Paper Status Tracking
Contact us
[email protected]
Click here to send a message to me 3275638434
Paper Publishing WeChat

Article
Affiliation(s)

China People’s Police University, Langfang, China

ABSTRACT

In the new era, the efficiency of public security intelligence analysis is one of the decisive factors for the reforms of public security work quality, efficiency as well as the impetus transforming, which also has a profound impact on the strategic decision-making of public security work, risk prevention and control, the prevention of illegal and criminal activities as well. This article, by constructing SEM (Structural Equation Model) which takes the organizational support, perceived behavioral control, the intelligence sharing, external constraint factors, and public security intelligence analysis efficiency as latent variables, explores the deep inner link among latent variables, in order to provide the public security intelligence analysis efficiency with scientific, objective, and reliable guidance theory and practice research efficaciously.

KEYWORDS

SEM, the public security intelligence, the analytical efficiency

Cite this paper

Psychology Research, March 2022, Vol. 12, No. 3, 87-99

References

Ajzen, I. (1985). From intentions to actions: A theory of planned behavior. Berlin: Spring.

Ajzen, I. (2002). Perceived behavioral control, self-efficacy, locus of control, and the theory of planned behavior. Journal of Applied Social Psychology, 32(4), 665-683.

Baidu Encyclopedia. (n.d.). Retrieved August 29, 2019 from https://baike.baidu.com/item/structuralequationmodel/1350810?fr=al
addin

Boateng, F. D., & Wu, G. Z. (2018). Effect of organizational support on police efficiency and behavior: A cross-cultural comparison. Asian J Criminal, 6(2), 311-328.

Bock, G. W., & Kim, Y. G. (2002). Breaking the myths of rewards: An exploratory study of attitudes about knowledge sharing. Information Re-sources Management Journal, 15(2), 14-21.

Caesens, G., & Stinglhamber, F. (2014). The relationship between perceived organizational support and work engagement: The role of self-efficacy and its outcomes. Revue Européenne de Psychologieappliquée, 64, 259-267.

Cao, X., Wu, X. N., Sun, C. Q., & Wu, D. L. (2007). Web2.0 and its application in intelligence research. Modern Intelligence, 27(7), 177-179.

Chen, G. (2018). Analysis of criminal intelligence (p. 15). Beijing: People’s Public Security University Press.

Cochrane, C. B., Hagan, G. J., & Brown B. (2009). Introduction to defense acquisition management (9th ed). Washington DC: Defense Acquisition University Press.

Collins, C. J., & Smith, K. G. (2006). Knowledge exchange and combination: The role of human resource practices in the performance of high-technology firms. The Academy of Management Journal, 49(3), 544-560.

Fornell, C., & Larcker, D. F. (1981). Evaluating structural equation models with unobservable variables and measurement error. Journal of Marketing Research, 18(1), 39-50.

Gong, Q. Q. (2017). Research on the mechanism of all-staff intelligence ability on intelligence efficiency under Web2.0 (Master’s thesis). Retrieved from https://d.wanfangdata.com.cn/thesis/D01362942

Han, Y., & Yang, X. Q. (2007). Research on the incentive mechanism of competitive intelligence sharing between superiors and subordinates. Research Paper, 12.

He, W. Y., Zhai Y. N., & Wang, J. (2018). Green technology innovation and push-type synergy mechanism. Journal of Dalian University of Technology (Social Science Edition), 39(3), 17-23.

Kraimer, M. L., & Wayne, S. J. (2004). An examination of perceived organizational support as a multidimensional construct in the context of an expatriate assignment. Journal of Management, 30(2), 209-237.

Li, J. L. (2016). Public security intelligence analysis technology from the perspective of big data. Beijing: Science and Technology Literature Publishing Press.

Lin, Z. (2016). Research on obstacles and countermeasures of public security intelligence sharing. Journal of Hubei Police College, 2(4), 80-82.

Maisel, L. S., & Cokins, G. (2014). Big data predictive analysis: Decision optimization and performance improvement. Beijing: People’s Posts and Telecommunications Press.

Manstead, A. S. R., & Eekelen, S. A. M. V. (1998). Distinguishing between perceived behavioral control and self-efficacy in the domain of academic achievement intentions and behaviors. Journal of applied social psychology, 28(15), 1375-1392.

Meng, X. W. (2013). Analysis of public security intelligence. Beijing: People’s Public Security University Press.

Qiu, H. Z., & Lin, B. F. (2009). Principle and application of structural equation model (p. 10). Beijing: China Light Industry Press.

Simon, H. A. (1955). A behavioral model of rational choice. Quarterly Journal of Economics, 69(1), 99-118.

Spreitzer, G. M. (1996). Social structural characteristics of psychological empowerment. Academy of Management Journal, 39(2), 483-504.

Sun, X. R. (2012). Application research of structural equation model in library and information science. Information Science, 30(8), 1218-1223.

Terry, D. J., & Leary, J. E. O. (1995). The theory of planned behavior: The effects of perceived behavioral control and self-efficacy. British Journal of Social Psychology, 34, 199-220.

Thompson, B. (2000). Ten commandments of structural equation modeling. In L. G. Grimm and P. R. Yarnold (Eds.), Reading and understanding more multivariate statistics (pp. 261-283). Washington DC: American Psychological Association.

Wang, P., Zhi, F., & Zhang, B. (2015). Research on the relationship between competitive intelligence sharing and cooperative innovation performance among organizations. Intelligence Theory and Practice, 38(5), 12-18.

Yan, B. N., Liu, S. M., & Wang, C. (2014). An empirical study on the relationship between intelligence analysis and cognitive bias based on structural equation modeling. Intelligence Theory and Practice, 37(1), 79-83.

Yang, X. N. (2018). The organizational factors and control of intelligence oversight. Intelligence Journal, 37(5), 26-30.

Yu, S., & Liu, F. Y. (2019). The inner influence mechanism of adults’ intention to participate in online learning community: Based on the micro perspective of goal-oriented behavior theory and self-determination theory. Journal of Adult Education, 3, 46-55.

Zeng, W., Li, H., Chen, Y., Li, R., & Xu, Z. (2019). Research on intelligence perception method technology and its application. Intelligence Theory and Practice, 42(5), 19-22.

Zhang, C., & Zhou, X. P. (2017). Looking at the of public security intelligence analysis. Direction of public security intelligence reform from the experience of American intelligence sharing. Library Science Research, 6, 97-101.

Zhang, D. L., Huang, G. Q., Yin, X. L., & Gong, Q. H. (2015). Residents’ waste separation behaviors at the source: Using SEM with the theory of planned behavior in Guangzhou. International Journal of Environmental Research and Public Health, 4, 94-83.

Zhang, J. (2009). Research on effectiveness evaluation method (p. 1). Beijing: National Defense Industry Press.

Zhang, L. (2017). U.S. intelligence failure in Cuban missile crisis: an analysis of “national intelligence assessment” from the perspective of organizational theory. Intelligence Journal, 36(8), 1-5.

Zhang, X., Fan, Y., & Zhu, J. (2014). The impact of organizational support on emotional commitment and employee innovation behavior. East China Economic Management, 9, 125-130.

Zhao, B. F. (2018). Information science. Beijing: Jincheng Press.

Zhao, X. K. (2010). Research on intelligence oversight leading to decision-making mistakes: Cause decomposition and empirical model. Intelligence Theory and Practice, 33(9), 12-16.

Zhu, W. Z., & Chen Z. X. (2007). Discussing knowledge sharing behavior in virtual community: Taking online game community as an example. E-Commerce Research, 5(1), 55-80.

About | Terms & Conditions | Issue | Privacy | Contact us
Copyright © 2001 - David Publishing Company All rights reserved, www.davidpublisher.com
3 Germay Dr., Unit 4 #4651, Wilmington DE 19804; Tel: 001-302-3943358 Email: [email protected]