首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 140 毫秒
1.
Location-aware technologies such as GPS devices and smartphones are integral to everyday, mundane navigational practices or ‘wayfinding’. The personalisation, portability and popularity of these devices means that wayfinding can be accomplished with near-instant access to place-based information. But how do people connect to these devices in more intimate, emotional, and haptic ways? To address this question, this paper draws on autoethnographic fieldwork involving wayfinding devices, using a series of iPhone navigation apps. The paper presents a series of short narratives taken from my field diaries exploring the ways in which I perceived and performed my iPhone device as a companion during my everyday mobilities. The paper focuses on three mechanisms that facilitated relations of companionship: product design, sensory engagement and emotional/affective encounters. Building on these insights, the paper argues that relations of companionship with technological devices come into focus in particular moments when the life cycles of the users and their devices collide. The various emotions and affects, which circulate in these moments, are critical to how we make sense of space, place, and our mobilities, as well as ongoing engagements with human/technology relations.  相似文献   

2.
Third Way Café     
ABSTRACT

This article describes how one web site, Third Way Cafe, uses the Internet to introduce Anabaptist Christian perspectives into society's marketplace of ideas, and provides a prophetic witness on faith and contemporary issues.

The article examines why Anabaptist Mennonites have historically worked at peace and justice issues, whether peace and justice can actually be furthered or accomplished on the web, how technology impacts the message, and what kinds of responses have come from the audience.

The Internet, while not a face-to-face medium, has demonstrable capability for putting information at the fingertips of people who have keen (or marginal) interest in peacemaking and in connecting/providing a network for persons working and interested in peace and justice issues.  相似文献   

3.
Increasingly, the Internet is proving to be an important research tool. Today, cyberspace affords researchers easy access to traditionally difficult to reach populations, a host of virtual communities, and a wealth of data created through computer-mediated-communication. This newfound research frontier brings with it, however, a multiplicity of ethical concerns, including: (1) whether the Internet constitutes a private or public space; (2) whether the human subject paradigm is appropriate when considering the ethics of Internet research; and (3) whether cyber participants/‘speakers-as-writers’ and communities should be guaranteed confidentiality and anonymity when researchers contain or consider them in research. This paper examines these specific ethical concerns as they relate to Canada's Tri-Council Policy Statement: Ethical Conduct for Research Involving Humans, which, as yet, does not explicitly address ethics involved in Internet research. I propose that in large part the Internet is by definition a public site of activity, and as such, many posters cannot expect their texts to remain confidential, nor their names anonymous, and that the human subject paradigm is highly problematic in terms of regulating ethics involved in some research generated through new information technologies. This is most expressly the case with computer-mediated-communication, which, in light of the Tri-Council Policy Statement, can be viewed as theoretically akin to public entertainment and performance. This revised version was published online in August 2006 with corrections to the Cover Date.  相似文献   

4.
Journal File     
The Internet can be a problematic place for relationship development. As popular as these approaches are, none apprise the therapist of specific dilemmas critical to the outcome of treatment. The purpose of this paper is to outline the therapeutic dilemmas faced by therapists in treating Internet infidelity. It is the first article of its kind to outline the key dilemmas: (a) seven factors that increase a couple's vulnerability to Internet infidelity, (b) self-of-the-therapist issues, and (c) divisive issues in treatment. A case example demonstrating how to address the dilemmas in a couple experiencing Internet infidelity is included.  相似文献   

5.
The Internet offers possibilities for sexuality research that could not have been imagined even a decade ago. Although Internet users are not representative of the general population, they are easily accessible, and the openness with which they discuss sensitive topics has created a tremendous and largely untapped pool of respondents for sex research. Moreover, the web provides access to populations that are largely hidden and difficult to reach using traditional methods. In this article, we explore such issues as sampling, research design, data collection and management, and the ethics of web-based research. In doing so, we review past research, investigate the advantages and disadvantages of using the Internet in sexuality studies, draw examples from our web-based study of involuntary celibacy, and recommend guidelines for future web based inquiries.  相似文献   

6.
Different methods have been developed to address ethical issues during research. Most of these methods were developed at universities. In this article ethical parallel research within a Research and Technology Organization is described. Within a European project about perceived security, CPSI, the ethical issues were identified by ethicists cooperating in the project. The project CPSI was aimed at developing a research method that can be used by (local) government to monitor or assess perceived and actual security. Together with the researchers a way was sought to address the ethical issues. Several issues could be addressed by choices with regard to the design of the validation study, in this case a survey. The ethical and legal reasons that were relevant for choices in the design of the validation study were made an integral part of these decisions. Some issues were already identified during the writing of the proposal others were only identified during the research. Participating in the research gave the ethicists access to all relevant information. It made it possible to address the ethical issues when they became relevant. Ethical reasons were part of some of the discussions on research method. It proved possible to address most ethical issues satisfactorily during the research project.  相似文献   

7.
The paper aims at exploring if we have sound philosophical reason to embrace a human right to Internet access. While attempts to make Internet access a candidate for the standing of human right have become popular in both the political and legal arenas, we still lack serious philosophical reflection on this issue. The paper first evaluates the arguments made by various authors, and then moves to provide its own conclusions. Its logic is that if (i) Internet access is crucial for enabling democracy, and (ii) democracy is a basic human right, then we may have at least prima facie reason to see such a technology as a derived human right whose normativity supervenes on the right to democracy.  相似文献   

8.
《Behavior Therapy》2020,51(1):1-14
Our field has come a long way in establishing cognitive-behavioral therapy as the empirically supported treatment of choice for a wide range of mental and behavioral health problems. Nevertheless, most individuals with mental disorders do not receive any care at all, and those who do often have difficulty accessing care that is consistently high in quality. Addressing these issues is complex and costly and thus progress has been slow. We are entering an exciting stage in which emerging technologies might offer novel solutions to the treatment gap. This paper discusses a number of technology-enabled solutions to our field’s challenges, including Internet-based and smartphone-based cognitive-behavioral therapy. Nevertheless, we must remain attentive to potential pitfalls of these emerging technologies. The paper incorporates suggestions for how the field may approach these potential pitfalls and provides a vision for how we might develop powerful, scalable, precisely timed, personalized interventions to enhance global mental health.  相似文献   

9.
A large amount of academic research has analysed and documented the fact that Muslims are often presented in a negative or stereotypical way in Western media and popular culture. This article focuses on how the Internet can also be used in spreading and publishing anti-Islamic and anti-Muslim opinions. Although the Internet is significant in the development of contemporary society, no studies have focused on the importance of information and communication technologies in spreading Islamophobic opinions. However, the new technologies can also be used for monitoring and combating Islamophobia, and many Muslim organisations are today using the Internet for these purposes. The article is based on an indepth analysis of both anti-Muslim and pro-Muslim homepages that can be related to the debate over Islamophobia.  相似文献   

10.
The general issue addressed in the paper concerns the access to orthographic representations in written naming in adults. The processing levels engaged in written naming are briefly described. Then, we address the issue of the role of phonological codes in accessing orthographic representations. The problem is to determine whether or not phonological codes are obligatorily involved in the access to orthographic codes. We briefly provide evidence from brain-damaged patients and from normals, which suggests that phonology plays a constraining role in accessing orthographic codes. The question of the determinants of the speed of access to orthographic representations is presented and, more precisely, the influence of age of acquisition and objective word frequency. Concerning the influence of age of acquisition, we address two issues: (1) the control for cumulative frequency and the status of classical age of acquisition measures; (2) the locus/i of age of acquisition and word frequency effects.  相似文献   

11.
Emerging technologies are increasingly used in an attempt to “enhance the human body and/or mind” beyond the contemporary standards that characterize human beings. Yet, such standards are deeply controversial and it is not an easy task to determine whether the application of a given technology to an individual and its outcome can be defined as a human enhancement or not. Despite much debate on its potential or actual ethical and social impacts, human enhancement is not subject to any consensual definition. This paper proposes a timely and much needed examination of the various definitions found in the literature. We classify these definitions into four main categories: the implicit approach, the therapy-enhancement distinction, the improvement of general human capacities and the increase of well-being. After commenting on these different approaches and their limitations, we propose a definition of human enhancement that focuses on individual perceptions. While acknowledging that a definition that mainly depends on personal and subjective individual perceptions raises many challenges, we suggest that a comprehensive approach to define human enhancement could constitute a useful premise to appropriately address the complexity of the ethical and social issues it generates.  相似文献   

12.
This article concerns the Nordunet project and its “plug.” It is a history about how the Internet “won” the “religious war” about computer communication protocol standards in Scandinavia. It teaches us important lessons about how the Nordic countries (except Denmark) became the leading ones in the adoption and use of the Internet. On a more general level this story also teaches us an important lesson about the importance of gateways in the design and establishment of large scale computer networks and information infrastructures. It is a universal truth that the development of such technologies requires standards. And that gateways are equally important. The main conclusion drawn is that what matters in the development of such technologies is to combine and balance the use of gateways and standards in a proper way. Originally trained as a computer scientist his research focuses mainly on the interplay between social and technical issues in the development and use of large-scale information systems and infrastructures—including their standards. He has worked most of his professional career within applied research institutions and industry and before moving into academia in 1997.  相似文献   

13.
The question of the introduction of emerging technologies and their incessant renewal in organizations basically refers to the place and role that these devices play in activity, as well as how they can affect activity and health at work … Thought as a prospective reflection trying to grasp the logic and the modalities of the digital transformations in progress, the ambition of this paper is: (i) first, identify and characterize the emerging technologies that are deployed in the company; (ii) discuss their impact on the activity and well-being of employees, showing the uses and paradoxical effects that these devices can have on work; and (iii) finally think about the psychosocial function of these devices as potential health and business development operators.  相似文献   

14.
Computers and the Internet have become a vital part of modern life across the world, affecting communications, finance, and governance. At the same time, technology has created unparalleled opportunities for crime and deviance on- and off-line. Criminological research has expanded its focus over the last two decades to address the various forms of technology-enabled crime and the applicability of traditional theories to account for offending. There is, however, a need for careful consideration of the state of the field in order to identify issues requiring further study and analysis. This study examines the current literature on virtually all forms of cybercrime and the theoretical frameworks used to address these issues. In turn, we hope to give direction to refine our understanding of criminological theory and social policies to combat these offenses.  相似文献   

15.
Biomedical engineering technologies such as brain–machine interfaces and neuroprosthetics are advancements which assist human beings in varied ways. There are exciting yet speculative visions of how the neurosciences and bioengineering may influence human nature. However, these could be preparing a possible pathway towards an enhanced and even posthuman future. This article seeks to investigate several ethical themes and wider questions of enhancement, transhumanism and posthumanism. Four themes of interest are: autonomy, identity, futures, and community. Three larger questions can be asked: will everyone be enhanced? Will we be “human” if we are not, one day, transhuman? Should we be enhanced or not? The article proceeds by concentrating on a widespread and sometimes controversial application: the cochlear implant, an auditory prosthesis implanted into Deaf patients. Cochlear implantation and its reception in both the deaf and hearing communities have a distinctive moral discourse, which can offer surprising insights. The paper begins with several points about the enhancement of human beings, transhumanism’s reach beyond the human, and posthuman aspirations. Next it focuses on cochlear implants on two sides. Firstly, a shorter consideration of what technologies may do to humans in a transhumanist world. Secondly, a deeper analysis of cochlear implantation’s unique socio-political movement, its ethical explanations and cultural experiences linked with pediatric cochlear implantation—and how those wary of being thrust towards posthumanism could marshal such ideas by analogy. As transhumanism approaches, the issues and questions merit continuing intense analysis.  相似文献   

16.
Abstract

In this article, we provide a novel view of mathematics learning disability (MLD) by studying a student with an MLD (Dylan) who had compensated so effectively that she was able to major in statistics. We push back on the dominant deficit model used in studies of MLD, and consider issues of access and compensation from a Vygotskian theoretical frame. Through 8 videotaped interview sessions, we identified that Dylan’s primary difficulties were with mathematical notation and number sense, which resulted in issues accessing standard mathematical forms. Analysis revealed 8 compensatory strategies that Dylan used to address these issues of access. We frame our approach as emancipatory research. Dylan was involved in all phases of the study’s design, implementation, analysis, and dissemination, and is the second author. This work acknowledges that individuals with disabilities have research agendas of their own and have critical insight to share about the lived experience of their disability.  相似文献   

17.
Families are increasingly integrating computing technologies into their everyday activities, expanding the range of external influence upon them. For many families, basic notions of 'home' are undergoing shifts as large-scale cultural and economic changes occur that are related to the 'Information age' and as family members spend more time on the Internet and with advanced communications technologies. The Internet is also providing the backdrop for a number of critical family problems, as many counsellors are discovering in their therapy efforts. This article explores the social construction of the various computer hazards that households are encountering, such as computer addiction and children's access to on-line pornography. For example, some parents label deep-seated family issues as 'technological' problems because of the involvement of the computer, while others overlook or deny the possible influences of technologies. The article discusses these issues in terms of constructivist counselling perspectives that are sensitive to cultural and environmental contexts. It outlines some of the specific strategies for countering these problems that counsellors can utilise with their clients (such as solution-focused approaches). It also discusses how counsellors can help household heads to define and deal with their rapidly changing responsibilities in these new realms.  相似文献   

18.
Adolescent Internet use: What we expect, what teens report   总被引:13,自引:0,他引:13  
As adolescent Internet use grew exponentially in the last decade, with it emerged a number of correspondent expectations. Among them were the following: (1) that gender predicts usage, i.e., that boys spend more time online, surfing the web and playing violent games, while girls chat or shop online; (2) that Internet use causes social isolation and depression, especially for teens; and (3) that adolescents use the Internet for anonymous identity experimentation. These expectations were based on research with earlier technologies when the Internet was less diffused in the adolescent population. By means of highly detailed daily reports of adolescents' home Internet usage and peer-related adjustment, the present research sought to compare these expectations with the actual experiences of early and mid-adolescents in 2000 and 2001. Participants were 261 7th and 10th graders from suburban California public schools who completed four consecutive end-of-day reports on their school-based adjustment and Internet activity (including detailed logs of instant messages). Results challenge prevailing expectations regarding gender, well-being, and identity play. For the most part, adolescent boys' and girls' online activities have become more similar than different. On average, boys and girls alike described their online social interaction as (1) occurring in private settings such as e-mail and instant messages, (2) with friends who are also part of their daily, offline lives, and (3) devoted to fairly ordinary yet intimate topics (e.g., friends, gossip). No associations were found between Internet usage and well-being. Online pretending was reported to be motivated by a desire to play a joke on friends more often than to explore a desired or future identity, but participants reported a range of pretending content, contexts, and motives.  相似文献   

19.
This paper reports on the research activities performed by the Pictorial Computing Laboratory at the University of Rome, La Sapienza, during the last 5 years. Such work, essentially is based on the study of humancomputer interaction, spans from metamodels of interaction down to prototypes of interactive systems for both synchronous multimedia communication and groupwork, annotation systems for web pages, also encompassing theoretical and practical issues of visual languages and environments also including pattern recognition algorithms. Some applications are also considered like e-learning and collaborative work.  相似文献   

20.
The national-level scenarios project NanoFutures focuses on the social, political, economic, and ethical implications of nanotechnology, and is initiated by the Center for Nanotechnology in Society at Arizona State University (CNS-ASU). The project involves novel methods for the development of plausible visions of nanotechnology-enabled futures, elucidates public preferences for various alternatives, and, using such preferences, helps refine future visions for research and outreach. In doing so, the NanoFutures project aims to address a central question: how to deliberate the social implications of an emergent technology whose outcomes are not known. The solution pursued by the NanoFutures project is twofold. First, NanoFutures limits speculation about the technology to plausible visions. This ambition introduces a host of concerns about the limits of prediction, the nature of plausibility, and how to establish plausibility. Second, it subjects these visions to democratic assessment by a range of stakeholders, thus raising methodological questions as to who are relevant stakeholders and how to activate different communities so as to engage the far future. This article makes the dilemmas posed by decisions about such methodological issues transparent and therefore articulates the role of plausibility in anticipatory governance.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号