首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   10篇
  免费   0篇
  2021年   1篇
  2020年   2篇
  2018年   2篇
  2016年   1篇
  2013年   2篇
  2008年   1篇
  1994年   1篇
排序方式: 共有10条查询结果,搜索用时 15 毫秒
1
1.
Recent studies have made great strides looking at the implications that the human need for ontological security has for politics and International Relations. However, less attention has been paid to how actors might target this need. While Steele and Mattern both examine the possible manipulation of subjectivity, this article turns to the concept of information warfare (IW) to broaden the view of how, and to what end, this is pursued. Congruently, by elaborating upon how the digitalization of society has increased the potential to influence and manipulate cognition and emotion, OS strengthens current literature on IW. It argues that by covertly perverting the information landscape, IW can alter how events are connected to national narratives, influencing policy by making certain options appear more/less shameful, or it can unravel the bonds of society by polarizing domestic narrative debates, purposely sowing ontological insecurity. This provides a firmer understanding of the strategic implications interference can have generally and of Russia's interference into the 2016 U.S. election specifically. Therefore, by viewing facets of IW as part of a range of tactics employed to manipulate/undermine subjectivity, a more nuanced understanding of interstate relations subsequently emerges.  相似文献   
2.
Cyber dating abuse is a new kind of dating violence. Several recent measures assess this phenomenon, but do not focus on a severe aggression that aims to spoil a partner’s relational network (relational cyber abuse). This study developed and validated the Cyber Dating Violence Inventory (CDVI) with 1405 adolescents and young adults (Mage = 18.17; SDage = 2.39; 65.1% females), an instrument that considers the relational dimension of online dating abuse. Exploratory and confirmatory factor analyses found two correlated factors (Psychological and Relational) for both perpetration and victimization, showing good reliability. CDVI factors were positively correlated with offline dating violence, showing good criterion validity. This instrument has clinical and educational implications.  相似文献   
3.
Abstract. Religious traditions enable ancestors to encourage proper social behavior in their distant descendants. Although traditional myths and rituals can provide basic values, these values must be interpreted in light of the specific circumstances encountered by later generations. In tribal societies the task of interpreting religious traditions falls upon religious leaders known as shamans. Shamans, perhaps universally, are claimed to obtain instructions from dead ancestors on how to deal with social disruptions. This paper argues that a focus on the more exotic aspects of shamanism has kept previous studies from realizing the crucial role of shamans as interpreters of religious traditions.  相似文献   
4.
Connected and Autonomous Vehicles (CAVs) constitute an automotive development carrying paradigm-shifting potential that may soon be embedded into a dynamically changing urban mobility landscape. The complex machine-led dynamics of CAVs make them more prone to data exploitation and vulnerable to cyber attacks than any of their predecessors increasing the risks of privacy breaches and cyber security violations for their users. This can adversely affect the public acceptability of CAVs, give them a bad reputation at this embryonic stage of their development, create barriers to their adoption and increased use, and complicate the business models of their future operations. Therefore, it is vital to identify and create an in-depth understanding of the cyber security and privacy issues associated with CAVs, and of the way these can be prioritised and addressed. This work employs 36 semi-structured elite interviews to explore the diverse dimensions of user acceptance through the lens of the well-informed CAV experts that already anticipate problems and look for their solutions. Our international interviewee sample represents academia, industry and policy-making so that all the key stakeholder voices are heard. Thematic analysis was used to identify and contextualise the factors that reflect and affect CAV acceptance in relation to the privacy and cyber security agendas. Six core themes emerged: awareness, user and vendor education, safety, responsibility, legislation, and trust. Each of these themes has diverse and distinctive dimensions and are discussed as sub-themes. We recommend that mitigating the cyber security and privacy risks embedded in CAVs require inter-institutional cooperation, awareness campaigns and trials for trust-building purposes, mandatory educational training for manufacturers and perhaps more importantly for end-users, balanced and fair responsibility-sharing, two-way dynamic communication channels and a clear consensus on what constitutes threats and solutions.  相似文献   
5.
6.
Olweus raises some important issues, but I argue that he underestimates the impact of cyberbullying on a research programme that he has done so much to promote. Cyberbullying has a number of distinctive features that differentiate it from traditional bullying. Cyberbullying provides a new challenge to the hard core (definitional criteria separating bullying from aggression). It also provides opportunities, in terms of a broader disciplinary base, greater permeability of age and context barriers, and new theoretical possibilities.  相似文献   
7.
Online therapy and supervision, a rapidly rising practice in couple and family therapy, has been the subject of a growing body of literature. From its early days, family therapy training has included live supervision, which has typically been conducted by a supervisor and a team of trainees situated on the other side of a one-way mirror. With the outbreak of the COVID-19 global pandemic, we—the staff of supervisors at the Barcai Institute in Tel Aviv, Israel—were compelled to find solutions to continue meeting with clients and to provide supervision for family therapy trainees. To this end, we have shifted our live supervision courses (“practicums”) to the virtual arena, adapting the popular application “Zoom” into what we call “PractiZoom.” Based on over 100 PractiZoom sessions conducted between March and May 2020, involving 14 supervisors and 28 therapists-in-training and their clients, the article reflects on this pioneering online practicum for the online live supervision of therapists with geographically distributed participants. In this article, we outline our operational methods and adaptations for conducting live behind-the-mirror supervision online. Following a short theoretical background, we outline the process of online live supervision, discuss our reflections and those of our trainees on the challenges and possibilities it poses, and offer a number of preliminary conclusions and recommendations.  相似文献   
8.
ABSTRACT

Among the most diverse and indigenous areas of the world is Latin America, specifically the Amazon river basin and its rain forests. Indigenous tribes and indigenous healing practices from these areas have recently gained more attention and popularity. However, less is known about experiences of tribal women related to indigenous practices, including the long-standing legacy of patriarchal and Christian colonization. This contribution offers the voice of one of the few known women-shamans in the area: Hushahu of the Yawanawa tribe. This first full public interview in a Western publication provides not only a perspective on indigenous healing, but also on experiences of indigenous tribal women in light of their history of colonization and oppression.  相似文献   
9.
This paper explores cyber shamans in the neoliberalised Korea. As new media technologies evolved, Korean shamans leaped at an opportunity of the new media technologies in ways to redeem themselves. I used the term ‘redeem’ here because historically shamans in Korea have been demonised by the ruling power for more than 500 years and therefore even in the modern times they were perceived as ‘weird money suckers with false magic’. For this reason, the inherited dynamics of shamanism embedded in the culture were not appropriately considered. In the process of becoming cyber shamans, Korean shamans have cleverly utilised the new media and started making their presence known. Articulation of the inherited shamanic dynamic in response to the neoliberal media environment can help us to assess the various influences of the neoliberalised economic and political environment on Korean society.  相似文献   
10.
The Dynamics of Cyber China: The Characteristics of Chinese ICT Use   总被引:2,自引:1,他引:1  
This paper provides a preliminary examination of the use of information and communication technologies (ICTs)—limited to mobile phone and internet use—in contemporary China. Based on fieldwork undertaken since 2003 in Guangzhou and Beijing, the paper focuses on the relationship between society and technology in the Chinese cultural context. An analysis of the data on ICT use in China shows how Chinese cultural traits and the speed of the ICT evolution in China have combined to bring about a unique cyber experience. This analysis may be helpful to other scholars who wish to compare the impact of ICTs in various cultures or who are interested in discovering how Mainland China went ‘cyber’.
Wai-chi Rodney ChuEmail:
  相似文献   
1
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号