首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   3109篇
  免费   164篇
  国内免费   2篇
教育   1716篇
科学研究   402篇
各国文化   4篇
体育   33篇
文化理论   58篇
信息传播   1062篇
  2019年   1篇
  2018年   60篇
  2017年   104篇
  2016年   226篇
  2015年   127篇
  2014年   35篇
  2013年   48篇
  2012年   49篇
  2011年   109篇
  2010年   26篇
  2009年   16篇
  2008年   45篇
  2007年   98篇
  2006年   61篇
  2005年   746篇
  2004年   558篇
  2003年   279篇
  2002年   75篇
  2001年   68篇
  2000年   2篇
  1999年   39篇
  1998年   82篇
  1997年   63篇
  1996年   69篇
  1995年   52篇
  1994年   78篇
  1993年   85篇
  1992年   45篇
  1990年   29篇
排序方式: 共有3275条查询结果,搜索用时 31 毫秒
141.
This paper deals with intercultural aspects of privacy, particularly with regard to important differences between Japanese and the Western views. This paper is based on our discussions with Rafael Capurro – a dialogue now represented by two separate but closely interrelated articles. The companion paper is broadly focused on the cultural and historical backgrounds of the concepts of privacy and individualism in “Western” worlds; our main theme focuses on different concepts of privacy in Japan and their sources in related aspects of Japanese culture. The interrelationship between our two papers is apparent in our taking up identical or similar topics in each paper. Reading our two papers in conjunction with each other will bring about deeper and broader insights into the diverse values and worldviews of Japan and Western cultures that underlie concepts of privacy that at a surface level appear to be similar  相似文献   
142.
Trusting Virtual Trust   总被引:2,自引:0,他引:2  
Can trust evolve on the Internet between virtual strangers? Recently, Pettit answered this question in the negative. Focusing on trust in the sense of ‘dynamic, interactive, and trusting’ reliance on other people, he distinguishes between two forms of trust: primary trust rests on the belief that the other is trustworthy, while the more subtle secondary kind of trust is premised on the belief that the other cherishes one’s esteem, and will, therefore, reply to an act of trust in kind (‘trust-responsiveness’). Based on this theory Pettit argues that trust between virtual strangers is impossible: they lack all evidence about one another, which prevents the imputation of trustworthiness and renders the reliance on trust-responsiveness ridiculous. I argue that this argument is flawed, both empirically and theoretically. In several virtual communities amazing acts of trust between pure virtuals have been observed. I propose that these can be explained as follows. On the one hand, social cues, reputation, reliance on third parties, and participation in (quasi-) institutions allow imputing trustworthiness to varying degrees. On the other, precisely trust-responsiveness is also relied upon, as a necessary supplement to primary trust. In virtual markets, esteem as a fair trader is coveted while it contributes to building up one’s reputation. In task groups, a hyperactive style of action may be adopted which amounts to assuming (not: inferring) trust. Trustors expect that their virtual co-workers will reply in kind while such an approach is to be considered the most appropriate in cyberspace. In non-task groups, finally, members often display intimacies while they are confident someone else ‘out there’ will return them. This is facilitated by the one-to-many, asynchronous mode of communication within mailing lists.  相似文献   
143.
In this essay, I argue that popular entertainment can be understood in terms of Husserl’s concepts of epochē, reduction and constitution, and, conversely, that epochē, reduction and constitution can be explicated in terms of popular entertainment. To this end I use Husserl’s concepts to explicate and reflect upon the psychological and ethical effects of an exemplary instance of entertainment, the renowned Star Trek episode entitled “The Measure of a Man.” The importance of such an exercise is twofold: (1) to demonstrate, once again, the fecundity of the methodological procedures Husserl bequeathed to us; more than any other philosopher, he tapped into the fundamental manners in which we lose, make and remake the meanings of our lives; and (2) to demonstrate how popular entertainment, similarly, plays a central role in the making and remaking of the meanings of our lives. If my zig-zag procedure between Husserl’s philosophy and popular entertainment is productive and cogent, in addition to elucidating Husserl’s philosophy, it will demonstrate the reality-generating potency and the constitutive power of entertainment in the contemporary world. Entertainment, via ourselves, has become the primary producer of the meanings via which consciousness constitutes the world.  相似文献   
144.
Artificial Life (ALife) has two goals. One attempts to describe fundamental qualities of living systems through agent based computer models. And the second studies whether or not we can artificially create living things in computational mediums that can be realized either, virtually in software, or through biotechnology. The study of ALife has recently branched into two further subdivisions, one is “dry” ALife, which is the study of living systems “in silico” through the use of computer simulations, and the other is “wet” ALife that uses biological material to realize what has only been simulated on computers, effectively wet ALife uses biological material as a kind of computer. This is challenging to the field of computer ethics as it points towards a future in which computer and bioethics might have shared concerns. The emerging studies into wet ALife are likely to provide strong empirical evidence for ALife’s most challenging hypothesis: that life is a certain set of computable functions that can be duplicated in any medium. I believe this will propel ALife into the midst of the mother of all cultural battles that has been gathering around the emergence of biotechnology. Philosophers need to pay close attention to this debate and can serve a vital role in clarifying and resolving the dispute. But even if ALife is merely a computer modeling technique that sheds light on living systems, it still has a number of significant ethical implications such as its use in the modeling of moral and ethical systems, as well as in the creation of artificial moral agents.  相似文献   
145.
Recently, there has been a heavy debate in the US about the government’s use of data mining in its fight against terrorism. Privacy concerns in fact led the Congress to terminate the funding of TIA, a program for advanced information technology to be used in the combat of terrorism. The arguments put forward in this debate, more specifically those found in the main report and minority report by the TAPAC established by the Secretary of Defense to examine the TIA issue, will be analysed to trace the deeper roots of this controversy. This analysis will in turn be used as a test case to examine the adequacy of the usual theoretical frameworks for these kinds of issues, in particular the notion of privacy. Whereas the dominant theoretical framing of the notion of privacy turns around access to information, most of the core arguments in the debate do not fit in this kind of framework. The basic disagreements in the controversy are not about mere access, they involve both access and use. Furthermore, whereas the issue of access by itself refers to a more or less static situation, the real disagreements much more concern the organisational dynamics of the use of information, the mechanisms in the organisation that control these dynamics, and the awareness present within the organisation of the ‘social risks’ these dynamics represent. The bottom line question is whether the assessment of these gives sufficient reason for trust.  相似文献   
146.
This paper is an attempt to present disclosive ethics as a framework for computer and information ethics – in line with the suggestions by Brey, but also in quite a different manner. The potential of such an approach is demonstrated through a disclosive analysis of facial recognition systems. The paper argues that the politics of information technology is a particularly powerful politics since information technology is an opaque technology – i.e. relatively closed to scrutiny. It presents the design of technology as a process of closure in which design and use decisions become black-boxed and progressively enclosed in increasingly complex socio-technical networks. It further argues for a disclosive ethics that aims to disclose the nondisclosure of politics by claiming a place for ethics in every actual operation of power – as manifested in actual design and use decisions and practices. It also proposes that disclosive ethics would aim to trace and disclose the intentional and emerging enclosure of politics from the very minute technical detail through to social practices and complex social-technical networks. The paper then proceeds to do a disclosive analysis of facial recognition systems. This analysis discloses that seemingly trivial biases in recognition rates of FRSs can emerge as very significant political acts when these systems become used in practice. Paper prepared for the Technology and Ethics Workshop at Twente  相似文献   
147.
Today all parties within the health-care system demand more information and evidence to take more efficient and pinpointed management decisions. Their goal is a better patient and patient-care management. This paper presents an information visualisation approach to discover knowledge for the management of tele-home care for the elderly using the video-telephone: what type of elderly need what type of video-telephone interventions? This document focuses on the synthesis aspects of data mining with a view to knowledge discovery: the global, holistic, synthesis approach. More specifically, it summarises visually the relationships among the types of video-telephony care, among the segments of elderly, and between the types of interventions and the segments of elderly simultaneously. The graphical display allows delineating areas that group elderly with a similar/dissimilar video-telephony care profile. Information visualisation is a promising approach to provide insight into large multidimensional data sets. It fosters knowledge discovery.  相似文献   
148.
Recent advances in wireless technologies have led to the development of intelligent, in-vehicle safety applications designed to share information about the actions of nearby vehicles, potential road hazards, and ultimately predict dangerous scenarios or imminent collisions. These vehicle safety communication (VSC) technologies rely on the creation of autonomous, self-organizing, wireless communication networks connecting vehicles with roadside infrastructure and with each other. As the technical standards and communication protocols for VSC technologies are still being developed, certain ethical implications of these new information technologies emerge: Coupled with the predicted safety benefits of VSC applications is a potential rise in the ability to surveil a driver engaging in her everyday activities on the public roads. This paper will explore how the introduction of VSC technologies might disrupt the “contextual integrity” of personal information flows in the context of highway travel and threaten one’s “privacy in public.” Since VSC technologies and their related protocols and standards are still in the developmental stage, the paper will conclude by revealing how close attention to the ethical implications of the remaining design decisions can inform and guide designers of VSC technologies to create innovate safety applications that increase public safety, but without compromising the value of one’s privacy in public. This work was supported by the National Science Foundation PORTIA Grant No. CNS-0331542, and could not have been completed without the valuable guidance of Prof. Helen Nissenbaum (New York University) and Prof. Dan Boneh (Stanford University). I am grateful to many other colleagues who generously contributed to this work with excellent comments and suggestions, including Emily Clark and Steve Tengler at the VSCC, and Sam Howard-Spink, Joseph Reagle and Tim Weber at New York University. Drafts were further sharpened through opportunities to present at colloquia and conferences sponsored by New York University’s Department of Culture & Communication, the American Association for the Advancement of Science, the Society for Philosophy and Technology, and Computer Ethics: Philosophical Enquiry.  相似文献   
149.
Reflexivity is a learning process that, through questioning and critically monitoring objectives and methods in use, promotes a change of habits and routines and, in so doing, fosters organizational performance and innovativeness. This paper looks at the contribution of team reflexivity to enhancing openness to innovation, and the mediating role of individual and team involvement. Specifically we tested whether affective commitment (Study 1, n=156) and a team climate of support for innovation (Study 2, n=152) facilitate reflexivity processes in promoting organizational openness to innovation. Overall, results confirmed that reflexivity enhances innovativeness, and this relationship is mediated by a high degree of involvement that increases the motivation of teammates and their engagement in innovation processes.  相似文献   
150.
The commodification of code demands two preconditions: a belief if the existence of code and a system of ownership for the code. An examination of these preconditions is helpful for resisting the further widening of digital divides. The ontological belief in the relatively independent existence of code is dependent on our understanding of what the “digital” is. Here it is claimed that the digital is not a natural kind, but a concept that is relative to our practices of interpretation. An interpretative system that sees code as something that can or should always be owned implies an increase of social control and threatens vital processes of knowledge creation that are necessary for an open and egalitarian information society. The ontological belief in “digital code” thus provides the backdrop for an ethical view of the information society. Consequently, if we see digital code as an interpretative notion (in the nominalist way), the ethical questions appear in a different light.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号