Inf. Soc.最新文献

筛选
英文 中文
New IT and Social Inequality: resetting the research and Policy Agenda 新信息技术与社会不平等:重置研究和政策议程
Inf. Soc. Pub Date : 2000-03-01 DOI: 10.1080/019722400128347
Rubin Patterson, E. J. Wilson
{"title":"New IT and Social Inequality: resetting the research and Policy Agenda","authors":"Rubin Patterson, E. J. Wilson","doi":"10.1080/019722400128347","DOIUrl":"https://doi.org/10.1080/019722400128347","url":null,"abstract":"Are new Information and Communication Technologies (ICTs) such as the Internet and the World Wide Web a boon to poor countries and poor people around the globe, enabling them to leapfrog their underdevelopment and become equal partners in an emerging global order? Or, have the new technologies , introduced into an asymmetric global system, already become an engine of greater social inequality? There are few questions more important to the evolution of the global system, and few questions on which there is less agreement. Yes, the new ICTs are unequivocally an engine of inequality, according to the highly respected UN Development Program’s (UNDP) annual publication, “The Human Development Report.” The UNDP Ž nds that, “The Internet is contributing to an ever-widening gap between rich and poor which has now reached ‘grotesque’ proportions” (UNDP Press Release, 12 July 1999, p. 1). But according to the highly respected annual “World Development Report” (WDR) of the World Bank the new ICTs are quite positive and have tremendous equalizing potential. The WDR points to dozens of stories showing that telemedicine, distance education, and falling ICT costs are having positive and dramatic impacts on the growth prospects of poor people and poor countries (Knowledge for Development, World Development Report, 1998/99). It seems that for the World Bank, the glass is more than half-full. For the UNDP, it is less than half-empty. If one thing is clear, it is that highly contested questions have bubbled to the surface regarding the impacts of the new ICTs on the poor. It is precisely at such moments that research and scholarship can make a valuable global contribution . For example, researchers can rephrase the World Bank-UNDP dispute as follows: “What will it take for countries and international organizations to achieve the positive outcomes described by the Bank and avoid the negative consequences described by the UNDP?” And,","PeriodicalId":259468,"journal":{"name":"Inf. Soc.","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2000-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129951128","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 47
Gender Identification, Interdependence, and Pseudonyms in CMC: Language Patterns in an Electronic Conference CMC中的性别认同、相互依存与假名:电子会议中的语言模式
Inf. Soc. Pub Date : 1999-11-01 DOI: 10.1080/019722499128385
J. M. Jaffe, Young-Eum Lee, Li-Ning Huang, H. Oshagan
{"title":"Gender Identification, Interdependence, and Pseudonyms in CMC: Language Patterns in an Electronic Conference","authors":"J. M. Jaffe, Young-Eum Lee, Li-Ning Huang, H. Oshagan","doi":"10.1080/019722499128385","DOIUrl":"https://doi.org/10.1080/019722499128385","url":null,"abstract":"A quasi-experimental study examines how pseudonymous identification in a computer-mediated communication (CMC) context might (1) reflect a motivation for gender-based status parity and (2) mitigate supposed gender-based communication differences associated with social interdependence. One hundred and fourteen undergraduate students were assigned to participate in one of two separate computer-based, bulletin-board-style discussion groups or \"forums\". In one forum, participants were identified by their real names while participants in the other were identified by self-chosen pseudonyms. Consistent with expectations, analyses of conference transcripts and pseudonym choices indicated that (1) women tended to mask their gender with their pseudonym choice while males did not, and (2) women in both forums generally tended to exhibit certain dimensions of social interdependence more frequently than men. These dimensions included references to others, references to self, and supporting statements. Contrary to expe...","PeriodicalId":259468,"journal":{"name":"Inf. Soc.","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1999-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122360157","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 55
National Identities and Communication Technologies 国家身份和通信技术
Inf. Soc. Pub Date : 1999-11-01 DOI: 10.1080/019722499128394
M. Poster
{"title":"National Identities and Communication Technologies","authors":"M. Poster","doi":"10.1080/019722499128394","DOIUrl":"https://doi.org/10.1080/019722499128394","url":null,"abstract":"","PeriodicalId":259468,"journal":{"name":"Inf. Soc.","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1999-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115484368","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 42
Web Security and Privacy: An American Perspective 网络安全和隐私:一个美国人的视角
Inf. Soc. Pub Date : 1999-11-01 DOI: 10.1080/019722499128411
L. Camp
{"title":"Web Security and Privacy: An American Perspective","authors":"L. Camp","doi":"10.1080/019722499128411","DOIUrl":"https://doi.org/10.1080/019722499128411","url":null,"abstract":"Browsing the Web gives one the heady feeling of walking without footprints in cyberspace. Yet data surveillance can be both ubiquitous and transparent to the user. Can those who browse the Web protect their privacy? And does it matter if they cannot? I offer answers to these questions from the American legal tradition. The American legal tradition focuses on a right to privacy, rather than a need for data protection. To answer these questions I begin by delineating the differences among privacy, security, and anonymity. I then discuss what information is transferred during Web browsing. I describe some of the available technology for privacy protection, including public and private key cryptography and Web proxies. I then describe the American tradition of privacy in common, statutory, and constitutional law. With the support of this tradition, I close by arguing that although privacy in Web browsing has no current legal protection in the United States, the right to privacy in the analogue equivalents has...","PeriodicalId":259468,"journal":{"name":"Inf. Soc.","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1999-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122744040","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 49
The Virtual Game: Objects, groups, and games in the Works of Pierre Lévy 虚拟游戏:Pierre l忧郁作品中的对象、群体和游戏
Inf. Soc. Pub Date : 1999-11-01 DOI: 10.1080/019722499128439
R. Day
{"title":"The Virtual Game: Objects, groups, and games in the Works of Pierre Lévy","authors":"R. Day","doi":"10.1080/019722499128439","DOIUrl":"https://doi.org/10.1080/019722499128439","url":null,"abstract":"This article critically engages the theme of the game as a model for identity, community, and the meaning and function of objects in a recent work by Pierre Levy. Two of Levy's books have recently appeared in English translation, making this a timely moment to return to this theme that resonates throughout cultural modernity, especially in the areas of business, the military, sports, and, of course today, in digital software and network design.","PeriodicalId":259468,"journal":{"name":"Inf. Soc.","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1999-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126897505","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Face-to-Face and Computer-Mediated Communities, A Comparative Analysis 面对面和计算机媒介社区的比较分析
Inf. Soc. Pub Date : 1999-11-01 DOI: 10.1080/019722499128402
Amitai Etzioni, Oren Etzioni
{"title":"Face-to-Face and Computer-Mediated Communities, A Comparative Analysis","authors":"Amitai Etzioni, Oren Etzioni","doi":"10.1080/019722499128402","DOIUrl":"https://doi.org/10.1080/019722499128402","url":null,"abstract":"In this article we combine the perspectives of sociology and computer science to compare face-to-face (f2f) and computer-mediated communications (CMC) from the viewpoint of their respective abilities to form and sustain communities. We also identify a third type of community-a hybrid-that is based on a combination of faceto-face (f2f) and CMC, or off- and online communications. The article thus in effect addresses an oft-asked question: Can virtual communities be \"real\", have the same basic qualities as f2f communities? The article is exploratory, because much of the necessary evidence has not yet been generated, and the relevant technologies are rapidly changing.","PeriodicalId":259468,"journal":{"name":"Inf. Soc.","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1999-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129755525","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 295
Tocqueville in Cyberspace: Using the Internet for Citizen Associations 网路空间中的托克维尔:利用网际网路进行公民社团
Inf. Soc. Pub Date : 1999-11-01 DOI: 10.1080/019722499128376
H. Klein
{"title":"Tocqueville in Cyberspace: Using the Internet for Citizen Associations","authors":"H. Klein","doi":"10.1080/019722499128376","DOIUrl":"https://doi.org/10.1080/019722499128376","url":null,"abstract":"Political theorists like Alexis de Tocqueville have long recognized the importance of citizen associations for the practice of democracy. Through participation in associations, citizens both receive an education in public affairs and create centers of political power independent of the state. Essential to participation in an association is participation in a forum, a communication space that allows for many-to-many communication in which citizens can \"treat of public affairs in public\" (Tocqueville, 1945, p. 109). Participation in forums suffers from numerous barriers, however, such as the need to meet in one common place, the need to meet at one common time, and the potentially high costs of participation. Online forums on the Internet avoid many of these barriers, and thus they hold the promise of facilitating the formation and operation of citizen associations. This was confirmed in 1995 by the experiences of a Boston-based citizen association, the Telecommunication Policy Roundtable-Northeast (TPR-NE)...","PeriodicalId":259468,"journal":{"name":"Inf. Soc.","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1999-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125242418","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 153
Information Warfare: Its Application in Military and Civilian Contexts 信息战:在军事和民用语境中的应用
Inf. Soc. Pub Date : 1999-11-01 DOI: 10.1080/019722499128420
B. Cronin, H. Crawford
{"title":"Information Warfare: Its Application in Military and Civilian Contexts","authors":"B. Cronin, H. Crawford","doi":"10.1080/019722499128420","DOIUrl":"https://doi.org/10.1080/019722499128420","url":null,"abstract":"The AA. consider four spheres of activity in which information warfare may very soon become relatively commonplace: military, corporate/economic, community/social, and personal. The intention is to provide an analytic framework for understanding key dimensions of information warfare and some of the myriad social ramifications arising from the co-option of internetworking technologies for the conduct of IW campaigns, be they military or civil, collective or indivisualistic, systematic or aleatory in character","PeriodicalId":259468,"journal":{"name":"Inf. Soc.","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1999-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129877630","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 57
Feminist Rhetoric in Cyberspace: The Ethos of Feminist Usenet Newsgroups 网络空间中的女权主义修辞:女权主义新闻组的气质
Inf. Soc. Pub Date : 1999-08-01 DOI: 10.1080/019722499128493
Christine Ann Nguyen Fredrick
{"title":"Feminist Rhetoric in Cyberspace: The Ethos of Feminist Usenet Newsgroups","authors":"Christine Ann Nguyen Fredrick","doi":"10.1080/019722499128493","DOIUrl":"https://doi.org/10.1080/019722499128493","url":null,"abstract":"Users of the Internet are stripped of voice inflections, body language, and other common cues of conversation-only their words are left. Some claim that the lack of these social cues and the lack of hierarchy in the structure of the Internet provide the potential for equality in cyberspace. Many others have shown, though, that the issues of power in cyberspace are similar to the issues of power in physical space. This article examines an intersection of feminism and cyberspace in the ethos of online discussion. It is a rhetorical analysis of two popular feminist newsgroups, alt.feminism and soc.feminism. Do these newsgroups create a feminist and inclusive space online? What are the rhetorical strategies that make an online space more or less inclusive of women? Usenet newsgroups reveal the rhetorical power of these bare words. Although no formal means of discrimination is built into Usenet newsgroup discussions, discrimination does occur through the subtle and not so subtle use of language. This article l...","PeriodicalId":259468,"journal":{"name":"Inf. Soc.","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1999-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116676936","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 28
Communication Gone Wired: Working Toward a "Practiced" Cyberfeminism 通讯连线化:迈向“实践”的网络女权主义
Inf. Soc. Pub Date : 1999-08-01 DOI: 10.1080/019722499128501
S. Gruber
{"title":"Communication Gone Wired: Working Toward a \"Practiced\" Cyberfeminism","authors":"S. Gruber","doi":"10.1080/019722499128501","DOIUrl":"https://doi.org/10.1080/019722499128501","url":null,"abstract":"This article complicates concepts of gender and race in virtual environments by presenting a case study of an African American woman's (Celie's) on-line personalities. It discusses how one woman's presence in a college class and her on-line contributions to a (cyber)community of peers influenced her and the group's perspectives on violence and gender issues. The article shows that Celie's interactions on a virtual forum are related to and an extension of a multitude of factors such as her upbringing, her schooling, her wish to succeed in an environment often inhospitable and hostile to her needs, and her gendered identity. A close analysis of her on-line voice provides a starting point for cyberfeminists to look more closely at virtual forums and their potential for enhancing student learning, diversity, and multiple perspectives in classroom environments. This article also encourages feminist scholars to continue explorations centered around the multiple discourse strategies employed by participants in any given conversation.","PeriodicalId":259468,"journal":{"name":"Inf. Soc.","volume":"95 2","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1999-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132580123","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信