نتایج جستجو برای: attitude and security

تعداد نتایج: 16852291  

2012
Ai Cheo Yeo Mahbubur Rahim Yin Ying

Persuasive technology has been applied in marketing, health, environmental conservation, safety and other domains and is found to be quite effective in changing people’s attitude and behaviours. This research extends the application domains of persuasive technology to information security awareness and uses a theory-driven approach to evaluate the effectiveness of a web-based program developed ...

2009
E. Booker Carl Rebman

This study compares changes in attitudes of students towards organizational security policies and procedures at various institutions that have implemented information security policy training as part of the orientation and ongoing training for students. The results indicate that those institutions that provide multiple venues to discuss security policies and procedures during the student career...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه تبریز - دانشکده ادبیات و زبانهای خارجی 1393

for several years, researchers in familiarity of efl teachers with post-method and its role in second and foreign language learners’ productions have pointed out that the opportunity to plan for a task generally develops language learners’ development (ellis, 2005). it is important to mention that the critical varies in language teaching was shown is the disappearances of the concept of method ...

2013
Miranda Kajtazi Burcu Bulgurcu

This study aims to facilitate a new understanding on employees’ attitude towards compliance with the requirements of their information security policy (ISPs) through the lens of escalation. Escalation presents a situation in which employees must decide whether to persist in or withdraw from a non-performing task. Drawing on the Theory of Planned Behavior (TPB) and Agency Theory, our model delin...

Journal: :IJICTE 2008
Lori Baker-Eveleth Daniel M. Eveleth Michele O'Neill Robert W. Stone

Expectancy theory is applied to the use of software that secures the testing environment of in-class examinations. This security software prohibits students from viewing unauthorized material during an examination. The empirical study collected 60 student questionnaire responses completed after using the security software. These responses were used to develop measures for a model derived from e...

پایان نامه :0 1374

having conducted the experiment and analysed the data, the researcher computed the groups mean scores and variances for the test relating to the research question. as the final atep, a t-test was conodonted for the hypothesis. as noted earlier, the significance level was determined at .05 and .01 respectively. the observed t-value was higher than the critical t-value at. 5 and .01 levels. conse...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه پیام نور - دانشگاه پیام نور استان تهران - دانشکده اقتصاد و علوم اجتماعی 1389

چکیده: پژوهش حاضر به بررسی تطبیقی اعتماد اجتماعی در بین دبیران زن و مرد مقطع راهنمایی شهر ایلام می پردازد. امروزه در جوامع شاهد گسترش ارتباطات هستیم و با توجه به این که دامنه کنش های اجتماعی از حد روابط با آشنایان و دوستان فراتر رفته و به تعامل با کنشگران غربیه و نا آشنا گسترش یافته است، لزوم وجود اعتماد، بیش از پیش احساس می شود. اما با توجه به نقش دبیران در نهادهای آموزشی، در انتقال ارزش ها و...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه گیلان - دانشکده علوم انسانی 1391

the present study sought to investigate the impact of using mind-mapping technique instruction on female elementary efl learners reading comprehension; it also investigated their attitudes towards using mind-mapping technique as a tool to improve their reading comprehension. this study followed a quasi-experimental design with two intact groups as experimental, and control groups. the participa...

2017
Md Mahbubur Rahim Kevin Cheong Ai Cheo

IT security expert’s presentation is one of the most advocated strategies to improve end-users’ information security aware behaviour. However, no systematic evaluation has yet been reported in the IT literature to comprehensively evaluate the effectiveness of this strategy. To address this gap, a theory driven instrument was developed to evaluate the effectiveness of IT security expert’s presen...

  Background and Objectives:  The level of knowledge and attitude of students has an effective role in improving nutritional status and food security. Therefore, the present study was conducted to determine the knowledge and attitude of engineering and technical sciences students regarding health and safety of food. Materials and Methods: This descriptive study was performed on 100 students o...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید