首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   190篇
  免费   1篇
  国内免费   2篇
教育   37篇
科学研究   79篇
体育   2篇
综合类   2篇
信息传播   73篇
  2023年   6篇
  2022年   1篇
  2021年   6篇
  2020年   14篇
  2019年   5篇
  2018年   3篇
  2017年   6篇
  2016年   7篇
  2015年   4篇
  2014年   11篇
  2013年   44篇
  2012年   13篇
  2011年   10篇
  2010年   4篇
  2009年   10篇
  2008年   6篇
  2007年   2篇
  2006年   7篇
  2005年   7篇
  2004年   5篇
  2003年   2篇
  2002年   7篇
  2001年   1篇
  2000年   1篇
  1999年   5篇
  1998年   3篇
  1997年   2篇
  1996年   1篇
排序方式: 共有193条查询结果,搜索用时 15 毫秒
11.
Biometric technology is rapidly gaining popularity as an access control mechanism in the workplace. In some instances, systems relying on biometric technology for access control have not been well received by employees. One potential reason for resistance may be perceived privacy issues associated with organizational collection and use of biometric data. This research draws on previous organizational information handling and procedural fairness literature to frame and examine these underlying privacy issues. Perceived accountability, perceived vulnerability, and distrust were distilled from the previous literature as the primary dimensions of employee privacy concerns related to biometric technology. This study assesses the effects of these privacy concerns, how they vary based on the cultural influences of Anglos and Hispanics.Fire ground accountability is a critical management objective in the firefighting domain. In multi-unit or multi-agency crisis response scenarios, the on-scene incident commander tracks and accounts for each first responder. This research designed and deployed a new fire ground accountability system that tracked firefighters through finger pattern-based biometric logins to their assigned positions on the firefighting apparatus. An instrument measuring level of privacy concern on three underlying dimensions and demographic data was developed, validated and administered in a quasi-experimental field study. A pre-test–post-test survey methodology was employed to detect potential differences in privacy concerns as familiarity with the system increased. The study shows that Anglo and Hispanic subjects frame privacy issues differently associated with use of biometric technology in a fire ground accountability system. Finally, the study showed that some privacy concerns such as distrust and perceived vulnerability can be alleviated through system use with changes in post-use privacy concerns moderated by ethnic affiliation.  相似文献   
12.
图书馆是个人信息保护的重要场所,一些国家和地区对图书馆的读者个人信息保护义务有相关规定,但是法律层次不高。我国现行法律虽已将个人信息纳入民事权益加以保护,但立法上欠缺完善的配套规定。因此,我国图书馆法中应当明确该义务及法律责任对推进图书馆法治建设的重要意义,在法律上明确规定图书馆个人信息保护的基本职责、利用读者个人信息的基本内容和程序、违反该义务应承担的法律责任。  相似文献   
13.
美国国会图书馆、国家医学图书馆和国家农业图书馆网站的隐私政策涉及用户信息收集的内容与目的、收集方法、个人信息的共享性、用户的选择与拒绝权、儿童隐私、网站链接以及网络交通安全,具有许多可取之处,也存在一些不足,但仍对我国图书馆界保护用户隐私具有借鉴意义。  相似文献   
14.
This paper provides an analysis of the current and potential ethical implications of RFID technology for the library and information professions. These issues are analysed as a series of ethical dilemmas, or hard-to-resolve competing ethical obligations, which the librarian has in relationship to information objects, library users and the wider social and political environment or state. A process model of the library is used as a framework for the discussion to illustrate the relationship between the different participants in the library system and it is argued that ethical analysis should involve the identification of future developments as well as current issues. The analysis shows that RFIDs do currently pose some dilemmas for librarians in terms of the conflicts between efficient service, privacy of users and an obligation to protect the safety of society as a whole, and that these are likely to become more problematic as the technology develops. This paper is part 2 of a series of papers on RFIDs and the library and information professions.  相似文献   
15.
针对档案信息资源共享的特点,采用有效的隐私保护技术实现档案信息的安全共享,防止敏感信息的泄露和被非法访问,已经成为当前国内外档案界一个亟待解决的课题。研究基于受限访问和自由访问的档案信息共享隐私保护的两种主流技术,并进行语义处理能力的分析;提出档案信息隐私保护的技术策略,一是以信息拥有者的隐私策略为研究对象,研究和实现基于策略的档案信息隐私保护技术,二是从知识和语义的角度研究信息匿名保护和隐私推理攻击的检测和防范,改进传统的匿名化隐私保护方法;采用基于知识技术的访问控制策略,研究档案信息共享隐私保护框架,使档案信息的共享安全具备智能处理的基础,在档案网站中的实践具有现实意义。  相似文献   
16.
官员财产公开制度建立的国际法依据和国内法依据在于,知情权和隐私权同为国际人权,知情权是国内法上的基本权利,隐私权是国内法中的人身权利;在公共利益优先原则的背景下强调知情权优先,要求官员财产公开,同时也要平衡其与隐私权的关系.通过修改《公务员法》的方式,遵循分类处理原则、正当程序原则,在法律条文中规定官员财产公开制度的依据、主体范围、公开内容、详细程序、监督措施等.  相似文献   
17.
Prior literature suggests that social media users are increasingly experiencing social media fatigue. Only recently have scholars undertaken empirical studies to investigate its antecedents and outcomes to better understand the impact of fatigue on social media users. To further this understanding, the present study has conducted a cross-sectional survey with 1552 users. The Stress-Strain-Outcome (SSO) theoretical framework is applied to examine if privacy concerns, self-disclosure, parental mediation strategies, and decrement in academic performance due to social media use correlate with social media fatigue. Two forms of fatigue are considered, namely, fatigue due to social networking site (SNS) and mobile instant messaging (MIM) use. The study results suggest that privacy concerns, self-disclosure, parental encouragement and worry significantly and positively correlate with SNS and MIM fatigue. Parental permission and parental monitoring are either not or lowly associated with fatigue. In addition to this, SNS and MIM fatigue positively correlated with the tendency to experience academic decrement due to social media use. The antecedents and consequences of social media fatigue were similar for SNS and MIM users. Moreover, students perceived their parents to be more open to their MIM use, and they had higher self-disclosure in MIM than in SNS. The study concludes with significant implications for practitioners, policy makers as well as service designers.  相似文献   
18.
In recent years, strategies focused on data-driven innovation (DDI) have led to the emergence and development of new products and business models in the digital market. However, these advances have given rise to the development of sophisticated strategies for data management, predicting user behavior, or analyzing their actions. Accordingly, the large-scale analysis of user-generated data (UGD) has led to the emergence of user privacy concerns about how companies manage user data. Although there are some studies on data security, privacy protection, and data-driven strategies, a systematic review on the subject that would focus on both UGD and DDI as main concepts is lacking. Therefore, the present study aims to provide a comprehensive understanding of the main challenges related to user privacy that affect DDI. The methodology used in the present study unfolds in the following three phases; (i) a systematic literature review (SLR); (ii) in-depth interviews framed in the perspectives of UGD and DDI on user privacy concerns, and finally, (iii) topic-modeling using a Latent Dirichlet allocation (LDA) model to extract insights related to the object of study. Based on the results, we identify 14 topics related to the study of DDI and UGD strategies. In addition, 14 future research questions and 7 research propositions are presented that should be consider for the study of UGD, DDI and user privacy in digital markets. The paper concludes with an important discussion regarding the role of user privacy in DDI in digital markets.  相似文献   
19.
Alcohol-related posts on social-networking sites (SNS) can damage college students’ reputations and relationships and contribute to risky behavior. However, little is known about how college drinkers engage in privacy management involving alcohol content. Through 48 interviews and a Communication Privacy Management lens, this study uncovered criteria on which students relied to develop relatively impermeable boundaries around alcohol posts, the ways they collectively negotiated privacy with peers, and how participants implicitly and explicitly communicatively negotiated privacy turbulence. Findings suggest important connections between the co-occurrence of online privacy management and identity management, including how facework is involved in remediating privacy breaches and the co-opting of privacy. Findings also inform efforts to educate college drinkers about on-and-offline strategies to manage alcohol-related SNS content.  相似文献   
20.
We are heading into an era of uncontrolled and uncontrollable information flow. In the past, the tools of information flow required large investments, and the persons controlling them were easily identifiable. Now, effective long-range communication with large numbers of people can be done using tools that are easily affordable to the average citizen. Moreover, it can be done in ways that make monitoring and control virtually impossible. This is not a worrisome future change that can be averted by prompt action; it is a fait accompli and there is no reversing it. However, this is not necessarily clear to those interested in monitoring and control. Unfortunately, the bulk of electronic communication is still relatively exposed to monitoring and control, and is likely to remain so for a while. The danger is that the authorities, trying to retain a grip on a situation that is irretrievably slipping away, will react to the extremes of the problem in ways that leave ordinary users' privacy unprotected. The best approach is to adapt traditional solutions rather than inventing new ones. The safeguards built into the traditional solutions may not be precisely appropriate, but they are far better than nothing.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号