全文获取类型
收费全文 | 3623篇 |
免费 | 179篇 |
国内免费 | 2篇 |
专业分类
教育 | 2131篇 |
科学研究 | 415篇 |
各国文化 | 9篇 |
体育 | 54篇 |
文化理论 | 61篇 |
信息传播 | 1134篇 |
出版年
2023年 | 2篇 |
2022年 | 1篇 |
2021年 | 10篇 |
2020年 | 7篇 |
2019年 | 19篇 |
2018年 | 81篇 |
2017年 | 136篇 |
2016年 | 243篇 |
2015年 | 140篇 |
2014年 | 56篇 |
2013年 | 169篇 |
2012年 | 63篇 |
2011年 | 124篇 |
2010年 | 45篇 |
2009年 | 29篇 |
2008年 | 63篇 |
2007年 | 116篇 |
2006年 | 74篇 |
2005年 | 758篇 |
2004年 | 572篇 |
2003年 | 301篇 |
2002年 | 90篇 |
2001年 | 76篇 |
2000年 | 8篇 |
1999年 | 46篇 |
1998年 | 83篇 |
1997年 | 65篇 |
1996年 | 78篇 |
1995年 | 55篇 |
1994年 | 80篇 |
1993年 | 94篇 |
1992年 | 47篇 |
1991年 | 7篇 |
1990年 | 35篇 |
1989年 | 3篇 |
1988年 | 5篇 |
1987年 | 2篇 |
1986年 | 1篇 |
1985年 | 4篇 |
1983年 | 4篇 |
1982年 | 1篇 |
1981年 | 4篇 |
1978年 | 2篇 |
1977年 | 2篇 |
1976年 | 1篇 |
1975年 | 1篇 |
1969年 | 1篇 |
排序方式: 共有3804条查询结果,搜索用时 15 毫秒
171.
Trusting Virtual Trust 总被引:2,自引:0,他引:2
Can trust evolve on the Internet between virtual strangers? Recently, Pettit answered this question in the negative. Focusing on trust in the sense of ‘dynamic, interactive, and trusting’ reliance on other people, he distinguishes between two forms of trust: primary trust rests on the belief that the other is trustworthy, while the more subtle secondary kind of trust is premised on the belief that the other cherishes one’s esteem, and will, therefore, reply to an act of trust in kind (‘trust-responsiveness’). Based on this theory Pettit argues that trust between virtual strangers is impossible: they lack all evidence about one another, which prevents the imputation of trustworthiness and renders the reliance on trust-responsiveness ridiculous. I argue that this argument is flawed, both empirically and theoretically. In several virtual communities amazing acts of trust between pure virtuals have been observed. I propose that these can be explained as follows. On the one hand, social cues, reputation, reliance on third parties, and participation in (quasi-) institutions allow imputing trustworthiness to varying degrees. On the other, precisely trust-responsiveness is also relied upon, as a necessary supplement to primary trust. In virtual markets, esteem as a fair trader is coveted while it contributes to building up one’s reputation. In task groups, a hyperactive style of action may be adopted which amounts to assuming (not: inferring) trust. Trustors expect that their virtual co-workers will reply in kind while such an approach is to be considered the most appropriate in cyberspace. In non-task groups, finally, members often display intimacies while they are confident someone else ‘out there’ will return them. This is facilitated by the one-to-many, asynchronous mode of communication within mailing lists. 相似文献
172.
In this essay, I argue that popular entertainment can be understood in terms of Husserl’s concepts of epochē, reduction and constitution, and, conversely, that epochē, reduction and constitution can be explicated in terms of popular entertainment. To this end I use Husserl’s concepts to explicate and reflect upon the psychological and ethical effects of an exemplary instance of entertainment, the renowned Star Trek episode entitled “The Measure of a Man.” The importance of such an exercise is twofold: (1) to demonstrate, once again, the fecundity of the methodological procedures Husserl bequeathed to us; more than any other philosopher, he tapped into the fundamental manners in which we lose, make and remake the meanings of our lives; and (2) to demonstrate how popular entertainment, similarly, plays a central role in the making and remaking of the meanings of our lives. If my zig-zag procedure between Husserl’s philosophy and popular entertainment is productive and cogent, in addition to elucidating Husserl’s philosophy, it will demonstrate the reality-generating potency and the constitutive power of entertainment in the contemporary world. Entertainment, via ourselves, has become the primary producer of the meanings via which consciousness constitutes the world. 相似文献
173.
Artificial Life (ALife) has two goals. One attempts to describe fundamental qualities of living systems through agent based
computer models. And the second studies whether or not we can artificially create living things in computational mediums that
can be realized either, virtually in software, or through biotechnology. The study of ALife has recently branched into two
further subdivisions, one is “dry” ALife, which is the study of living systems “in silico” through the use of computer simulations,
and the other is “wet” ALife that uses biological material to realize what has only been simulated on computers, effectively
wet ALife uses biological material as a kind of computer. This is challenging to the field of computer ethics as it points
towards a future in which computer and bioethics might have shared concerns. The emerging studies into wet ALife are likely
to provide strong empirical evidence for ALife’s most challenging hypothesis: that life is a certain set of computable functions
that can be duplicated in any medium. I believe this will propel ALife into the midst of the mother of all cultural battles
that has been gathering around the emergence of biotechnology. Philosophers need to pay close attention to this debate and
can serve a vital role in clarifying and resolving the dispute. But even if ALife is merely a computer modeling technique
that sheds light on living systems, it still has a number of significant ethical implications such as its use in the modeling
of moral and ethical systems, as well as in the creation of artificial moral agents. 相似文献
174.
Recently, there has been a heavy debate in the US about the government’s use of data mining in its fight against terrorism.
Privacy concerns in fact led the Congress to terminate the funding of TIA, a program for advanced information technology to
be used in the combat of terrorism. The arguments put forward in this debate, more specifically those found in the main report
and minority report by the TAPAC established by the Secretary of Defense to examine the TIA issue, will be analysed to trace
the deeper roots of this controversy. This analysis will in turn be used as a test case to examine the adequacy of the usual
theoretical frameworks for these kinds of issues, in particular the notion of privacy. Whereas the dominant theoretical framing
of the notion of privacy turns around access to information, most of the core arguments in the debate do not fit in this kind of framework. The basic disagreements in
the controversy are not about mere access, they involve both access and use. Furthermore, whereas the issue of access by itself refers to a more or less static situation, the real disagreements much
more concern the organisational dynamics of the use of information, the mechanisms in the organisation that control these
dynamics, and the awareness present within the organisation of the ‘social risks’ these dynamics represent. The bottom line
question is whether the assessment of these gives sufficient reason for trust. 相似文献
175.
This paper is an attempt to present disclosive ethics as a framework for computer and information ethics – in line with the
suggestions by Brey, but also in quite a different manner. The potential of such an approach is demonstrated through a disclosive
analysis of facial recognition systems. The paper argues that the politics of information technology is a particularly powerful
politics since information technology is an opaque technology – i.e. relatively closed to scrutiny. It presents the design
of technology as a process of closure in which design and use decisions become black-boxed and progressively enclosed in increasingly
complex socio-technical networks. It further argues for a disclosive ethics that aims to disclose the nondisclosure of politics
by claiming a place for ethics in every actual operation of power – as manifested in actual design and use decisions and practices.
It also proposes that disclosive ethics would aim to trace and disclose the intentional and emerging enclosure of politics
from the very minute technical detail through to social practices and complex social-technical networks. The paper then proceeds
to do a disclosive analysis of facial recognition systems. This analysis discloses that seemingly trivial biases in recognition
rates of FRSs can emerge as very significant political acts when these systems become used in practice.
Paper prepared for the Technology and Ethics Workshop at Twente 相似文献
176.
Today all parties within the health-care system demand more information and evidence to take more efficient and pinpointed management decisions. Their goal is a better patient and patient-care management. This paper presents an information visualisation approach to discover knowledge for the management of tele-home care for the elderly using the video-telephone: what type of elderly need what type of video-telephone interventions? This document focuses on the synthesis aspects of data mining with a view to knowledge discovery: the global, holistic, synthesis approach. More specifically, it summarises visually the relationships among the types of video-telephony care, among the segments of elderly, and between the types of interventions and the segments of elderly simultaneously. The graphical display allows delineating areas that group elderly with a similar/dissimilar video-telephony care profile. Information visualisation is a promising approach to provide insight into large multidimensional data sets. It fosters knowledge discovery. 相似文献
177.
Recent advances in wireless technologies have led to the development of intelligent, in-vehicle safety applications designed
to share information about the actions of nearby vehicles, potential road hazards, and ultimately predict dangerous scenarios
or imminent collisions. These vehicle safety communication (VSC) technologies rely on the creation of autonomous, self-organizing,
wireless communication networks connecting vehicles with roadside infrastructure and with each other. As the technical standards
and communication protocols for VSC technologies are still being developed, certain ethical implications of these new information
technologies emerge: Coupled with the predicted safety benefits of VSC applications is a potential rise in the ability to
surveil a driver engaging in her everyday activities on the public roads. This paper will explore how the introduction of
VSC technologies might disrupt the “contextual integrity” of personal information flows in the context of highway travel and
threaten one’s “privacy in public.” Since VSC technologies and their related protocols and standards are still in the developmental
stage, the paper will conclude by revealing how close attention to the ethical implications of the remaining design decisions
can inform and guide designers of VSC technologies to create innovate safety applications that increase public safety, but
without compromising the value of one’s privacy in public.
This work was supported by the National Science Foundation PORTIA Grant No. CNS-0331542, and could not have been completed
without the valuable guidance of Prof. Helen Nissenbaum (New York University) and Prof. Dan Boneh (Stanford University). I
am grateful to many other colleagues who generously contributed to this work with excellent comments and suggestions, including
Emily Clark and Steve Tengler at the VSCC, and Sam Howard-Spink, Joseph Reagle and Tim Weber at New York University. Drafts
were further sharpened through opportunities to present at colloquia and conferences sponsored by New York University’s Department
of Culture & Communication, the American Association for the Advancement of Science, the Society for Philosophy and Technology,
and Computer Ethics: Philosophical Enquiry. 相似文献
178.
Reflexivity is a learning process that, through questioning and critically monitoring objectives and methods in use, promotes a change of habits and routines and, in so doing, fosters organizational performance and innovativeness. This paper looks at the contribution of team reflexivity to enhancing openness to innovation, and the mediating role of individual and team involvement. Specifically we tested whether affective commitment (Study 1, n=156) and a team climate of support for innovation (Study 2, n=152) facilitate reflexivity processes in promoting organizational openness to innovation. Overall, results confirmed that reflexivity enhances innovativeness, and this relationship is mediated by a high degree of involvement that increases the motivation of teammates and their engagement in innovation processes. 相似文献
179.
The commodification of code demands two preconditions: a belief if the existence of code and a system of ownership for the code. An examination of these preconditions is helpful for resisting the further widening of digital divides. The ontological belief in the relatively independent existence of code is dependent on our understanding of what the “digital” is. Here it is claimed that the digital is not a natural kind, but a concept that is relative to our practices of interpretation. An interpretative system that sees code as something that can or should always be owned implies an increase of social control and threatens vital processes of knowledge creation that are necessary for an open and egalitarian information society. The ontological belief in “digital code” thus provides the backdrop for an ethical view of the information society. Consequently, if we see digital code as an interpretative notion (in the nominalist way), the ethical questions appear in a different light. 相似文献
180.
This paper assesses the adequacy, efficiency, and equity of higher education in Lebanon in both the public and private sectors,
while highlighting challenges that are specific to Lebanon. It concludes by discussing various approaches and strategies to
remedy the challenges facing higher education in Lebanon. 相似文献