In recent years, a number of organisations have implemented Executive Information Systems (EIS) including Computer-Based Information Systems (CBIS) in order to improve the performance of their executives' jobs th...In recent years, a number of organisations have implemented Executive Information Systems (EIS) including Computer-Based Information Systems (CBIS) in order to improve the performance of their executives' jobs though the majority of executives are unwilling to use EIS applications because of their design defects. Present researches on Executive Information Systems (EIS) are limited and less focused on the factors associated with EIS successful usage. This research adopts an extension of the Technology Acceptance Model (TAM) to derive useful variables to address the problem of the low usage of EIS by executives due to social factors, habits and facilitation conditions variables in Triandis' Framework. It reports on the adoption and usage of EIS by the executives in Organizations. The results show that experience in EIS usage was high with most respondents having used EIS for between 0 to 4 years (72.41%), followed by the 5-9 years group with 25.86%. However, in terms of ability to use EIS, most executives were at the expert (knowledgeable), casual user with 37.93%, followed by novice frequent user group with 31.03%. From this research, the authors propose a model that incorporates the habits, social factors and facilitating conditions in an Executive Information Systems.展开更多
This study examines the key factors that have impact on the successful adoption of Human Resource Information System (HRIS) within the Aqaba Special Economic Zone Authority (ASEZA)/Jordan. In order to accomplish the p...This study examines the key factors that have impact on the successful adoption of Human Resource Information System (HRIS) within the Aqaba Special Economic Zone Authority (ASEZA)/Jordan. In order to accomplish the purpose of the study four critical factors are inquired. So, four critical factors are inquired: First, TAM Model (Perceived Ease of Use (PEOU) and Perceived Usefulness (PU)). Second, Information Technology Infrastructure (ITI). Third, Top Management Support (TMS). Finally, Individual Experience with Computer (IEC). The research model was applied to collect data from the questionnaires answered by 45 users of HRIS as a source of primary data, based on a convenience sample the response rate was about 91%. In addition, the results were analyzed by utilizing the Statistical Package for Social Software (SPSS). Furthermore, the findings were analyzed;multiple Regression analysis indicated that all research variables have significant relationship on successful adoption of HRIS. The findings indicated IT infrastructures have a positive and significant effect on the successful adoption of HRIS. But there is no significant of PU, PEOU, TMS, and IEC on the successful adoption of HRIS. Finally, the results indicated that no significant statistical differences of demographic characteristics on HRIS adoption. Depending on the research’s findings;the researchers proposed a set of recommendations for better adoption of HRIS in SEZA.展开更多
The integrated linkage control problem based on attack detection is solved with the analyses of the security model including firewall, intrusion detection system (IDS) and vulnerability scan by game theory. The Nash...The integrated linkage control problem based on attack detection is solved with the analyses of the security model including firewall, intrusion detection system (IDS) and vulnerability scan by game theory. The Nash equilibrium for two portfolios of only deploying IDS and vulnerability scan and deploying all the technologies is investigated by backward induction. The results show that when the detection rates of IDS and vulnerability scan are low, the firm will not only inspect every user who raises an alarm, but also a fraction of users that do not raise an alarm; when the detection rates of IDS and vulnerability scan are sufficiently high, the firm will not inspect any user who does not raise an alarm, but only inspect a fraction of users that raise an alarm. Adding firewall into the information system impacts on the benefits of firms and hackers, but does not change the optimal strategies of hackers, and the optimal investigation strategies of IDS are only changed in certain cases. Moreover, the interactions between IDS & vulnerability scan and firewall & IDS are discussed in detail.展开更多
文章基于长江经济带非金属矿产数据,利用地理信息系统(geographic information system,GIS)空间分析方法和脱钩模型研究2007—2018年期间该地区非金属矿采矿权分布的时空变化特征。结果表明:非金属矿开采重心呈现出向西部地区移动的趋势...文章基于长江经济带非金属矿产数据,利用地理信息系统(geographic information system,GIS)空间分析方法和脱钩模型研究2007—2018年期间该地区非金属矿采矿权分布的时空变化特征。结果表明:非金属矿开采重心呈现出向西部地区移动的趋势;非金属矿采矿权分布呈现“西南—东北”的空间格局,且非金属矿高开采强度区呈现出收缩趋势;非金属矿采矿权分布具有显著的空间正相关特性,其中,高-高类型区域分布在贵州、江西等省份,低-低类型区域分布在浙江、江苏、安徽等省份;非金属矿采矿权面积与经济增长脱钩状态稳定,脱钩情况理想,经济发展对非金属矿产开发依赖性减小;建筑石料用灰岩采矿权分布的时空规律和非金属矿采矿权分布的时空规律相似,均呈现开采重心向西部偏移的态势。该研究结果反映了在2007—2018年中国经济高速发展期间,长江经济带非金属矿采矿权分布的时空特征变化及其影响因素,为今后非金属矿产资源开发空间布局优化提供空间决策参考。展开更多
文摘In recent years, a number of organisations have implemented Executive Information Systems (EIS) including Computer-Based Information Systems (CBIS) in order to improve the performance of their executives' jobs though the majority of executives are unwilling to use EIS applications because of their design defects. Present researches on Executive Information Systems (EIS) are limited and less focused on the factors associated with EIS successful usage. This research adopts an extension of the Technology Acceptance Model (TAM) to derive useful variables to address the problem of the low usage of EIS by executives due to social factors, habits and facilitation conditions variables in Triandis' Framework. It reports on the adoption and usage of EIS by the executives in Organizations. The results show that experience in EIS usage was high with most respondents having used EIS for between 0 to 4 years (72.41%), followed by the 5-9 years group with 25.86%. However, in terms of ability to use EIS, most executives were at the expert (knowledgeable), casual user with 37.93%, followed by novice frequent user group with 31.03%. From this research, the authors propose a model that incorporates the habits, social factors and facilitating conditions in an Executive Information Systems.
文摘This study examines the key factors that have impact on the successful adoption of Human Resource Information System (HRIS) within the Aqaba Special Economic Zone Authority (ASEZA)/Jordan. In order to accomplish the purpose of the study four critical factors are inquired. So, four critical factors are inquired: First, TAM Model (Perceived Ease of Use (PEOU) and Perceived Usefulness (PU)). Second, Information Technology Infrastructure (ITI). Third, Top Management Support (TMS). Finally, Individual Experience with Computer (IEC). The research model was applied to collect data from the questionnaires answered by 45 users of HRIS as a source of primary data, based on a convenience sample the response rate was about 91%. In addition, the results were analyzed by utilizing the Statistical Package for Social Software (SPSS). Furthermore, the findings were analyzed;multiple Regression analysis indicated that all research variables have significant relationship on successful adoption of HRIS. The findings indicated IT infrastructures have a positive and significant effect on the successful adoption of HRIS. But there is no significant of PU, PEOU, TMS, and IEC on the successful adoption of HRIS. Finally, the results indicated that no significant statistical differences of demographic characteristics on HRIS adoption. Depending on the research’s findings;the researchers proposed a set of recommendations for better adoption of HRIS in SEZA.
基金The National Natural Science Foundation of China(No.71071033)the Innovation Project of Jiangsu Postgraduate Education(No.CX10B_058Z)
文摘The integrated linkage control problem based on attack detection is solved with the analyses of the security model including firewall, intrusion detection system (IDS) and vulnerability scan by game theory. The Nash equilibrium for two portfolios of only deploying IDS and vulnerability scan and deploying all the technologies is investigated by backward induction. The results show that when the detection rates of IDS and vulnerability scan are low, the firm will not only inspect every user who raises an alarm, but also a fraction of users that do not raise an alarm; when the detection rates of IDS and vulnerability scan are sufficiently high, the firm will not inspect any user who does not raise an alarm, but only inspect a fraction of users that raise an alarm. Adding firewall into the information system impacts on the benefits of firms and hackers, but does not change the optimal strategies of hackers, and the optimal investigation strategies of IDS are only changed in certain cases. Moreover, the interactions between IDS & vulnerability scan and firewall & IDS are discussed in detail.
文摘文章基于长江经济带非金属矿产数据,利用地理信息系统(geographic information system,GIS)空间分析方法和脱钩模型研究2007—2018年期间该地区非金属矿采矿权分布的时空变化特征。结果表明:非金属矿开采重心呈现出向西部地区移动的趋势;非金属矿采矿权分布呈现“西南—东北”的空间格局,且非金属矿高开采强度区呈现出收缩趋势;非金属矿采矿权分布具有显著的空间正相关特性,其中,高-高类型区域分布在贵州、江西等省份,低-低类型区域分布在浙江、江苏、安徽等省份;非金属矿采矿权面积与经济增长脱钩状态稳定,脱钩情况理想,经济发展对非金属矿产开发依赖性减小;建筑石料用灰岩采矿权分布的时空规律和非金属矿采矿权分布的时空规律相似,均呈现开采重心向西部偏移的态势。该研究结果反映了在2007—2018年中国经济高速发展期间,长江经济带非金属矿采矿权分布的时空特征变化及其影响因素,为今后非金属矿产资源开发空间布局优化提供空间决策参考。