全文获取类型
收费全文 | 13502篇 |
免费 | 33篇 |
国内免费 | 2篇 |
专业分类
教育 | 10368篇 |
科学研究 | 1405篇 |
各国文化 | 35篇 |
体育 | 450篇 |
综合类 | 1篇 |
文化理论 | 405篇 |
信息传播 | 873篇 |
出版年
2023年 | 16篇 |
2021年 | 26篇 |
2020年 | 41篇 |
2019年 | 60篇 |
2018年 | 2218篇 |
2017年 | 2146篇 |
2016年 | 1631篇 |
2015年 | 147篇 |
2014年 | 154篇 |
2013年 | 525篇 |
2012年 | 250篇 |
2011年 | 724篇 |
2010年 | 867篇 |
2009年 | 475篇 |
2008年 | 689篇 |
2007年 | 1164篇 |
2006年 | 105篇 |
2005年 | 425篇 |
2004年 | 478篇 |
2003年 | 384篇 |
2002年 | 158篇 |
2001年 | 42篇 |
2000年 | 47篇 |
1999年 | 21篇 |
1998年 | 19篇 |
1997年 | 28篇 |
1996年 | 19篇 |
1995年 | 23篇 |
1994年 | 26篇 |
1993年 | 14篇 |
1992年 | 24篇 |
1991年 | 24篇 |
1990年 | 30篇 |
1989年 | 19篇 |
1988年 | 15篇 |
1987年 | 17篇 |
1986年 | 25篇 |
1985年 | 32篇 |
1984年 | 14篇 |
1983年 | 17篇 |
1981年 | 25篇 |
1980年 | 15篇 |
1979年 | 15篇 |
1978年 | 13篇 |
1977年 | 20篇 |
1976年 | 16篇 |
1975年 | 13篇 |
1974年 | 15篇 |
1972年 | 14篇 |
1968年 | 13篇 |
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
991.
Christopher Platt 《Publishing Research Quarterly》2011,27(3):247-253
Updated from a presentation given at Biblionext.it in Rome in April 2011, this article will highlight The New York Public
Library’s success with e-books and other forms of popular e-content and our efforts to stay one step ahead of the consumer
shift from print reading to e-reading. Consumer e-reading is dominated by Amazon.com in the US, followed by one of the largest
chain bookstores, BarnesandNoble.com. The availability of digital versions of very popular titles, coupled with the explosion
of e-readers, tablets, and smartphones that are priced competitively and fairly easy to use, are helping move a lot of Americans
into the e-book world. Last month, Amazon.com announced they sold more e-books than physical books for the first time ever.
Print books are not going away, but our experience is that it is clear e-books are no longer just an extra format to offer,
they are integral to our future. 相似文献
992.
Felicitas Kraemer Kees van Overveld Martin Peterson 《Ethics and Information Technology》2011,13(3):251-260
We argue that some algorithms are value-laden, and that two or more persons who accept different value-judgments may have
a rational reason to design such algorithms differently. We exemplify our claim by discussing a set of algorithms used in
medical image analysis: In these algorithms it is often necessary to set certain thresholds for whether e.g. a cell should
count as diseased or not, and the chosen threshold will partly depend on the software designer’s preference between avoiding
false positives and false negatives. This preference ultimately depends on a number of value-judgments. In the last section
of the paper we discuss some general principles for dealing with ethical issues in algorithm-design. 相似文献
993.
Philip J. Nickel 《Ethics and Information Technology》2011,13(4):355-363
In this paper, I examine the ethics of e-trust and e-trustworthiness in the context of health care, looking at direct computer-patient interfaces (DCPIs), information systems that provide medical
information, diagnosis, advice, consenting and/or treatment directly to patients without clinicians as intermediaries. Designers,
manufacturers and deployers of such systems have an ethical obligation to provide evidence of their trustworthiness to users.
My argument for this claim is based on evidentialism about trust and trustworthiness: the idea that trust should be based on sound evidence of trustworthiness. Evidence of trustworthiness
is a broader notion than one might suppose, including not just information about the risks and performance of the system,
but also interactional and context-based information. I suggest some sources of evidence in this broader sense that make it
plausible that designers, manufacturers and deployers of DCPIs can provide evidence to users that is cognitively simple, easy
to communicate, yet rationally connected with actual trustworthiness. 相似文献
994.
995.
Bibliometric mapping of computer and information ethics 总被引:1,自引:0,他引:1
Richard Heersmink Jeroen van den Hoven Nees Jan van Eck Jan van den Berg 《Ethics and Information Technology》2011,13(3):241-249
This paper presents the first bibliometric mapping analysis of the field of computer and information ethics (C&IE). It provides
a map of the relations between 400 key terms in the field. This term map can be used to get an overview of concepts and topics
in the field and to identify relations between information and communication technology concepts on the one hand and ethical
concepts on the other hand. To produce the term map, a data set of over thousand articles published in leading journals and
conference proceedings in the C&IE field was constructed. With the help of various computer algorithms, key terms were identified
in the titles and abstracts of the articles and co-occurrence frequencies of these key terms were calculated. Based on the
co-occurrence frequencies, the term map was constructed. This was done using a computer program called VOSviewer. The term
map provides a visual representation of the C&IE field and, more specifically, of the organization of the field around three
main concepts, namely privacy, ethics, and the Internet. 相似文献
996.
Gordon Hull Heather Richter Lipford Celine Latulipe 《Ethics and Information Technology》2011,13(4):289-302
Social networking sites like Facebook are rapidly gaining in popularity. At the same time, they seem to present significant
privacy issues for their users. We analyze two of Facebooks’s more recent features, Applications and News Feed, from the perspective
enabled by Helen Nissenbaum’s treatment of privacy as “contextual integrity.” Offline, privacy is mediated by highly granular
social contexts. Online contexts, including social networking sites, lack much of this granularity. These contextual gaps
are at the root of many of the sites’ privacy issues. Applications, which nearly invisibly shares not just a users’, but a
user’s friends’ information with third parties, clearly violates standard norms of information flow. News Feed is a more complex
case, because it involves not just questions of privacy, but also of program interface and of the meaning of “friendship”
online. In both cases, many of the privacy issues on Facebook are primarily design issues, which could be ameliorated by an
interface that made the flows of information more transparent to users. 相似文献
997.
Thomas W. Simpson 《Ethics and Information Technology》2011,13(1):29-38
Trust online can be a hazardous affair; many are trustworthy, but some people use the anonymity of the web to behave very badly indeed. So how can we improve the quality of evidence for trustworthiness provided online? I focus on one of the devices we use to secure others’ trustworthiness: tracking past conduct through online reputation systems. Yet existing reputation systems face problems. I analyse these, and in the light of this develop some principles for system design, towards overcoming these challenges. In providing better evidence for trustworthiness online, so we can also encourage people actually to be trustworthy more often, which is an ethically welcome outcome. 相似文献
998.
Epshteyn AA Maher S Taylor AJ Holton AB Borenstein JT Cuiffi JD 《Biomicrofluidics》2011,5(4):46501-465016
The design and fabrication of a membrane-integrated microfluidic cell culture device (five layers,≤500 μm total thickness) developed for high resolution microscopy is reported here. The multi-layer device was constructed to enable membrane separated cell culture for tissue mimetic in vitro model applications and pharmacodynamic evaluation studies. The microdevice was developed via a unique combination of low profile fluidic interconnect design, substrate transfer methodology, and wet silane bonding. To demonstrate the unique high resolution imaging capability of this device, we used oil immersion microscopy to image stained nuclei and mitochondria in primary hepatocytes adhered to the incorporated membrane 相似文献
999.
Guided by social cognitive theory (SCT), we investigated whether exercise self-regulatory efficacy beliefs can be activated nonconsciously in individuals experienced and inexperienced in exercise self-regulation, and whether these beliefs are automatically associated with exercise self-regulation processes. The study used a 2 (Exercise Self-Regulation Experience Group) × 3 (Prime Condition) between-subjects design in which individuals experienced and inexperienced in exercise self-regulation were randomly assigned to receive subliminal, supraliminal, or no priming of exercise self-regulatory efficacy beliefs. Participants completed hypothetical diary entries, which were assessed for exercise self-regulatory efficacy and self-regulation expressions using content analyses with a SCT coding system and the Linguistic Inquiry and Word Count (LIWC) text analysis program. For both exercise self-regulation experience groups, self-efficacy priming led to more expressions of low exercise self-regulatory efficacy and dysfunctional exercise self-regulation strategies compared with the control prime. For participants experienced in exercise self-regulation, supraliminal priming (vs. control priming) led to more expressions of high exercise self-regulatory efficacy and functional exercise self-regulation strategies. For the experienced groups, priming led to automaticity of exercise expressions compared with the control condition. For inexperienced participants in the subliminal prime condition, priming led to automaticity of self-regulatory efficacy beliefs and work-related goals compared with the control condition. Automatic activation of exercise self-regulatory efficacy and exercise self-regulation processes suggests that self-regulation of exercise behavior can occur nonconsciously. 相似文献
1000.