steps involved in preparation, might be influential in helping change perceptions of barriers to careers in science and technology.  相似文献   

10.
While governmental agencies and large corporations were the first to make use of computing technologies, small businesses have expanded their use of the technologies substantially in recent years. In many cases these efforts to adopt computer-based systems failed, due to a variety of contextual and organizational factors. This paper presents the results of one of a series of studies of the organizational and environmental factors affecting introduction of computing technology into small businesses. The research is exploratory at this stage in the overall research effort. In-depth interviews were carried out to ascertain the nature of each of the computerization efforts and to identify the factors which contributed to success or failure. Preliminary results on organizational factors affecting the implementation of information systems in these companies are reported.  相似文献   

11.
Deep dyslexia is an acquired reading disorder resulting in the production of semantic errors during oral reading and an inability to read aloud nonwords. Several researchers have postulated that patients with deep dyslexia have both phonological and semantic access impairments but the data supporting these claims are not convincing. In fact, the hallmark feature of deep dyslexia--the semantic errors--strongly implies that these patients can access semantic information from printed words. We test the integrity of the semantic system in two such patients through auditory and visual word association tasks. The data support the notion that semantics remains intact and that the disorder and associated errors arise through a selection impairment related to failure of inhibitory connections in the phonological lexicon.  相似文献   

12.
Research on Tip of the Tongue (ToT) states has been used to determine whether access to syntactic information precedes access to phonological information. This paper argues that previous studies have used insufficient analyses when investigating the nature of seriality of access. In the first part of this paper, these complex issues are discussed and suitable analyses proposed. In the second part, new experimental data are presented. In Experiment 1, English speakers were asked to give information about mass/count status and initial phoneme of nouns, when in a ToT state. In Experiment 2, German speakers were asked to report grammatical gender and initial phoneme of nouns, when in a ToT state. Evidence that syntactic and phonological information are accessed independently was obtained for both languages. Implications for models of language production and further methodological issues in ToT research are discussed.  相似文献   

13.
In grapheme-color synesthesia, graphemes (e.g., numbers or letters) evoke color experiences. It is generally reported that the opposite is not true: colors will not generate experiences of graphemes or their associated information. However, recent research has provided evidence that colors can implicitly elicit symbolic representations of associated graphemes. Here, we examine if these representations can be cognitively accessed. Using a mathematical verification task replacing graphemes with color patches, we find that synesthetes can verify such problems with colors as accurately as with graphemes. Doing so, however, takes time: ~250 ms per color. Moreover, we find minimal reaction time switch-costs for switching between computing with graphemes and colors. This demonstrates that given specific task demands, synesthetes can cognitively access numerical information elicited by physical colors, and they do so as accurately as with graphemes. We discuss these results in the context of possible cognitive strategies used to access the information.  相似文献   

14.
Although many previous studies have shown that body-based sensory modalities such as vestibular, kinesthetic, and efferent information are useful for acquiring spatial information about one's immediate environment, relatively little work has examined how these modalities affect the acquisition of long-term spatial memory. Three groups of participants learned locations along a 146 m indoor route, and subsequently pointed to these locations, estimated distances between them, and constructed maps of the environment. One group had access to visual, proprioceptive, and inertial information, another had access to matched visual and matched inertial information, and another had access only to matched visual information. In contrast to previous findings examining transient, online spatial representations, our results showed very few differences among groups in the accuracy of the spatial memories acquired. The only difference was the improved pointing accuracy of participants who had access to proprioceptive information relative to that of participants in the other conditions. Results are discussed in terms of differential sensory contributions to transient and enduring spatial representations.  相似文献   

15.
Mental health facilities and practitioners commonly permit resarchers to have direct access to patients' records for the purposes of archival research without the informed consent of patient-participants. Typically these researchers have access to all information in such records as long as they agree to maintain confidentiality and remove any identifying data from subsequent research reports. Changes in the American Psychological Association's Ethical Principles (American Psychological Association, 1992) raise ethical and legal issues that require consideration by practitioners, researchers, and facility Institutional Review Boards. This article addresses these issues and provides recommendations for changes in ethical standards as well as alternative avenues for conducting research using archival mental health records.  相似文献   

16.
This paper summarizes three lines of research that are motivated by the practical problem of helping users find information from external data sources, most notably computers. The application areas include information retrieval, text categorization, and question answering. A common theme in these applications is that practical information access problems can be solved by analyzing the statistical properties of words in large volumes of real world texts. The same statistical properties constrain human performance, thus we believe that solutions to practical information access problems can shed light on human knowledge representation and reasoning.  相似文献   

17.
Many studies indicate that group discussion candisproportionately reflect information known by all group members,at the expense of information known to only one group member, andthis is associated with suboptimal group decisions (Stasser &Titus, 1985). The present study examined the impact of threeprocedural factors on information sharing and quality of groupdecision: (a) group decision procedure (an instruction to "rankorder the alternatives" vs "choose the best alternative"), (b)information access during group discussion (reliance on memory vscomplete access), and (c) communication technology (computer vsface to face). Three-person groups worked on an investment decisionthat was structured as a hidden-profile task where criticalinformation was distributed unevenly prior to group discussion. Thedata provided support for a rank-order effect: Groups instructedto rank order the alternatives, compared to groups instructed tochoose the best alternative, were more likely to fully consider allof the alternatives, exchange information about unpopularalternatives, and make the best decision. But these effects onlyoccurred in face-to-face groups. In computer-mediated groups, therewas general information suppression and no effect of group decisionprocedure. Access to information during group discussion increaseddiscussion of both unique and common information, in theface-to-face conditions, but had no effect on group decisionquality. Taken together, the data suggest that procedural aspectsof group discussion may help overcome the impact of prediscussionpreferences on information processes and group decision.  相似文献   

18.
Modifiable behavioral risk factors such as cigarette smoking, physical inactivity, and obesity contribute to over 40 % of premature deaths in the USA. Advances in digital and information technology are creating unprecedented opportunities for behavior analysts to assess and modify these risk factors. Technological advances include mobile devices, wearable sensors, biomarker detectors, and real-time access to therapeutic support via information technology. Integrating these advances with behavioral technology in the form of conceptually systematic principles and procedures could usher in a new generation of effective and scalable behavioral interventions targeting health behavior. In this selective review of the literature, we discuss how technological tools can assess and modify a range of antecedents and consequences of healthy and unhealthy behavior. We also describe practical, methodological, and conceptual advantages for behavior analysts that stem from the use of technology to assess and treat health behavior.  相似文献   

19.
In this age of information technology, it is morally imperative that equal access to information via computer systems be afforded to people with disabilities. This paper addresses the problems that computer technology poses for students with disabilities and discusses what is needed to ensure equity of access. particularly in a university environment. A version of this paper was presented at ETHICOMP98, the Fourth International Conference on Ethical Issues of Information Technology. March 25–27, 1998, Erasmus University, the Netherlands. Frances S. Grodzinsky is a Professor of Computer Science and Information Technology. Her area of research is computer ethics.  相似文献   

20.
A survey on biometry for cognitive automotive systems is presented in this paper, specially those biometric systems used for high tech security access, law enforcement and/or commercial transactions. In general, biometric systems can be expensive due to the amount of sensors and processing resources involved. Efforts have been made to integrate these systems to vehicles mostly for security purposes and user authentication. Until now, most of the systems do not go beyond using facial and fingerprint data to start the engine or access the car; however, new generations demand more personalization plus the vehicle making decisions based on their physiological characteristics. Although this kind of technology is considered a luxury feature in general, actually it could help users and save their lives. Indeed, biometry is the way to make the human-vehicle relationship happen, whether the biometric devices are embedded inside the vehicle, used as an accessory or wearables. By using as input not only the sensors inside the vehicle but also data from outside, the vehicle could adapt and/or learn new information to make the best possible decision.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号