Flylib.com
List of Tables
Previous page
Table of content
Chapter 3: Trust as Capital: The Foundation of Management
Table 1: Tentative Outcomes of the Use of Financial Capital without Trust
Table 2: Tentative Outcomes of the Use of Human Capital without Trust
Table 3: Tentative Outcomes of the Use of Social Capital without Trust
Table 4: Action that Violates Trust
Table 5: Reaction to Distrust
Chapter 4: Managing Cognitive and Affective Trust in the Conceptual R&D Organization
Table 1: Relationships Among Cognitive and Interpersonal Trust and Distrust
Table 2: Reported Collaborations in the Center
Chapter 5: Interpersonal Trust in Online Partnerships: The Challenge of Representation
Table 1: Situations and Trust Types after Dibben (2002)
Chapter 6: Usability of Websites Contributing to Trust in E-commerce
Table 1: The Qualities Communicating Trustworthiness and the Aspects Creating a Sense of Risk in E-Commerce
Chapter 7: Citizens' Trust in Ministries
Table 1: Citizens' Trust in Ministries
Table 2: Cross-Tabulation Between Trust in Ministries and Socio-Economic Variables (%)
Table 3: Citizens' Trust in Socially Relevant Institutions
Table 4: Citizens' Trust in the Value Capability of the Ministries
Table 5: Cross-Tabulation Between Trust in Values and Socio-Economic Variables (%)
Table 6: Trust in Citizen Orientation
Table 7: Citizens' Trust in Regulatory Power of Ministries
Table 8: Trust in Financial Transfers of Ministries
Chapter 8: Trust in Technology Partnerships
Table 1: Characterization of Self-Referential Systems (Based on St hle, 1988)
Table 2: Capability
Table 3: Self-Reference
Table 4: Goodwill
Table 5: Behavior
Previous page
Table of content
WarDriving: Drive, Detect, Defend, A Guide to Wireless Security
ISBN: N/A
EAN: 2147483647
Year: 2004
Pages: 143
Authors:
Chris Hurley
,
Michael Puchol
,
Russ Rogers
,
Frank Thornton
BUY ON AMAZON
ADO.NET 3.5 Cookbook (Cookbooks (OReilly))
Accessing Deleted Rows in a DataTable
Adding Parent/Child Rows with Auto-Incrementing Keys
Deserializing Data
Exporting the Results of a Query as a String
Determining the Length of Columns in a SQL Server Table
Interprocess Communications in Linux: The Nooks and Crannies
Managing Failures
Introduction
Signaling Processes
Using fork and exec Together
Introduction
Strategies for Information Technology Governance
Linking the IT Balanced Scorecard to the Business Objectives at a Major Canadian Financial Group
Measuring and Managing E-Business Initiatives Through the Balanced Scorecard
Measuring ROI in E-Commerce Applications: Analysis to Action
Technical Issues Related to IT Governance Tactics: Product Metrics, Measurements and Process Control
Governance in IT Outsourcing Partnerships
Cisco IP Communications Express: CallManager Express with Cisco Unity Express
Configuring the Router
Configuring Cisco UE Backup and Restore
Step 8: Interconnecting Multiple Cisco IPC Express Systems
Summary
General Troubleshooting Techniques
Making Sense of Change Management: A Complete Guide to the Models, Tools and Techniques of Organizational Change
Individual change
Leading change
Part II - The Applications
Mergers and acquisitions
IT-based process change
What is Lean Six Sigma
Key #1: Delight Your Customers with Speed and Quality
Key #2: Improve Your Processes
Key #3: Work Together for Maximum Gain
Making Improvements That Last: An Illustrated Guide to DMAIC and the Lean Six Sigma Toolkit
The Experience of Making Improvements: What Its Like to Work on Lean Six Sigma Projects
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies