首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   4212篇
  免费   52篇
  国内免费   26篇
教育   3305篇
科学研究   340篇
各国文化   6篇
体育   143篇
综合类   217篇
文化理论   4篇
信息传播   275篇
  2024年   2篇
  2023年   11篇
  2022年   31篇
  2021年   61篇
  2020年   104篇
  2019年   70篇
  2018年   53篇
  2017年   72篇
  2016年   67篇
  2015年   99篇
  2014年   224篇
  2013年   341篇
  2012年   287篇
  2011年   336篇
  2010年   263篇
  2009年   213篇
  2008年   294篇
  2007年   341篇
  2006年   352篇
  2005年   227篇
  2004年   248篇
  2003年   177篇
  2002年   181篇
  2001年   128篇
  2000年   66篇
  1999年   20篇
  1998年   5篇
  1997年   6篇
  1996年   2篇
  1995年   2篇
  1994年   1篇
  1993年   1篇
  1992年   3篇
  1991年   1篇
  1957年   1篇
排序方式: 共有4290条查询结果,搜索用时 15 毫秒
261.
Excavating what Jeffrey Cohen [2015. Stone: An ecology of the inhuman. Minneapolis: University of Minnesota Press] calls ‘lithic ecomateriality’, in this paper we illustrate how rocks have traditionally been conceptualized through three tropes: rocks as insensate; rocks as personified; and rocks as transformative. We take up the concept of inhuman to challenge human-centric taxonomies of rocks and animacy. If rocks are not lifeless, or only considered as ‘resources’ or ‘threats’, to humans, then thinking with rocks as vital extends our ethical and political response. In the final section of the paper, we consider archives, not as a logical form of organizing knowledge, but as material, vital, and affective. We argue that when stones and archives are examined as something more than stable things – as interfactual, transcorporeal, and transmaterial co-compositions – different ethical relatings to the inhuman world become possible.  相似文献   
262.
My avatar,my self: Virtual harm and attachment   总被引:1,自引:0,他引:1  
Multi-user online environments involve millions of participants world-wide. In these online communities participants can use their online personas – avatars – to chat, fight, make friends, have sex, kill monsters and even get married. Unfortunately participants can also use their avatars to stalk, kill, sexually assault, steal from and torture each other. Despite attempts to minimise the likelihood of interpersonal virtual harm, programmers cannot remove all possibility of online deviant behaviour. Participants are often greatly distressed when their avatars are harmed by other participants’ malicious actions, yet there is a tendency in the literature on this topic to dismiss such distress as evidence of too great an involvement in and identification with the online character. In this paper I argue that this dismissal of virtual harm is based on a set of false assumptions about the nature of avatar attachment and its relation to genuine moral harm. I argue that we cannot dismiss avatar attachment as morally insignificant without being forced to also dismiss other, more acceptable, forms of attachment such as attachment to possessions, people and cultural objects and communities. Arguments against according moral significance to virtual harm fail because they do not reflect participants’ and programmers’ experiences and expectations of virtual communities and they have the unintended consequence of failing to grant significance to attachments that we take for granted, morally speaking. Avatar attachment is expressive of identity and self-conception and should therefore be accorded the moral significance we give to real-life attachments that play a similar role. A shorter version of this paper was presented at the Cyberspace 2005 Conference at Masaryk University, Brno, Czech Republic  相似文献   
263.
高等医学专业学生既要具备扎实的专业知识和临床技能,同时也要具备很高的医学人文素质。人文素质教育对培养新时代兼具深厚的人文素养与高超医术的医学人才至关重要。本文首先阐述了目前医学生人文素质教育的现状,并从人文教育理念、课程设置、师资队伍、教育方式和评价方法、校园文化等几个方面,提出一些有益于医学院校人文素质教育培养、提高医学生人文素质的举措。  相似文献   
264.
The paper addresses severalethical issues in online communication researchin light of digital ontology as well as theepistemological questions raised by theblurring boundary between fact and theory inthis field. The concept of ontology is used ina Heideggerian sense as related to the humancapacity of world construction on the basis ofthe givenness of our being-in-the-world.Ethical dilemmas of Internet research thusarise from the tension between bodily existenceand the proper object of research, i.e., onlineexistence. The following issues are beingconsidered: online identity, online language,online consent and confidentiality. We alsoargue that research ethics in the US followsthe utilitarian tradition, while Europeanresearchers are deontologically oriented. Aguideline of best practice in online researchethics is proposed.  相似文献   
265.
This essay describes a new ethical theory that has begun to coalesce from the works of several scholars in the international computer ethics community. I call the new theory ‚Flourishing Ethics’ because of its Aristotelian roots, though it also includes ideas suggestive of Taoism and Buddhism. In spite of its roots in ancient ethical theories, Flourishing Ethics is informed and grounded by recent scientific insights into the nature of living things, human nature and the fundamental nature of the universe – ideas from today’s information theory, astrophysics and genetics. Flourishing Ethics can be divided conveniently into two parts. The first part, which I call ‚Human-Centered FE,’ is focused exclusively upon human beings – their actions, values and characters. The second part, which I call ‚General FE,’ applies to every physical entity in the universe, including humans. Rather than replacing traditional ‚great ethical theories,’ Flourishing Ethics is likely to deepen and broaden our understanding of them.  相似文献   
266.
技术人工物的本体属性经过还原后存在多种争议,造成使用者和设计者在对其认知和行为方式上的困扰。本文通过技术人工物的“两重性”和“三重性”的溯源;伦理实在性的前提批判;伦理本体属性的考量和“四重性”的实践进路,四个层面解析技术人工物底层属性逻辑的问题,以期伦理转向视角为技术人工物的技术治理提供一些解决思路。  相似文献   
267.
网络伦理的社会调控机制   总被引:4,自引:0,他引:4  
沙勇忠 《情报科学》2007,25(1):8-14,20
网络伦理要发挥引导和规范网络信息活动的作用。需要相应的社会调控机制的支持。本文探讨了网络伦理社会调控机制的建构原则。提出了由运行支点、内在维系力和调控方式与手段所构成网络伦理社会调控机制之体系结构。并对其内容进行了阐述。  相似文献   
268.
On the intrinsic value of information objects and the infosphere   总被引:4,自引:3,他引:4  
What is the most general common set ofattributes that characterises something asintrinsically valuableand hence as subject to some moral respect, andwithout which something would rightly beconsidered intrinsically worthless or even positivelyunworthy and therefore rightly to bedisrespected in itself? Thispaper develops and supports the thesis that theminimal condition of possibility of an entity'sleast intrinsic value is to be identified with itsontological status as an information object.All entities, even when interpreted as only clusters ofinformation, still have a minimal moral worthqua information objects and so may deserve to be respected. Thepaper is organised into four main sections.Section 1 models moral action as an information systemusing the object-oriented programmingmethodology (OOP). Section 2 addresses the question of whatrole the several components constituting themoral system can have in an ethical analysis. If theycan play only an instrumental role, thenComputer Ethics (CE) is probably bound to remain at most apractical, field-dependent, applied orprofessional ethics. However, Computer Ethics can give rise to amacroethical approach, namely InformationEthics (IE), if one can show that ethical concern should beextended to include not only human, animal orbiological entities, but also information objects. Thefollowing two sections show how this minimalistlevel of analysis can be achieved. Section 3 provides anaxiological analysis of information objects. Itcriticises the Kantian approach to the concept ofintrinsic value and shows that it can beimproved by using the methodology introduced in the first section.The solution of the Kantian problem prompts thereformulation of the key question concerningthe moral worth of an entity: what is theintrinsic value of x qua an object constituted by itsinherited attributes? In answering thisquestion, it is argued that entitiescan share different observable propertiesdepending on the level of abstraction adopted,and that it is still possible to speak of moral value even at thehighest level of ontological abstractionrepresented by the informational analysis. Section 4 develops aminimalist axiology based on the concept ofinformation object. It further supports IE's position byaddressing five objections that may undermineits acceptability.  相似文献   
269.
This article offers a discussion of the connection between technology and values and, specifically, I take a closer look at ethically sound design. In order to bring the discussion into a concrete context, the theory of Value Sensitive Design (VSD) will be the focus point. To illustrate my argument concerning design ethics, the discussion involves a case study of an augmented window, designed by the VSD Research Lab, which has turned out to be a potentially surveillance-enabling technology. I call attention to a “positivist problem” that has to do with the connection between the design context and the use context, which VSD seems to presuppose, and I argue that it is necessary to clearly distinguish between the two, since the designers’ intentions do not always correspond with the users’ practice; in fact, the relation between design and use is very complex and principally unpredictable. Thus, a design theory must accept that foresight is limited to anticipation rather than prediction. To overcome the positivist problem, I suggest a phenomenological approach to technology inspired by Don Ihde’s concept of multistability. This argument, which is general in nature and thus applies to any theory of design ethics, is intended as a constructive criticism, which can hopefully contribute to the further development of design ethics.  相似文献   
270.
美国女性环保主义初探   总被引:1,自引:0,他引:1  
女性环保主义包容了妇女和环保这两个极富现实意义的主题。文章以马克思主义的妇女观、环境观和哲学观为指导 ,将妇女运动置于环保层面加以审视和评价 ,进而论述了美国女性环保主义的当今动态、思想根源、发展历程及启迪作用  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号