首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   13257篇
  免费   47篇
  国内免费   1篇
教育   10422篇
科学研究   1234篇
各国文化   17篇
体育   389篇
文化理论   396篇
信息传播   847篇
  2021年   13篇
  2020年   26篇
  2019年   37篇
  2018年   2213篇
  2017年   2111篇
  2016年   1607篇
  2015年   136篇
  2014年   158篇
  2013年   446篇
  2012年   275篇
  2011年   746篇
  2010年   882篇
  2009年   475篇
  2008年   685篇
  2007年   1194篇
  2006年   124篇
  2005年   437篇
  2004年   483篇
  2003年   390篇
  2002年   172篇
  2001年   32篇
  2000年   56篇
  1999年   30篇
  1998年   23篇
  1997年   37篇
  1996年   24篇
  1995年   30篇
  1994年   22篇
  1993年   23篇
  1992年   23篇
  1991年   26篇
  1990年   28篇
  1989年   24篇
  1988年   17篇
  1987年   21篇
  1986年   20篇
  1985年   22篇
  1984年   20篇
  1983年   17篇
  1982年   22篇
  1981年   27篇
  1980年   15篇
  1979年   16篇
  1978年   12篇
  1977年   19篇
  1976年   12篇
  1975年   9篇
  1974年   17篇
  1973年   9篇
  1971年   7篇
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
951.

Question:

How can library staff develop and promote a document delivery service and then expand the service to a wide audience?

Setting:

The setting is the library at the Indiana University School of Dentistry (IUSD), Indianapolis.

Method:

A faculty survey and a citation analysis were conducted to determine potential use of the service. Volume of interlibrary loan transactions and staff and equipment capacity were also studied.

Main results:

IUSD Library staff created a desktop delivery service (DDSXpress) for faculty and then expanded the service to practicing dental professionals and graduate students. The number of faculty using DDSXpress remains consistent. The number of practicing dental professionals using the service is low. Graduate students have been quick to adopt the service.

Conclusion:

Through careful analysis of capacity and need for the service, staff successfully expanded document delivery service without incurring additional costs. Use of DDSXpress is continually monitored, and opportunities to market the service to practicing dental professionals are being investigated.  相似文献   
952.
We argue that some algorithms are value-laden, and that two or more persons who accept different value-judgments may have a rational reason to design such algorithms differently. We exemplify our claim by discussing a set of algorithms used in medical image analysis: In these algorithms it is often necessary to set certain thresholds for whether e.g. a cell should count as diseased or not, and the chosen threshold will partly depend on the software designer’s preference between avoiding false positives and false negatives. This preference ultimately depends on a number of value-judgments. In the last section of the paper we discuss some general principles for dealing with ethical issues in algorithm-design.  相似文献   
953.
In this paper, I examine the ethics of e-trust and e-trustworthiness in the context of health care, looking at direct computer-patient interfaces (DCPIs), information systems that provide medical information, diagnosis, advice, consenting and/or treatment directly to patients without clinicians as intermediaries. Designers, manufacturers and deployers of such systems have an ethical obligation to provide evidence of their trustworthiness to users. My argument for this claim is based on evidentialism about trust and trustworthiness: the idea that trust should be based on sound evidence of trustworthiness. Evidence of trustworthiness is a broader notion than one might suppose, including not just information about the risks and performance of the system, but also interactional and context-based information. I suggest some sources of evidence in this broader sense that make it plausible that designers, manufacturers and deployers of DCPIs can provide evidence to users that is cognitively simple, easy to communicate, yet rationally connected with actual trustworthiness.  相似文献   
954.
955.
Bibliometric mapping of computer and information ethics   总被引:1,自引:0,他引:1  
This paper presents the first bibliometric mapping analysis of the field of computer and information ethics (C&IE). It provides a map of the relations between 400 key terms in the field. This term map can be used to get an overview of concepts and topics in the field and to identify relations between information and communication technology concepts on the one hand and ethical concepts on the other hand. To produce the term map, a data set of over thousand articles published in leading journals and conference proceedings in the C&IE field was constructed. With the help of various computer algorithms, key terms were identified in the titles and abstracts of the articles and co-occurrence frequencies of these key terms were calculated. Based on the co-occurrence frequencies, the term map was constructed. This was done using a computer program called VOSviewer. The term map provides a visual representation of the C&IE field and, more specifically, of the organization of the field around three main concepts, namely privacy, ethics, and the Internet.  相似文献   
956.
Social networking sites like Facebook are rapidly gaining in popularity. At the same time, they seem to present significant privacy issues for their users. We analyze two of Facebooks’s more recent features, Applications and News Feed, from the perspective enabled by Helen Nissenbaum’s treatment of privacy as “contextual integrity.” Offline, privacy is mediated by highly granular social contexts. Online contexts, including social networking sites, lack much of this granularity. These contextual gaps are at the root of many of the sites’ privacy issues. Applications, which nearly invisibly shares not just a users’, but a user’s friends’ information with third parties, clearly violates standard norms of information flow. News Feed is a more complex case, because it involves not just questions of privacy, but also of program interface and of the meaning of “friendship” online. In both cases, many of the privacy issues on Facebook are primarily design issues, which could be ameliorated by an interface that made the flows of information more transparent to users.  相似文献   
957.
Trust online can be a hazardous affair; many are trustworthy, but some people use the anonymity of the web to behave very badly indeed. So how can we improve the quality of evidence for trustworthiness provided online? I focus on one of the devices we use to secure others’ trustworthiness: tracking past conduct through online reputation systems. Yet existing reputation systems face problems. I analyse these, and in the light of this develop some principles for system design, towards overcoming these challenges. In providing better evidence for trustworthiness online, so we can also encourage people actually to be trustworthy more often, which is an ethically welcome outcome.  相似文献   
958.
959.
960.
This article explores the way in which the World Bank has worked effectively with China in higher education. It investigates whether or not the cooperation between the two has changed in line with their changing relationship. More specifically, it discusses whether the World Bank’s China agenda reflects the reform package of socio-institutional neoliberalism which the World Bank has tended to promote worldwide in the era of the Post-Washington Consensus, and how China’s higher education reform has been influenced by the agenda. The article argues that as China is transferring its role from that of a recipient country to that of a donor country, it is increasingly important to position itself as a global player. Other than mastering the game rules of the international community, China should also expand its influence within and through these major international organizations.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号