首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   11篇
  免费   0篇
  2023年   1篇
  2022年   1篇
  2020年   1篇
  2017年   2篇
  2013年   3篇
  2007年   2篇
  2004年   1篇
排序方式: 共有11条查询结果,搜索用时 15 毫秒
1.
Two technological behemoths, the computer and the Internet, have greatly facilitated the ease of collecting, managing, processing, and sharing information about individuals. This has been beneficial in accomplishing some socially and economically valuable objectives such as preventing fraud, tracking illegal behavior, and introducing potential customers to goods and services in which they may be interested. Unfortunately, the unfettered accumulation and analysis of personal data—both knowingly and inadvertently while web browsing online—has also ushered in significant privacy concerns. This thought piece introduces the issue, provides case studies and relevant legislation to underscore its gravity, and presents two rough theoretical models to aid in construing the phenomenon of online privacy. Suggestions for how the interpretive frameworks can be tested are also provided, along with a general call for increased legislation of transactional activity in cyberspace. His research interests include computer crime, corporate security, and criminological theory.  相似文献   
2.
The authors propose an illusory recollection account of why cognitive aging is associated with episodic memory deficits. After listening to statements presented by either a female or a male speaker, older adults were prone to misrecollecting past events. The authors' illusory recollection account is instantiated in a new illusory recollection signal detection model that provides a better fit of older adults' data than does the standard signal detection model. They observed that age-related differences in source memory (as measured by source d' scores) virtually disappear after accounting for the occurrence of illusory recollections. These data suggest that age-related source memory impairments are not due to older adults' remembering less diagnostic source information and having to guess more. Instead, older adults appear to misremember past events more often than younger adults.  相似文献   
3.
The current work, based on data from a cross-sectional sample of approximately 2,000 randomly selected university students, seeks to clarify exactly who is most likely to engage in online music piracy. The extant knowledgebase on why individuals take part in this form of intellectual property is growing, but little is known about the type and background of those involved. This study therefore seeks to construct a profile of the typical music pirate by measuring the salience of demographic characteristics and the respondent's scope of overall participation in cyberspace-based activities. Findings indicated that respondents’ differentially participated in music piracy based on their gender, race, type of college major, proficiency in using the Internet, and variety of online participation. Policy solutions based on an attempt to clearly specify, reinforce, and enforce definitions of appropriate Internet use are consequently suggested to reduce the prevalence of piracy among a university population.  相似文献   
4.
Research on family functioning within given cultural contexts is needed. This study aims to describe salient dimensions of family functioning in two urban contexts in India and to examine differences in family functioning by sociodemographic groups. We measured differences in family functioning using cross-sectional survey questionnaire data collected from 13 to 15-year-old adolescents and one of their parents/primary caregivers in Mumbai (n = 843) and Kolkata (n = 913) during 2019–2020. We drew a multi-stage sample representative of neighborhoods and households in both cities. We assessed a multi-dimensional family functioning latent factor that included parent-reported measures (parent–adolescent communication, family cohesion, and parent monitoring of peers) and adolescent-reported measures (parent support, family cohesion, and parent supervision). Our results support an overall measure of family functioning manifested by multiple dimensions for parent- and adolescent-reported data. Families with male adolescents had worse adolescent-reported family functioning in Mumbai and parent-reported family functioning in Kolkata. Higher socioeconomic status was associated with better parent-reported family functioning in both cities and better adolescent-reported family functioning in Kolkata. Muslim religious identification in Kolkata and the Hindi native language in both cities were associated with better adolescent-reported family functioning. Our findings indicate heterogeneity in family functioning across demographic and social-cultural groups within the two urban contexts of India. This study may inform the development of culturally congruent prevention interventions for families with adolescents in India.  相似文献   
5.
The current study sought to test the viability of employing Sykes and Matza's (1957 Sykes , G. and D. Matza . 1957 . “Techniques of Neutralization: A Theory of Delinquency.” American Sociological Review 22 : 664670 .[Crossref], [Web of Science ®] [Google Scholar]) techniques of neutralization as a framework for understanding online music piracy. Using data from a sample of 2,032 undergraduates from a large Midwestern university, the relevance of neutralization theory is tested via multinomial logistic regression while controlling for other theoretical predictors and demographic variables. The findings indicated that greater acceptance of the techniques associated with denial of responsibility, denial of injury, denial of victim, and appeal to higher loyalties significantly predicted moderate levels of piracy participation. Furthermore, the effect of appeals to higher loyalty on piracy was found to be conditioned by the respondent's approval of the behavior. Overall, results suggested that university settings may unwittingly facilitate a climate for online piracy whereby students place a higher value on group norms rather than legal norms and do not consider the harms associated with the behavior.  相似文献   
6.
Two experiments showed that older adults were worse than younger adults at judging the accuracy of their responses on source identification (i.e., who said what) and cued-recall tests. It is important to note that this age-related metamonitoring impairment occurred even after older and younger adults were matched on overall source accuracy and cued-recall accuracy. By contrast, older and younger adults showed comparable metamonitoring capacities when assessing the likely accuracy of old-new recognition judgments and responses to questions about general knowledge. These experiments are consistent with the misrecollection account of cognitive aging, which suggests that age-related memory impairments are due to older adults' vulnerability to making high-confidence errors when answering questions that require memory for specific details about recently learned events.  相似文献   
7.
Landmarks are objects that have salience that is either visual, semantic or structural. Recent researches have pointed out observer characteristics that make a landmark salient. These have been termed cognitive salience. This study investigated the effects of two components of cognitive salience, familiarity and degree of recognition, on route memory. The first experiment examined the effect of familiarity of landmark and ease with which it could be recognized (degree of recognition) on remembering a route, while in the second experiment only degree of recognition was varied while holding familiarity constant. Two types of landmarks (text and image) were shown to participants who had to recollect course taken at decision points during wayfinding tasks. Participants were shown navigation videos generated using Squareland Model. The videos had six decision points each having one landmark, and the participants were required to indicate the direction of the turn when the landmarks were shown again. Results showed that pictorial landmarks (high degree of recognition) were better facilitators of route memory than textual landmarks (low degree of recognition). Results also indicated that familiar buildings served as better landmarks than unfamiliar buildings. In the second experiment another level of degree of recognition (medium) was added and compared with high and low levels. Results confirmed the findings of the first experiment with high degree of recognition being the best facilitator followed by medium and low degree of recognition. Our findings lend empirical support to the concept of cognitive salience proposed by Caduff and Timpf (Cogn Process 9:249–267, 2008) and highlight the importance of observer characteristics in determining what constitutes as good landmark.  相似文献   
8.
At the core of public reason liberalism is the idea that the exercise of political power is legitimate only if based on laws or political rules that are justifiable to all reasonable citizens. Call this the Public Justification Principle. Public reason liberals face the persistent objection (articulated by, among others, Joseph Raz, Steven Wall, Allen Buchanan, and David Enoch) that the Public Justification Principle is self-defeating. The idea that a society’s political rules must be justifiable to all reasonable citizens is intensely controversial among seemingly reasonable citizens of every liberal society. So, the objection goes, the Public Justification Principle is not justifiable to all reasonable citizens, and thus fails its own test of legitimacy. And this, critics conclude, undermines the public reason liberal project. This article argues that answering the self-defeat objection to public reason liberalism requires fundamentally rethinking prevailing accounts of the Public Justification Principle’s role. My aim is to develop an account of the Public Justification Principle that vindicates its coherence and moral appeal in the face of reasonable disagreement.  相似文献   
9.
In this paper, I describe and discuss the complexities of being a therapist in a maximum security forensic psychiatric hospital, working with patients who have committed acts of serious violence, and who also suffer from severe mental illness and personality disorders. I suggest that profound disturbances in the patient's inner world get played out in triangular disputes between the patient, the therapist and other professionals working in the hospital. I also describe how real events in the life of the institution impact on the therapeutic process, and the importance for the therapist of reflection on the ‘other 23 hours’ that the patient lives outside of therapy. Finally, I raise some ethical dilemmas that arise for therapists working in such settings, where the stated therapeutic aim is not only treatment but also the containment and prevention of future violence.  相似文献   
10.
Journal of Child and Family Studies - Bullying and cyberbullying prevention remain a major priority for schools, communities, and families, and research is clear that positive, constructive...  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号