暂无分享,去创建一个
Jan A. Bergstra | S. F. M. van Vlijmen | Guus P. A. J. Delen | J. Bergstra | S. Vlijmen | G. Delen | B. V. Vlijmen
[1] J. D. Trout. Scientific Explanation And The Sense Of Understanding* , 2002, Philosophy of Science.
[2] Stephen L. Vargo,et al. Evolving to a New Dominant Logic for Marketing , 2004 .
[3] Clayton M. Christensen,et al. The Process of Building Theory , 2001 .
[4] Thomas G Rundall,et al. Evidence-based management. , 2007, Hospitals & health networks.
[5] Barry Turner,et al. Some practical aspects of qualitative data analysis: One way of organising the cognitive processes associated with the generation of grounded theory , 1981 .
[6] Robert K. Perrons,et al. The role of clockspeed in outsourcing decisions for new technologies: insights from the prisoner's dilemma , 2004, Ind. Manag. Data Syst..
[7] Fabrizio Macagno,et al. Defeasible Classifications and Inferences from Definitions , 2010 .
[8] Tracy Hill. Strategy and performance , 2012 .
[9] Lisa Kreeger. Inside outsourcing: A grounded theory of relationship formation within a nascent service system , 2007 .
[10] R. Hirschheim,et al. Information systems outsourcing : myths, metaphors, and realities , 1993 .
[11] David Robotham,et al. Competences: measuring the unmeasurable , 1996 .
[12] B. Waller. Classifying and Analyzing Analogies , 2001 .
[13] Ronald Schettkat. Something unforeseeable happened? Natural rate theory and economic crisis , 2010 .
[14] E.J.J. Beulen,et al. Outsourcing van IT - Management Guide , 2006 .
[15] Lawrence Loh,et al. Diffusion of Information Technology Outsourcing: Influence Sources and the Kodak Effect , 1992, Inf. Syst. Res..
[16] Jan A. Bergstra,et al. Introducing Sourcements , 2011, ArXiv.
[17] Guus Delen. Decision and Control Factors for IT-sourcing , 2008 .
[18] Handbook of Network and System Administration , 2011 .
[19] Jan A. Bergstra,et al. Thread algebra for strategic interleaving , 2007, Formal Aspects of Computing.
[20] Mahen Tampoe,et al. Exploiting the core competences of your organization , 1994 .
[21] Evan H. Magill,et al. Feature Interactions in Telecommunications and Software Systems VI, May 17-19, 2000, Glasgow, Scotland, UK , 2000, FIW.
[22] J. U. Nielsen,et al. The EU public procurement regime— Does it work? , 2001 .
[23] Huw Richards,et al. Strategy and Performance: Competing through Competences , 2002 .
[24] Alexandra Van den Abbeele,et al. Public procurement of consulting services: Evidence and comparison with private companies , 2006 .
[25] Jan A. Bergstra,et al. Informal Control code logic , 2010, ArXiv.
[26] Jan A. Bergstra,et al. Business Mereology: Imaginative Definitions of Insourcing and Outsourcing Transformations , 2010, ArXiv.
[27] K. Parry. Grounded theory and social process: A new direction for leadership research , 1998 .
[28] Jan A. Bergstra,et al. Machine structure oriented control code logic , 2007, Acta Informatica.
[29] Irene van Staveren. Home Care Reform in the Netherlands: Impacts on Unpaid Care in Rotterdam , 2009 .
[30] Quint Wellington Redwood,et al. Improving offshore outsourcing success with Carnegie Mellons eSourcing Capability Model , 2007 .
[31] Mark Burgess. System Administration and the Scientific Method , 2008 .
[32] Ronald A. Ash,et al. THE PRACTICE OF COMPETENCY MODELING , 2000 .
[33] Leslie P. Willcocks,et al. Exploring information technology outsourcing relationships: theory and practice , 2000, J. Strateg. Inf. Syst..