首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   298篇
  免费   5篇
  国内免费   2篇
教育   122篇
科学研究   97篇
体育   6篇
综合类   4篇
信息传播   76篇
  2023年   6篇
  2022年   2篇
  2021年   6篇
  2020年   21篇
  2019年   11篇
  2018年   8篇
  2017年   10篇
  2016年   11篇
  2015年   6篇
  2014年   18篇
  2013年   62篇
  2012年   23篇
  2011年   18篇
  2010年   10篇
  2009年   11篇
  2008年   11篇
  2007年   9篇
  2006年   13篇
  2005年   7篇
  2004年   8篇
  2003年   7篇
  2002年   11篇
  2001年   4篇
  2000年   1篇
  1999年   5篇
  1998年   3篇
  1997年   2篇
  1996年   1篇
排序方式: 共有305条查询结果,搜索用时 15 毫秒
51.
This research contributes to the growing body of literature exploring employee perceptions of workplace communication monitoring and surveillance by developing an explanatory model based on predictions derived from communication boundary management theory (CBM; Petronio, 1991 Petronio , S. ( 1991 ). Communication boundary management: A theoretical model of managing disclosure of private information between marital couples . Communication Theory , 1 , 311335 .[Crossref] [Google Scholar], 2001 American Management Association . ( 2001 ). 2001 AMA survey: Workplace monitoring and surveillance . Retrieved September 27, 2003, from http://www.amanet.org  [Google Scholar]). Specifically, this study explores the perceptions of workplace e-mail monitoring from a cross-section of 155 workers. The data suggest that when employees feel that there is a large amount of e-mail monitoring and believe that the monitoring is inappropriate, they respond negatively to top management. The implications of these findings are discussed.  相似文献   
52.
ABSTRACT

RFID technology is taking off in libraries at an increasingly rapid pace. Though there are few libraries employing this technology today, the benefits are great. The cost is still prohibitive however. This article discusses some of the benefits and drawbacks to RFID to provide information for librarians that will be useful when deciding if the technology should be employed.  相似文献   
53.
This paper demonstrates the divergent requestor privacy policies of professional librarians and the administration of the Freedom of Information Act (FOIA), and urges the federal government to adhere to librarian ethics in order to protect FOIA requestors. Section 1 of the paper provides information about the origins and purpose of the FOIA. Section 2 offers an overview of the philosophical and historical origins of library patron privacy ethics, discussing both the ethical basis for patron privacy and actual instances where library records have been sought for government surveillance of private citizens. Section 3 describes the state library laws that protect library requestors, as well as federal laws that protect non-FOIA requestor privacy rights, including the Video Privacy Protection Act (VPPA), which protects video rental records. Section 4 of the paper warns that, in the digital era, it is more important than ever to safeguard personal information like that contained in FOIA requests to prevent the stifling of information seeking activities in the United States. By modifying laws tomeet the needs of the “information age,” the United States government can embrace and utilize the ethical standards that are at the foundation of librarianship, and protect the principle that information should be free and available to the American populace.  相似文献   
54.
User satisfaction is a crucial factor for continual usage of e-Government services and for the success or failure of e-Government projects. The main challenge for Jordanians is what are the key determinants of their satisfaction? This paper aims to identify the key factors that determine Jordanians' e-Satisfaction with Jordan's e-Government services portal. Based on an extensive review of relevant literature, five hypotheses are formulated and five factors are identified (i.e., security and privacy, trust, accessibility, awareness of public services, and quality of public services) that may affect the Jordanians' level of satisfaction towards using the Jordan e-Government portal (www.jordan.gov.jo). Survey data from 400 employees in four universities in the northern region of Jordan were collected and used to test the proposed hypotheses. Based on multiple linear regression and factor analyses, our empirical analysis demonstrates several key findings. These findings indicate the usefulness and importance to unveil the key drivers of e-Satisfaction so as to provide feedback in a set of recommendations that will enable creating e-Government portals which are compatible with citizens' needs, desires, and expectations. They also provide insights for both practitioners and governmental policy-makers to enhance e-Government portals via accounting diverse factors of technical, behavioral, managerial, and motivational aspects. Finally, implications and recommendations of these findings were discussed.  相似文献   
55.
This study explores the communication used by survivors after they have experienced an incident of sexual victimization. Specifically, it examines sexual victimization survivors’ criteria for disclosure through the lens of communication privacy management theory. Participants completed an online questionnaire in which they described their first disclosure incident. Qualitative analysis of these incidents illustrated survivors’ reasons for disclosing, anxieties during disclosure and the power the recipient often has in shaping the outcome of the disclosure event. These findings may be used to aid future survivors and recipients of this high-risk disclosure.  相似文献   
56.
Computer-mediated communication has become one of the many teaching strategies used to enhance students' cognitive and affective learning. What happens, however, when instructors use the Internet for personal purposes, such as staying in touch with friends and sharing gossip? This study investigated how college students perceive and communicatively manage their instructors' private information after viewing these profiles. An interpretive analysis of 21 interviews with college students confirmed previous research regarding student perceptions of instructors' self-disclosure, and students reported the information online impacted their communication with the instructor in various ways. Implications and future research suggestions are discussed.  相似文献   
57.
There is a dearth of information regarding the socioemotional realities of gifted children from ethnically diverse backgrounds, which this research attempts to address. Multiple semistructured narrative interviews were conducted with 22 intellectually superior children aged 4–9 years and with their parents. Manifestations of perfectionism, hypersensitivities, and overexcitabilities were evident among the Filipino gifted children. The implications of such manifestations of heightened sensitivities for educators and diagnosticians were discussed. Cross-cultural contrasts were likewise discussed to demonstrate whether predominant socioaffective traits, characteristics, and issues in the West are likewise evident among gifted children from a culturally different background like the Philippines.  相似文献   
58.
Privacy-preserving collaborative filtering schemes focus on eliminating the privacy threats inherent in single preference values, and the privacy risks in the multi-criteria preference domain are disregarded. In this work, we introduce randomized perturbation-based privacy-preserving approaches for multi-criteria collaborative filtering systems. Initially, the privacy protection methods efficiently used in traditional single-criterion systems are adapted onto multi-criteria ratings. However, these systems require intelligent protection mechanisms that are flexible and adapting to the structure of each sub-criterion. To achieve such a goal, we introduce a novel privacy-preserving protocol by adapting an entropy-based randomness determination procedure that can recover accuracy losses. The proposed protocol adjusts privacy-controlling parameters concerning the information inherent in each criterion. We experimentally evaluate the proposed schemes on three subsets of Yahoo!Movies multi-criteria preference dataset to demonstrate the effects of the proposed privacy-preserving schemes on both user privacy levels and prediction accuracy for differing sparsity rates. According to the obtained experimental outcomes, the proposed entropy-based privacy-preserving scheme can produce significantly more accurate predictions while maintaining an identical level of privacy provided by the traditional privacy protection scenario. The experimental results also confirm that the novel entropy-based privacy-preserving scheme maintains the confidentiality of personal preferences without severely compromising prediction accuracy.  相似文献   
59.
This article focuses on the role of accountability within information management, particularly in cloud computing contexts. Key to this notion is that an accountable Cloud Provider must demonstrate both willingness and capacity for being a responsible steward of other people's data. More generally, the notion of accountability is defined as it applies to the cloud, and a conceptual model is presented related to the provision of accountability of cloud services. This allows a consideration of accountability at various different levels of abstraction, including the operationalisation of accountability. It is underpinned by fundamental requirements for strong accountability, which in particular are aimed at avoiding risks in the provision and verification of accounts (that include different types of accountability evidence and notifications, that may need to be provided to other cloud actors including data subjects, cloud customers and regulators). In addition, the article sketches what kind of tools, mechanisms and guidelines support this in practice, and discusses these in the light of the upcoming European Data Protection Regulation.  相似文献   
60.
Although the Children’s Online Privacy Protection Act (COPPA) was enacted 20?years ago, the recently updated General Data Protection Regulation (GDPR) has renewed public interest in privacy policies. Under both COPPA and GDPR, companies must abide by strict regulations protecting children’s personal data. Lengthy and oftentimes ambiguous policies contribute to misinformed users agreeing to terms that might compromise a child’s data. This article provides guidelines for evaluating privacy policies for children that can be used by teachers, parents, and, where appropriate, even the children themselves. Resources from Common Sense Education, including free digital citizenship lesson plans and a review repository of popular apps and websites for children, are also highlighted.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号