首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   656篇
  免费   7篇
  国内免费   6篇
教育   291篇
科学研究   209篇
各国文化   1篇
体育   5篇
综合类   19篇
文化理论   2篇
信息传播   142篇
  2023年   11篇
  2022年   14篇
  2021年   29篇
  2020年   21篇
  2019年   24篇
  2018年   23篇
  2017年   17篇
  2016年   19篇
  2015年   25篇
  2014年   35篇
  2013年   58篇
  2012年   36篇
  2011年   32篇
  2010年   40篇
  2009年   32篇
  2008年   38篇
  2007年   64篇
  2006年   39篇
  2005年   44篇
  2004年   27篇
  2003年   13篇
  2002年   8篇
  2001年   13篇
  2000年   5篇
  1992年   2篇
排序方式: 共有669条查询结果,搜索用时 15 毫秒
581.
在信息公开的世界潮流中,随着行政主体与行政相对人交互关系的广泛性和多元化,行政主体掌握着数量可观的个人信息,而个人信息的合理正当使用影响着相对人的切身权益,个人隐私权由此也受到了前所未有的威胁。在当前强调信息公开的学术氛围中,行政主体在信息公开的过程中如何充分保护个人隐私权是一个容易被忽视的研究课题。应从隐私权的演进、政府信息公开中知情权对个人隐私权的保护以及政府信息公开中个人隐私权的制度性保护三个方面,进一步完善我国政府信息公开的法律体系。  相似文献   
582.
随着全球经济一体化的纵深发展,越来越多的外企进军中国市场,这给中国就业人群提供了更多的就业选择。然而,西方职场文化的不同对中国雇员在外企的进一步发展造成了交际上的障碍。越来越多的跨文化交际策略被总结,然而对于跨文化交际中的隐私意识,特别是职场隐私的研究还不多,而从跨文化交际的视角浅析中西职场隐私意识的差异,能更加详细地剖析中西职场隐私差异,提高跟人们的跨文化交际水平和职场隐私意识。  相似文献   
583.
段绩伟 《现代情报》2007,27(12):84-85
文章由一组案例引发对我国网络隐私权保护的理性思考,主要探讨了网络隐私权的概念,介绍并分析了我国网络隐私权保护的现状,最后提出相关对策。  相似文献   
584.
This paper addresses the question of delegation of morality to a machine, through a consideration of whether or not non-humans can be considered to be moral. The aspect of morality under consideration here is protection of privacy. The topic is introduced through two cases where there was a failure in sharing and retaining personal data protected by UK data protection law, with tragic consequences. In some sense this can be regarded as a failure in the process of delegating morality to a computer database. In the UK, the issues that these cases raise have resulted in legislation designed to protect children which allows for the creation of a huge database for children. Paradoxically, we have the situation where we failed to use digital data in enforcing the law to protect children, yet we may now rely heavily on digital technologies to care for children. I draw on the work of Floridi, Sanders, Collins, Kusch, Latour and Akrich, a spectrum of work stretching from philosophy to sociology of technology and the “seamless web” or “actor–network” approach to studies of technology. Intentionality is considered, but not deemed necessary for meaningful moral behaviour. Floridi’s and Sanders’ concept of “distributed morality” accords with the network of agency characterized by actor–network approaches. The paper concludes that enfranchizing non-humans, in the shape of computer databases of personal data, as moral agents is not necessarily problematic but a balance of delegation of morality must be made between human and non-human actors.  相似文献   
585.
This essay examines issues involving personal privacy and informed consent that arise at the intersection of information and communication technology (ICT) and population genomics research. I begin by briefly examining the ethical, legal, and social implications (ELSI) program requirements that were established to guide researchers working on the Human Genome Project (HGP). Next I consider a case illustration involving deCODE Genetics, a privately owned genetic company in Iceland, which raises some ethical concerns that are not clearly addressed in the current ELSI guidelines. The deCODE case also illustrates some ways in which an ICT technique known as data mining has both aided and posed special challenges for researchers working in the field of population genomics. On the one hand, data-mining tools have greatly assisted researchers in mapping the human genome and in identifying certain "disease genes" common in specific populations (which, in turn, has accelerated the process of finding cures for diseases tha affect those populations). On the other hand, this technology has significantly threatened the privacy of research subjects participating in population genomics studies, who may, unwittingly, contribute to the construction of new groups (based on arbitrary and non-obvious patterns and statistical correlations) that put those subjects at risk for discrimination and stigmatization. In the final section of this paper I examine some ways in which the use of data mining in the context of population genomics research poses a critical challenge for the principle of informed consent, which traditionally has played a central role in protecting the privacy interests of research subjects participating in epidemiological studies.  相似文献   
586.
Recent anthropological analyses of Chinese attitudes towards privacy fail to pay adequate attention to more ordinary, but more widely shared ideas of privacy – ideas that, moreover, have changed dramatically since the 1980s as China has become more and more open to Western countries, cultures, and their network and computing technologies. I begin by reviewing these changes, in part to show how contemporary notions of privacy in China constitute a dialectical synthesis of both traditional Chinese emphases on the importance of the family and the state and more Western emphases on individual rights, including the right to privacy. This same synthesis can be seen in contemporary Chinese law and scholarship regarding privacy. A review of recent work in philosophical ethics demonstrates that information ethics in China is in its very early stages. In this work, privacy is justified as an instrumental good, rather than an intrinsic good. I argue by way of conclusion that privacy protections will continue to expand in China, in part under the pressures of globalization, increasing trade with and exposure to Western societies, and the increasing demands for Western-style individual privacy by young people. Even so, I argue that these emerging conceptions of privacy will remain distinctively Chinese – i.e., they will retain a basic consistency with traditional Chinese values and approaches.  相似文献   
587.
Why are ongoing legal, design, and policy debates around information privacy often divorced from the lived experience of everyday digital media use? This article argues that human emotion is a critical but undertheorized element in users' subjective sense of information privacy. The piece advocates for a greater attention to the phenomenology of feeling and to the concept of “visceral” design in information privacy scholarship, policy, and design practice.  相似文献   
588.
无线电子商务安全性的几个关键技术   总被引:10,自引:0,他引:10  
综述现有无线安全技术的发展概况,重点研究实现 WPKI可能要使用的几个重要的协议.特别是IEEE 802.11中的 WEP算法和无线应用协议(WAP)中的无线传输层安全协议(WTLS).讨论如何实现这两个协议,比较他们在安全性方面的特点,以及讨论这些协议在应用方面的潜在优势.  相似文献   
589.
Privacy as life, liberty, property   总被引:2,自引:2,他引:2  
The cluster of concerns usually identified asmatters of privacy can be adequately accountedfor by unpacking our natural rights to life,liberty, and property. Privacy as derived fromfundamental natural rights to life, liberty,and property encompasses the advantages of thecontrol and restricted access theories withouttheir attendant difficulties.  相似文献   
590.
张晓娟  徐建光 《现代情报》2019,39(7):133-142
[目的/意义]构建政务APP个人隐私信息保护评价指标体系,对我国政务APP个人隐私信息保护进行科学合理评价,为完善政务APP个人隐私信息保护提出建议。[方法/过程]从隐私政策视角,利用专家访谈法与层次分析法,从"用户知情同意、信息安全控制、个人权利保障"3个维度构建我国政务APP个人隐私信息保护评价指标体系;并选取我国直辖市、省会城市和计划单列市的36个政务APP进行实证分析。[结果/结论]构建的政务APP个人隐私信息保护评价指标体系具有一定的实用性和可操作性,实证分析发现我国政务APP个人隐私信息保护问题严峻,政府部门应着重关注和解决。  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号