首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   46篇
  免费   11篇
  国内免费   1篇
  2022年   2篇
  2021年   2篇
  2020年   2篇
  2019年   1篇
  2018年   5篇
  2017年   8篇
  2016年   1篇
  2014年   4篇
  2013年   5篇
  2011年   2篇
  2010年   2篇
  2009年   2篇
  2008年   4篇
  2005年   4篇
  2004年   4篇
  2002年   2篇
  2001年   1篇
  2000年   1篇
  1999年   1篇
  1998年   1篇
  1997年   1篇
  1996年   1篇
  1995年   1篇
  1987年   1篇
排序方式: 共有58条查询结果,搜索用时 31 毫秒
41.
Internet use has increased rapidly in recent years, and has inevitably led to some negative outcomes, notably cyber bullying and cyber victimization. The purpose of this study was to examine the effects of cyber victimization and parent–adolescent communication on self‐esteem, and the moderating role of parent–adolescent communication in the relationship between cyber victimization and self‐esteem among Turkish adolescents. The participants were 337 adolescents with a mean age of 16.37, (SD = 0.89). The results of hierarchical regression analysis reveal that self‐esteem was predicted negatively by cyber victimization, but positively by mother–adolescent communication. Results also indicate the moderating roles of parent–adolescent communication in the links between cyber victimization and self‐esteem. The findings indicate a need to consider the parent–adolescent relationship while working with victimized youth, and the implications for research and practice are discussed.  相似文献   
42.
43.
Kolany  Adam 《Studia Logica》1997,58(2):261-272
Four consequence operators based on hypergraph satisfiability are defined. Their properties are explored and interconnections are displayed. Finally their relation to the case of the Classical Propositional Calculus is shown.  相似文献   
44.
It was shown in [3] (see also [5]) that there is a duality between the category of bounded distributive lattices endowed with a join-homomorphism and the category of Priestley spaces endowed with a Priestley relation. In this paper, bounded distributive lattices endowed with a join-homomorphism, are considered as algebras and we characterize the congruences of these algebras in terms of the mentioned duality and certain closed subsets of Priestley spaces. This enable us to characterize the simple and subdirectly irreducible algebras. In particular, Priestley relations enable us to characterize the congruence lattice of the Q-distributive lattices considered in [4]. Moreover, these results give us an effective method to characterize the simple and subdirectly irreducible monadic De Morgan algebras [7].The duality considered in [4], was obtained in terms of the range of the quantifiers, and such a duality was enough to obtain the simple and subdirectly irreducible algebras, but not to characterize the congruences.I would like to thank my research supervisor Dr. Roberto Cignoli for his helpful suggestions during the preparation of this paper and the referee for calling my attention to Goldblatt's paper [5].  相似文献   
45.
Madarász  Judit X. 《Studia Logica》1998,61(3):311-345
Continuing work initiated by Jónsson, Daigneault, Pigozzi and others; Maksimova proved that a normal modal logic (with a single unary modality) has the Craig interpolation property iff the corresponding class of algebras has the superamalgamation property (cf. [Mak 91], [Mak 79]). The aim of this paper is to extend the latter result to a large class of logics. We will prove that the characterization can be extended to all algebraizable logics containing Boolean fragment and having a certain kind of local deduction property. We also extend this characterization of the interpolation property to arbitrary logics under the condition that their algebraic counterparts are discriminator varieties. We also extend Maksimova's result to normal multi-modal logics with arbitrarily many, not necessarily unary modalities, and to not necessarily normal multi-modal logics with modalities of ranks smaller than 2, too.The problem of extending the above characterization result to no n-normal non-unary modal logics remains open.Related issues of universal algebra and of algebraic logic are discussed, too. In particular we investigate the possibility of extending the characterization of interpolability to arbitrary algebraizable logics.  相似文献   
46.
以491名初中生为研究对象,对其网络受欺负行为进行为期2年的4次追踪测试,同时测试其父母教养方式。采用潜变量混合增长模型探讨初中生网络受欺负行为的多种发展轨迹,并分析父母教养方式的影响。结果发现:(1)在2年时间内,初中生网络受欺负行为呈显著下降趋势;(2)初中生网络受欺负行为存在两种下降趋势,即快速下降与慢速下降;(3)父亲拒绝、父亲过度保护与母亲拒绝这三种教养方式可增加两组初中生的网络受欺负行为,同时也可降低其网络受欺负行为的下降速度;(4)父亲情感温暖可显著预测快速下降组的初始水平和发展速度,母亲过度保护可显著预测慢速下降组的初始水平和发展速度,母亲情感温暖可显著负向预测慢速下降组的发展速度。上述结果证实父母教养方式对初中生网络受欺负行为发展轨迹的预测作用,支持了Kowalski网络欺负模型。  相似文献   
47.
Previous studies of computer criminals have attempted to differentiate between offenders, but have not used data from the actual attacks. Drawing on theories from investigative psychology as well as information security, the current study differentiates 2755 computer security incidents using information about Method of Operation (MO), Impact, and Source Sector from reported attacks. Multivariate statistical analyses were applied on the data‐matrix of 22 variables and showed the co‐occurrences of various aspects of computer security incidents. A radex structure emerged where the high frequency variables were positioned in the centre of the data‐plot. Based on a previously developed taxonomy of cyber intrusions, the results of the analysis showed that it was possible to draw inferences about the less informative category of Objective, from information about Attacker, Tools, Access, and Results. By applying the division‐lines indicating the Objectives of Challenge/Status, Destruction, Political Gain and Financial Gain on the SSA‐plot, it was shown how the taxonomies could be further developed by taking into account the relationships between the categories. Copyright © 2005 John Wiley & Sons, Ltd.  相似文献   
48.
We consider three infinite hierarchies of what I call “two-dimensional temporal logics with explicit realization operators”, viz. (i) one without historical or deontic modalities, (ii) one with historical but without deontic modalities, and (iii) one with historical and with dyadic deontic modalities for conditional obligation and permission. Sound and complete axiomatizations are obtained for all three hierarchies relative to a simplified version of the finite co-ordinate-system semantics given for so-called T × W logic of historical necessity in [L. Åqvist, The logic of historical necessity as founded on two-dimensional modal tense logic, J. Philos. Logic 28 (1999) 329–369].  相似文献   
49.
ABSTRACT

The authors' aim was to investigate gender and cultural differences in the attributions used to determine causality for hypothetical public and private face-to-face and cyber victimization scenarios among 3,432 adolescents (age range = 11–15 years; 49% girls) from China, Cyprus, the Czech Republic, India, Japan, and the United States, while accounting for their individualism and collectivism. Adolescents completed a questionnaire on cultural values and read four hypothetical victimization scenarios, including public face-to-face victimization, public cyber victimization, private face-to-face victimization, and private cyber victimization. After reading the scenarios, they rated different attributions (i.e., self-blame, aggressor-blame, joking, normative, conflict) according to how strongly they believed the attributions explained why victimization occurred. Overall, adolescents reported that they would utilize the attributions of self-blame, aggressor-blame, and normative more for public forms of victimization and face-to-face victimization than for private forms of victimization and cyber victimization. Differences were found according to gender and country of origin as well. Such findings underscore the importance of delineating between different forms of victimization when examining adolescents' attributions.  相似文献   
50.
The central theme of this paper is that the development of a technology that is predicted to have a major impact on the way we transact with each other should be a matter where the needs of society at large are taken into account. Where the technology is one that emerges from the domain of the Internet, inclusivity becomes even more acute in order to avoid widening the already existing gap in reaping the “digital dividend.” With blockchain, the obligation could even be seen as a moral one, as blockchain is said to have the potential to negate the scope for the abuse of trust by states and institutions. This could be a game changer in areas such as public procurement and the conduct of elections where abuse can lead to the denial of essential resources and a concomitant loss of life, or to conflict and mass killings. Blockchain presents an opportunity for the Internet development community to claim a degree of recognition in the human rights realm by aiding civil intervention in areas where military intervention has been deemed inappropriate.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号