Flylib.com
Index_S
Previous page
Table of content
Next page
S
Sears case study, 13-15
secrecy , 5, 168
selfishness, 52
senior executives, 107-108, 110, 117-118, 155
servant leadership, 6
sharing, 63
Slater, Philip, 165
Sloan, Alfred P. Jr., 91-92
social networks, 56
Spragins, Ellyn, 153
SRC Holdings, 65
strange attractor: antagonistic tendencies of, 62; definition of, 62; influence of, 162; of leaderless organization, 155, 157, 159, 173; rank-based thinking and, 62-63; stretch and fold characteristics of, 62, 161
strategic alignment, 138
strategic competence, 139
strategic direction, 134-135
strategic openness, 138
strategic transparency, 138
strategy council, 139
Strategy Diamond: benefits of, 114-115; decision making based on, 112; description of, 111; facets of, 113-114; illustration of, 112; organizational strength, 137-139; peer-based leadership councils, 138-140
Previous page
Table of content
Next page
The Myth of Leadership: Creating Leaderless Organizations
ISBN: 0891061991
EAN: 2147483647
Year: 2004
Pages: 98
Authors:
Jeffrey S. Nielsen
BUY ON AMAZON
Interprocess Communications in Linux: The Nooks and Crannies
Introduction
Process Group ID
File Information
Introduction
D.2. Sample Program for Profiling
Strategies for Information Technology Governance
Structures, Processes and Relational Mechanisms for IT Governance
Integration Strategies and Tactics for Information Technology Governance
Governance in IT Outsourcing Partnerships
The Evolution of IT Governance at NB Power
Governance Structures for IT in the Health Care Industry
Making Sense of Change Management: A Complete Guide to the Models, Tools and Techniques of Organizational Change
Part I - The Underpinning Theory
Leading change
Part II - The Applications
Mergers and acquisitions
Cultural change
Cisco Voice Gateways and Gatekeepers
Case Study: Introduction
Security
Manipulating Caller ID
Review Questions
Review Questions
The Java Tutorial: A Short Course on the Basics, 4th Edition
How Will Java Technology Change My Life?
How Do These Concepts Translate into Code?
Code Samples
Interfaces
Path Help
Comparing, Designing, and Deploying VPNs
Configuring and Verifying L2TPv3 Pseudowires
Advanced MPLS Layer 3 VPN Deployment Considerations
Operation of L2TP Voluntary/Client-Initiated Tunnel Mode
Understanding IPLS
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies