Flylib.com
List of Figures
Previous page
Table of content
Next page
Chapter 1: Fundamentals of Performance TechnologyA Guide to Improving People, Process, and Performance
Figure 1-1: HUMAN PERFORMANCE TECHNOLOGY (HPT) MODEL
Chapter 2: The Human Performance Technology Model
Figure 2-1: HUMAN PERFORMANCE TECHNOLOGY (HPT) MODEL
Chapter 3: Performance Analysis
Figure 3-1: HPT MODEL PERFORMANCE ANALYSIS PHASE
Figure 3-2: GRANT AND MOSELEY CUSTOMER-FOCUSED PERFORMANCE ANALYSIS MODEL
Figure 3-3: ROTHWELL'S ENVIRONMENTS OF HUMAN PERFORMANCE
Figure 3-4: KAUFMAN'S DEFINITION OF NEED
Figure 3-5: ROTHWELL'S SIX CELL GAP ANALYSIS
Chapter 4: Cause Analysis
Figure 4-1: HPT MODEL CAUSE ANALYSIS PHASE
Chapter 5: Intervention Selection and Design
Figure 5-1: HPT MODEL INTERVENTION SELECTION AND DESIGN PHASE
Figure 5-2: COMPONENTS OF JOB DESIGN
Figure 5-3: INTERVENTIONS FOR ORGANIZATIONAL DESIGN AND DEVELOPMENT
Chapter 6: Intervention Implementation and Change
Figure 6-1: HPT MODEL INTERVENTION IMPLEMENTATION AND CHANGE PHASE
Figure 6-2: EXAMPLE OF PROJECT MANAGEMENT GANTT CHART
Figure 6-3: CAREER GUIDANCE MODEL
Chapter 7: Evaluation
Figure 7-1: HPT MODEL EVALUATION PHASE
Figure 7-2: MATRIX OF EVALUATION DECISIONS
Figure 7-3: GEIS AND SMITH EVALUATION MODEL
Figure 7-4: DESSINGER-MOSELEY 360 EVALUATION MODEL
Figure 7-5: KIRKPATRICK'S EVALUATION MODEL
Figure 7-6: ADAPTATION OF THE KAUFMAN-KELLER-WATKINS MODEL
Figure 7-7: EQUATION FOR CONFIRMING THE VALUE OF A PERFORMANCE INTERVENTION
Figure 7-8: MOSELEY AND SOLOMON CONFIRMATIVE EVALUATION MODEL
Figure 7-9: PRELIMINARY CHECKLIST FOR CONFIRMATIVE EVALUATION
Previous page
Table of content
Next page
Fundamentals of Performance Technology: A Guide to Improving People, Process, and Performance
ISBN: 1890289086
EAN: 2147483647
Year: 2004
Pages: 98
Authors:
Darlene M. Van Tiem
,
James L. Moseley
,
Joan Conway Dessinger
BUY ON AMAZON
Beginning Cryptography with Java
The JCA and the JCE
Symmetric Key Cryptography
Asymmetric Key Cryptography
CMS and S/MIME
SSL and TLS
Lotus Notes and Domino 6 Development (2nd Edition)
New Language Features
The Release 6 Object Store
Using Java in Agents
The External Data Source
ACL Privileges
Practical Intrusion Analysis: Prevention and Detection for the Twenty-First Century: Prevention and Detection for the Twenty-First Century
Tcpdump
IDS and IPS Internals
Cisco Secure IDS
Data Correlation
Security Business Issues
Mastering Delphi 7
Modeling and OOP Programming (with ModelMaker)
Client/Server with dbExpress
Working with ADO
Multitier DataSnap Applications
Appendix B Extra Delphi Tools from Other Sources
Wireless Hacks: Tips & Tools for Building, Extending, and Securing Your Network
Hack 30. Monitor Wireless Links in Linux with Wavemon
Hack 38. Graph Your Wireless Performance
Hack 59. Scan for Wireless Networks Automatically
Hack 70. Pebble
Section A.12. BSS Versus IBSS
File System Forensic Analysis
Bibliography
Sun Solaris Slices
Metadata Category
Summary
Other Topics
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies