Results for 'Ch Ing-Feng Yang'

1000+ found
Order:
  1. San min chu i yü li hsüeh hsiu yang ssŭ hsiang.Shuang-chʻing Li - 1967 - San Min Chu I Yen Chiu So.
    No categories
     
    Export citation  
     
    Bookmark  
  2.  39
    Why did Lin Piao revile Ch 'in Shih-huang?'.Ch'en Yang-Feng & Li Tzu-Lin - 1975 - Chinese Studies in History 8 (1-2):180-190.
  3.  26
    Confession of an Old-Time Capitulationist - Critique of Chiang Ch'ing's Sinister Article "Our Life".Wen P'ing & Feng Cheng - 1979 - Chinese Studies in History 12 (3):56-61.
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  4. Ho chʻing nien pʻêng yu tʻan chi ko hsiu yang wên tʻi.Hao-chʻuan Ting - 1951
    No categories
     
    Export citation  
     
    Bookmark  
  5.  16
    Chiang Ch'ing and Her "Foreign Sister".Feng Fei - 1978 - Chinese Studies in History 12 (1):59-62.
    No categories
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  6.  7
    Tsên yang pʻei yang chʻing nien ti kung chʻan chu i tao tê pʻin chih.Chʻu-min Têng - 1956
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  7.  7
    The Land System of the Early Ch'ing Dynasty.Yang I. - 1981 - Chinese Studies in History 15 (1-2):93-112.
    No categories
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  8. Chʻing nien yü jen sheng yüan ching.Kuo-shu Yang (ed.) - 1976
    No categories
     
    Export citation  
     
    Bookmark  
  9.  22
    Assessing Gender Differences in Computer Professionals’ Self-Regulatory Efficacy Concerning Information Privacy Practices.Feng-Yang Kuo, Cathy S. Lin & Meng-Hsiang Hsu - 2006 - Journal of Business Ethics 73 (2):145-160.
    Concerns with improper collection and usage of personal information by businesses or governments have been seen as critical to the success of the emerging electronic commerce. In this regard, computer professionals have the oversight responsibility for information privacy because they have the most extensive knowledge of their organization's systems and programs, as well as an intimate understanding of the data. Thus, the competence of these professionals in ensuring sound practice of information privacy is of great importance to both researchers and (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   4 citations  
  10.  42
    Chiang Ch'ing's "Farewell Letter" to T'Ang Na.Lan P'ing Chiang Ch'ing - 1980 - Chinese Studies in History 14 (2):77-82.
    No categories
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  11. Approaching internet abuse: A psychoanalytic perspective.Feng-Yang Kuo - 2003 - Journal of Information Ethics 12 (2):31-42.
     
    Export citation  
     
    Bookmark  
  12.  7
    Lefebver and the Critique of Ordinary Life in Modern World.[J].Yang Hai-Feng - 2003 - Modern Philosophy 1:009.
    Direct download  
     
    Export citation  
     
    Bookmark  
  13.  60
    Assessing gender differences in computer professionals' self-regulatory efficacy concerning information privacy practices.Feng-Yang Kuo, Cathy S. Lin & Meng-Hsiang Hsu - 2006 - Journal of Business Ethics 73 (2):145 - 160.
    Concerns with improper collection and usage of personal information by businesses or governments have been seen as critical to the success of the emerging electronic commerce. In this regard, computer professionals have the oversight responsibility for information privacy because they have the most extensive knowledge of their organization's systems and programs, as well as an intimate understanding of the data. Thus, the competence of these professionals in ensuring sound practice of information privacy is of great importance to both researchers and (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   5 citations  
  14. Lun jên hsing chih kʻai chang yü hsüeh fo.Chʻing-Sung[From Old Catalog] - 1960
    No categories
     
    Export citation  
     
    Bookmark  
  15.  96
    A Reading of Han Fei's "Wu Tu" [Five Vermin].Ti Ch'ing - 1978 - Contemporary Chinese Thought 10 (1):19-33.
    To give the necessary affirmation to the historical role played by the Legalists and to study and analyze the Legalists' writings from the Marxist point of view is a major task on the ideological front called for by the deepening of the Campaign to Criticize Lin Piao and Confucius. Han Fei was an outstanding representative of the Legalists of the late Warring States period. He summed up the experience, both positive and negative, of the newly emerging landlord class in the (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  16.  23
    Postscript to the Specimen of Li Chih's Handwriting Preserved in the Shanghai Museum [1].Wang Ch'ing-Cheng - 1980 - Chinese Studies in History 13 (1-2):87-99.
    No categories
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  17. Ho hsieh ti she hui.Chʻing-Chiang Lin - 1974
     
    Export citation  
     
    Bookmark  
  18. Fa hsüeh tʻung lun.Chʻing-fêng Liu - 1954
     
    Export citation  
     
    Bookmark  
  19. Fa lü ta i: tung lun pien, hsien fa pien.Chʻing-fêng Liu - 1954
     
    Export citation  
     
    Bookmark  
  20. Shen mo shih wei hsin chu i.Chʻing-hai Kao - 1957
    No categories
     
    Export citation  
     
    Bookmark  
  21.  87
    Development and validation of ethical computer self-efficacy measure: The case of softlifting. [REVIEW]Feng-Yang Kuo & Meng-Hsiang Hsu - 2001 - Journal of Business Ethics 32 (4):299 - 315.
    The concept of self-efficacy is concerned with people''s beliefs in their ability to produce given attainment. It has been widely applied to study human conduct in various settings. This study, based on Albert Bandura''s social cognitive theory, proposes the employment of self-efficacy for investigating people''s ethical conduct related to computer use. Specifically, an ethical computer self-efficacy (ECSE) construct concerning software piracy is developed and validated. The measurement model of the construct was rigorously tested and validated through confirmatory factor analysis. The (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   24 citations  
  22.  46
    The Effect of Organization-Based Self-Esteem and Deindividuation in Protecting Personal Information Privacy.Meng-Hsiang Hsu & Feng-Yang Kuo - 2003 - Journal of Business Ethics 42 (4):305 - 320.
    In this research we apply the Theory of Planned Behavior (TPB) to study decisions related to information privacy protection. A TPB-based model was proposed to investigate whether organization-based self-esteem and perceived deindividuation can be employed to measure the strength of the perceived behavioral control construct. In addition, we examined if the addition of a causal path linking subjective norms to attitudes and another causal path linking organization-based self-esteem to subjective norms enhanced our research model's predicting power. Our study shows that (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   8 citations  
  23. Wang Chʻung ku shih.Chʻang Chʻing - 1960
     
    Export citation  
     
    Bookmark  
  24. Wei wu pien chêng fa pʻi pʻan.Kuan-chʻing Wang - 1943
     
    Export citation  
     
    Bookmark  
  25.  22
    Shih-shuo Hsin-yü: A New Account of Tales of the WorldShih-shuo Hsin-yu: A New Account of Tales of the World.Donald E. Gjertson, Liu I.-ch'ing & Richard B. Mather - 1980 - Journal of the American Oriental Society 100 (3):380.
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  26.  27
    Lenin on the Principle of Party Nature in Philosophy.Ch'eri Ho-Ch'ing - 1973 - Contemporary Chinese Thought 5 (2):4-20.
    Increasingly skillful forgery of Marxism and increasingly skillful disguise of various antimaterialist theories as Marxism are the characteristics of modern revisionism in political economy, tactics, and general philosophy ." In this remark, Lenin unmistakably pointed out the old tricks of the various revisionists who frenziedly attacked Marxism. In philosophy, veteran revisionists such as Bernstein and his ilk who followed on the tail of bourgeois professors of philosophy called for "return to Kant," integration of Marxism with Kantianism, and replenishment of Marxism (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  27. Kuo fu chê hsüeh ssŭ hsiang.O. -chʻing Sung - 1971
     
    Export citation  
     
    Bookmark  
  28. Lo chi yü kʻo hsüeh fang fa.Chih-chʻing Sung - 1964 - Edited by Lin, Ju-hao & [From Old Catalog].
    No categories
     
    Export citation  
     
    Bookmark  
  29. Ta hsüeh che hsüeh kai lun.Chen-chʻing Sun - 1972
    No categories
     
    Export citation  
     
    Bookmark  
  30. Zhe xue ci dian.Ping-chʻing Fan - 1926
     
    Export citation  
     
    Bookmark  
  31.  20
    Hsü Wei ti wen hsüeh yü yi hsu (The Literature and Art of Hsü Wei, 1521-1593)Hsu Wei ti wen hsueh yu yi hsu.Kuo-ch'ing Tu & Richard I.-Cheng Liang - 1981 - Journal of the American Oriental Society 101 (4):428.
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  32. Wang Chʻung yen chiu.Chʻing-Fang Pʻan - 1977
     
    Export citation  
     
    Bookmark  
  33.  11
    中国古代的语言和逻辑.Chad Hansen, Ch ing-yü Chang, Yün-Chih Chou & Ch ing-T. Ien Ts ui - 1998
    Direct download  
     
    Export citation  
     
    Bookmark  
  34. Hsiung Shih-li hsien sheng hsüeh chi.Shih-chʻing Pʻan - 1979
     
    Export citation  
     
    Bookmark  
  35. Hsien Chʻin fa lü ssu hsiang yü tzu jang fa.Yün-chʻing Keng - 1973
     
    Export citation  
     
    Bookmark  
  36.  16
    Dynamic Vision Sensor Tracking Method Based on Event Correlation Index.Hengyi Lv, Yang Feng, Yisa Zhang & Yuchen Zhao - 2021 - Complexity 2021:1-11.
    Dynamic vision sensor is a kind of bioinspired sensor. It has the characteristics of fast response, large dynamic range, and asynchronous output event stream. These characteristics make it have advantages that traditional image sensors do not have in the field of tracking. The output form of the dynamic vision sensor is asynchronous event stream, and the object information needs to be provided by the relevant event cluster. This article proposes a method based on the event correlation index to obtain the (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  37. Jen sheng che hsüeh tao lun.Shuang-chʻing Li - 1972
     
    Export citation  
     
    Bookmark  
  38. Han Fei ti fa chih ssû hsiang.Chʻên-chʻing Chang - 1930
     
    Export citation  
     
    Bookmark  
  39. Jen hsing fen hsi.Chʻing-yü Chʻen - 1962
    No categories
     
    Export citation  
     
    Bookmark  
  40. Fa hsüeh tʻung lun.Jên-chʻing Ho - 1954
     
    Export citation  
     
    Bookmark  
  41. Hsin lo chi hsüeh.Ling-chʻing Hsü - 1950
    No categories
     
    Export citation  
     
    Bookmark  
  42. Ma-kʻo-ssŭ chu i chê hsüeh chien i tu pên.Yang-Chiung ChʻêN - 1957
     
    Export citation  
     
    Bookmark  
  43.  32
    On Li Ssu.Wang Shao-P'U. & Li Ch'ang-Ch'ing - 1975 - Chinese Studies in History 8 (1-2):225-241.
    No categories
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  44.  24
    Ts'ang-lang shih-hua te shih-ko li-lun yen-chiu 葬浪詩話的詩歌理論研究Ts'ang-lang shih-hua te shih-ko li-lun yen-chiu.Tim W. Chan, Li Jui-ch'ing 坎銳清 & Li Jui-ch'ing Ruiqing) - 1995 - Journal of the American Oriental Society 115 (3):512.
    No categories
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  45. Session 2A-Web Information Retrieval-Learning to Integrate Web Catalogs with Conceptual Relationships in Hierarchical Thesaurus.Jui-Chi Ho, Ing-Xiang Chen & Cheng-Zen Yang - 2006 - In O. Stock & M. Schaerf (eds.), Lecture Notes in Computer Science. Springer Verlag. pp. 4182--217.
     
    Export citation  
     
    Bookmark  
  46. Pʻei yang chʻing nien ti kung chʻan chu i tao tê.Yüan-Ping Chou - 1956
    No categories
     
    Export citation  
     
    Bookmark  
  47.  11
    The molecular mechanisms regulating the assembly of the autophagy initiation complex.Weijing Yao, Yuyao Feng, Yi Zhang, Huan Yang & Cong Yi - 2024 - Bioessays 46 (6):2300243.
    The autophagy initiation complex is brought about via a highly ordered and stepwise assembly process. Two crucial signaling molecules, mTORC1 and AMPK, orchestrate this assembly by phosphorylating/dephosphorylating autophagy‐related proteins. Activation of Atg1 followed by recruitment of both Atg9 vesicles and the PI3K complex I to the PAS (phagophore assembly site) are particularly crucial steps in its formation. Ypt1, a small Rab GTPase in yeast cells, also plays an essential role in the formation of the autophagy initiation complex through multiple regulatory (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  48.  37
    Effects of Parental Autonomy Support and Teacher Support on Middle School Students’ Homework Effort: Homework Autonomous Motivation as Mediator.Xiaowei Feng, Ke Xie, Shaoying Gong, Lei Gao & Yang Cao - 2019 - Frontiers in Psychology 10.
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   4 citations  
  49.  27
    A Generalization of the Cauchy-Schwarz Inequality and Its Application to Stability Analysis of Nonlinear Impulsive Control Systems.Yang Peng, Jiang Wu, Limin Zou, Yuming Feng & Zhengwen Tu - 2019 - Complexity 2019:1-7.
    In this paper, we first present a generalization of the Cauchy-Schwarz inequality. As an application of our result, we obtain a new sufficient condition for the stability of a class of nonlinear impulsive control systems. We end up this note with a numerical example which shows the effectiveness of our method.
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  50.  13
    Sustainable Export Innovation Behavior of Firms Under Fiscal Incentive.Chen Feng, Beibei Shi, Hong Yan, Siying Yang & Caiquan Bai - 2021 - Frontiers in Psychology 12.
    The fiscal imbalance between the central and local governments under fiscal centralization may motivate local governments to pass tax burdens on firms. The causal identification of the tax system reform and the sustainable export innovation behavior of firms are of great significance. This study uses the income tax sharing policy of China to examine the impact of fiscal centralization on the sustainable export innovation behavior of firms. We find that this tax reform has significantly inhibited the increase of the export (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
1 — 50 / 1000