首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   344篇
  免费   11篇
  国内免费   30篇
管理学   6篇
民族学   1篇
人口学   6篇
丛书文集   49篇
理论方法论   12篇
综合类   227篇
社会学   68篇
统计学   16篇
  2023年   4篇
  2022年   7篇
  2021年   10篇
  2020年   15篇
  2019年   12篇
  2018年   23篇
  2017年   17篇
  2016年   13篇
  2015年   17篇
  2014年   17篇
  2013年   26篇
  2012年   11篇
  2011年   29篇
  2010年   16篇
  2009年   22篇
  2008年   15篇
  2007年   24篇
  2006年   28篇
  2005年   21篇
  2004年   12篇
  2003年   20篇
  2002年   12篇
  2001年   8篇
  2000年   2篇
  1997年   1篇
  1996年   1篇
  1992年   1篇
  1977年   1篇
排序方式: 共有385条查询结果,搜索用时 250 毫秒
191.
Through constitutional amendments and case law, the United States citizens receive privacy protections. These same protections do not exist for individuals incarcerated in prisons and jails. Instead, their privacy rights are regularly replaced by larger institutional concerns for security, safety, and control. Such privacy violation measures may include electronic surveillance, recording of phone calls, opening/reading of mail, and searches of their person, cell, and property. Although it is expected that incarcerated individuals have fewer privacy rights than nonincarcerated citizens, some privacy violations may be perceived as procedurally unjust due to their severity and infringement upon incarcerated individuals' rights to dignity and respect. This has implications for the well-being of incarcerated individuals, the legitimacy of correctional officers, and as a result, the potential safety and security of institutions.  相似文献   
192.
In the 36 years since the 1973 publication of ' Beyond the Best Interests of the Child ' by Goldstein, Freud and Solnit, the phase 'the best interests of the child' has achieved biblical standing and is now embedded in childcare and protection legislation worldwide. It also resonates through clinical reports and other materials that form the basis for proceedings in Children's Courts and in Family Law Courts. Such is the power of the phrase that it is to be found in Article 18 of the Convention on the Rights of Children that was adopted by the United Nations in September 1989. In 1996, Goldstein, Solnit and Goldstein, with Freud, indicated a preference for the phrase 'least detrimental alternative' rather than 'the best interests of the child'. For this reason, and because the world in 2009 is a far different place from that which existed 36 years ago, we think it is time to re-examine this classic phrase both in terms of its underlying thesis and how it is used in present-day childcare and protection proceedings and practice.  相似文献   
193.
Moving from the scrambling mechanism recently suggested by Saha [25 Saha, A. 2007. A simple randomized response technique in complex surveys. Metron, LXV: 5966.  [Google Scholar]], three scrambled randomized response (SRR) models are introduced with the intent to realize a right trade-off between efficiency and privacy protection. The models perturb the true response on the sensitive variable by resorting to the multiplicative and additive approaches in different ways. Some analytical and numerical comparisons of efficiency are performed to set up the conditions under which improvements upon Saha's model can be obtained and to quantify the efficiency gain. The use of auxiliary information is also discussed in a class of estimators for the sensitive mean under a generic randomization scheme. The class includes also the three proposed SRR models. Finally, some graphical comparisons are carried out from the double perspective of the accuracy in the estimates and respondents’ privacy protection.  相似文献   
194.
In this paper we propose a modified version of the estimator of Hansen and Hurwitz [12] in the case of quantitative sensitive variable and consider a randomization mechanism on the second call that provides privacy protection to the respondents to get truthful information. We use variance of the modified estimator as a tool to measure privacy protection and it is observed that the higher is the variance, the lower is the efficiency but the higher is the privacy protection. To overcome this efficiency loss, we consider a linear regression estimator using known non-sensitive auxiliary information. With consideration of four scrambled models, we try to make a trade-off between efficiency and privacy protection. To show this compromise, analytical and numerical comparisons are obtained.  相似文献   
195.
Abstract

This article focuses on reducing the additional variance due to randomization of the responses. The idea of additive scrambling and its inverse has been used along with (i) split sample approach and (ii) double response approach. Specifically, our proposal is based on Gupta et al. (2006) randomized response model. We selected this model for improvement because it provides estimator of mean and sensitivity level of a sensitive variable and is better than all of its competitors proposed earlier to it and even Gupta et al. (2006) sensitivity estimator is better than that of Gupta et al. (2010). Our suggested estimators are unbiased estimators and perform better than Gupta et al. (2006) estimator. The issue of privacy protection is also discussed.  相似文献   
196.
论隐私权在刑事诉讼领域的诉求   总被引:3,自引:0,他引:3  
刑事诉讼保障犯罪嫌疑人的基本人权,隐私权是其应有之义。隐私权在刑事诉讼领域的诉求体现在:是否属于强制措施的认定标准从"物理入侵说"转变为"隐私权保护说";侦查措施中的"合理的隐私期待";为保护隐私权在侦查程序中采取相应的技术性规范;被害人的隐私权保护以及刑罚执行过程中的隐私权保护等。  相似文献   
197.
Much of the discussion regarding privacy and social media has focused on consumers of social media, but social media is also popular among businesses. This article explores the privacy tensions of small business owners using social media to disseminate and gather information to better engage and serve their customers while maintaining customer trust. Drawing on Communication Privacy Management theory [Petronio, S. (2002). Boundaries of privacy: Dialectics of disclosure. Albany, NY: SUNY Press, Petronio, S. (2007). Translational research endeavors and the practices of communication privacy management. Journal of Applied Communication Research, 35(3), 218–222], we argue that there is a dialectical tension between control and engagement. As information is disclosed via social media, it creates new opportunities for engagement, surveillance, and commodification. Based on group interviews with small business owners, we identify the kinds of information that small businesses must manage as participants on social media platforms and the privacy rules they develop.  相似文献   
198.
搜索引擎作为大数据发展下的时代产物,满足了人们对数据信息的渴望,但同时引发了人们对自身网络隐私泄露的担忧。通过分析我国搜索引擎对用户隐私权保护的现状,发现我国搜索引擎对用户隐私权的保护仍然面临着诸多困境,因此在深刻分析美国行业自律模式、欧盟立法规制模式以及荷兰自由港模式的基础上,以期从国家层面、社会层面、公民层面三个方面来探索我国网络隐私权保护的有效路径。  相似文献   
199.
衡量消费社会中人的价值,在于看其手中握有的支配权利的大小,这是个人价值实现的模式———几个世纪以来,这种模式一直被视为文明社会的中心内容。那么,这一理念的深层含义是什么?它与提高限制无止境消费行为的能力又有什么联系?这能够在“现代认同”这一概念中找到答案。现代认同的起点就是内在自我的起点。现代人必须处于自觉自为的自主程度才能找到自我,而这种自主程度归根到底需要独立的私人性。现代认同并不关乎能否与宇宙哲学的秩序相匹配,而在乎能否回应自我内心的需要和欲望。能否实现这些最终关乎自我个人的情感生活,这是构成幸福生活的关键因素———幸福生活就是根据情感上的满足程度来确定的。  相似文献   
200.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号