全文获取类型
收费全文 | 298篇 |
免费 | 5篇 |
国内免费 | 2篇 |
专业分类
教育 | 122篇 |
科学研究 | 97篇 |
体育 | 6篇 |
综合类 | 4篇 |
信息传播 | 76篇 |
出版年
2023年 | 6篇 |
2022年 | 2篇 |
2021年 | 6篇 |
2020年 | 21篇 |
2019年 | 11篇 |
2018年 | 8篇 |
2017年 | 10篇 |
2016年 | 11篇 |
2015年 | 6篇 |
2014年 | 18篇 |
2013年 | 62篇 |
2012年 | 23篇 |
2011年 | 18篇 |
2010年 | 10篇 |
2009年 | 11篇 |
2008年 | 11篇 |
2007年 | 9篇 |
2006年 | 13篇 |
2005年 | 7篇 |
2004年 | 8篇 |
2003年 | 7篇 |
2002年 | 11篇 |
2001年 | 4篇 |
2000年 | 1篇 |
1999年 | 5篇 |
1998年 | 3篇 |
1997年 | 2篇 |
1996年 | 1篇 |
排序方式: 共有305条查询结果,搜索用时 15 毫秒
1.
Chantal Mutimukwe Olga Viberg Lena-Maria Oberg Teresa Cerratto-Pargman 《British journal of educational technology : journal of the Council for Educational Technology》2022,53(4):932-951
Understanding students' privacy concerns is an essential first step toward effective privacy-enhancing practices in learning analytics (LA). In this study, we develop and validate a model to explore the students' privacy concerns (SPICE) regarding LA practice in higher education. The SPICE model considers privacy concerns as a central construct between two antecedents—perceived privacy risk and perceived privacy control, and two outcomes—trusting beliefs and non-self-disclosure behaviours. To validate the model, data through an online survey were collected, and 132 students from three Swedish universities participated in the study. Partial least square results show that the model accounts for high variance in privacy concerns, trusting beliefs, and non-self-disclosure behaviours. They also illustrate that students' perceived privacy risk is a firm predictor of their privacy concerns. The students' privacy concerns and perceived privacy risk were found to affect their non-self-disclosure behaviours. Finally, the results show that the students' perceptions of privacy control and privacy risks determine their trusting beliefs. The study results contribute to understand the relationships between students' privacy concerns, trust and non-self-disclosure behaviours in the LA context. A set of relevant implications for LA systems' design and privacy-enhancing practices' development in higher education is offered.
Practitioner notes
What is already known about this topic- Addressing students' privacy is critical for large-scale learning analytics (LA) implementation.
- Understanding students' privacy concerns is an essential first step to developing effective privacy-enhancing practices in LA.
- Several conceptual, not empirically validated frameworks focus on ethics and privacy in LA.
- The paper offers a validated model to explore the nature of students' privacy concerns in LA in higher education.
- It provides an enhanced theoretical understanding of the relationship between privacy concerns, trust and self-disclosure behaviour in the LA context of higher education.
- It offers a set of relevant implications for LA researchers and practitioners.
- Students' perceptions of privacy risks and privacy control are antecedents of students' privacy concerns, trust in the higher education institution and the willingness to share personal information.
- Enhancing students' perceptions of privacy control and reducing perceptions of privacy risks are essential for LA adoption and success.
- Contextual factors that may influence students' privacy concerns should be considered.
2.
This article analyses the extent to which archival exemptions for historical, scientific and statistical research in privacy
legislation support preservation in selected European Union countries, and comparable aspects of Australian, American and
Canadian law within a legal, ethical and digital archival perspective. The authors recommend that the further processing of
personal data under data protection law be given a wider scope of interpretation for archival preservation purposes in both
the public and private sector, coupled with the use of researcher and archival codes in relation to access to personal data.
They also recommend early appraisal and integration of privacy with freedom of information and archival regimes.
相似文献
Malcolm ToddEmail: |
3.
杨薇 《鞍山师范学院学报》2011,13(2):56-57
将PPC-GA应用于供电企业客户群细分问题,主要从客户的购电水平、信用状态、发展潜力和用电特征等几个方面进行描述和细分.得出具有代表性的3个中心点,实现了对客户的细分和精细营销. 相似文献
4.
Recent privacy-related incidents of mobile services have shown that app stores and providers face the challenge of mobile users’ information privacy concerns, which can prevent users from installing mobile apps or induce them to uninstall an app. In this paper, we investigate the role of app permission requests and compare the impact on privacy concerns with other antecedents of information privacy concerns, i.e., prior privacy experience, computer anxiety, and perceived control. To test these effects empirically, we conducted an online survey with 775 participants. Results of our structural equation modeling show that prior privacy experience, computer anxiety, and perceived control have significant effects on privacy concerns. However, concerns for app permission requests have approximately twice as much predictive value than the other factors put together to explain mobile users’ overall information privacy concerns. We expect that our findings can provide a theoretical contribution for future mobile privacy research as well as practical implications for app stores and providers. 相似文献
5.
美国《隐私权法》与公民个人信息保护 总被引:9,自引:1,他引:9
本文介绍了美国《隐私权法》的立法原则、适用范围、个人记录公开的限制和登记、公民查询与修改个人记录的权利、对行政机关的限制与要求、免除适用的规定、该法与美国《信息自由法》的关系;论述了我国厂家和借鉴国外隐私保护的法律法规,强化政府信息法制建设力度,在确保国家和公共利益的前提下依法保护公民个人信息的必要性。 相似文献
6.
Wolfgang Schr?der-Preikschat Daniel Lohmann Fabian Scheler Olaf Spinczyk 《Informatik - Forschung und Entwicklung》2007,22(1):5-22
Design, implementation, and re-engineering of operating systems are still an ambitious undertaking.
Despite, or even because, of the long history of theory and practice in this field, adapting existing systems
to environments of different conditions and requirements as originally specified or assumed, in terms of
functional and/or non-functional respects, is anything but simple. Especially this is true for the embedded
systems domain which, on the one hand, calls for highly specialized and application-aware system abstractions
and, on the other hand, cares a great deal for easily reusable implementations of these abstractions.
The latter aspect becomes more and more important as embedded systems technology is faced with an innovation
cycle decreasing in length. Software for embedded systems needs to be designed for variability, and this
is in particular true for the operating systems of this domain. The paper discusses dimensions of variability
that need to be considered in the development of embedded operating systems and presents approaches that
aid construction and maintenance of evolutionary operating systems.
CR subject classification C.3; D.2.11; D.2.13; D.4.7 相似文献
7.
This paper presents a novel privacy principle,ε-inclusion,for re-publishing sensitive dynamic datasets,ε-inclusion releases all the quasi-identifier values directly and uses permutation-based method and substitution to anonymize the microdata.Combined with generalization-based methods,ε-inclusion protects privacy and captures a large amount of correlation in the microdata.We develop an effective algorithm for computing anonymized tables that obey the ε-inclusion privacy requirement.Extensive experiments confirm that our solution allows significantly more effective data analysis than generalization-based methods. 相似文献
8.
随着计算机和网络技术的发展,接触、使用互联网的少年儿童越来越多。少年儿童的价值观、判断力正处于建立的时期,所以必定会因为网络所呈现的不良内容,带来某些有碍他们健康成长的危险因素,使其身心受到不同程度的负面影响。美国在儿童网络隐私保护方面做了很多工作,文章从法律、网站自律和安全港模式方面分析了美国对儿童网络隐私保护的措施,以期为我国儿童的网络隐私保护提供参考。 相似文献
9.
论文对我国口述历史法律问题的研究现状进行阐述,对口述历史过程中可能产生的法律问题进行具体分析,主要包括计划、执行、整理、发布和利用阶段所涉及到的具体法律问题.最后,提出口述历史过程中需要注意的相关法律问题,以及规避侵权的一些方法建议. 相似文献
10.