当前位置:文档之家› 云计算研究现状文献综述及外文文献

云计算研究现状文献综述及外文文献

云计算研究现状文献综述及外文文献
云计算研究现状文献综述及外文文献

本文档包括该专题的:外文文献、文献综述

文献标题:An exploratory study on factors affecting the adoption of cloud computing by information professionals

作者:Aharony, Noa

期刊:The Electronic Library, 33(2), 308-328.

年份:2015

一、外文文献

An exploratory study on factors affecting the adoption of cloud computing by

information professionals

(影响云计算采用与否的一个探索性研究)

Aharony, Noa

Purpose

- The purpose of this study explores what factors may influence information professionals to adopt new technologies, such as cloud computing in their organizations. The objectives of this study are as follows: to what extent does the technology acceptance model (TAM) explain information professionals intentions towards cloud computing, and to what extent do personal characteristics, such as cognitive appraisal and openness to experience, explain information professionals intentions to use cloud computing.

Design/methodology/approach

- The research was conducted in Israel during the second semester of the 2013 academic year and encompassed two groups of information professionals: librarians and information specialists. Researchers used seven questionnaires to gather the following data: personal details, computer competence, attitudes to cloud computing, behavioral intention, openness to experience, cognitive appraisal and self-efficacy. Findings

- The current study found that the behavioral intention to use cloud computing was impacted by several of the TAM variables, personal characteristics and computer competence.

Originality/value

- The study expands the scope of research about the TAM by applying it to information professionals and cloud computing and highlights the importance of individual traits, such as cognitive appraisal, personal innovativeness, openness to experience and computer competence when considering technology acceptance. Further, the current study proposes that if directors of information organizations assume that novel technologies may improve their organizations' functioning, they should be familiar with both the TAM and the issue of individual differences. These factors may help them choose the most appropriate workers.

Keywords: Keywords Cloud computing, TAM, Cognitive appraisal, Information professionals, Openness to experience

Introduction

One of the innovations that information technology (IT) has recently presented is the

phenomenon of cloud computing. Cloud computing is the result of advancements in various technologies, including the Internet, hardware, systems management and distributed computing (Buyya et al. , 2011). Armbrust et al. (2009) suggested that cloud computing is a collection of applications using hardware and software systems to deliver services to end users via the Internet. Cloud computing offers a variety of services, such as storage and different modes of use (Leavitt, 2009). Cloud computing enables organizations to deliver support applications and avoid the need to develop their own IT systems (Feuerlicht et al. , 2010).

Due to the growth of cloud computing use, the question arises as to what factors may influence information professionals to adopt new technologies, such as cloud computing, in their organizations. Assuming that using new technologies may improve the functioning of information organizations, this study seeks to explore if information professionals, who often work with technology and use it as an important vehicle in their workplace, are familiar with technological innovations and whether they are ready to use them in their workplaces. As the phenomenon of cloud computing is relatively new, there are not many surveys that focus on it and, furthermore, no one has so far focussed on the attitudes of information professionals towards cloud computing. The research may contribute to an understanding of the variables that influence attitudes towards cloud computing and may lead to further inquiry in this field.

The current study uses the well-known technology acceptance model (TAM), a theory for explaining individuals' behaviours towards technology (Davis, 1989; Venkatesh, 2000), as well as personal characteristics, such as cognitive appraisal and openness to new experiences, as theoretical bases from which we can predict factors which may influence information professionals adopting cloud computing in their workplaces. The objectives of this study are to learn the following: the extent to which the TAM explains information professionals' attitudes towards cloud computing, and the extent to which personal characteristics, such as cognitive appraisal and openness to experiences, explain the intention of information professionals to use cloud computing.

Theoretical background

Cloud computing

Researchers have divided cloud computing into three layers: Software as a Service (SaaS), Platform as a Service (PaaS) and Infrastructure as a Service (IaaS). SaaS has changed the concept of software as a product to that of a service instead. The software runs in the cloud and the user can access it via the Internet to work on an application. PaaS enables powerful tools for developers to create the applications, without having to deal with concerns about the infrastructure. IaaS provides complete infrastructure resources (e.g. servers, software, network equipment and storage). With IaaS, consumers do not have to purchase the latest technology, perform maintenance, upgrade software or buy software licenses (Anuar et al. , 2013). Cloud computing deployment can be divided into four types: private clouds, public clouds, community clouds and hybrid clouds (Mell and Grance, 2011). Public clouds have open access, private clouds run within organizations, community clouds contain

resources that are shared with others in the community and hybridclouds encompass two or more cloud models. Anuar et al. (2013) presented the main characteristics of cloud computing: flexible scale that enables flexible-scale capabilities for computing; virtualization that offers a new way of getting computing resources remotely, regardless of the location of the user or the resources; high trust , as the cloud offers more reliability to end users than relying on local resources; versatility , because cloud services can serve different sectors in various disciplines use the same cloud; and on demand service , as end users can tailor their service needs and pay accordingly.

As cloud computing is relatively new, there are not a lot of surveys that focus on it. Several researchers conducted in-depth interviews investigating respondents' attitudes towards keeping their virtual possessions in the online world (Odom et al. , 2012). Teneyuca (2011) reported on a survey of cloud computing usage trends that included IT professionals as respondents. Results revealed preferences for virtualization and cloud computing technologies. However, the major reasons for cloud computing adoption being impeded were the lack of cloud computing training (43 per cent) and security concerns (36 per cent). Another report showed that nearly 40 per cent of Americans think that saving data to their hard drive is more secure than saving it to a cloud (Teneyuca, 2011). A further study (Ion et al., 2011) explored private users' privacy attitudes and beliefs about cloud computing in comparison with those in companies. Anuar et al. (2013) investigated cloud computing in an academic institution, claiming that cloud computing technology enhances performance within the academic institution. A study that was carried out in the education arena examined factors that led students to adopt cloud computing technology (Behrend et al. , 2010). Technology acceptance model

The TAM (Davis, 1989) is a socio-technical model which aims to explain user acceptance of an information system. It is based on the theory of reasoned action (TRA) (Fishbein and Ajzen, 1975) which seeks to understand how people construct behaviours. The model suggests that technology acceptance can be explained according to the individual's beliefs, attitudes and intentions (Davis, 1989). The TAM hypothesizes that one's intention is the best predictor of usage behaviour and suggests that an individual's behavioural intention to use technology is determined by two beliefs: perceived usefulness (PU) and perceived ease of use (PEOU). PU refers to the individual's perception that using a technology will improve performance and PEOU addresses a user's perceptions that using a particular system would be free of effort (Davis, 1989). The current study concentrates on PEOU as the researchers wanted to examine if information professionals' perceptions about new technology is affected by its simplicity and friendly interface. Earlier research mainly investigated personal behaviour to use new information systems and technology in the following: corporate environments (Gefen and Straub, 1997);

Web shopping (Chang et al. , 2002; Lin and Lu, 2000);

education, particularly e-learning (Park, 2009) and m-learning (Aharony, 2014); and the library arena (Aharony, 2011; Park et al. , 2009).

Personal innovativeness

A construct which may contribute to information professionals' intention behaviour to use cloud computing is personal innovativeness, a major characteristic in innovation diffusion research in general (Agarwal and Prasad, 1998; Rogers, 1983, 1995). Agarwal and Prasad (1998) have coined the term "personal innovativeness in the domain of IT" (PIIT), which describes a quite stable characteristic of the individual across situational considerations. Previous studies found that personal innovativeness is a significant determinant of PEOU, as well as of PU (Agarwal and Karahanna, 2000; Lewis et al. , 2003). Several researchers have suggested that innovative people will search for intellectually or sensorially stimulating experiences (Uray and Dedeoglu, 1997).

Openness to experience

Another variable that may predict respondents' perspectives towards cloud computing is openness to experience which addresses the tendency to search for new and challenging experiences, to think creatively and to enjoy intellectual inquiries (McCrae and Sutin, 2009). People who are highly open to experience are perceived as also open to new challenges, thoughts and emotions (McCrae and Costa, 2003). Studies reported that there is a positive relation between openness to experience and intelligence tests (Gignac et al. , 2004). According to Weiss et al. (2012), challenging transitions may influence differently those who are high or low in openness to experience. Those who are high may approach these situations with curiosity, emphasizing the new possibilities offered to them. However, those who are low in openness may be threatened and try to avoid them by adhering to predictable environments. Various researchers note that people who are high in openness to experience are motivated to resolve new situations (McCrae, 1996; Sorrentino and Roney, 1999). Furthermore, openness to experience is associated with cognitive flexibility and open-mindedness (McCrae and Costa, 1997), and negatively associated with rigidity, uncertainty and inflexibility (Hodson and Sorrentino, 1999). Thus, people who are less open to experience tend to avoid novelty and prefer certainty. Studies reveal that openness to experience declines in the later years (Allemand et al. , 2007; Donnellan and Lucas, 2008).

Challenge and threat

The following section will focus on the personality characteristics of challenge and threat that might affect information professionals' behavioural intention to use cloud computing. Challenge and threat are the main variables of a unidimensional, bipolar motivational state. They are the result of relative evaluations of situational demands and personal resources that are influenced both by cognitive and affective processes in motivated performance situations (Vick et al. , 2008). According to Lazarus and Folkman (1984), challenge refers to the potential for growth or gain and is characterized by excitement and eagerness, while threat addresses potential harm and is characterized by anxiety, fear and anger. Situations that suggest low demands and high resources are described as challenging, while those that suggest high demands and low resources are perceived as threatening (Seginer, 2008). In general, challenge or threat can take place in situations such as delivering a speech, taking a test, sports competitions or performing with another person on a cooperative or competitive task.

The challenge appraisal suggests that with effort, the demands of the situation can be overcome (Lazarus et al. , 1980; Park and Folkman, 1997). On the other hand, threat appraisal indicates potential danger to one's well-being or self-esteem (Lazarus, 1991; Lazarus and Folkman, 1984), as well as low confidence in one's ability to cope with the threat (Bandura, 1997; Lazarus, 1991; Lazarus and Folkman, 1984). Different studies (Blascovich et al. , 2002; Blascovich and Mendes, 2000; Lazarus and Folkman, 1984; Lazarus et al. , 1980) have found that challenge leads to positive feelings associated with enjoyment, better performance, eagerness and anticipation of personal rewards or benefits. Several studies which focussed on the threat and challenge variable were carried out in the library and information science environment as well (Aharony, 2009, 2011).

Self-efficacy

An additional variable which may influence individuals' behavioural intention to use cloud computing is self-efficacy. The concept of self-efficacy was developed in the discipline of "social learning theory" by Bandura (1997). Self-efficacy addresses individuals' beliefs that they possess the resources and skills needed to perform and succeed in a specific task. Therefore, individuals' previous performance and their perceptions of relevant resources available may influence self-efficacy beliefs (Bandura, 1997). Self-efficacy is not just an ability perception, it encompasses the motivation and effort required to complete the task and it helps determine which activities are required, the effort in pursuing these activities and persistence when facing obstacles (Bandura, 1986, 1997). The construct of self-efficacy is made up of four principal sources of information:

"mastery experience" refers to previous experience, including success and failure; "vicarious experience" addresses observing the performances, successes and failures of others;

"social persuasion" includes verbal persuasion from peers, colleagues and relatives; and

"physiological and emotional states" from which people judge their strengths, capabilities and vulnerabilities (Bandura, 1986, 1994, 1995).

As self-efficacy is based on self-perceptions regarding different behaviours, it is considered to be situation specific. In other words, a person may exhibit high levels of self-efficacy within one domain, while exhibiting low levels within another (Cassidy and Eachus, 2002). Thus, self-efficacy has generated research in various disciplines such as medicine, business, psychology and education (Kear, 2000; Lev, 1997; Schunk, 1985; Koul and Rubba, 1999). Computer self-efficacy is a sub-field of self-efficacy. It is defined as one's perceived ability to accomplish a task with the use of a computer (Compeau and Higgins, 1995). Various studies have noted that training and experience play important roles in computer self-efficacy (Compeau and Higgins, 1995; Kinzie et al. , 1994; Stone and Henry, 2003). Several studies have investigated the effect of computer self-efficacy on computer training performance (Compeau and Higgins, 1995) and on IT use (Easley et al. , 2003).

Hypotheses

Based on the study objectives and assuming that PEOU, personal innovativeness,

cognitive appraisal and openness to experience may predict information professionals' behavioural intention to use cloud computing, the underlying assumptions of this study are as follows:

H1. High scores in respondent PEOU will be associated with high scores in their behavioural intention to use cloud computing.

H2. High scores in respondents' personal innovativeness will be associated with high scores in their behavioural intention to use cloud computing.

H3. Low scores in respondents' threat and high scores in respondents' challenge will be associated with high scores in their behavioural intention to use cloud computing. H4. High scores in respondents' self-efficacy will be associated with high scores in their behavioural intention to use cloud computing.

H5. High scores in respondents' openness to experience will be associated with high scores in their behavioural intention to use cloud computing.

H6. High scores in respondents' computer competence and in social media use will be associated with high scores in their behavioural intention to use cloud computing. Methodology

Data collection

The research was conducted in Israel during the second semester of the 2013 academic year and encompassed two groups of information professionals: librarians and information specialists. The researchers sent a message and a questionnaire to an Israeli library and information science discussion group named "safranym", which included school, public and academic librarians, and to an Israeli information specialist group named "I-fish", which consists of information specialists that work in different organizations. Researchers explained the study's purpose and asked their members to complete the questionnaire. These two discussion groups consist of about 700 members; 140 responses were received, giving a reply percentage of 20 per cent. Data analysis

Of the participants, 25 (17.9 per cent) were male and 115 (82.1 per cent) were female. Their average age was 46.3 years.

Measures

The current study is based on quantitative research. Researchers used seven questionnaires to gather the following data: personal details, computer competence, attitudes towards cloud computing, behavioural intention, openness to experience, cognitive appraisal and self-efficacy.

The personal details questionnaire had two statements. The computer competence questionnaire consisted of two statements rated on a 5-point Likert scale (1 = strongest disagreement; 5 = strongest agreement). The cloud computing attitude questionnaire, based on Liuet al. (2010), was modified for this study and consisted of six statements rated on a seven-point Likert scale (1 = strongest disagreement; 7 = strongest agreement). A principal components factor analysis using Varimax rotation with Kaiser Normalization was conducted and explained 82.98 per cent of the variance. Principal components factor analysis revealed two distinct factors. The first related to information professionals' personal innovativeness (items 2, 3 and 5), and the second to information professionals' perceptions about cloud computing ease of

use (PEOU) (items 1, 4, and 6); the values of Cronbach's Alpha were 0.89 and 0.88, respectively.

The behavioural intention questionnaire, based on Liu et al. (2010), was modified for this study and consisted of three statements rated on a six-point Likert scale (1 = strongest disagreement; 6 = strongest agreement). Its Cronbach's Alpha was 0.79. The openness to experience questionnaire was derived from the Big Five questionnaire (John et al. , 1991) and consisted of eight statements rated on a five-point Likert scale (1 = strongest disagreement; 5 = strongest agreement); Cronbach's Alpha was 0.81. The cognitive appraisal questionnaire measured information professionals' feelings of threat versus challenge when confronted with new situations. It consisted of 10 statements rated on a six-point scale (1 = fully disagree; 6 = fully agree). This questionnaire was previously used (Aharony, 2009, 2011; Yekutiel, 1990) and consisted of two factors: threat (items 1, 2, 3, 5, 7 and 8) and challenge (items 4, 6, 9 and 10). Cronbach's Alpha was 0.70 for the threat factor and 0.89 for the challenge factor.

The self-efficacy questionnaire was based on Askar and Umay's (2001) questionnaire and consisted of 18 statements rated on a five-point scale (1 = fully disagree; 5 = fully agree); Cronbach's Alpha was 0.96.

Findings

To examine the relationship between openness to experience, cognitive appraisal (threat, challenge and self-efficacy), TAM variables (personal innovativeness and PEOU), and behavioural intention to use cloud computing, researchers performed Pearson correlations, which are given in Table I.

Table I presents significant correlations between research variables and the dependent variable (behavioural intention to use cloud computing). All correlations are positive, except the one between threat and behavioural intention to use cloud computing. Hence, the higher these measures, the greater the behavioural intention to use cloud computing. A significant negative correlation was found between threat and the dependent variable. Therefore, the more threatened respondents are, the lower is their behavioural intention to use cloud computing.

Regarding the correlations between research variables, significant positive correlations were found between openness to experience and challenge, self-efficacy, personal innovativeness and PEOU. A significant negative correlation was found between openness to experience and threat. That is, the more open to experience respondents are, the more challenged they are, the higher is their self-efficacy, personal innovativeness, and PEOU and the less threatened they are. In addition, significant negative correlations were found between threat and self-efficacy, personal innovativeness and PEOU. We can conclude that the more threatened respondents are, the less they are self-efficient, personally innovative and the less they perceive cloud computing as easy to use. Significant positive correlations were also found between self-efficacy and personal innovativeness and PEOU. Thus, the more self-efficient respondents are, the more personally innovative they are and the more they perceive cloud computing as easy to use.

The study also examined two variables associated with computer competence:

computer use and social media use. Table II presents correlations between these two variables and the other research variables.

Significant, high correlations were found between computer competence variables and openness to experience, self-efficacy, personal innovativeness, PEOU and behavioural intention to use cloud computing. Hence, the higher respondents' computer competence, the more they are open to experience, self-efficient and personally innovative, and perceive cloud computing as easy to use, the higher is their behavioural intention to use cloud computing.

Researchers also examined relationships with demographic variables. To examine the relationship between age and other research variables, the researchers performed Pearson correlations. A significant negative correlation was found between age and PEOU, r = -0.21, p < 0.05. We may assume that the younger the respondents are, the more they perceive cloud computing as easy to use. To examine whether there are differences between males and females concerning the research variables, a MANOV A was performed and did not reveal a significant difference between the two groups concerning research variables, F (7,130) = 1.88, p > 0.05.

The researchers also conducted a hierarchical regression using behavioural intention to use cloud computing as a dependent variable. The predictors were entered as five steps:

respondents' openness to experience;

respondents' computer competence (computer use and social media use);

cognitive appraisal (threat, challenge and self-efficacy);

TAM variables (personal innovativeness and PEOU); and

interactions with the TAM variables.

The entrance of the four first steps was forced, while the interactions were done according to their contribution to the explained variance of behavioural intention to use cloud computing. The regression explained 54 per cent of behavioural intention to use cloud computing. Table III presents the standardized and unstandardized coefficients of the hierarchical regression of respondents' behavioural intention to use cloud computing.

The first step introduced the openness variable that contributed significantly by adding 13 per cent to the explained variance of behavioural intention to use cloud computing. The beta coefficient of the openness variable is positive; hence, the more open to experience respondents are, the higher is their behavioural intention to use cloud computing. The second step introduced the two computer competence variables (computer use and social media use) which contributed 5 per cent to the explained variance of behavioural intention. Of these two variables, only the social media variable contributed significantly and its beta coefficient was positive. In other words, the more respondents use social media, the higher is their behavioural intention to use cloud computing. Note that Pearson correlations found significant positive correlations between these two variables and behavioural intention to use cloud computing. It seems that because of the correlation between these two variables, r = 0.33, p < 0.001, the computer use variable did not contribute to the regression.

As the third step, researchers added respondents' personal appraisal variables (threat and challenge, and self-efficacy), and this also contributed significantly by adding 25 per cent to the explained variance of behavioural intention. The beta coefficients of challenge and of self-efficacy were positive, while that of threat was negative. Therefore, we may conclude that the more respondents perceived themselves as challenged and self-efficient, and the less they perceived themselves as threatened, the higher is their behavioural intention to use cloud computing. The inclusion of this step caused a decrease in the [beta] size of the openness to experience variable that changed it into an insignificant one, and may suggest a possibility of mediation. Sobel tests indicated that self-efficacy mediates between openness to experience and behavioural intention (z = 4.68, p < 0.001). Hence, the more respondents are open to experience, the higher is their self-efficacy and, as a result, the higher is their behavioural intention to use cloud computing.

The fourth step added the TAM variables (respondents' PEOU and personal innovation), and this also contributed significantly by adding 9 per cent to the explained variance of behavioural intention to use cloud computing. The beta coefficient of this variable was positive; therefore, the more respondents perceived themselves to be personally innovative and cloud computing as easy to use, the higher is their behavioural intention to use cloud computing. Note that in this step there was a decrease in the [beta] size of self-efficacy. Sobel tests indicated that of the two variables, PEOU mediates between self-efficacy and behavioural intention (z = 4.77, p < 0.001). Thus, the more respondents perceive themselves as self-efficient, the higher they perceive cloud computing's PEOU and, as a result, the higher is their behavioural intention to use it.

As the fifth step, researchers added the interaction between computer use X personal innovativeness. This interaction added 2 per cent to the explained variance of behavioural intention to use cloud computing and is presented in Figure 1.

Figure 1 shows a correlation between personal innovation and behavioural intention to use cloud computing among respondents who are low and high in computer use. This correlation is higher among respondents who are low in computer use, [beta] = . 40, p < 0.05, than among those who are high in computer use, [beta] = 0.04, p < 0.05. It seems that especially among participants who are low in computer use, the higher their personal innovativeness, the higher is their behavioural intention to use cloud computing.

Discussion

The present research explored the extent to which the TAM and personal characteristics, such as threat and challenge, self-efficacy and openness to experience, explain information professionals' perspectives on cloud computing. Researchers divided the study hypotheses into three categories. The first (consisting of H1 -H2 ) refers to the TAM, the second (H3 -H5 ) to personality characteristics and, finally, H6 to computer competence. All hypotheses were accepted. Regarding the first category of hypotheses, results show that both were accepted. Findings suggest that high scores in PEOU and personal innovativeness are associated with high scores in respondents' intention to adopt cloud computing. These findings can be associated with previous

ones that found that PEOU, as well as personal innovativeness, affect the intention to use IT (; ; ; ). Therefore, we may assume that information professionals would usecloud computing if they think it would not require a lot of effort and if they perceive themselves as personally innovative. If information centre directors assume that adopting novel technologies will improve their organizations' functioning and if they like their employees to use novel technologies within their organizations, they should expose them to these technologies and emphasize their simplicity and ease of use, thus lowering any previous assumptions about the complexity of technology. In addition, when they recruit new employees, they may wish to look for people who are technologically adventurous, assuming that they will bring a fresh perspective to their workplace.

Addressing the second category (H3 -H5 ), findings indicate that these three hypotheses were also accepted. It should be noted that in the hierarchical regression, the cognitive appraisal variables (threat, challenge and self-efficacy) contributed the most (25 per cent) to the behavioural intention to use cloud computing. Hence, we may assume that personality characteristics are major factors which influence respondents' behavioural intention to use cloud computing.

H3 emphasizes that the more challenged and the less threatened respondents are when they think about cloud computing, the higher is their behavioural intention to use it is. This finding echoes a previous one (Shoham and Gonen, 2008) that found that threat and challenge are mediating variables predicting attitudes towards computer use. We may assume that those information professionals who have experienced or predict failure when coping with novel technologies have lower intentions to use cloud computing. However, those participants who are challenged foresee the potential for growth and are excited and eager to try to use a novel technology, such as cloud computing. Information professionals should be exposed to and experience cloud computing within their workplace to reduce their level of threat.

It was also not unexpected to see H4 accepted. We can say, then, that the more self-efficient respondents are, the higher their behavioural intention to use cloud computing. This finding can be related to Bandura (1986) who postulated that people who have high self-efficacy will take more challenging tasks than those with low self-efficacy. In the present study, then, they will be more willing to try to use cloud computing. Various studies have shown that training and experience play an important role in computer self-efficacy (Compeau and Higgins, 1995; Kinzie et al. , 1994; Stone and Henry, 2003). Thus, again, it is suggested that information organization directors enable their employees to experience working with new technological platforms.

H5 reveals that high scores in respondents' openness to experience is associated with high scores in behavioural intention to use cloud computing. This finding was not surprising, as openness to experience is related to creativity, curiosity and preference for novelty (McCrae and Sutin, 2009). In addition, previous studies (Colquitt et al. , 2002; Sykes et al. , 2011) have indicated the association between openness to experience and computer use. We can then assume that this personality trait is essential when considering the issue of adopting novel technologies and suggest that

information organization directors be aware of individual differences, such as openness to experience, if they would like to incorporate new technological tools into their organizations.

The last category refers to computer competence and was confirmed. Results show that participants, who have high scores in computer use and in social media use, also have higher scores in behavioural intention to use cloud computing. We may conclude that the more expertise participants have with computers and social media, the higher is their intentional behaviour to use cloud computing. We may further posit that those people are aware of the advantages and disadvantages of their future use of technological innovations, and have decided that it is better for them to adopt, use and master new technologies within their organizations. In addition, the interaction between computer use X personal innovativeness suggests that among information professionals who have low scores in computer use, the higher their personal innovativeness, the higher is their behavioural intention to use cloud computing. In other words, this finding again shows the importance of personal characteristics. Even though respondents are not computer savvy, the fact that they are personally innovative affects their behavioural intention to use cloud computing.

Conclusion

To conclude, the current study found that the behavioural intention to use cloud computing was impacted by several of the TAM variables, personal characteristics and computer competence. This paper has a number of theoretical and practical implications: it expands the scope of research about the TAM by applying it to information professionals and cloud computing, and highlights the importance of individual traits, such as cognitive appraisal, personal innovativeness, openness to experience and computer competence, when considering technology acceptance. Estimating that using new technologies will improve information organizations' functioning, the current study proposes that directors of information organizations should be familiar with both the TAM and the issue of individual differences. These factors may help them choose the most appropriate workers.

This study has some limitations. The first is that because of the fact that it was carried out only in Israel, we suggest that this study will be perceived as an exploratory one. In addition, the researchers suggest that an international perspective on cloud computing be obtained by carrying out the study in other countries. Secondly, to gain a broader perspective, it is recommended that another study which includes both students and information professionals be conducted. Lastly, a future study may also use qualitative methods, such as open questions or interviews to supplement the quantitative analysis, and, thereby, enrich the findings by adding other dimensions to the inquiry process.

References

Agarwal, R. and Karahanna, E. ( 2000 ), " Time flies when you are having fun: cognitive absorption and beliefs about information technology usage ",Management Information Systems Quarterly , V ol. 24 No. 4, pp. 665 - 694 .

Agarwal, R. and Prasad, J. ( 1998 ), " A conceptual and operational definition of personal innovativeness in the domain of information technology ",Information

Systems Research , V ol. 9 No. 2, pp. 204 - 215 .

Aharony, N. ( 2009 ), " Web 2.0 use by librarians ",Library & Information Science Research , V ol. 31, pp. 29 - 37 .

Aharony, N. ( 2011 ), " Librarians' attitudes towards knowledge management ",College & Research Libraries , V ol. 72 No. 2, pp. 111 - 126 .

Aharony, N. ( 2014 ), " Mobile libraries: librarians' and students' perspectives ",College & Research Libraries , V ol. 75 No. 2, pp. 202 - 217 .

Al-Gahtani, S. ( 2001 ), " The applicability of TAM outside North America: an empirical test in the United Kingdom ",Information Resources Management Journal , V ol. 14 No. 3, pp. 37 - 46 .

Allemand, M., Zimprich, D. and Hertzog, C. ( 2007 ), " Cross-sectional age differences and longitudinal age changes of personality in middle adulthood and old age ",Journal of Personality , V ol. 75 No. 2, pp. 323 - 358 .

Anuar, S., Ali, S., AlSharafi, A. and Aborujilah, A. ( 2013 ), " Cloud computing in academic institutions ", paper presented at the 7th International Conference on Ubiquitous Information Management and Communication (ICUIMC), 17-19 January, Kota Kinabalu .

Armbrust, M., Fox, O., Griffith, R., Joseph, A.D., Katz, Y., Konwinski, A., Lee, G., Patterson, D.A., Rabkin, A., Stocia, I. and Zaharia, M. ( 2009 ), " Above the clouds: a Berkeley view of cloud computing ", Technical Report No. UCB/EECS-2009-28, available at: https://www.doczj.com/doc/2415650478.html,/Pubs/TechRpts/2009/EECS-2009-28.pdf (accessed 25 May 2013).

二、文献综述

云计算研究文献综述

摘要

随着信息和通信技术的快速发展,计算模式经历了从最初把任务集中交付给大型处理机模式,到后来发展为基于网络的分布式任务处理模式,再到最近的按需处理的云计算模式。最初的单个处理机模式处理能力有限,并且请求需要等待,效率低下。后来,随着网络技术的不断发展,按照高负载配置的服务器集群,在遇到低负载的时候,会有资源的浪费和闲置,导致用户的运行维护成本提高。而云计算把网络上的服务资源虚拟化,整个服务资源的调度、管理、维护等工作由专门的人员负责,用户不必关心“云”内部的实现,因此云计算实质上是给用户提供像传统的电力、水、煤气一样的按需计算服务,它是一种新的有效的计算使用范式。

关键词:云计算,测试,Web服务

1云计算的定义和特点

目前,不同文献和资料对云计算的定义有不同的表述,主要有以下几种代表性的定义。

定义1云计算是一种能够在短时间内迅速按需提供资源的服务,可以避免资源过度和过低使用。定义2云计算是一种并行的、分布式的系统,由虚拟化的计算资源构成,能够根据服务提供者和用户事先商定好的服务等级协议动态地提供服务。定义3(完整内容请到百度文库)云计算是一种可以调用的虚拟化的资

英文文献翻译

中等分辨率制备分离的 快速色谱技术 W. Clark Still,* Michael K a h n , and Abhijit Mitra Departm(7nt o/ Chemistry, Columbia Uniuersity,1Veu York, Neu; York 10027 ReceiLied January 26, 1978 我们希望找到一种简单的吸附色谱技术用于有机化合物的常规净化。这种技术是适于传统的有机物大规模制备分离,该技术需使用长柱色谱法。尽管这种技术得到的效果非常好,但是其需要消耗大量的时间,并且由于频带拖尾经常出现低复原率。当分离的样本剂量大于1或者2g时,这些问题显得更加突出。近年来,几种制备系统已经进行了改进,能将分离时间减少到1-3h,并允许各成分的分辨率ΔR f≥(使用薄层色谱分析进行分析)。在这些方法中,在我们的实验室中,媒介压力色谱法1和短柱色谱法2是最成功的。最近,我们发现一种可以将分离速度大幅度提升的技术,可用于反应产物的常规提纯,我们将这种技术称为急骤色谱法。虽然这种技术的分辨率只是中等(ΔR f≥),而且构建这个系统花费非常低,并且能在10-15min内分离重量在的样本。4 急骤色谱法是以空气压力驱动的混合介质压力以及短柱色谱法为基础,专门针对快速分离,介质压力以及短柱色谱已经进行了优化。优化实验是在一组标准条件5下进行的,优化实验使用苯甲醇作为样本,放在一个20mm*5in.的硅胶柱60内,使用Tracor 970紫外检测器监测圆柱的输出。分辨率通过持续时间(r)和峰宽(w,w/2)的比率进行测定的(Figure 1),结果如图2-4所示,图2-4分别放映分辨率随着硅胶颗粒大小、洗脱液流速和样本大小的变化。

综述格式及外文文献利用

如对您有帮助,请购买打赏,谢谢您! 如何利用外文文献 文献综述是揭示某一研究领域当前水平和动向的论述性专题资料。它是作者围绕某一主题阅读大量的中外文献后,提取说明主题的论点和数据,全面分析、整理、归纳概括而写成的科技论文。对于大多数写作者而言,难度最大的就是借鉴外文文献。以下是笔者在这方面的一点粗浅体会。 无论是手检还是机检获得的外文文献,往往篇幅较长,专业词汇较多,全篇精读需要耗费大量时间,因此最好是先将手头上的文献摘要大致浏览一遍,进行粗略分类,比如文献是属于临床病例分析,动物实验研究还是临床人体实验研究。文献是属于综述、期刊论文还是研究报告。文献侧重于实验方法还是疾病的病因机理的研究等等。从而大致判断各类文献可以引用的是观点、方法还是结论,此为借鉴外文文献的第一步。 第二步是逐类进行快速阅读,各类文章择其重点引用部分进行快速阅读,用记号笔标记,其余部分浏览即可,并在侧边的空白处简要用中文翻译大意,并注明是引用方法学还是论点,或是临床有意义的病例。这样做的目的是方便日后查询。例如侧重引用其观点的文章中间具体的实验方法步骤与结论都可不看,只略看前言,重点看讨论。 第三步是精读,精读的目的有3个:(1)按照类别逐字逐句地阅读重点引用部分,例如方法学,就应注意分析比较各种方法的主、客观条件,步骤及结论有无差异,各有什么利弊,为什么。( 2)“查漏补缺”:看前面第二步中漏掉的部分有没有值得引用的内容,如果有,及时做好标记;( 3)根据重点引用内容的角标追溯参考文献,筛选出重点,再补查其余外文文献,尽量查全该领域的文献。 综述的写作格式 综述的写作格式一般包括四部分,即前言、正文、小结、参考文献。 前言,要用简明扼要的文字说明写作的目的、必要有关概念的定义、综述的范围、阐述有关问题的现状和动态以及目前对主要问题争论的焦点等。 正文,是综述的重点,主要包括论据和论证两个部分,正文部分根据内容的多少可分为若干个小标题分别论述。 小结,是在综述正文部分作扼要的总结,作者应对各种观点进行综合评价,提出自己的看法,指出存在的问题及今后发展的方向和展望。 综述的写作 1.1 文献综述的概念:文献综述是指在有针对性的搜集、查阅大量相关文献的基础上,通过自己的语言对所研究的问题进行系统、全而的叙述和评论。强调作者述而不评,重点在

新技术云计算外文文献

云计算——新兴的计算技术 摘要:云计算是涉及通过互联网提供托管服务的总称。这些服务大致分为三类:基础设施即服务(IaaS)、平台即服务(PaaS)和软件即服务(SaaS)。云计算这个名字的灵感来自于云符号经常用来代表在互联网上流程图和图表。这是在继主机计算、个人电脑计算、客户端服务器计算和Web计算之后的第五代计算技术。本文将围绕云计算进行讨论。 关键词:云计算,IaaS(基础设施即服务),PaaS的(平台即服务),SaaS(软件即服务) 1引言 云服务有三个鲜明的特点区别于传统的主机服务模式,它们分别是:云服务的出售通常按分钟或小时收取费用;云服务是有弹性的,一个用户可以在不同的时间拥有可多可少的服务;云服务完全由供应商托管(消费者只需要通过个人电脑和互联网就可以使用)。虚拟化的重大创新、分布式计算的发展,以及高速互联网的建设和经济的衰落,都加速了对云计算的兴趣。 云可以是私有的或公有的。公有云向互联网上的任何人销售(目前,亚马逊的网络服务是最大的公有云服务提供商)。私有云是一个专有网络或数据中心,向一部分人提供托管服务。当服务提供商使用公有云资源来创建自己的私有云,这样的结果被称为虚拟化的私有云。私有云或公共云的云计算目标是提供方便的、可扩展的计算资源和IT服务[1]。 2云计算的优势 云计算具有的优势是什么? (a)最小化的资本开支 (b)位置和设备独立性 答案:供应商的视角:申请厂商更容易吸引新客户。 (a)提供最低成本的方法和配套应用; (b)能够使用商品服务器和存储硬件; 3云计算的障碍 从客户的视角来看,云计算的障碍有: (a)数据安全; (b)很多客户不希望他们的数据迁移到可以信任的“云”上; (c)数据必须进行本地保留; (d)延迟; (e)云可以走多少毫秒; (f)不是实时应用的理想选择; (g)应用程序可用性; (h)无法通过现有的传统应用进行切换; (i)等效的云应用不存在; 总结,并非所有的应用程序都要工作在公共云之上。

文献综述,外文翻译,论文网站

文献综述怎么写 1) 什么是文献综述? 文献综述是研究者在其提前阅读过某一主题的文献后,经过理解、整理、融会贯通,综合分析和评价而组成的一种不同于研究论文的文体。 2) 文献综述的写作要求 1、文献综述的格式 文献综述的格式与一般研究性论文的格式有所不同。这是因为研究性的论文注重研究的方法和结果,而文献综述介绍与主题有关的详细资料、动态、进展、展望以及对以上方面的评述。因此文献综述的格式相对多样,但总的来说,一般都包含以下四部分:即前言、主题、总结和参考文献。撰写文献综述时可按这四部分拟写提纲,再根据提纲进行撰写工作。 前言,要用简明扼要的文字说明写作的目的、必要性、有关概念的定义,综述的范围,阐述有关问题的现状和动态,以及目前对主要问题争论的焦点等。前言一般200-300字为宜,不宜超过500字。 正文,是综述的重点,写法上没有固定的格式,只要能较好地表达综合的内容,作者可创造性采用诸多形式。正文主要包括论据和论证两个部分,通过提出问题、分析问题和解决问题,比较不同学者对同一问题的看法及其理论依据,进一步阐明问题的来龙去脉和作者自己的见解。当然,作者也可从问题发生的历史背景、目前现状、发展方向等提出文献的不同观点。正文部分可根据内容的多少可分为若干个小标题分别论述。 小结,是结综述正文部分作扼要的总结,作者应对各种观点进行综合评价,提出自己的看法,指出存在的问题及今后发展的方向和展望。内容单纯的综述也可不写小结。 参考文献,是综述的重要组成部分。一般参考文献的多少可体现作者阅读文献的广度和深度。对综述类论文参考文献的数量不同杂志有不同的要求,一般以30条以内为宜,以最近3-5年内的最新文献为主。 2、文献综述规定 1. 为了使选题报告有较充分的依据,要求硕士研究生在论文开题之前作文献综述。 2. 在文献综述时,研究生应系统地查阅与自己的研究方向有关的国内外文献。通常阅读文献不少于30篇,且文献搜集要客观全面 3. 在文献综述中,研究生应说明自己研究方向的发展历史,前人的主要研究成果,存在的问题及发展趋势等。 4. 文献综述要条理清晰,文字通顺简练。 5. 资料运用恰当、合理。文献引用用方括号[ ]括起来置于引用词的右上角。 6. 文献综述中要有自己的观点和见解。不能混淆作者与文献的观点。鼓励研究生多发现问题、多提出问题、并指出分析、解决问题的可能途径,针对性强。 7. 文献综述不少于3000字。 3、注意事项 ⒈搜集文献应尽量全。掌握全面、大量的文献资料是写好综述的前提,否则,随便搜集一点资料就动手撰写是不可能写出好的综述。 ⒉注意引用文献的代表性、可靠性和科学性。在搜集到的文献中可能出现观点雷同,有的文献在可靠性及科学性方面存在着差异,因此在引用文献时应注意选用代表性、可靠性和科学性较好的文献。 ⒊引用文献要忠实文献内容。由于文献综述有作者自己的评论分析,因此在撰写时应分清作者的观点和文献的内容,不能篡改文献的内容。引用文献不过多。文献综述的作者引用间接文献的现象时有所见。如果综述作者从他人引用的参考文献转引过来,这些文献在他人

计算机网络-外文文献-外文翻译-英文文献-新技术的计算机网络

New technique of the computer network Abstract The 21 century is an ages of the information economy, being the computer network technique of representative techniques this ages, will be at very fast speed develop soon in continuously creatively, and will go deep into the people's work, life and study. Therefore, control this technique and then seem to be more to deliver the importance. Now I mainly introduce the new technique of a few networks in actuality live of application. keywords Internet Network System Digital Certificates Grid Storage 1. Foreword Internet turns 36, still a work in progress Thirty-six years after computer scientists at UCLA linked two bulky computers using a 15-foot gray cable, testing a new way for exchanging data over networks, what would ultimately become the Internet remains a work in progress. University researchers are experimenting with ways to increase its capacity and speed. Programmers are trying to imbue Web pages with intelligence. And work is underway to re-engineer the network to reduce Spam (junk mail) and security troubles. All the while threats loom: Critics warn that commercial, legal and political pressures could hinder the types of innovations that made the Internet what it is today. Stephen Crocker and Vinton Cerf were among the graduate students who joined UCLA professor Len Klein rock in an engineering lab on Sept. 2, 1969, as bits of meaningless test data flowed silently between the two computers. By January, three other "nodes" joined the fledgling network.

大数据外文翻译参考文献综述

大数据外文翻译参考文献综述 (文档含中英文对照即英文原文和中文翻译) 原文: Data Mining and Data Publishing Data mining is the extraction of vast interesting patterns or knowledge from huge amount of data. The initial idea of privacy-preserving data mining PPDM was to extend traditional data mining techniques to work with the data modified to mask sensitive information. The key issues were how to modify the data and how to recover the data mining result from the modified data. Privacy-preserving data mining considers the problem of running data mining algorithms on confidential data that is not supposed to be revealed even to the party

running the algorithm. In contrast, privacy-preserving data publishing (PPDP) may not necessarily be tied to a specific data mining task, and the data mining task may be unknown at the time of data publishing. PPDP studies how to transform raw data into a version that is immunized against privacy attacks but that still supports effective data mining tasks. Privacy-preserving for both data mining (PPDM) and data publishing (PPDP) has become increasingly popular because it allows sharing of privacy sensitive data for analysis purposes. One well studied approach is the k-anonymity model [1] which in turn led to other models such as confidence bounding, l-diversity, t-closeness, (α,k)-anonymity, etc. In particular, all known mechanisms try to minimize information loss and such an attempt provides a loophole for attacks. The aim of this paper is to present a survey for most of the common attacks techniques for anonymization-based PPDM & PPDP and explain their effects on Data Privacy. Although data mining is potentially useful, many data holders are reluctant to provide their data for data mining for the fear of violating individual privacy. In recent years, study has been made to ensure that the sensitive information of individuals cannot be identified easily. Anonymity Models, k-anonymization techniques have been the focus of intense research in the last few years. In order to ensure anonymization of data while at the same time minimizing the information

最新云计算中侧信道攻击的防御-毕业论文外文翻译整理

附录一英文文献 Security against Side Channel Attack in Cloud Computing Bhrugu Sevak Abstract--Cloud computing is a word that delivering hosted service over the internet. Cloud computing has been ideate as the next generation architecture of IT enterprise ecause of it’s provides ubiquitous network, cost reducing, flexibility and scalability to users. Now days with the fast growing of cloud computing technology introduces new more vulnerabilities so security is considered to be one of the most critical aspect in clod computing environment due to the confidential and important information stored in the cloud. As per AMAZONE EC2 service case study it is possible to identify the particular target VM(virtual machine) in internal cloud infrastructure and then placed new VM with targeted VM and extract confidential information from targeted VM on same physical machine called as simple side channel attack. This paper introduces how to avert the side channel attack in cloud computing. This is accomplished by using combination of Virtual firewall appliance and randomly encryption decryption (using concept of confusion diffusion) and provide RAS (Reliability, Availability, and Security) of client’s data or information. Keywords--Cloud computing, side channel attack, Amazon EC2 service case study, virtual firewall appliance, randomly encryption decryption. I. INTRODUCTION Cloud computing is a word that delivering hosted service over the internet.

变电站_外文翻译_外文文献_英文文献_变电站的综合概述

英文翻译 A comprehensive overview of substations Along with the economic development and the modern industry developments of quick rising, the design of the power supply system become more and more completely and system. Because the quickly increase electricity of factories, it also increases seriously to the dependable index of the economic condition, power supply in quantity. Therefore they need the higher and more perfect request to the power supply. Whether Design reasonable, not only affect directly the base investment and circulate the expenses with have the metal depletion in colour metal, but also will reflect the dependable in power supply and the safe in many facts. In a word, it is close with the economic performance and the safety of the people. The substation is an importance part of the electric power system, it is consisted of the electric appliances equipments and the Transmission and the Distribution. It obtains the electric power from the electric power system, through its function of transformation and assign, transport and safety. Then transport the power to every place with safe, dependable, and economical. As an important part of power’s transport and control, the transformer substation must change the mode of the traditional design and control, then can adapt to the modern electric power system, the development of modern industry and the of trend of the society life. Electric power industry is one of the foundations of national industry and national economic development to industry, it is a coal, oil, natural gas, hydropower, nuclear power, wind power and other energy conversion into electrical energy of the secondary energy industry, it for the other departments of the national economy fast and stable development of the provision of adequate power, and its level of development is a reflection of the country's economic development an important indicator of the level. As the power in the industry and the importance of the national economy, electricity transmission and distribution of electric energy used in these areas is an indispensable component.。Therefore, power transmission and distribution is critical. Substation is to enable superior power plant power plants or power after adjustments to the lower load of books is an important part of power transmission. Operation of its functions, the capacity of a direct impact on the size of the lower load power, thereby affecting the industrial production and power consumption.Substation system if a link failure, the system will protect the part of action. May result in power outages and so on, to the production and living a great disadvantage. Therefore, the substation in the electric power system for the protection of electricity reliability,

文献综述英文版

Title :Magnetic motor shell stamping process and die design Author:yu Department of Materials "Magnetic motor shell stamping process and die design" literature review Abstract摘要 By read these references and documents, in-depth understanding of the contemporary mold of advanced manufacturing technology and metal forming technology, a number of instances of mold design and the understanding and learning, to further study the method of stamping die design, die design and thus have a directionalguidance.As used in this design and drawing die punching die and so on, through the design of the book related to mold in-depth study, this drawing die and the punching die and so the design methods have shape.These references and documents, the design of low-cost high-accuracy die with directional guidance. Keywords: Mold advanced manufacturing technology Mold Manufacturing Trends Drawing Punching CAE Die Materials Prices Preface前言 As China's economic integration with the world economy, the rapid development of basic industries, mold manufacturing industry is also developing fast.In the current economic situation, people pay more attention to efficiency, product quality, cost, and new product development capabilities.The innovation and development of mold manufacturing concern. 1.1 The history of the development of mold Archaeological discoveries in China, as early as 2,000 years ago, China has been used to make bronze stamping dies to prove that in ancient China stamping die stamping and achievements to the world's leading.In 1953, the Changchun First Automobile Works in China for the first time established a stamping plants, the plant began manufacturing cars in 1958, cover mold.60 years of the 20th century began producing fine blanking dies.In walked a long path of development temperature, the present, China has formed more than 300 billion yuan (not including Hong Kong, Macao and Taiwan statistics) the production capacity of various types of stamping dies. 1.2 Development Status and Trends Die Since reform and opening, with the rapid development of the national economy, the market demand of mold growing.In recent years, the mold industry has been the growth rate of about 15% of the rapid development of industrial enterprises in the ownership of the mold components also changed dramatically, in addition to professional mold factory outside of state-owned, collective, joint ventures, wholly-owned and private has been a rapid development.

Hadoop云计算外文翻译文献

Hadoop云计算外文翻译文献 (文档含中英文对照即英文原文和中文翻译) 原文: Meet Hadoop In pioneer days they used oxen for heavy pulling, and when one ox couldn’t budge a log, they didn’t try to grow a larger ox. We shouldn’t be trying for bigger computers, but for more systems of computers. —Grace Hopper Data! We live in the data age. It’s not easy to measure the total volume of data stored electronically, but an IDC estimate put the size of the “digital universe” at 0.18 zettabytes in

2006, and is forecasting a tenfold growth by 2011 to 1.8 zettabytes. A zettabyte is 1021 bytes, or equivalently one thousand exabytes, one million petabytes, or one billion terabytes. That’s roughly the same order of magnitude as one disk drive for every person in the world. This flood of data is coming from many sources. Consider the following: ? The New York Stock Exchange generates about one terabyte of new trade data per day. ? Facebook hosts approximately 10 billion photos, taking up one petabyte of storage. ? https://www.doczj.com/doc/2415650478.html,, the genealogy site, stores around 2.5 petabytes of data. ? The Internet Archive stores around 2 petabytes of data, and is growing at a rate of 20 terabytes per month. ? The Large Hadron Collider near Geneva, Switzerland, will produce about 15 petabytes of data per year. So there’s a lot of data out there. But you are probably wondering how it affects you. Most of the data is locked up in the largest web properties (like search engines), or scientific or financial institutions, isn’t it? Does the advent of “Big Data,” as it is being called, affect smaller organizations or individuals? I argue that it does. Take photos, for example. My wife’s grandfather was an avid photographer, and took photographs throughout his adult life. His entire corpus of medium format, slide, and 35mm film, when scanned in at high-resolution, occupies around 10 gigabytes. Compare this to the digital photos that my family took last year,which take up about 5 gigabytes of space. My family is producing photographic data at 35 times the rate my wife’s grandfather’s did, and the rate is increasing every year as it becomes easier to take more and more photos. More generally, the digital streams that individuals are producing are growing apace. Microsoft Research’s MyLifeBits project gives a glimpse of archiving of pe rsonal information that may become commonplace in the near future. MyLifeBits was an experiment where an individual’s interactions—phone calls, emails, documents were captured electronically and stored for later access. The data gathered included a photo taken every minute, which resulted in an overall data volume of one gigabyte a month. When storage costs come down enough to make it feasible to store continuous audio and video, the data volume for a future MyLifeBits service will be many times that.

员工激励的文献综述、外文翻译.doc

一、激励理论的背景 在经济发展的过程中,劳动分工与交易的出现带来了激励问题。激励理论是行为科学中用于处理需要,动机,目标和行为四者之间关系的核心理论。行为科学认为人的动机来自需要,由需要确定人们的行为目标,激励则作用于人内心活动,激发,驱动和强化人的行为。哈佛大学维廉詹姆士研究表明:在没有激励措施下,下属一般仅能发挥工作能力的20%~30%,而当他受到激励后,其工作能力可以提升到80%~90%,所发挥的作用相当于激励前的3到4倍。日本丰田公司采取激励措施鼓励员工提建议,结果仅1983年一年,员工提了165万条建议,平均每人31条,它为公司带来900亿日元利润,相当于当年总利润的18%。由于激励的效果明显,所以各种组织为了提高生产效率,有些专家学者就开始了对激励理论的研究之中,探索激励的无穷潜力。 二、国外研究现状 国外对于激励理论有了大量的研究并获得了丰硕的成果。总体来说,可以分为两类激励理论。一类是以人的心理需求和动机为主要研究对象的激励理论,熟称“内容型激励理论”。另一类是以人的心理过程和行为过程相互作用的动态系统为研究对象的激励过程理论,它也被称作是“行为型激励理论”。 1 内容型激励理论 1.1 奠瑞的人类人格理论 这种理论认为,在面临着动态且不断变化的环境时,人们都是自适应的。它把需求分成了两种类型,即生理需求和心理需求。前者与人体基本生理过程的满足感有关,而后者所关注的是情绪上和精神上的满足感。 1.2 马斯洛的“需要层次”理论 美国心理学家马斯洛(A.H.Maslow)进一步发展了莫瑞的研究,在1954年出版的《动机与人格》一书中对该理论作了进一步的阐释。马斯洛认为人的需要可以划分为五个层次,从低到高依次为生理需要,安全需要,社交需要,尊熏需要,自我实现需要,且这五个层次的顺序,对每个人都是相同的。只有当较低层次的需要获得了基本满足后,下一个较高层次的需要才能成为主导需要。 1.3 赫茨伯格的激励—保健双因素理论 美国心理学家赫茨伯格因素理论打破了这一假设。他于1959年在《工作的激励》一书中提出了保健——激励因素理论,简称双因素理论。即保健因素和激励因素。保健因素可以用来体现高水平员工的不满意,激励因素可以用来体现高水平员工的满意度。他认为只有激励因素才能促发员工积极性,提高生产效率。 2 行为型激励理论 2.1 洛克的目标设置理论 2O世纪6O年代末,埃德温·A·洛克和他的同事们花了许多年的时间研究目标对于人类行为和绩效的效果。他们的研究导致了目标设置理论的创立并不断地得到验证,提出:指向一共同目标的工作意向是工作效率的主要源泉。他还提出了具体的设置目标的步骤。 2.2 亚当斯的公平理论 美国心理学家亚当斯(J.s.Adams)对员工受激励程度的大小与他人之间的关系进行研究,并在《工人关于工资不公平的内心冲突同其生产率的关系》(1962年与罗森合写),《工

相关主题
文本预览
相关文档 最新文档