全文获取类型
收费全文 | 298篇 |
免费 | 5篇 |
国内免费 | 2篇 |
专业分类
教育 | 122篇 |
科学研究 | 97篇 |
体育 | 6篇 |
综合类 | 4篇 |
信息传播 | 76篇 |
出版年
2023年 | 6篇 |
2022年 | 2篇 |
2021年 | 6篇 |
2020年 | 21篇 |
2019年 | 11篇 |
2018年 | 8篇 |
2017年 | 10篇 |
2016年 | 11篇 |
2015年 | 6篇 |
2014年 | 18篇 |
2013年 | 62篇 |
2012年 | 23篇 |
2011年 | 18篇 |
2010年 | 10篇 |
2009年 | 11篇 |
2008年 | 11篇 |
2007年 | 9篇 |
2006年 | 13篇 |
2005年 | 7篇 |
2004年 | 8篇 |
2003年 | 7篇 |
2002年 | 11篇 |
2001年 | 4篇 |
2000年 | 1篇 |
1999年 | 5篇 |
1998年 | 3篇 |
1997年 | 2篇 |
1996年 | 1篇 |
排序方式: 共有305条查询结果,搜索用时 15 毫秒
31.
网络隐私顾虑被认为是阻碍用户披露个人信息的重要影响因素并越来越受到学术界的重视。鉴于隐私是与情境相联系的多维、动态的概念,情境的变化会影响用户对隐私的理解,本文结合现实背景提出了电子商务环境下网络隐私顾虑的理论概念,在以往研究的基础上确定了网络隐私顾虑的构成维度,开发出初始的测量指标,然后通过3套独立的样本数据进行探索式因子分析、验证式因子分析和关联效度分析。结果表明量表具有良好的信度和效度,网络隐私顾虑由控制、收集、二次使用、错误、不当访问与补救5个维度和19个题项构成。 相似文献
32.
Henry Spencer 《The Information Society》1997,13(2):163-170
We are heading into an era of uncontrolled and uncontrollable information flow. In the past, the tools of information flow required large investments, and the persons controlling them were easily identifiable. Now, effective long-range communication with large numbers of people can be done using tools that are easily affordable to the average citizen. Moreover, it can be done in ways that make monitoring and control virtually impossible. This is not a worrisome future change that can be averted by prompt action; it is a fait accompli and there is no reversing it. However, this is not necessarily clear to those interested in monitoring and control. Unfortunately, the bulk of electronic communication is still relatively exposed to monitoring and control, and is likely to remain so for a while. The danger is that the authorities, trying to retain a grip on a situation that is irretrievably slipping away, will react to the extremes of the problem in ways that leave ordinary users' privacy unprotected. The best approach is to adapt traditional solutions rather than inventing new ones. The safeguards built into the traditional solutions may not be precisely appropriate, but they are far better than nothing. 相似文献
33.
Stuart Shapiro 《The Information Society》1998,14(4):275-284
While recent developments in information and communication technologies have produced heightened concern over privacy issues, technology and privacy have a long history of interaction. The home has served as a key locus for this interaction. By distinguishing inside from outside, the home supports the allocation of particular behaviors and information to different areas, both physical and virtual. This article explores how different technologies, including structural elements, have affected and reflected over time the boundary represented by the home and how that boundary has helped shape the construction of privacy in the West. This illustrates how privacy might be conceptualized as a social condition arising from the interaction of various boundaries, including the principal one separating the public and the private. 相似文献
34.
《International Journal of Information Management》2017,37(6):590-600
Although social commerce is an important trend in practice, relatively few research studies have explored the impact of social commerce innovations launched within social networking sites. The deployment of a gift-giving service within a social networking site provides a unique opportunity to study the intersection of technological innovations and social norms and its potential to generate new revenue for ecommerce sites. Using Facebook Gifts as a real-world context for the study, we explore the factor structure of salient user beliefs influencing usage intention, and examine the relationships between beliefs and intention to use the service in a broader nomological network. Instead of adopting constructs from existing models, we started with the elicitation of salient beliefs and proceeded with successive stages of refinement to develop a suitable model. The empirical results show countervailing effects of perceived social utility and perceived convenience of the service on one hand, and low perceived value and privacy concerns on the other. A notable finding is the potential conflict arising between the expectations of effort associated with the procurement of a gift and the common perception of technology as reducing the required effort. The net result is that a technology-mediated gift service in the context of a social networking site runs counter to the social norms associated with traditional gift exchanges. This insight provides evidence of the dual challenge for social commerce initiatives. In order to be successful, new services in this area must leverage the potential of the technology as well as social practices. 相似文献
35.
36.
从个人资料保护看人事档案法制的重构 总被引:3,自引:1,他引:2
在市场经济背景下,个人的权利意识日渐强烈,过于强调公共利益性质与绝对保密性质的传统人事档案管理法制无法适应个人资料保护运动所提出的在人事档案收集与处理中保护个人权利的基本要求.有必要将现行<干部档案工作条例>和<流动人员人事档案管理暂行规定>合并,制定统一的<人事档案法>,对公务员、事业单位工作人员和企业职工的人事档案等进行分类管理,同时将"保障档案当事人的合法权益"与"档案事务对档案当事人本人公开"作为修法的基本准则. 相似文献
37.
This article provides a more differentiated understanding of mobile health consumers, and considers whether health app use may contribute to new digital inequalities. It focuses on factors associated with mobile health app use, and identifies which factors explain the use of different types of health apps. Data from a large representative sample of the Dutch population (N = 1,079) show that mobile health app users were generally younger, higher educated, and had higher levels of e-health literacy skills than non-users. Interestingly, different usage patterns were found for specific types of health apps. Theory and policy implications are discussed. 相似文献
38.
39.
HENRY SPENCER 《The Information Society》2013,29(2):163-170
We are heading into an era of uncontrolled and uncontrollable information flow. In the past, the tools of information flow required large investments, and the persons controlling them were easily identifiable. Now, effective long-range communication with large numbers of people can be done using tools that are easily affordable to the average citizen. Moreover, it can be done in ways that make monitoring and control virtually impossible. This is not a worrisome future change that can be averted by prompt action; it is a fait accompli and there is no reversing it. However, this is not necessarily clear to those interested in monitoring and control. Unfortunately, the bulk of electronic communication is still relatively exposed to monitoring and control, and is likely to remain so for a while. The danger is that the authorities, trying to retain a grip on a situation that is irretrievably slipping away, will react to the extremes of the problem in ways that leave ordinary users' privacy unprotected. The best approach is to adapt traditional solutions rather than inventing new ones. The safeguards built into the traditional solutions may not be precisely appropriate, but they are far better than nothing. 相似文献
40.
Jingwei Miao Omar Hasan Sonia Ben Mokhtar Lionel Brunie Kangbin Yim 《International Journal of Information Management》2013
Message routing in mobile delay tolerant networks inherently relies on the cooperation between nodes. In most existing routing protocols, the participation of nodes in the routing process is taken as granted. However, in reality, nodes can be unwilling to participate. We first show in this paper the impact of the unwillingness of nodes to participate in existing routing protocols through a set of experiments. Results show that in the presence of even a small proportion of nodes that do not forward messages, performance is heavily degraded. We then analyze two major reasons of the unwillingness of nodes to participate, i.e., their rational behavior (also called selfishness) and their wariness of disclosing private mobility information. 相似文献