全文获取类型
收费全文 | 4160篇 |
免费 | 60篇 |
国内免费 | 31篇 |
专业分类
教育 | 3147篇 |
科学研究 | 372篇 |
各国文化 | 6篇 |
体育 | 140篇 |
综合类 | 212篇 |
文化理论 | 6篇 |
信息传播 | 368篇 |
出版年
2024年 | 1篇 |
2023年 | 10篇 |
2022年 | 33篇 |
2021年 | 61篇 |
2020年 | 109篇 |
2019年 | 72篇 |
2018年 | 58篇 |
2017年 | 76篇 |
2016年 | 81篇 |
2015年 | 104篇 |
2014年 | 223篇 |
2013年 | 340篇 |
2012年 | 286篇 |
2011年 | 346篇 |
2010年 | 258篇 |
2009年 | 221篇 |
2008年 | 288篇 |
2007年 | 336篇 |
2006年 | 336篇 |
2005年 | 220篇 |
2004年 | 232篇 |
2003年 | 164篇 |
2002年 | 173篇 |
2001年 | 118篇 |
2000年 | 61篇 |
1999年 | 22篇 |
1998年 | 5篇 |
1997年 | 6篇 |
1996年 | 2篇 |
1995年 | 2篇 |
1994年 | 1篇 |
1993年 | 1篇 |
1992年 | 3篇 |
1991年 | 1篇 |
1957年 | 1篇 |
排序方式: 共有4251条查询结果,搜索用时 212 毫秒
21.
自由具有正当性,但自由是有限的。在学校教育中,学生、教师和家长的自由也是有限的。其伦理学依据表现为:自由原则不是人类生活的唯一原则,人类社会中的一些制度对自由起着限制的作用,自由会受到实际条件的限制,“恐惧自由”心理的作用,自由原则的应用有特定的范围。就学生而言,义务教育的强迫性表明儿童自由是有限的,学校对教学秩序的需求,控制了的教育环境,学生一些要求的“无理性”,以及教师布置的作业和组织的活动决定了学生自由的有限性;就教师自由而言,教育的目的和任务,中小学学生身心发展不同阶段的特殊性.教育考试制度和教师特殊的社会角色,决定了教师自由的有限性;就家长而言,在儿童的义务教育问题上家长没有选择的自由,在子女就学的学校选择中不少家长的自由会受到限制。因此,我们对教育领域中的学生、教师和家长的自由问题必须有清醒的认识,弄清楚在哪些地方允许自由,在哪些地方则应当对自由作适当的限制,不能将自由的概念用错地方,“在不应当给予自由的地方给予了自由,而在应当给予自由的地方又往往不给予自由”。 相似文献
22.
Katherine G. McDaniel Taylor Brown Caitlin C. Radford Cynthia H. McDermott Trudy van Houten Martha E. Katz Dana A. Stearns Sabine Hildebrandt 《Anatomical sciences education》2021,14(2):241-251
Anatomy education provides students with opportunities to learn structure and function of the human body, to acquire professional competencies such as teamwork, interpersonal skills, self-awareness, and to reflect on and practice medical ethics. The fulfillment of this wide potential can present challenges in courses that are part of an integrated curriculum and shorter than traditional courses. This new reality, together with students' increasing concern about the stresses within medical education, led to efforts at Harvard Medical School to implement practical steps toward an optimal learning environment in anatomy. These were based on core elements of ethical anatomy education and principles of trauma-informed care. Anatomy is conceptualized here as the “first clinical discipline,” with relational interactions between anatomical educators, medical students, and body donors/patients. Essential prerequisites for the implementation of this work were support by the medical school leadership, open partnership between engaged students and faculty, faculty coordination, and peer-teaching. Specific interventions included pre-course faculty development on course philosophy and invitations to students to share their thoughts on anatomy. Student responses were integrated in course introductions, combined with a pre-dissection laboratory visit, an introductory guide, and a module on the history and ethics of anatomy. During the course, team-building activities were scheduled, and self-reflection encouraged, for example, through written exercises, and elective life-body drawing. Students' responses to the interventions were overall positive, but need further evaluation. This first attempt of a systematic implementation of an optimal learning environment in anatomy led to the identification of areas in need of adjustment. 相似文献
23.
24.
25.
Amy Bruckman 《Ethics and Information Technology》2002,4(3):217-231
In the mid-1990s, the Internet rapidly changedfrom a venue used by a small number ofscientists to a popular phenomena affecting allaspects of life in industrialized nations. Scholars from diverse disciplines have taken aninterest in trying to understand the Internetand Internet users. However, as a variety ofresearchers have noted, guidelines for ethicalresearch on human subjects written before theInternet's growth can be difficult to extend toresearch on Internet users.In this paper, I focus on one ethicalissue: whether and to what extent to disguisematerial collected online in publishedaccounts. While some people argue thatvulnerable human subjects must always be madeanonymous in publications for their ownprotection, others argue that Internet usersdeserve credit for their creative andintellectual work. Still others argue thatmuch material available online should betreated as ``published.' To attempt to resolvethese issues, I first review my own experiencesof disguising material in research accountsfrom 1992 to 2002. Some of the thorniestissues emerge at the boundaries betweenresearch disciplines. Furthermore, manyhumanities disciplines have not historicallyviewed what they do as human subjects research. Next, I explore what it means to do humansubjects research in the humanities. Inspiredby issues raised by colleagues in thehumanities, I argue that the traditional notionof a ``human subject' does not adequatelycharacterize Internet users. A useful alternatemental model is proposed: Internet users areamateur artists. The Internet can be seen as aplayground for amateur artists creatingsemi-published work. I argue that thisapproach helps make some ethical dilemmaseasier to reason about, because it highlightskey novel aspects of the situation,particularly with regard to disguisingmaterial. Finally, I conclude by proposing aset of practical guidelines regardingdisguising material gathered on the Internet inpublished accounts, on a continuum from nodisguise, light disguise, moderate disguise, toheavy disguise. 相似文献
26.
Elizabeth?TowellEmail author J.?Barrie?Thompson Kathleen?L.?McFadden 《Ethics and Information Technology》2004,6(4):291-299
In light of growing concerns in the public and recent mandates from business program accrediting bodies and curricular task forces, the importance of teaching ethical topics in information systems programs is discussed. Innovative strategies used for teaching the application of ethical criteria to common situations are reviewed. Results of a survey of information systems faculty members in the US are presented and are compared to previous studies that related primarily to computer science and software engineering programs. Insight is provided into the topics, techniques, degree of coverage, and assessment techniques currently used when teaching ethics in computing-related programs. Key concerns and future work is also outlined. 相似文献
27.
The proliferation of information and communication technologies (ICTs) into all aspects of life poses unique ethical challenges
as our modern societies become increasingly dependent on the flawless operation of these technologies. As we increasingly
entrust our privacy, our well-being and our lives to an ever greater number of computers we need to look more closely at the
risks and ethical implications of these developments. By emphasising the vulnerability of software and the practice of professional
software developers, we want to make clear the ethical aspects of producing potentially flawed software. This paper outlines
some of the vulnerabilities associated with software systems and identifies a number of social and organisational factors
affecting software developers and contributing to these vulnerabilities. Scott A. Snook’s theory of practical drift is used as the basis for our analysis. We show that this theory, originally developed to explain the failure of a military
organisation, can be used to understand how professional software developers “drift away” from procedures and processes designed
to ensure quality and prevent software vulnerability. Based on interviews with software developers in two Norwegian companies
we identify two areas where social factors compel software developers to drift away from a global set of rules constituting
software development processes and methods. Issues of pleasure and control and difference in mental models contribute to an uncoupling from established practices designed to guarantee the reliability of software and thus diminish
its vulnerability. 相似文献
28.
Anders Albrechtslund 《Ethics and Information Technology》2007,9(1):63-72
This article offers a discussion of the connection between technology and values and, specifically, I take a closer look at
ethically sound design. In order to bring the discussion into a concrete context, the theory of Value Sensitive Design (VSD)
will be the focus point. To illustrate my argument concerning design ethics, the discussion involves a case study of an augmented
window, designed by the VSD Research Lab, which has turned out to be a potentially surveillance-enabling technology. I call
attention to a “positivist problem” that has to do with the connection between the design context and the use context, which
VSD seems to presuppose, and I argue that it is necessary to clearly distinguish between the two, since the designers’ intentions
do not always correspond with the users’ practice; in fact, the relation between design and use is very complex and principally
unpredictable. Thus, a design theory must accept that foresight is limited to anticipation rather than prediction. To overcome
the positivist problem, I suggest a phenomenological approach to technology inspired by Don Ihde’s concept of multistability.
This argument, which is general in nature and thus applies to any theory of design ethics, is intended as a constructive criticism,
which can hopefully contribute to the further development of design ethics. 相似文献
29.
Luciano Floridi argues that every existing entity is deserving of at least minimal moral respect in virtue of having intrinsic value qua information object. In this essay, I attempt a comprehensive assessment of this important view as well as the arguments Floridi offers in support of it. I conclude both that the arguments are insufficient and that the thesis itself is substantively implausible from the standpoint of ordinary intuitions. 相似文献
30.
Recently, there has been a heavy debate in the US about the government’s use of data mining in its fight against terrorism.
Privacy concerns in fact led the Congress to terminate the funding of TIA, a program for advanced information technology to
be used in the combat of terrorism. The arguments put forward in this debate, more specifically those found in the main report
and minority report by the TAPAC established by the Secretary of Defense to examine the TIA issue, will be analysed to trace
the deeper roots of this controversy. This analysis will in turn be used as a test case to examine the adequacy of the usual
theoretical frameworks for these kinds of issues, in particular the notion of privacy. Whereas the dominant theoretical framing
of the notion of privacy turns around access to information, most of the core arguments in the debate do not fit in this kind of framework. The basic disagreements in
the controversy are not about mere access, they involve both access and use. Furthermore, whereas the issue of access by itself refers to a more or less static situation, the real disagreements much
more concern the organisational dynamics of the use of information, the mechanisms in the organisation that control these
dynamics, and the awareness present within the organisation of the ‘social risks’ these dynamics represent. The bottom line
question is whether the assessment of these gives sufficient reason for trust. 相似文献