全文获取类型
收费全文 | 656篇 |
免费 | 7篇 |
国内免费 | 6篇 |
专业分类
教育 | 291篇 |
科学研究 | 209篇 |
各国文化 | 1篇 |
体育 | 5篇 |
综合类 | 19篇 |
文化理论 | 2篇 |
信息传播 | 142篇 |
出版年
2023年 | 11篇 |
2022年 | 14篇 |
2021年 | 29篇 |
2020年 | 21篇 |
2019年 | 24篇 |
2018年 | 23篇 |
2017年 | 17篇 |
2016年 | 19篇 |
2015年 | 25篇 |
2014年 | 35篇 |
2013年 | 58篇 |
2012年 | 36篇 |
2011年 | 32篇 |
2010年 | 40篇 |
2009年 | 32篇 |
2008年 | 38篇 |
2007年 | 64篇 |
2006年 | 39篇 |
2005年 | 44篇 |
2004年 | 27篇 |
2003年 | 13篇 |
2002年 | 8篇 |
2001年 | 13篇 |
2000年 | 5篇 |
1992年 | 2篇 |
排序方式: 共有669条查询结果,搜索用时 343 毫秒
1.
大数据时代个人信息保护研究综述 总被引:1,自引:1,他引:0
[目的/意义]通过梳理大数据时代个人信息保护的研究文献,为未来研究个人信息保护提供借鉴。[方法/过程]利用CNKI数据库,系统收集关于大数据时代个人信息保护的国内核心期刊论文,对文献的内容进行分析,归纳研究主题,并进行论述。[结果/结论]将现有的研究成果按主题分为5类:国内外实践经验研究、基本理论问题研究、个人信息保护机制探索、个人信息安全风险与应对、相关法律法规研究,评述现有研究的不足之处并对未来的研究方向提出展望。 相似文献
2.
随着Web挖掘应用的日益广泛,隐私权保护研究不断增添新问题和新内容.本文分析了Web挖掘中客户隐私权被侵害的主要方式,并从政府、客户以及网络行业三个角度提出了Web挖掘中客户隐私权保护的策略. 相似文献
3.
简述网络个性化信息服务中泄露个人隐私的主要途径以及隐私保护的必要性;针对我国在网络隐私保护方面发展的现状,通过对国内外网络隐私保护的相关法律政策及方法手段的对比分析,深入探讨个性化信息服务中的隐私保护问题,提出相关解决对策。 相似文献
4.
网络隐私的安全防护策略研究 总被引:5,自引:0,他引:5
孟晓明 《现代图书情报技术》2005,21(4):92-95
通过对网络隐私的概念、产生原因、保护范围和安全现状的分析,从技术与应用的角度对网络隐私的安全问题进行了探讨,给出了一些安全防护策略。 相似文献
5.
This research examines privacy law and Human Flesh Search (HFS) on the Chinese Internet. HFS is spontaneous, widely participated search and publication of targeted individuals’ personal information on the Internet. This research sees HFS as an important form of non-institutional information gathering and publication, and argues that the regulation of HFS is not only about privacy but also line-drawing for information collection and dissemination in the digital setting. Therefore, legal instruments and court cases in relation to HFS and online privacy must be assessed as important components of the Chinese state’s Internet regulatory scheme. This research finds that the paired concepts of ‘flexibility and populism,’ key features of legal reform and development in contemporary China, are highly relevant to analyze the growth of digital privacy laws in China. The political-legal authorities’ experimentation and innovation in the development of the law shed important light on how China’s Internet governance adapts to changing circumstances and strives to keep pace with profound social transformations in new technological environments. 相似文献
6.
7.
This paper describes some of the challenges which the growing pervasiveness of computers and electronic communications technology present to liberal democracies. We argue that these technologies, by their influence on the mechanisms of publicity and privacy, make possible the abuse of an under-developed popular epistemology. The confused response of the courts to cases of information crime suggests that the university is a better forum in which to meet and master these challenges.Freedom is not a simple experience. And as technology becomes more sophisticated, living in freedom—which means living with constant, changing choice—will only become more complex. 相似文献
8.
These years have witnessed the rapid growing of internet,and we are stepping into a new age-Internet Age.But the privacy on human rights that followed has become the hot issue.This essay tries to expose the privacy focusing on the human rights under the internet age.It illuminates the right of privacy in internet age through the origin of privacy.By the comparison of traditional understanding of privacy and expedition of privacy under internet age,the essay concludes that the right of privacy will be transmitted by internet and will influence the development of internet as well. 相似文献
9.
New Jersey v.T.L.O案是美国公立中小学校搜查学生的经典判例。该判例赋予了公立中小学校搜查学生的权力。只要在"合理怀疑"的基础上,学校就可以对学生进行符合"比例"原则的"无证"搜查。基于学生对所使用的学校设备与财产、私人物品、人身具有不同程度的合理的隐私期待,学校对这三类对象拥有不同范围、不同程度的搜查权。 相似文献
10.
Chantal Mutimukwe Olga Viberg Lena-Maria Oberg Teresa Cerratto-Pargman 《British journal of educational technology : journal of the Council for Educational Technology》2022,53(4):932-951
Understanding students' privacy concerns is an essential first step toward effective privacy-enhancing practices in learning analytics (LA). In this study, we develop and validate a model to explore the students' privacy concerns (SPICE) regarding LA practice in higher education. The SPICE model considers privacy concerns as a central construct between two antecedents—perceived privacy risk and perceived privacy control, and two outcomes—trusting beliefs and non-self-disclosure behaviours. To validate the model, data through an online survey were collected, and 132 students from three Swedish universities participated in the study. Partial least square results show that the model accounts for high variance in privacy concerns, trusting beliefs, and non-self-disclosure behaviours. They also illustrate that students' perceived privacy risk is a firm predictor of their privacy concerns. The students' privacy concerns and perceived privacy risk were found to affect their non-self-disclosure behaviours. Finally, the results show that the students' perceptions of privacy control and privacy risks determine their trusting beliefs. The study results contribute to understand the relationships between students' privacy concerns, trust and non-self-disclosure behaviours in the LA context. A set of relevant implications for LA systems' design and privacy-enhancing practices' development in higher education is offered.
Practitioner notes
What is already known about this topic- Addressing students' privacy is critical for large-scale learning analytics (LA) implementation.
- Understanding students' privacy concerns is an essential first step to developing effective privacy-enhancing practices in LA.
- Several conceptual, not empirically validated frameworks focus on ethics and privacy in LA.
- The paper offers a validated model to explore the nature of students' privacy concerns in LA in higher education.
- It provides an enhanced theoretical understanding of the relationship between privacy concerns, trust and self-disclosure behaviour in the LA context of higher education.
- It offers a set of relevant implications for LA researchers and practitioners.
- Students' perceptions of privacy risks and privacy control are antecedents of students' privacy concerns, trust in the higher education institution and the willingness to share personal information.
- Enhancing students' perceptions of privacy control and reducing perceptions of privacy risks are essential for LA adoption and success.
- Contextual factors that may influence students' privacy concerns should be considered.