The development and exercise of power by leaders of support units in implementing information technology-based services
暂无分享,去创建一个
[1] Jay R. Galbraith,et al. Intraorganizational power considerations for designing information systems , 1978 .
[2] E. A. Locke,et al. A study of upward influence in organizations. , 1982 .
[3] Daniel J. Brass,et al. Changing patterns or patterns of change: the effects of a change in technology on social network str , 1990 .
[4] Robert A. Burgelman. A Process Model of Internal Corporate Venturing in the Diversified Major Firm , 1983 .
[5] C. Saunders. THE STRATEGIC CONTINGENCIES THEORY OF POWER: MULTIPLE PERSPECTIVES , 1990 .
[6] David B. Jemison. Organizational versus environmental sources of influence in strategic decision making , 1981 .
[7] J. B. Rosener. Ways women lead. , 1990, Harvard business review.
[8] Linda S. Lotto. Qualitative Data Analysis: A Sourcebook of New Methods , 1986 .
[9] W. Ouchi,et al. Organizational Control: Two Functions. , 1975 .
[10] M. Lynne Markus,et al. Rituals in Information System Design , 1984, MIS Q..
[11] Beatriz Valadares Cendón. Power and technology in medical libraries : a study of selected participants in the IAIMS program , 1996 .
[12] Lyman W. Porter,et al. Organizational Politics , 1979 .
[13] James L. McKenney,et al. Bank of America: The Crest and Trough of Technological Leadership , 1997, MIS Q..
[14] Walter R. Nord,et al. Managing Power , 2001, IEEE Des. Test Comput..
[15] Mariann Jelinek,et al. New Technology as Organizational Innovation , 1987 .
[16] Judith Dozier Hackman. Power and Centrality in the Allocation of Resources in Colleges and Universities. , 1985 .
[17] John Child,et al. Strategies of Control and Organizational Behavior , 1973 .
[18] Peggy Johnson,et al. How to Survive the Present While Preparing for the Future: A Research Library Strategy , 1993 .
[19] A. T. Cobb. An Episodic Model of Power: Toward an Integration of Theory and Research , 1984 .
[20] Samuel B. Bacharach,et al. Bargaining: Power, Tactics, and Outcomes. , 1983 .
[21] K. Provan. Recognizing, Measuring, and Interpreting The Potential/Enacted Power Distinction In Organizational Research , 1980 .
[22] Lewis D. Cartee. Is Library Automation Producing a New Kind of Manager , 1990 .
[23] Jane M. Howell,et al. Champions of Technological Innovation. , 1990 .
[24] J. Pfeffer,et al. Who gets power — and how they hold on to it: A strategic-contingency model of power , 1977 .
[25] M. Lynne Markus,et al. Power, politics, and MIS implementation , 1987, CACM.
[26] Dan Farrell,et al. Patterns of Political Behavior in Organization , 1982 .
[27] E. Lawler. Power Processes in Bargaining , 1992 .
[28] Paul J. Hart,et al. Power and Trust: Critical Factors in the Adoption and Use of Electronic Data Interchange , 1997 .
[29] Walt Crawford,et al. Future Libraries: Dreams, Madness, and Reality , 1995 .
[30] C. Saunders,et al. Organizational power and the information services department: a reexamination , 1986, CACM.
[31] A. Giddens. Central Problems in Social Theory: Action, Structure and Contradiction in Social Analysis , 1979 .
[32] Barbara J. Bashein,et al. A Credibility Equation for IT Specialists , 1997 .
[33] Richard J. Bazillion. Personal computing and academic library design in the 1990s , 1992 .
[34] W. G. Astley,et al. Structural Sources of Intraorganizational: Power: A Theoretical Synthesis , 1984 .
[35] Stewart Clegg,et al. Frameworks of power , 1989 .
[36] M. Markus,et al. The Magic Bullet Theory in IT-Enabled Transformation , 1997 .
[37] J. C. Henderson. PLUGGING INTO STRATEGIC PARTNERSHIPS: THE CRITICAL IS CONNECTION , 1990 .
[38] David Knights,et al. Power and Identity in Theory and Practice , 1985 .
[39] Michael Gorman. The Treason of the Learned: The Real Agenda of Those Who Would Destroy Libraries and Books. , 1994 .
[40] K. Eisenhardt. Building theories from case study research , 1989, STUDI ORGANIZZATIVI.
[41] Daniel J. Brass. Being in the right place: A structural analysis of individual influence in an organization. , 1984 .
[42] L. Smircich. Concepts of Culture and Organizational Analysis. , 1983 .
[43] R. Kanter. The Change Masters , 1983 .
[44] Carol A. Beatty,et al. Preaching the Gospel: The Evangelists of New Technology , 1991 .
[45] David Krackhardt,et al. When friends leave: A structural analysis of the relationship between turnover and stayers' attitudes. , 1985 .
[46] W. G. Astley,et al. Beyond Dyadic Exchange: Functional Interdependence and Sub-unit Power , 1990 .
[47] S. Michael Malinconico. What Librarians Need to Know to Survive in an Age of Technology. , 1992 .
[48] D. Kipnis,et al. Intraorganizational Influence Tactics: Explorations in Getting One's Way , 1980 .
[49] H. Ibarra. NETWORK CENTRALITY, POWER, AND INNOVATION INVOLVEMENT: DETERMINANTS OF TECHNICAL AND ADMINISTRATIVE ROLES , 1993 .
[50] A. Beaubien,et al. Shattering Our Stereotype: Librarian's New Image. , 1995 .
[51] Daniel J. Brass,et al. POTENTIAL POWER AND POWER USE: AN INVESTIGATION OF STRUCTURE AND BEHAVIOR , 1993 .
[52] J. Ivancevich,et al. A Study of Control in a Manufacturing Organization: Managers and Nonmanagers , 1976 .
[53] A. Giddens. The Constitution of Society , 1985 .
[54] R. Coombs,et al. Culture, Control and Competition; Towards a Conceptual Framework for the Study of Information Technology in Organizations , 1992 .
[55] Marshall W. Meyer,et al. Power in Organizations. , 1982 .
[56] Cynthia Mathis Beath,et al. Supporting the information technology champion , 1991 .
[57] James D. Thompson. Organizations in Action , 1967 .
[58] R. Mowday. The Exercise of Upward Influence in Organizations. , 1978 .
[59] R. Lachman,et al. Power from What? A Reexamination of Its Relationships with Structural Conditions. , 1989 .
[60] A. Tannenbaum. Control in Organizations , 1969 .
[61] Donald R. Lasher,et al. USAA-IBM Partnerships in information technology: managing the image project , 1991 .
[62] M. Markus,et al. Information technology and organizational change: causal structure in theory and research , 1988 .
[63] Rob Kling,et al. The control of information systems developments after implementation , 1984, CACM.
[64] M. Foucault,et al. Discipline and Punish: The Birth of the Prison. , 1978 .
[65] M. Gorman. The treason of the learned , 1994 .
[66] J. Pennings,et al. Structural conditions of intraorganizational power , 1974 .
[67] J. Pennings,et al. A Strategic Contingencies' Theory of Intraorganizational Power , 1971 .
[68] Linda D. Molm,et al. STRUCTURE, ACTION, AND OUTCOMES: THE DYNAMICS OF POWER IN SOCIAL EXCHANGE* , 1990 .
[69] Wanda J. Orlikowski,et al. Information Technology and the Structuring of Organizations , 2011 .
[70] Patricia B. Culkin,et al. Systems that inform: emerging trends in library automation and network development , 1987 .
[71] Brian P. Bloomfield,et al. INFORMATION TECHNOLOGY, CONTROL AND POWER: THE CENTRALIZATION AND DECENTRALIZATION DEBATE REVISITED* , 1992 .
[72] Roma Harris. Information Technology and the De-Skilling of Librarians. , 1992 .
[73] Rosabeth Moss Kanter,et al. When a Thousand Flowers Bloom: Structural, Collective, and Social Conditions for Innovation in Organization , 2000 .
[74] G. Moore,et al. The political consequences of social networks , 1992 .
[75] R. Yin. Case Study Research: Design and Methods , 1984 .
[76] A. Giddens. NEW RULES OF SOCIOLOGICAL METHOD , 1980 .
[77] Niels Bjørn-Andersen,et al. International Conference on Information Systems ( ICIS ) 1986 POWER OVER USERS : ITS EXERCISE BY SYSTEM PROFESSIONALS , 2017 .
[78] Henry C. Lucas,et al. Organizational power and the information services department , 1984, CACM.
[79] J. Pfeffer,et al. Organizational Decision Making as a Political Process: The Case of a UniversityBudget. , 1974 .