![]() |
[email protected] |
![]() |
3275638434 |
![]() |
![]() |
Paper Publishing WeChat |
This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License
ZHANG Ting, ZHANG Lebing, YUAN Shenghe
Full-Text PDF
XML 635 Views
DOI:10.17265/2159-5542/2022.03.001
China People’s Police University, Langfang, China
SEM, the public security intelligence, the analytical efficiency
Psychology Research, March 2022, Vol. 12, No. 3, 87-99
Ajzen, I. (1985). From intentions to actions: A theory of planned behavior. Berlin: Spring.
Ajzen, I. (2002). Perceived behavioral control, self-efficacy, locus of control, and the theory of planned behavior. Journal of Applied Social Psychology, 32(4), 665-683.
Baidu Encyclopedia. (n.d.). Retrieved
August 29, 2019 from https://baike.baidu.com/item/structuralequationmodel/1350810?fr=al
addin
Boateng, F. D., & Wu, G. Z. (2018). Effect of organizational support on police efficiency and behavior: A cross-cultural comparison. Asian J Criminal, 6(2), 311-328.
Bock, G. W., & Kim, Y. G. (2002). Breaking the myths of rewards: An exploratory study of attitudes about knowledge sharing. Information Re-sources Management Journal, 15(2), 14-21.
Caesens, G., & Stinglhamber, F. (2014). The relationship between perceived organizational support and work engagement: The role of self-efficacy and its outcomes. Revue Européenne de Psychologieappliquée, 64, 259-267.
Cao, X., Wu, X. N., Sun, C. Q., & Wu, D. L. (2007). Web2.0 and its application in intelligence research. Modern Intelligence, 27(7), 177-179.
Chen, G. (2018). Analysis of criminal intelligence (p. 15). Beijing: People’s Public Security University Press.
Cochrane, C. B., Hagan, G. J., & Brown B. (2009). Introduction to defense acquisition management (9th ed). Washington DC: Defense Acquisition University Press.
Collins, C. J., & Smith, K. G. (2006). Knowledge exchange and combination: The role of human resource practices in the performance of high-technology firms. The Academy of Management Journal, 49(3), 544-560.
Fornell, C., & Larcker, D. F. (1981). Evaluating structural equation models with unobservable variables and measurement error. Journal of Marketing Research, 18(1), 39-50.
Gong, Q. Q. (2017). Research on the mechanism of all-staff intelligence ability on intelligence efficiency under Web2.0 (Master’s thesis). Retrieved from https://d.wanfangdata.com.cn/thesis/D01362942
Han, Y., & Yang, X. Q. (2007). Research on the incentive mechanism of competitive intelligence sharing between superiors and subordinates. Research Paper, 12.
He, W. Y., Zhai Y. N., & Wang, J. (2018). Green technology innovation and push-type synergy mechanism. Journal of Dalian University of Technology (Social Science Edition), 39(3), 17-23.
Kraimer, M. L., & Wayne, S. J. (2004). An examination of perceived organizational support as a multidimensional construct in the context of an expatriate assignment. Journal of Management, 30(2), 209-237.
Li, J. L. (2016). Public security intelligence analysis technology from the perspective of big data. Beijing: Science and Technology Literature Publishing Press.
Lin, Z. (2016). Research on obstacles and countermeasures of public security intelligence sharing. Journal of Hubei Police College, 2(4), 80-82.
Maisel, L. S., & Cokins, G. (2014). Big data predictive analysis: Decision optimization and performance improvement. Beijing: People’s Posts and Telecommunications Press.
Manstead, A. S. R., & Eekelen, S. A. M. V. (1998). Distinguishing between perceived behavioral control and self-efficacy in the domain of academic achievement intentions and behaviors. Journal of applied social psychology, 28(15), 1375-1392.
Meng, X. W. (2013). Analysis of public security intelligence. Beijing: People’s Public Security University Press.
Qiu, H. Z., & Lin, B. F. (2009). Principle and application of structural equation model (p. 10). Beijing: China Light Industry Press.
Simon, H. A. (1955). A behavioral model of rational choice. Quarterly Journal of Economics, 69(1), 99-118.
Spreitzer, G. M. (1996). Social structural characteristics of psychological empowerment. Academy of Management Journal, 39(2), 483-504.
Sun, X. R. (2012). Application research of structural equation model in library and information science. Information Science, 30(8), 1218-1223.
Terry, D. J., & Leary, J. E. O. (1995). The theory of planned behavior: The effects of perceived behavioral control and self-efficacy. British Journal of Social Psychology, 34, 199-220.
Thompson, B. (2000). Ten commandments of structural equation modeling. In L. G. Grimm and P. R. Yarnold (Eds.), Reading and understanding more multivariate statistics (pp. 261-283). Washington DC: American Psychological Association.
Wang, P., Zhi, F., & Zhang, B. (2015). Research on the relationship between competitive intelligence sharing and cooperative innovation performance among organizations. Intelligence Theory and Practice, 38(5), 12-18.
Yan, B. N., Liu, S. M., & Wang, C. (2014). An empirical study on the relationship between intelligence analysis and cognitive bias based on structural equation modeling. Intelligence Theory and Practice, 37(1), 79-83.
Yang, X. N. (2018). The organizational factors and control of intelligence oversight. Intelligence Journal, 37(5), 26-30.
Yu, S., & Liu, F. Y. (2019). The inner influence mechanism of adults’ intention to participate in online learning community: Based on the micro perspective of goal-oriented behavior theory and self-determination theory. Journal of Adult Education, 3, 46-55.
Zeng, W., Li, H., Chen, Y., Li, R., & Xu, Z. (2019). Research on intelligence perception method technology and its application. Intelligence Theory and Practice, 42(5), 19-22.
Zhang, C., & Zhou, X. P. (2017). Looking at the of public security intelligence analysis. Direction of public security intelligence reform from the experience of American intelligence sharing. Library Science Research, 6, 97-101.
Zhang, D. L., Huang, G. Q., Yin, X. L., & Gong, Q. H. (2015). Residents’ waste separation behaviors at the source: Using SEM with the theory of planned behavior in Guangzhou. International Journal of Environmental Research and Public Health, 4, 94-83.
Zhang, J. (2009). Research on effectiveness evaluation method (p. 1). Beijing: National Defense Industry Press.
Zhang, L. (2017). U.S. intelligence failure in Cuban missile crisis: an analysis of “national intelligence assessment” from the perspective of organizational theory. Intelligence Journal, 36(8), 1-5.
Zhang, X., Fan, Y., & Zhu, J. (2014). The impact of organizational support on emotional commitment and employee innovation behavior. East China Economic Management, 9, 125-130.
Zhao, B. F. (2018). Information science. Beijing: Jincheng Press.
Zhao, X. K. (2010). Research on intelligence oversight leading to decision-making mistakes: Cause decomposition and empirical model. Intelligence Theory and Practice, 33(9), 12-16.
Zhu, W. Z., & Chen Z. X. (2007). Discussing knowledge sharing behavior in virtual community: Taking online game community as an example. E-Commerce Research, 5(1), 55-80.