全文获取类型
收费全文 | 237篇 |
免费 | 40篇 |
国内免费 | 13篇 |
专业分类
290篇 |
出版年
2023年 | 3篇 |
2022年 | 2篇 |
2021年 | 5篇 |
2020年 | 6篇 |
2019年 | 12篇 |
2018年 | 9篇 |
2017年 | 3篇 |
2016年 | 10篇 |
2015年 | 13篇 |
2014年 | 11篇 |
2013年 | 35篇 |
2012年 | 7篇 |
2011年 | 8篇 |
2010年 | 3篇 |
2009年 | 4篇 |
2008年 | 11篇 |
2007年 | 9篇 |
2006年 | 9篇 |
2005年 | 10篇 |
2004年 | 8篇 |
2003年 | 8篇 |
2002年 | 11篇 |
2001年 | 11篇 |
2000年 | 6篇 |
1999年 | 3篇 |
1998年 | 7篇 |
1997年 | 5篇 |
1996年 | 10篇 |
1995年 | 8篇 |
1994年 | 1篇 |
1993年 | 2篇 |
1992年 | 6篇 |
1991年 | 4篇 |
1990年 | 3篇 |
1989年 | 2篇 |
1987年 | 1篇 |
1986年 | 4篇 |
1985年 | 1篇 |
1984年 | 1篇 |
1983年 | 5篇 |
1982年 | 2篇 |
1981年 | 1篇 |
1980年 | 3篇 |
1979年 | 1篇 |
1978年 | 3篇 |
1977年 | 3篇 |
排序方式: 共有290条查询结果,搜索用时 15 毫秒
61.
Patrícia Arriaga Francisco Esteves Paula Carneiro Maria Benedicta Monteiro 《Aggressive behavior》2006,32(4):358-371
An experimental study was conducted to investigate the impact of violent computer games on state hostility, state anxiety and arousal. Participants were undergraduate students, aged from 18 to 25 years old. Before the experimental sessions, participants filled in self‐report measures concerning their video game habits and were also pre‐tested for aggressiveness and trait anxiety. Physiological responses (heart rate and skin conductance) were measured during the experiment. After playing, information about state hostility and state anxiety was collected. The results showed that participants who played the violent game reported significantly higher state hostility and support the assumption that an aggressive personality moderates the effect of playing a violent game on state hostility. Aggr. Behav. 32:358–371. 2006. © 2006 Wiley‐Liss, Inc. 相似文献
62.
63.
刺激强度与个体差异对心理生理测谎的影响 总被引:3,自引:0,他引:3
探讨不同说谎经验的被试在完成不同刺激强度的任务时,其生理反应和说谎分数的变化。结果表明,在测谎过程中,任务刺激强度不仅影响测试结果的有效性,而且与被试的生理反应和说谎分数成正相关;不同类型被试的说谎分数没有显著差异,测谎应对任何人群都普遍有效。 相似文献
64.
采用图像处理技术和眼动探讨了性别二态线索对面孔偏好的影响。实验1发现非面孔线索未掩蔽和掩蔽时, 感知男性化技术与原始照片条件下女性化的男性面孔更有吸引力和信任度; 性别二态技术条件下, 非面孔线索未掩蔽时男性化的男性面孔更有吸引力和信任度。实验2表明被试对男性面孔的平均瞳孔大小和注视次数均大于和多于女性面孔, 首次注视时间短于女性面孔; 被试对男性化面孔的首次注视时间和首次注视持续时间均长于女性化面孔。 相似文献
65.
Robert J. Jannarone 《Psychometrika》1986,51(3):357-373
Conjunctive item response models are introduced such that (a) sufficient statistics for latent traits are not necessarily additive in item scores; (b) items are not necessarily locally independent; and (c) existing compensatory (additive) item response models including the binomial, Rasch, logistic, and general locally independent model are special cases. Simple estimates and hypothesis tests for conjunctive models are introduced and evaluated as well. Conjunctive models are also identified with cognitive models that assume the existence of several individually necessary component processes for a global ability. It is concluded that conjunctive models and methods may show promise for constructing improved tests and uncovering conjunctive cognitive structure. It is also concluded that conjunctive item response theory may help to clarify the relationships between local dependence, multidimensionality, and item response function form.I appreciate the many helpful suggestions that were given by the reviewers and Ivo Molenaar. 相似文献
66.
Classical factor analysis assumes a random sample of vectors of observations. For clustered vectors of observations, such as data for students from colleges, or individuals within households, it may be necessary to consider different within-group and between-group factor structures. Such a two-level model for factor analysis is defined, and formulas for a scoring algorithm for estimation with this model are derived. A simple noniterative method based on a decomposition of the total sums of squares and crossproducts is discussed. This method provides a suitable starting solution for the iterative algorithm, but it is also a very good approximation to the maximum likelihood solution. Extensions for higher levels of nesting are indicated. With judicious application of quasi-Newton methods, the amount of computation involved in the scoring algorithm is moderate even for complex problems; in particular, no inversion of matrices with large dimensions is involved. The methods are illustrated on two examples.Suggestions and corrections of three anonymous referees and of an Associate Editor are acknowledged. Discussions with Bob Jennrich on computational aspects were very helpful. Most of research leading to this paper was carried out while the first author was a visiting associate professor at the University of California, Los Angeles. 相似文献
67.
Accountability in a computerized society 总被引:2,自引:0,他引:2
Helen Nissenbaum PhD 《Science and engineering ethics》1996,2(1):25-42
This essay warns of eroding accountability in computerized societies. It argues that assumptions about computing and features
of situations in which computers are produced create barriers to accountability. Drawing on philosophical analyses of moral
blame and responsibility, four barriers are identified: 1) the problem of many hands, 2) the problem of bugs, 3) blaming the
computer, and 4) software ownership without liability. The paper concludes with ideas on how to reverse this trend.
Several people have contributed generously to this work. Michael Davis, Deborah G. Johnson, Arthur Kuflik, Pamela Samuelson,
Debra Satz, Richard De George, Larry May, and Dennis Thompson read drafts and made invaluable suggestions. Reviewers forScience and Engineering Ethics offered thorough and challenging commentary. An earlier version of the paper was presented at The American Philosophical
Association, Eastern Division Meeting, December 1993, where audience comments and questions led to clarification of several
key issues. 相似文献
68.
Business ethics and computer ethics: The view from Poland 总被引:1,自引:0,他引:1
Prof. Jacek Sojka 《Science and engineering ethics》1996,2(2):191-200
An Aristotelian approach to understanding and teaching business ethics is presented and defended. The newly emerging field
of computer ethics is also defined in an Aristotelian fashion, and an argument is made that this new field should be called
“information ethics”. It is argued that values have their roots in the life and practices of a community; therefore, morality
cannot be taught by training for a special way of reasoning. Transmission of values and norms occurs through socialization
— the process by which an individual absorbs not only values but also the whole way of life of his or her community. It follows
that business ethics and information ethics can be considered kinds of socialization into a profession: role learning and
acquiring a new self-identification. This way of understanding fields of applied ethics is especially important for their
proper development in Central-Eastern Europe because of endemic factors which are the result of recent political developments
there. 相似文献
69.
The computer revolution and the problem of global ethics 总被引:7,自引:0,他引:7
Professor Krystyna Gorniak-Kocikowska 《Science and engineering ethics》1996,2(2):177-190
The author agrees with James Moor that computer technology, because it is ‘logically malleable’, is bringing about a genuine
social revolution. Moor compares the computer revolution to the ‘industrial revolution’ of the late 18th and the 19th centuries;
but it is argued here that a better comparison is with the ‘printing press revolution’ that occurred two centuries before
that. Just as the major ethical theories of Bentham and Kant were developed in response to the printing press revolution,
so a new ethical theory is likely to emerge from computer ethics in response to the computer revolution. The newly emerging
field of information ethics, therefore, is much more important than even its founders and advocates believe. 相似文献
70.
Dr. Carl Mitcham 《Science and engineering ethics》1995,1(2):113-132
Editorial note:The following bibliographic survey of computer ethics is intended as a general introduction useful to guide both preliminary
research and course development. It is the first of a series that Carl Mitcham will be doing on a number of specific discussions
of ethics in science and technology. Future installments are projected on nuclear ethics, engineering ethics, ethics in scientific
research, and biomedical ethics.
With this [book] I issue “a call to arms.” The world needs much more discussion and writing on the social and ethical issues
surrounding computing. I hope readers .... will take up the challenge. 相似文献