全文获取类型
收费全文 | 162篇 |
免费 | 13篇 |
出版年
2023年 | 1篇 |
2022年 | 1篇 |
2021年 | 6篇 |
2020年 | 3篇 |
2019年 | 5篇 |
2018年 | 6篇 |
2017年 | 7篇 |
2016年 | 6篇 |
2015年 | 9篇 |
2014年 | 5篇 |
2013年 | 17篇 |
2012年 | 9篇 |
2011年 | 4篇 |
2010年 | 4篇 |
2009年 | 5篇 |
2008年 | 8篇 |
2007年 | 12篇 |
2006年 | 7篇 |
2005年 | 4篇 |
2004年 | 8篇 |
2003年 | 10篇 |
2002年 | 9篇 |
2001年 | 2篇 |
2000年 | 2篇 |
1999年 | 1篇 |
1998年 | 2篇 |
1996年 | 2篇 |
1995年 | 1篇 |
1994年 | 1篇 |
1993年 | 3篇 |
1992年 | 2篇 |
1991年 | 2篇 |
1988年 | 2篇 |
1984年 | 4篇 |
1980年 | 3篇 |
1978年 | 1篇 |
1973年 | 1篇 |
排序方式: 共有175条查询结果,搜索用时 15 毫秒
161.
Bruno Verschuere Geert Crombez Tessie Degrootte Yves Rosseel 《Applied cognitive psychology》2010,24(7):991-1002
The Concealed Information Test is used to assess recognition of information that the examinee cannot or does not want to reveal. Physiological measures recorded with the polygraph have shown to be highly valid measures of concealed information. Research suggests that a reaction‐time (RT) based test may also successfully reveal concealed information. Due to its simplicity, an RT‐based test has great advantages for applied testing. In the present study, we assessed the validity of the RT‐based test for concealed information detection, and compared its discriminative power with the polygraph. Thirty two participants in a feigned amnesia study were promised a financial reward when successfully concealing autobiographical information. Participants performed an RT‐based test, and a polygraph test. The data support the validity of the RT‐based test for concealed information detection, and indicate its discriminative power is similar to the polygraph. Our data confirm the potential of the RT‐based test. Copyright © 2009 John Wiley & Sons, Ltd. 相似文献
162.
163.
Yves de Maeseneer 《Modern Theology》2003,19(4):511-527
In search for a European theological contribution to the debate on the new global context, this essay undertakes a theological‐aesthetic exploration of theological motifs in the current political imagination, in particular: the theme of the angel. After a problematisation of the theological reception of Benjamin's Messianic‐apocalyptic angel figure, I develop a critical position in the wake of von Balthasar. Von Balthasar's interpretations of Rilke and Bonaventure lead to two angelological paradigms, the monad and the crucified seraph, which occur in current political debates, as exemplified in recent essays of Zizek. 相似文献
164.
Hajer Chalghoumi Virginie Cobigo Crislee Dignard Amélie Gauthier-Beaupré Jeffrey W. Jutai Yves Lachapelle 《Ethics & behavior》2019,29(3):201-217
This article aims to explore the attitudes and behaviors of persons with intellectual and developmental disabilities (IDD) related to their information privacy when using information technology (IT). Six persons with IDD were recruited to participate to a series of 3 semistructured focus groups. Data were analyzed following a hybrid thematic analysis approach. Only 2 participants reported using IT every day. However, they all perceived IT use benefits, such as an increased autonomy. Participants demonstrated awareness of privacy concerns, but not in situations involving the use of technology; their awareness is not transferred to the abstract context of IT use. Privacy breaches were revealed to be a major risk for persons with IDD, who did not seem to understand how their personal information was used. Most protection mechanisms and tools reported were those suggested and implemented by caregivers and close relatives who had a great influence on the participants’ attitudes and behaviors toward IT and privacy. Our findings suggest that when using IT, persons with IDD often experience the consequences of a trade-off between autonomy and privacy. Further research and action is needed to support persons with IDD to understand and balance the benefits of IT use and the inherent threats to information privacy. 相似文献
165.
166.
167.
168.
169.
170.