全文获取类型
收费全文 | 162篇 |
免费 | 3篇 |
国内免费 | 3篇 |
专业分类
管理学 | 13篇 |
民族学 | 2篇 |
人口学 | 9篇 |
丛书文集 | 5篇 |
理论方法论 | 9篇 |
综合类 | 43篇 |
社会学 | 63篇 |
统计学 | 24篇 |
出版年
2024年 | 2篇 |
2023年 | 5篇 |
2021年 | 2篇 |
2020年 | 8篇 |
2019年 | 8篇 |
2018年 | 13篇 |
2017年 | 6篇 |
2016年 | 2篇 |
2015年 | 10篇 |
2014年 | 9篇 |
2013年 | 27篇 |
2012年 | 7篇 |
2011年 | 5篇 |
2010年 | 11篇 |
2009年 | 6篇 |
2008年 | 9篇 |
2007年 | 4篇 |
2006年 | 5篇 |
2005年 | 8篇 |
2004年 | 6篇 |
2003年 | 2篇 |
2002年 | 5篇 |
2001年 | 4篇 |
2000年 | 1篇 |
1997年 | 1篇 |
1994年 | 1篇 |
1992年 | 1篇 |
排序方式: 共有168条查询结果,搜索用时 109 毫秒
1.
Elizabeth Wissinger 《Information, Communication & Society》2018,21(5):779-785
ABSTRACTThis paper considers how personal data protections figure into the design process of wearable technology. The data question is becoming especially important in the face of recent innovations in biotechnology that capitalize on the new fungibility of biology and electronics, in which new biotech wearables capitalize on the ability to analyze and track changes in blood, sweat, and tears. Interviews and participant observation with wearable tech designers, data scientists, fashion tech entrepreneurs, and select experts in cybersecurity and intellectual property law, reveal a range of approaches to data protection in design within the culture where wearables are beginning to merge with biotech. While a few respondents were extremely vigilant about protecting consumer’s privacy, the majority felt that when consumers ‘opt in’ to data sharing, they should be cognizant of the risks. From their perspective, it is not necessarily the producer’s responsibility to protect user's personal data. These attitudes present a problematic logic, which leaves users vulnerable to data exploitation. The paper concludes by arguing that this laissez-faire culture is the environment in which wearable biotech is being developed and will be deployed. This emerging technology raises issues about bodies, data, and ownership in crucial need of analysis and critique to push its move into the mainstream toward more equitable and inclusive ends. 相似文献
2.
Karina Rider 《Information, Communication & Society》2018,21(10):1369-1385
Although most surveillance studies scholars assume privacy is antithetical to surveillance, critics have recently warned that privacy-based criticisms may facilitate surveillance. That being said, we do not yet have data that show whether privacy claims were used in the past to legitimate government surveillance. This paper addresses that gap by analyzing claims made over one of the U.S.’s most controversial surveillance issues: government control over encryption technologies. A review of Congressional hearings and statements on the Congressional Record (n?=?112) reveals that from 1993 to 1999, public debates were dominated by a market liberalization discourse in which participants supported loosening encryption controls as a way to protect privacy from criminal intrusions in market transactions. Also playing a role was a strong skepticism toward government power and a preference for markets as managers of crime prevention. Challenged by these critiques, lawmakers withdrew regulatory proposals and spent the following decade working quietly with private firms to ensure law enforcement surveillance capability. These findings show the expansion of privacy for consumers and entrepreneurs has in fact been used to achieve the contraction of privacy from law enforcement and intelligence agencies. 相似文献
3.
Raphael Schlembach 《Social movement studies》2018,17(5):491-506
The spectre of environmental ‘domestic extremism’ has long been postulated by police leaders and security analysts in Britain. It is a narrative that has justified the commitment of enormous amounts of government resources towards police intelligence work directed at non-violent direct action campaigns. Most controversially, this has included the long-term infiltration of environmental (and other) activist groups by undercover police. This article provides a critical analysis of the justifications put forward in support of the covert surveillance of environmental activists in Britain. The paper proceeds by way of a single case study – a high profile, environmental direct action protest in the north of England – in order to reveal the levels of abuse, manipulation and deception at the basis of undercover protest policing. Through their court case, the activists involved with this action were able to obtain rare insights into the police authorisation documents for the undercover operation that had led to their arrests. An analysis of these documents provides us with a glimpse of the contradictory justifications given by senior police officers for infiltration – now under scrutiny by a public inquiry. 相似文献
4.
ABSTRACTWe describe two recently proposed machine learning approaches for discovering emerging trends in fatal accidental drug overdoses. The Gaussian Process Subset Scan (Herlands, McFowland, Wilson, & Neill, 2017) enables early detection of emerging patterns in spatio-temporal data, accounting for both the complex, correlated nature of the data and the fact that detecting subtle patterns requires integration of information across multiple spatial areas and multiple time steps. We apply this approach to 17 years of county-aggregated data for monthly opioid overdose deaths in the New York City metropolitan area, showing clear advantages in the utility of discovered patterns as compared to typical anomaly detection approaches. To detect and characterize emerging overdose patterns that differentially affect a subpopulation of the data, including geographic, demographic, and behavioral patterns (e.g., which combinations of drugs are involved), we apply the Multidimensional Tensor Scan (Neill, 2017) to 8 years of case-level overdose data from Allegheny County, Pennsylvania. We discover previously unidentified overdose patterns which reveal unusual demographic clusters, show impacts of drug legislation, and demonstrate potential for early detection and targeted intervention. These approaches to early detection of overdose patterns can inform prevention and response efforts, as well as understanding the effects of policy changes. 相似文献
5.
Alistair S. Duff 《Information, Communication & Society》2016,19(11):1605-1621
Silicon Valley, California – home of Apple, Facebook, Twitter, Google, and so on – is widely regarded as the epicentre of the information revolution. However, it is not just a technical or economic phenomenon; it has also made a social revolution. The article evaluates Silicon Valley from a normative perspective, seeking to identify its real societal impact, negative as well as positive. A select review of significant literature is followed by exposition of primary data, based on in situ face-to-face interviews with Valley occupants; these range from the chief technology officer of a global brand to a homeless, unemployed Vietnam War veteran. The article organises its findings under three headings: the nature of information revolution; iCapitalism as a new technoeconomic synthesis; and the normative crisis of the information society. It concludes with a warning about ongoing attempts to clone Silicon Valley around the world. 相似文献
6.
童彬 《重庆邮电大学学报(社会科学版)》2018,30(5):55-63
在智能化和法治化的新时代,公共视频监控图像信息综合应用已成为社会治理社会化、法治化、智能化和专业化的重要方式。公共视频监控系统成为政府部门和社会组织保护公共安全以及公民人身、财产安全的技术项目。公共视频监控图像信息的技术手段和法律属性需要以立法形式加以规定。公共视频监控图像信息综合应用需要在权利保护的法律制度中进行,尤其是视频监控图像信息公开使用与信息安全、隐私权保护之间的法律制度设计。因此,公共视频监控图像信息的法律规制工作应对法律主体、基本原则、权利体系、法律监管、法律责任做出明确规定。 相似文献
7.
This article analyzes the social construction of border surveillance and policing in reality-based television. Utilizing content analytic methods to document and decode popular images of borders, mobility, and insecurity, it assesses three programs from Australia, the UK, and the United States. Despite claims of offering accurate and unfiltered depictions, the programs are ideological and provide visions of enforcement that reinforce stereotypes regarding the risks of permeable borders and exonerate intensive regimes of surveillance and securitization. Our findings suggest this occurs in three ways. First, the programs inflate the extent and seriousness of lawlessness associated with cross-border movement. Second, they offer individualistic explanations of crime that cite personal choices and pathologies as determinants. Finally, alongside neglecting their perspectives and interpretations of events, when compared to the reality of official statistics, the programs disproportionately feature suspected offenders as members of marginalized groups. The social and political implications of these findings are discussed. 相似文献
8.
Wade M. Cole 《Sociological Forum》2009,24(3):563-588
What factors determine whether and how deeply countries will commit to the international human rights regime? Using data for up to 142 countries between 1966 and 2000, this article analyzes patterns of membership to the International Human Rights Covenants. The analysis produced two main conclusions. First, the potential costs associated with joining a treaty, rather than its substantive content, motivates the decision to join. Treaties that protect different rights but establish comparable implementation mechanisms exhibit similar patterns of membership, whereas treaties that protect identical rights but establish different implementation provisions exhibit dissimilar patterns of membership. Second, rates of treaty membership differ by level of commitment. Countries that sign human rights treaties differ from countries that ratify. Results are interpreted with respect to four theories of commitment and compliance: realism, liberalism, constructivism, and sociological institutionalism. Theories that emphasize the importance of a treaty’s costs (realism and institutionalism) fare better than theories that prioritize a treaty’s content (liberalism and constructivism). 相似文献
9.
E. Järpe 《统计学通讯:理论与方法》2013,42(12):3009-3027
Surveillance to detect changes of spatial patterns is of interest in many areas such as environmental control and regional analysis. Here the interaction parameter of the Ising model, is considered. A minimal sufficient statistic and its asymptotic distribution are used. It is demonstrated that the convergence to normal, distribution is rapid. The main result is that when the lattice is large, all approximations are better in several respects. It is shown that, for large lattice sizes, earlier results on surveillance of a normally distributed random variable can be used in cases of most interest. The expected delay of alarm at a fixed level of false alarm probability is examined for some examples. 相似文献
10.
Jean‐Baptiste Denis 《Risk analysis》2011,31(7):1141-1155
Stakeholders making decisions in public health and world trade need improved estimations of the burden‐of‐illness of foodborne infectious diseases. In this article, we propose a Bayesian meta‐analysis or more precisely a Bayesian evidence synthesis to assess the burden‐of‐illness of campylobacteriosis in France. Using this case study, we investigate campylobacteriosis prevalence, as well as the probabilities of different events that guide the disease pathway, by (i) employing a Bayesian approach on French and foreign human studies (from active surveillance systems, laboratory surveys, physician surveys, epidemiological surveys, and so on) through the chain of events that occur during an episode of illness and (ii) including expert knowledge about this chain of events. We split the target population using an exhaustive and exclusive partition based on health status and the level of disease investigation. We assume an approximate multinomial model over this population partition. Thereby, each observed data set related to the partition brings information on the parameters of the multinomial model, improving burden‐of‐illness parameter estimates that can be deduced from the parameters of the basic multinomial model. This multinomial model serves as a core model to perform a Bayesian evidence synthesis. Expert knowledge is introduced by way of pseudo‐data. The result is a global estimation of the burden‐of‐illness parameters with their accompanying uncertainty. 相似文献