首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   4160篇
  免费   60篇
  国内免费   31篇
教育   3147篇
科学研究   372篇
各国文化   6篇
体育   140篇
综合类   212篇
文化理论   6篇
信息传播   368篇
  2024年   1篇
  2023年   10篇
  2022年   33篇
  2021年   61篇
  2020年   109篇
  2019年   72篇
  2018年   58篇
  2017年   76篇
  2016年   81篇
  2015年   104篇
  2014年   223篇
  2013年   340篇
  2012年   286篇
  2011年   346篇
  2010年   258篇
  2009年   221篇
  2008年   288篇
  2007年   336篇
  2006年   336篇
  2005年   220篇
  2004年   232篇
  2003年   164篇
  2002年   173篇
  2001年   118篇
  2000年   61篇
  1999年   22篇
  1998年   5篇
  1997年   6篇
  1996年   2篇
  1995年   2篇
  1994年   1篇
  1993年   1篇
  1992年   3篇
  1991年   1篇
  1957年   1篇
排序方式: 共有4251条查询结果,搜索用时 212 毫秒
21.
自由具有正当性,但自由是有限的。在学校教育中,学生、教师和家长的自由也是有限的。其伦理学依据表现为:自由原则不是人类生活的唯一原则,人类社会中的一些制度对自由起着限制的作用,自由会受到实际条件的限制,“恐惧自由”心理的作用,自由原则的应用有特定的范围。就学生而言,义务教育的强迫性表明儿童自由是有限的,学校对教学秩序的需求,控制了的教育环境,学生一些要求的“无理性”,以及教师布置的作业和组织的活动决定了学生自由的有限性;就教师自由而言,教育的目的和任务,中小学学生身心发展不同阶段的特殊性.教育考试制度和教师特殊的社会角色,决定了教师自由的有限性;就家长而言,在儿童的义务教育问题上家长没有选择的自由,在子女就学的学校选择中不少家长的自由会受到限制。因此,我们对教育领域中的学生、教师和家长的自由问题必须有清醒的认识,弄清楚在哪些地方允许自由,在哪些地方则应当对自由作适当的限制,不能将自由的概念用错地方,“在不应当给予自由的地方给予了自由,而在应当给予自由的地方又往往不给予自由”。  相似文献   
22.
Anatomy education provides students with opportunities to learn structure and function of the human body, to acquire professional competencies such as teamwork, interpersonal skills, self-awareness, and to reflect on and practice medical ethics. The fulfillment of this wide potential can present challenges in courses that are part of an integrated curriculum and shorter than traditional courses. This new reality, together with students' increasing concern about the stresses within medical education, led to efforts at Harvard Medical School to implement practical steps toward an optimal learning environment in anatomy. These were based on core elements of ethical anatomy education and principles of trauma-informed care. Anatomy is conceptualized here as the “first clinical discipline,” with relational interactions between anatomical educators, medical students, and body donors/patients. Essential prerequisites for the implementation of this work were support by the medical school leadership, open partnership between engaged students and faculty, faculty coordination, and peer-teaching. Specific interventions included pre-course faculty development on course philosophy and invitations to students to share their thoughts on anatomy. Student responses were integrated in course introductions, combined with a pre-dissection laboratory visit, an introductory guide, and a module on the history and ethics of anatomy. During the course, team-building activities were scheduled, and self-reflection encouraged, for example, through written exercises, and elective life-body drawing. Students' responses to the interventions were overall positive, but need further evaluation. This first attempt of a systematic implementation of an optimal learning environment in anatomy led to the identification of areas in need of adjustment.  相似文献   
23.
论技术责任的主体   总被引:6,自引:1,他引:6  
杜宝贵 《科学学研究》2002,20(2):123-126
本文通过对技术责任的主体的历史演变过程和技术责任主体基本构成的研究 ,在区分技术责任主体的意义和价值的基础上 ,分析了技术责任主体应该是一个由工程师、科学家以及企业、国家等构成的技术责任主体群  相似文献   
24.
25.
In the mid-1990s, the Internet rapidly changedfrom a venue used by a small number ofscientists to a popular phenomena affecting allaspects of life in industrialized nations. Scholars from diverse disciplines have taken aninterest in trying to understand the Internetand Internet users. However, as a variety ofresearchers have noted, guidelines for ethicalresearch on human subjects written before theInternet's growth can be difficult to extend toresearch on Internet users.In this paper, I focus on one ethicalissue: whether and to what extent to disguisematerial collected online in publishedaccounts. While some people argue thatvulnerable human subjects must always be madeanonymous in publications for their ownprotection, others argue that Internet usersdeserve credit for their creative andintellectual work. Still others argue thatmuch material available online should betreated as ``published.' To attempt to resolvethese issues, I first review my own experiencesof disguising material in research accountsfrom 1992 to 2002. Some of the thorniestissues emerge at the boundaries betweenresearch disciplines. Furthermore, manyhumanities disciplines have not historicallyviewed what they do as human subjects research. Next, I explore what it means to do humansubjects research in the humanities. Inspiredby issues raised by colleagues in thehumanities, I argue that the traditional notionof a ``human subject' does not adequatelycharacterize Internet users. A useful alternatemental model is proposed: Internet users areamateur artists. The Internet can be seen as aplayground for amateur artists creatingsemi-published work. I argue that thisapproach helps make some ethical dilemmaseasier to reason about, because it highlightskey novel aspects of the situation,particularly with regard to disguisingmaterial. Finally, I conclude by proposing aset of practical guidelines regardingdisguising material gathered on the Internet inpublished accounts, on a continuum from nodisguise, light disguise, moderate disguise, toheavy disguise.  相似文献   
26.
In light of growing concerns in the public and recent mandates from business program accrediting bodies and curricular task forces, the importance of teaching ethical topics in information systems programs is discussed. Innovative strategies used for teaching the application of ethical criteria to common situations are reviewed. Results of a survey of information systems faculty members in the US are presented and are compared to previous studies that related primarily to computer science and software engineering programs. Insight is provided into the topics, techniques, degree of coverage, and assessment techniques currently used when teaching ethics in computing-related programs. Key concerns and future work is also outlined.  相似文献   
27.
The proliferation of information and communication technologies (ICTs) into all aspects of life poses unique ethical challenges as our modern societies become increasingly dependent on the flawless operation of these technologies. As we increasingly entrust our privacy, our well-being and our lives to an ever greater number of computers we need to look more closely at the risks and ethical implications of these developments. By emphasising the vulnerability of software and the practice of professional software developers, we want to make clear the ethical aspects of producing potentially flawed software. This paper outlines some of the vulnerabilities associated with software systems and identifies a number of social and organisational factors affecting software developers and contributing to these vulnerabilities. Scott A. Snook’s theory of practical drift is used as the basis for our analysis. We show that this theory, originally developed to explain the failure of a military organisation, can be used to understand how professional software developers “drift away” from procedures and processes designed to ensure quality and prevent software vulnerability. Based on interviews with software developers in two Norwegian companies we identify two areas where social factors compel software developers to drift away from a global set of rules constituting software development processes and methods. Issues of pleasure and control and difference in mental models contribute to an uncoupling from established practices designed to guarantee the reliability of software and thus diminish its vulnerability.  相似文献   
28.
This article offers a discussion of the connection between technology and values and, specifically, I take a closer look at ethically sound design. In order to bring the discussion into a concrete context, the theory of Value Sensitive Design (VSD) will be the focus point. To illustrate my argument concerning design ethics, the discussion involves a case study of an augmented window, designed by the VSD Research Lab, which has turned out to be a potentially surveillance-enabling technology. I call attention to a “positivist problem” that has to do with the connection between the design context and the use context, which VSD seems to presuppose, and I argue that it is necessary to clearly distinguish between the two, since the designers’ intentions do not always correspond with the users’ practice; in fact, the relation between design and use is very complex and principally unpredictable. Thus, a design theory must accept that foresight is limited to anticipation rather than prediction. To overcome the positivist problem, I suggest a phenomenological approach to technology inspired by Don Ihde’s concept of multistability. This argument, which is general in nature and thus applies to any theory of design ethics, is intended as a constructive criticism, which can hopefully contribute to the further development of design ethics.  相似文献   
29.
Luciano Floridi argues that every existing entity is deserving of at least minimal moral respect in virtue of having intrinsic value qua information object. In this essay, I attempt a comprehensive assessment of this important view as well as the arguments Floridi offers in support of it. I conclude both that the arguments are insufficient and that the thesis itself is substantively implausible from the standpoint of ordinary intuitions.  相似文献   
30.
Recently, there has been a heavy debate in the US about the government’s use of data mining in its fight against terrorism. Privacy concerns in fact led the Congress to terminate the funding of TIA, a program for advanced information technology to be used in the combat of terrorism. The arguments put forward in this debate, more specifically those found in the main report and minority report by the TAPAC established by the Secretary of Defense to examine the TIA issue, will be analysed to trace the deeper roots of this controversy. This analysis will in turn be used as a test case to examine the adequacy of the usual theoretical frameworks for these kinds of issues, in particular the notion of privacy. Whereas the dominant theoretical framing of the notion of privacy turns around access to information, most of the core arguments in the debate do not fit in this kind of framework. The basic disagreements in the controversy are not about mere access, they involve both access and use. Furthermore, whereas the issue of access by itself refers to a more or less static situation, the real disagreements much more concern the organisational dynamics of the use of information, the mechanisms in the organisation that control these dynamics, and the awareness present within the organisation of the ‘social risks’ these dynamics represent. The bottom line question is whether the assessment of these gives sufficient reason for trust.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号