首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   5123篇
  免费   93篇
  国内免费   163篇
教育   2387篇
科学研究   1181篇
各国文化   3篇
体育   90篇
综合类   137篇
文化理论   9篇
信息传播   1572篇
  2023年   13篇
  2022年   60篇
  2021年   138篇
  2020年   252篇
  2019年   188篇
  2018年   82篇
  2017年   84篇
  2016年   114篇
  2015年   130篇
  2014年   229篇
  2013年   553篇
  2012年   260篇
  2011年   285篇
  2010年   172篇
  2009年   190篇
  2008年   213篇
  2007年   255篇
  2006年   297篇
  2005年   246篇
  2004年   256篇
  2003年   313篇
  2002年   347篇
  2001年   299篇
  2000年   226篇
  1999年   100篇
  1998年   39篇
  1997年   24篇
  1996年   6篇
  1995年   3篇
  1993年   2篇
  1992年   2篇
  1977年   1篇
排序方式: 共有5379条查询结果,搜索用时 15 毫秒
41.
朱启坤 《情报杂志》2002,21(1):74-75
分析了利用防火墙将Internet接入Intranet模式的局限性及其存在的问题,提出了将Intranet中资源的安全要求深入细化的思想,即把资源分成不同级别,在各个级别中规定每种资源的访问权限,给出了相应的模型和实现方式。  相似文献   
42.
Information technology in the form of the Internet and its commercial offspring (referred to in this article collectively as the Net) has received much attention as a vehicle to increase political participation. In this article, we explore the potential of the Net, a vast, loosely coupled system of electronic forums, for facilitating and hindering democratic participation. In so doing, we identify five assumptions that undergird the claim that the Net will enhance democratic participation and suggest that increased democratic participation rests on three fundamental characteristics: access, voice, and dialogue. In order for this network of electronic forums to facilitate democratic participation, educational, economic, and cultural barriers to access, voice, and dialogue must be overcome. The final part of this article raises additional challenges to realizing democracy via the Net.  相似文献   
43.
本文概括了青海气象网站信息数据库的设计目标及主要开发思路,介绍了网站数据库的关键技术及主要功能。  相似文献   
44.
走近中国自己的“数字图书馆”   总被引:1,自引:0,他引:1  
王纯 《情报科学》2002,20(5):467-470
什么是数字图书馆?不少读者甚至包括个别馆员由于缺乏对基本知识的了解,显得有些茫然。为此,图书馆有责任和义务向读者普及数学图书馆知识,引导读者近数字图书馆。  相似文献   
45.
美国和欧盟的数据隐私保护策略   总被引:2,自引:0,他引:2  
孙美丽 《情报科学》2004,22(10):1265-1267
Internet用户对数据隐私问题日益关注,对隐私的担忧是用户使用的主要障碍。有效的数据隐私保护对Internet产业的发展极为重要。本文对美国和欧盟的数据隐私保护策略进行了介绍,以期对我国的数据隐私保护起借鉴作用。  相似文献   
46.
Communication researchers and social scientists are quickly discovering the value of data that exists in the postings of members of Internet e-mail, Usenet, and real-time groups. The ability to communicate with one's peers, no matter how esoteric the interests, is causing an explosion in the number of new virtual communities. The interpersonal dynamics of these groups are increasingly coming under the scrutiny of academic research. The publicly available archived records of Internet virtual communities are being analyzed for a wide variety of research interests. The ability to do naturalistic observations of group dynamics, as they are exhibited in these exchanges of text, has captured the attention of many researchers. The institutional review boards of major universities are granting researchers exempt or expedited (exempt from full review) status for this work, due to the public nature of the notes being analyzed. These studies often involve the lack of informed consent, where the group members under study are unaware they are being monitored. There is a potential for psychological harm to the members of these groups, depending on the way results are reported. This article explores the ethical considerations that must be taken into account to protect cyberspace participants. The guidelines proposed are based on the American Psychological Association ethical guidelines for use of human subjects in research. An explanation is offered as to how such guidelines can best be applied to the study of Internet communities. The constructs of Group Accessibility (the public/private nature of the actual cyberspace occupied by a group) and Perceived Privacy (the level of privacy that group members assume they have) are defined and proposed as two dimensions by which individual Internet communities may be evaluated in order to assure the ethical reporting of research findings.  相似文献   
47.
互联网上5个免费中国专利数据库的比较研究   总被引:2,自引:0,他引:2  
蔡莉静  张魁军  姚新茹  曹丽娜 《情报科学》2003,21(7):773-775,784
本文对5个常用的免费中国专利数据库进行了比较,并结合检索实例指出了它们的异同,以便为读者正确选择和使用中国专利数据库提供参考.  相似文献   
48.
胡莹 《情报杂志》2003,22(4):107-107,106
论述了Internet环境下高校图书馆的信息服务特点以及提高高校图书馆信息服务水平的方法。  相似文献   
49.
The need for those working in a variety of settings to interact effectively with technical experts has grown dramatically in recent years as computers have become essential to the performance of an increasing broad range of professional work. This article presents a case of this sort of interprofessional interaction, exploring the process and outcomes of collaboration between technical professionals and educators working to bring Internet access to an urban public school district. Drawing on field note and interview data, the case reported here illustrates how differences in institutional routines and professional values can generate differing agendas, contrasting assumptions, and contrasting expectations concerning project products and outcomes among collaborators from different professional worlds. In the case we describe, these differences affected such central matters as the types and usefulness of technical resources to which users had access as well as users' confidence in the technology. The case also illustrates how aspects of this interprofessional conflict were addressed through an organizational change. The kinds of issues that arose in this project are likely to occur in a variety of professional settings; therefore, examination of this case provides insight into a variety of issues and dynamics that should be considered when embarking upon or analyzing any interprofessional collaborative effort, and particularly one that involves technical professionals.  相似文献   
50.
校园网安全问题分析与对策   总被引:5,自引:0,他引:5  
本文首先分析了互联网安全问题的根本原因,接着介绍了校园网安全管理的特点和常见的威胁,然后介绍了当前CERNET安全管理的几项措施,提出了加强校园网安全管理的几项建议,最后介绍了以IPv6为核心的下一代互联网对网络安全的影响。  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号