首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   41篇
  免费   3篇
  国内免费   3篇
教育   31篇
科学研究   9篇
综合类   3篇
信息传播   4篇
  2021年   1篇
  2020年   1篇
  2019年   3篇
  2018年   1篇
  2017年   4篇
  2016年   4篇
  2015年   2篇
  2013年   7篇
  2012年   2篇
  2011年   2篇
  2010年   4篇
  2008年   3篇
  2007年   2篇
  2006年   1篇
  2004年   4篇
  2003年   3篇
  2001年   2篇
  1977年   1篇
排序方式: 共有47条查询结果,搜索用时 31 毫秒
1.
传统轨迹匿名方法在匿名集生成时没有考虑用户多种特征属性,在信息攻击下无法有效保护真实位置;在轨迹形成方面因没有将余弦角度和轨迹间距离作为形成的依据,导致某些虚假轨迹无法有效保护真实轨迹。为改善以上问题,构建一种依据用户多重特征信息构建的匿名集以保证匿名有效性;采用协作用户的真实轨迹并计算相似性,从而生成虚假轨迹相似性高的MDF-Nearest算法。实验结果表明,该方法随着k值的变大与生成轨迹数量的增多,隐私保护效果逐渐改进;与传统k匿名方法相比,该算法时间开销降低41.7%,而隐私保护程度可提高至97.1%。因此该方法能以较低的时间开销,提供质量可靠的位置服务,保护用户信息。  相似文献   
2.
Facebook status updates provided the data for a study about the transition learning experiences of 1st-year university students. Strict ethical guidelines were proposed by the PhD researcher from the outset of the study. Anonymity was considered important for the approved ethical clearance for both the university and the participants. Phenomenography was adopted and adapted for the study because it both conceptually and methodologically managed anonymity as well as questions of authenticity. An ethical dilemma arose during the research because the archival parameters were expanded by the researcher to allow the collection of data from the participants’ network. Questions of consent in an online space and how to report findings, which included data from people unaware of their involvement in the research, needed to be considered.  相似文献   
3.
专家审稿实名制与匿名制之对比分析   总被引:5,自引:1,他引:4  
分析了实名制专家审稿与匿名制专家审稿的优劣性.提出了选择恰当审稿方式的原则.论述了如何选择合适的审稿方式,并对几种典型情况下应采取的审稿方式进行了剖析.指出了编辑在选择审稿方式后应注意的一些问题.  相似文献   
4.
为探讨道德自我认同对网络利他行为的影响机制,采用网络利他行为问卷、道德自我认同问卷、自尊量表以及感知匿名性问卷对704名大学生进行问卷调查。结果发现:(1)道德自我认同能够显著预测网络利他行为;(2)自尊在道德自我认同对网络利他行为的影响中起部分中介作用;(3)网络匿名性能够调节道德自我认同经由自尊影响网络利他行为的直接路径。本研究结果揭示了道德自我认同对网络利他行为的影响及其作用机制,为有效促进大学生的网络利他行为提供有益的理论指导。  相似文献   
5.
Between February 2011 and October 2013, Silk Road operated the largest and most sophisticated anonymous online marketplace for illegal drugs. More than a business venture, it was designed for anarcho-capitalist resistance to state power. The primary research question of this inquiry is: Can a stable market, defying the state, emerge under conditions of online anonymity? The article shows that Silk Road was built on a contradiction. On the one hand, strong cryptographic anonymity was embraced because it facilitated hiding from the state. On the other hand, the very same cryptographic anonymity made it difficult to impose rules and create a stable market. Silk Road sought to cultivate subcultural norms to ensure proper behavior in face of anonymity but they were not strong enough to control the behavior enabled by its architecture.  相似文献   
6.
《Africa Education Review》2013,10(4):552-566
ABSTRACT

A primary principle of ethical codes in research involving people is that of informed consent which ensures participants’ right to privacy, confidentiality and anonymity. A blanket application of the principle of anonymity to Oral History (OH) research could well be counterproductive to the purported aims of OH research. The research comprised a literature study. Four rationales for doing OH are discussed and positioned within the philosophical framework that informs the purpose of and methodological approach to the research. Examples are extracted to explain where the principle of anonymity could be at variance with the research aims. When OH research sets out to contribute to historical understanding, validate respondents’ lives, contribute to democracy and facilitate socio-political transformation, enforcing anonymity has the potential to denigrate the respondent and jeopardize research credibility. Researchers should question whether the unmitigated application of the principle of anonymity restricts them from achieving their mandate of affording respondents’ dignity, respect, autonomy and beneficence.  相似文献   
7.
The present study employed an experimental design to examine the influence of knowledge of a student’s previous performance and the general quality of their writing style on the assessment of undergraduate student work. Fifteen sport and exercise physiology academics were asked to mark and give feedback on two final year undergraduate student essays. The first student essay that participants marked was a control essay. The second essay was the target essay. Participants read one of three student reputation profiles (positive, negative or neutral) prior to marking this essay. Kruskal–Wallis tests for difference indicated that the marks awarded to each essay did not significantly differ between the three student reputation conditions. Thematic analysis of the target essay also revealed no apparent differences in the way in which feedback was presented across the three student reputation profiles. It was therefore concluded that non-anonymous marking did not induce marker bias in this instance.  相似文献   
8.
对WTLS握手协议的安全性能进行分析,指出其存在的安全缺陷和可能产生的安全威胁,利用签名加密机制对握手协议进行了改进,以实现向前保密和用户匿名保护,最后对改进协议的安全性作了讨论.  相似文献   
9.
弗吉尼亚·伍尔夫是女权主义运动的经典作家,在创作后期,她摆脱了女性作家的身份焦虑及社会荣誉、头衔、地位等对作家精神的束缚,奉行“匿名”哲学,坚持“局外人”立场。在创作上积极转向大众,关注原始的天然之声;鼓励普通读者介入文学,努力弥合作者与读者之间的鸿沟。  相似文献   
10.
This quasi-experimental study aimed to examine the impact of anonymity and training (an alternative strategy when anonymity was unattainable) on students’ performance and perceptions in formative peer assessment. The training in this study focused on educating students to understand and appreciate formative peer assessment. A sample of 77 students participated in a peer assessment activity in three conditions: a group with participants’ identities revealed (Identity Group), a group with anonymity provided (Anonymity Group) and a group with identities revealed but training provided (Training Group). Data analysis indicated that both the Anonymity Group and Training Group outperformed the Identity Group on projects. In terms of perceptions, however, the Training Group appreciated the value of peer assessment more and experienced less pressure in the process than the other two groups.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号