全文获取类型
收费全文 | 17896篇 |
免费 | 96篇 |
国内免费 | 210篇 |
专业分类
教育 | 12833篇 |
科学研究 | 2263篇 |
各国文化 | 19篇 |
体育 | 813篇 |
综合类 | 382篇 |
文化理论 | 395篇 |
信息传播 | 1497篇 |
出版年
2024年 | 3篇 |
2023年 | 17篇 |
2022年 | 93篇 |
2021年 | 204篇 |
2020年 | 145篇 |
2019年 | 98篇 |
2018年 | 2239篇 |
2017年 | 2167篇 |
2016年 | 1638篇 |
2015年 | 346篇 |
2014年 | 492篇 |
2013年 | 622篇 |
2012年 | 745篇 |
2011年 | 1194篇 |
2010年 | 1338篇 |
2009年 | 862篇 |
2008年 | 1107篇 |
2007年 | 1564篇 |
2006年 | 446篇 |
2005年 | 722篇 |
2004年 | 659篇 |
2003年 | 536篇 |
2002年 | 334篇 |
2001年 | 178篇 |
2000年 | 124篇 |
1999年 | 62篇 |
1998年 | 45篇 |
1997年 | 41篇 |
1996年 | 28篇 |
1995年 | 23篇 |
1994年 | 18篇 |
1993年 | 11篇 |
1992年 | 10篇 |
1991年 | 14篇 |
1988年 | 4篇 |
1987年 | 3篇 |
1986年 | 5篇 |
1985年 | 9篇 |
1984年 | 6篇 |
1983年 | 4篇 |
1982年 | 6篇 |
1981年 | 4篇 |
1980年 | 4篇 |
1979年 | 2篇 |
1978年 | 2篇 |
1977年 | 8篇 |
1976年 | 4篇 |
1975年 | 2篇 |
1973年 | 5篇 |
1957年 | 2篇 |
排序方式: 共有10000条查询结果,搜索用时 0 毫秒
991.
洛克惩罚教育的心理学诠释 总被引:1,自引:0,他引:1
惩罚教育是洛克教育思想的组成部分,他在《教育漫话》中对惩罚教育进行了相关的阐述。从心理学的角度诠释洛克对惩罚教育的态度及惩罚教育的方法,挖掘其中所蕴涵的心理学思想,对现今学校的品德教育有一定的启迪意义。 相似文献
992.
本课题组通过对新疆大学维吾尔族本科毕业生进行问卷调查和深度访谈,在新媒体的背景下,对维吾尔族大学毕业生的择业观念与就业现状进行了分析,探究新媒体在维吾尔族大学毕业生择业与生就业过程中产生的影响,分析新媒体在维吾尔族大学毕业生获取就业信息时的作用。力图为政府和用人单位更准确地制定、发布就业政策和信息提供参考,有助于维吾尔族大学生全方位、宽领域地获取就业信息,使新疆维吾尔族大学生的就业问题得以改善。 相似文献
993.
994.
我国的上市公司在会计信息披露的过程中存在着许多违反法律法规的问题。这些问题主要是由于我国相关法律制度不完善,公司内部监督机构没有切实履行职责,审计机构缺乏独立性,政府监管不到位等原因造成的。只有解决这一系列的问题才能使我国的上市公司会计信息披露制度更加规范,投资者的利益得到切实维护,我国证券市场才能够健康快速的发展。 相似文献
995.
西北甘肃、青海、宁夏、新疆四省区47所中学学生学习行为的调查发现,中学生的注意力属于中等范围,上课总是集中精神听讲的学生仅占17.4%;超过一半的学生学习态度比较积极,学习动机比较强;学习策略方面的表现一般。独立样本T检验分析表明,初中和高中学生在注意力和学习动机方面上不存在显著差异;初中学生在学习态度、学习策略的表现总体要好于高中生,且初中和高中学生存在显著差异。男女中学生在注意力、学习策略方面不存在显著性差异,在学习态度、学习动机上存在显著差异;女生比男生学习态度更端正、学习动机更强。 相似文献
996.
997.
This paper presents an approach aimed at creating business ontologies for knowledge codification in company. It is based on the principles of ontological engineering and cognitive psychology. Ontologies that describe the main concepts of knowledge are used both for knowledge creation and codification. The proposed framework is targeted at the development of methodologies that can scaffold the process of knowledge structuring and orchestrating for better understanding and knowledge sharing. The orchestrating procedure is the kernel of ontology development. The main stress is put on using visual techniques of mind mapping. Cognitive bias and some results of Gestalt psychology are highlighted as a general guideline. The ideas of balance, clarity, and beauty are applied to the ontology orchestrating procedures. The examples are taken mainly from the project management practice. The paper contributes to managerial practice by describing the practical recommendations for effective knowledge management based on ontology engineering and knowledge structuring techniques. 相似文献
998.
It has been argued that the Internet and social media increase the number of available viewpoints, perspectives, ideas and opinions available, leading to a very diverse pool of information. However, critics have argued that algorithms used by search engines, social networking platforms and other large online intermediaries actually decrease information diversity by forming so-called “filter bubbles”. This may form a serious threat to our democracies. In response to this threat others have developed algorithms and digital tools to combat filter bubbles. This paper first provides examples of different software designs that try to break filter bubbles. Secondly, we show how norms required by two democracy models dominate the tools that are developed to fight the filter bubbles, while norms of other models are completely missing in the tools. The paper in conclusion argues that democracy itself is a contested concept and points to a variety of norms. Designers of diversity enhancing tools must thus be exposed to diverse conceptions of democracy. 相似文献
999.
Rami Ali 《Ethics and Information Technology》2015,17(4):267-274
Luck (2009) argues that gamers face a dilemma when it comes to performing certain virtual acts. Most gamers regularly commit acts of virtual murder, and take these acts to be morally permissible. They are permissible because unlike real murder, no one is harmed in performing them; their only victims are computer-controlled characters, and such characters are not moral patients. What Luck points out is that this justification equally applies to virtual pedophelia, but gamers intuitively think that such acts are not morally permissible. The result is a dilemma: either gamers must reject the intuition that virtual pedophelic acts are impermissible and so accept partaking in such acts, or they must reject the intuition that virtual murder acts are permissible, and so abstain from many (if not most) extant games. While the prevailing solution to this dilemma has been to try and find a morally relevant feature to distinguish the two cases, I argue that a different route should be pursued. It is neither the case that all acts of virtual murder are morally permissible, nor are all acts of virtual pedophelia impermissible. Our intuitions falter and produce this dilemma because they are not sensitive to the different contexts in which games present virtual acts. 相似文献
1000.
Tom Harrison 《Ethics and Information Technology》2015,17(4):275-283
This article draws on a study investigating how 11–14 year olds growing up in England understand cyber-bullying as a moral concern. Three prominent moral theories: deontology, utilitarianism and virtue ethics, informed the development of a semi-structured interview schedule which enabled young people, in their own words, to describe their experiences of online and offline bullying. Sixty 11–14 year olds from six schools across England were involved with the research. Themes emerging from the interviews included anonymity; the absence of rules, monitoring and guidance and, the challenges associated with determining the consequences of online actions. The findings demonstrate the advantages of adopting a character-based moral theory to compliment rules and/or consequence based moral theories as the basis for future research into cyber-bullying. The findings evoke some wider implications for future research into cyber-bullying that might equally be applied to investigations into other Internet related moral concerns. 相似文献