首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   320篇
  免费   4篇
  国内免费   15篇
教育   168篇
科学研究   81篇
体育   12篇
综合类   7篇
文化理论   2篇
信息传播   69篇
  2023年   30篇
  2022年   20篇
  2021年   21篇
  2020年   53篇
  2019年   30篇
  2018年   26篇
  2017年   20篇
  2016年   13篇
  2015年   7篇
  2014年   15篇
  2013年   33篇
  2012年   7篇
  2011年   5篇
  2010年   6篇
  2009年   8篇
  2008年   2篇
  2007年   5篇
  2006年   7篇
  2005年   5篇
  2004年   2篇
  2003年   4篇
  2002年   6篇
  2001年   5篇
  2000年   3篇
  1999年   1篇
  1998年   2篇
  1993年   1篇
  1991年   1篇
  1986年   1篇
排序方式: 共有339条查询结果,搜索用时 15 毫秒
1.
摘要:为了探讨太极拳本真的文化内涵,主要采用文献资料法等研究方法,运用哲学、宗教学、体育学等理论,从修炼文化视角,分析太极拳思想、技术秉承《道德经》《道藏》等道家、道教文化精髓,探讨太极拳与道的辩证关系。研究认为:道家的“阴阳”“八卦”与“五行”演化太极拳的世界图式;太极拳承袭道家、道教的“身体观”“内景观”的内求文化导向;道家、道教命功的根劲、养炁、洗髓、蓄神构成太极拳的功夫机理;与道之本体的合和向度,决定太极拳修为之高低;道家的“道化德生”造就太极拳性功的客观效应;太极拳的终极价值是以武入道、拳道合一。对挖掘、还原太极拳文化的原初属性,传承并发扬光大有一定的参考价值。  相似文献   
2.
Collaboration usually has a positive effect on researchers’ productivity: researchers have become increasingly collaborative, according to recent studies. Numerous studies have focused on enhancing research collaboration by recommendation technology and measuring the influence of researchers. However, few studies have investigated the effect of collaboration on the position of a researcher in the research social network. In this paper, we explore the relationships between collaboration and influence by social analytical methods, which are pertinent to analyzing the network structure and individual traits. We evaluate three aspects of the researchers’ influence: friendship paradox validation, social circle, and structure of a researcher's ego network. Furthermore, the ”six degrees of Bacon number” theory, generalized friendship paradox, and triadic closure theory are introduced to support our analysis. Experimental results show that collaboration can help researchers increase their influence to some extent.  相似文献   
3.
4.
5.
Understanding students' privacy concerns is an essential first step toward effective privacy-enhancing practices in learning analytics (LA). In this study, we develop and validate a model to explore the students' privacy concerns (SPICE) regarding LA practice in higher education. The SPICE model considers privacy concerns as a central construct between two antecedents—perceived privacy risk and perceived privacy control, and two outcomes—trusting beliefs and non-self-disclosure behaviours. To validate the model, data through an online survey were collected, and 132 students from three Swedish universities participated in the study. Partial least square results show that the model accounts for high variance in privacy concerns, trusting beliefs, and non-self-disclosure behaviours. They also illustrate that students' perceived privacy risk is a firm predictor of their privacy concerns. The students' privacy concerns and perceived privacy risk were found to affect their non-self-disclosure behaviours. Finally, the results show that the students' perceptions of privacy control and privacy risks determine their trusting beliefs. The study results contribute to understand the relationships between students' privacy concerns, trust and non-self-disclosure behaviours in the LA context. A set of relevant implications for LA systems' design and privacy-enhancing practices' development in higher education is offered.

Practitioner notes

What is already known about this topic
  • Addressing students' privacy is critical for large-scale learning analytics (LA) implementation.
  • Understanding students' privacy concerns is an essential first step to developing effective privacy-enhancing practices in LA.
  • Several conceptual, not empirically validated frameworks focus on ethics and privacy in LA.
What this paper adds
  • The paper offers a validated model to explore the nature of students' privacy concerns in LA in higher education.
  • It provides an enhanced theoretical understanding of the relationship between privacy concerns, trust and self-disclosure behaviour in the LA context of higher education.
  • It offers a set of relevant implications for LA researchers and practitioners.
Implications for practice and/or policy
  • Students' perceptions of privacy risks and privacy control are antecedents of students' privacy concerns, trust in the higher education institution and the willingness to share personal information.
  • Enhancing students' perceptions of privacy control and reducing perceptions of privacy risks are essential for LA adoption and success.
  • Contextual factors that may influence students' privacy concerns should be considered.
  相似文献   
6.
Rapid changes in digital consumer behaviour, influenced by exponential adoption of smartphones, require timely and sophisticated responses from retailers to these consumer needs. With a growing amount of big data available, fashion retailers need to innovate and develop more sophisticated analytics for new consumer behaviours such as m-commerce. This research has considered how Google Analytics data can be applied to develop customer journey maps to understand digital consumer behaviour. A multi-method research design was used, incorporating an innovative mobile eye tracking technology and mobile fashion consumer data from Google Analytics. Digital customers’ shopping journeys on the fashion retailer’s website were mapped using data sourced from eye tracking and Google Analytics, gathered in parallel. The comparison of these shopping journeys allowed a critical evaluation of the precision and usefulness of the Google Analytics database. Google Analytics tracked only half of the digital users’ activities, whereas eye tracking data documented digital consumers’ interaction with all elements of the fashion retailer’s website. The conclusion reached is that eye tracking can be used to audit the Google Analytics database for potential gaps in data and also to inform and improve marketing decision-making.  相似文献   
7.
Information management is the management of organizational processes, technologies, and people which collectively create, acquire, integrate, organize, process, store, disseminate, access, and dispose of the information. Information management is a vast, multi-disciplinary domain that syndicates various subdomains and perfectly intermingles with other domains. This study aims to provide a comprehensive overview of the information management domain from 1970 to 2019. Drawing upon the methodology from statistical text analysis research, this study summarizes the evolution of knowledge in this domain by examining the publication trends as per authors, institutions, countries, etc. Further, this study proposes a probabilistic generative model based on structural topic modeling to understand and extract the latent themes from the research articles related to information management. Furthermore, this study graphically visualizes the variations in the topic prevalences over the period of 1970 to 2019. The results highlight that the most common themes are data management, knowledge management, environmental management, project management, service management, and mobile and web management. The findings also identify themes such as knowledge management, environmental management, project management, and social communication as academic hotspots for future research.  相似文献   
8.
Emerging paradigms of attack challenge enterprise cybersecurity with sophisticated custom-built tools, unpredictable patterns of exploitation, and an increasing ability to adapt to cyber defenses. As a result, organizations continue to experience incidents and suffer losses. The responsibility to respond to cybersecurity incidents lies with the incident response (IR) function. We argue that (1) organizations must develop ‘agility’ in their IR process to respond swiftly and efficiently to sophisticated and potent cyber threats, and (2) Real-time analytics (RTA) gives organizations a unique opportunity to drive their IR process in an agile manner by detecting cybersecurity incidents quickly and responding to them proactively. To better understand how organizations can use RTA to enable IR agility, we analyzed in-depth data from twenty expert interviews using a contingent resource-based view. The results informed a framework explaining how organizations enable agile characteristics (swiftness, flexibility, and innovation) in the IR process using the key features of the RTA capability (complex event processing, decision automation, and on-demand and continuous data analysis) to detect and respond to cybersecurity incidents as-they-occur which, in turn, improves their overall enterprise cybersecurity performance.  相似文献   
9.
Interactivity, which is a key characteristic of the live streaming commerce environment, fosters users’ active attitudes and behaviors in communications and transactions. However, the literature on live streaming commerce, is scarce, and few studies examine how interactivity influences customers’ non-transactional behaviors from a dynamic perspective. In this setting, based on the stimulus-organism-response (S-O-R) framework, we developed a research model using real-time data to investigate the dynamic effect of interactivity on customer engagement behavior through tie strength in live streaming commerce, which is a relatively new derivative of social commerce. This study developed a text mining method to quantify constructs using a large-scale sample of 3,500,445 online review texts. Our empirical study found that interactivity has a curvilinear relationship with customer engagement behavior. Besides, tie strength plays an intermediary role between interactivity and customer engagement behavior. It was further observed that both tenure of membership and popularity have an important moderating relationship between interactivity and tie strength. The study enriches the relationship marketing theory and live streaming commerce literature. Moreover, this study is one of the first studies to use real-time online data for live streaming commerce research.  相似文献   
10.
The aim of this study is to propose an automatic and real-time social media analytics framework with interactive data visualizations to support effective exploration of knowledge about adverse drug reaction (ADR) surveillance. This proposed framework has been prototypically implemented on the basis of social media data. A longitudinal diabetes patient online community data (AskaPatient.com) as well as FDA Adverse Event Reporting Systems (FAERS) data as a benchmark were used to evaluate our proposed approach’s performance. Based on the results, our approach significantly increases the precision and accuracy for ADR extraction. The number of ADR cases, the time when the ADRs occurred, and the rating of Glucophage have been visualized that resulted by mining a collection of 870 ADRs posted in Askapatents.com over a certain time period (from 2001 to 2015). The results have important implications for pharmaceutical companies and hospitals wishing to monitor ADRs of medicines.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号