全文获取类型
收费全文 | 656篇 |
免费 | 7篇 |
国内免费 | 6篇 |
专业分类
教育 | 291篇 |
科学研究 | 209篇 |
各国文化 | 1篇 |
体育 | 5篇 |
综合类 | 19篇 |
文化理论 | 2篇 |
信息传播 | 142篇 |
出版年
2023年 | 11篇 |
2022年 | 14篇 |
2021年 | 29篇 |
2020年 | 21篇 |
2019年 | 24篇 |
2018年 | 23篇 |
2017年 | 17篇 |
2016年 | 19篇 |
2015年 | 25篇 |
2014年 | 35篇 |
2013年 | 58篇 |
2012年 | 36篇 |
2011年 | 32篇 |
2010年 | 40篇 |
2009年 | 32篇 |
2008年 | 38篇 |
2007年 | 64篇 |
2006年 | 39篇 |
2005年 | 44篇 |
2004年 | 27篇 |
2003年 | 13篇 |
2002年 | 8篇 |
2001年 | 13篇 |
2000年 | 5篇 |
1992年 | 2篇 |
排序方式: 共有669条查询结果,搜索用时 15 毫秒
581.
在信息公开的世界潮流中,随着行政主体与行政相对人交互关系的广泛性和多元化,行政主体掌握着数量可观的个人信息,而个人信息的合理正当使用影响着相对人的切身权益,个人隐私权由此也受到了前所未有的威胁。在当前强调信息公开的学术氛围中,行政主体在信息公开的过程中如何充分保护个人隐私权是一个容易被忽视的研究课题。应从隐私权的演进、政府信息公开中知情权对个人隐私权的保护以及政府信息公开中个人隐私权的制度性保护三个方面,进一步完善我国政府信息公开的法律体系。 相似文献
582.
随着全球经济一体化的纵深发展,越来越多的外企进军中国市场,这给中国就业人群提供了更多的就业选择。然而,西方职场文化的不同对中国雇员在外企的进一步发展造成了交际上的障碍。越来越多的跨文化交际策略被总结,然而对于跨文化交际中的隐私意识,特别是职场隐私的研究还不多,而从跨文化交际的视角浅析中西职场隐私意识的差异,能更加详细地剖析中西职场隐私差异,提高跟人们的跨文化交际水平和职场隐私意识。 相似文献
583.
文章由一组案例引发对我国网络隐私权保护的理性思考,主要探讨了网络隐私权的概念,介绍并分析了我国网络隐私权保护的现状,最后提出相关对策。 相似文献
584.
Delegating and Distributing Morality: Can We Inscribe Privacy Protection in a Machine? 总被引:1,自引:1,他引:1
This paper addresses the question of delegation of morality to a machine, through a consideration of whether or not non-humans
can be considered to be moral. The aspect of morality under consideration here is protection of privacy. The topic is introduced
through two cases where there was a failure in sharing and retaining personal data protected by UK data protection law, with
tragic consequences. In some sense this can be regarded as a failure in the process of delegating morality to a computer database.
In the UK, the issues that these cases raise have resulted in legislation designed to protect children which allows for the
creation of a huge database for children. Paradoxically, we have the situation where we failed to use digital data in enforcing
the law to protect children, yet we may now rely heavily on digital technologies to care for children. I draw on the work
of Floridi, Sanders, Collins, Kusch, Latour and Akrich, a spectrum of work stretching from philosophy to sociology of technology
and the “seamless web” or “actor–network” approach to studies of technology. Intentionality is considered, but not deemed
necessary for meaningful moral behaviour. Floridi’s and Sanders’ concept of “distributed morality” accords with the network
of agency characterized by actor–network approaches. The paper concludes that enfranchizing non-humans, in the shape of computer
databases of personal data, as moral agents is not necessarily problematic but a balance of delegation of morality must be
made between human and non-human actors. 相似文献
585.
Genomic Research and Data-Mining Technology: Implications for Personal Privacy and Informed Consent 总被引:1,自引:0,他引:1
Tavani HT 《Ethics and Information Technology》2004,6(1):15-28
This essay examines issues involving personal privacy and informed consent that arise at the intersection of information and communication technology (ICT) and population genomics research. I begin by briefly examining the ethical, legal, and social implications (ELSI) program requirements that were established to guide researchers working on the Human Genome Project (HGP). Next I consider a case illustration involving deCODE Genetics, a privately owned genetic company in Iceland, which raises some ethical concerns that are not clearly addressed in the current ELSI guidelines. The deCODE case also illustrates some ways in which an ICT technique known as data mining has both aided and posed special challenges for researchers working in the field of population genomics. On the one hand, data-mining tools have greatly assisted researchers in mapping the human genome and in identifying certain "disease genes" common in specific populations (which, in turn, has accelerated the process of finding cures for diseases tha affect those populations). On the other hand, this technology has significantly threatened the privacy of research subjects participating in population genomics studies, who may, unwittingly, contribute to the construction of new groups (based on arbitrary and non-obvious patterns and statistical correlations) that put those subjects at risk for discrimination and stigmatization. In the final section of this paper I examine some ways in which the use of data mining in the context of population genomics research poses a critical challenge for the principle of informed consent, which traditionally has played a central role in protecting the privacy interests of research subjects participating in epidemiological studies. 相似文献
586.
Recent anthropological analyses of Chinese attitudes towards privacy fail to pay adequate attention to more ordinary, but
more widely shared ideas of privacy – ideas that, moreover, have changed dramatically since the 1980s as China has become
more and more open to Western countries, cultures, and their network and computing technologies. I begin by reviewing these
changes, in part to show how contemporary notions of privacy in China constitute a dialectical synthesis of both traditional
Chinese emphases on the importance of the family and the state and more Western emphases on individual rights, including the
right to privacy. This same synthesis can be seen in contemporary Chinese law and scholarship regarding privacy. A review
of recent work in philosophical ethics demonstrates that information ethics in China is in its very early stages. In this
work, privacy is justified as an instrumental good, rather than an intrinsic good. I argue by way of conclusion that privacy protections will continue to expand in China, in part under the pressures
of globalization, increasing trade with and exposure to Western societies, and the increasing demands for Western-style individual privacy by young people. Even so, I argue that these emerging conceptions of privacy will remain distinctively Chinese – i.e., they will retain a basic consistency with traditional Chinese values and approaches. 相似文献
587.
Luke Stark 《The Information Society》2016,32(1):14-27
Why are ongoing legal, design, and policy debates around information privacy often divorced from the lived experience of everyday digital media use? This article argues that human emotion is a critical but undertheorized element in users' subjective sense of information privacy. The piece advocates for a greater attention to the phenomenology of feeling and to the concept of “visceral” design in information privacy scholarship, policy, and design practice. 相似文献
588.
无线电子商务安全性的几个关键技术 总被引:10,自引:0,他引:10
综述现有无线安全技术的发展概况,重点研究实现 WPKI可能要使用的几个重要的协议.特别是IEEE 802.11中的 WEP算法和无线应用协议(WAP)中的无线传输层安全协议(WTLS).讨论如何实现这两个协议,比较他们在安全性方面的特点,以及讨论这些协议在应用方面的潜在优势. 相似文献
589.
Privacy as life, liberty, property 总被引:2,自引:2,他引:2
Richard Volkman 《Ethics and Information Technology》2003,5(4):199-210
The cluster of concerns usually identified asmatters of privacy can be adequately accountedfor by unpacking our natural rights to life,liberty, and property. Privacy as derived fromfundamental natural rights to life, liberty,and property encompasses the advantages of thecontrol and restricted access theories withouttheir attendant difficulties. 相似文献
590.
[目的/意义]构建政务APP个人隐私信息保护评价指标体系,对我国政务APP个人隐私信息保护进行科学合理评价,为完善政务APP个人隐私信息保护提出建议。[方法/过程]从隐私政策视角,利用专家访谈法与层次分析法,从"用户知情同意、信息安全控制、个人权利保障"3个维度构建我国政务APP个人隐私信息保护评价指标体系;并选取我国直辖市、省会城市和计划单列市的36个政务APP进行实证分析。[结果/结论]构建的政务APP个人隐私信息保护评价指标体系具有一定的实用性和可操作性,实证分析发现我国政务APP个人隐私信息保护问题严峻,政府部门应着重关注和解决。 相似文献