全文获取类型
收费全文 | 298篇 |
免费 | 5篇 |
国内免费 | 2篇 |
专业分类
教育 | 122篇 |
科学研究 | 97篇 |
体育 | 6篇 |
综合类 | 4篇 |
信息传播 | 76篇 |
出版年
2023年 | 6篇 |
2022年 | 2篇 |
2021年 | 6篇 |
2020年 | 21篇 |
2019年 | 11篇 |
2018年 | 8篇 |
2017年 | 10篇 |
2016年 | 11篇 |
2015年 | 6篇 |
2014年 | 18篇 |
2013年 | 62篇 |
2012年 | 23篇 |
2011年 | 18篇 |
2010年 | 10篇 |
2009年 | 11篇 |
2008年 | 11篇 |
2007年 | 9篇 |
2006年 | 13篇 |
2005年 | 7篇 |
2004年 | 8篇 |
2003年 | 7篇 |
2002年 | 11篇 |
2001年 | 4篇 |
2000年 | 1篇 |
1999年 | 5篇 |
1998年 | 3篇 |
1997年 | 2篇 |
1996年 | 1篇 |
排序方式: 共有305条查询结果,搜索用时 15 毫秒
51.
This research contributes to the growing body of literature exploring employee perceptions of workplace communication monitoring and surveillance by developing an explanatory model based on predictions derived from communication boundary management theory (CBM; Petronio, 1991, 2001). Specifically, this study explores the perceptions of workplace e-mail monitoring from a cross-section of 155 workers. The data suggest that when employees feel that there is a large amount of e-mail monitoring and believe that the monitoring is inappropriate, they respond negatively to top management. The implications of these findings are discussed. 相似文献
52.
《Journal Of Access Services》2013,10(4):7-13
ABSTRACT RFID technology is taking off in libraries at an increasingly rapid pace. Though there are few libraries employing this technology today, the benefits are great. The cost is still prohibitive however. This article discusses some of the benefits and drawbacks to RFID to provide information for librarians that will be useful when deciding if the technology should be employed. 相似文献
53.
This paper demonstrates the divergent requestor privacy policies of professional librarians and the administration of the Freedom of Information Act (FOIA), and urges the federal government to adhere to librarian ethics in order to protect FOIA requestors. Section 1 of the paper provides information about the origins and purpose of the FOIA. Section 2 offers an overview of the philosophical and historical origins of library patron privacy ethics, discussing both the ethical basis for patron privacy and actual instances where library records have been sought for government surveillance of private citizens. Section 3 describes the state library laws that protect library requestors, as well as federal laws that protect non-FOIA requestor privacy rights, including the Video Privacy Protection Act (VPPA), which protects video rental records. Section 4 of the paper warns that, in the digital era, it is more important than ever to safeguard personal information like that contained in FOIA requests to prevent the stifling of information seeking activities in the United States. By modifying laws tomeet the needs of the “information age,” the United States government can embrace and utilize the ethical standards that are at the foundation of librarianship, and protect the principle that information should be free and available to the American populace. 相似文献
54.
User satisfaction is a crucial factor for continual usage of e-Government services and for the success or failure of e-Government projects. The main challenge for Jordanians is what are the key determinants of their satisfaction? This paper aims to identify the key factors that determine Jordanians' e-Satisfaction with Jordan's e-Government services portal. Based on an extensive review of relevant literature, five hypotheses are formulated and five factors are identified (i.e., security and privacy, trust, accessibility, awareness of public services, and quality of public services) that may affect the Jordanians' level of satisfaction towards using the Jordan e-Government portal (www.jordan.gov.jo). Survey data from 400 employees in four universities in the northern region of Jordan were collected and used to test the proposed hypotheses. Based on multiple linear regression and factor analyses, our empirical analysis demonstrates several key findings. These findings indicate the usefulness and importance to unveil the key drivers of e-Satisfaction so as to provide feedback in a set of recommendations that will enable creating e-Government portals which are compatible with citizens' needs, desires, and expectations. They also provide insights for both practitioners and governmental policy-makers to enhance e-Government portals via accounting diverse factors of technical, behavioral, managerial, and motivational aspects. Finally, implications and recommendations of these findings were discussed. 相似文献
55.
This study explores the communication used by survivors after they have experienced an incident of sexual victimization. Specifically, it examines sexual victimization survivors’ criteria for disclosure through the lens of communication privacy management theory. Participants completed an online questionnaire in which they described their first disclosure incident. Qualitative analysis of these incidents illustrated survivors’ reasons for disclosing, anxieties during disclosure and the power the recipient often has in shaping the outcome of the disclosure event. These findings may be used to aid future survivors and recipients of this high-risk disclosure. 相似文献
56.
Computer-mediated communication has become one of the many teaching strategies used to enhance students' cognitive and affective learning. What happens, however, when instructors use the Internet for personal purposes, such as staying in touch with friends and sharing gossip? This study investigated how college students perceive and communicatively manage their instructors' private information after viewing these profiles. An interpretive analysis of 21 interviews with college students confirmed previous research regarding student perceptions of instructors' self-disclosure, and students reported the information online impacted their communication with the instructor in various ways. Implications and future research suggestions are discussed. 相似文献
57.
Rhoda Myra Garces-Bacsal 《Roeper Review》2013,35(4):239-251
There is a dearth of information regarding the socioemotional realities of gifted children from ethnically diverse backgrounds, which this research attempts to address. Multiple semistructured narrative interviews were conducted with 22 intellectually superior children aged 4–9 years and with their parents. Manifestations of perfectionism, hypersensitivities, and overexcitabilities were evident among the Filipino gifted children. The implications of such manifestations of heightened sensitivities for educators and diagnosticians were discussed. Cross-cultural contrasts were likewise discussed to demonstrate whether predominant socioaffective traits, characteristics, and issues in the West are likewise evident among gifted children from a culturally different background like the Philippines. 相似文献
58.
Privacy-preserving collaborative filtering schemes focus on eliminating the privacy threats inherent in single preference values, and the privacy risks in the multi-criteria preference domain are disregarded. In this work, we introduce randomized perturbation-based privacy-preserving approaches for multi-criteria collaborative filtering systems. Initially, the privacy protection methods efficiently used in traditional single-criterion systems are adapted onto multi-criteria ratings. However, these systems require intelligent protection mechanisms that are flexible and adapting to the structure of each sub-criterion. To achieve such a goal, we introduce a novel privacy-preserving protocol by adapting an entropy-based randomness determination procedure that can recover accuracy losses. The proposed protocol adjusts privacy-controlling parameters concerning the information inherent in each criterion. We experimentally evaluate the proposed schemes on three subsets of Yahoo!Movies multi-criteria preference dataset to demonstrate the effects of the proposed privacy-preserving schemes on both user privacy levels and prediction accuracy for differing sparsity rates. According to the obtained experimental outcomes, the proposed entropy-based privacy-preserving scheme can produce significantly more accurate predictions while maintaining an identical level of privacy provided by the traditional privacy protection scenario. The experimental results also confirm that the novel entropy-based privacy-preserving scheme maintains the confidentiality of personal preferences without severely compromising prediction accuracy. 相似文献
59.
This article focuses on the role of accountability within information management, particularly in cloud computing contexts. Key to this notion is that an accountable Cloud Provider must demonstrate both willingness and capacity for being a responsible steward of other people's data. More generally, the notion of accountability is defined as it applies to the cloud, and a conceptual model is presented related to the provision of accountability of cloud services. This allows a consideration of accountability at various different levels of abstraction, including the operationalisation of accountability. It is underpinned by fundamental requirements for strong accountability, which in particular are aimed at avoiding risks in the provision and verification of accounts (that include different types of accountability evidence and notifications, that may need to be provided to other cloud actors including data subjects, cloud customers and regulators). In addition, the article sketches what kind of tools, mechanisms and guidelines support this in practice, and discusses these in the light of the upcoming European Data Protection Regulation. 相似文献
60.
Joanna C. Zimmerle 《学校用计算机》2019,36(1):38-47
Although the Children’s Online Privacy Protection Act (COPPA) was enacted 20?years ago, the recently updated General Data Protection Regulation (GDPR) has renewed public interest in privacy policies. Under both COPPA and GDPR, companies must abide by strict regulations protecting children’s personal data. Lengthy and oftentimes ambiguous policies contribute to misinformed users agreeing to terms that might compromise a child’s data. This article provides guidelines for evaluating privacy policies for children that can be used by teachers, parents, and, where appropriate, even the children themselves. Resources from Common Sense Education, including free digital citizenship lesson plans and a review repository of popular apps and websites for children, are also highlighted. 相似文献