首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   298篇
  免费   5篇
  国内免费   2篇
教育   122篇
科学研究   97篇
体育   6篇
综合类   4篇
信息传播   76篇
  2023年   6篇
  2022年   2篇
  2021年   6篇
  2020年   21篇
  2019年   11篇
  2018年   8篇
  2017年   10篇
  2016年   11篇
  2015年   6篇
  2014年   18篇
  2013年   62篇
  2012年   23篇
  2011年   18篇
  2010年   10篇
  2009年   11篇
  2008年   11篇
  2007年   9篇
  2006年   13篇
  2005年   7篇
  2004年   8篇
  2003年   7篇
  2002年   11篇
  2001年   4篇
  2000年   1篇
  1999年   5篇
  1998年   3篇
  1997年   2篇
  1996年   1篇
排序方式: 共有305条查询结果,搜索用时 15 毫秒
1.
Understanding students' privacy concerns is an essential first step toward effective privacy-enhancing practices in learning analytics (LA). In this study, we develop and validate a model to explore the students' privacy concerns (SPICE) regarding LA practice in higher education. The SPICE model considers privacy concerns as a central construct between two antecedents—perceived privacy risk and perceived privacy control, and two outcomes—trusting beliefs and non-self-disclosure behaviours. To validate the model, data through an online survey were collected, and 132 students from three Swedish universities participated in the study. Partial least square results show that the model accounts for high variance in privacy concerns, trusting beliefs, and non-self-disclosure behaviours. They also illustrate that students' perceived privacy risk is a firm predictor of their privacy concerns. The students' privacy concerns and perceived privacy risk were found to affect their non-self-disclosure behaviours. Finally, the results show that the students' perceptions of privacy control and privacy risks determine their trusting beliefs. The study results contribute to understand the relationships between students' privacy concerns, trust and non-self-disclosure behaviours in the LA context. A set of relevant implications for LA systems' design and privacy-enhancing practices' development in higher education is offered.

Practitioner notes

What is already known about this topic
  • Addressing students' privacy is critical for large-scale learning analytics (LA) implementation.
  • Understanding students' privacy concerns is an essential first step to developing effective privacy-enhancing practices in LA.
  • Several conceptual, not empirically validated frameworks focus on ethics and privacy in LA.
What this paper adds
  • The paper offers a validated model to explore the nature of students' privacy concerns in LA in higher education.
  • It provides an enhanced theoretical understanding of the relationship between privacy concerns, trust and self-disclosure behaviour in the LA context of higher education.
  • It offers a set of relevant implications for LA researchers and practitioners.
Implications for practice and/or policy
  • Students' perceptions of privacy risks and privacy control are antecedents of students' privacy concerns, trust in the higher education institution and the willingness to share personal information.
  • Enhancing students' perceptions of privacy control and reducing perceptions of privacy risks are essential for LA adoption and success.
  • Contextual factors that may influence students' privacy concerns should be considered.
  相似文献   
2.
This article analyses the extent to which archival exemptions for historical, scientific and statistical research in privacy legislation support preservation in selected European Union countries, and comparable aspects of Australian, American and Canadian law within a legal, ethical and digital archival perspective. The authors recommend that the further processing of personal data under data protection law be given a wider scope of interpretation for archival preservation purposes in both the public and private sector, coupled with the use of researcher and archival codes in relation to access to personal data. They also recommend early appraisal and integration of privacy with freedom of information and archival regimes.
Malcolm ToddEmail:
  相似文献   
3.
将PPC-GA应用于供电企业客户群细分问题,主要从客户的购电水平、信用状态、发展潜力和用电特征等几个方面进行描述和细分.得出具有代表性的3个中心点,实现了对客户的细分和精细营销.  相似文献   
4.
Recent privacy-related incidents of mobile services have shown that app stores and providers face the challenge of mobile users’ information privacy concerns, which can prevent users from installing mobile apps or induce them to uninstall an app. In this paper, we investigate the role of app permission requests and compare the impact on privacy concerns with other antecedents of information privacy concerns, i.e., prior privacy experience, computer anxiety, and perceived control. To test these effects empirically, we conducted an online survey with 775 participants. Results of our structural equation modeling show that prior privacy experience, computer anxiety, and perceived control have significant effects on privacy concerns. However, concerns for app permission requests have approximately twice as much predictive value than the other factors put together to explain mobile users’ overall information privacy concerns. We expect that our findings can provide a theoretical contribution for future mobile privacy research as well as practical implications for app stores and providers.  相似文献   
5.
美国《隐私权法》与公民个人信息保护   总被引:9,自引:1,他引:9  
周健 《情报科学》2001,19(6):608-611
本文介绍了美国《隐私权法》的立法原则、适用范围、个人记录公开的限制和登记、公民查询与修改个人记录的权利、对行政机关的限制与要求、免除适用的规定、该法与美国《信息自由法》的关系;论述了我国厂家和借鉴国外隐私保护的法律法规,强化政府信息法制建设力度,在确保国家和公共利益的前提下依法保护公民个人信息的必要性。  相似文献   
6.
Design, implementation, and re-engineering of operating systems are still an ambitious undertaking. Despite, or even because, of the long history of theory and practice in this field, adapting existing systems to environments of different conditions and requirements as originally specified or assumed, in terms of functional and/or non-functional respects, is anything but simple. Especially this is true for the embedded systems domain which, on the one hand, calls for highly specialized and application-aware system abstractions and, on the other hand, cares a great deal for easily reusable implementations of these abstractions. The latter aspect becomes more and more important as embedded systems technology is faced with an innovation cycle decreasing in length. Software for embedded systems needs to be designed for variability, and this is in particular true for the operating systems of this domain. The paper discusses dimensions of variability that need to be considered in the development of embedded operating systems and presents approaches that aid construction and maintenance of evolutionary operating systems. CR subject classification  C.3; D.2.11; D.2.13; D.4.7  相似文献   
7.
This paper presents a novel privacy principle,ε-inclusion,for re-publishing sensitive dynamic datasets,ε-inclusion releases all the quasi-identifier values directly and uses permutation-based method and substitution to anonymize the microdata.Combined with generalization-based methods,ε-inclusion protects privacy and captures a large amount of correlation in the microdata.We develop an effective algorithm for computing anonymized tables that obey the ε-inclusion privacy requirement.Extensive experiments confirm that our solution allows significantly more effective data analysis than generalization-based methods.  相似文献   
8.
随着计算机和网络技术的发展,接触、使用互联网的少年儿童越来越多。少年儿童的价值观、判断力正处于建立的时期,所以必定会因为网络所呈现的不良内容,带来某些有碍他们健康成长的危险因素,使其身心受到不同程度的负面影响。美国在儿童网络隐私保护方面做了很多工作,文章从法律、网站自律和安全港模式方面分析了美国对儿童网络隐私保护的措施,以期为我国儿童的网络隐私保护提供参考。  相似文献   
9.
论文对我国口述历史法律问题的研究现状进行阐述,对口述历史过程中可能产生的法律问题进行具体分析,主要包括计划、执行、整理、发布和利用阶段所涉及到的具体法律问题.最后,提出口述历史过程中需要注意的相关法律问题,以及规避侵权的一些方法建议.  相似文献   
10.
伴随着数字化网络技术的发展和应用,许多社交网站被创建,使得关于个人的大量信息被收集和发布。为了能够安全地利用社交网站进行信息交流,社交网站在发布数据的同时也要对用户的个人隐私进行必要的保护,本文对社交网络发布的个人信息隐私保护进行了总结,阐述了个人隐私保护模型,指出了社交网络在数据发布时隐私保护存在的待解决的问题以及面临的挑战。  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号