首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   298篇
  免费   5篇
  国内免费   2篇
教育   122篇
科学研究   97篇
体育   6篇
综合类   4篇
信息传播   76篇
  2023年   6篇
  2022年   2篇
  2021年   6篇
  2020年   21篇
  2019年   11篇
  2018年   8篇
  2017年   10篇
  2016年   11篇
  2015年   6篇
  2014年   18篇
  2013年   62篇
  2012年   23篇
  2011年   18篇
  2010年   10篇
  2009年   11篇
  2008年   11篇
  2007年   9篇
  2006年   13篇
  2005年   7篇
  2004年   8篇
  2003年   7篇
  2002年   11篇
  2001年   4篇
  2000年   1篇
  1999年   5篇
  1998年   3篇
  1997年   2篇
  1996年   1篇
排序方式: 共有305条查询结果,搜索用时 15 毫秒
31.
网络隐私顾虑被认为是阻碍用户披露个人信息的重要影响因素并越来越受到学术界的重视。鉴于隐私是与情境相联系的多维、动态的概念,情境的变化会影响用户对隐私的理解,本文结合现实背景提出了电子商务环境下网络隐私顾虑的理论概念,在以往研究的基础上确定了网络隐私顾虑的构成维度,开发出初始的测量指标,然后通过3套独立的样本数据进行探索式因子分析、验证式因子分析和关联效度分析。结果表明量表具有良好的信度和效度,网络隐私顾虑由控制、收集、二次使用、错误、不当访问与补救5个维度和19个题项构成。  相似文献   
32.
We are heading into an era of uncontrolled and uncontrollable information flow. In the past, the tools of information flow required large investments, and the persons controlling them were easily identifiable. Now, effective long-range communication with large numbers of people can be done using tools that are easily affordable to the average citizen. Moreover, it can be done in ways that make monitoring and control virtually impossible. This is not a worrisome future change that can be averted by prompt action; it is a fait accompli and there is no reversing it. However, this is not necessarily clear to those interested in monitoring and control. Unfortunately, the bulk of electronic communication is still relatively exposed to monitoring and control, and is likely to remain so for a while. The danger is that the authorities, trying to retain a grip on a situation that is irretrievably slipping away, will react to the extremes of the problem in ways that leave ordinary users' privacy unprotected. The best approach is to adapt traditional solutions rather than inventing new ones. The safeguards built into the traditional solutions may not be precisely appropriate, but they are far better than nothing.  相似文献   
33.
While recent developments in information and communication technologies have produced heightened concern over privacy issues, technology and privacy have a long history of interaction. The home has served as a key locus for this interaction. By distinguishing inside from outside, the home supports the allocation of particular behaviors and information to different areas, both physical and virtual. This article explores how different technologies, including structural elements, have affected and reflected over time the boundary represented by the home and how that boundary has helped shape the construction of privacy in the West. This illustrates how privacy might be conceptualized as a social condition arising from the interaction of various boundaries, including the principal one separating the public and the private.  相似文献   
34.
Although social commerce is an important trend in practice, relatively few research studies have explored the impact of social commerce innovations launched within social networking sites. The deployment of a gift-giving service within a social networking site provides a unique opportunity to study the intersection of technological innovations and social norms and its potential to generate new revenue for ecommerce sites. Using Facebook Gifts as a real-world context for the study, we explore the factor structure of salient user beliefs influencing usage intention, and examine the relationships between beliefs and intention to use the service in a broader nomological network. Instead of adopting constructs from existing models, we started with the elicitation of salient beliefs and proceeded with successive stages of refinement to develop a suitable model. The empirical results show countervailing effects of perceived social utility and perceived convenience of the service on one hand, and low perceived value and privacy concerns on the other. A notable finding is the potential conflict arising between the expectations of effort associated with the procurement of a gift and the common perception of technology as reducing the required effort. The net result is that a technology-mediated gift service in the context of a social networking site runs counter to the social norms associated with traditional gift exchanges. This insight provides evidence of the dual challenge for social commerce initiatives. In order to be successful, new services in this area must leverage the potential of the technology as well as social practices.  相似文献   
35.
论图书馆用户的隐私保护   总被引:20,自引:0,他引:20  
论述了图书馆用户隐私保护的内容和政策,指出了图书馆用户隐私保护的意义。  相似文献   
36.
从个人资料保护看人事档案法制的重构   总被引:3,自引:1,他引:2  
在市场经济背景下,个人的权利意识日渐强烈,过于强调公共利益性质与绝对保密性质的传统人事档案管理法制无法适应个人资料保护运动所提出的在人事档案收集与处理中保护个人权利的基本要求.有必要将现行<干部档案工作条例>和<流动人员人事档案管理暂行规定>合并,制定统一的<人事档案法>,对公务员、事业单位工作人员和企业职工的人事档案等进行分类管理,同时将"保障档案当事人的合法权益"与"档案事务对档案当事人本人公开"作为修法的基本准则.  相似文献   
37.
This article provides a more differentiated understanding of mobile health consumers, and considers whether health app use may contribute to new digital inequalities. It focuses on factors associated with mobile health app use, and identifies which factors explain the use of different types of health apps. Data from a large representative sample of the Dutch population (N = 1,079) show that mobile health app users were generally younger, higher educated, and had higher levels of e-health literacy skills than non-users. Interestingly, different usage patterns were found for specific types of health apps. Theory and policy implications are discussed.  相似文献   
38.
介绍了实用、方便、高性能的办公软件"办公通"的设计与实现方法,该软件利用实用的计算机编程技术,实现了个人文件管理、隐私保护、工作日程提醒的功能,且运用多线程并发的方式实现了局域网内即时通信。该软件基于Microsoft.net framework 3.0的框架编写,实验证明其适用于Microsoft Windows各种版本系统。  相似文献   
39.
We are heading into an era of uncontrolled and uncontrollable information flow. In the past, the tools of information flow required large investments, and the persons controlling them were easily identifiable. Now, effective long-range communication with large numbers of people can be done using tools that are easily affordable to the average citizen. Moreover, it can be done in ways that make monitoring and control virtually impossible. This is not a worrisome future change that can be averted by prompt action; it is a fait accompli and there is no reversing it. However, this is not necessarily clear to those interested in monitoring and control. Unfortunately, the bulk of electronic communication is still relatively exposed to monitoring and control, and is likely to remain so for a while. The danger is that the authorities, trying to retain a grip on a situation that is irretrievably slipping away, will react to the extremes of the problem in ways that leave ordinary users' privacy unprotected. The best approach is to adapt traditional solutions rather than inventing new ones. The safeguards built into the traditional solutions may not be precisely appropriate, but they are far better than nothing.  相似文献   
40.
Message routing in mobile delay tolerant networks inherently relies on the cooperation between nodes. In most existing routing protocols, the participation of nodes in the routing process is taken as granted. However, in reality, nodes can be unwilling to participate. We first show in this paper the impact of the unwillingness of nodes to participate in existing routing protocols through a set of experiments. Results show that in the presence of even a small proportion of nodes that do not forward messages, performance is heavily degraded. We then analyze two major reasons of the unwillingness of nodes to participate, i.e., their rational behavior (also called selfishness) and their wariness of disclosing private mobility information.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号