Create a new account

It's simple, and free.

Resarch Methodology of Computer Security

s were sent to Europe and North America for universitylevel education, as opposed to the sending of large numbers of qualified students from all socioeconomic strata, which began in the late1960s, and as opposed to the prior almost total absence of contact with foreigners in everyday Saudi life (Hajrah, 1991, pp. 200, 212, 244).

Many individuals from these new social groupings have been assimilated into the bureaucratic and organizational structures in Saudi Arabia. Their attitudes and aspirations often conflict with the more traditional policies and behaviors of senior administrators and managers in Saudi organizations. These conflicts often have a negative effect on both the efficiency and the effectiveness of Saudi organizations.

Any solution to the human conflicts affecting Saudi organizations must effectively address the problem within the context of the society's traditional value structure. Solutions which would be appropriate for western organizations cannot simply be recommended for or imposed on Saudi organizations. Thus, the model,

...

< Prev Page 3 of 15 Next >

More on Resarch Methodology of Computer Security...

Loading...
APA     MLA     Chicago
Resarch Methodology of Computer Security. (1969, December 31). In LotsofEssays.com. Retrieved 07:29, May 19, 2024, from https://www.lotsofessays.com/viewpaper/1691715.html