Open Access. Powered by Scholars. Published by Universities.®
Social and Behavioral Sciences Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Business (6)
- Human Resources Management (4)
- Public Affairs, Public Policy and Public Administration (4)
- Leadership Studies (3)
- Communication (2)
-
- Geography (2)
- Performance Management (2)
- Transportation (2)
- Engineering (1)
- Environmental Monitoring (1)
- Environmental Sciences (1)
- Gender, Race, Sexuality, and Ethnicity in Communication (1)
- Geographic Information Sciences (1)
- Infrastructure (1)
- Labor Relations (1)
- Operational Research (1)
- Operations Research, Systems Engineering and Industrial Engineering (1)
- Operations and Supply Chain Management (1)
- Physical Sciences and Mathematics (1)
- Psychology (1)
- Terrorism Studies (1)
- Training and Development (1)
- Keyword
-
- Computer networks (2)
- Deception (2)
- Leadership (2)
- Telematics (2)
- 360-degree feedback (Rating of employees) (1)
-
- Burnout (Psychology) (1)
- Choice of transportation (1)
- Command and control systems (1)
- Ecology (1)
- Employees--Rating of (1)
- Environmental monitoring (1)
- Geographic information systems--Remote sensing--United States (1)
- Geography (1)
- Geology (1)
- Infrastructure (Economics)--United States (1)
- Job satisfaction--Testing (1)
- Meetings (1)
- Military transportation (1)
- Military vehicles (1)
- Organizational change (1)
- Performance (1)
- Question and answer sessions (1)
- Terrorism--United States--Prevention (1)
- Transportation--United States--Planning (1)
- United States. Air Force--Information resources management (1)
- United States. Air Force--Officials and employees--Turnover (1)
- United States. Air Force--Transportation (1)
Articles 1 - 12 of 12
Full-Text Articles in Social and Behavioral Sciences
Deception Detection In A Computer-Mediated Environment: Gender, Trust, And Training Issues, Monica A. Dziubinski
Deception Detection In A Computer-Mediated Environment: Gender, Trust, And Training Issues, Monica A. Dziubinski
Theses and Dissertations
The Department of Defense is increasingly relying on computer-mediated communications to conduct business. This reliance introduces an amplified vulnerability to strategic information manipulation, or deception. This research draws on communication and deception literature to develop a conceptual model proposing relationships between deception detection abilities in a computer-mediated environment, gender, trust, and training. An experiment was conducted with 119 communications personnel to test the proposed hypotheses. No relationship between gender or trust and deception detection accuracy was found. Partial support was found showing that training improves deception detection accuracy. The most significant finding was that individual’s deception detection abilities deteriorate in …
Analysis Of The Theoretical Relationships Between Work Exhaustion, Job Satisfaction, And Turnover Intention Of Air Force Information Systems Managers, Alfred D. Ray
Theses and Dissertations
The use of information technology has increased exponentially over the last two decades (Cohen and Burton, 2001), Accordingly, the ability of organizations to retain their information systems staff has been a critical factor in the effort to achieve strategic goals (Moore, 2002), When IS professionals leave an organization, not only is the number of them available for assignment to projects depleted, the professionals themselves often take specialized skills, tacit knowledge, and understanding of specific business operations and information systems with them (Agarwal and Ferratt, 2002), Chief Executives have become increasingly interested in issues related to the recruitment, development, and retention …
Decision Analysis Model For Refreshment Of Geobase Imagery: Basis For Investment Strategy, Matthew S. Craig
Decision Analysis Model For Refreshment Of Geobase Imagery: Basis For Investment Strategy, Matthew S. Craig
Theses and Dissertations
The United States Air Force is in the process of implementing GeoBase, an initiative to change how geospatial information resources are being acquired, implemented, exploited, and sustained on USAF installations around the world. Using GeoBase increases situational awareness and minimizes decision risk for all installation personnel GeoBase is a geographic information system, using commercial-off-the-shelf software to provide one source for spatial information on an installation. GeoBase uses imagery as one layer of information. The accuracy of the imagery directly impacts the effectiveness of GeoBase. The purpose of this thesis was to develop a decision model to be used in determining …
Model Selection Analysis Of Depot Level Reparable Asset Retrograde Shipments Within The Continental United States, Michael P. Kossow
Model Selection Analysis Of Depot Level Reparable Asset Retrograde Shipments Within The Continental United States, Michael P. Kossow
Theses and Dissertations
Transportation modal choice for the Air Force retrograde movement of reparable assets within the CONUS is inflexible and is not synchronized with the depot repair process. Additionally, transportation coordinators are compelled by unsynchronized priorities and shipping policies to use express air modes in all cases when the use of LTL modes may be available to meet actual service level requirements at a lower cost, There may be cases where the retrograde shipments of reparable assets via an alternative transportation mode, such as LTL, can still meet fast transportation requirements at an even lower cost than can premium transportation. Historical retrograde …
A Correlation Study Of Second Destination Transportation Funding And Vehicle Movement, Stephen D. Wier
A Correlation Study Of Second Destination Transportation Funding And Vehicle Movement, Stephen D. Wier
Theses and Dissertations
HQ AFMC has consistently experienced problems with the Second Destination Transportation budget being under funded. This under funding causes the command to implement control actions on how funds are allocated to ensure that enough funds are available. This research effort was intended to show the relationship between spending restrictions and how vehicles move between theaters. By identifying whether or not and how the control actions on Second Destination Transportation funding affects inter-theater vehicle movement capabilities, this research seeks to assist those decision makers in making fully informed decisions when allocating scare fiscal resources. The results of this research indicate that …
Utility Assessment Of Specificity In Upward Feedback Instruments For Leadership Development, Theresa M. Wardak
Utility Assessment Of Specificity In Upward Feedback Instruments For Leadership Development, Theresa M. Wardak
Theses and Dissertations
Recently, organizations have been modifying performance appraisal systems to collect data from multiple sources to guide the development of supervisors. Upward feedback programs focus on development rather than appraisal by supplementing traditional downward feedback with subordinate feedback. The utility of two upward feedback instruments was assessed in this study; one is a commercially available instrument, the Leadership Practices Inventory (Posner & Kouzes, 1988) and the other is the recently developed, non-proprietary Upward Feedback Instrument (2002). The Upward Feedback Instrument was designed to measure leadership behaviors at a more specific level. It was thought that greater feedback specificity world lead to …
Developing A Leadership Commitments Inventory, Abigail L. White
Developing A Leadership Commitments Inventory, Abigail L. White
Theses and Dissertations
Organizations have been modifying performance appraisal systems to collect data from multiple source to guide supervisor development. Multiple rater programs provide leaders with more than one source of feedback, and give them a more complete, and possibly more accurate picture of their performance, which can facilitate meaningful behavioral change. The purpose of this thesis was to develop and validate a Leadership Commitments Inventory (LCI) from a 360-degree feedback approach that reflected a six-factor leadership taxonomy composed of twelve distinct indices, Using successive content adequacy tests, 48 items were validated and the web-based LCI was administered to 278 participants. Internal consistency …
Understanding The Dynamic System Of Terrorist - Government Interaction, John A. Hanrahan
Understanding The Dynamic System Of Terrorist - Government Interaction, John A. Hanrahan
Theses and Dissertations
The nature of action and reaction that forms the basis for terrorist - government interactions creates a dynamic system. Understanding how this dynamic system behaves in response to key government activities can help the government better control the overall behavior of the system. The system dynamics methodology is one tool that can help the government solve specific behavioral problems within the overall system. This research shows the ability of system dynamics to help develop government policy towards terrorism that can directly affect a terrorist's behavior. It supports a government policy of offensive action instead of defensive reaction. It also identifies …
Remote Sensing Systems Optimization For Geobase Enhancement, Steve J. Paylor
Remote Sensing Systems Optimization For Geobase Enhancement, Steve J. Paylor
Theses and Dissertations
The U.S. Air Force is in the process of implementing GeoBase, a geographic information system (GIS), throughout its worldwide installations, Air Force GIS needs can be augmented by imagery from aerial and satellite platforms. Imagery has greatly improved over the past several years and provides high resolution coverage of features on earth. Various imagery types will significantly increase GeoBase usefulness in a range of mission requirements, Potential Air Force uses of imagery include identifying heat loss, environmental monitoring, command decision-making, and emergency response, The research develops a decision tool to determine the appropriate imagery for a given Air Force Application, …
Strategies Leaders Should Use To Respond To Hostile Questions Regarding Organizational Changes: An Empirical Investigation, Michael S. Gore
Strategies Leaders Should Use To Respond To Hostile Questions Regarding Organizational Changes: An Empirical Investigation, Michael S. Gore
Theses and Dissertations
The purpose of this research was to develop a tool, using Speech Act Theory, which will help leaders better handle hostile questions they face during organizational change. Specifically, speech act theory, which outlines five question-response strategies, was used to test the effectiveness of question responses to hostile questions encountered during organizational change.
Training Effects On Judgment Accuracy In A Computer-Mediated Environment, Mark M. Lankowski
Training Effects On Judgment Accuracy In A Computer-Mediated Environment, Mark M. Lankowski
Theses and Dissertations
The United States Air Force (AF) has named Information Superiority the core competency "upon which all the other core competencies rely". In order to achieve Information Superiority, deceptive communication must be minimized. According to researchers, deception occurs when communicators control the information contained in their messages to convey a meaning that departs from the truth. This research draws on Biros, George, and Zmuds' (2002) deception research model to determine if training to detect deception will improve a person's deception detection performance in a computer-mediated environment. A longitudinal experiment was conducted with AF participants (N=119) where three separate training plans were …
An Analysis Of Multiple Layered Networks, Kevin T. Kennedy
An Analysis Of Multiple Layered Networks, Kevin T. Kennedy
Theses and Dissertations
Current infrastructure network models of single functionality do not typically account for the interdependent nature of infrastructure networks. Infrastructure networks are generally modeled individually, as an isolated network or with minimal recognition of interactions. This research develops a methodology to model the individual infrastructure network types while explicitly modeling their interconnected effects. The result is a formulation built with two sets of variables (the original set to model infrastructure characteristics and an additional set representing cuts of interdependent elements). This formulation is decomposed by variable type using Benders Partitioning and solved to optimality using a Benders Partitioning algorithm. Current infrastructure …