全文获取类型
收费全文 | 703篇 |
免费 | 8篇 |
国内免费 | 7篇 |
专业分类
教育 | 313篇 |
科学研究 | 216篇 |
各国文化 | 2篇 |
体育 | 5篇 |
综合类 | 19篇 |
文化理论 | 2篇 |
信息传播 | 161篇 |
出版年
2023年 | 13篇 |
2022年 | 14篇 |
2021年 | 30篇 |
2020年 | 21篇 |
2019年 | 25篇 |
2018年 | 25篇 |
2017年 | 19篇 |
2016年 | 23篇 |
2015年 | 27篇 |
2014年 | 38篇 |
2013年 | 73篇 |
2012年 | 39篇 |
2011年 | 34篇 |
2010年 | 40篇 |
2009年 | 34篇 |
2008年 | 39篇 |
2007年 | 65篇 |
2006年 | 40篇 |
2005年 | 46篇 |
2004年 | 28篇 |
2003年 | 13篇 |
2002年 | 10篇 |
2001年 | 15篇 |
2000年 | 5篇 |
1992年 | 2篇 |
排序方式: 共有718条查询结果,搜索用时 15 毫秒
1.
大数据时代个人信息保护研究综述 总被引:1,自引:1,他引:0
[目的/意义]通过梳理大数据时代个人信息保护的研究文献,为未来研究个人信息保护提供借鉴。[方法/过程]利用CNKI数据库,系统收集关于大数据时代个人信息保护的国内核心期刊论文,对文献的内容进行分析,归纳研究主题,并进行论述。[结果/结论]将现有的研究成果按主题分为5类:国内外实践经验研究、基本理论问题研究、个人信息保护机制探索、个人信息安全风险与应对、相关法律法规研究,评述现有研究的不足之处并对未来的研究方向提出展望。 相似文献
2.
The implementation of digital contact tracing applications around the world to help reduce the spread of the COVID-19 pandemic represents one of the most ambitious uses of massive-scale citizen data ever attempted. There is major divergence among nations, however, between a “privacy-first” approach which protects citizens’ data at the cost of extremely limited access for public health authorities and researchers, and a “data-first” approach which stores large amounts of data which, while of immeasurable value to epidemiologists and other researchers, may significantly intrude upon citizens’ privacy. The lack of a consensus on privacy protection in the contact tracing process creates risks of non-compliance or deliberate obfuscation from citizens who fear revealing private aspects of their lives – a factor greatly exacerbated by recent major scandals over online privacy and the illicit use of citizens’ digital information, which have heightened public consciousness of these issues and created significant new challenges for any collection of large-scale public data. While digital contact tracing for COVID-19 remains in its infancy, the lack of consensus around best practices for its implementation and for reassuring citizens of the protection of their privacy may already have impeded its capacity to contribute to the pandemic response. 相似文献
3.
In recent years, strategies focused on data-driven innovation (DDI) have led to the emergence and development of new products and business models in the digital market. However, these advances have given rise to the development of sophisticated strategies for data management, predicting user behavior, or analyzing their actions. Accordingly, the large-scale analysis of user-generated data (UGD) has led to the emergence of user privacy concerns about how companies manage user data. Although there are some studies on data security, privacy protection, and data-driven strategies, a systematic review on the subject that would focus on both UGD and DDI as main concepts is lacking. Therefore, the present study aims to provide a comprehensive understanding of the main challenges related to user privacy that affect DDI. The methodology used in the present study unfolds in the following three phases; (i) a systematic literature review (SLR); (ii) in-depth interviews framed in the perspectives of UGD and DDI on user privacy concerns, and finally, (iii) topic-modeling using a Latent Dirichlet allocation (LDA) model to extract insights related to the object of study. Based on the results, we identify 14 topics related to the study of DDI and UGD strategies. In addition, 14 future research questions and 7 research propositions are presented that should be consider for the study of UGD, DDI and user privacy in digital markets. The paper concludes with an important discussion regarding the role of user privacy in DDI in digital markets. 相似文献
4.
王玉玲 《四川职业技术学院学报》2021,(2):78-85
我国儿童隐私数据保护观念实际较为欠缺,儿童隐私数据保护的法律规范存在不足,过于注重对数据的控制,对不同领域内儿童隐私数据收集、管理、使用等缺乏一种更为灵活和专业的规范模式。对此,需要重视儿童隐私数据保护观念的网络形成途径,并对儿童隐私数据的法律保障进行针对性研究的展开;同时,在规范偏重上实现由“控制”转变为“智慧监管”的保障方式,并细化行业协会规范,以“避风港”等制度的设立达到规范的“专业化”实现路径,从而使得儿童隐私数据的保护更具灵活和专业性。 相似文献
5.
移动设备的普及为基于位置的服务应用带来新的发展机遇,但在使用LBS时造成的轨迹隐私泄露问题成为LBS普及的隐患。轨迹泛化法是一种轨迹隐私保护技术,在保护轨迹隐私的同时还可提高服务质量。基于组的轨迹隐私保护技术特点,对不考虑移动趋势的轨迹泛化法进行分析,总结基于移动趋势的轨迹隐私保护方法并对未来研究方向进行展望。 相似文献
6.
The concept of privacy as a basic human right which has to be protected by law is a recently adopted concept in Thailand,
as the protection of human rights was only legally recognized by the National Human Rights Act in 1999. Moreover, along with
other drafted legislation on computer crime, the law on privacy protection has not yet been enacted. The political reform
and the influences of globalization have speeded up the process of westernization of the urban, educated middle-class professionals.
However, the strength of traditional Thai culture means that a mass awareness of the concept of privacy rights remains scarce.
This paper explicates the Thai cultural perspective on privacy and discusses the influence of Buddhism on privacy rights,
including the impacts of globalization and the influence of Western values on the country’s political and legal developments.
The paper also discusses the legal provisions regarding privacy protection, and the debates on the smart ID cards policy and
SIM cards registration for national security. 相似文献
7.
实质损害原则——美国信息隐私保护利益平衡原则 总被引:2,自引:0,他引:2
欧盟平衡个人信息隐私权和公共利益的原则是充分利益原则,只有在证明公共利益是充分必要时,才能适当减损个人信息隐私权;美国则更为重视信息自由流动的价值意义,在平衡个人信息隐私权与公共利益的冲突时,采取实质损害原则,保护个人信息隐私免于披露必须证明披露信息对个人造成实质损害或实质损害的威胁。本文在分析我国建设征信体系时所处的背景及所面临的主要矛盾后,建议借鉴美国信息隐私保护的利益平衡观,在个人信用信息的采集和利用方面,采取“宽进严出”的方式。 相似文献
8.
美国和欧盟的数据隐私保护策略 总被引:2,自引:0,他引:2
Internet用户对数据隐私问题日益关注,对隐私的担忧是用户使用的主要障碍。有效的数据隐私保护对Internet产业的发展极为重要。本文对美国和欧盟的数据隐私保护策略进行了介绍,以期对我国的数据隐私保护起借鉴作用。 相似文献
9.
Recently, there has been a heavy debate in the US about the government’s use of data mining in its fight against terrorism.
Privacy concerns in fact led the Congress to terminate the funding of TIA, a program for advanced information technology to
be used in the combat of terrorism. The arguments put forward in this debate, more specifically those found in the main report
and minority report by the TAPAC established by the Secretary of Defense to examine the TIA issue, will be analysed to trace
the deeper roots of this controversy. This analysis will in turn be used as a test case to examine the adequacy of the usual
theoretical frameworks for these kinds of issues, in particular the notion of privacy. Whereas the dominant theoretical framing
of the notion of privacy turns around access to information, most of the core arguments in the debate do not fit in this kind of framework. The basic disagreements in
the controversy are not about mere access, they involve both access and use. Furthermore, whereas the issue of access by itself refers to a more or less static situation, the real disagreements much
more concern the organisational dynamics of the use of information, the mechanisms in the organisation that control these
dynamics, and the awareness present within the organisation of the ‘social risks’ these dynamics represent. The bottom line
question is whether the assessment of these gives sufficient reason for trust. 相似文献
10.
Dara J. Glasser Kenneth W. Goodman Norman G. Einspruch 《Ethics and Information Technology》2007,9(2):101-109
Radio Frequency Identification (RFID) systems identify and track objects, animals and, in principle, people. The ability to
gather information obtained by tracking consumer goods, government documents, monetary transactions and human beings raises
a number of interesting and important privacy issues. Moreover, RFID systems pose an ensemble of other ethical challenges
related to appropriate uses and users of such systems. This paper reviews a number of RFID applications with the intention
of identifying the technology’s benefits and possible misuses. We offer an overview and discussion of the most important ethical
issues concerning RFID, and describes and examine some methods of protecting privacy.
Norman G. Einspruch serves as a consultant to several high-technology companies, one of which is in the RFID components and
systems business. 相似文献