نتایج جستجو برای: we have used 7 index public trust
تعداد نتایج: 7298249 فیلتر نتایج به سال:
The main purpose of this research project was to investigate the impact of Strategic Human Resource Management practices on knowledge sharing behavior among university faculty members. This research also studied the mediating role of trust and organizational commitment in the relationship between SHRM practices and knowledge sharing behavior. Following the positivist paradigm, this research ado...
nowadays,tourism industry considered as one of the main sources of income of a country.unfortunately and despite of owning plenty of cultural historical and natural attractions, iran has not reached to a proper position in this field. besides, the historical cities of a country are considered as the income resource and national wealth of it. qazvin with a rich cultural precedent, have suitable ...
The term trust management suggests that trust can be managed, for example by creating trust, by assessing trustworthiness, or by determining optimal decisions based on specific levels of trust. The problem to date is that trust management in online environments is a diverse and ill defined discipline. In fact, the term trust management is being used with very different meanings in different con...
reinsurance is widely recognized as an important instrument in the capital management of an insurance company as well as its risk management tool. this thesis is intended to determine premium rates for different types of reinsurance policies. also, given the fact that the reinsurance coverage of every company depends upon its reserves, so different types of reserves and the method of their calc...
E nsuring public trust in election results has been a concern since antiquity. The Greeks carried out senatorial elections not by a simple showing of hands but by issuing little clay balls to the senators, who then cast their votes by dropping them into the appropriate pot. Paper ballots were first used by the Ro-mans; voting forms bearing the candidates' pre-printed names were introduced in Au...
Computing systems are finding their way into increasingly sensitive roles and settings: medical systems that manage patient care records and that link providers with hospitals and pharmacies, computer-assisted air traffic control systems, systems that administer energy delivery and electric power grids, and systems for chemical refineries and railroads. In these and other uses, we need computer...
Scientists go to great lengths to ensure that data are collected and analysed properly, so why, asks Eve Marder, do they apply different standards to data about the number of times research papers have been cited and viewed?
The Problem Traditionally, cyber intruders have sought to either exfiltrate proprietary information for financial gain or destroy data to create disruption. Large-scale data exfiltration is difficult because network administrators actively monitor and restrict the content and destination of outbound network flows. And, while an attack that destroys data may be disruptive in the short-term, the ...
Introduction 1. Public Acceptance of Various Applications of Biotechnology 2. Consumer Awareness of Genetically Modified Foods 3. Consumers Have A Negative View About Genetically Modified Foods 4. Perceived Benefits/Advantages 5. Perceived Risks 6. Relationship Between A Person's Level of Education A Perceptions of Benefits/Risks of Genetic Engineering 7. Gender Gap in Attitudes Toward Genetics...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید