全文获取类型
收费全文 | 757篇 |
免费 | 7篇 |
国内免费 | 6篇 |
专业分类
教育 | 359篇 |
科学研究 | 223篇 |
各国文化 | 1篇 |
体育 | 8篇 |
综合类 | 24篇 |
文化理论 | 2篇 |
信息传播 | 153篇 |
出版年
2023年 | 11篇 |
2022年 | 15篇 |
2021年 | 30篇 |
2020年 | 22篇 |
2019年 | 24篇 |
2018年 | 24篇 |
2017年 | 17篇 |
2016年 | 21篇 |
2015年 | 30篇 |
2014年 | 47篇 |
2013年 | 63篇 |
2012年 | 40篇 |
2011年 | 43篇 |
2010年 | 52篇 |
2009年 | 37篇 |
2008年 | 48篇 |
2007年 | 71篇 |
2006年 | 44篇 |
2005年 | 51篇 |
2004年 | 30篇 |
2003年 | 17篇 |
2002年 | 9篇 |
2001年 | 14篇 |
2000年 | 5篇 |
1999年 | 1篇 |
1996年 | 1篇 |
1992年 | 3篇 |
排序方式: 共有770条查询结果,搜索用时 0 毫秒
61.
目前现存的许衡直解作品主要有四种版本,比较清乾隆五十五年怀庆堂刻本《许文正公遗书》中的许衡直解作品与《文津阁四库全书·鲁斋遗书》中的许衡直解作品,发现两个版本各有利弊:四库本虽存在较多谬误,但使用了很多同义词对译怀庆堂本中的说法,丰富了文章的表达方式,也便于读者理解;怀庆堂本尽管也存在个别疏失,但相对而言更接近于元代口语原貌,故更为可信。 相似文献
62.
国电丰城电有限公司磨煤机密封风原设计为单元制,磨煤机启动必须启动相应的密封风机。通过对密封风系统进行改造,增设一母管,将机组五台磨煤机的密封风联通,使得五台磨煤机密封风互为备用,极大增加了磨煤机密封风机运行的灵活性,减少磨密封风机运行台数,降低厂用电,取得良好的经济效益。 相似文献
63.
做好高校学生的贫困补助工作十分重要,它体现了国家对经济困难家庭的关爱,体现一种社会公平。但是高校学生的贫困认定是一项十分模糊的工作,有许多令人困惑的东西。文章从大学生贫困认定的标准、贫困认定中的隐私保护、贫困认定中的诚信问题三个方面进行探讨,希望能为大学生贫困认定工作提供借鉴。 相似文献
64.
物联网是什么?物联网不是互联网、传感网、产品电子代码,也不单纯是一种技术应用。物联网将“互联网”和“物”连接在一起,就意味着把破坏性创新引进到当今的信息和通信技术世界。与互联网不同,物联网是物、网络、语义等视角的综合而形成的集网络、应用服务于一体的技术融合系统。在物联网语境中,物联网技术像人一样形成了人为的自主特征。物联网意味着一种潜在的技术异化的环境:个人隐私以多种方式受到威胁。而现有对隐私的制度规约存在诸多的不完备性。 相似文献
65.
Recent advances in wireless technologies have led to the development of intelligent, in-vehicle safety applications designed
to share information about the actions of nearby vehicles, potential road hazards, and ultimately predict dangerous scenarios
or imminent collisions. These vehicle safety communication (VSC) technologies rely on the creation of autonomous, self-organizing,
wireless communication networks connecting vehicles with roadside infrastructure and with each other. As the technical standards
and communication protocols for VSC technologies are still being developed, certain ethical implications of these new information
technologies emerge: Coupled with the predicted safety benefits of VSC applications is a potential rise in the ability to
surveil a driver engaging in her everyday activities on the public roads. This paper will explore how the introduction of
VSC technologies might disrupt the “contextual integrity” of personal information flows in the context of highway travel and
threaten one’s “privacy in public.” Since VSC technologies and their related protocols and standards are still in the developmental
stage, the paper will conclude by revealing how close attention to the ethical implications of the remaining design decisions
can inform and guide designers of VSC technologies to create innovate safety applications that increase public safety, but
without compromising the value of one’s privacy in public.
This work was supported by the National Science Foundation PORTIA Grant No. CNS-0331542, and could not have been completed
without the valuable guidance of Prof. Helen Nissenbaum (New York University) and Prof. Dan Boneh (Stanford University). I
am grateful to many other colleagues who generously contributed to this work with excellent comments and suggestions, including
Emily Clark and Steve Tengler at the VSCC, and Sam Howard-Spink, Joseph Reagle and Tim Weber at New York University. Drafts
were further sharpened through opportunities to present at colloquia and conferences sponsored by New York University’s Department
of Culture & Communication, the American Association for the Advancement of Science, the Society for Philosophy and Technology,
and Computer Ethics: Philosophical Enquiry. 相似文献
66.
Dara J. Glasser Kenneth W. Goodman Norman G. Einspruch 《Ethics and Information Technology》2007,9(2):101-109
Radio Frequency Identification (RFID) systems identify and track objects, animals and, in principle, people. The ability to
gather information obtained by tracking consumer goods, government documents, monetary transactions and human beings raises
a number of interesting and important privacy issues. Moreover, RFID systems pose an ensemble of other ethical challenges
related to appropriate uses and users of such systems. This paper reviews a number of RFID applications with the intention
of identifying the technology’s benefits and possible misuses. We offer an overview and discussion of the most important ethical
issues concerning RFID, and describes and examine some methods of protecting privacy.
Norman G. Einspruch serves as a consultant to several high-technology companies, one of which is in the RFID components and
systems business. 相似文献
67.
中国、日本、美国的图书馆均对读者隐私权进行了保护,但在保护的程度和方法上差异明显。中国图书馆有必要在学习日本、美国先进管理经验的基础上,根据本国实际情况,依据宪法和法律制定出完善的行业管理规则,建立恰当的服务体系,充分培育隐私权保护意识,让读者隐私权的保护能够真正得以实现。参考文献7。 相似文献
68.
由于在社会网络应用程序站点上自愿添加个人身份信息的人数不断增加,站点服务商可以从中获益,但是同时数据误用的风险会威胁个人用户的隐私信息以及服务商的商业模式。本文根据最近的调查,分析了开发隐私保护社会网络应用的主要需求,在此基础上提出了隐私风险模式,以增强数据或社会网络迁移过程中的信息隐私保护。通过确定与个人身份信息迁移过程中重要的问题设计出了该隐私风险模式。 相似文献
69.
新闻自由与隐私权保护的法律思考 总被引:1,自引:0,他引:1
随着公民法律意识的提高,状告媒介侵犯隐私权的案例越来越多,本文分析了新闻报道中侵犯隐私权的行为以及与新闻报道的关系,提出预防新闻侵权的具体办法。 相似文献
70.
Private companies and government agencies are now creating and tapping into vastly more data than ever before. These data flows include enormous amounts of personal information and raise questions about privacy and intellectual policy that could have profound impacts on our lives. While data collection and creation are nearly ubiquitous, the instruments of collection and analysis are often hidden in order to track more natural behavior. Recent revelations of massive governmental data collection offer the country, and librarians in particular, an opportunity to discuss and question the societal implications of “Big Data,” and the policies that govern them. 相似文献