全文获取类型
收费全文 | 178篇 |
免费 | 13篇 |
出版年
2023年 | 1篇 |
2022年 | 1篇 |
2021年 | 6篇 |
2020年 | 3篇 |
2019年 | 10篇 |
2018年 | 9篇 |
2017年 | 7篇 |
2016年 | 6篇 |
2015年 | 9篇 |
2014年 | 5篇 |
2013年 | 21篇 |
2012年 | 13篇 |
2011年 | 4篇 |
2010年 | 4篇 |
2009年 | 5篇 |
2008年 | 8篇 |
2007年 | 12篇 |
2006年 | 7篇 |
2005年 | 4篇 |
2004年 | 8篇 |
2003年 | 10篇 |
2002年 | 9篇 |
2001年 | 2篇 |
2000年 | 2篇 |
1999年 | 1篇 |
1998年 | 2篇 |
1996年 | 2篇 |
1995年 | 1篇 |
1994年 | 1篇 |
1993年 | 3篇 |
1992年 | 2篇 |
1991年 | 2篇 |
1988年 | 2篇 |
1984年 | 4篇 |
1980年 | 3篇 |
1978年 | 1篇 |
1973年 | 1篇 |
排序方式: 共有191条查询结果,搜索用时 15 毫秒
171.
172.
Yves de Maeseneer 《Modern Theology》2003,19(4):511-527
In search for a European theological contribution to the debate on the new global context, this essay undertakes a theological‐aesthetic exploration of theological motifs in the current political imagination, in particular: the theme of the angel. After a problematisation of the theological reception of Benjamin's Messianic‐apocalyptic angel figure, I develop a critical position in the wake of von Balthasar. Von Balthasar's interpretations of Rilke and Bonaventure lead to two angelological paradigms, the monad and the crucified seraph, which occur in current political debates, as exemplified in recent essays of Zizek. 相似文献
173.
Hajer Chalghoumi Virginie Cobigo Crislee Dignard Amélie Gauthier-Beaupré Jeffrey W. Jutai Yves Lachapelle 《Ethics & behavior》2019,29(3):201-217
This article aims to explore the attitudes and behaviors of persons with intellectual and developmental disabilities (IDD) related to their information privacy when using information technology (IT). Six persons with IDD were recruited to participate to a series of 3 semistructured focus groups. Data were analyzed following a hybrid thematic analysis approach. Only 2 participants reported using IT every day. However, they all perceived IT use benefits, such as an increased autonomy. Participants demonstrated awareness of privacy concerns, but not in situations involving the use of technology; their awareness is not transferred to the abstract context of IT use. Privacy breaches were revealed to be a major risk for persons with IDD, who did not seem to understand how their personal information was used. Most protection mechanisms and tools reported were those suggested and implemented by caregivers and close relatives who had a great influence on the participants’ attitudes and behaviors toward IT and privacy. Our findings suggest that when using IT, persons with IDD often experience the consequences of a trade-off between autonomy and privacy. Further research and action is needed to support persons with IDD to understand and balance the benefits of IT use and the inherent threats to information privacy. 相似文献
174.
175.
176.
177.
178.
179.
180.