首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 703 毫秒
1.
At cocktail parties, in board rooms, at workstations, in classrooms, and in government offices, “technology transfer” is bandied about as if it were some natural phenomenon, a technological tsunami overwhelming everything in its path. Technology transfer, it is sometimes suggested, is an El Niño in business, government, industry, and even education decision-making, and for some it has meant disruption, dislocation, and danger. For others, technology transfer has been the vanguard of progress and an inexhaustible fountain of productivity, empowerment, and convenience. For all, “technology transfer” today is too often a personal shortcut in our communication that points to unintended meanings or implications. Just whatis “technology transfer,” anyway? To move beyond knee-jerk advocacy or damnation of technology transfer on the questionable basis of faith, and to lay out a new dimension to the definition, understanding, and acceptance of technology transfer that is clear and understandable to any layman, is the purpose of this paper. It is based on a selective yet careful web search, since the Internet World Wide Web is a principal source for information in the growing debate about public policy issues.  相似文献   

2.
《Justice Quarterly》2012,29(3):655-683

The literature on social movements and deviance has failed to recognize that social movement organizations also promote deviance in society. This oversight stems from a tendency in the dominant paradigm of social movement theory to normalize the activities of these movements by equating their activities with political behavior. Focusing on the modern militia movement, we discuss the explicit and implicit paths through which movements promote deviance and/or criminal behavior. Noting that the movement has both a “defensive” and an “offensive” wing, we find that they promote deviance both through their ideology, which legitimizes deviance, and through their organizational structures, which are unable to control either the actions of those who are part of the movement or the flow of movement-generated information.  相似文献   

3.
Regions can be considered as “regional innovation systems,” but the question of whether and to what extent technology transfer is taking place at this or other (e.g., national and global) levels remains empirical. The theme issue contains a number of case studies of “regional innovation systems” within the European Union. Other papers elaborate on the pros and cons of the systemic approach to the technology transfer processes involved, or make comparisons across regions. In this introduction, the editors discuss the relations between regional policies, technology and innovation policies, and the integration of these different aspects into (potentially regional) systems of innovation. Under what conditions can “technology transfer” be considered as a mechanism of integration at the regional level?  相似文献   

4.
This report reviews technology transfer in light of the Stevenson-Wydler Technology Innovation Act of 1980. Following a brief introduction, a section on “Definitions” explains the several meanings that the phrase “technology transfer” now carries in policy discussions. The next section, on “Passive Technology Transfer”, reviews traditional Department of Defense scientific and technical information programs that relate to technology transfer. A section on “Military Industrial Transfer” examines technology transfer from the Defense Department to private industry, expecially to defense contractors. A section on “The Stevenson-Wydler Act and Active Technology Transfer” describes the principal provisions of the new act and why Congress passed it. The next two sections, on “NASA’s Technology Transfer Program” and “The Federal Laboratory Consortium” outline the two existing Government programs Congress relied upon in developing ideas for the new law. A section on “Implementation of the Stevenson-Wydler Act”, discusses several important issues that must be considered by Navy laboratory management as the new law is put into effect in the Navy. Finally, a brief conclusion emphasizes the major point of the report: That Congress, in passing the Stevenson-Wydler Act, did not fully consider what relationship the new technology transfer programs it was requiring in the Executive Branch should bear to existing programs with similar purposes. If the public interest is to be served, the report argues, the Navy must consciously and carefully determine the proper nature of this relationship.  相似文献   

5.
Transborder data flow and technology transfer issues have a substantial overlap. Transborder data flows represent flows of information with economic and/or cultural value. Electronic access to “know-how”, information, data, etc. is becoming more and more important to technology transfer and sharing. National transborder data flow policies either affect or can themselves be technology transfer policies.  相似文献   

6.
A new type of organization which is explicitly dedicated to technology transfer has emerged in the United States: Companies which manage inventions produced by universities, independent inventors and other creative groups. This paper shows that these “Invention Management Companies” (IMCs) make important and unique contributions to technology transfer on legal issues (e.g., guarding against patent infringements), marketing (e.g., convincing a company to commercialize au invention) and advocating the invention against the organized opposition of established technologies. Given the contributions of IMCs to an emerging system for encouraging innovation (an “Inventive Society”), the paper recommends broadening the role of IMCs as information providers and linking them to incubators and venture capital companies.  相似文献   

7.
Research Summary For more than three decades, the penal harm movement, which involves “get tough” ideology and policies, has held sway over U.S. corrections. Scholars have justifiably detailed and decried this movement, but in so doing, they have also inadvertently contributed to the view that a punitive worldview is hegemonic. In contrast, we detail four major “cracks” in the penal harm movement's dominance: the persistence of rehabilitative public attitudes, the emergence of second thoughts about the wisdom of harsh sanctions, the implementation of progressive programs, and the increasing legitimacy of the principles of effective intervention for guiding correctional practices. Policy Implications Taken together, these “cracks” comprise evidence that ideological space and political will exist to fight the penal harm movement and to map out a more efficacious and progressive response to crime. Because of the persistence of social welfare sentiments and growing challenges to the legitimacy of “get tough” policies, the potential to continue, if not expand, this countermovement is present. Taking advantage of this opportunity, however, will require forfeiting the belief that there is no escape from a punitive future and undertaking systematic efforts to devise correctional strategies that are based on solid science, improve offenders' lives, and protect public safety.  相似文献   

8.
What’s a developing nation? For that matter, what’s technology transfer? When put in the context of exporting and importing technology, the answers are moot. Transfer still turns on how much someone — developed, developing or undeveloped — is willing to pay for the technology, and whether there is an identifiable need that it can satisfy with a minimum of sophistication. The simpler — and cheaper — the better. That may very well become the theme of a new worldwide movement called “appropriate technology”, which, among several other matters, is also discussed in this paper.  相似文献   

9.
Using an experienced-based methodology it is possible to “forecast” high impact trends in technology transfer. The results presented in this paper are based upon historical data, the author's professional experience, R&D trend information and the aggregation of responses from experts drawn from a wide range of organizational sectors. The technology transfer trend forecasts may be useful to professionals and organizations in technology transfer as they examine future opportunities.  相似文献   

10.
物权法草案的若干问题   总被引:16,自引:1,他引:15  
由其第六次审议结果看,物权法草案在如下方面尚需进一步完善:不宜规定“根据宪法,制定本法”;不应废弃“物权法定原则”;不宜规定“野生动物资源属于国家所有”;不宜规定“国有化”措施;承包经营权的期限应统一规定为五十年;不可轻率规定“动产浮动抵押”;“公路、桥梁收费权”和“应收账款”融资,属于典型的“债权转让”,不宜规定在权利质权制度之中。  相似文献   

11.
Drawing on movement framing, collective identity, and mobilization scholarship, this article examines the emergence and potential effects of framing “law as a calling” for the Christian Lawyering community. The article finds that the term should have strong resonance and salience in the broader Christian community. It also finds that because of its interpretive malleability, “law as a calling” has been discussed and actualized in three related, but distinct, ways. That is, “law as a calling” has been conceptualized as requiring Christian Lawyers to turn inward, turn outward by pursuing social justice, and turn outward as a culture warrior. The article argues that while the different interpretations of “law as a calling” address a range of needs required to mobilize potential and existing Christian L/lawyers, the different ideological factions of self‐identifying Christian Lawyers emphasize different understandings of “law as a calling.”  相似文献   

12.

Since the nineteenth and twentieth century, information has been pivotal both in the cultural tradition and then in the economic tradition. While the Fordism economic model and its specialisation requirements originated a simplistic zoning and single-use development approach to the design of a city. It, however, determined a fragmented growth of cities. Inevitably, the zoning as an urban strategy affected the architectural scale. Nevertheless, the idea of information, commercial goods and thereby people freely able to flow through the city allowed architects and urban designer to conceive new types of urban infrastructures. For example, trains, which were designed on the model of urban “arteries and veins.” Over time, the persistence of urban and architectural segmentation has strengthened social and economic inequalities among urban society. In addition, information has played a more vital role in this strengthening process. The technological achievements of the twenty-first century such as information technologies have significantly affected cities. The new informational patterns have provided new ways of designing, and in turn how societies experience cities. These “quantified cities” consist of digital data that dynamically interacts with “quantified human beings.” Consequently, a renewed urban semiotics is established, which is built around an alternate sociological comprehension. Is this new urban semiotics able to heal an ill and divided urban body? The paper will investigate a new concept of “quantified city” based on the notion of “Hyper-Reality,” and its inhabitants who are entering in a “post-human” condition while living in a dynamic urban environment. In particular, the critical analysis will be used as a “tool” for redefining the perception of the city (i.e., the image of the Hyper City) through inhabitants’ (post-humans’) relational patterns which are technologically mediated (i.e., Google Maps, Uber, Instagram, etc.). The more traditional notion of urbanisation is questioned with a focus on how the an urban society is embedded within the digital condition and the notion of a city.

  相似文献   

13.
疫情防控过程中大量进行的政府征用面临着疫情过后补偿机制的落实任务。厘定征用补偿机制的适用范围成为首要课题。就规范框架所展开的征用补偿机制而言,需要排除"名为征用、实为征收"和"由征用转化而成的征收",并特殊处理国有资产的征用问题。在可能扩充的范围上,可以考虑"名为限制性措施、实为征用"和人力、服务等非有形物的征用。同时,征用导致特定主体的额外"特别牺牲",以及在平台经济模式下电商平台是否可能构成新的征用样态,也值得关注。  相似文献   

14.
Promoting industry-wide innovation is a particularly difficult problem of technology transfer because of issues of proprietary information and competition. A promising approach to this problem is network-building through mission-oriented conferences that facilitate communication among those involved in the transfer of technology. This paper defines basic concepts of networking and views mission-oriented conferences as temporary systems. It describes how one mission-oriented conference, the Footwear Technology Symposium, was designed to promote networking. The paper also provides examples of other mission-oriented conferences (including a number of what have been called “research utilization conferences”). The article concludes with a set of recommendations for planners of mission-oriented conferences.  相似文献   

15.
The study examined the extent of transfer of aerospace management techniques that accompanied the movement of personnel. Sixty individuals who were formerly employed in aerospace were questioned regarding the management techniques they had introduced into their current workplace. In some instances, the information given by the respondent was validated by nonaerospace colleagues. The results clearly demonstrated that the movement of personnel may act as a mechanism for transfer. For all respondents, the mean number of techniques introduced was greater than five. In 13 cases, 100 per cent of the aerospace management techniques currently used were introduced by the respondent; in 15 cases, at least 50 per cent currently in use were introduced by the respondent. The process of introduction was also examined. The managers reported using several steps to encourage transfer including familiarization with the environment, introduction of new goals, adaptation of the technique, persuasion, coercion, and the hiring of co-workers with similar attitudes. The results also indicated that successful innovators were self-confident, had a detailed knowledge of the innovation, were convinced of its value, and were frequently in positions of authority. Finally, results indicated that the introduction was more likely to be adopted in smaller and/or newer institutions, where “discipline” and a team concept existed in management, and when superiors were supportive. Recommendations were made for future research.  相似文献   

16.
Over the past decade, inter‐ and intra‐movement coalitions composed of organizations within the Lesbian, Gay, Bisexual, Transgender, and Queer (LGBTQ) and immigrant rights movements have formed at the local level. These coalitions speak to a massive organizing effort that has achieved some rights campaign successes. However, coalition unity that culminated in “wins” like marriage equality came at a cost. While both movements expanded and unified, they simultaneously ossified around goals that matter to the most privileged segments of their respective communities. The result is a paradox: coalitions do sometimes form within and across movements, promote enduring unity across seemingly divergent movements, and facilitate rights campaign “wins.” However, coalitions simultaneously reinforce hierarchical exclusions through the continued marginalization of issues that uproot conventional power dynamics, like police violence, economic inequality, and gender justice. This essay argues that the construction of a common “civil rights past” identity within coalitions can help to explain this paradox. The development of this collective identity expands movements, occasionally thwarting the power dynamics responsible for the centering of the interests of the most privileged constituencies within social movements. However, the episodic nature of rights‐based campaigns simultaneously contains and undermines the formation of this collective identity, reinforcing movement divisions based on race, gender, and class.  相似文献   

17.
There is more to the crisis of violent crime in the streets than simply citizens being increasingly victimized, becoming alarmed and demanding that public officials do something about it. The. fear of crime, a central theme in diologue surrounding the movement toward “tough on crime” legislation, may exceed by far the actual threat which exists. preliminary eviddnce suggests that indeed a “moral panic” has developed around violent crime in the united States — a “panic” which cannot be explained by dramatic increases in the crime rate. A social structural explanation is required if this lack of fit between the fear of crime and the crime rate is to be understood.  相似文献   

18.
The proposition put forth in this paper is that whether—and the extent to which—harm or potential harm to the environment (its natural resources, living beings, and their ecosystems) is identified, resisted, mitigated, or prevented is linked to the nature and scope of public access to information, participation in governmental decision-making, and access to justice—which are often referred to as “environmental due process” or “procedural environmental rights.” Using examples in the United States of attacks on law school clinics and denial of standing in court, this paper argues that restrictions on public access to information, participation in decision-making, and access to justice create legacies and “cultures of silence” that reduce the likelihood that future generations will be willing and able to contest environmental harm.  相似文献   

19.
为了适应 20世纪 90年代以来并购活动的日益增长,规制者运用“革新市场”和“单方效果”来支持积极的反托拉斯执法活动。“革新市场”理论通过对一个合并对相关市场上的研究和发展的影响来评估技术领先企业之间的合并。“单方效果”理论根据合并企业独自对相关市场上价格产生影响的能力来评估一个合并。  相似文献   

20.
The right to privacy has been developed through judicial practice and has evolved from “the protection of the right to reputation” to “privacy interest” then to “privacy right.” The Civil Code of the People’s Republic of China (2020) clarifies the right to information privacy and the right to personal information as two independent personality rights and establishes a privacy priority protection mechanism for private information in civil law. The comparative efficiency of the right to personal information may mean that the protection of the right to information privacy is weakened or even replaced by the right to personal information. The uncertainty and fragmentation of private information also creates a wide gray space for judicial decisions. The development from traditional privacy right to information privacy right and personal information right is generally positive and shows the active legal response to the protection of private information in multiple ways. However, clarifications and systematization are required to increase the effectiveness of such protections.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号