首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   7034篇
  免费   218篇
  国内免费   114篇
教育   4926篇
科学研究   799篇
各国文化   11篇
体育   243篇
综合类   312篇
文化理论   4篇
信息传播   1071篇
  2024年   1篇
  2023年   36篇
  2022年   119篇
  2021年   200篇
  2020年   289篇
  2019年   225篇
  2018年   133篇
  2017年   161篇
  2016年   117篇
  2015年   192篇
  2014年   454篇
  2013年   654篇
  2012年   558篇
  2011年   639篇
  2010年   408篇
  2009年   350篇
  2008年   450篇
  2007年   463篇
  2006年   465篇
  2005年   333篇
  2004年   324篇
  2003年   247篇
  2002年   223篇
  2001年   158篇
  2000年   80篇
  1999年   32篇
  1998年   14篇
  1997年   13篇
  1996年   8篇
  1995年   3篇
  1994年   4篇
  1993年   2篇
  1992年   3篇
  1991年   1篇
  1989年   2篇
  1979年   1篇
  1977年   1篇
  1976年   1篇
  1957年   2篇
排序方式: 共有7366条查询结果,搜索用时 15 毫秒
21.
Over the past two decades, scientific editors have attempted to correct “mistaken” assumptions about scientific images and to curb unethical image-manipulation practices. Reactions to the advent and abuse of image-adjustment software (such as Adobe Photoshop) reveal the complex relations among visual representations, scientific credibility, and epistemic rhetoric. Perelman and Olbrechts-Tyteca's model of argumentation provides a flexible system for understanding these relations and for teaching students to use scientific images ethically and effectively.  相似文献   
22.
医学院校科研绩效评价问题的探讨   总被引:2,自引:0,他引:2  
分析了医学院校绩效评价的重要性和复杂性特点,基于系统分析的方法,探讨了科研绩效评价的内容、评价指标与评价原则,提出了科研绩效评价的创新管理措施,为医学高校进行科研绩效评价提供参考。  相似文献   
23.
Traditional approaches to computer ethics regard computers as tools, andfocus, therefore, on the ethics of their use. Alternatively, computer ethicsmight instead be understood as a study of the ethics of computationalagents, exploring, for example, the different characteristics and behaviorsthat might benefit such an agent in accomplishing its goals. In this paper,I identify a list of characteristics of computational agents that facilitatetheir pursuit of their end, and claim that these characteristics can beunderstood as virtues within a framework of virtue ethics. This frameworkincludes four broad categories – agentive, social, environmental, and moral– each of which can be understood as a spectrum of virtues rangingbetween two extreme subcategories. Although the use of a virtue frameworkis metaphorical rather than literal, I argue that by providing a frameworkfor identifying and critiquing assumptions about what a `good' computer is,a study of android arete provides focus and direction to the developmentof future computational agents.  相似文献   
24.
论技术责任的主体   总被引:6,自引:1,他引:6  
杜宝贵 《科学学研究》2002,20(2):123-126
本文通过对技术责任的主体的历史演变过程和技术责任主体基本构成的研究 ,在区分技术责任主体的意义和价值的基础上 ,分析了技术责任主体应该是一个由工程师、科学家以及企业、国家等构成的技术责任主体群  相似文献   
25.
开辟医学影像学期刊品牌专栏"图文讲座"   总被引:5,自引:3,他引:2  
汪晓  汪玲 《编辑学报》2006,18(2):127-128
探讨创办医学影像学期刊"图文讲座"新栏目的经验.认为以图文讲座为品牌栏目,不仅适应了"读图时代"受众心理和阅读取向,而且显示了该类专业杂志的突出特色,有利于期刊国际化的交流,提升了核心竞争力.  相似文献   
26.
夏庆民 《编辑学报》2006,18(2):125-126
结合一则医学论文的结构式摘要,分析存在的问题,总结结构式摘要的一般编辑原则.  相似文献   
27.
In the mid-1990s, the Internet rapidly changedfrom a venue used by a small number ofscientists to a popular phenomena affecting allaspects of life in industrialized nations. Scholars from diverse disciplines have taken aninterest in trying to understand the Internetand Internet users. However, as a variety ofresearchers have noted, guidelines for ethicalresearch on human subjects written before theInternet's growth can be difficult to extend toresearch on Internet users.In this paper, I focus on one ethicalissue: whether and to what extent to disguisematerial collected online in publishedaccounts. While some people argue thatvulnerable human subjects must always be madeanonymous in publications for their ownprotection, others argue that Internet usersdeserve credit for their creative andintellectual work. Still others argue thatmuch material available online should betreated as ``published.' To attempt to resolvethese issues, I first review my own experiencesof disguising material in research accountsfrom 1992 to 2002. Some of the thorniestissues emerge at the boundaries betweenresearch disciplines. Furthermore, manyhumanities disciplines have not historicallyviewed what they do as human subjects research. Next, I explore what it means to do humansubjects research in the humanities. Inspiredby issues raised by colleagues in thehumanities, I argue that the traditional notionof a ``human subject' does not adequatelycharacterize Internet users. A useful alternatemental model is proposed: Internet users areamateur artists. The Internet can be seen as aplayground for amateur artists creatingsemi-published work. I argue that thisapproach helps make some ethical dilemmaseasier to reason about, because it highlightskey novel aspects of the situation,particularly with regard to disguisingmaterial. Finally, I conclude by proposing aset of practical guidelines regardingdisguising material gathered on the Internet inpublished accounts, on a continuum from nodisguise, light disguise, moderate disguise, toheavy disguise.  相似文献   
28.
29.
Luciano Floridi argues that every existing entity is deserving of at least minimal moral respect in virtue of having intrinsic value qua information object. In this essay, I attempt a comprehensive assessment of this important view as well as the arguments Floridi offers in support of it. I conclude both that the arguments are insufficient and that the thesis itself is substantively implausible from the standpoint of ordinary intuitions.  相似文献   
30.
Recently, there has been a heavy debate in the US about the government’s use of data mining in its fight against terrorism. Privacy concerns in fact led the Congress to terminate the funding of TIA, a program for advanced information technology to be used in the combat of terrorism. The arguments put forward in this debate, more specifically those found in the main report and minority report by the TAPAC established by the Secretary of Defense to examine the TIA issue, will be analysed to trace the deeper roots of this controversy. This analysis will in turn be used as a test case to examine the adequacy of the usual theoretical frameworks for these kinds of issues, in particular the notion of privacy. Whereas the dominant theoretical framing of the notion of privacy turns around access to information, most of the core arguments in the debate do not fit in this kind of framework. The basic disagreements in the controversy are not about mere access, they involve both access and use. Furthermore, whereas the issue of access by itself refers to a more or less static situation, the real disagreements much more concern the organisational dynamics of the use of information, the mechanisms in the organisation that control these dynamics, and the awareness present within the organisation of the ‘social risks’ these dynamics represent. The bottom line question is whether the assessment of these gives sufficient reason for trust.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号