711 |
China¡¦s Oil Diplomacy in AfricaHsu, Tsung-ta 08 July 2011 (has links)
¡@With the change of economic globalization, the national security is no longer just the traditional nation defense or military security. Economic, political, diplomatic, technological, cultural, environmental and other fields related to national development are gradually considered into the scope of national security. Among, Economic security is the core of national security now. The protection of economic security concern about nation development, such as nation defense, diplomacy, and the standard of people¡¦s living. Not only every department in nation is interdependent with each other, but also any economy can't live alone. Economic development has closely relationship with the use of energy. No matter developed countries or developing countries, their reliance various energy are increasing (especially oil); however, because of the limited resource endowment, the energy competition is one of leading to the tense international relations.
¡@The distribution of oil is uneven. Middle East has more than half of the crude oil reserve, and the top ten largest oil reserve countries hold the 80% of the world¡¦s total reserve. But, the most two oil consumption region, North America and Asia Pacific, only own 8.7% oil reserve. United States and China are the largest oil consumption countries, while United States oil dependency is above 60%, and almost 60% of China¡¦s oil demand need to import from other countries. In order to sustain economic development (need enough oil energy), the imbalance of demand and supply let China and other oil-consuming countries have to negotiate with the oil-producing region - Middle East, Central and South America, and Africa. Africa is one of China¡¦s oil import region. China strengthen Sino-Africa relation through leader conference, high-level visits, Forum on China - Africa Cooperation, China¡¦s oil company¡¦s energy investment in Africa, economic aid, infrastructure and other diplomatic measures. The comprehensive cooperation contributes China to get Africa's oil resources.
|
712 |
The Political Economy of ASEAN-China Relations on Competition and Cooperation ---Threat or OpportunityYou Lee, Chih 08 July 2011 (has links)
This paper is tried to find out by neo-institutional view if there is China Threat theory or China Opportunity theory. And, it‟s researched interaction of ASEAN and China after Cold War by historic structure analysis, and tried to sum up the Political Economy interaction of ASEAN and China.
Researching by historic structure analysis, the Political Economy of ASEAN-China Relations is from "close, separation, and then close." With the trend of globalization and regionalization, both sides understand the importance of cooperation. Besides, the process of institutional cooperation to benefit only care about whether transaction costs are saved, but not consider about self-benefit is more than others countries. Hence, from the point of the neo-institutionalism, there is no absolute China Threat theory or China Opportunity theory. Finally, it could help reduce fraud by the establishment of the system to make cooperation more effective, and reduce sense of mutual distrust. This argument is verified t in this paper.
|
713 |
Political Economy Of China' / s Peaceful Rise: The Return Of The Dragon?Dikmen, Neslihan 01 December 2008 (has links) (PDF)
This research aims to analyze the international political economy of rising China since the mid 1990s. The main question it tries to answer / why in the early 21st century, Chinese officials defined China& / #8217 / s position within the international system as Peaceful Rise in theory, in rhetoric and in policy. The research studies the question based on analysis of international political economy of China& / #8217 / s reform process within a historical perspective. Given China& / #8217 / s history-long & / #8216 / & / #8216 / catching up with the West& / #8217 / & / #8217 / as the main drive behind the determination and the guidance of China& / #8217 / s strategy at home and abroad throughout the political history of modern China, the thesis argues that & / #8216 / & / #8216 / China& / #8217 / s Rise& / #8217 / & / #8217 / has became the new strategy of China& / #8217 / s catching up objective towards the 21st century. Chinese leadership formulated the concept of Peaceful Rise as the discourse of the new policy to both domestic and external audiences. Building up Harmonious Society and being a Soft Power in international order have been designed as the policy components of new strategy. Chinese leadership also used the concept of Peaceful Rise as the theory of the legitimization of the new strategy of & / #8216 / & / #8216 / China& / #8217 / s Rise& / #8217 / & / #8217 / and its policy components.
|
714 |
Effects Of Attachment Security, Threat, And Attachment Figure Primes On Cognitive Attentional Task PerformanceSakman, Ezgi 01 April 2011 (has links) (PDF)
The attachment system is activated when a threat is perceived in the environment. Attachment style differences moderate the levels of this activation. Whereas anxiously attached people are more hypervigilant to attachment-related stress, avoidant people have an ability to suppress their attachment related thoughts under stressful conditions. The aim of the present study was to investigate whether the subliminal presentation of threat and attachment figure primes interfere with the cognitive task performance of participants with different attachment styles. It was hypothesized that anxious participants would perform worse than secure and avoidant participants under both conditions of attachment-related threat and attachment figure primes. Avoidant participants were expected to perform poorly only when a threat prime is followed by an attachment figure prime. The securely attached participants were expected to perform better than the other attachment groups. University students (N = 225) filled out a questionnaire package including the measures of attachment figure names (WHOTO), attachment anxiety and avoidance (The Experiences in Close Relationships, ECR) / and they were administered computerized Signal Detection and Stroop tasks representing cognitive attentional performance in the laboratory. The results showed that attachment avoidance was a significant predictor of decreased cognitive performance, and attachment anxiety makes people vulnerable to cognitive performance decline only under certain circumstances of attachment system activation. Attachment security was identified to make individuals immune to the effects of threat or attachment figure availability priming on cognitive performance. The findings were discussed considering previous work and implications for cultural differences.
|
715 |
企業資訊安全風險評估-以電腦病毒為例洪裕傑, Hung,Yu-Chieh Unknown Date (has links)
隨著網際網路的快速成長,資訊安全已成為企業最重視的議題之一。企業必須保護自己免於網路威脅(Cyber-Threat),不過防止企業免受網際威脅已非易事,這也為企業資訊安全風險埋下了一顆不定時炸彈。換句話說,資訊安全風險是現今企業所面臨的主要挑戰之一,企業資訊安全防護的好壞將直接反應在企業的盈虧上,甚至可能影響到顧客對該企業產品或服務的滿意度等,對企業的殺傷力是不容忽視的。目前的防毒軟體(Anti-Virus)與威脅管理系統(Threat Management System)所能提供的基本功能都是大同小異,其效能也在伯仲之間,但是企業使用的成效則大不相同。因此如何掌握左右企業資訊安全風險的主要影響因子,並根據該影響因子提供企業一套資訊安全策略以解決其所面臨的風險與使得金錢上的損失降到最低,將是改善企業資訊安全風險的關鍵成功因素。
本研究首先透過與五位企業安全維護有實務經驗的專家訪談,了解資訊安全之重要影響因素並不在於投入防毒軟體的預算金額,反而是企業的資訊安全策略類型,如使用者與資訊安全人員關係型態、資訊安全人員的素質、高階主管對資訊安全政策的支持之類因素更重要。
接著藉由問卷調查,以國內某著名防毒軟體客戶為樣本,發出1910份郵寄問卷與網路問卷邀請email信,共回收102份有效問卷,回收率5.3%。問卷共分為兩大部份:組織特徵(包括公司背景、過去三年病毒感染情形、防毒系統、資訊安全管理現況)及防毒能力評估(防毒軟體的使用、監控與過濾、追蹤裝置、區隔網路等四類防毒技術的使用,與弱點管理、病毒碼部署、帳號管理、應用程式與網路使用的權限、回應與恢復程序等五類安全程序政策,組織的責任與能力、組織的順從、對教育訓練的重視等三項組織因素)。以「病毒爆發數量」、「病毒爆發影響嚴重性」、「偵測病毒數」與「偵測感染事件事」為應變數,以公司概況及防毒能力評估各變項為自變數進行單因子與多因子變異數分析,分析結果顯示組織大小及防毒軟體的使用、弱點管理、帳號管理等安全程序政策是影響「病毒爆發數量」的重要因素;組織大小、網路管理等組織特徵,防毒軟體的使用、弱點管理、病毒碼部署等安全程序政策及教育訓練等是影響「病毒爆發影響嚴重性」的重要因素;組織大小與防毒軟體的使用、監控與過濾等防毒技術的使用,弱點管理影響「偵測病毒數」的重要因素;組織大小、弱點管理、與教育訓練等是影響「偵測感染事件數」的重要因素。
本研究藉由分析企業在資訊安全所面臨到的風險,得以建立並發展相關評量的模型,研究結果除了可以提供廠商與設計人員在開發企業資訊安全風險評量時參考的依據,也為後續的相關實證研究提供一些建議的方向。 / Following the growth of the www internet in the latest years, information security has become the most important topic among all enterprise companies. Enterprise companies have to protect themselves from Cyber-Threat, but this is not an easy job at all. That means a hidden bomb has already been planted inside their information systems. In another words, the information security threat is the main challenge that all enterprise companies are facing right now. The performance of the defensive system that an enterprise company is using directly impacts whether this company can have a profit gain or loss; furthermore, this affects the customers’ satisfaction about the company’s products and services. This threat can harm the company and should not be ignored. Right now the basic service that Anti Virus software and Threat Management System can provide and their performance are functionally the same, but the effective factor of how each different companies use them may yield a big difference. Hence, knowing how to control the main factor of the information security threat of the company and knowing how to provide the best and the most secured strategy according to the threat to solve any possible future threat such that the loss of profit can be minimized, will be the most important aspect for an enterprise company to be succeeded.
This research was conducted by interviewing with five experienced enterprise security maintenance experts at first. From the conservation, we have learned that the main factor of the information security is not depending on the amount of budget that the company has spent on anti-virus software. In fact the strategy type that the company uses for information security is the main reason. This includes the relational model between the users and the information security members, the quality of the information security members, the support of information security strategy from the top manager, and etc. These are more important factors.
We have then conducted a survey among the customers from one of the famous anti virus software in Taiwan. We have sent out 1910 questionnaire mails and online survey invitation emails, we have collected back 102 copies of valid questionnaires (5.3% of the total). The questionnaire contains two parts: the characteristic of the company (including the background of company, the virus infection situation in the past three years, the anti virus system, the present situation of information security management), and the performance evaluation of the anti-virus system (which one(s) out of the four anti-virus techniques that the current company is applying: using anti-virus software, monitoring and filtering, using some tools for tracing, and the separation of local area network. Which one(s) out of five security process strategies that the company is using: weakness management, virus pattern deployment, account management, permission of using application and network, and response and restore process. And the factor of company: the responsibility and ability, the obedient, and the weight that was put for educational training.) Using the infection number of virus, the impact severity of virus spread, the quantity of detectable virus, and the number of detectable infection events as dependent variables, along with using the situation of company and each items in anti-virus ability evaluation as single factor or multiple factor variant analysis, the analyzed result shows that the size of companies and the security process strategies such as the use of anti-virus software, weakness management, and account management, are the main factors of the infection number of virus. The characteristic of the company such as the size of companies and its network management, the security process strategies such as the use of anti-virus, weakness management, and virus pattern deployment, and the educational training are the main reasons of affecting the severity of virus spread. The size of company, the use of anti virus technique such as the use of anti-virus software and the monitoring and filtering, and weakness management are the main factors of the number of detected virus. The size of company, weakness management, and the educational training are the main factor of the number of events of detected infection.
According to the analysis of the threat of information security that an enterprise company would face, this research has built and developed a related evaluation model. The result from this research not only can provide a reference for companies and software designers when they evaluate their enterprise information security, but also suggest a new direction for future research.
|
716 |
The aviation safety action program : assessment of the threat and error management model for improving the quantity and quality of reported information / Assessment of the threat and error management model for improving the quantity and quality of reported informationHarper, Michelle Loren 06 February 2012 (has links)
The Aviation Safety Action Program (ASAP) is a voluntary, non-jeopardy reporting program supported by commercial airlines. The program provides pilots with a way to report unsafe occurrences, including their own errors, without risk of punitive action on the part of the airlines or the Federal Aviation Administration (FAA). Through a set of on-site visits to airlines with ASAP programs, deficiencies were identified in the way airlines collect ASAP reports from pilots. It was concluded that these deficiencies might be limiting the ability of airlines to identify hazards contributing to reported safety events. The purpose of this research was to determine if the use of an ASAP reporting form based on a human factors model, referred to as the Threat and Error Management (TEM) model, would result in pilots providing a larger quantity and higher quality of information as compared to information provided by pilots using a standard ASAP reporting form. The TEM model provides a framework for a taxonomy that includes factors related to safety events pilots encounter, behaviors and errors they make, and threats associated with the complexities of their operational environment. A comparison of reports collected using the TEM Reporting Form and a standard reporting form demonstrated that narrative descriptions provided by pilots using the TEM Reporting Form included both a larger quantity and higher quality of information. Quantity of information was measured by comparing the average word count of the narrative descriptions. Quality of information was measured by comparing the discriminatory power of the words in the narrative descriptions and the extent to which the narrative descriptions from the two sets of reports contributed to a set of latent concepts. The findings suggest that the TEM Reporting Form can help pilots provide longer descriptions, more relevant information related to safety hazards, and expand on concepts that contribute to reported safety events. The use of the TEM Reporting Form for the collection of ASAP reports should be considered by airlines as a preferred collection method for improving the quantity and quality of information reported by pilots through ASAP programs. / text
|
717 |
Resocializing and repairing homies within the Texas Prison System : a case study on security threat group management, administrative segregation, prison gang renunciation and safety for allBurman, Michelle Lynn 27 February 2014 (has links)
This research is a case study focused on the resocialization of prison gang members through the lens of the Texas Department of Criminal Justice’s (TDCJ) Gang Renouncement and Disassociation (GRAD) process, a nine-month, three-phase voluntary process whereby confirmed prison gang, or Security Threat Group (STG), members renounce their gang membership and disassociate from the gang while still incarcerated. The TDCJ implemented its gang renunciation process to relinquish its dependence on segregating confirmed prison gang members and to provide them a way to transition out of segregation. The GRAD process has been in place since 2000 with more than 2,600 offenders completing it, but little information, other than anecdotal evidence, is available to support or disprove its success or effectiveness at de-ganging and resocializing prison gang members for the long haul.
Interviews were conducted with 16 individuals, including GRAD correctional officers and instructors, and law enforcement officers with known expertise and knowledge of prison gang investigations. A limited amount of extant aggregate-level data was provided by TDCJ to supplement the narratives in the qualitative analysis.
Findings suggest that the identified goals of the process differ among GRAD staff and non-GRAD staff: GRAD staff focused on offender rehabilitation, and non-GRAD staff focused on gang renunciation. It was also found that resocialization and normative change can and do occur in the closed GRAD environment; however, no tracking mechanism exists to systematically and pro-actively monitor their behavior once they are released from GRAD to determine if they have internalized these new norms and values. Based on the interviews, it also appears that the length of time spent in segregation prior to renunciation renders the offender more grateful and appreciative, and, therefore, more likely to successfully complete the process. Finally, interviews with law enforcement reveal that, upon release to the broader community, these offenders may have renounced the gang – but not the crime.
The dissertation ends with limitations to the study, recommendations for future research, and implications for social work. / text
|
718 |
Modellierung und Realisierung eines IT-Systems zur Verwaltung und Analyse industrieller Arbeitsplätze unter Einbeziehung von ergonomischen und gesundheitlichen Aspekten / Modelling and realization of an IT system for the administration and analysis of industrial workplaces under ergonomic and health protection aspectsDubian, Clemens 14 May 2009 (has links)
No description available.
|
719 |
誰會被主管排擠? 主管之部屬能力及威脅感知覺之探討 / Who Will Be Ostraized by Supervisor?The Study of Supervisors’ perception of Subordinates’ Competence and Threat黃順凱 Unknown Date (has links)
本研究旨在探討主管排擠部屬行為的前因,以部屬能力與威脅感作為解釋之機制,部屬能力可藉由威脅感對主管排擠產生影響。並以集體認同、知覺相似性作為部屬能力與威脅感間關係的調節變項;最後則探討主管排擠對於部屬幸福感與部屬主管承諾的影響。
本研究採用便利性取樣,使用對偶方式進行資料收集,研究對象為一般私人企業之員工,共發出紙本問卷328套,回收234套,回收率為71%,有效問卷為207套,有效回收率為63%。藉由SPSS 20與Lisrel 8.8等統計軟體進行資料分析,本研究結果顯示,部屬能力會透過威脅感對主管排擠產生正向的間接效果;當部屬越知覺主管對自己有排擠行為時,部屬之主管承諾越低;部屬知覺主管排擠對部屬幸福感則不具影響;而不論是集體認同或是知覺相似性,對於部屬能力與威脅感間的關係,皆無預期之調節效果。最後,針對本研究之結果進行討論,並說明理論貢獻、管理意涵、研究限制與未來研究建議。 / This study aimed at investigating the antecedents of supervisor ostracism. We used subordinates’ competence and threat from subordinates as mechanisms to illustrate the antecedents of supervisor ostracism. We hope to explore the indirect effect of subordinates’ competence on supervisor ostracism via threat from subordinates. Moreover, we proposed that collective identity and perceived supervisor-subordinate similarity can moderate the relationship between subordinates’ competence and threat from subordinates. We further explore the direct effect of supervisor ostracism on supervisor commitment and well-being.
The sample of this study is selected using convenience sampling, and the data is dyad-level data. Totally 328 questionnaires were issued and 234 were returned. The response rate is 71%. Among returned questionnaires, there were 207 effective questionnaires with the effective rate of 63%. The collected data was analyzed by SPSS 20 and Lisrel 8.8.
The result indicated that subordinates’ competence has positive indirect effect on supervisor ostracism via threat from subordinates. Although subordinate perceived supervisor ostracism has negative effect on supervisor commitment, it had no effect on well-being. Supervisor collective identity and perceived supervisor-subordinate similarity did not moderate the relationship between subordinates’ competence and threat from subordinates. Finally, theoretical and managerial implications of these findings are discussed.
|
720 |
Facial affect processing in delusion-prone and deluded individuals: A continuum approach to the study of delusion formationGreen, Melissa Jayne January 2002 (has links)
This thesis examines attentional and cognitive biases for particular facial expressions in delusion-prone and deluded individuals. The exploration of cognitive biases in delusion-prone individuals provides one means of elucidating psychological processes that might be involved in the genesis of delusions. Chapter 1 provides a brief review of the continuum approach to schizophrenia, and outlines recent theoretical conceptualisations of delusions. The study of schizophrenia phenomena at the symptom level has become a popular method of inquiry, given the heterogeneous phenotypic expression of schizophrenia, and the uncertainty surrounding the existence of a core neuropathology. Delusions are one of the most commonly experienced symptoms of schizophrenia, and have traditionally been regarded as fixed, false beliefs that are pathognomonic of an organic disease process. However, recent phenomenological evidence of delusional ideation in the general population has led to the conceptualisation of delusions as multi-dimensional entities, lying at the extreme end of a continuum from normal through to maladaptive beliefs. Recent investigations of the information processing abnormalities in deluded individuals are reviewed in Chapter 2. This strand of research has revealed evidence of various biases in social cognition, particularly in relation to threat-related material, in deluded individuals. These biases are evident in probabilistic reasoning, attribution style, and attention, but there has been relatively little investigation of cognitive aberrations in delusion-prone individuals. In the present thesis, social-cognitive biases were examined in relation to a standard series of faces that included threat-related (anger, fear) and non-threatening (happy, sad) expressions, in both delusion-prone and clinically deluded individuals. Chapters 3 and 4 present the results of behavioural (RT, affect recognition accuracy) and visual scanpath investigations in healthy participants assessed for level of delusion- proneness. The results indicate that delusion-prone individuals are slower at processing angry faces, and show a general (rather than emotion-specific) impairment in facial affect recognition, compared to non-prone healthy controls. Visual scanpath studies show that healthy individuals tend to direct more foveal fixations to the feature areas (eyes, nose, mouth) of threat-related facial expressions (anger, fear). By contrast, delusion-prone individuals exhibit reduced foveal attention to threat-related faces, combined with �extended� scanpaths, that may be interpreted as an attentional pattern of �vigilance-avoidance� for social threat. Chapters 5 and 6 extend the work presented in Chapters 3 and 4, by investigating the presence of similar behavioural and attentional biases in deluded schizophrenia, compared to healthy control and non-deluded schizophrenia groups. Deluded schizophrenia subjects exhibited a similar delay in processing angry faces, compared to non-prone control participants, while both deluded and non-deluded schizophrenia groups displayed a generalised affect recognition deficit. Visual scanpath investigations revealed a similar style of avoiding a broader range of negative (anger, fear, sad) faces in deluded schizophrenia, as well as a common pattern of fewer fixations with shorter duration, and reduced attention to facial features of all faces in both deluded and non-deluded schizophrenia. The examination of inferential biases for emotions displayed in facial expressions is presented in Chapter 7 in a study of causal attributional style. The results of this study provide some support for a �self-serving� bias in deluded schizophrenia, as well as evidence for an inability to appreciate situational cues when making causal judgements in both delusion-prone and deluded schizophrenia. A theoretical integration of the current findings is presented in Chapter 8, with regard to the implications for cognitive theories of delusions, and neurobiological models of schizophrenia phenomena, more generally. Visual attention biases for threat-related facial expressions in delusion-prone and deluded schizophrenia are consistent with proposals of neural dysconnectivity between frontal-limbic networks, while attributional biases and impaired facial expression perception may reflect dysfunction in a broader �social brain� network encompassing these and medial temporal lobe regions. Strong evidence for attentional biases and affect recognition deficits in delusion-prone individuals implicates their role in the development of delusional beliefs, but the weaker evidence for attributional biases in delusion-prone individuals suggests that inferential biases about others� emotions may be relevant only to the maintenance of delusional beliefs (or that attributional biases for others� emotional states may reflect other, trait-linked difficulties related to mentalising ability). In summary, the work presented in this thesis demonstrates the utility of adopting a single-symptom approach to schizophrenia within the continuum framework, and attests to the importance of further investigations of aberrant social cognition in relation to the development of delusions.
|
Page generated in 0.0911 seconds