561 resultados para Successful Strategies


Relevância:

30.00% 30.00%

Publicador:

Resumo:

Work ability describes employees' capability to carry out their work with respect to physical and psychological job demands. This study investigated direct and interactive effects of age, job control, and the use of successful aging strategies called selection, optimization, and compensation (SOC) in predicting work ability. We assessed SOC strategies and job control by using employee self-reports, and we measured employees' work ability using supervisor ratings. Data collected from 173 health-care employees showed that job control was positively associated with work ability. Additionally, we found a three-way interaction effect of age, job control, and use of SOC strategies on work ability. Specifically, the negative relationship between age and work ability was weakest for employees with high job control and high use of SOC strategies. These results suggest that the use of successful aging strategies and enhanced control at work are conducive to maintaining the work ability of aging employees. We discuss theoretical and practical implications regarding the beneficial role of the use of SOC strategies utilized by older employees and enhanced contextual resources at work for aging employees.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

The concept of focus on opportunities describes how many new goals, options, and possibilities employees believe to have in their personal future at work. This study investigated the specific and shared effects of age, job complexity, and the use of successful aging strategies called selection, optimization, and compensation (SOC) in predicting focus on opportunities. Results of data collected from 133 employees of one company (mean age = 38 years, SD = 13, range 16–65 years) showed that age was negatively, and job complexity and use of SOC strategies were positively related to focus on opportunities. In addition, older employees in high-complexity jobs and older employees in low-complexity jobs with high use of SOC strategies were better able to maintain a focus on opportunities than older employees in low-complexity jobs with low use of SOC strategies.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The purpose of this research was to develop and test a multicausal model of the individual characteristics associated with academic success in first-year Australian university students. This model comprised the constructs of: previous academic performance, achievement motivation, self-regulatory learning strategies, and personality traits, with end-of-semester grades the dependent variable of interest. The study involved the distribution of a questionnaire, which assessed motivation, self-regulatory learning strategies and personality traits, to 1193 students at the start of their first year at university. Students' academic records were accessed at the end of their first year of study to ascertain their first and second semester grades. This study established that previous high academic performance, use of self-regulatory learning strategies, and being introverted and agreeable, were indicators of academic success in the first semester of university study. Achievement motivation and the personality trait of conscientiousness were indirectly related to first semester grades, through the influence they had on the students' use of self-regulatory learning strategies. First semester grades were predictive of second semester grades. This research provides valuable information for both educators and students about the factors intrinsic to the individual that are associated with successful performance in the first year at university.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In this work, we examine unbalanced computation between an initiator and a responder that leads to resource exhaustion attacks in key exchange protocols. We construct models for two cryp-tographic protocols; one is the well-known Internet protocol named Secure Socket Layer (SSL) protocol, and the other one is the Host Identity Protocol (HIP) which has built-in DoS-resistant mechanisms. To examine such protocols, we develop a formal framework based on Timed Coloured Petri Nets (Timed CPNs) and use a simulation approach provided in CPN Tools to achieve a formal analysis. By adopting the key idea of Meadows' cost-based framework and re¯ning the de¯nition of operational costs during the protocol execution, our simulation provides an accurate cost estimate of protocol execution compar- ing among principals, as well as the percentage of successful connections from legitimate users, under four di®erent strategies of DoS attack.