首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   237篇
  免费   40篇
  国内免费   13篇
  290篇
  2023年   3篇
  2022年   2篇
  2021年   5篇
  2020年   6篇
  2019年   12篇
  2018年   9篇
  2017年   3篇
  2016年   10篇
  2015年   13篇
  2014年   11篇
  2013年   35篇
  2012年   7篇
  2011年   8篇
  2010年   3篇
  2009年   4篇
  2008年   11篇
  2007年   9篇
  2006年   9篇
  2005年   10篇
  2004年   8篇
  2003年   8篇
  2002年   11篇
  2001年   11篇
  2000年   6篇
  1999年   3篇
  1998年   7篇
  1997年   5篇
  1996年   10篇
  1995年   8篇
  1994年   1篇
  1993年   2篇
  1992年   6篇
  1991年   4篇
  1990年   3篇
  1989年   2篇
  1987年   1篇
  1986年   4篇
  1985年   1篇
  1984年   1篇
  1983年   5篇
  1982年   2篇
  1981年   1篇
  1980年   3篇
  1979年   1篇
  1978年   3篇
  1977年   3篇
排序方式: 共有290条查询结果,搜索用时 15 毫秒
61.
An experimental study was conducted to investigate the impact of violent computer games on state hostility, state anxiety and arousal. Participants were undergraduate students, aged from 18 to 25 years old. Before the experimental sessions, participants filled in self‐report measures concerning their video game habits and were also pre‐tested for aggressiveness and trait anxiety. Physiological responses (heart rate and skin conductance) were measured during the experiment. After playing, information about state hostility and state anxiety was collected. The results showed that participants who played the violent game reported significantly higher state hostility and support the assumption that an aggressive personality moderates the effect of playing a violent game on state hostility. Aggr. Behav. 32:358–371. 2006. © 2006 Wiley‐Liss, Inc.  相似文献   
62.
互联网在学习不良干预中的作用   总被引:1,自引:0,他引:1  
学习不良一直是心理学和教育学研究的热点,由于计算机和互联网的迅猛发展及其被引入教学后所产生的积极效果,使得研究者开始关注计算机和互联网对学习不良学生的影响。该文介绍了计算机和互联网在学习不良干预中的作用,包括利用互联网激发学习不良学生的学习动机、提高他们的阅读和写作能力、加强教学管理以及帮助他们明确职业方向。该文还指出了此领域现有研究的局限及未来研究的取向。  相似文献   
63.
刺激强度与个体差异对心理生理测谎的影响   总被引:3,自引:0,他引:3  
苏彦捷  郭晓娟 《心理科学》2001,24(5):541-543
探讨不同说谎经验的被试在完成不同刺激强度的任务时,其生理反应和说谎分数的变化。结果表明,在测谎过程中,任务刺激强度不仅影响测试结果的有效性,而且与被试的生理反应和说谎分数成正相关;不同类型被试的说谎分数没有显著差异,测谎应对任何人群都普遍有效。  相似文献   
64.
温芳芳  佐斌 《心理学报》2012,44(1):14-29
采用图像处理技术和眼动探讨了性别二态线索对面孔偏好的影响。实验1发现非面孔线索未掩蔽和掩蔽时, 感知男性化技术与原始照片条件下女性化的男性面孔更有吸引力和信任度; 性别二态技术条件下, 非面孔线索未掩蔽时男性化的男性面孔更有吸引力和信任度。实验2表明被试对男性面孔的平均瞳孔大小和注视次数均大于和多于女性面孔, 首次注视时间短于女性面孔; 被试对男性化面孔的首次注视时间和首次注视持续时间均长于女性化面孔。  相似文献   
65.
Conjunctive item response models are introduced such that (a) sufficient statistics for latent traits are not necessarily additive in item scores; (b) items are not necessarily locally independent; and (c) existing compensatory (additive) item response models including the binomial, Rasch, logistic, and general locally independent model are special cases. Simple estimates and hypothesis tests for conjunctive models are introduced and evaluated as well. Conjunctive models are also identified with cognitive models that assume the existence of several individually necessary component processes for a global ability. It is concluded that conjunctive models and methods may show promise for constructing improved tests and uncovering conjunctive cognitive structure. It is also concluded that conjunctive item response theory may help to clarify the relationships between local dependence, multidimensionality, and item response function form.I appreciate the many helpful suggestions that were given by the reviewers and Ivo Molenaar.  相似文献   
66.
Classical factor analysis assumes a random sample of vectors of observations. For clustered vectors of observations, such as data for students from colleges, or individuals within households, it may be necessary to consider different within-group and between-group factor structures. Such a two-level model for factor analysis is defined, and formulas for a scoring algorithm for estimation with this model are derived. A simple noniterative method based on a decomposition of the total sums of squares and crossproducts is discussed. This method provides a suitable starting solution for the iterative algorithm, but it is also a very good approximation to the maximum likelihood solution. Extensions for higher levels of nesting are indicated. With judicious application of quasi-Newton methods, the amount of computation involved in the scoring algorithm is moderate even for complex problems; in particular, no inversion of matrices with large dimensions is involved. The methods are illustrated on two examples.Suggestions and corrections of three anonymous referees and of an Associate Editor are acknowledged. Discussions with Bob Jennrich on computational aspects were very helpful. Most of research leading to this paper was carried out while the first author was a visiting associate professor at the University of California, Los Angeles.  相似文献   
67.
Accountability in a computerized society   总被引:2,自引:0,他引:2  
This essay warns of eroding accountability in computerized societies. It argues that assumptions about computing and features of situations in which computers are produced create barriers to accountability. Drawing on philosophical analyses of moral blame and responsibility, four barriers are identified: 1) the problem of many hands, 2) the problem of bugs, 3) blaming the computer, and 4) software ownership without liability. The paper concludes with ideas on how to reverse this trend. Several people have contributed generously to this work. Michael Davis, Deborah G. Johnson, Arthur Kuflik, Pamela Samuelson, Debra Satz, Richard De George, Larry May, and Dennis Thompson read drafts and made invaluable suggestions. Reviewers forScience and Engineering Ethics offered thorough and challenging commentary. An earlier version of the paper was presented at The American Philosophical Association, Eastern Division Meeting, December 1993, where audience comments and questions led to clarification of several key issues.  相似文献   
68.
Business ethics and computer ethics: The view from Poland   总被引:1,自引:0,他引:1  
An Aristotelian approach to understanding and teaching business ethics is presented and defended. The newly emerging field of computer ethics is also defined in an Aristotelian fashion, and an argument is made that this new field should be called “information ethics”. It is argued that values have their roots in the life and practices of a community; therefore, morality cannot be taught by training for a special way of reasoning. Transmission of values and norms occurs through socialization — the process by which an individual absorbs not only values but also the whole way of life of his or her community. It follows that business ethics and information ethics can be considered kinds of socialization into a profession: role learning and acquiring a new self-identification. This way of understanding fields of applied ethics is especially important for their proper development in Central-Eastern Europe because of endemic factors which are the result of recent political developments there.  相似文献   
69.
The computer revolution and the problem of global ethics   总被引:7,自引:0,他引:7  
The author agrees with James Moor that computer technology, because it is ‘logically malleable’, is bringing about a genuine social revolution. Moor compares the computer revolution to the ‘industrial revolution’ of the late 18th and the 19th centuries; but it is argued here that a better comparison is with the ‘printing press revolution’ that occurred two centuries before that. Just as the major ethical theories of Bentham and Kant were developed in response to the printing press revolution, so a new ethical theory is likely to emerge from computer ethics in response to the computer revolution. The newly emerging field of information ethics, therefore, is much more important than even its founders and advocates believe.  相似文献   
70.
Editorial note:The following bibliographic survey of computer ethics is intended as a general introduction useful to guide both preliminary research and course development. It is the first of a series that Carl Mitcham will be doing on a number of specific discussions of ethics in science and technology. Future installments are projected on nuclear ethics, engineering ethics, ethics in scientific research, and biomedical ethics. With this [book] I issue “a call to arms.” The world needs much more discussion and writing on the social and ethical issues surrounding computing. I hope readers .... will take up the challenge.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号