首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   155篇
  免费   28篇
  国内免费   13篇
  196篇
  2025年   2篇
  2024年   1篇
  2023年   4篇
  2022年   8篇
  2021年   6篇
  2020年   10篇
  2019年   13篇
  2018年   7篇
  2017年   12篇
  2016年   11篇
  2015年   8篇
  2014年   8篇
  2013年   22篇
  2012年   6篇
  2011年   7篇
  2010年   7篇
  2009年   4篇
  2008年   6篇
  2007年   9篇
  2006年   13篇
  2005年   10篇
  2004年   12篇
  2003年   6篇
  2002年   2篇
  1998年   1篇
  1985年   1篇
排序方式: 共有196条查询结果,搜索用时 0 毫秒
171.
根据具身认知理论,人们的认知会受到身体活动的影响。网络环境下人的身体活动受到限制,因而其认知活动与非网络环境存在很大的差异。本研究目的在于考察人们对网络词语与非网络的日常词语的时间知觉,空间距离知觉与知觉范围是否有差异。结果发现被试对网络词语的时间知觉更长;网络词语的空间距离感与日常词语没有显著差异;在启动网络词语之后,被试的知觉范围缩小,对中心刺激的反应显著快于边缘刺激。本研究发现了网络词语加工在时间知觉和知觉范围上的变化。  相似文献   
172.
网络成瘾与吸烟、饮酒等物质成瘾具有许多相似性,因此也可能存在类似的认知偏向和神经机制。本研究采用事件相关电位技术,通过点探测范式研究网络游戏过度使用者的注意偏向问题。结果显示:(1)与一般使用者相比,网络游戏过度使用者存在明显的注意偏向;(2)游戏图片对网络游戏过度使用者诱发的P2的振幅小于一般使用者;(3)网络游戏过度使用者对游戏图片位置上出现的探测点的加工(P1)较早。结果提示,网络游戏过度使用者的注意偏向存在特定的脑电模式。  相似文献   
173.
Anonymous speech plays a fundamental role in America’s political history. However, that long tradition of anonymous communications faces an image problem in today’s age of spam, computer viruses, spyware, denial-of-service attacks on websites, and identity theft. The criminals and hackers who perpetrate these insults on the commercial Internet are, for the most part, anonymous; we simply do not know the identities of these bad guys. Yet, the promise of anonymous communications is vital to the preservation of political liberty across the globe. Therefore, how should we regard anonymity in a digital age? And how should we strike the right balance between security and anonymity online? To begin, we should not consider the outlawing of anonymous communications as the answer to today’s cybersecurity threats. Commercial sector “regulation” of anonymity, so to speak, can play a significant role in combating these problems. Increasingly, online authentication has become important to both personal security and to cybersecurity in general. Some recent proposals toward bolstering security have included greater authentication of the source of emails to deal with spam and the requirement that those who conduct transactions online reveal their identities – seeming violations of online culture. Policymakers also want a say in the matter, and as the process unfolds, they might feel increasingly tempted to intervene whenever issues impacting privacy and authentication emerge in debates over telecommunications, intellectual property, biometrics, cybersecurity, and more. Regardless, government should not strip us of our anonymity online. Cybersecurity concerns may instead call for the marketplace – not regulators – to deal with the fact that many threats stem from that very lack of authentication. The inclusion of greater authentication standards into online services by private vendors will lead to their working in concert in unprecedented ways that may draw attention from regulatory and antitrust authorities. But these private, experimental efforts have no implications for political liberty – nor are they anticompetitive. Private solutions are the only real hope we have for decreasing cybersecurity threats, given that previous government efforts to regulate the Internet – for example, outlawing spam in 2004 – have not lived up to expectations. Political anonymity and commercial anonymity are not the same thing, and the distinction requires better appreciation. Over the coming tumultuous period of dealing with online threats, policymakers should allow the experimentation necessary to cope with today’s lack of online authentication to proceed with minimal interference.  相似文献   
174.
    
The ready availability and intense imagery of contemporary pornography raises considerable public concern about its effect on society in general and on the minds of young people in particular. This paper seeks to understand its transgressive nature and its widespread appeal from a psychoanalytic perspective with reference to Chasseguet- Smirgel’s (1984) concept of the ‘anal-sadistic universe’ and Kohut’s (1972) theory of narcissism. The world of pornography can be seen as providing the individual with the possibility of narcissistic retreat from the frustrations and humiliations of the outside world. In this essentially self-enclosed illusory inner experience, he or she can conjure up a fantasy of unchallenged omnipotence in which, through the screen, anything can be arranged and commanded. Pornography feeds on normal adolescent narcissistic preoccupations; it provides a special, private place in which to hide and play out various fantasies without restraint. This is much more problematic for those adolescents who are more insecure and vulnerable and whose need to take flight from the external world and seek in pornographic fantasy a sense of grandeur and sexual potency is all the greater. It is these adolescents who become so much more immersed in their porn retreat and are so much more at risk of suffering emotional harm.  相似文献   
175.
    
While the efficacy of couple therapy has been repeatedly demonstrated, most distressed couples do not seek treatment. To improve reach and overcome barriers to therapy, Integrative Behavioral Couple Therapy (IBCT) was translated into a web-based program, OurRelationship (OR). While both IBCT and OR have been shown to improve relationship and individual functioning, the goal of the present study was to compare the relative cost effectiveness of these two treatment modalities. In IBCT, 74% of couples experienced reliable improvement, compared to 55% of couples in OR. Within-group Cohen's d effect sizes during treatment for relationship satisfaction were = 0.87 for IBCT and d = 0.96 for OR. Relative cost effectiveness analyses revealed that even at the highest expense estimates for OR and the lowest expense estimates for IBCT, OR was more cost effective in creating reliable improvement once at least 229 couples were served and was more cost effective in creating large-size effects once at least 153 couples were served. Cost-effectiveness increases for both IBCT and OR as more couples are served; however, this cost savings occurs at a much more rapid rate for OR. These findings demonstrate that despite higher initial development costs, Internet programs are a cost-effective option for dissemination either as a stand-alone service or as an initial intervention in a stepped care model with more intensive in-person services.  相似文献   
176.
    
The inclusion of Internet Gaming Disorder (IGD) in the fifth revision of the Diagnostic and Statistical Manual of Mental Disorders (DSM-5) by the American Psychiatric Association and Gaming Disorder in the 11th revision of the International Classification of Diseases (ICD-11) by the World Health Organization requires consistent psychological measures for reliable estimates. The current study aimed to investigate the psychometric properties of the Gaming Disorder Test (GDT), the Ten-Item Internet Gaming Disorder Test (IGDT-10), and the Five-Item Gaming Disorder Test (GDT-5) and to compare the WHO and the APA frameworks of gaming disorder symptoms in terms of psychopathological symptoms, life satisfaction, and personality traits.  相似文献   
177.
《Behavior Therapy》2022,53(6):1205-1218
Persistent somatic symptoms of varying etiology are very common in emerging adults and can lead to distress and impairment. Internet-delivered interventions could help to prevent the burden and chronicity of persistent somatic symptoms. This study investigated the impact of therapist guidance on the effectiveness of a cognitive-behavioral Internet intervention for somatic symptom distress (iSOMA) in emerging adults, as a secondary analysis of a two-armed randomized controlled trial. We included 149 university students (83.2% female, 24.60 yrs) with varying degrees of somatic symptom distress who were either allocated to the 8-week intervention with regular, written therapeutic guidance (iSOMA guided) or to the control group (waitlist), which was afterwards crossed over to receive iSOMA with guidance-on-demand (iSOMA-GoD). Primary outcomes were somatic symptom distress (assessed by the PHQ-15) and psychobehavioral symptoms of the somatic symptom disorder (assessed by the SSD-12) at pre- and post-treatment. Secondary outcomes included depression, anxiety, and disability. Both treatments showed statistically significant pre-post improvements in primary (iSOMA-guided: d = 0.86–0.92, iSOMA-GoD: d = 0.55–0.63) and secondary outcomes. However, intention-to-treat analysis revealed non-significant between-group effects for all outcomes (ps ≥ .335), after controlling for confounding variables, and effect sizes were marginal (d = −0.06 to 0.12). Overall, our findings indicate that Internet-delivered cognitive behavioral therapy with regular guidance is not unequivocally superior to guidance-on-demand in alleviating somatic symptom distress and associated psychopathology in emerging adults. As a next step, non-inferiority studies are needed to test the robustness of these findings and their impact on clinical populations.  相似文献   
178.
179.
本研究基于有限自制力理论考察闯入性思维对网络成瘾的影响及自我控制的中介作用和认知重评的调节作用。以371名大学生为被试,采用闯入性思维量表、自我控制量表、认知重评量表和网络成瘾量表进行测试,结果发现:(1)闯入性思维和自我控制呈显著负相关,与网络成瘾呈显著正相关;自我控制与网络成瘾呈显著负相关。(2)闯入性思维通过自我控制的中介作用对网络成瘾产生影响。(3)“闯入性思维—自我控制—网络成瘾”这一中介效应的前半段受到认知重评的影响;与低认知重评的个体相比,闯入性思维对高认知重评个体自我控制的影响更小。表达抑制不能调节闯入性思维对自我控制的影响。本研究的结果表明,闯入性思维会通过降低自我控制来增加网络成瘾的风险,而且认知重评会削弱闯入性思维对自我控制的影响。  相似文献   
180.
采用问卷法对813名大学生进行调查,探讨社会阶层、公正世界信念、网络社会支持与大学生网络利他行为之间的关系及内在作用机制。结果发现:(1)客观社会阶层不能显著预测网络利他行为,主观社会阶层能正向预测网络利他行为;(2)公正世界信念在主观社会阶层与网络利他行为的关系中起部分中介作用;(3)网络社会支持调节了公正世界信念的中介作用。对于高网络社会支持个体,公正世界信念起部分中介作用;而对于低网络社会支持个体,公正世界信念的中介效应不显著,主观社会阶层对网络利他行为只有直接效应。  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号