首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   20篇
  免费   1篇
  2021年   2篇
  2020年   1篇
  2015年   1篇
  2014年   2篇
  2013年   2篇
  2009年   2篇
  2008年   6篇
  2007年   3篇
  2002年   1篇
  1988年   1篇
排序方式: 共有21条查询结果,搜索用时 15 毫秒
1.
The degree of being conscious about privacy for the self and others is known as privacy consciousness. This study aimed to compare privacy consciousness between younger and older adults. Japanese younger (n = 166) and older (n = 145) adults were requested to rate all items in the Privacy Consciousness Scale, which assessed their degree of consciousness about privacy for the self and others and behaviors for maintaining privacy based on this consciousness. Results indicated that older adults scored lower on Consciousness Regarding Privacy of Others and higher on Behaviors Regarding Privacy of Others than younger adults. However, no significant difference was found in Consciousness and Behaviors Regarding Privacy of the Self between younger and older adults.  相似文献   
2.
This article considers the question of whether it is meaningful to speak of privacy rights in public spaces, and the possibility of such rights framing the basis for regulating or restricting the use of surveillance technologies such as closed circuit television (CCTV). In particular, it responds to a recent article by Jesper Ryberg that suggests that there is little difference between being watched by private individuals and CCTV cameras, and instead argues that state surveillance is qualitatively different from (and more problematic than) surveillance by ‘lonely old ladies’.
Benjamin GooldEmail:
  相似文献   
3.
In U.S. v. American Library Association (2003), the Supreme Court upheld the Child Internet Protection Act (CIPA), which mandated that libraries receiving federal funding for public Internet access install content-filtering programs on computers which provide that access. These programs analyze incoming content, and block the receipt of objectionable material, in particular pornography. Thus, patrons at public libraries are protected from unintentionally (or intentionally) accessing objectionable material, and, in the case of minors, from accessing potentially damaging material. At least, that is the official story. In this paper, I develop three points. (1) I argue that CIPA and ALA are better read as examples of the enforcement of a regime of normative sexuality. The question of minors accessing pornography is only relevant to the official story insofar as it provides a rhetorically persuasive example of deviance from that normative regime. CIPAs full target includes information about topics such as homosexuality and contraception. (2) Rather than (or in addition to) punishing deviances directly, CIPA attempts to constitute a “public” in which such deviancy can never occur in the first place. Hence, the designation of a “public” space serves to domesticate alternative sexualities and to sanitize that space of sexual difference. (3) This interaction at the border of the public and private spheres offers an opportunity to reflect on and underscore the ways that subject formation and subjectivity are mediated through technological artifacts like the Internet.
Gordon HullEmail:
  相似文献   
4.
Connected and Autonomous Vehicles (CAVs) constitute an automotive development carrying paradigm-shifting potential that may soon be embedded into a dynamically changing urban mobility landscape. The complex machine-led dynamics of CAVs make them more prone to data exploitation and vulnerable to cyber attacks than any of their predecessors increasing the risks of privacy breaches and cyber security violations for their users. This can adversely affect the public acceptability of CAVs, give them a bad reputation at this embryonic stage of their development, create barriers to their adoption and increased use, and complicate the business models of their future operations. Therefore, it is vital to identify and create an in-depth understanding of the cyber security and privacy issues associated with CAVs, and of the way these can be prioritised and addressed. This work employs 36 semi-structured elite interviews to explore the diverse dimensions of user acceptance through the lens of the well-informed CAV experts that already anticipate problems and look for their solutions. Our international interviewee sample represents academia, industry and policy-making so that all the key stakeholder voices are heard. Thematic analysis was used to identify and contextualise the factors that reflect and affect CAV acceptance in relation to the privacy and cyber security agendas. Six core themes emerged: awareness, user and vendor education, safety, responsibility, legislation, and trust. Each of these themes has diverse and distinctive dimensions and are discussed as sub-themes. We recommend that mitigating the cyber security and privacy risks embedded in CAVs require inter-institutional cooperation, awareness campaigns and trials for trust-building purposes, mandatory educational training for manufacturers and perhaps more importantly for end-users, balanced and fair responsibility-sharing, two-way dynamic communication channels and a clear consensus on what constitutes threats and solutions.  相似文献   
5.
The purpose of this study was to examine differences in self‐disclosure goals, privacy concerns, and self‐disclosure characteristics between Facebook and Twitter. These sites were compared in terms of audience representations, based on structural cues that suggest potential audiences for a user. We conceptualized audience representations in 2 ways: based on privacy boundaries that imply bounded versus unbounded audiences, and on network characteristics such as size and diversity for audiences within the boundary. Results revealed that self‐disclosure goals, privacy concerns, and self‐disclosure intimacy were different depending on the privacy boundary. Network characteristics were also important, but effects were moderated by the privacy boundary type, suggesting a complex interplay between the 2 types of audience representations in shaping self‐disclosure in social media.  相似文献   
6.
This study summarizes the development and validation of a multidimensional privacy orientation scale designed for measuring privacy attitudes of Social Network Site (SNS) users. Findings confirm the existence of four dimensions: (1) belief in the value of “privacy as a right”; (2) “other-contingent privacy”; (3) “concern about own informational privacy” and (4) “concern about privacy of others.” Moreover, a segmentation of SNS users based on these attitude scores reveals three types of users: (1) privacy advocates, who are concerned about both their own and other people’s privacy; (2) privacy individualists, who are concerned mostly about their own privacy, and (3) privacy indifferents, whose score on all dimensions are lower than other segments. The results indicate that the four privacy orientation dimensions and three user segments predict key differences in terms of privacy protective behavior, information disclosure, and viewing personal information of others.  相似文献   
7.
Access to other minds once presupposed other individuals’ expressions and narrations. Today, several methods have been developed which can measure brain states relevant for assessments of mental states without 1st person overt external behavior or speech. Functional magnetic resonance imaging and trace conditioning are used clinically to identify patterns of activity in the brain that suggest the presence of consciousness in people suffering from severe consciousness disorders and methods to communicate cerebrally with patients who are motorically unable to communicate. The techniques are also used non-clinically to access subjective awareness in adults and infants. In this article we inspect technical and theoretical limits on brain–machine interface access to other minds. We argue that these techniques hold promises of important medical breakthroughs, open up new vistas of communication, and of understanding the infant mind. Yet they also give rise to ethical concerns, notably misuse as a consequence of hypes and misinterpretations.  相似文献   
8.

Detection of deception and confirmation of truth telling with conventional polygraphy raised a host of technical and ethical issues. Recently, newer methods of recording electromagnetic signals from the brain show promise in permitting the detection of deception or truth telling. Some are even being promoted as more accurate than conventional polygraphy. While the new technologies raise issues of personal privacy, acceptable forensic application, and other social issues, the focus of this paper is the technical limitations of the developing technology. Those limitations include the measurement validity of the new technologies, which remains largely unknown. Another set of questions pertains to the psychological paradigms used to model or constrain the target behavior. Finally, there is little standardization in the field, and the vulnerability of the techniques to countermeasures is unknown. Premature application of these technologies outside of research settings should be resisted, and the social conversation about the appropriate parameters of its civil, forensic, and security use should begin.  相似文献   
9.
A great deal of progress has been made on information ethics. Which portion is not sufficient? That might be the comparison from countries to countries. The purpose of this study was closely examined using the cross-cultural method for comparison. To determine the ethics cognitions and behaviors of the students, a comprehensive survey was distributed. The questionnaire for the study used Mason’s four essential factors in information ethics that included Privacy, Accuracy, Property and Accessibility (PAPA). The samples were comprised of Kaohsiung Taiwan and Nanjing China, junior high school students in 2006. The sample and the survey were obtained from two stages of random sampling that was conducted using an Internet website. Students could read the online questionnaire in the computer laboratory and then send immediate feedback to the website server. The result of the experiment showed the divergence of information ethics in cognition and behavior between Kaohsiung and Nanjing school children. The effects of background and correlation are from cognition and behavior between two regions.  相似文献   
10.
Biobank research and the right to privacy   总被引:1,自引:0,他引:1  
What is privacy? What does privacy mean in relation to biobanking, in what way do the participants have an interest in privacy, (why) is there a right to privacy, and how should the privacy issue be regulated when it comes to biobank research? A relational view of privacy is argued for in this article, which takes as its basis a general discussion of several concepts of privacy and attempts at grounding privacy rights. In promoting and protecting the rights that participants in biobank research might have to privacy, it is argued that their interests should be related to the specific context of the provision and reception of health care that participation in biobank research is connected with. Rather than just granting participants an exclusive right to or ownership of their health information, which must be waived in order to make biobank research possible, the privacy aspect of health information should be viewed in light of the moral rights and duties that accompany any involvement in a research based system of health services.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号