Zobrazeno 1 - 10
of 16
pro vyhledávání: '"Jung-Ting Chang"'
Autor:
Jung-Ting Chang, 張蓉庭
104
This essay depicts the author’s art creating experiences from 2013 to 2015. Discovering the experiences from the author’s point of view via literature writing and art creations. And finally understand the transformation and growth within
This essay depicts the author’s art creating experiences from 2013 to 2015. Discovering the experiences from the author’s point of view via literature writing and art creations. And finally understand the transformation and growth within
Externí odkaz:
http://ndltd.ncl.edu.tw/handle/z5g7vf
Autor:
Jung-Ting Chang, 張榕庭
97
The government has opened the market for Qualified Foreign Institutional Investors (QFII) to directly invest in Taiwan stock market since 90’s. The foreign investors account for about 24% of monthly trading amounts in 2008.Recently, the rum
The government has opened the market for Qualified Foreign Institutional Investors (QFII) to directly invest in Taiwan stock market since 90’s. The foreign investors account for about 24% of monthly trading amounts in 2008.Recently, the rum
Externí odkaz:
http://ndltd.ncl.edu.tw/handle/53649232610006526568
Autor:
Jung-Ting Chang, 張榮庭
94
Information systems (IS) threats to business exacerbate with the development of information technology. A lack of robust security means that organizations expose themselves to considerable threats. This work examines the relationship between
Information systems (IS) threats to business exacerbate with the development of information technology. A lack of robust security means that organizations expose themselves to considerable threats. This work examines the relationship between
Externí odkaz:
http://ndltd.ncl.edu.tw/handle/55052036702675092034
Publikováno v:
Solar Energy Materials and Solar Cells. 144:418-421
The CuPtB ordering and the antiphase boundaries (APBs) in GaInP2 epifilms were found to be diminished by the addition of the surfactant antimony (Sb) during the epitaxy. This is evidenced by the disappearance of the APBs related deep level peak in th
Autor:
Arthur Jung-Ting Chang, Quey-Jen Yeh
Publikováno v:
Information & Management. 44:480-491
IS security threats have increased significantly in recent years. We identified the gaps between manager perceptions of IS security threats and the security countermeasures adopted by firms by collecting empirical data from 109 Taiwanese enterprises.
Autor:
Arthur Jung-Ting Chang, Quey-Jen Yeh
Publikováno v:
Information Management & Computer Security. 14:343-360
PurposeModernized information systems (IS) have brought enterprises not only enormous benefits, but also linked information threats. Most enterprises solve their IS security‐related problems using technical means alone, and focus on technical rathe
Publikováno v:
2012 IEEE International Conference on Management of Innovation & Technology (ICMIT).
Organizations highly prioritize strengthening employee compliance with information security policies. Despite the considerable attention paid to how employees' beliefs and attitudes towards security policy compliance affect compliant behavior or its
Autor:
Arthur Jung-Ting Chang
Publikováno v:
2010 IEEE International Conference on Management of Innovation & Technology.
Past research has clarified effective IS security and examined the contributors to security technology adoption in organizations. Based on the research as well as the traditional technology acceptance model, this study proposes a conceptual model tha
Autor:
Quey-Jen Yeh, Arthur Jung-Ting Chang
Publikováno v:
2006 IEEE International Conference on Management of Innovation and Technology.
Modernized information systems (IS) have brought enterprises not only enormous benefits, but also linked information threats. Most enterprises solve their IS security-related problems using technical means alone, and focus on technical rather than ma
Autor:
Arthur Jung-Ting Chang, Quey-Jen Yeh
Publikováno v:
International Journal of Technology Management. 54:321
Research of information system security (ISS) usually conceives of security models on the basis of positive, strategic benefits, such as planning or developing a security baseline. However, ISS works only when it enables an organization to protect ag