首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   12篇
  免费   0篇
管理学   3篇
理论方法论   2篇
社会学   7篇
  2020年   2篇
  2019年   1篇
  2017年   1篇
  2016年   1篇
  2015年   1篇
  2013年   1篇
  2011年   1篇
  2005年   1篇
  2004年   1篇
  2000年   1篇
  1987年   1篇
排序方式: 共有12条查询结果,搜索用时 0 毫秒
1.
This paper looks at the origins of ideas about community development as they emerged during Britain's administration of its African colonies from the 1920s to the 1950s. Significant influences on development policy and practice include changing ideas about state intervention within the British government, international scrutiny from international organizations, US interest in Africa, ideas and activities of missionary societies, technological developments, great leaps forward by key individuals, examples of state‐sponsored mass education schemes in Russia, colonial disturbances, and cataclysmic events such as the Great Depression, the rise of Hitler, and pre‐eminently, the Second World War itself. The evolution of community development ideas in Colonial Office practice will chiefly be illustrated through instructional films. Those which illustrate the argument are a striking example of community development in action because they are a visual medium in a visual age; they were seen as having a pivotal role in mass education schemes; they illustrate through their topics and scenarios what were seen as the hot development issues of the day; they capture the flavour of the period; and because they are a concrete illustration of the continuity of community development schemes in Africa in the colonial and post‐colonial eras.  相似文献   
2.
3.
4.
5.
6.
7.
Social security in Singapore is met by a compulsory personal savings scheme under the Central Provident Fund. Part of these savings go towards the individual's healthcare needs which are met through a spectrum of three schemes – Medisave, Medishield and Medifund, or the '3Ms'. This study examines the effectiveness of the '3Ms' in making healthcare services affordable to families with cancer-stricken children. The extent to which the '3Ms' support costly cancer treatment is an indication of the healthcare financing system's ability to meet diverse healthcare needs. Literature research and interviews with medical social workers and families with cancer-stricken children indicate that the '3Ms' are unable to support these families' medical needs without the help of voluntary welfare organisations. This suggests that there is a need to question a rigid adherence to financial prudence and consider a more flexible healthcare system that is responsive to varied needs.  相似文献   
8.
Since its inception, public relations in Australia has grown in professional stature, status, education, research, and practice. As these trends progress, visibility of the profession is becoming steadily more pronounced in the industry, education, and public domain. Over the last two decades the Public Relations Institute of Australia together with its strategic alliances have made many changes, structurally, strategically, and academically towards the professional growth of public relations. This article briefly discusses the views of the Public Relations Institute of Australia and offers a snapshot of two surveys[1] on professional practice and related issues. Although direct comparisons are not meant to be made from these studies, both surveys offer insights into aspects of Australian public relations. Whereas mixed findings and scenarios are evident, and the surveys highlight areas for further development, the profession, with close attention to existing threats, is poised to grow in Australia.Raveena Singh is program director and senior lecturer at the University of Canberra (Australian Capital Territory) and Rosaleen Smyth is senior lecturer and public relations coordinator at Deakin University (Victoria). Both authors are coeditors of the Asia Pacific Public Relations Journal.  相似文献   
9.
Security researchers agree that security control is a difficult to observe credence quality of online services that Internet users cannot easily assess through research or experience. Yet there is evidence that users form perceptions of security control that strongly determine how much trust they put in online services. This study investigates whether users’ security control perceptions arise solely from their predispositions or whether online service providers can influence them. The study also examines whether these seemingly undependable perceptions of security control lead to trust or whether more traditional factors might offer a better explanation of trust under security risks. To address these issues, this study proposes a new theory of security assurance that integrates the frameworks of trust and quality signals. The results show that rather than being guided by predispositions, users appear to mainly assess security control based on indirect cues controlled by service providers. Importantly, Internet users do not treat the credence quality of security the same way they treat qualities that can be understood through search and experience. Although returning users develop security control perceptions and trust from the usual heuristics of ongoing relationships, they also continue to evaluate market information about service providers like they do in new relationships. The proposed model offers a new perspective of how users respond to the uncertain and technically challenging qualities prevalent in online services.  相似文献   
10.
This paper discusses two principles that have become increasingly important in the design of knowledge-based systems: domain-specific knowledge used to support opportunistic reasoning and hierarchical organization structure used to control and coordinate problem-solving activity. We propose a design framework that embodies these two principles and describe how this framework has been used to develop a knowledge-based job-shop scheduling system. This system, called OPIS 0, has undergone limited testing in an experimental environment modeled after an actual job shop. Its performance has been very good compared to ISIS and to the more traditional approach of constructing a schedule by dispatching jobs using the COVERT priority rule. The resulting design also shows potential for use in a decision support role.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号