首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   656篇
  免费   7篇
  国内免费   6篇
教育   291篇
科学研究   209篇
各国文化   1篇
体育   5篇
综合类   19篇
文化理论   2篇
信息传播   142篇
  2023年   11篇
  2022年   14篇
  2021年   29篇
  2020年   21篇
  2019年   24篇
  2018年   23篇
  2017年   17篇
  2016年   19篇
  2015年   25篇
  2014年   35篇
  2013年   58篇
  2012年   36篇
  2011年   32篇
  2010年   40篇
  2009年   32篇
  2008年   38篇
  2007年   64篇
  2006年   39篇
  2005年   44篇
  2004年   27篇
  2003年   13篇
  2002年   8篇
  2001年   13篇
  2000年   5篇
  1992年   2篇
排序方式: 共有669条查询结果,搜索用时 36 毫秒
141.
Social work students have few guidelines to help them evaluate the implication of their posted information on Internet-based social networking sites (SNSs). There is a national trend among employers of human services to cross-check publicly available online information on applicants. Based on data from a survey of 105 baccalaureate and master's social work students at a Midwestern university, this study explored students' perspectives on problematic information on SNSs. The majority reported that they had posted information on SNSs that they would not want their prospective employers to cross-check. Students offered a wide range of opinions, attitudes, and characteristics that contribute to the assessment of the risks that information they post on SNSs pose for their profession. The purpose of this study is to stimulate a conversation among social work educators on how to inculcate awareness and training of students on the ethical implications of SNS participation and to discuss directions for future research.  相似文献   
142.
Because of a proposed policy, public school teachers in Hawaii are facing the possibility of being randomly tested for illegal drugs. Random drug testing has many implications and its impact is questionable. In this article, the author scrutinizes the controversial drug-testing policy for both troubling and promising aspects and how educators may perceive it. Is this a safety issue or an invasion of privacy issue?  相似文献   
143.
网络隐私关注与行为意向影响因素的概念模型   总被引:2,自引:0,他引:2  
随着电子商务的发展和网络交易的普及,消费者网络隐私成为了电子商务发展的核心和关键问题。提出了一个网络隐私关注与行为意向影响因素的概念模型,包括文化因素、制度因素、个人因素和风险因素,并针对中国特有的文化和制度情境,对网络隐私关注和行为意向的关键影响因素进行了分析。  相似文献   
144.
潘浩  张幸 《图书情报工作》2009,53(21):75-67
分析数字图书馆个性化服务各个环节中存在的隐私泄露方式,提出一个基于自主计算的数字图书馆个性化服务隐私保护框架,对用户隐私泄露的各个环节采取系统的保护措施。该框架具有自主计算的自我配置、自我优化、自我修复和自我保护的特性,减轻对容纳多种隐私保护技术的系统的配置复杂性,在多变的复杂环境中具有自适应的特性。  相似文献   
145.
网络隐私第三方认证机制初探   总被引:4,自引:1,他引:3  
研究表明,由于担心个人信息得不到有效的保护,人们对使用基于互联网的各种服务心存疑虑,严重影响到电子商务的发展.旨在给电子商务的发展营造宽松的发展环境,在网络隐私法律框架之外,以美国为代表的国家产生了基于市场运作的网络隐私第三方认证.为了减少网络用户担心隐私遭到侵犯的不安全感,不少网站加入网络隐私认证计划.本文介绍了网络隐私第三方认证运行机制,以及在保护个人隐私方面存在的不足之处,并提出完善第三方认证机制的策略,以期对我国的个人信息保护提供新的思路.  相似文献   
146.
美国网络隐私权的行业自律保护及其对我国的启示   总被引:3,自引:1,他引:2  
美国出于对自由政策的传统、现实经济利益、快速发展的网络技术与冗长烦琐的立法程序之间矛盾的考量,实行以行业自律为主导的网络隐私权保护模式。其行业自律主要形式包括建议性的行业指引、网络隐私认证计划、技术保护和企业自律等。考虑到我国目前的现实,如果实施比较严格完善的法律法规来保护网络隐私权,对整个互联网行业将会起到很大的限制作用,这对于我国原本就比较落后的互联网产业来说,更是加重了负担,会阻碍其追赶发达国家的步伐。因此,我国在一定程度上也应借鉴美国以行业自律的方式来保护网络隐私权。  相似文献   
147.
Trust between transaction partners in cyberspace has come to be considered a distinct possibility. In this article the focus is on the conditions for its creation by way of assuming, not inferring trust. After a survey of its development over the years (in the writings of authors like Luhmann, Baier, Gambetta, and Pettit), this mechanism of trust is explored in a study of personal journal blogs. After a brief presentation of some technicalities of blogging and authors’ motives for writing their diaries, I try to answer the question, ‘Why do the overwhelming majority of web diarists dare to expose the intimate details of their lives to the world at large?’ It is argued that the mechanism of assuming trust is at play: authors simply assume that future visitors to their blog will be sympathetic readers, worthy of their intimacies. This assumption then may create a self-fulfilling cycle of mutual admiration. Thereupon, this phenomenon of blogging about one’s intimacies is linked to Calvert’s theory of ‘mediated voyeurism’ and Mathiesen’s notion of ‘synopticism’. It is to be interpreted as a form of ‘empowering exhibitionism’ that reaffirms subjectivity. Various types of ‘synopticon’ are distinguished, each drawing the line between public and private differently. In the most ‘radical’ synopticon blogging proceeds in total transparency and the concept of privacy is declared obsolete; the societal gaze of surveillance is proudly returned and nullified. Finally it is shown that, in practice, these conceptions of blogging are put to a severe test, while authors often have to cope with known people from ‘real life’ complaining, and with ‘trolling’ strangers.  相似文献   
148.
This paper provides an in-depth analysis of the privacy rights dilemma surrounding radio frequency identification (RFID) technology. As one example of ubiquitous information system, RFID has multitudinous applications in various industries and businesses across society. The use of this technology will have to lead to a policy setting dilemma in that a balance between individuals’ privacy concerns and the benefits that they derive from it must be drawn. After describing the basic RFID technology some of its most prevalent uses, a definition of privacy is derived in the context of information systems. To illustrate current attempts at controlling the undesirable side effects of RFID, Lessig’s cyberspace framework is presented. It is found that each of Lessig’s components is inadequate at preventing individual privacy violations in RFID. The main focus within this framework is on the norms of society. The social norm mechanism that addresses privacy issues in cyberspace is the Fair Information Practices Principles (FIPP). After an analysis of these principles, it is posited that the FIPP only deal with procedural justice issues related to data collection and omit distributive and interactional justice reasoning related to the actual beneficial and detrimental outcomes to the individuals whose data is being obtained. Thus, RFID is presented in the context of the tension between the many benefits that are provided by the technology in social exchanges, and the risk it carries of the loss of privacy. The new, expanded framework recognizes both sides of the issue with the ultimate goal of providing a greater understanding of how privacy issues can be addressed with RFID technology.  相似文献   
149.
While maintaining the importance of privacy for critical evaluations of surveillance technologies, I suggest that privacy also constrains the debate by framing analyses in terms of the individual. Public space provides a site for considering what is at stake with surveillance technologies besides privacy. After describing two accounts of privacy and one of public space, I argue that surveillance technologies simultaneously add an ambiguityand a specificity to public places that are detrimental to the social, cultural, and civic importance of these places. By making public places accessible to other places and/or times, surveillance technologies make these social contexts ambiguous by blurring their spatial and temporal bounds. At the same time, surveillancetechnologies valence public places in functionally specificways that are detrimental to informal civic life. To complement defensive approaches to surveillance technologies based onindividual privacy, I conclude by suggesting how sociality as a relational value or an ethics of place as a contextual value could provide a proactive line of reasoning for affirming the value ofthat which is between people and places.  相似文献   
150.
关于美国信息立法的探索   总被引:7,自引:0,他引:7  
黄奇  王玲 《情报学报》2000,19(4):385-390
信息立法是有关信息法的制定。信息法是一国为管理信息产业而制定的为调整信息活动而产生的各种社会关系的法律规律的总和。文章先概述了信息法的内涵,然而从四个方面公民信息自由与隐私保护、知识产权保护、商业信息保护、信息的安全保护等对美国的信息法作了说明  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号