首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   2949篇
  免费   7篇
教育   2031篇
科学研究   529篇
各国文化   1篇
体育   93篇
综合类   7篇
文化理论   62篇
信息传播   233篇
  2022年   3篇
  2021年   15篇
  2020年   1篇
  2019年   6篇
  2018年   57篇
  2017年   99篇
  2016年   167篇
  2015年   116篇
  2014年   54篇
  2013年   73篇
  2012年   151篇
  2011年   165篇
  2010年   85篇
  2009年   32篇
  2008年   68篇
  2007年   60篇
  2006年   48篇
  2005年   686篇
  2004年   471篇
  2003年   301篇
  2002年   133篇
  2001年   66篇
  2000年   31篇
  1999年   26篇
  1998年   5篇
  1997年   4篇
  1996年   6篇
  1995年   3篇
  1994年   2篇
  1993年   2篇
  1992年   1篇
  1991年   1篇
  1990年   3篇
  1989年   2篇
  1988年   1篇
  1987年   4篇
  1984年   1篇
  1976年   4篇
  1974年   2篇
  1966年   1篇
排序方式: 共有2956条查询结果,搜索用时 234 毫秒
181.
182.
This paper deals with intercultural aspects of privacy, particularly with regard to important differences between Japanese and the Western views. This paper is based on our discussions with Rafael Capurro – a dialogue now represented by two separate but closely interrelated articles. The companion paper is broadly focused on the cultural and historical backgrounds of the concepts of privacy and individualism in “Western” worlds; our main theme focuses on different concepts of privacy in Japan and their sources in related aspects of Japanese culture. The interrelationship between our two papers is apparent in our taking up identical or similar topics in each paper. Reading our two papers in conjunction with each other will bring about deeper and broader insights into the diverse values and worldviews of Japan and Western cultures that underlie concepts of privacy that at a surface level appear to be similar  相似文献   
183.
Trusting Virtual Trust   总被引:2,自引:0,他引:2  
Can trust evolve on the Internet between virtual strangers? Recently, Pettit answered this question in the negative. Focusing on trust in the sense of ‘dynamic, interactive, and trusting’ reliance on other people, he distinguishes between two forms of trust: primary trust rests on the belief that the other is trustworthy, while the more subtle secondary kind of trust is premised on the belief that the other cherishes one’s esteem, and will, therefore, reply to an act of trust in kind (‘trust-responsiveness’). Based on this theory Pettit argues that trust between virtual strangers is impossible: they lack all evidence about one another, which prevents the imputation of trustworthiness and renders the reliance on trust-responsiveness ridiculous. I argue that this argument is flawed, both empirically and theoretically. In several virtual communities amazing acts of trust between pure virtuals have been observed. I propose that these can be explained as follows. On the one hand, social cues, reputation, reliance on third parties, and participation in (quasi-) institutions allow imputing trustworthiness to varying degrees. On the other, precisely trust-responsiveness is also relied upon, as a necessary supplement to primary trust. In virtual markets, esteem as a fair trader is coveted while it contributes to building up one’s reputation. In task groups, a hyperactive style of action may be adopted which amounts to assuming (not: inferring) trust. Trustors expect that their virtual co-workers will reply in kind while such an approach is to be considered the most appropriate in cyberspace. In non-task groups, finally, members often display intimacies while they are confident someone else ‘out there’ will return them. This is facilitated by the one-to-many, asynchronous mode of communication within mailing lists.  相似文献   
184.
In this essay, I argue that popular entertainment can be understood in terms of Husserl’s concepts of epochē, reduction and constitution, and, conversely, that epochē, reduction and constitution can be explicated in terms of popular entertainment. To this end I use Husserl’s concepts to explicate and reflect upon the psychological and ethical effects of an exemplary instance of entertainment, the renowned Star Trek episode entitled “The Measure of a Man.” The importance of such an exercise is twofold: (1) to demonstrate, once again, the fecundity of the methodological procedures Husserl bequeathed to us; more than any other philosopher, he tapped into the fundamental manners in which we lose, make and remake the meanings of our lives; and (2) to demonstrate how popular entertainment, similarly, plays a central role in the making and remaking of the meanings of our lives. If my zig-zag procedure between Husserl’s philosophy and popular entertainment is productive and cogent, in addition to elucidating Husserl’s philosophy, it will demonstrate the reality-generating potency and the constitutive power of entertainment in the contemporary world. Entertainment, via ourselves, has become the primary producer of the meanings via which consciousness constitutes the world.  相似文献   
185.
Artificial Life (ALife) has two goals. One attempts to describe fundamental qualities of living systems through agent based computer models. And the second studies whether or not we can artificially create living things in computational mediums that can be realized either, virtually in software, or through biotechnology. The study of ALife has recently branched into two further subdivisions, one is “dry” ALife, which is the study of living systems “in silico” through the use of computer simulations, and the other is “wet” ALife that uses biological material to realize what has only been simulated on computers, effectively wet ALife uses biological material as a kind of computer. This is challenging to the field of computer ethics as it points towards a future in which computer and bioethics might have shared concerns. The emerging studies into wet ALife are likely to provide strong empirical evidence for ALife’s most challenging hypothesis: that life is a certain set of computable functions that can be duplicated in any medium. I believe this will propel ALife into the midst of the mother of all cultural battles that has been gathering around the emergence of biotechnology. Philosophers need to pay close attention to this debate and can serve a vital role in clarifying and resolving the dispute. But even if ALife is merely a computer modeling technique that sheds light on living systems, it still has a number of significant ethical implications such as its use in the modeling of moral and ethical systems, as well as in the creation of artificial moral agents.  相似文献   
186.
Recently, there has been a heavy debate in the US about the government’s use of data mining in its fight against terrorism. Privacy concerns in fact led the Congress to terminate the funding of TIA, a program for advanced information technology to be used in the combat of terrorism. The arguments put forward in this debate, more specifically those found in the main report and minority report by the TAPAC established by the Secretary of Defense to examine the TIA issue, will be analysed to trace the deeper roots of this controversy. This analysis will in turn be used as a test case to examine the adequacy of the usual theoretical frameworks for these kinds of issues, in particular the notion of privacy. Whereas the dominant theoretical framing of the notion of privacy turns around access to information, most of the core arguments in the debate do not fit in this kind of framework. The basic disagreements in the controversy are not about mere access, they involve both access and use. Furthermore, whereas the issue of access by itself refers to a more or less static situation, the real disagreements much more concern the organisational dynamics of the use of information, the mechanisms in the organisation that control these dynamics, and the awareness present within the organisation of the ‘social risks’ these dynamics represent. The bottom line question is whether the assessment of these gives sufficient reason for trust.  相似文献   
187.
This paper is an attempt to present disclosive ethics as a framework for computer and information ethics – in line with the suggestions by Brey, but also in quite a different manner. The potential of such an approach is demonstrated through a disclosive analysis of facial recognition systems. The paper argues that the politics of information technology is a particularly powerful politics since information technology is an opaque technology – i.e. relatively closed to scrutiny. It presents the design of technology as a process of closure in which design and use decisions become black-boxed and progressively enclosed in increasingly complex socio-technical networks. It further argues for a disclosive ethics that aims to disclose the nondisclosure of politics by claiming a place for ethics in every actual operation of power – as manifested in actual design and use decisions and practices. It also proposes that disclosive ethics would aim to trace and disclose the intentional and emerging enclosure of politics from the very minute technical detail through to social practices and complex social-technical networks. The paper then proceeds to do a disclosive analysis of facial recognition systems. This analysis discloses that seemingly trivial biases in recognition rates of FRSs can emerge as very significant political acts when these systems become used in practice. Paper prepared for the Technology and Ethics Workshop at Twente  相似文献   
188.
In this paper, the problem of estimating the parameters of a two-dimensional autoregressive moving-average (2-D ARMA) model driven by an unobservable input noise is addressed. In order to solve this problem, the relation between the parameters of a 2-D ARMA model and their 2-D equivalent autoregressive (EAR) model parameters is investigated. Based on this relation, a new algorithm is proposed for determining the 2-D ARMA model parameters from the coefficients of the 2-D EAR model. This algorithm is a three-step approach. In the first step, the parameters of the 2-D EAR model that is approximately equivalent to the 2-D ARMA model are estimated by applying 2-D modified Yule-Walker (MYW) equation to the process under consideration. Then, the moving-average parameters of the 2-D ARMA model are obtained solving the linear equation set constituted by using the EAR coefficients acquired in the first step. Finally, the autoregressive parameters of the 2-D ARMA model are found by exploiting the values obtained in first and second steps. The performance of the proposed algorithm is compared with other 2-D ARMA parameter and spectral estimation algorithms available in the technical literature by means of three different criteria. As a result of this comparison, it is shown that the parameters and the corresponding power spectrums estimated by using the proposed algorithm are converged to the original parameters and the original power spectrums, respectively.  相似文献   
189.
Today all parties within the health-care system demand more information and evidence to take more efficient and pinpointed management decisions. Their goal is a better patient and patient-care management. This paper presents an information visualisation approach to discover knowledge for the management of tele-home care for the elderly using the video-telephone: what type of elderly need what type of video-telephone interventions? This document focuses on the synthesis aspects of data mining with a view to knowledge discovery: the global, holistic, synthesis approach. More specifically, it summarises visually the relationships among the types of video-telephony care, among the segments of elderly, and between the types of interventions and the segments of elderly simultaneously. The graphical display allows delineating areas that group elderly with a similar/dissimilar video-telephony care profile. Information visualisation is a promising approach to provide insight into large multidimensional data sets. It fosters knowledge discovery.  相似文献   
190.
Reflexivity is a learning process that, through questioning and critically monitoring objectives and methods in use, promotes a change of habits and routines and, in so doing, fosters organizational performance and innovativeness. This paper looks at the contribution of team reflexivity to enhancing openness to innovation, and the mediating role of individual and team involvement. Specifically we tested whether affective commitment (Study 1, n=156) and a team climate of support for innovation (Study 2, n=152) facilitate reflexivity processes in promoting organizational openness to innovation. Overall, results confirmed that reflexivity enhances innovativeness, and this relationship is mediated by a high degree of involvement that increases the motivation of teammates and their engagement in innovation processes.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号