全文获取类型
收费全文 | 108篇 |
免费 | 8篇 |
国内免费 | 1篇 |
出版年
2024年 | 1篇 |
2023年 | 3篇 |
2022年 | 4篇 |
2021年 | 1篇 |
2020年 | 9篇 |
2019年 | 6篇 |
2018年 | 10篇 |
2017年 | 4篇 |
2016年 | 10篇 |
2015年 | 8篇 |
2014年 | 9篇 |
2013年 | 9篇 |
2012年 | 7篇 |
2011年 | 7篇 |
2010年 | 4篇 |
2009年 | 2篇 |
2008年 | 2篇 |
2006年 | 1篇 |
2005年 | 1篇 |
2004年 | 2篇 |
2003年 | 1篇 |
2001年 | 1篇 |
1999年 | 1篇 |
1996年 | 1篇 |
1995年 | 1篇 |
1994年 | 1篇 |
1990年 | 1篇 |
1989年 | 2篇 |
1987年 | 2篇 |
1984年 | 1篇 |
1980年 | 2篇 |
1978年 | 1篇 |
1971年 | 1篇 |
1970年 | 1篇 |
排序方式: 共有117条查询结果,搜索用时 15 毫秒
81.
Neurophysiological research suggests our mental life is related to the cellular processes of particular nerves. In the spirit
of Occam’s razor, some authors take these connections as reductions of psychological terms and kinds to molecular- biological
mechanisms and patterns. Bickle’s ‘intervene cellularly/molecularly and track behaviourally’ reduction is one example of this.
Here the mental is being reduced to the physical in two steps. The first is, through genetically altered mammals, to causally
alter activity of particular nerve cells, i.e. neurons, at the molecular level and then, under controlled experimental conditions,
to use generally-accepted rules of behaviour within psychology to monitor the results of these manipulations. In this article,
we argue that Bickle’s case example for molecular reduction, i.e. the reduction of long-term memory to its cellular-molecular
mechanisms, cannot support his claims, because it turns out that his chosen molecular pathway is neither a sufficient nor
a necessary condition for the memory consolidation switch, and thus, instead of rejecting the multiple realization argument,
Bickle’s argument actually speaks in favour of it. Therefore the idea of reductive connections between our mental life and
the activity of particular nerves is, at present, still more fiction than reality. 相似文献
82.
Darko Lacović Boris Badurina Ivo Džinić 《Journal of Religious & Theological Information》2018,17(1):8-21
ABSTRACTThis article presents data gathered in a doctoral study, the aim of which was to identify information needs and behavior patterns of Croatian Catholic priests for pastoral work. Results of the research focus only on the role of information and communication technology and using electronic sources by the priests in the liturgy and caregiving role. The research was conducted using quantitative and qualitative methodology (print questionnaires and semi-structured interviews). A total of 327 respondents took part in the quantitative study and twenty respondents were interviewed. Although research results showed that many respondents are not very familiar with the information and communication technology, most of them still occasionally use computers for making documents and consult the Internet for finding religious information in pastoral work. Computers and the Internet to a larger degree are used by younger and well-educated priests who have the least experience regarding management of the parishes in major locations. Since the results indicated that parish priests mostly seek religious and secular information on the Internet, it is recommended that the Catholic Church in Croatia offer them increased electronic resources for pastoral work. 相似文献
83.
Recep Doğan 《Deviant behavior》2018,39(10):1247-1266
So far, women’s involvement in honor killings has been attempted to explain with the emphasis on either patriarchy or the concept of hegemonic masculinity. However, the current conceptualization of women involved in honor killings is not completely representative of all of the cases. The accurate portrayal of women’s involvement in such killings requires a broader understanding of particular circumstances of the female perpetrators, the whole dynamic behind honor killings, and of the particular relationship between victim and the perpetrator. Through reflecting on the narratives of five female perpetrators, this article aims to provide this missing focus. 相似文献
84.
Elçin Akdoğan Jean-Marie Danion Pierre Vidailhet Elisabeth Bacon 《Memory (Hove, England)》2016,24(10):1390-1395
Re-reading is the most common learning strategy, albeit not a very efficient one. Testing is highly efficient, but not perceived by students as a learning strategy. Prospective judgment-of-learning (JOL) reflect the learner's impression of subsequently being able to retrieve the ongoing learning in a cued-recall task. Estimating JOL involves attempting to retrieve the information, as in testing. The few studies that have explored the potential mnemonic benefit of JOL have yielded contradictory results. Our aim was to compare JOL and testing with re-study and to examine the impact of these strategies according to the relative difficulty of the material (cue-target association strength) in two experiments. After a first encoding phase, participants re-studied, provided JOL, or took a test. Forty-eight hours later, they participated in a final cued-recall test, during which their confidence level judgments were collected. The main result was that delayed JOL behaved in the same way as testing, and both yielded better performances than re-study when material was of moderate difficulty. The easy or very difficult material revealed no differences between these strategies. JOL is proposed as an alternative to testing when faced with difficult material. 相似文献
85.
Wolter Pieters Dina Hadžiosmanović Francien Dechesne 《Science and engineering ethics》2016,22(3):831-850
Conceiving new technologies as social experiments is a means to discuss responsible deployment of technologies that may have unknown and potentially harmful side-effects. Thus far, the uncertain outcomes addressed in the paradigm of new technologies as social experiments have been mostly safety-related, meaning that potential harm is caused by the design plus accidental events in the environment. In some domains, such as cyberspace, adversarial agents (attackers) may be at least as important when it comes to undesirable effects of deployed technologies. In such cases, conditions for responsible experimentation may need to be implemented differently, as attackers behave strategically rather than probabilistically. In this contribution, we outline how adversarial aspects are already taken into account in technology deployment in the field of cyber security, and what the paradigm of new technologies as social experiments can learn from this. In particular, we show the importance of adversarial roles in social experiments with new technologies. 相似文献
86.
87.
Peter Kokol Jernej Završnik Danica Železnik Helena Blažun Vošner 《Journal of Academic Ethics》2016,14(3):221-230
Self-plagiarism, textual recycling and redundancy seemed to be controversial and unethical; however some questions about its definition are still open. The objective in this paper presented study was to use bibliometric analysis to synthesise and visualize the research literature production and derive a typology of self-plagiarism research. Five topics emerged: Self-plagiarism, Institutional self-plagiarism, Self-plagiarism and ICT, Self-plagiarism in academic writing, Self-plagiarism in science. The state of the art topics seem to be “social medium”, “virtual world”, “face book”, “sociomateriality”, “knowledge sharing”, “open access”, “institutional repository”, “retraction” and “responsible conduct”. 相似文献
88.
Viđak Marin Buljan Ivan Tokalić Ružica Lunić Anita Hren Darko Marušić Ana 《Science and engineering ethics》2020,26(6):3437-3454
Science and Engineering Ethics - We assessed students’ and employees’ perception of ethical climate at a university school of medicine compared to that of social sciences and... 相似文献
89.
Fifty circular lights differir.g in diameter from 4 to 53 cm and increasing by 1 cm were presented 135 times each to five Ss who were asked to identify each circle. Presentations were in random order. Indices of information transmission (T), response equivocation H S(R), and response uncertainty H(R) were calculated for different phases of the experiment for individual and pooled (across Ss) responses. Results have shown systematic rising of transmission and lowering of H S(R), while H(R) remained almost constant. All transmission indices calculated from pooled responses were systematically lower than comparable indices calculated from individual responses. Individual and pooled T values calculated from all responses given during the experiment were not representative for the level of identification performance at the end of the experiment. Conclusions were reached that (1) channel capacity indices should not be calculated from all individual responses given during the experiment or from pooled responses of different Ss, and (2) indices of channel capacity should be calculated only after the performance of Ss has reached a final and stable level, which means after enough repetitions of each stimulus. 相似文献
90.
Josef Brožek 《Psychological research》1980,42(1-2):103-107
Summary The frequency of references to Wundt's book-length publications in experimental papers appearing in the American Journal of Psychology was determined. The most widely cited work, by far, is the Grundzüge der physiologischen Psychologie. The distinct decline of Wundt's impact on American psychology is clearly reflected in the frequencies of the citations. 相似文献