984 research outputs found

    The Relationship between Power Bases and Influence Tactics of Program Planners

    Get PDF
    Asymmetrical power relationship between program planners and their superiors could cause substantial amount of constraints for program planners to execute tasks of planning in a democratic manner. Under such situation, program planners are required to negotiate with their superiors by using influence tactics to counterbalance the lop-sided power relationship with their superior. Program planners would also need to acquire power bases and use them as tools to influence their superiors. The main objective of the study was to determine power bases that predict the use of influence tactics by program planners. Along with this objective, the use of influence tactics by program planners, power bases of program planners, the use of influence tactics with respect to personal ctors of program planers and program planners’ perception of importance of power bases in the influence of superiors were also determined. The dependent variables were influence tactics namely pressuring, counteracting, bargaining, reasoning, consulting, appealing and networking tactics. The independent variables were power bases, which were made up of legitimate power, expert power, information control power, uncertainty and ambiguity-coping power, referent power, interpersonal-linkage power and communication-skill power. This is an ex post facto study where data were collected through survey questionnaires. The samples were made up of 367 program planners randomly chosen from 26 teacher training colleges. A total of 264 sets of questionnaires were collected and analyzed. Descriptive statistic was used to describe data pertaining to the use of influence tactics, power bases of program planners, and program planners’ perception of importance of power bases in the influence of superiors. One-way MANOVA was engaged to compare the use of influence tactics of program planners according to their personal characteristics. Multiple Linear Regression was used to determine power bases that predict the use of influence tactics by program planners. The findings of this study indicate that the three most frequently used influence tactics were consulting, reasoning and appealing tactics. Program planners were found to have high power bases with communication-skill power, interpersonal-linkage power and expert power as the three leading power bases. Expert power and legitimate power were perceived as the two most important power bases to influence superiors. The findings of the use of influence tactics with respect to personal factors indicate that there was significant difference in the use of influence tactics among program planners of different gender and age. However, there was no significant difference in the use of influence tactics among program planners of different race, service tenure, academic qualification and level of management in organization. The findings show that among the power bases, interpersonal-linkage power did no predict the use of any influence tactic. However, communication-skill power, referent power and information-control power were significant power bases that predicted the use of pressuring tactic by program planners. Legitimate power and information-control power were significant power bases that predicted the use of counteracting tactic by program planners. Communication-skill power and information-control power were significant power bases that predicted the use of bargaining tactic by program planners. Expert power was the only significant power base that predicted the use of reasoning tactic by program planners. Uncertainty and ambiguity-coping power was the only significant power bases that predicted the use of consulting tactic by program planners. Uncertainty and ambiguity-coping power and information-control power were significant power bases that predicted the use of appealing tactic by program planners. Communication-skill power and referent power were significant power bases that predicted the use of networking tactic by program planners

    Dipole approximation of the solution for an electrode configuration in two-layer resistivity problem

    Get PDF
    An electrode configuration which consists of a pair of current electrodes, spaced at a unit apart, being kept at a great distance r from a pair of potential electrodes also spaced at a unit apart, has been investigated. Two theoretical apparent resistivity formulae were derived by applying Kelvin\u27s theory of images to the problem of two-layer case. One formula is obtained by the exact method of solution, the other being obtained by considering the pair of current electrodes as a single dipole. Results of numerical calculations show that the greater the spacing r in comparison to the spacing a, the better the dipole approximation will be and that the dipole approximation is valid only under condition that r must be at least equal to 20a or greater. Theoretical analysis shows that the configuration possesses several limitations which render it useless as a method for locating horizontal discontinuities in conductivity --Abstract, page i

    A theoretical study on the interpretation of resistivity sounding data measured by the Wenner electrode system

    Get PDF
    This thesis deals with a theoretical study on the interpretation of resistivity sounding data measured by the Wenner electrode system. The objectives of this investigation are twofold: (i) to derive from the apparent resistivity data some suitable functions from which the resistivity and thickness of each member of the sequence of layers composing the earth may be determined, and (ii) to devise suitable methods for analyzing the resulting functions. In this investigation it is shown that the solution of the boundary value problem associated with an n-layered earth model leads to an integral equation for the Wenner electrode system. This integral equation relates the apparent resistivity function to an unknown function, termed the kernel, which is dependent on the layer resistivities and thicknesses. by solving this integral equation one does not obtain the kernel directly, but rather a related function, termed the associated kernel, from which an explicit integral expression for the kernel can be derived. Formulas for numerical integration are developed for the calculation of both the kernel and associated kernel from apparent resistivity data. These formulas are found to give satisfactory results. A numerical-graphical method is developed for the analysis of the kernel and the associated kernel. A further technique based on the principle of logarithmic curve matching is developed for the decomposition of the kernel alone. These methods are found to yield reasonably accurate values for the layer resistivities and thicknesses --Abstract, pages ii-iii

    A Motivational Framework For Understanding IS Use And Decision Performance

    Get PDF
    Despite the considerable resources that have been devoted to the study of information systems (IS) use and decision performance, much remains unknown about variables that provide valuable insight into these two important constructs.  We propose a comprehensive research framework for understanding IS use and decision performance.  In particular, we focus on the significant role of the motivation factor in explaining IS use and decision performance.  We develop our research framework based on a review of motivation, systems, decision performance, information processing, and auditing literatures.  A new stream of research is presented based on our motivational framework

    Insight into Individuals\u27 Reaction toward Information Security Breach

    Get PDF
    While a perpetratormay engage in an informationsecurity breach with a negative (e.g., to release anger and frustration) or positive (e.g., to improvesecurity)intent, it is unclear whether intent has animpact on individuals’ assessment of the perpetrator’s responsibility.This study provides insight into this issue. Additionally, we examinewhether moral affect explains the impact of perceived intensity of emotional distress on responsibility judgment (mediating hypothesis) and whether consideration of outcome strengthens the impact of moralaffect on responsibility judgment(moderating hypothesis). We analyze the usable responses of 187 participants and the results provide support for the hypotheses, except for the mediating hypothesis for the positive intentact. Lack of mediating effect inthe positive intentact suggests that the nature of theact might diminish the effect of moralaffect on responsibility judgment. The findings highlight the significant role of consideration of the outcome in the relationship between moral affect and responsibility judgment regardless of the nature of intent

    Endocrinology : Jack of All Trades Master of ... Some!

    Get PDF

    An Exploratory Study On Systems Security And Hacker Hiring

    Get PDF
    We conducted an exploratory study to enhance understanding on systems security and hacker hiring.  Increased understanding on these issues will assist firms in developing effective guidelines for mitigating problems associated with potential attacks and in designing recruitment procedures for hiring hackers.  Specifically, we examine the impact of corporate security policies on perceived systems security; the impact of internal (external) systems security audits on perceived systems security; and the willingness of firms in hiring hackers.

    An Empirical Investigation Of Hacking Behavior

    Get PDF
    Currently, very limited research is available to help researchers and firms understand the behavior of hackers.  As a result, misconceptions about hackers are formed based on lack of understanding about technology and failure in recognizing the differences among hackers.  We use addiction, intrinsic motivation (state), and self-monitoring (trait) theories to explain hacking.   We obtained 62 usable responses from hackers who completed our online research instrument.  Our findings showed that intrinsically motivated hackers were less discouraged by the possibility of being discovered and the rules imposed by regulatory authorities; however, no significant result was reported for rules imposed by the profession.  Individuals with high motivation to hack were found to be less discouraged by all three deterrence measures.  Participants who perceived hacking to be more consistent with their internal cues were less discouraged by the possibility of being discovered and the rules imposed by regulatory authorities; however, no significant difference was found for rules imposed by the profession.  Finally, contrary to our expectation, low self-monitors were more discouraged by all three deterrence measures than high self-monitors.  Additional research is needed to provide insight into this finding
    corecore