首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   656篇
  免费   7篇
  国内免费   6篇
教育   291篇
科学研究   209篇
各国文化   1篇
体育   5篇
综合类   19篇
文化理论   2篇
信息传播   142篇
  2023年   11篇
  2022年   14篇
  2021年   29篇
  2020年   21篇
  2019年   24篇
  2018年   23篇
  2017年   17篇
  2016年   19篇
  2015年   25篇
  2014年   35篇
  2013年   58篇
  2012年   36篇
  2011年   32篇
  2010年   40篇
  2009年   32篇
  2008年   38篇
  2007年   64篇
  2006年   39篇
  2005年   44篇
  2004年   27篇
  2003年   13篇
  2002年   8篇
  2001年   13篇
  2000年   5篇
  1992年   2篇
排序方式: 共有669条查询结果,搜索用时 734 毫秒
31.
物联网是什么?物联网不是互联网、传感网、产品电子代码,也不单纯是一种技术应用。物联网将“互联网”和“物”连接在一起,就意味着把破坏性创新引进到当今的信息和通信技术世界。与互联网不同,物联网是物、网络、语义等视角的综合而形成的集网络、应用服务于一体的技术融合系统。在物联网语境中,物联网技术像人一样形成了人为的自主特征。物联网意味着一种潜在的技术异化的环境:个人隐私以多种方式受到威胁。而现有对隐私的制度规约存在诸多的不完备性。  相似文献   
32.
[目的/意义]科学数据已经成为科学研究的重要资源,科研人员面临保护科学数据安全的新挑战。[方法/过程]第一步,从政策、资金、设备、平台、科学数据价值、科研人员专业素养的角度设计问卷;第二步,基于问卷回收数据构建SEM模型;第三步,构建SD模型并对6个维度变化进行动态仿真,探究科学数据安全系统中各因素之间的相互作用关系。[结果/结论]政策、资金、设备、平台、科学数据价值、科研人员专业素养对科学数据安全具有影响,其中政策、平台、科学数据价值对科学数据安全的作用较明显。[局限]考虑的科学安全影响因素尚不全面,还需要进一步优化SD模型。  相似文献   
33.
分析僵尸账号对社交网络的主要威胁及社交网络对僵尸账号的检测机制,针对现有检测机制的不足设计规避检测的策略.使用该策略设计并实现一款利用僵尸账号对社交网络进行攻击的自动化工具.使用该工具对国内外最大的2个社交网站进行攻击测试.实验结果证明了策略与工具的有效性,并证明了社交网络针对僵尸账号的检测机制仍存在不足.  相似文献   
34.
Recently, there has been a heavy debate in the US about the government’s use of data mining in its fight against terrorism. Privacy concerns in fact led the Congress to terminate the funding of TIA, a program for advanced information technology to be used in the combat of terrorism. The arguments put forward in this debate, more specifically those found in the main report and minority report by the TAPAC established by the Secretary of Defense to examine the TIA issue, will be analysed to trace the deeper roots of this controversy. This analysis will in turn be used as a test case to examine the adequacy of the usual theoretical frameworks for these kinds of issues, in particular the notion of privacy. Whereas the dominant theoretical framing of the notion of privacy turns around access to information, most of the core arguments in the debate do not fit in this kind of framework. The basic disagreements in the controversy are not about mere access, they involve both access and use. Furthermore, whereas the issue of access by itself refers to a more or less static situation, the real disagreements much more concern the organisational dynamics of the use of information, the mechanisms in the organisation that control these dynamics, and the awareness present within the organisation of the ‘social risks’ these dynamics represent. The bottom line question is whether the assessment of these gives sufficient reason for trust.  相似文献   
35.
Recent advances in wireless technologies have led to the development of intelligent, in-vehicle safety applications designed to share information about the actions of nearby vehicles, potential road hazards, and ultimately predict dangerous scenarios or imminent collisions. These vehicle safety communication (VSC) technologies rely on the creation of autonomous, self-organizing, wireless communication networks connecting vehicles with roadside infrastructure and with each other. As the technical standards and communication protocols for VSC technologies are still being developed, certain ethical implications of these new information technologies emerge: Coupled with the predicted safety benefits of VSC applications is a potential rise in the ability to surveil a driver engaging in her everyday activities on the public roads. This paper will explore how the introduction of VSC technologies might disrupt the “contextual integrity” of personal information flows in the context of highway travel and threaten one’s “privacy in public.” Since VSC technologies and their related protocols and standards are still in the developmental stage, the paper will conclude by revealing how close attention to the ethical implications of the remaining design decisions can inform and guide designers of VSC technologies to create innovate safety applications that increase public safety, but without compromising the value of one’s privacy in public. This work was supported by the National Science Foundation PORTIA Grant No. CNS-0331542, and could not have been completed without the valuable guidance of Prof. Helen Nissenbaum (New York University) and Prof. Dan Boneh (Stanford University). I am grateful to many other colleagues who generously contributed to this work with excellent comments and suggestions, including Emily Clark and Steve Tengler at the VSCC, and Sam Howard-Spink, Joseph Reagle and Tim Weber at New York University. Drafts were further sharpened through opportunities to present at colloquia and conferences sponsored by New York University’s Department of Culture & Communication, the American Association for the Advancement of Science, the Society for Philosophy and Technology, and Computer Ethics: Philosophical Enquiry.  相似文献   
36.
Radio Frequency Identification (RFID) systems identify and track objects, animals and, in principle, people. The ability to gather information obtained by tracking consumer goods, government documents, monetary transactions and human beings raises a number of interesting and important privacy issues. Moreover, RFID systems pose an ensemble of other ethical challenges related to appropriate uses and users of such systems. This paper reviews a number of RFID applications with the intention of identifying the technology’s benefits and possible misuses. We offer an overview and discussion of the most important ethical issues concerning RFID, and describes and examine some methods of protecting privacy. Norman G. Einspruch serves as a consultant to several high-technology companies, one of which is in the RFID components and systems business.  相似文献   
37.
中国、日本、美国的图书馆均对读者隐私权进行了保护,但在保护的程度和方法上差异明显。中国图书馆有必要在学习日本、美国先进管理经验的基础上,根据本国实际情况,依据宪法和法律制定出完善的行业管理规则,建立恰当的服务体系,充分培育隐私权保护意识,让读者隐私权的保护能够真正得以实现。参考文献7。  相似文献   
38.
在当前的数字参考咨询服务中,用户隐私权的保护El益得到重视。在概括隐私权内涵及其特点的基础上,对数字参考咨询服务中涉及用户隐私的几个方面进行了分析,探讨了加强用户隐私权保护的相应对策。  相似文献   
39.
马振萍 《现代情报》2011,31(1):24-28
由于在社会网络应用程序站点上自愿添加个人身份信息的人数不断增加,站点服务商可以从中获益,但是同时数据误用的风险会威胁个人用户的隐私信息以及服务商的商业模式。本文根据最近的调查,分析了开发隐私保护社会网络应用的主要需求,在此基础上提出了隐私风险模式,以增强数据或社会网络迁移过程中的信息隐私保护。通过确定与个人身份信息迁移过程中重要的问题设计出了该隐私风险模式。  相似文献   
40.
新闻自由与隐私权保护的法律思考   总被引:1,自引:0,他引:1  
刘慧 《科教文汇》2011,(11):203-204
随着公民法律意识的提高,状告媒介侵犯隐私权的案例越来越多,本文分析了新闻报道中侵犯隐私权的行为以及与新闻报道的关系,提出预防新闻侵权的具体办法。  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号