搜索结果: 1-12 共查到“知识库 管理学 key”相关记录12条 . 查询时间(0.062 秒)
The Unfairness Trap:A Key Missing Factor in the Economic Theory of Discrimination
Managerial Roles Fairness Performance Productivity Gender Characteristics Japan
2015/4/28
Prior evidence linking increased female representation in management to corporate performance has been surprisingly mixed, due in part to data limitations and methodological difficulties, and possibly...
A MULTI-PROJECT MODEL OF KEY FACTORS AFFECTING ORGANIZATIONAL BENEFITS FROM ENTERPRISE SYSTEMS
change management Enterprise system success functional fit improved access to information
2011/10/24
This paper develops a long-term, multi-project model of factors affecting organizational benefits from enterprise systems (ES), then reports a preliminary test of the model. In the shorter-term half o...
In an interlaboratory key comparison, a data analysis procedure for this comparison was proposed and recommended by CIPM [1, 2, 3], therein the degrees of equivalence of measurement standards of the l...
Key Philosophical Decisions to Consider When Designing an Internship Program
internships curriculum placement grading external relations
2009/12/1
Setting up an internship program requires that a department make a number of
decisions regarding how the program will be implemented. These issues include whether
or not to require an internship,...
Key Outputs Obtained when Implementing the HRD Program during 1999
Key Outputs the HRD Program 1999
2009/10/19
The best way to describe the program “Capacity Building Through Human Resources Development and Management”, is to mention its objectives.The program has an overall objective or Purpose, from which si...
Human resource leadership: the key to improved results in health
human resource leadership the key improved results health
2009/9/27
This article is the lead article in the Human Resources for Health journal's first quarterly feature. The series of seven articles has been contributed by Management Sciences for Health (MSH) under th...
On Measuring Organizational Relationships: Threats to Validity in the Use of Key-Informants
inter-group collaboration key-informant methodology threats to validity lessons learned
2009/7/16
The measurement of organizational characteristics in empirical studies that focus on inter-group, knowledge-based collaboration requires research methods different from those used for measuring the ch...
Validation Of Key Relationships In An Extended Service-Profit Chain Model In The South Africa Retail Industry Context
Key Relationships Extended Conceptual Model Questionnaires
2009/5/18
The purpose of the study was to evaluate an extended conceptual model depicting hypothesised relationships between employee climate, customer value and financial performance. Questionnaires assessing ...
Personal Change As A Key Determinant Of The Outcomes Of Organisational Transformation Interventions
Personal Change Key Determinant inherent elements
2009/5/12
The purpose of this study was to investigate the critical role of personal change, and its inherent elements, in determining the outcomes of organisational transformation interventions. The purposeful...
KEY EXCHANGE RATE REGIMES:A CONSTITUTIONAL PERSPECTIVE
EXCHANGE RATE CONSTITUTIONAL PERSPECTIVE international monetary reform
2008/12/3
After a decade and a half of experience with the widespread use of
flexible exchange rates among the major industrial countries, wehave
learned a great deal. But disputes about exchange rate policie...
Highly Reliable CAE Model, The Key to Strategic Development of New JIT
New JIT TDS Advanced TDS
2018/3/7
In recent years, the advanced manufacturing industry is engaging in a “global
production strategy – for simultaneous achievement of QCD”. A close look at the
development designing and production pro...
Statistical analysis of the Diffie-Hellman key exchange protocol in a finite group
public key cryptography permutation testing prime subgroups
2010/4/26
This paper presents a novel methodology to test the security of the Diffie-Hellman
public key exchange protocol. The security of many cryptographic schemes rely on the hardness
of this problem. We a...