首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   137篇
  免费   11篇
  国内免费   9篇
  2024年   2篇
  2023年   12篇
  2022年   8篇
  2021年   2篇
  2020年   19篇
  2019年   18篇
  2018年   14篇
  2017年   10篇
  2016年   5篇
  2015年   6篇
  2014年   6篇
  2013年   15篇
  2012年   3篇
  2011年   2篇
  2010年   3篇
  2009年   3篇
  2008年   5篇
  2007年   2篇
  2006年   4篇
  2005年   2篇
  2004年   3篇
  2002年   5篇
  2001年   3篇
  2000年   1篇
  1998年   1篇
  1996年   1篇
  1994年   1篇
  1980年   1篇
排序方式: 共有157条查询结果,搜索用时 15 毫秒
51.
52.
The idea of securitization holds that perceived threats and the ensuing need for security measures are mobilized in speech acts to legitimate bypassing of normal practices of democratic politics and justification. Citizens, as members of the political community, are thus effectively deprived of their agency. Attempts at securitization gain clout from the severity of the mobilized threat: the more convincingly a threat is argued to cause disruptions in the functioning of society and ultimately the loss of human life, the more acceptable it will become to bypass democratic governance in order to prevent the threat. Accordingly, security technologies can be conceived of as those technologies that are constructed and mobilized in such attempts at securitization and depoliticization. However, security technologies can also be thought of as technologies that are mobilized in face of existential threats more generally, regardless of whether their mobilization has a depoliticizing effect or not. Yet, as case studies on airport security scanners and security in smart grids show, not all implementations of security, even against existential threats, show this tendency of depoliticization as essential in securitization and in technologies of security. This article further demonstrates that the agency of citizens in the governance of these technologies importantly depends on whether or not the threat is perceived as internal or external to the referent object of the security programme.  相似文献   
53.
Within the broader area of digital risk, there has been concern over the phenomena of ‘cyber suicide’, a completed or attempted suicide influenced by the internet. We propose a theoretical explanation of the ‘ambivalent self’ in people who go online searching for suicide, by introducing the concept of an inner split between the ‘suicidal part’ (SP) and ‘non-suicidal part’ (NSP) within the personality structure of the individual which struggle for domination of the inner life and external relationships and decisions of the suicidal person. This is grounded in psychoanalytic theory and draws upon a broader conceptualisation of the psyche of the self as split between rival parts, and differing states of mind, competing for control of the vulnerable individual and their capacity to tolerate and manage emotional pain and reality. The recognition and awareness of an inner split between the SP and NSP of the person who goes online, and how this influences virtual relationships, as well as external relationships, such as in psychotherapy, is an important understanding for contemporary psychotherapy and risk management in the digital age.  相似文献   
54.
适宜技术与诊疗最优化临床应用患者方面的影响因素   总被引:1,自引:0,他引:1  
从诊疗中的认识论和辩证法的角度,通过实际案例分析医生及患者对选择适宜技术实现诊疗最优化的消极和积极的影响;阐述了患者自身的经济状况在很大程度上影响着适宜技术的应用;患者的心理因素和家人的态度在一定程度上也影响着适宜技术的应用及实现诊疗最优化。医生要提高自己的综合素质,患者要充分发挥自己的主观能动性,消除消极的影响,增强积极的影响,共同促进适宜技术的临床应用及实现诊疗最优化。  相似文献   
55.
56.
As privacy controversies have become more salient since the early 1980s, one response by policy makers has been to try to encourage consumers to demand privacy protection, by expecting goods and services to be designed with privacy‐enhancing technologies (PETs) embedded in them. But what scope is there for this? Conventional approaches to understanding consumer demand for privacy protection have not been very helpful in providing robust accounts of when consumers will want which kinds of protection. This paper offers a neo‐Durkheimian institutionalist theoretical account of the roots of consumer preferences for privacy and services with PETs in particular, which yields testable hypotheses for future research. It grounds preferences in risk perceptions, shows how distinct styles of risk perceptions are the result of distinct types of situation in social organisation, and derives typical demand curves for each of these types, before exploring the extent of mobility of preferences predicted by the theory, which in turn provides the basis for understanding the scope for persuading consumers to demand privacy‐respecting services of different types. Rooted in the sociology of knowledge and in anthropological approaches, the argument represents a challenge to psychometric, naïve empiricist and postmodernist accounts, and it offers a distinct research agenda. Copyright © 2002 Henry Stewart Publications Ltd.  相似文献   
57.
Some promising dimensions for behavioral community technology   总被引:1,自引:0,他引:1  
In recent years, the search for effective and replicable approaches to planned change in communities has escalated. Applied behavior analysts have participated in these efforts to remedy existing community problems and to increase the capacities of community residents to meet their goals. Examples of behavioral technologies for community settings are described and their advantages are noted. Criteria for more contextually appropriate community technologies are suggested and strategies for developing behavioral methods according to these criteria are described. This paper outlines some promising dimensions for behavioral community technology and discusses several possible limitations to a behavioral approach to addressing societal problems.  相似文献   
58.
Peter M. Phillips 《Zygon》2023,58(3):770-788
In this article, I offer a background to digital theology and its methodology, exploring especially aspects of transhumanism and metaphysical enquiry. The article moves on to engage with several articles given at the Science and Religion Forum at Birmingham in 2022, especially the Gowland Lecture given by Professor Niels Gregersen and the Peacocke Lecture by Andrew Jackson. Both offer a metaphysical approach to information linked closely to the concept of Logos drawn from the Prologue of John—Jackson focusing on Maximus the Confessor's exploration of phylogenetic logoi; Gregersen on a further development of “Deep Incarnation” through the title “God with Clay” drawn from Bonaventure. The article extends this engagement with John by querying the model of incarnation in “deep incarnation” but building on the Logos/logoi to set out some initial building blocks for an alternative metaphysics of information.  相似文献   
59.

Objective

The aim of this study was to address current gaps in knowledge regarding the appropriateness and quality of counselling provided to egg donors in the UK.

Methods

The present study used a cross-sectional, qualitative design. Semi-structured interviews were carried out with 29 UK egg donors to explore their experiences of egg donation and the counselling received.

Results

Of the 29 participants, 24 had received counselling. The remaining five did not receive counselling because they were either not accepted as a donor (n = 4) or were offered, but chose not to take up the session (n = 1). The findings are presented in relation to five themes: feeling supported via counselling; feeling well-informed; welcoming an individualised approach; the counselling setting; and thinking about the future.

Conclusion

Egg donors in this study had varying experiences of counselling offered to them as part of the egg donation process in the UK.

Implications

The findings indicate that there are some aspects of counselling in the UK that could be improved, including the routine offering of counselling throughout the egg donation process and the tailoring of counselling to meet egg donors' individual needs.  相似文献   
60.
《Behavior Therapy》2023,54(2):303-314
It is unclear whether offering individuals a choice between different digital intervention programs affects treatment outcomes. To generate initial insights, we conducted a pilot doubly randomized preference trial to test whether offering individuals with binge-spectrum eating disorder a choice between two digital interventions is causally linked with superior outcomes than random assignment to these interventions. Participants with recurrent binge eating were randomized to either a choice (n = 77) or no-choice (n = 78) group. Those in the choice group could choose one of the two digital programs, while those in the no-choice group were assigned a program at random. The two digital interventions (a broad and a focused program) took 4 weeks to complete, were based on cognitive-behavioral principles and have demonstrated comparable efficacy, but differ in scope, content, and targeted change mechanisms. Most participants (79%) allocated to the choice condition chose the broad program. While both groups experienced improvements in primary (Eating Disorder Examination Questionnaire global scores and number of binge eating episodes over the past month) and secondary outcomes (dietary restraint, body image concerns, etc.), no significant between-group differences were observed. The two groups did not differ on dropout rates, nor on most indices of intervention engagement. Findings provide preliminary insights towards the role of client preferences in digital mental health interventions for eating disorders. Client preferences may not determine outcomes when digital interventions are based on similar underlying principles, although larger trials are needed to confirm this.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号