首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   221篇
  免费   40篇
  国内免费   10篇
  271篇
  2023年   2篇
  2022年   1篇
  2021年   4篇
  2020年   5篇
  2019年   7篇
  2018年   12篇
  2017年   5篇
  2016年   10篇
  2015年   13篇
  2014年   7篇
  2013年   48篇
  2012年   6篇
  2011年   6篇
  2010年   2篇
  2009年   6篇
  2008年   11篇
  2007年   9篇
  2006年   9篇
  2005年   10篇
  2004年   7篇
  2003年   6篇
  2002年   11篇
  2001年   10篇
  2000年   5篇
  1999年   3篇
  1998年   5篇
  1997年   4篇
  1996年   9篇
  1995年   7篇
  1994年   1篇
  1993年   3篇
  1992年   5篇
  1991年   3篇
  1990年   3篇
  1989年   2篇
  1987年   1篇
  1986年   1篇
  1985年   1篇
  1984年   1篇
  1983年   2篇
  1980年   3篇
  1979年   1篇
  1978年   2篇
  1977年   2篇
排序方式: 共有271条查询结果,搜索用时 15 毫秒
51.
52.
An experimental study was conducted to investigate the impact of violent computer games on state hostility, state anxiety and arousal. Participants were undergraduate students, aged from 18 to 25 years. Before the experimental sessions, participants filled in self‐report measures concerning their video game habits and were also pre‐tested for aggressiveness and trait anxiety. Physiological responses (heart rate and skin conductance) were measured during the experiment. After playing, information about state hostility and state anxiety was collected. The results showed that participants who played the violent game reported significantly higher state hostility, and support the assumption that an aggressive personality moderates the effect of playing a violent game on state hostility. Aggr. Behav. 32:146–158. 2006 © 2006 Wiley‐Liss, Inc.  相似文献   
53.
An experimental study was conducted to investigate the impact of violent computer games on state hostility, state anxiety and arousal. Participants were undergraduate students, aged from 18 to 25 years old. Before the experimental sessions, participants filled in self‐report measures concerning their video game habits and were also pre‐tested for aggressiveness and trait anxiety. Physiological responses (heart rate and skin conductance) were measured during the experiment. After playing, information about state hostility and state anxiety was collected. The results showed that participants who played the violent game reported significantly higher state hostility and support the assumption that an aggressive personality moderates the effect of playing a violent game on state hostility. Aggr. Behav. 32:358–371. 2006. © 2006 Wiley‐Liss, Inc.  相似文献   
54.
Till Grüne-Yanoff 《Synthese》2009,169(3):539-555
It is often claimed that artificial society simulations contribute to the explanation of social phenomena. At the hand of a particular example, this paper argues that artificial societies often cannot provide full explanations, because their models are not or cannot be validated. Despite that, many feel that such simulations somehow contribute to our understanding. This paper tries to clarify this intuition by investigating whether artificial societies provide potential explanations. It is shown that these potential explanations, if they contribute to our understanding, considerably differ from potential causal explanations. Instead of possible causal histories, simulations offer possible functional analyses of the explanandum. The paper discusses how these two kinds explanatory strategies differ, and how potential functional explanations can be appraised.  相似文献   
55.
互联网在学习不良干预中的作用   总被引:1,自引:0,他引:1  
学习不良一直是心理学和教育学研究的热点,由于计算机和互联网的迅猛发展及其被引入教学后所产生的积极效果,使得研究者开始关注计算机和互联网对学习不良学生的影响。该文介绍了计算机和互联网在学习不良干预中的作用,包括利用互联网激发学习不良学生的学习动机、提高他们的阅读和写作能力、加强教学管理以及帮助他们明确职业方向。该文还指出了此领域现有研究的局限及未来研究的取向。  相似文献   
56.
温芳芳  佐斌 《心理学报》2012,44(1):14-29
采用图像处理技术和眼动探讨了性别二态线索对面孔偏好的影响。实验1发现非面孔线索未掩蔽和掩蔽时, 感知男性化技术与原始照片条件下女性化的男性面孔更有吸引力和信任度; 性别二态技术条件下, 非面孔线索未掩蔽时男性化的男性面孔更有吸引力和信任度。实验2表明被试对男性面孔的平均瞳孔大小和注视次数均大于和多于女性面孔, 首次注视时间短于女性面孔; 被试对男性化面孔的首次注视时间和首次注视持续时间均长于女性化面孔。  相似文献   
57.
Accountability in a computerized society   总被引:2,自引:0,他引:2  
This essay warns of eroding accountability in computerized societies. It argues that assumptions about computing and features of situations in which computers are produced create barriers to accountability. Drawing on philosophical analyses of moral blame and responsibility, four barriers are identified: 1) the problem of many hands, 2) the problem of bugs, 3) blaming the computer, and 4) software ownership without liability. The paper concludes with ideas on how to reverse this trend. Several people have contributed generously to this work. Michael Davis, Deborah G. Johnson, Arthur Kuflik, Pamela Samuelson, Debra Satz, Richard De George, Larry May, and Dennis Thompson read drafts and made invaluable suggestions. Reviewers forScience and Engineering Ethics offered thorough and challenging commentary. An earlier version of the paper was presented at The American Philosophical Association, Eastern Division Meeting, December 1993, where audience comments and questions led to clarification of several key issues.  相似文献   
58.
Business ethics and computer ethics: The view from Poland   总被引:1,自引:0,他引:1  
An Aristotelian approach to understanding and teaching business ethics is presented and defended. The newly emerging field of computer ethics is also defined in an Aristotelian fashion, and an argument is made that this new field should be called “information ethics”. It is argued that values have their roots in the life and practices of a community; therefore, morality cannot be taught by training for a special way of reasoning. Transmission of values and norms occurs through socialization — the process by which an individual absorbs not only values but also the whole way of life of his or her community. It follows that business ethics and information ethics can be considered kinds of socialization into a profession: role learning and acquiring a new self-identification. This way of understanding fields of applied ethics is especially important for their proper development in Central-Eastern Europe because of endemic factors which are the result of recent political developments there.  相似文献   
59.
The computer revolution and the problem of global ethics   总被引:7,自引:0,他引:7  
The author agrees with James Moor that computer technology, because it is ‘logically malleable’, is bringing about a genuine social revolution. Moor compares the computer revolution to the ‘industrial revolution’ of the late 18th and the 19th centuries; but it is argued here that a better comparison is with the ‘printing press revolution’ that occurred two centuries before that. Just as the major ethical theories of Bentham and Kant were developed in response to the printing press revolution, so a new ethical theory is likely to emerge from computer ethics in response to the computer revolution. The newly emerging field of information ethics, therefore, is much more important than even its founders and advocates believe.  相似文献   
60.
Editorial note:The following bibliographic survey of computer ethics is intended as a general introduction useful to guide both preliminary research and course development. It is the first of a series that Carl Mitcham will be doing on a number of specific discussions of ethics in science and technology. Future installments are projected on nuclear ethics, engineering ethics, ethics in scientific research, and biomedical ethics. With this [book] I issue “a call to arms.” The world needs much more discussion and writing on the social and ethical issues surrounding computing. I hope readers .... will take up the challenge.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号