全文获取类型
收费全文 | 245篇 |
免费 | 8篇 |
专业分类
教育 | 170篇 |
科学研究 | 14篇 |
各国文化 | 11篇 |
体育 | 32篇 |
信息传播 | 26篇 |
出版年
2022年 | 5篇 |
2021年 | 5篇 |
2020年 | 14篇 |
2019年 | 15篇 |
2018年 | 21篇 |
2017年 | 21篇 |
2016年 | 19篇 |
2015年 | 11篇 |
2014年 | 14篇 |
2013年 | 46篇 |
2012年 | 13篇 |
2011年 | 4篇 |
2010年 | 6篇 |
2009年 | 10篇 |
2008年 | 6篇 |
2007年 | 4篇 |
2006年 | 7篇 |
2005年 | 3篇 |
2004年 | 4篇 |
2003年 | 5篇 |
2002年 | 4篇 |
2001年 | 3篇 |
2000年 | 2篇 |
1999年 | 2篇 |
1996年 | 1篇 |
1995年 | 1篇 |
1994年 | 1篇 |
1990年 | 1篇 |
1982年 | 1篇 |
1981年 | 1篇 |
1974年 | 2篇 |
1967年 | 1篇 |
排序方式: 共有253条查询结果,搜索用时 562 毫秒
11.
Finding an appropriate temporary storage location for books and providing access to them is a significant challenge for libraries undergoing renovations. The current article describes the use of a document management company by an academic library to store 430,000 books for 8 months and provide a retrieval-on-demand service. Aspects covered include the selection of a commercial storage provider with its own retrieval service; details of the move to and from offsite storage; the integration of the service with library processes; communications and user feedback; book usage during the storage period; overall costs; and lessons learned from the experience. 相似文献
12.
Kirsten Locke 《Educational Philosophy and Theory》2015,47(6):596-607
AbstractInspired by a new teaching initiative that involved a redesign of conventional classroom spaces at the University of Auckland’s Epsom Campus, this article considers the relationship between architecture, the built environment and education. It characterises the teaching space of the Epsom Campus as the embodiment of educational policy following its inception in the early 1970s. Heralded as a modernist work of architecture juxtaposing material and textural combinations, the Epsom Campus emerged as a metaphorical vanguard of teaching pedagogy that stood as a symbol of a more progressive and culturally inclusive style of education. With consideration for a different kind of architectural space and pedagogy at the city-based business school, the article extends an understanding of spatiality and learning, and argues the structural architectonics of the teaching space and the built environment confer their own pedagogical value. By drawing on the critical stance of Nietzsche’s genealogical methodology for reading history, strands of historical discourse and ‘vibrant materialities’ are considered so that the ‘built pedagogy’ of both contexts can be activated and explored. 相似文献
13.
In the international debate surrounding transitions from school to employment, Japan and Germany are regularly cited as examples of success. This article draws on the Japanese concepts represented by two problematic groups – freeters and NEETs – to demonstrate that over recent years, young people in both countries have also been facing serious problems with the transition process. Interpretation of empirical data also, however, reveals a number of contrasts between them. We focus here on differences in their educational systems and on the role each system plays within its own society. The article also uses divergent recruitment practices and employment structures as vehicles for comparison and interpretation. 相似文献
14.
Nils Ulltveit-Moe 《Ethics and Information Technology》2014,16(3):227-240
This paper proposes a roadmap for how privacy leakages from outsourced managed security services using intrusion detection systems can be controlled. The paper first analyses the risk of leaking private or confidential information from signature-based intrusion detection systems. It then discusses how the situation can be improved by developing adequate privacy enforcement methods and privacy leakage metrics in order to control and reduce the leakage of private and confidential information over time. Such metrics should allow for quantifying how much information that is leaking, where these information leakages are, as well as showing what these leakages mean. This includes adding enforcement mechanisms ensuring that operation on sensitive information is transparent and auditable. The data controller or external quality assurance organisations can then verify or certify that the security operation operates in a privacy friendly manner. The roadmap furthermore outlines how privacy-enhanced intrusion detection systems should be implemented by initially providing privacy-enhanced alarm handling and then gradually extending support for privacy enhancing operation to other areas like digital forensics, exchange of threat information and big data analytics based attack detection. 相似文献
15.
16.
This article suggests how we should study media and information literacies (MIL) and do so at a time, when young people nurture these literacies through multiple media practices and across spaces of learning. Our basic argument is this: in order to gain a robust knowledge base for the development of MIL we need to study literacy practices beyond print literacy and numeracy, and we need to study these practices beyond formal spaces of learning. The argument is unfolded with particular focus on ethnic minority youth since this group routinely figures as under-achieving in studies of school literacy, such as Programme for International Student Assessment. Based on a brief overview of literacy studies in view of digitization and a critical examination of recent studies of youthful media practices and ethnicity, the argument is illustrated through an empirical analysis that draws on results from a nationally representative survey of media uses among Danes aged 13–23 years. The analysis demonstrates that ethnic minority youth offer the most serious challenge to existing literacy hierarchies found in formal education. We discuss the implications of these results for educational policy-making and for future research on MIL, advocating inclusive approaches in terms of media for learning and spaces of learning. 相似文献
17.
18.
19.
Kirsten Martin 《Ethics and Information Technology》2012,14(4):267-284
Within a given conversation or information exchange, do privacy expectations change based on the technology used? Firms regularly require users, customers, and employees to shift existing relationships onto new information technology, yet little is known as about how technology impacts established privacy expectations and norms. Coworkers are asked to use new information technology, users of gmail are asked to use GoogleBuzz, patients and doctors are asked to record health records online, etc. Understanding how privacy expectations change, if at all, and the mechanisms by which such a variance is produced will help organizations make such transitions. This paper examines whether and how privacy expectations change based on the technological platform of an information exchange. The results suggest that privacy expectations are significantly distinct when the information exchange is located on a novel technology as compared to a more established technology. Furthermore, this difference is best explained when modeled by a shift in privacy expectations rather than fully technology-specific privacy norms. These results suggest that privacy expectations online are connected to privacy offline with a different base privacy expectation. Surprisingly, out of the five locations tested, respondents consistently assign information on email the greatest privacy protection. In addition, while undergraduate students differ from non-undergraduates when assessing a social networking site, no difference is found when judging an exchange on email. In sum, the findings suggest that novel technology may introduce temporary conceptual muddles rather than permanent privacy vacuums. The results reported here challenge conventional views about how privacy expectations differ online versus offline. Traditionally, management scholarship examines privacy online or with a specific new technology platform in isolation and without reference to the same information exchange offline. However, in the present study, individuals appear to have a shift in their privacy expectations but retain similar factors and their relative importance??the privacy equation by which they form judgments??across technologies. These findings suggest that privacy scholarship should make use of existing privacy norms within contexts when analyzing and studying privacy in a new technological platform. 相似文献
20.
Pamela MacAskill James Goho Robert Richard Kirsten Anderson 《Community College Journal of Research & Practice》2013,37(12):939-958
Quality Assurance in Curriculum is a customized solution to the problems of assuring curricular quality in a dynamic community college environment. It was designed by Red River College, a large, comprehensive community college in Western Canada, to address academic cross-jurisdictional issues in establishing and verifying curriculum. It is a system based on current theory in educational quality, and it uses a three-stage methodology incorporating a variety of survey, planning, and consultation techniques. Benchmarked data figure prominently in assuring academic program curricular conformance is measured according to accepted college mission and accepted standards. Initiated in 2000, each stage of the Quality Assurance in Curriculum strategy has moved from initial concept to preliminary trials through acceptance to full implementation across all academic faculties of the community college. 相似文献