首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   448篇
  免费   59篇
  国内免费   13篇
  2024年   1篇
  2023年   13篇
  2022年   9篇
  2021年   17篇
  2020年   23篇
  2019年   23篇
  2018年   25篇
  2017年   19篇
  2016年   31篇
  2015年   32篇
  2014年   19篇
  2013年   87篇
  2012年   12篇
  2011年   11篇
  2010年   6篇
  2009年   9篇
  2008年   17篇
  2007年   8篇
  2006年   12篇
  2005年   14篇
  2004年   9篇
  2003年   7篇
  2002年   13篇
  2001年   11篇
  2000年   7篇
  1999年   5篇
  1998年   6篇
  1997年   6篇
  1996年   10篇
  1995年   9篇
  1994年   1篇
  1993年   4篇
  1992年   6篇
  1991年   3篇
  1990年   3篇
  1989年   3篇
  1987年   1篇
  1986年   1篇
  1985年   1篇
  1984年   1篇
  1983年   2篇
  1982年   1篇
  1980年   3篇
  1979年   1篇
  1978年   4篇
  1977年   7篇
  1976年   6篇
  1975年   1篇
排序方式: 共有520条查询结果,搜索用时 31 毫秒
101.
The purpose of the current study was to examine the effects of a multicomponent intervention that included discrimination training, real-time visual feedback, and self-monitoring on postural behavior at a computer workstation in a simulated office environment. Using a nonconcurrent multiple baseline design across 8 participants, the study assessed the effects of the intervention across three postural variables. Following an information phase, the intervention started for the lowest stable postural variable. The intervention led to substantial improvements in safety behavior for most targeted postural variables. A reversal to the information phase for 2 participants did not lead to decreases in safety. Postures self-monitored with high accuracy improved to a greater degree than postures self-monitored with low accuracy.  相似文献   
102.
People may exhibit two kinds of modifications when demonstrating action for others: modifications to facilitate bottom-up, or sensory-based processing; and modifications to facilitate top-down, or knowledge-based processing. The current study examined actors' production of such modifications in action demonstrations for audiences that differed in their capacity for intentional reasoning. Actors' demonstrations of complex actions for a non-anthropomorphic computer system and for people (adult and toddler) were compared. Evidence was found for greater highlighting of top-down modifications in the demonstrations for the human audiences versus the computer audience. Conversely, participants highlighted simple perceptual modifications for the computer audience, producing more punctuated and wider ranging motions. This study suggests that people consider differences in their audiences when demonstrating action.  相似文献   
103.
104.
An experimental study was conducted to investigate the impact of violent computer games on state hostility, state anxiety and arousal. Participants were undergraduate students, aged from 18 to 25 years. Before the experimental sessions, participants filled in self‐report measures concerning their video game habits and were also pre‐tested for aggressiveness and trait anxiety. Physiological responses (heart rate and skin conductance) were measured during the experiment. After playing, information about state hostility and state anxiety was collected. The results showed that participants who played the violent game reported significantly higher state hostility, and support the assumption that an aggressive personality moderates the effect of playing a violent game on state hostility. Aggr. Behav. 32:146–158. 2006 © 2006 Wiley‐Liss, Inc.  相似文献   
105.
An experimental study was conducted to investigate the impact of violent computer games on state hostility, state anxiety and arousal. Participants were undergraduate students, aged from 18 to 25 years old. Before the experimental sessions, participants filled in self‐report measures concerning their video game habits and were also pre‐tested for aggressiveness and trait anxiety. Physiological responses (heart rate and skin conductance) were measured during the experiment. After playing, information about state hostility and state anxiety was collected. The results showed that participants who played the violent game reported significantly higher state hostility and support the assumption that an aggressive personality moderates the effect of playing a violent game on state hostility. Aggr. Behav. 32:358–371. 2006. © 2006 Wiley‐Liss, Inc.  相似文献   
106.
This study tested different Bayesian Journey-to-Crime (JTC) models on a sample group of 850 serial offenders apprehended in Baltimore County, MD from 1993 to 1997. In this research, Bayesian JTC models were being used to predict the home locations of the offenders. The sample group data included 133 assaults, 90 burglaries, 497 larcenies, 81 robberies, and 49 vehicle thefts. The main question this research aimed to answer was whether the addition of crimes of a different type to an existing crime series of a single type would result in more accurate and/or precise Bayesian JTC models. The standard practice by law enforcement has been to consider the same-type crime series only when modelling the anchor point of the offender. Similarly, in research, geographic profiles have been constructed exclusively with the same-type crime series. The results of this study clearly indicated that the inclusion of crimes of a different type into a single crime-type series will result in significantly more accurate and more precise Bayesian JTC models. In contrast, crime series with predominantly assault and burglary showed results that were inconclusive or indicated no significant differences. These results should encourage law enforcement agencies to re-evaluate their standard practice of constructing geographic profiles with only the same-type crime series. Copyright © 2009 John Wiley & Sons, Ltd.  相似文献   
107.
互联网在学习不良干预中的作用   总被引:1,自引:0,他引:1  
学习不良一直是心理学和教育学研究的热点,由于计算机和互联网的迅猛发展及其被引入教学后所产生的积极效果,使得研究者开始关注计算机和互联网对学习不良学生的影响。该文介绍了计算机和互联网在学习不良干预中的作用,包括利用互联网激发学习不良学生的学习动机、提高他们的阅读和写作能力、加强教学管理以及帮助他们明确职业方向。该文还指出了此领域现有研究的局限及未来研究的取向。  相似文献   
108.
Accountability in a computerized society   总被引:2,自引:0,他引:2  
This essay warns of eroding accountability in computerized societies. It argues that assumptions about computing and features of situations in which computers are produced create barriers to accountability. Drawing on philosophical analyses of moral blame and responsibility, four barriers are identified: 1) the problem of many hands, 2) the problem of bugs, 3) blaming the computer, and 4) software ownership without liability. The paper concludes with ideas on how to reverse this trend. Several people have contributed generously to this work. Michael Davis, Deborah G. Johnson, Arthur Kuflik, Pamela Samuelson, Debra Satz, Richard De George, Larry May, and Dennis Thompson read drafts and made invaluable suggestions. Reviewers forScience and Engineering Ethics offered thorough and challenging commentary. An earlier version of the paper was presented at The American Philosophical Association, Eastern Division Meeting, December 1993, where audience comments and questions led to clarification of several key issues.  相似文献   
109.
This paper reviews codes of ethics and codes of conduct from different countries. The differences and similarities between code content and between attitudes are considered. Distinction is drawn between a code of ethics and a code of conduct. Recommendations are made for establishing a common framework for IFIP (International Federation for Information Process) Member or Affiliate Societies.  相似文献   
110.
Business ethics and computer ethics: The view from Poland   总被引:1,自引:0,他引:1  
An Aristotelian approach to understanding and teaching business ethics is presented and defended. The newly emerging field of computer ethics is also defined in an Aristotelian fashion, and an argument is made that this new field should be called “information ethics”. It is argued that values have their roots in the life and practices of a community; therefore, morality cannot be taught by training for a special way of reasoning. Transmission of values and norms occurs through socialization — the process by which an individual absorbs not only values but also the whole way of life of his or her community. It follows that business ethics and information ethics can be considered kinds of socialization into a profession: role learning and acquiring a new self-identification. This way of understanding fields of applied ethics is especially important for their proper development in Central-Eastern Europe because of endemic factors which are the result of recent political developments there.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号