Flylib.com
List of Figures
Previous page
Table of content
Next page
Chapter 1: Introducing The Phenomenon of Global Software Work
Figure 1.1: Global offshore software production centres
Chapter 5: Global Software WorkAn Identity Perspective
Figure 5.1: Organization cultureidentityimage linkage
Figure 5.2: ComSoftGlobTel GSA: cultureidentityimage linkage
Chapter 8: The Case of Gowing and Eron GSAPower and Control
Figure 8.1: Gowing: organization chart
Chapter 11: Managerial Implications
Figure 11.1: Life-cycle model of GSA relationship evolution
Source
: Murray and Mahon (1993).
Previous page
Table of content
Next page
Global IT Outsourcing: Software Development across Borders
ISBN: 0521039487
EAN: 2147483647
Year: 2003
Pages: 91
Authors:
Sundeep Sahay
,
Brian Nicholson
,
S. Krishna
BUY ON AMAZON
Strategies for Information Technology Governance
Linking the IT Balanced Scorecard to the Business Objectives at a Major Canadian Financial Group
Measuring ROI in E-Commerce Applications: Analysis to Action
Managing IT Functions
Governance in IT Outsourcing Partnerships
Governance Structures for IT in the Health Care Industry
Data Structures and Algorithms in Java
The Queue Interface
The Java Collections Framework: A First Look
List Nodes
D.1. Data Structures and Algorithms
D.3. Games
Microsoft WSH and VBScript Programming for the Absolute Beginner
Overview of the Windows Script Host
VBScript Basics
Using Procedures to Organize Scripts
Handling Script Errors
Appendix A WSH Administrative Scripting
HTI+ Home Technology Integrator & CEDIA Installer I All-In-One Exam Guide
Troubleshooting Structured Wiring
Designing and Installing Distributed Video Systems
Security System Basics
Programming
Other Home Technology Integration Devices
Microsoft Office Visio 2007 Step by Step (Step By Step (Microsoft))
Adding Text to Shapes and the Drawing Page
Connecting Shapes in Flowcharts
Storing Information with Network Shapes
About the Authors
Choose the Right Book for You
The Oracle Hackers Handbook: Hacking and Defending Oracle
Attacking the TNS Listener and Dispatchers
Attacking the Authentication Process
Attacking Oracle PL/SQL Web Applications
Accessing the File System
Appendix A Default Usernames and Passwords
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies