首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 15 毫秒
1.
Abstract

The Internet has provided an expansive environment that enhances many existing teaching and learning approaches while facilitating new activities that are free of traditional constraints. As a result of the potential for instantaneous interaction without regard for geographic, political, racial, social, and gendered borders, an increased amount of activity is taking place online. In school settings, the need to regulate behaviors in cyberspace and minimize potential and actual risks to children has necessitated some governance over harmful interactions. Two recent cases in the United States will illustrate the emerging struggles of school systems to ensure the safety of youth online.  相似文献   

2.
Abstract

The social and cultural communities of the Internet provide a virtual venue with unique perspectives on power, identity, and gender. This paper presents an overview of the benefits and risks of Web-based interactions for youth. As an illustrative example, the psychosocial effects of online grooming practices which are designed to lure and exploit children are discussed. Constructive solutions and a plan of action which foster protective and productive learning experiences are explored.  相似文献   

3.
Abstract

By using data collected via Web-based trend analysis regarding the identification of next-visited Internet sites, this article helps to identify the specific privacy issues children face while exploring child-oriented and adult-oriented Websites. As use of the Internet has escalated dramatically, the complexity, criticality, and pervasiveness of technological issues have also risen. The protection of personal privacy (especially for children) is a prime example of the new issues presented by the expansion of the information age.  相似文献   

4.
Abstract

This article discusses issues related to off-campus, harmful student speech on the Internet. The article explores the characteristics of this harmful speech, including (a) the speech originates off-campus. It has been created and disseminated without the use of school computers or Internet capabilities; (b) the speech has a school nexus. The speech relates to the district, the school, board members, administrators, teachers, or other students; (c) the speech is defamatory, constitutes bullying, harassment, or discrimination, discloses personal information, or contains offensive, vulgar, or derogatory comments; (d) the speech may occur in a variety of Internet locations. It may appear on a student-created Website, material posted to a Web log (“blogs”), or may be disseminated via some form of Internet communication, including e-mail, bulletin boards, chat, instant messaging and the like; and (e) the creator and disseminator of such speech is or appears to be a student.  相似文献   

5.
Abstract

Violence prevention requires a broad focus. Several multimedia-enhanced, psychological education courses that are capable of Internet delivery have been developed at Arizona State University and at KnowConfhct, LLC. These interactive interventions have evolved from earlier work on simulations and computer-based learning; however, they incorporate recent technological advances and current psychological research in areas such as differential diagnosis, observational learning, and cognitive restructuring. They specifically address changing the irrational beliefs that mediate low self-esteem and occupational stereotyping, educating parents on practices affecting the career outcomes of their children, and altering attributions relevant to academic motivation and performance. Although all of these psychological education curricula are relevant to violence prevention, and all have been subjected to continuing conceptual and empirical scrutiny, the most recent project deals directly with enhancing the conflict management skills of our nation's youth.  相似文献   

6.
Abstract

Experience in Ionia county and Newaygo county in developing prevention services is described. These efforts, starting with needs assessment, illuminate principles underlying a community model for prevention services.  相似文献   

7.
互联网金融对传统金融模式影响研究   总被引:1,自引:0,他引:1  
井凯 《青年论坛》2014,(4):118-121
随着互联网信息技术和移动通讯业务的飞快进步,互联网金融模式在中国兴起并迅速发展。互联网金融是由电子商务企业提供的网络支付结算、网络融资、网络保险、网络理财等金融服务。与传统金融服务相比,互联网金融在产品设计、服务模式和参与主体三方面实现了创新。互联网金融将改变传统金融机构经营方式、竞争理念,进而重塑传统金融生态模式。本文探讨了互联网金融模式给传统金融模式带来的种种机遇及挑战,并提出互联网金融的发展趋势及其建议。  相似文献   

8.
A46-member China Tibet Art Troupe orga-nized and sent by the CPAFFC and headedby Chonpel, vice chairman of the Tibet Au-tonomous Regional Government, with TsedenDolma, well-known singer and vice chairpersonof the Tibet Autonomous Regional Committee ofthe Chinese People's Political Consultative Con-ference, as chief art supervisor, made a perfor-mance tour in Australia and New Zealand fromJune 11 to June 26, 1999. The Troupe gave fiveformal performances, one informal performance,eight small-scale performances at get-togethersattracting an audience of over 10,000 people in  相似文献   

9.
<正>Avoiding the mistakes of the east creates challenges and opportunities for the west An automobile factory near Yinchuan in northwest China’s Ningxia Hui Autonomous Region stands vacant among a number of busy newly built plants. After producing only four  相似文献   

10.
文章在公安教育体制改革的大背景下,基于当前税侦教学中普遍采用的"案情简介"训练模式实战吻合度低的现状,通过总结"案情简介"训练模式的弱点并结合税侦实践和教学规律提出了一套紧密贴近实战的训练方案——"税案卷宗研析"。该套训练方案内容主要包括:真实税案卷宗浏览、证据识别与分类、证据合法性与关联性分析、证据证明力研判、证据相互印证度研判、取证来源与取证方法讨论、基于证据的案件法律事实构建以及相关法律文书的撰写。  相似文献   

11.
网络犯罪已涉及绝大部分社会犯罪现象,成为了一个不容忽视的社会问题.因此,必须密切关注网络犯罪发展的新态势,积极采取有效的措施予以防控,保障互联网的安全.  相似文献   

12.
一些地区已逐步探索和形成了各具特色的农村建设与农业发展模式,诸如:分类规划建设模式;农业企业化模式;村企联合体模式;村村联合模式;生态村建设模式等.各地可以结合自己的实际正确进行模式选择,为新农村建设提供路径和方向.  相似文献   

13.
随着世界各地城市化步伐地加快,城市中无业、失业及低收入人口的不断增长成为城市化进程中不能避免的问题。大量的流动人口也使得各种非法小广告、城市涂鸦大量出现,让城市的市容环境管理者们大伤脑筋。  相似文献   

14.
重大公共卫生事件的突发使各类犯罪现象出现新特点和新趋势,不仅表现在犯罪类型结构的骤变,更体现在犯罪数量较以往的显著差异上。针对此次疫情,及时总结归纳并建立基于突发事件社会环境下的犯罪预测模型成为警务情报部门工作研究的重点。以犯罪预防学中的“犯罪三角”理论范式为基础,根据此次突发公共卫生事件中各类犯罪呈现出的特点,综合评估预测犯罪管理者、犯罪监管者、犯罪操训者三类犯罪防控主体在诸多疫情防控措施作用下的犯罪防控效能。建立基于突发事件的犯罪防控效能评估预测模型,可在一定程度上弥补传统犯罪预测中因突发事件等特定环境变化带来的预测盲区,还可通过预测结果,为各类疫情防控措施提供有力保障。  相似文献   

15.
16.
当前腐败的新动向及防治对策   总被引:1,自引:0,他引:1  
当前,腐败现象在某些方面、某些领域仍然十分严重,并且出现了一些新的特点、新的动向,增加了反腐斗争的难度。准确把握当前腐败现象的新特点、新动向,对于我们有效地开展反腐斗争,遏制腐败现象的蔓延,有着十分重要的意义。  相似文献   

17.
网络入侵及其防范   总被引:1,自引:1,他引:1  
随着网络社会的发展,计算机网络犯罪已成为制约网络健全发展的主要因素。文章通过对计算机网络入侵方法与手段的分析,提出一些防范措施和侦查取证方法。  相似文献   

18.
新西兰是联合国《禁止酷刑和其他残忍、不人道或有辱人格的待遇或处罚公约任择议定书》(OPCAT)签署国中实施公约较为成功的典范之一,其国家预防酷刑机构(NPM)体系的设置主要体现为中央协调机构领导下的多部门分工协作模式;工作报告是反映NPM羁押场所巡查工作及相关活动的主要形式。借鉴新西兰的经验,我国在准备加入OPCAT的过程中,应建立起较为独立的巡视机构体系,科学设置巡视程序与配套制度,并通过宣传引起社会关注。  相似文献   

19.
新时代网络意识形态的风险防范与实践逻辑   总被引:1,自引:0,他引:1  
卢岚 《湖湘论坛》2021,34(1):54-64
网络空间作为思想激荡的前沿阵地,是马克思主义与各种社会思潮的必争之地。网络意识形态风险防范不是要隔绝网络空间,而是要从网络意识形态的议题设置切入,因为网络意识形态的议题设置既关乎网络意识形态的走势,也影响着网络主体的价值选择。网络的开放性、交互性和无边界性等特质,使得网络空间各种社会思潮肆虐;我国网络意识形态既面临着各种势力的渗透,也面临着资本扩张和数字空间的挤压风险。维护新时代网络意识形态安全,既要坚持人民至上的议题设置红线、衔接“在场空间”与“缺场空间”身份,从而夯实主流意识形态阵地;又要把意识形态话语表达拉回日常生活、贯通官方与民间两个舆论场的“话语空间”,从多维度构建新时代网络意识形态话语权。  相似文献   

20.
随着互联网的发展,制售假冒注册商标的商品犯罪已经成为世界各国共同面临的难题。跨境制售假冒注册商标的商品犯罪隐蔽性高、监管难度大、犯罪成本低、跨境执法难,使打击此类犯罪的难度增加。在强化知识产权保护的今天,我国需要加强知识产权保护体系建设,探索警企协作的有效模式,完善相关立法,加大制假、售假行为的刑罚力度,推进国际执法合作机制的建设。  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号