919 resultados para Womens Evaluations
Resumo:
Mode of access: Internet.
Resumo:
Kitagawa Utamaro; 1 ft. 3 in.x 10 1/8 in.; woodcut, ink and color on paper
Resumo:
"First printing: March 2001"--T.p. verso.
Resumo:
"Doc. no. 81/40."
Resumo:
"A warning to all Friends, who profess the everlasting truth of God," by Mary Waite, p. 10-22.
Resumo:
Mode of access: Internet.
Resumo:
"B-222962"--p.1.
Resumo:
Contract No. CA-654.
Resumo:
Bibliography: leaves 16-17.
Resumo:
"B-281160"--P. 1.
Resumo:
This experiment examined members' evaluations of a group leader and the group in contexts where a superordinate group comprised two subgroups and the group leader was aligned with one or other subgroup. The design varied group leader (ingroup, outgroup) and leader behavior (ingroup favoring, outgroup favoring) as well as the broader comparative context (intragroup, intergroup). Across a number of measures, results indicated a consistent Group Leader x Leader Behavior interaction that was independent of comparative context. Although group members were most satisfied with an ingroup leader who favored the ingroup, ingroup leaders were perceived positively irrespective of their behavior Outgroup leaders who unexpectedly favored the other subgroup were also perceived positively. However, outgroup leaders who favored their own subgroup were perceived as less fair and as more biased than other leaders. They also engendered less identification with the superordinate group and a less unified perception of the group. Results demonstrate the importance of social identity concerns to leadership in nested group contexts and emphasize the fact that perceptions of leader fairness and concern for the common group mediate responses to the superordinate category. Copyright (C) 2003 John Wiley Sons, Ltd.
Resumo:
The data structure of an information system can significantly impact the ability of end users to efficiently and effectively retrieve the information they need. This research develops a methodology for evaluating, ex ante, the relative desirability of alternative data structures for end user queries. This research theorizes that the data structure that yields the lowest weighted average complexity for a representative sample of information requests is the most desirable data structure for end user queries. The theory was tested in an experiment that compared queries from two different relational database schemas. As theorized, end users querying the data structure associated with the less complex queries performed better Complexity was measured using three different Halstead metrics. Each of the three metrics provided excellent predictions of end user performance. This research supplies strong evidence that organizations can use complexity metrics to evaluate, ex ante, the desirability of alternate data structures. Organizations can use these evaluations to enhance the efficient and effective retrieval of information by creating data structures that minimize end user query complexity.
Resumo:
Understanding the contribution of marketing to economic and social outcomes is fundamental to broadening the focus of marketing. The authors develop a comprehensive model that integrates the impact of service quality and service satisfaction on both economic and societal outcomes. The model is validated using two random samples involving intensive health services. The results indicate that service quality and service satisfaction significantly enhance quality of life and behavioral intentions, highlighting that customer service has social as well as economic outcomes. This is an important finding given the movement toward recognizing social and environmental outcomes, such as emphasized through triple bottom-line reporting. The findings have important implications for managing service processes, for improving the quality of life of customers, and for enhancing customers' behavioral intentions toward the organization.
Resumo:
Electronic communications devices intended for government or military applications must be rigorously evaluated to ensure that they maintain data confidentiality. High-grade information security evaluations require a detailed analysis of the device's design, to determine how it achieves necessary security functions. In practice, such evaluations are labour-intensive and costly, so there is a strong incentive to find ways to make the process more efficient. In this paper we show how well-known concepts from graph theory can be applied to a device's design to optimise information security evaluations. In particular, we use end-to-end graph traversals to eliminate components that do not need to be evaluated at all, and minimal cutsets to identify the smallest group of components that needs to be evaluated in depth.