首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   344篇
  免费   11篇
  国内免费   30篇
管理学   6篇
民族学   1篇
人口学   6篇
丛书文集   49篇
理论方法论   12篇
综合类   227篇
社会学   68篇
统计学   16篇
  2023年   4篇
  2022年   7篇
  2021年   10篇
  2020年   15篇
  2019年   12篇
  2018年   23篇
  2017年   17篇
  2016年   13篇
  2015年   17篇
  2014年   17篇
  2013年   26篇
  2012年   11篇
  2011年   29篇
  2010年   16篇
  2009年   22篇
  2008年   15篇
  2007年   24篇
  2006年   28篇
  2005年   21篇
  2004年   12篇
  2003年   20篇
  2002年   12篇
  2001年   8篇
  2000年   2篇
  1997年   1篇
  1996年   1篇
  1992年   1篇
  1977年   1篇
排序方式: 共有385条查询结果,搜索用时 539 毫秒
81.
当前人类社会正在展开以人工智能技术为核心标志的第四次工业革命,人工智能在赋能人类达致美好生活方面充满光明的前景,但是也潜藏不少可能抵消其赋能功效的风险。不同于早期人们偏重于对人工智能的乐观想象,近年来人工智能的风险话语逐渐显现并扩散乃至走向失序。类型化是解决人工智能风险话语失序问题的有效尝试。基于主体维度和时限维度可以将人工智能风险划分为四大类型:国家主体在短期时限内面临的失业风险、国家主体在长期时限内面临的消权风险、社会主体在短期时限内面临的隐私风险、社会主体在长期时限内面临的意义风险。  相似文献   
82.
Motivated by recent failures of polling to estimate populist party support, we propose and analyze two methods for asking sensitive multiple-choice questions where the respondent retains some privacy and therefore might answer more truthfully. The first method consists of asking for the true choice along with a choice picked at random. The other method presents a list of choices and asks whether the preferred one is on the list or not. Different respondents are shown different lists. The methods are easy to explain, which makes it likely that the respondent understands how her privacy is protected and may thus entice her to participate in the survey and answer truthfully. The methods are also easy to implement and scale up.  相似文献   
83.
慈善募捐会在信息披露、与慈善组织共享信息、与商业机构共享信息这三种情况下对捐赠人的隐私权造成侵害.这三种情况的法理基础与法律关系各不相同,其中信息披露牵涉捐赠人的隐私权、言论自由权与公众的知情权的冲突;与慈善组织共享信息,牵涉慈善组织经济利益与捐赠人隐私权的冲突;与商业机构共享信息,则涉及募捐方式的问题.目前,中国尚未有针对慈善募捐过程中捐赠者隐私保护的相关规则.该情况并不利于对捐赠人权益之保护,也不利于慈善行业之健康发展.因此,中国应尽快研究相关法律之创设,引入"明示/默示规则"等先进制度,并创设相关信息管理机关,以填补这一立法空白.同时,还应区分一次侵权与二次侵权,对于二次侵权,应引入二次侵权保护目录规则,并设立专门的隐私信息管理机关.  相似文献   
84.
With Internet service providers (ISPs) increasingly demanding personal information to develop personalized services, people have become more vulnerable to privacy infringement. As a way to protect individuals’ privacy, industrialized countries have implemented a “notice-and-consent” requirement, meaning an ISP must obtain users’ consent to collect personal information in the course of the ISP's business. Drawing on prospect theory and earlier work on information privacy and behavioral science, in this study, we administered an online survey experiment to test whether the giving of consent differs between ‘opt-in’ and ‘opt-out’ frames. The framing effect was found to be moderated by personal information type, people's attitudes toward privacy, and people's privacy infringement experience. The results indicate that the opt-in frame better protects users’ information privacy, and the framing effect is magnified when the targeted information concerns online activities, when users have weakly held privacy attitudes, and when users have less experience of privacy infringement.  相似文献   
85.
This essay examines the policing of sexual bodies via interactive online technologies. We draw from scholarly discourses regarding surveillance, queer theory, and affect to construct what we call interpersonal panopticism. Interpersonal panopticism serves as a theoretical account of the fluid nature of watching and being watched in relationships, especially in consideration of how intimate relationships and sexualities are surveilled and controlled in a digital era. To articulate the utility and potentials of this theoretical approach, we offer five cultural propositions that serve as a basis for interpersonal panopticism. Collectively these propositions illustrate the utility and potentials of unpacking the interplay of surveillance, heteronormativity, and affect through an interpersonal panoptic lens.  相似文献   
86.
Surveillance technologies may be capable of monitoring a domain, but they need a sufficiently orderly domain to monitor. This article examines the secretive effort to institute artificial-intelligence-based ‘smart surveillance’ in the New York subway, using object- and pattern-recognition algorithms to identify dangerous activities in video feeds, such as a person abandoning a package. By considering the necessary preconditions for computer vision systems to recognize patterns and objects, I show how smart surveillance was challenged by the lack of visual and social uniformities necessary for smart surveillance systems to make its fine-toothed distinctions. In spite of vast resources and involvement of a major military contractor, the project was eventually deemed a failure. Although problems in computer vision are being incrementally solved, those improvements do not yet add up to a holistic technology capable of parsing the real-world ambiguity of open-ended settings which do not meet the assumptions of the detection algorithms. In the absence of technologies that can handle the actual mess, the world itself must cooperate, but it often does not. The article demonstrates the importance of looking beyond the claims of technical efficacy in the study of security and surveillance to discover how technologies of inspection and control actually work, as a means to cut through the heavy rhetorical packaging in which they are sold to their publics.  相似文献   
87.
随着互联网产业的快速发展,移动服务商能够更便捷地获取用户个人隐私信息,而对隐私信息保护又相对薄弱,从而导致用户越来越感知到个人隐私信息缺乏控制,也进一步影响着用户披露个人信息与使用移动商务的意愿,因而有必要探索新的隐私保护方法,并通过实证研究对其有效性进行验证。基于此,本文以公平理论、计划行为理论为基础,提出了面向移动商务环境的隐私偏好设置及隐私反馈,探究了其对移动商务用户披露个人信息与使用移动商务意愿(下简称行为意愿)的影响作用与机理,并采用PLS-SEM方法进行了实证研究。实证结果表明:所提出的隐私保护方法对用户感知的隐私控制(下简称感知控制)和行为意愿产生显著的直接正向影响,并通过感知控制间接正向影响用户的行为意愿,而隐私偏好设置和隐私反馈对用户行为意愿具有显著的负向交互作用,且隐私反馈对隐私偏好设置具有替代作用。  相似文献   
88.
ABSTRACT

This paper makes the case for considering the role of cross-cultural encounters in shaping developers’ notions of information privacy. Recent studies on privacy by design shed light on developer practices yet tend to regard these workers as a generic category. The paper draws on two interviews with workers in a late-stage Israeli startup as a step toward localizing developers and the global products they design. The analysis identifies four narratives that juxtapose the local, the global and the commodification of users’ personal information: (1) the origin myth of the company; (2) workers’ personal and professional biographies; (3) reports on external regulations; and (4) accounts of work practices, rituals and communication formats. The analysis suggests how the globalization of the startup was implicated in changing ideas and practices relating to users’ information. The paper concludes by discussing some of the challenges facing a culturally-sensitive study of developers as mediators of privacy.  相似文献   
89.
住宅不受侵犯虽为多国宪法所明确规定,但对"住宅"的宪法解释并不一致,多数国家和地区以私生活或合理隐私期待标准来解释住宅,涵盖的范围较广,而我国大陆以居住性标准来解释住宅,涵盖的范围较窄.考虑到社会发展和人权保护发展的需要以及住宅不受侵犯权所保护的实质法益,我国大陆应转换对"住宅"的宪法解释标准,即从居住性标准转换到私生活或合理隐私期待的标准,其具体形态应包括居住性住宅和与私生活相关联的非居住性住宅.  相似文献   
90.
患者隐私权保护中的权利冲突   总被引:1,自引:0,他引:1  
目前患者隐私权不断与其他权利产生冲突,这种权利冲突的本质是利益或价值的冲突。患者隐私权难以界定的调整范围、传统医学主义的影响、法律自身的缺陷以及患者对隐私权的认识误区都是产生冲突的原因。通过立法的权利配置和司法的利益衡量可以使这种冲突得到缓解和协调。  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号