全文获取类型
收费全文 | 2457篇 |
免费 | 49篇 |
国内免费 | 3篇 |
专业分类
教育 | 1719篇 |
科学研究 | 179篇 |
各国文化 | 57篇 |
体育 | 246篇 |
综合类 | 2篇 |
文化理论 | 34篇 |
信息传播 | 272篇 |
出版年
2023年 | 10篇 |
2022年 | 11篇 |
2021年 | 29篇 |
2020年 | 44篇 |
2019年 | 68篇 |
2018年 | 135篇 |
2017年 | 115篇 |
2016年 | 108篇 |
2015年 | 77篇 |
2014年 | 89篇 |
2013年 | 541篇 |
2012年 | 87篇 |
2011年 | 80篇 |
2010年 | 68篇 |
2009年 | 68篇 |
2008年 | 68篇 |
2007年 | 59篇 |
2006年 | 46篇 |
2005年 | 52篇 |
2004年 | 48篇 |
2003年 | 41篇 |
2002年 | 41篇 |
2001年 | 26篇 |
2000年 | 42篇 |
1999年 | 26篇 |
1998年 | 29篇 |
1997年 | 28篇 |
1996年 | 29篇 |
1995年 | 33篇 |
1994年 | 25篇 |
1993年 | 33篇 |
1992年 | 17篇 |
1991年 | 12篇 |
1990年 | 29篇 |
1989年 | 15篇 |
1988年 | 18篇 |
1987年 | 18篇 |
1986年 | 13篇 |
1985年 | 20篇 |
1984年 | 24篇 |
1983年 | 15篇 |
1982年 | 14篇 |
1981年 | 17篇 |
1980年 | 17篇 |
1979年 | 12篇 |
1978年 | 11篇 |
1977年 | 8篇 |
1976年 | 7篇 |
1974年 | 9篇 |
1973年 | 7篇 |
排序方式: 共有2509条查询结果,搜索用时 15 毫秒
161.
162.
Kirsten Martin 《Ethics and Information Technology》2012,14(4):267-284
Within a given conversation or information exchange, do privacy expectations change based on the technology used? Firms regularly require users, customers, and employees to shift existing relationships onto new information technology, yet little is known as about how technology impacts established privacy expectations and norms. Coworkers are asked to use new information technology, users of gmail are asked to use GoogleBuzz, patients and doctors are asked to record health records online, etc. Understanding how privacy expectations change, if at all, and the mechanisms by which such a variance is produced will help organizations make such transitions. This paper examines whether and how privacy expectations change based on the technological platform of an information exchange. The results suggest that privacy expectations are significantly distinct when the information exchange is located on a novel technology as compared to a more established technology. Furthermore, this difference is best explained when modeled by a shift in privacy expectations rather than fully technology-specific privacy norms. These results suggest that privacy expectations online are connected to privacy offline with a different base privacy expectation. Surprisingly, out of the five locations tested, respondents consistently assign information on email the greatest privacy protection. In addition, while undergraduate students differ from non-undergraduates when assessing a social networking site, no difference is found when judging an exchange on email. In sum, the findings suggest that novel technology may introduce temporary conceptual muddles rather than permanent privacy vacuums. The results reported here challenge conventional views about how privacy expectations differ online versus offline. Traditionally, management scholarship examines privacy online or with a specific new technology platform in isolation and without reference to the same information exchange offline. However, in the present study, individuals appear to have a shift in their privacy expectations but retain similar factors and their relative importance??the privacy equation by which they form judgments??across technologies. These findings suggest that privacy scholarship should make use of existing privacy norms within contexts when analyzing and studying privacy in a new technological platform. 相似文献
163.
The evolution of carbon dioxide bubbles dissolving in water is experimentally examined using long microchannels. We study the coupling between bubble hydrodynamics and dissolution in confined geometries. The gas impregnation process in liquid produces significant flow rearrangements. Depending on the initial volumetric liquid fraction, three operating regimes are identified, namely saturating, coalescing, and dissolving. The morphological and dynamical transition from segmented to dilute bubbly flows is investigated. Tracking individual bubbles along the flow direction is used to calculate the temporal evolution of the liquid volumetric fraction and the average flow velocity near reference bubbles over long distances. This method allows us to empirically establish the functional relationship between bubble size and velocity. Finally, we examine the implication of this relationship during the coalescing flow regime, which limits the efficiency of the dissolution process. 相似文献
164.
Abstract This study examined dissonance in physical activity (PA) between two youth-specific hip-derived intensity cut-points for the Actiwatch (AW), and compared PA between hip and wrist placements using site-specific cut-points. Twenty-four children aged 11.2?±?0.5 years wore the AW on the right hip and non-dominant wrist during a typical school day. Minutes of sedentary behaviour and vigorous activity were greater using Puyau et al. (2002) cut-points, but light, moderate, and moderate-to-vigorous (MVPA) were greater when derived using Puyau et al. (2004) cut-points (P?0.01). Total hip activity counts were lower than wrist. Sedentary minutes were greater at the hip, but minutes of light, vigorous and MVPA were lower (P?0.01). Moderate minutes were greater at the hip, but differed only when applying the Puyau et al. (2004) cut-points (P?0.01). In conclusion, data comparisons between two hip derived AW cut-points and between hip and wrist data are inappropriate. Future researchers using the AW at the hip should present data reduced using both published cut-points. As hip and wrist data differ, the wrist placement is preferable as it will likely increase children's compliance to monitoring protocols due to reduced obtrusiveness compared to the hip. 相似文献
165.
Security of children's relationships with nonparental care providers: a meta-analysis 总被引:3,自引:0,他引:3
Meta-analysis aggregated results of 40 investigations involving 2,867 children who averaged 29.6 (SD = 8.6) months of age when their attachments to care providers were assessed using either the Strange Situation (SS) or the Attachment Q-Set (AQS). As opposed to parents, secure attachments to nonparental care providers were less likely (using SS) or equally likely (using AQS), respectively. Secure child-care provider attachments were more likely in home- than center-based care, when the children were assessed longer after enrollment, and when they were girls. Whereas care providers' sensitivity to individual children predicted attachment security only in the small groups that characterize home-based settings, group-related sensitivity was a reliable predictor of secure child-care provider attachment, especially in child care centers. 相似文献
166.
THE STUDY was designed to identify specific components of teacher excellence, focusing initially on the characteristics of the small number of teachers of the deaf who are certified by the National Board for Professional Teaching Standards (NBPTS), then comparing those with the characteristics of other teachers identified as master teachers by university faculty in teacher preparation in deafness. Classroom observation, written lesson plans, teacher questionnaires on beliefs, and content analysis of interactive electronic focus groups were used to compare the two groups of teachers. Results indicated similarities between Board-certified and non-Board-certified master teachers in regard to teacher behaviors and commitment to well-founded pedagogical principles. Differences were found in classroom priorities and in the greater level of interconnectivity expressed by Board-certified teachers as the result of becoming Board certified. Recommendations are made for preparing teachers of deaf students. 相似文献
167.
168.
169.
170.