首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 0 毫秒
1.
Many developing and newly industrialized countries lack the technical and management capabilities to undertake large and/or complex infrastructure projects. In an effort to more rapidly develop their infrastructure, economies and living standards, many have embarked on a series of international Technology Transfer (TT) initiatives within the construction and other industries. However, these initiatives have not immediately translated into enhanced capabilities and competitiveness within host country firms, resulting in a sustained reliance on foreign firms. In an attempt to improve rates of TT in developing countries, this article proposes a conceptual model for international TT that accommodates the numerous factors believed to impact on the processes effectiveness and derived outcomes. Utilizing the results from a questionnaire survey of 162 industry professionals from Thailand, an international TT model including the significant factors which impact on the TT process and the degree of value added from it, was formulated through exploratory and confirmatory factor analysis. Moreover, the significance of direct and indirect interrelationships between model factors was determined through structural equation modeling. This model included four process enablers, namely, government influence, transferee characteristics, transferor characteristics and relationship building, and one outcome factor named TT value added. Building relationships (i.e. trust, understanding and communication) between the transferor and transferee was determined to be the key predictor of TT-induced value creation for the host construction sector.   相似文献   

2.
3.
4.
5.
Modeling Discretion in American Sentencing Systems   总被引:2,自引:0,他引:2  
Kevin Reitz 《Law & policy》1998,20(4):389-428
  相似文献   

6.
Abstract: Over the past decade or more, DNA databases have been a focal point of development for the forensic field. Using this approach, forensic and law enforcement agencies have aided millions of investigations, many of which would remain unsolved but for the intelligence links provided from DNA database comparison. However, despite their widespread use and increasingly broad legislative and operational reach, there has been limited overarching performance modeling or reflection on drivers of operational or financial efficiency. This study derives an inferential model for DNA database performance using data from major national DNA database programs. Parameters that optimize desirable database outputs (matches) are isolated and discussed, as is an approach for maximizing financial efficiency and minimizing ethical impact. This research takes important steps toward identifying measures of performance for forensic DNA database operations.  相似文献   

7.
Family violence researchers often use an ecological perspective to describe persons nested within groups. Further, family violence researchers frequently investigate whether group characteristics impact individual outcomes. The theoretical orientation and research designs typically used therefore present opportunities to utilize multilevel modeling (MLM) for clustered designs. It is widely understood that MLM corrects standard errors for grouped data, though other approaches can address this issue. Importantly, MLM presents a structured approach to the examination of group differences in outcomes, group differences in the association between the characteristics of persons and these outcomes, and the explanation of group differences using group-level characteristics. This journal frequently receives studies that use MLM for clustered designs, and a set of analytical guidelines may assist authors in preparing such articles so as to properly implement and better leverage the power of MLM to advance family violence research. I describe MLM for the new user, providing guidance on estimation of these models in the context of two examples. In addition, for more experienced users of MLM, I argue for greater attention to between-group and compositional effects that may be prevalent in family violence research, and the opportunities they may raise for a better understanding of the complexities at the group level. In closing I discuss some extensions of MLM and place MLM in the context of research design, providing guidelines for designing, carrying out, and reporting findings from studies that use these methods.  相似文献   

8.
Decision-making processes of psychiatric inpatients were assessed at admission and prior to discharge, and compared to hospital staff members using a paired comparison paradigm in which subjects chose between hypothetical antipsychotic medications. Multidimensional analyses of binary choice matrices revealed that all subjects based decisions on the risks and benefits of medication, and weighted risks and benefits in roughly equal proportions. Hospital staff demonstrated greater internal consistency in their decisions than the inpatient sample at both time points. For newly admitted inpatients, severity of psychiatric symptoms and nonverbal intelligence were related to internal consistency of decision making, and behavioral indices of medication compliance predicted relative weighting of risks and benefits. For predischarge and comparison samples, verbal intelligence and treatment preferences predicted both outcome measures. Reliance on verbal reports of decision making may be misleading when assessing competence in acutely impaired psychiatric patients.  相似文献   

9.
Engineers deploy their skills in contexts that require decisions based on certain criteria and on an understanding of processes that were not learned in college. This paper explores how these supplemental, “contextual” skills may be taught and reports on an experimental, fairly successful upper-division course at Pennsylvania State University in the fall of 1995.  相似文献   

10.
In 1990, Congress authorized the creation of a pilot Technology Access Program (TAP), to be administered jointly by the Small Business Administration and the National Institute of Standards and Technology. TAP, modelled substantially on a Minnesota state program, will subsidize access by small businesses to [1] a network of several thousand peer-recommended technical experts across the country and [2] interactive searching of technical and business literature databases. Preliminary evidence, from two surveys of random samples of companies that subscribe to the Minnesota service, indicate that this form of technology transfer is effective and could have a substantial positive impact on the productivity of small companies. If the pilot TAP program is successful, it could serve as the basis for a national technical-extension service.  相似文献   

11.
The rapid growth of gene technology and its commercialisation raises concerns for scientific researchers and research institutions wishing to place information in the public domain. This article examines whether copyright laws in the United States, United Kingdom and Australia provide any protection for genetically modified DNA, proteins, and genetically modified organisms, in contrast with any copyright protection extending to a record of the lettering of a sequence representing a series of nucleotides of modified DNA or the amino acids comprising a protein. Whilst it is arguable that protection may be available in the United States and the United Kingdom, it is submitted that it would be difficult to persuade a court in Australia that genetically modified DNA and genetically modified organisms directly constitute "literary" or "artistic" works.  相似文献   

12.
13.
14.
This paper describes how a diverse set of models of diffusion of information technology brings depth of understanding and a better basis for management decisions. Three dissimilar innovation diffusion models, the interactive model, the linked-chain model and the emergent model, are used to develop an analysis that describes the essential knowledge that each model produces. Rather than develop conflicting stories, each model leads to distinctly different, but complementary, knowledge about the practical setting. The analysis demonstrates how distinct conceptual domains inhabit each model. These domains define the scope of practical management questions that can be addressed by each of the innovation diffusion models.  相似文献   

15.
The Journal of Technology Transfer - Nearly 40 years ago Congress laid the foundation for federal agencies to engage in technology transfer activities with a primary goal to make federal...  相似文献   

16.
Biometrics contributes a new dimension to authentication and identification process of persons. Besides knowledge (passwords) and possession (smart cards), biometrics provides new means of personal identification. Biometrics procedures are used to recognize or verify behavioral or physical characteristics of a person. Also biometry provides us with a user-friendly method for automatically identification and becoming a competitor for current identification systems, especially for electronic transactions. Cause of biometric increasing position in electronic transaction and security identification system we must to assure perfect information security tools to purpose stability such a systems. But before deploying any security tools or system, one should carefully examine the sensibility and added value of it, as we do in our daily work. However, there are ways to compromise a system based on biometric identification. This article focuses on the future and draw-after of biometric identification, specifically implication on tomorrow's network society.  相似文献   

17.
Frequent tensions continue to plague the operations of multinational corporations (MNCs) in less-developed countries (LDCs). Accusations of insensitivity and heed-lessness toward the needs and aspirations of LDCs are commonplace. In this writer's opinion, negative perceptions of the MNCs' operations result in part from differing “world views” between the two groups that are frequently overlooked in strategy formulation. This paper is an attempt to demonstrate that productive, culturally sensitive strategies can be formulated if MNCs use a multiple-perspective approach in their relationships with LDCs. To illustrate this, cognitive mapping is used to analyze the MNCs' decisionmaking behavior. Use of this process should provide MNCs with an opportunity to evaluate the consequences of their actions, the prospect of more effective strategies emerges.  相似文献   

18.
National technological programs in Taiwan aiming at commercial applications have been proliferating. However, their management is incompletely documented. This paper uses a comparative-technology perspective to examine taiwan's eight national programs in energy, materials, information, automation, biotechnology, electro-optics, hepatitis control, and food. It offers management implications concerning (a) national technology capability based on technology imitation and a strategy of backward integration; (b) R&D selection, technical service strategy, and performance; (c) interorganizational technology transfer; (d) alliance strategies; and (e) functional integration.  相似文献   

19.
20.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号