首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   1103篇
  免费   16篇
  国内免费   13篇
教育   617篇
科学研究   244篇
各国文化   1篇
体育   40篇
综合类   50篇
文化理论   3篇
信息传播   177篇
  2023年   13篇
  2022年   19篇
  2021年   34篇
  2020年   31篇
  2019年   32篇
  2018年   31篇
  2017年   21篇
  2016年   28篇
  2015年   31篇
  2014年   63篇
  2013年   82篇
  2012年   68篇
  2011年   65篇
  2010年   68篇
  2009年   52篇
  2008年   72篇
  2007年   102篇
  2006年   75篇
  2005年   75篇
  2004年   51篇
  2003年   31篇
  2002年   26篇
  2001年   34篇
  2000年   13篇
  1999年   5篇
  1998年   2篇
  1997年   2篇
  1995年   1篇
  1994年   2篇
  1993年   1篇
  1992年   2篇
排序方式: 共有1132条查询结果,搜索用时 0 毫秒
21.
黄丽佳  袁勤俭 《现代情报》2017,37(10):114-121
通过对相关文献的回顾,本文对国际网络隐私研究进行了计量分析,发现现有的研究主题集中在"基于移动位置服务的隐私问题研究"、"隐私保护算法研究"、"隐私保护技术研究"、"云计算的隐私安全研究"、"网络隐私权限控制研究"、"社交网站和电子商务中的用户隐私态度与行为研究"、"青少年敏感信息的隐私与安全保护研究"、"数据公开共享策略与国家治理研究"8个方面。研究发现当前研究中存在"利用数据纵向分析网络隐私主题随时间发展变化的研究较少"、"对于一些发展中国家的隐私问题关注度较低"、"国家的治理与业界的隐私政策相对独立缺乏联系"等问题,"大数据时代移动信息和社交信息挖掘过程中的隐私问题"、"在线医疗的隐私问题"等是未来研究值得关注的领域。  相似文献   
22.
美国网络隐私权的行业自律保护及其对我国的启示   总被引:2,自引:1,他引:2  
美国出于对自由政策的传统、现实经济利益、快速发展的网络技术与冗长烦琐的立法程序之间矛盾的考量,实行以行业自律为主导的网络隐私权保护模式。其行业自律主要形式包括建议性的行业指引、网络隐私认证计划、技术保护和企业自律等。考虑到我国目前的现实,如果实施比较严格完善的法律法规来保护网络隐私权,对整个互联网行业将会起到很大的限制作用,这对于我国原本就比较落后的互联网产业来说,更是加重了负担,会阻碍其追赶发达国家的步伐。因此,我国在一定程度上也应借鉴美国以行业自律的方式来保护网络隐私权。  相似文献   
23.
[目的/意义]信息隐私关注和信任是影响智能手机用户的个人信息安全行为的重要因素,对智能手机用户的信息隐私关注和信任与其个人信息安全行为意向关系的探讨有助于更好地理解智能手机用户的信息安全行为。[方法/过程]本文引入以往经验变量,构建了智能手机用户信息隐私关注、信任与其信息安全行为意向之间的作用模型,通过调查问卷收集数据,并利用SmartPLS2.0进行验证。[结果/结论]研究发现:智能手机用户的信息隐私关注对其信息安全行为意向具有正向作用;用户对智能手机生产商和服务商的信任在信息隐私关注和信息安全行为意向之间起到中介作用;智能手机用户信息安全方面的以往经验对其信息隐私关注、信任和信息安全行为意向起正向作用。  相似文献   
24.
The implementation of digital contact tracing applications around the world to help reduce the spread of the COVID-19 pandemic represents one of the most ambitious uses of massive-scale citizen data ever attempted. There is major divergence among nations, however, between a “privacy-first” approach which protects citizens’ data at the cost of extremely limited access for public health authorities and researchers, and a “data-first” approach which stores large amounts of data which, while of immeasurable value to epidemiologists and other researchers, may significantly intrude upon citizens’ privacy. The lack of a consensus on privacy protection in the contact tracing process creates risks of non-compliance or deliberate obfuscation from citizens who fear revealing private aspects of their lives – a factor greatly exacerbated by recent major scandals over online privacy and the illicit use of citizens’ digital information, which have heightened public consciousness of these issues and created significant new challenges for any collection of large-scale public data. While digital contact tracing for COVID-19 remains in its infancy, the lack of consensus around best practices for its implementation and for reassuring citizens of the protection of their privacy may already have impeded its capacity to contribute to the pandemic response.  相似文献   
25.
Although the Internet is largely decentralized in its communication and social patterns, its technical and regulatory apparatuses are highly centralized and hierarchical. Consequently, digital communications are vulnerable to a degree of surveillance and censorship that would be unthinkable in traditional social arenas, threatening “Internet freedom” and cyberliberties in both democratic and politically repressed societies. We believe a new architecture is required in order to protect the continuance of civil liberties in networked society. In this article, we propose 10 “social specifications” describing the requirements of such a network, and outline an architecture called MondoNet that meets these specifications using ad hoc, wireless mesh networking technologies. We also address the legal and technical challenges facing the MondoNet project, and anticipate future developments in this field.  相似文献   
26.
2 0世纪 2 0年代上半期 ,中苏外交关系的建立 ,是一种必然的趋势。这是十月革命后俄国社会性质改变和北京政府迫于国内社会舆论压力的结果。但随着时间的推移和俄国国内情况的好转以及西方列强的干扰 ,又使其好事多磨 ,成为一个长期和非常曲折的发展过程 ;并使中国失去了解决外蒙问题、完全收回中东铁路等与苏俄交涉的有利时机  相似文献   
27.
This study explored the correspondence and differences between school staff perceptions of preschool children's social skills and behavior problems. One hundred preschoolers were assessed by 14 pairs of teachers and classroom aides with the Preschool and Kindergarten Behavior Scales – 2nd Edition (PKBS‐2 Portuguese version). Indexes of agreement and disagreement were calculated. Risk levels and item analyses of PKBS‐2 scores according to both informants' ratings were compared. A higher level of agreement was obtained for social skills scores than for behavior problems (mean correlation of .62). No statistically significant differences between informants were obtained for the risk levels, and item analyses revealed a similar pattern of behaviors that were most and least rated by both informants. Results indicate that the classroom aides' perspective on preschool assessment represents a reliable input, which justifies that they network with teachers in addressing preschoolers' social‐emotional and behavioral challenges.  相似文献   
28.
Recently, there has been a heavy debate in the US about the government’s use of data mining in its fight against terrorism. Privacy concerns in fact led the Congress to terminate the funding of TIA, a program for advanced information technology to be used in the combat of terrorism. The arguments put forward in this debate, more specifically those found in the main report and minority report by the TAPAC established by the Secretary of Defense to examine the TIA issue, will be analysed to trace the deeper roots of this controversy. This analysis will in turn be used as a test case to examine the adequacy of the usual theoretical frameworks for these kinds of issues, in particular the notion of privacy. Whereas the dominant theoretical framing of the notion of privacy turns around access to information, most of the core arguments in the debate do not fit in this kind of framework. The basic disagreements in the controversy are not about mere access, they involve both access and use. Furthermore, whereas the issue of access by itself refers to a more or less static situation, the real disagreements much more concern the organisational dynamics of the use of information, the mechanisms in the organisation that control these dynamics, and the awareness present within the organisation of the ‘social risks’ these dynamics represent. The bottom line question is whether the assessment of these gives sufficient reason for trust.  相似文献   
29.
短文改错对于多数学生来说,是考试中比较困难的一部分,因为短文改错是从语法、结构、词汇等方面来全面考核学生,若你掌握了下列一则口诀,你会觉得轻松多了.  相似文献   
30.
The end of “information”: Computers,democracy, and the university   总被引:1,自引:0,他引:1  
This paper describes some of the challenges which the growing pervasiveness of computers and electronic communications technology present to liberal democracies. We argue that these technologies, by their influence on the mechanisms of publicity and privacy, make possible the abuse of an under-developed popular epistemology. The confused response of the courts to cases of information crime suggests that the university is a better forum in which to meet and master these challenges.Freedom is not a simple experience. And as technology becomes more sophisticated, living in freedom—which means living with constant, changing choice—will only become more complex.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号