首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   344篇
  免费   11篇
  国内免费   30篇
管理学   6篇
民族学   1篇
人口学   6篇
丛书文集   49篇
理论方法论   12篇
综合类   227篇
社会学   68篇
统计学   16篇
  2023年   4篇
  2022年   7篇
  2021年   10篇
  2020年   15篇
  2019年   12篇
  2018年   23篇
  2017年   17篇
  2016年   13篇
  2015年   17篇
  2014年   17篇
  2013年   26篇
  2012年   11篇
  2011年   29篇
  2010年   16篇
  2009年   22篇
  2008年   15篇
  2007年   24篇
  2006年   28篇
  2005年   21篇
  2004年   12篇
  2003年   20篇
  2002年   12篇
  2001年   8篇
  2000年   2篇
  1997年   1篇
  1996年   1篇
  1992年   1篇
  1977年   1篇
排序方式: 共有385条查询结果,搜索用时 734 毫秒
361.
网络技术的迅猛发展使得公民网络隐私权的法律保护意义重大。近年来,侵犯网络隐私权已成为一个突出的社会问题并受到国际社会的关注。强化对公民网络隐私权的法律保护,构建我国网络隐私权的法律保护体系已成为保护公民人格权的当务之急。  相似文献   
362.
我国网络隐私权的法律保护   总被引:1,自引:0,他引:1  
计算机信息网络技术的发展使得网络空间的个人隐私权受到前所未有的挑战,隐私权的客体内容不断扩展,领域不断延伸,强化对网络空间的个人数据和隐私权的法律保护,已成为国际社会网络立法的当务之急。而在我国,对网络空间隐私权的保护,尚处于开创阶段,有必要借鉴国外已有的立法经验,并结合我国实际,提出对网络隐私权保护的相关立法建议。  相似文献   
363.
While workplace drug testing has received considerable public and scholarly attention, little of this discussion has focused on the social context within which testing is likely to occur. This paper conceptualizes drug testing as social monitoring and examines testing within a framework suggested by Donald Black's theory of social control. The central idea is that the formality of social monitoring within a group is a function of its members' social status and the social distance among them. The paper evaluates this argument in one empirical setting. Analysis of data from U.S. departments of anesthesiology indicates that drug testing, an example of formal monitoring, most often emerges in a context marked by low normative respectability and a lack of intimate relationships. The paper concludes by suggesting how variations in monitoring procedures like drug testing may affect ensuing processes of social control.  相似文献   
364.
The Evolution (or Devolution) of Privacy   总被引:1,自引:0,他引:1  
This paper explores changes in the meaning of privacy. Because individuals understandings and experiences of privacy vary by sociohistorical contexts, privacy is difficult to define and even more challenging to measure. Avoiding common obstacles to privacy research, I examine privacy from the standpoint of its invasion. I develop a typology of privacy invasions and use it to analyze discussions of invasions of privacy in U.S. newspapers. I show that the nature of invasions discussed in the news is increasingly covert and continuous and find empirical support for the often-made claim that the concept of privacy is evolving in meaningful ways.  相似文献   
365.
SUMMARY

Family practices related to hygiene, affection behavior, and privacy were studied using a sample of mental health and child welfare professionals. The professionals were asked to use their own experience to state up to what age it was acceptable for parents and children of the same gender and mixed gender to engage in certain family practices. For virtually all family practices, respondents reported lower appropriate ages for mixed gender pairs. Family practices were acceptable for mothers with their daughters up to older ages than fathers with their sons. Results indicate high variability in the responses regarding appropriate ages, as well as whether the behavior was ever acceptable. The implications of these substantial differences among professionals who often assess these practices as “soft signs” related to abuse are discussed.  相似文献   
366.
This article examines websites where patients rate and evaluate healthcare services as mechanisms for transforming citizens into surveillers of public services in order to generate knowledge about the everyday performance of professionals and institutions. Using post-panoptic theories about the use of information and communication technologies in daily life, it questions how such sites, and the knowledge they generate, relate to existing surveillance structures. It begins with a review of current surveillance literature before turning to the empirical case of the Dutch website Zoekdokter. It situates the site in its specific national health and policy context, which enables not only an analysis of the site, but also the existing rules, norms and structures for monitoring performance and the dynamic between multiple types of surveillance that occur simultaneously in practice. Zoekdokter.nl is one of six cases in this research project and is the only case where patients are encouraged to evaluate individual professionals identified by name and location. I analyze website texts and 15 stakeholder interviews using the post-panoptic concepts of sousveillance, coveillance and infoveillance. In the discussion, I use the case to reflect on several assumptions made in current post-panoptic theory and, more specifically, on the transferability of these ideas to specific sectors, such as healthcare.  相似文献   
367.
Although youth in foster care most likely use social media websites, there appears to be a lack of policy guidelines related to this use. When one considers youth in foster care, the state's mandate to provide safety, and foster parents' rights to exercise parenting responsibilities, the notion of privacy and the use of social media becomes complex. Critical Systems Heuristics will be introduced as a tool in developing policy recommendations. An application of this framework will be provided which can serve as a guide for an agency or workgroup tasked with developing policy guidelines for social media use by youth in foster care.  相似文献   
368.
隐私权范围涉及到未来我国隐私权制度的整体构架,该文提出从广度和深度两个方面对隐私权范围加以分析,建立起一个隐私权范围的平面图。通过对隐私权与相近概念的比较,从制度的外部来论证隐私权独立于名誉权、姓名权、肖像权、身体权和信用权。在此基础上提出我国隐私权范围完善的立法建议。  相似文献   
369.
卫星定位技术具有众多优势,但也有部分人士认为它对隐私权构成了侵害。目前全球卫星定位系统,尤其是含有卫星定位功能的手机,可以用于跟踪他人,并获取他人的生活行动信息,而这类信息通常属于隐私的范畴。未经他人许可,利用这一技术跟踪他人,侵害了被跟踪者的私生活秘密权、空间隐私权和私生活安宁权。我国现行法律对此存在明显的空白之处:立法中缺乏关于隐私权的具体规定;对电信企业开展相关服务缺乏强有力的监管。这种局面亟待改进。  相似文献   
370.
随着移动计算和无限设备的蓬勃发展,基于位置服务中的位置隐私保护研究受到了学术界广泛关注。为保护位置隐私,学术界提出了很多匿名算法。但现有这些算法均基于一个假设,即网络中的所有用户均可信。实际上,网络中并不存在任何可信实体,现有基于真实位置生成匿名集的方法应用领域有限。针对此问题,根据用户发出信号强弱判断位置邻近性,提出了一种在k*NNG上的匿名算法,并通过“协作”的方式在不暴露用户任何隐私的前提下生成匿名区域。在不同系统设置下对算法进行实验,实验结果表明,算法在效率和服务质量上取得了较好的平衡。  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号