期刊文献+
共找到20,882篇文章
< 1 2 250 >
每页显示 20 50 100
The eligibility criteria,training content,and scope of practice for prescriptive authority for midwives:a modified Delphi study 被引量:3
1
作者 Shi-Fan Han Hong-Xia Ren +2 位作者 Xiu-Juan Wang Xiao-Ding Yue Si-Yu Dou 《Frontiers of Nursing》 CAS 2019年第3期191-201,共11页
Objective:To investigate the necessary eligibility criteria for prescriptive authority for midwives,gather suggestions from experts on training content for prescriptive authority for midwives,and explore the scope of ... Objective:To investigate the necessary eligibility criteria for prescriptive authority for midwives,gather suggestions from experts on training content for prescriptive authority for midwives,and explore the scope of practice of their prescriptive authority in certain circumstances.The results of this study could serve as a reference for the development of policies on prescriptive authority for midwives.Methods:Based on a literature search and semistructured interviews,a modified Delphi method was first used to conduct 2 rounds of expert consultation on eligibility criteria and training content for prescriptive authority for midwives.This stage included nursing experts(20)and medical experts(16)engaged in midwifery in many tertiary Grade A hospitals in China.Subsequently,consultation on the scope of practice of prescriptive authority for midwives was conducted with nursing experts(18)and medical experts(14)engaged in midwifery in many tertiary Grade A hospitals in China.The suggestions from the experts were analyzed using statistical methods to confirm the eligibility criteria for prescriptive authority,training content,circumstances,scope of practice for prescriptive authority,and the prescription forms.Results:Among the consulted experts,70.59%(the highest acceptance rate)considered an undergraduate degree to be the minimum educational requirement for midwives to be eligible for prescriptive authority,85.29%(the highest acceptance rate)considered the supervisor nurse to be the minimum technical position experience necessary for midwives to be eligible for having prescriptive authority,and 50%(the highest acceptance rate)considered 5 years to be the minimum number of years of experience in the specialty for midwives to be eligible for prescriptive authority.The applicants should at least be practicing at Grade C hospitals,which was the consensus among 91.18%of the consulted experts.Among the consulted experts,100%,100%,97.06%,94.12%,and 94.12%agreed that the applicants should have knowledge in pharmacology,laws and ethics,nursing,diagnostics,and midwifery,respectively.The consulted experts confirmed 22 related course topics and identified 6 specific circumstances in which the midwives could partially practice prescriptive authority,including uterine atony,excessive uterine contraction,postpartum hemorrhage,premature rupture of fetal membranes,normal labor,and neonatal asphyxia.Under these 6 circumstances,the consulted experts commonly agreed that there were 20 medication prescriptions and 13 auxiliary examination prescriptions that could be prescribed by midwives.Of these prescriptions,51.5%were independent prescriptions,30.3%were protocol prescriptions,and the remaining 18.2%were both independent and protocol prescriptions.Conclusions:Midwives who have an undergraduate degree,supervisor nurse position,and 5 years of practice in Grade C hospitals are considered eligible to apply for prescriptive authority.Partial prescriptive authority could be granted after regulated training in fundamental theories and practices,which could improve the independence and professionalism of midwifery. 展开更多
关键词 Delphi study MIDWIFE ELIGIBILITY criteria training content circumstances SCOPE of practice prescriptive authority PRESCRIPTION forms
下载PDF
移动通信企业双向收费Authority-hub客户排序算法
2
作者 金海燕 宫雨 武森 《计算机应用》 CSCD 北大核心 2005年第B12期190-192,共3页
电信移动通话与网页分级问题有相似之处,都是通过连通(通话或链接)加强双方联系的重要程度。由此,受网页分级问题搜索引擎算法HITS(Hyperlink-Induced Topic Search)算法的启发,针对目前移动通信企业双向收费的现实,本文提出了双向收费A... 电信移动通话与网页分级问题有相似之处,都是通过连通(通话或链接)加强双方联系的重要程度。由此,受网页分级问题搜索引擎算法HITS(Hyperlink-Induced Topic Search)算法的启发,针对目前移动通信企业双向收费的现实,本文提出了双向收费Authority-hub客户排序算法。与其他客户分析方法相比,该算法对客户按价值进行排序时,不仅考虑了客户自身,而且考虑了客户之间的相互影响。 展开更多
关键词 HITS 客户分析 authority—hub
下载PDF
A distributed adaptive multi-hop certification authority schemefor mobile Ad Hoc networks 被引量:1
3
作者 TanXuezhi WuShaochuan JiaShilou 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2005年第2期265-272,共8页
This paper theoretically analyzes a deficiency of the existing scheme, and proposes a distributed multi-hop certification authority scheme for mobile Ad Hoc networks. In our design, we distribute the certification aut... This paper theoretically analyzes a deficiency of the existing scheme, and proposes a distributed multi-hop certification authority scheme for mobile Ad Hoc networks. In our design, we distribute the certification authority functions through a threshold secret sharing mechanism, in which each node holds a secret share and multiple nodes jointly provide complete services. Certification authority is not limited in a local neighborhood but can be completed within multi-hop location. In addition, we replace broadcast by multicast to improve system performance and reduce communication overhead. This paper resolves some technical problems of ubiquitous certification authority services, and presents a wieldy multi-hop certification authority algorithm. Simulation results confirm the availability and effectiveness of our design. 展开更多
关键词 mobile Ad Hoc networks threshold secret share certification authority.
下载PDF
Surface Temperature Anomalies in the River Niger Basin Development Authority Areas, Nigeria 被引量:1
4
作者 Joseph Sunday Babatolu Rufus Temidayo Akinnubi 《Atmospheric and Climate Sciences》 2013年第4期532-537,共6页
The study investigates the trends in temperature in the Upper and Lower Niger Basin Development Authority Areas using standardized Anomaly Index, Gaussian Low Pass and Spearman’s correlation coefficient. From the dat... The study investigates the trends in temperature in the Upper and Lower Niger Basin Development Authority Areas using standardized Anomaly Index, Gaussian Low Pass and Spearman’s correlation coefficient. From the data collected and analyzed, the mean annual temperature and mean annual maximum temperature demonstrated pronounced temporal increasing trend in the period 1951-2010 while the mean annual minimum temperature showed no trend. The rate of increase in mean annual temperature, mean annual maximum and minimum temperatures was 0.45°C, 0.40°C and 0.20°C respectively. The mean annual maximum temperature warmed faster than the mean annual minimum leading to increase in diurnal range of temperature. The annual temperature anomaly in the study area tracks the observed anomalies for the Northern Hemisphere in the 20th century. The decadal temperature increase is very small particularly as from 1980. 展开更多
关键词 Temperature ANOMALIES RIVER NIGER BASIN Development authority Area
下载PDF
The Authority Structure of Environmental Regulation under the Codification of Environmental Law 被引量:1
5
作者 Chen Demin Zhou Xian 《学术界》 CSSCI 北大核心 2020年第11期193-202,共10页
When developing and integrating a new environmental legal system under the Environmental Code,the joint regulation of ecology and environment,natural resources and an energy beyond the sphere of mere environmental con... When developing and integrating a new environmental legal system under the Environmental Code,the joint regulation of ecology and environment,natural resources and an energy beyond the sphere of mere environmental concerns can be achieved;the semantic expression of environmental regulation can be expounded.Additionally,through the codification of environmental law,a revolutionary path for the structure of authority can be found.Environmental codification dictates a method for clarification of the boundaries and relations of environmental management authority.Under the theory of Holistic Governance and in the codification process,the reform of environmental regulation authority should be concluded from both vertical and horizontal dimensions,through organizing,integrating,separating,classifying and finally,by establishing a synergy between the central and local governments and their departments.This can break down structural barriers to communication and cooperation of the ecological regulation and resource management authority and help establish uniformity of environmental regulation. 展开更多
关键词 COORDINATION UNIFORMITY Holistic Governance Environmental Code authority structure
下载PDF
Towards accountable authority attribute-based encryption 被引量:1
6
作者 王永涛 Chen Kefei Long Yu 《High Technology Letters》 EI CAS 2013年第1期82-87,共6页
An accountable authority attribute-based encryption (A-ABE) scheme is presented in this paper. The notion of accountable authority identity-based encryption (A-IBE) was first introduced by Goyal at Crypto'07. It ... An accountable authority attribute-based encryption (A-ABE) scheme is presented in this paper. The notion of accountable authority identity-based encryption (A-IBE) was first introduced by Goyal at Crypto'07. It is a novel approach to mitigate the (inherent) key escrow problem in identity-based cryptosystems. In this work, the concept of accountable authority to attribute-based encryption (ABE) setting is generalized for the first time, and then a construction is given. The scheme non-trivially integrates an A-IBE scheme proposed by Libert et al. with an ABE scheme. In our construction, a user will be identified by a pair ( id, o~), where id denotes the user' s identity and ω denotes the set of attributes associated to the user. In addition, our construction is shown to be secure under some reasonable assumptions. 展开更多
关键词 CRYPTOGRAPHY attribute-based encryption accountable authority key escrow TRACEABILITY
下载PDF
NC-MACPABE: Non-centered multi-authority proxy re-encryption based on CP-ABE for cloud storage systems 被引量:9
7
作者 XU Xiao-long ZHANG Qi-tong ZHOU Jing-lan 《Journal of Central South University》 SCIE EI CAS CSCD 2017年第4期807-818,共12页
The cloud storage service cannot be completely trusted because of the separation of data management and ownership, leading to the difficulty of data privacy protection. In order to protect the privacy of data on untru... The cloud storage service cannot be completely trusted because of the separation of data management and ownership, leading to the difficulty of data privacy protection. In order to protect the privacy of data on untrusted servers of cloud storage, a novel multi-authority access control scheme without a trustworthy central authority has been proposed based on CP-ABE for cloud storage systems, called non-centered multi-authority proxy re-encryption based on the cipher-text policy attribute-based encryption(NC-MACPABE). NC-MACPABE optimizes the weighted access structure(WAS) allowing different levels of operation on the same file in cloud storage system. The concept of identity dyeing is introduced to improve the users' information privacy further. The re-encryption algorithm is improved in the scheme so that the data owner can revoke user's access right in a more flexible way. The scheme is proved to be secure. And the experimental results also show that removing the central authority can resolve the existing performance bottleneck in the multi-authority architecture with a central authority, which significantly improves user experience when a large number of users apply for accesses to the cloud storage system at the same time. 展开更多
关键词 cloud storage data PRIVACY PROXY re-encryption multi-authority
下载PDF
The Resistance Under Man Authority:The Analysis of Meggie in the Thorn Birds
8
作者 张宪 温乃鹏 《海外英语》 2010年第10X期192-192,共1页
The Thorn Birds is a saga novel written by Colleen McCullough.Its story is about the deep love between Meggie and Father Ralph.This paper mainly analyzes Meggie's sensitive but persistent characteristics according... The Thorn Birds is a saga novel written by Colleen McCullough.Its story is about the deep love between Meggie and Father Ralph.This paper mainly analyzes Meggie's sensitive but persistent characteristics according to her behaviors,which reflects her resistance to man authority. 展开更多
关键词 MEGGIE MAN authority RESISTANCE
下载PDF
Influence of Civil Authority on Rural Grass-roots Democracy and Social Autonomy in Northwest Minority Regions
9
作者 Junlin DU 《Asian Agricultural Research》 2014年第1期75-79,83,共6页
System of villagers autonomy is one of the basic political systems in China and one of those systems ensuring that the people are the masters of the country. Northwest minorities generally live in the remote northwest... System of villagers autonomy is one of the basic political systems in China and one of those systems ensuring that the people are the masters of the country. Northwest minorities generally live in the remote northwestern China where economy and education are relatively underdeveloped compared with those in central and eastern China and civil authority has great influence on rural grass-roots democracy as well as social autonomy there,which causes difficulties to the development of rural democracy and social autonomy. Assisting northwest minority regions in overcoming the difficulties of developing grass-roots democracy and social autonomy,carrying out effective measures to properly guide the development and influence of civil authority and finally achieving the construction of new socialist countryside have great significance in ensuring that people there are the masters of their country. 展开更多
关键词 NORTHWEST MINORITY CIVIL authority Grass-roots dem
下载PDF
Variability and Trends of Daily Heavy Rainfall Events over Niger River Basin Development Authority Area in Nigeria
10
作者 Joseph Sunday Babatolu Rufus Temidayo Akinnubi +1 位作者 Akintade Taiwo Folagimi Omosuyi Oluwayemisi Bukola 《American Journal of Climate Change》 2014年第1期1-7,共7页
Using 70 years of daily rainfall records in eight stations, an analysis of variability and trends of daily heavy rainfall events over Niger River Basin Development Authority Area was carried out by using Standardized ... Using 70 years of daily rainfall records in eight stations, an analysis of variability and trends of daily heavy rainfall events over Niger River Basin Development Authority Area was carried out by using Standardized Anomaly Index and Spearman Rank Correlation Coefficient. Significant temporal variability on interannual and decadal time-scales was observed in the frequency of heavy rainfall events and annual heavy rainfall amount. Both the annual heavy rainfall amount and frequency of heavy rainfall events demonstrated no pronounced temporal decreasing or increasing trend. However, more recent data records from 1981 onwards revealed an increasing trend. Thus, evidence of a temporal change is apparent in heavy rainfall events in the last three decades in sympathy with global warming. 展开更多
关键词 RAINFALL ANOMALIES River NIGER Basin Development authority Area
下载PDF
The Constitution of Authority:the Past and Present of the Governance Order in Rural Areas
11
作者 Pan Xiaolei Li Hairong Wang Xiaona 《Contemporary Social Sciences》 2016年第2期47-63,共17页
How should the rural governance order be reconstructed centered on the new authority elements after the collapse of traditional rural governance order with the core of family authority, gentry authority and regime? Th... How should the rural governance order be reconstructed centered on the new authority elements after the collapse of traditional rural governance order with the core of family authority, gentry authority and regime? This is a major problem in the construction of new rural areas of contemporary China. This paper attempts to present a historical picture of the inversely proportional relationship between elements like regime, family authority, gentry authority, financial power, political power, civil rights, and so on, based on review of the change path of rural area governance order tracing back to traditional period, the period of the Republic of China, years before the founding of new China as well as period after reform and opening up. It is believed that"innovations"and"heritages"of traditions must be investigated in the transformation process for the rebuilding of a set of stable and reasonable governance order for rural areas, instead of cutting facts by a certain theory or design. In addition, the actual weight of every authority element in social structure and order in people’s mind should be faced up with, which should be integrated with"regulation"and"virtue". 展开更多
关键词 social transformation GOVERNANCE order authority structure RURAL areas
下载PDF
Exploration of deep seabed polymetallic sulphides: Scientific rationale and regulations of the International Seabed Authority
12
作者 Anju Pandey 《International Journal of Mining Science and Technology》 SCIE EI 2013年第3期457-462,共6页
Polymetallic sulphides have been consistent source of metals like iron, copper, zinc and lead. Apart from these they are also seen as economically viable resources of silver and gold. As the demand of these metals is ... Polymetallic sulphides have been consistent source of metals like iron, copper, zinc and lead. Apart from these they are also seen as economically viable resources of silver and gold. As the demand of these metals is showing an astoundingly increasing trend, the search for their resources has also increased in similar folds. This has resulted in many nations' focus on deep seabed resources of the polymetallic sulphides. Consequently, International Seabed Authority (ISBA) has provided 'Regulations' to obtain plan of work for exploration of polymetallic sulphide deposits in deep seabed 'Area'. Following the release of these Regulations, several countries are in the process of obtaining the licence for exploration of these metals from the deep seabed regions. Detailed information about the science and ISBA Regulations for exploration of polymetallic sulphide deposits is prerequisite to submit an application to ISBA for their exploration. The current contribution provides a comprehensive review of the science behind locating polymetallic sulphide deposits in geological setting of deep seabed as well as about the ISBA Regulations for their exploration. 展开更多
关键词 Polymetallic sulphide International Seabed authority Exploration Mid ocean ridges
下载PDF
HONG KONG HOUSING AUTHORITY ——THE EVOLUTION OF QUALITY
13
作者 贝德思 《Transactions of Nanjing University of Aeronautics and Astronautics》 EI 1998年第1期141-147,共7页
The Hong Kong housing authority houses a half po pulation of Hong Kong. It constructs and manages pro perty on a massive scale. In 1989, the housing authority makes the decision that by 1993, its construction proj... The Hong Kong housing authority houses a half po pulation of Hong Kong. It constructs and manages pro perty on a massive scale. In 1989, the housing authority makes the decision that by 1993, its construction project management arm, and all construction companies working for the Housing Authority would be certified to the ISO 9000 standard. This decision is to have a profound and lasting impact on the construction industry in Hong Kong. In 1996, a management enhancement programme is launched. Targeting all 15 000 staff in the housing department, the programme aims at changing the culture of the organization and its partners in delivering high calibre services to customers. This paper examines the motivation and reasons behind the initiatives. It outlines the approach and framework used as the authority changes the mindset of a large department of the civil service. 展开更多
关键词 quality management housing authority quality improvement
下载PDF
Beyond authorship: Analyzing contributions in PLOS ONE and the challenges of appropriate attribution 被引量:1
14
作者 Abdelghani Maddi Jaime A.Teixeira da Silva 《Journal of Data and Information Science》 CSCD 2024年第3期88-115,共28页
Purpose:This study aims to evaluate the accuracy of authorship attributions in scientific publications,focusing on the fairness and precision of individual contributions within academic works.Design/methodology/approa... Purpose:This study aims to evaluate the accuracy of authorship attributions in scientific publications,focusing on the fairness and precision of individual contributions within academic works.Design/methodology/approach:The study analyzes 81,823 publications from the journal PLOS ONE,covering the period from January 2018 to June 2023.It examines the authorship attributions within these publications to try and determine the prevalence of inappropriate authorship.It also investigates the demographic and professional profiles of affected authors,exploring trends and potential factors contributing to inaccuracies in authorship.Findings:Surprisingly,9.14%of articles feature at least one author with inappropriate authorship,affecting over 14,000 individuals(2.56%of the sample).Inappropriate authorship is more concentrated in Asia,Africa,and specific European countries like Italy.Established researchers with significant publication records and those affiliated with companies or nonprofits show higher instances of potential monetary authorship.Research limitations:Our findings are based on contributions as declared by the authors,which implies a degree of trust in their transparency.However,this reliance on self-reporting may introduce biases or inaccuracies into the dataset.Further research could employ additional verification methods to enhance the reliability of the findings.Practical implications:These findings have significant implications for journal publishers,Beyond authorship:Analyzing contributions in PLOS ONE and Maddi,A.,&the challenges of appropriate attribution highlighting the necessity for robust control mechanisms to ensure the integrity of authorship attributions.Moreover,researchers must exercise discernment in determining when to acknowledge a contributor and when to include them in the author list.Addressing these issues is crucial for maintaining the credibility and fairness of academic publications.Originality/value:This study contributes to an understanding of critical issues within academic authorship,shedding light on the prevalence and impact of inappropriate authorship attributions.By calling for a nuanced approach to ensure accurate credit is given where it is due,the study underscores the importance of upholding ethical standards in scholarly publishing. 展开更多
关键词 authorship Funding acquisition Research integrity author contributions CREDIT Inappropriate authorship APC ring
下载PDF
Engineering Authority and Trust in Cyberspace(Abstract)
15
作者 RaviSandhu 《计算机工程》 CAS CSCD 北大核心 1999年第S1期1-1,共1页
Over the past decade many point solutions to specific cyberspace security problems have becomeavailable. Nevertheless a comprehensive approach to architecting security in an organization’s informationsystems remains ... Over the past decade many point solutions to specific cyberspace security problems have becomeavailable. Nevertheless a comprehensive approach to architecting security in an organization’s informationsystems remains an elusive goal. This talk will describe an approach to meeting this goal and will identifyproblem areas that need to be solved to achieve this 展开更多
关键词 authority
下载PDF
The Research on the Characteristics of the Bureaucratic Administration -based upon the Classifications ofWeber's Legitimate Authority
16
作者 Jianping Liu Linfeng Zheng 《International Journal of Technology Management》 2013年第6期25-27,共3页
Political legitimacy is the question about how a regime could be stable and lasting. Max Weber, a scholar, defined legitimacy earliest and carried out a systematic study in the history. He divided the legitimate autho... Political legitimacy is the question about how a regime could be stable and lasting. Max Weber, a scholar, defined legitimacy earliest and carried out a systematic study in the history. He divided the legitimate authority into traditional authority, authority of charisma and authority of legal theory. This paper is just based upon authority rules of the three types, and discusses the organization's establishment, operational and managerial characteristics under the three kinds of authority. It is expected to provide references for reform of the administrative system. 展开更多
关键词 traditional authority authority of charisma authority of legal theory administration.
下载PDF
The Construction of Discourse Authority of the Silent Women—Reading I Stand Here Ironing From the Perspective of Feminist Narratology
17
作者 YUAN Guo-rong DONG Nan-nan 《Journal of Literature and Art Studies》 2018年第12期1645-1652,共8页
I Stand Here Ironing is Tillie Olsen’s first novel of her back to writing after several years’silence.It reflects the real living condition of marginalized women through the description of a daughter by the mother’... I Stand Here Ironing is Tillie Olsen’s first novel of her back to writing after several years’silence.It reflects the real living condition of marginalized women through the description of a daughter by the mother’s memories.Based on Susan S.Lanser’s distinction of three modes of narrative voice in feminist narratology,this paper analyzes three narrative voices in this novel.Olsen employs multiple narrative voices in the novel in order to release the voice of the marginalized women in the silence,she destroys the male’s authority and constructs the discourse authority of silent,poor working-class women. 展开更多
关键词 FEMINIST NARRATOLOGY NARRATIVE voice marginalized female discourse authority
下载PDF
Multi-authority proxy re-encryption based on CPABE for cloud storage systems 被引量:7
18
作者 Xiaolong Xu Jinglan Zhou +1 位作者 Xinheng Wang Yun Zhang 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2016年第1期211-223,共13页
The dissociation between data management and data ownership makes it difficult to protect data security and privacy in cloud storage systems.Traditional encryption technologies are not suitable for data protection in ... The dissociation between data management and data ownership makes it difficult to protect data security and privacy in cloud storage systems.Traditional encryption technologies are not suitable for data protection in cloud storage systems.A novel multi-authority proxy re-encryption mechanism based on ciphertext-policy attribute-based encryption(MPRE-CPABE) is proposed for cloud storage systems.MPRE-CPABE requires data owner to split each file into two blocks,one big block and one small block.The small block is used to encrypt the big one as the private key,and then the encrypted big block will be uploaded to the cloud storage system.Even if the uploaded big block of file is stolen,illegal users cannot get the complete information of the file easily.Ciphertext-policy attribute-based encryption(CPABE)is always criticized for its heavy overload and insecure issues when distributing keys or revoking user's access right.MPRE-CPABE applies CPABE to the multi-authority cloud storage system,and solves the above issues.The weighted access structure(WAS) is proposed to support a variety of fine-grained threshold access control policy in multi-authority environments,and reduce the computational cost of key distribution.Meanwhile,MPRE-CPABE uses proxy re-encryption to reduce the computational cost of access revocation.Experiments are implemented on platforms of Ubuntu and CloudSim.Experimental results show that MPRE-CPABE can greatly reduce the computational cost of the generation of key components and the revocation of user's access right.MPRE-CPABE is also proved secure under the security model of decisional bilinear Diffie-Hellman(DBDH). 展开更多
关键词 cloud storage data partition multi-authority security proxy re-encryption attribute-based encryption(ABE).
下载PDF
The Role of Traditional Rulers in Addressing Security Challenges: Reflections on Native Authority System in Colonial Sokoto Emirate, 1903-1960
19
作者 Attahiru Ahmad Sifawa 《Cultural and Religious Studies》 2020年第9期510-524,共15页
Sokoto Emirate was one of the three(later four)constituent emirates in colonial Sokoto Province,Northern Nigeria.The others being Sokoto,Gwandu,Argungu,and Yauri Emirates.It is located at the northwestern most part of... Sokoto Emirate was one of the three(later four)constituent emirates in colonial Sokoto Province,Northern Nigeria.The others being Sokoto,Gwandu,Argungu,and Yauri Emirates.It is located at the northwestern most part of Nigeria.The Sokoto Emirate covers the present day Sokoto and Zamfara states of Nigeria.During the British colonial administration,native authority(NA)system was a model of local government administration created under the“indirect rule system”.It was a system where by the pre-colonial traditional leadership institutions were modified and allowed to function in the local government administration introduced by the British.This paper assessed the role played by traditional leadership institutions in addressing security challenges during the British colonial administration of Sokoto Emirate.In particular,the role played by the NA in arresting Mahdist uprisings,and other related extremist religious movements on the one hand,as well as rural banditry,armed robbery,theft,among other security challenges in the emirate,are highlighted.The paper further argued that some of the roles played by the traditional leadership institutions in successfully addressing those challenges are still relevant in addressing the problems of insurgency on the one hand,and some of the recent emerging security challenges,in northwestern Nigeria,such as cattle rustling,rural banditry,kidnappings,robbery,and other related challenges. 展开更多
关键词 traditional rulers security challenges native authority
下载PDF
Factors Influencing the Successful Adoption of Human Resource Information System: The Content of Aqaba Special Economic Zone Authority
20
作者 Hisham Al-Mobaideen Sattam Allahawiah Eman Basioni 《Intelligent Information Management》 2013年第1期1-9,共9页
This study examines the key factors that have impact on the successful adoption of Human Resource Information System (HRIS) within the Aqaba Special Economic Zone Authority (ASEZA)/Jordan. In order to accomplish the p... This study examines the key factors that have impact on the successful adoption of Human Resource Information System (HRIS) within the Aqaba Special Economic Zone Authority (ASEZA)/Jordan. In order to accomplish the purpose of the study four critical factors are inquired. So, four critical factors are inquired: First, TAM Model (Perceived Ease of Use (PEOU) and Perceived Usefulness (PU)). Second, Information Technology Infrastructure (ITI). Third, Top Management Support (TMS). Finally, Individual Experience with Computer (IEC). The research model was applied to collect data from the questionnaires answered by 45 users of HRIS as a source of primary data, based on a convenience sample the response rate was about 91%. In addition, the results were analyzed by utilizing the Statistical Package for Social Software (SPSS). Furthermore, the findings were analyzed;multiple Regression analysis indicated that all research variables have significant relationship on successful adoption of HRIS. The findings indicated IT infrastructures have a positive and significant effect on the successful adoption of HRIS. But there is no significant of PU, PEOU, TMS, and IEC on the successful adoption of HRIS. Finally, the results indicated that no significant statistical differences of demographic characteristics on HRIS adoption. Depending on the research’s findings;the researchers proposed a set of recommendations for better adoption of HRIS in SEZA. 展开更多
关键词 Human Resource INFORMATION System (HRIS) Aqaba Special Economic Zone authority (ASEZA) PERCEIVED USEFULNESS (PU) INFORMATION Technology Infrastructure (ITI) Top Management Support (TMS) and Individual Experience with Computer (IEC)
下载PDF
上一页 1 2 250 下一页 到第
使用帮助 返回顶部