期刊文献+
共找到3,132篇文章
< 1 2 157 >
每页显示 20 50 100
A Study of Triangle Inequality Violations in Social Network Clustering
1
作者 Sanjit Kumar Saha Tapashi Gosswami 《Journal of Computer and Communications》 2024年第1期67-76,共10页
Clustering a social network is a process of grouping social actors into clusters where intra-cluster similarities among actors are higher than inter-cluster similarities. Clustering approaches, i.e. , k-medoids or hie... Clustering a social network is a process of grouping social actors into clusters where intra-cluster similarities among actors are higher than inter-cluster similarities. Clustering approaches, i.e. , k-medoids or hierarchical, use the distance function to measure the dissimilarities among actors. These distance functions need to fulfill various properties, including the triangle inequality (TI). However, in some cases, the triangle inequality might be violated, impacting the quality of the resulting clusters. With experiments, this paper explains how TI violates while performing traditional clustering techniques: k-medoids, hierarchical, DENGRAPH, and spectral clustering on social networks and how the violation of TI affects the quality of the resulting clusters. 展开更多
关键词 CLUSTERING Triangle Inequality violations Traditional Clustering Graph Clustering
下载PDF
AI-Based Helmet Violation Detection for Traffic Management System
2
作者 Yahia Said YahyaAlassaf +5 位作者 Refka Ghodhbani Yazan Ahmad Alsariera Taoufik Saidani Olfa Ben Rhaiem Mohamad Khaled Makhdoum Manel Hleili 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第10期733-749,共17页
Enhancing road safety globally is imperative,especially given the significant portion of traffic-related fatalities attributed to motorcycle accidents resulting from non-compliance with helmet regulations.Acknowledgin... Enhancing road safety globally is imperative,especially given the significant portion of traffic-related fatalities attributed to motorcycle accidents resulting from non-compliance with helmet regulations.Acknowledging the critical role of helmets in rider protection,this paper presents an innovative approach to helmet violation detection using deep learning methodologies.The primary innovation involves the adaptation of the PerspectiveNet architecture,transitioning from the original Res2Net to the more efficient EfficientNet v2 backbone,aimed at bolstering detection capabilities.Through rigorous optimization techniques and extensive experimentation utilizing the India driving dataset(IDD)for training and validation,the system demonstrates exceptional performance,achieving an impressive detection accuracy of 95.2%,surpassing existing benchmarks.Furthermore,the optimized PerspectiveNet model showcases reduced computational complexity,marking a significant stride in real-time helmet violation detection for enhanced traffic management and road safety measures. 展开更多
关键词 Non-helmet use detection traffic violation SAFETY deep learning optimized PerspectiveNet
下载PDF
Fermions: Spin, Hidden Variables, Violation of Bell’s Inequality and Quantum Entanglement
3
作者 Doron Kwiat 《Journal of High Energy Physics, Gravitation and Cosmology》 CAS 2024年第4期1613-1627,共15页
Using real fields instead of complex ones, it was recently claimed, that all fermions are made of pairs of coupled fields (strings) with an internal tension related to mutual attraction forces, related to Planck’s co... Using real fields instead of complex ones, it was recently claimed, that all fermions are made of pairs of coupled fields (strings) with an internal tension related to mutual attraction forces, related to Planck’s constant. Quantum mechanics is described with real fields and real operators. Schrodinger and Dirac equations then are solved. The solution to Dirac equation gives four, real, 2-vectors solutions ψ1=(U1D1)ψ2=(U2D2)ψ3=(U3D3)ψ4=(U4D4)where (ψ1,ψ4) are coupled via linear combinations to yield spin-up and spin-down fermions. Likewise, (ψ2,ψ3) are coupled via linear combinations to represent spin-up and spin-down anti-fermions. For an incoming entangled pair of fermions, the combined solution is Ψin=c1ψ1+c4ψ4where c1and c4are some hidden variables. By applying a magnetic field in +Z and +x the theoretical results of a triple Stern-Gerlach experiment are predicted correctly. Then, by repeating Bell’s and Mermin Gedanken experiment with three magnetic filters σθ, at three different inclination angles θ, the violation of Bell’s inequality is proven. It is shown that all fermions are in a mixed state of spins and the ratio between spin-up to spin-down depends on the hidden variables. 展开更多
关键词 FERMIONS SPIN Hidden Variables Bell’s Inequality violation Spin Entanglement
下载PDF
The Equation for the CP Violating Phase for Quarks: The Rule for the Sum of Quark Oscillation Probabilities
4
作者 Zoran B. Todorovic 《Journal of High Energy Physics, Gravitation and Cosmology》 CAS 2024年第4期1835-1865,共31页
By applying the rules for the sum of quark oscillation probabilities for the original CKM matrix and for Wolfenstein’s parameterization, equations were derived in which the CP violating phase for quarks appears as an... By applying the rules for the sum of quark oscillation probabilities for the original CKM matrix and for Wolfenstein’s parameterization, equations were derived in which the CP violating phase for quarks appears as an unknown quantity. Quark oscillations occur in spaces that are on the femtometer scale and they are unmeasurable from the point of view of experiments. However, the consequence of those oscillations is the CP violating phase for quarks, which is measured through unitary triangles in Wolfenstein’s parameterization. Through the mathematical model presented in this paper, the equation in Wolfenstein’s parameterization was derived, the root of which is consistent with measurements in today’s quark physics. 展开更多
关键词 QUARKS CKM Matrix PMNS Matrix Wolfenstein Parameterization CP violation Phase Jarlskog Invariant
下载PDF
Determination of Liability for Violation of “Sexual Autonomy” and Compensation for Mental Damages
5
作者 姚邢 JIANG Lin(Translated) 《The Journal of Human Rights》 2024年第2期347-372,共26页
At the legislative level in China,there has been insufficient theoretical preparation to explicitly include“sexual autonomy”within the scope of general personality rights.In handling the increasing number of dispute... At the legislative level in China,there has been insufficient theoretical preparation to explicitly include“sexual autonomy”within the scope of general personality rights.In handling the increasing number of disputes related to violations of“sexual autonomy,”judicial biases have emerged during the trial process when courts determine the attribute of the right to“sexual autonomy.”This situation necessitates a clear legal analysis of the concept and attributes of“sexual autonomy”to establish its essential attribute as a personality right,and,from the perspective of legal doctrine,enable the justification of the right to“sexual autonomy”as either a general personality right or other personality interests,thereby providing theoretical support for courts to“adjudicate according to law.”By delineating and categorizing instances of violations of“sexual autonomy,”the constitutive elements and fundamental characteristics of such violations can be clarified.By examining the legal norms governing civil litigation and civil litigation associated with criminal cases concerning violations of“sexual autonomy,”the responsibility determination,remedies,and existing regulatory loopholes regarding violations of“sexual autonomy,”especially in cases involving both criminal and civil matters,can be defined.Based on this foundation,the legal basis,determination mechanism,and compensation standards for claiming compensation for mental damages resulting from violations of“sexual autonomy”can be elucidated. 展开更多
关键词 sexual autonomy personality rights violations liability investigation
下载PDF
SVR-Miner:Mining Security Validation Rules and Detecting Violations in Large Software 被引量:1
6
作者 梁彬 谢素斌 +2 位作者 石文昌 梁朝晖 陈红 《China Communications》 SCIE CSCD 2011年第4期84-98,共15页
For various reasons,many of the security programming rules applicable to specific software have not been recorded in official documents,and hence can hardly be employed by static analysis tools for detection.In this p... For various reasons,many of the security programming rules applicable to specific software have not been recorded in official documents,and hence can hardly be employed by static analysis tools for detection.In this paper,we propose a new approach,named SVR-Miner(Security Validation Rules Miner),which uses frequent sequence mining technique [1-4] to automatically infer implicit security validation rules from large software code written in C programming language.Different from the past works in this area,SVR-Miner introduces three techniques which are sensitive thread,program slicing [5-7],and equivalent statements computing to improve the accuracy of rules.Experiments with the Linux Kernel demonstrate the effectiveness of our approach.With the ten given sensitive threads,SVR-Miner automatically generated 17 security validation rules and detected 8 violations,5 of which were published by Linux Kernel Organization before we detected them.We have reported the other three to the Linux Kernel Organization recently. 展开更多
关键词 static analysis data mining automated validation rules extraction automated violation detection
下载PDF
Investigating the factors affecting traffic violations based on electronic enforcement data:A case study in Shangyu,China 被引量:1
7
作者 Fan Haoxuan Ren Gang +1 位作者 Li Haojie Ma Jingfeng 《Journal of Southeast University(English Edition)》 EI CAS 2021年第2期227-236,共10页
To study the influencing factors of traffic violations,this study investigated the effects of vehicle attribution,day of week,time of day,location of traffic violations,and weather on traffic violations based on the e... To study the influencing factors of traffic violations,this study investigated the effects of vehicle attribution,day of week,time of day,location of traffic violations,and weather on traffic violations based on the electronic enforcement data and historical weather data obtained in Shangyu,China.Ten categories of traffic violations were determined from the raw data.Then,chi-square tests were used to analyze the relationship between traffic violations and the potential risk factors.Multinomial logistic regression analyses were conducted to further estimate the effects of different risk factors on the likelihood of the occurrence of traffic violations.By analyzing the results of chi-square tests via SPSS,the five factors above were all determined as significant factors associated with traffic violations.The results of the multinomial logistic regression revealed the significant effects of the five factors on the likelihood of the occurrence of corresponding traffic violations.The conclusions are of great significance for the development of effective traffic intervention measures to reduce traffic violations and the improvement of road traffic safety. 展开更多
关键词 traffic violations road traffic safety electronic enforcement data multinomial logistic regression influencing factors
下载PDF
Using Excel to Explore the Effects of Assumption Violations on One-Way Analysis of Variance (ANOVA) Statistical Procedures
8
作者 William Laverty Ivan Kelly 《Open Journal of Statistics》 2019年第4期458-469,共12页
To understand any statistical tool requires not only an understanding of the relevant computational procedures but also an awareness of the assumptions upon which the procedures are based, and the effects of violation... To understand any statistical tool requires not only an understanding of the relevant computational procedures but also an awareness of the assumptions upon which the procedures are based, and the effects of violations of these assumptions. In our earlier articles (Laverty, Miket, & Kelly [1]) and (Laverty & Kelly, [2] [3]) we used Microsoft Excel to simulate both a Hidden Markov model and heteroskedastic models showing different realizations of these models and the performance of the techniques for identifying the underlying hidden states using simulated data. The advantage of using Excel is that the simulations are regenerated when the spreadsheet is recalculated allowing the user to observe the performance of the statistical technique under different realizations of the data. In this article we will show how to use Excel to generate data from a one-way ANOVA (Analysis of Variance) model and how the statistical methods behave both when the fundamental assumptions of the model hold and when these assumptions are violated. The purpose of this article is to provide tools for individuals to gain an intuitive understanding of these violations using this readily available program. 展开更多
关键词 EXCEL One-Way ANOVA ASSUMPTION violations T-DISTRIBUTION CAUCHY Distribution
下载PDF
Non-compliance in surveillance for patients with previous resection of large (≥ 1 cm) colorectal adenomas
9
作者 Wolfgang M Brueckl Berit Fritsche +5 位作者 Brigitte Seifert FrankBoxberger Heinz Albrecht Roland S Croner Axel Wein Eckhart G Hahn 《World Journal of Gastroenterology》 SCIE CAS CSCD 2006年第45期7313-7318,共6页
AIM: To assess the extent and reasons of non- compliance in surveillance for patients undergoing polypectomy of large (≥ 1 cm) colorectal adenomas. METHODS: Between 1995 and 2002, colorectal adenomas ≥ 1 cm were dia... AIM: To assess the extent and reasons of non- compliance in surveillance for patients undergoing polypectomy of large (≥ 1 cm) colorectal adenomas. METHODS: Between 1995 and 2002, colorectal adenomas ≥ 1 cm were diagnosed in 210 patients and subsequently documented at the Erlangen Registry of Colorectal Polyps. One hundred and fi fty-eight patients (75.2%) could be contacted by telephone and agreed to be interviewed. Additionally, records were obtained from the treating physicians. RESULTS: Fifty-four out of 158 patients (34.2%) neglected any surveillance. Reasons for non-compliance included lack of knowledge concerning surveillance intervals (45.8%), no symptoms (29.2%), fear of examination (18.8%) or old age/severe illness (6.3%). In a multivariate analysis, the factors including female gender (P = 0.036) and age > 62 years (P = 0.016) proved to be signif icantly associated with non-compliance in surveillance. CONCLUSION: Efforts to increase compliance in surveillance are of utmost importance. This applies particularly to women’s compliance. Effective strategies for avoiding metachronous colorectal adenoma and cancer should focus on both the improvement in awareness and knowledge of patients and information about physicians for surveillance. 展开更多
关键词 Colorectal adenoma Colorectal cancer Surveillance colonoscopy non-compliance
下载PDF
Contribution of Risk Perception for the Analysis of Non-Compliance to Work Procedures
10
作者 Mohammed Mouda Mébarek Djebabra Makhlouf Chati 《Health》 2014年第19期2705-2711,共7页
One of the problems encountered in work security is non-compliance to work procedures by operators. The consequences of such human behavior are harmful to both the operators and the organization. These consequences ar... One of the problems encountered in work security is non-compliance to work procedures by operators. The consequences of such human behavior are harmful to both the operators and the organization. These consequences are the result of a situational behavior of operators. This article focuses on the perception of work situations in a sample of Algerian workers in oil companies knowing that this perception determines, in large part, the decisions taken by the operators in terms of non-compliance with work procedures. 展开更多
关键词 WORK PROCEDURE non-compliance HUMAN Behavior HUMAN PERCEPTION
下载PDF
Topo semantic constraint-violations in spatial database
11
作者 凯龙 李香 +1 位作者 刘宏伟 杨孝宗 《Journal of Harbin Institute of Technology(New Series)》 EI CAS 2008年第4期506-512,共7页
Aiming at the problem that current geographical information systems(GIS)usually does not maintain semantic and user-defined constraints out of three consistency-constrains(third refers to topology constraint),this res... Aiming at the problem that current geographical information systems(GIS)usually does not maintain semantic and user-defined constraints out of three consistency-constrains(third refers to topology constraint),this research focuses on building an efficient spatial data management system using two constraint violation detection methods.An algorithm for constraint violation detection has been derived to maintain the error-free up-to-date spatial database.Results indicate that the developed constraint violation detection(CVD)system is more efficient compared with conventional systems. 展开更多
关键词 topo-semantic constraint rule constraint violation spatial object spatial database R-TREE GIS
下载PDF
On Island Constraints and Violations'
12
作者 LIN Hui MENG Fan-mao 《Journal of Literature and Art Studies》 2018年第1期146-152,共7页
There are some grammatical rules of pure syntactic restrictions on grammar rules of operation, a complex one of which is the fronting, i.e., extraction from the island. This paper centers on the "island" that is the... There are some grammatical rules of pure syntactic restrictions on grammar rules of operation, a complex one of which is the fronting, i.e., extraction from the island. This paper centers on the "island" that is the terminology in syntactic theory, and mainly focuses on the definition, the types and the analyses of the "island" 展开更多
关键词 ISLAND TOPICALIZATION CONSTRAINTS violatION
下载PDF
Adaptive Runtime Monitoring of Service Level Agreement Violations in Cloud Computing
13
作者 Sami Ullah Khan Babar Nazir +3 位作者 Muhammad Hanif Akhtar Ali Sardar Alam Usman Habib 《Computers, Materials & Continua》 SCIE EI 2022年第6期4199-4220,共22页
The cloud service level agreement(SLA)manage the relationship between service providers and consumers in cloud computing.SLA is an integral and critical part of modern era IT vendors and communication contracts.Due to... The cloud service level agreement(SLA)manage the relationship between service providers and consumers in cloud computing.SLA is an integral and critical part of modern era IT vendors and communication contracts.Due to low cost and flexibility more and more consumers delegate their tasks to cloud providers,the SLA emerges as a key aspect between the consumers and providers.Continuous monitoring of Quality of Service(QoS)attributes is required to implement SLAs because of the complex nature of cloud communication.Many other factors,such as user reliability,satisfaction,and penalty on violations are also taken into account.Currently,there is no such policy of cloud SLA monitoring to minimize SLA violations.In this work,we have proposed a cloud SLA monitoring policy by dividing a monitoring session into two parts,for critical and non-critical parameters.The critical and non-critical parameters will be decided on the interest of the consumer during SLA negotiation.This will help to shape a new comprehensive SLA based Proactive Resource Allocation Approach(RPAA)which will monitor SLA at runtime,analyze the SLA parameters and try to find the possibility of SLA violations.We also have implemented an adaptive system for allocating cloud IT resources based on SLA violations and detection.We have defined two main components of SLA-PRAA i.e.,(a)Handler and(b)Accounting and Billing Manager.We have also described the function of both components through algorithms.The experimental results validate the performance of our proposed method in comparison with state-of-the-art cloud SLA policies. 展开更多
关键词 Energy consumption penalty calculation proactive resource allocation service level agreement(SLA)monitoring SLA violation detection
下载PDF
Comparison of Environmental Law Violations and Accounting Abuses by Russian Enterprises
14
作者 Vladimir Glinskiy Michael Alekseev Lyudmila Serga 《Journal of Business Administration Research》 2019年第2期8-12,共5页
Sustainable development requires overcoming opportunist behavior of economic entities towards environmental compartments.Another form of opportunist behavior is revealed in fraudulent financial reporting.The research ... Sustainable development requires overcoming opportunist behavior of economic entities towards environmental compartments.Another form of opportunist behavior is revealed in fraudulent financial reporting.The research objective is statistical comparison of environmental law violation against accounting abuses by Russian enterprises.A research hypothesis is put forward that companies,that violated environmental law,prepare financial reporting mostly incorrectly.An exploratory sampling from the economic entities of Russia,that violated environmental law in the course of various activities,was formed.Financial reporting of the sampling companies was analyzed by virtue of the authorial probit regression model,making it possible to reveal accounting misstatements,both overreporting and underreporting.The obtained results make it possible to assess the interrelations between the environmental law violations and financial reporting. 展开更多
关键词 Sustainable development Ecological law violatION FINANCIAL REPORTING misstatements
下载PDF
How Kieffer Density Matrix Formalism Aids Different Initial Time Steps, Leading to Lorentz Violations, and Breakup of Primordial Black Holes for GW Generation
15
作者 Andrew Beckwith 《Journal of High Energy Physics, Gravitation and Cosmology》 2021年第4期1315-1327,共13页
A result from Kieffer, as outlined at the beginning of the article identifies two different candidates for initial time steps, delta t. We assert that this difference in time steps may be related to a specific early u... A result from Kieffer, as outlined at the beginning of the article identifies two different candidates for initial time steps, delta t. We assert that this difference in time steps may be related to a specific early universe Lorentz Violation. The author asserts that the existence of early universe Lorentz violation in turn is assisting in a breakup of primordial black holes. And that also has a tie into Kieffer different time steps as outlined. And the wrap up is given in the final part of this document. 展开更多
关键词 Kieffer Density Matrix Initial Time Lorentz violations Black Holes
下载PDF
Constraining Lorentz Invariance Violation Using Short Gamma-Ray Bursts
16
作者 Walid Jamil Azzam Ali Mohamed Hasan 《Journal of Applied Mathematics and Physics》 2023年第8期2179-2184,共6页
Lorentz Invariance is a foundational principle in modern physics, but some recent quantum gravity theories have hinted that it may be violated at extremely high energies. Gamma-ray bursts (GRBs) provide a promising to... Lorentz Invariance is a foundational principle in modern physics, but some recent quantum gravity theories have hinted that it may be violated at extremely high energies. Gamma-ray bursts (GRBs) provide a promising tool for checking and constraining any deviations from Lorentz Invariance due to their huge energies and cosmological distances. Gamma-ray bursts, which are the most intense and powerful explosions in the universe, are traditionally divided into long bursts whose observed duration exceeds 2 s, and short bursts whose observed duration is less than 2 s. In this study, we employ a recent sample of 46 short GRBs to check for any deviation from Lorentz Invariance. We analyze the spectral lag of the bursts in our data sample and check for any redshift dependence in the GRB rest frame, which would indicate a violation of Lorentz Invariance. Our results are consistent, to within 1σ, with no deviation from Lorentz Invariance. 展开更多
关键词 Lorentz Invariance violation Gamma-Ray Bursts Quantum Gravity
下载PDF
个体与情境因素如何促成员工低频安全违规行为?——基于个体-情境互动理论的组态分析 被引量:1
17
作者 刘林 梅强 +1 位作者 吴金南 刘素霞 《系统管理学报》 CSSCI CSCD 北大核心 2024年第2期368-380,共13页
为了揭示社会人口统计学因素和情境因素之间复杂的交互关系如何促成员工低频安全违规行为,结合组态思想和个体-情境互动理论,采用模糊集定性比较分析(fsQCA)方法分析1294份员工调查数据,探究个体(雇佣形式和性别)和情境(同事安全违规频... 为了揭示社会人口统计学因素和情境因素之间复杂的交互关系如何促成员工低频安全违规行为,结合组态思想和个体-情境互动理论,采用模糊集定性比较分析(fsQCA)方法分析1294份员工调查数据,探究个体(雇佣形式和性别)和情境(同事安全违规频率、企业安全投入、企业员工规模和行业危险程度)因素构成的不同条件组态对员工低频安全违规行为的影响。研究发现:任何单一因素均不构成员工低频安全违规行为的必要条件。员工低频安全违规行为存在3种不同驱动模式:非高危行业同事低频安全违规模式、高安全投入与同事低频安全违规共驱模式以及非高危行业大型企业高安全投入模式。同事低频安全违规行为在4种组态解中均是实现员工低频安全违规行为的核心条件。本研究引入fsQCA探究个体与情境因素对员工低频安全违规行为的组态效应,不仅拓展了对员工低频安全违规行为驱动模式的理解,还有助于倡导组态方法在行为安全领域的应用。 展开更多
关键词 安全违规 个体-情境互动 安全投入 雇佣形式 模糊集定性比较分析
下载PDF
基于全纯嵌入法的配电网光伏接纳能力评估方法 被引量:3
18
作者 唐飞 谢家锐 +4 位作者 刘承锡 林致远 亓君锋 刘卓 邓晖鹏 《电网技术》 EI CSCD 北大核心 2024年第1期291-299,共9页
针对大规模分布式光伏接入给配电网带来的电压越限风险,提出了一种基于改进全纯嵌入法的光伏接纳能力评估方法。首先,引入离散-聚合方法对时序数据进行处理,利用所生成极端场景集代替原序列进行接纳能力评估;其次,在传统全纯嵌入模型基... 针对大规模分布式光伏接入给配电网带来的电压越限风险,提出了一种基于改进全纯嵌入法的光伏接纳能力评估方法。首先,引入离散-聚合方法对时序数据进行处理,利用所生成极端场景集代替原序列进行接纳能力评估;其次,在传统全纯嵌入模型基础上构建了自定义方向模型,进一步推导了满足电压约束的可行域范围,并将节点Sigma轨迹与可行域边界相交作为单次运算下光伏最大接纳容量的判据;然后,利用蒙特卡罗模拟生成相互独立的光伏接入方案,使用所提判据确定各方案下极端场景集对应的接纳容量;最后,统计计算结果,获取光伏接纳容量的累计分布曲线,以此确定电压越限风险下系统的光伏接纳能力。在IEEE 33节点配电网系统上验证了所提方法的有效性和可行性。 展开更多
关键词 离散-聚合方法 全纯嵌入法 光伏接纳能力 电压可行域 电压越限风险
下载PDF
数字经济时代个人信息法律保护的困境与思考 被引量:2
19
作者 刘志 董翌 《大连大学学报》 2024年第1期74-81,共8页
随着数字经济的不断发展,公民个人信息遭到泄露等不法侵害屡有发生。我国立法在个人信息保护领域有所欠缺,相关部门对其监管不到位,公民维权困难。此外,由于个人信息权属界定不明,个人信息热点问题在立法上回应较为模糊,以及现行相关法... 随着数字经济的不断发展,公民个人信息遭到泄露等不法侵害屡有发生。我国立法在个人信息保护领域有所欠缺,相关部门对其监管不到位,公民维权困难。此外,由于个人信息权属界定不明,个人信息热点问题在立法上回应较为模糊,以及现行相关法律的救济手段尚不足以完全解决纠纷,影响了实践中个人信息的保护效果。为此我国迫切需要细化并完善个人信息保护法律,并加强对个人信息处理全过程的监管,进而构建具有多样化的救济渠道,为保护公众的个人信息合法权益提供法律保障。 展开更多
关键词 数字经济 个人信息 个人信息侵权 个人信息权益
下载PDF
个人-组织匹配对员工信息安全违规行为的影响研究
20
作者 甄杰 陈琳 +1 位作者 董坤祥 谢宗晓 《管理案例研究与评论》 CSSCI 北大核心 2024年第2期320-332,共13页
频发的企业内部员工信息安全违规行为已成为组织管理中备受关注的问题。基于个人-组织匹配理论和社会交换理论,通过多案例研究方法,探究个人-组织匹配对员工信息安全违规行为的影响机理。研究发现:(1)在企业信息安全管理情境下,个人-组... 频发的企业内部员工信息安全违规行为已成为组织管理中备受关注的问题。基于个人-组织匹配理论和社会交换理论,通过多案例研究方法,探究个人-组织匹配对员工信息安全违规行为的影响机理。研究发现:(1)在企业信息安全管理情境下,个人-组织匹配的类型以一致性匹配为主、互补性匹配为辅;(2)个人-组织匹配的内容包括能力匹配、道德匹配、关系匹配和情绪匹配四个维度;(3)个人-组织匹配负向影响员工的信息安全违规行为,工作投入和组织承诺在两者关系中具有部分中介作用。上述研究结论可为企业完善信息安全管理策略、减少员工信息安全违规行为提供理论参考。 展开更多
关键词 个人-组织匹配 信息安全违规行为 工作投入 组织承诺
下载PDF
上一页 1 2 157 下一页 到第
使用帮助 返回顶部