Research Commentary: Toward the 24-Hour Knowledge Factory - a Prognosis of Practice and a Call for Concerted Research
暂无分享,去创建一个
[1] Rudolf K. Keller,et al. Pattern-based reverse-engineering of design components , 1999, Proceedings of the 1999 International Conference on Software Engineering (IEEE Cat. No.99CB37002).
[2] David P. Boyd,et al. The Need for a Corporate Global Mind-Set , 2003 .
[3] Z. Chaczko,et al. 24/7 Software Development in Virtual Student Exchange Groups: Redefining the Work and Study Week , 2006, 2006 7th International Conference on Information Technology Based Higher Education and Training.
[4] Laurie J. Kirsch,et al. Portfolios of Control Modes and IS Project Management , 1997, Inf. Syst. Res..
[5] Blaxill Mf,et al. The fallacy of the overhead quick fix. , 1991 .
[6] Amar Gupta,et al. Agile Systems With Reusable Patterns of Business Knowledge: A Component-Based Approach (Artech House Computing Library) , 2005 .
[7] Varun Grover,et al. Shaping Agility through Digital Options: Reconceptualizing the Role of Information Technology in Contemporary Firms , 2003, MIS Q..
[8] Victor Kaptelinin,et al. UMEA: translating interaction histories into project contexts , 2003, CHI '03.
[9] T. Hout,et al. The fallacy of the overhead quick fix. , 1991, Harvard business review.
[10] George S. Yip,et al. Developing Global Strategies for Service Businesses , 1996 .
[11] Anthony DiRomualdo,et al. Strategic Intent for IT Outsourcing , 1998 .
[12] Michael E. Porter,et al. Changing Patterns of International Competition , 1986 .
[13] Amar Gupta,et al. A Knowledge Based Approach to Facilitate Enginering Design , 2002 .
[14] David Lei,et al. Global Strategy, Competence-Building and Strategic Alliances , 1992 .
[15] James J. Treinen,et al. Following the sun: Case studies in global software development , 2006, IBM Syst. J..
[16] M. Dell. The power of virtual integration: an interview with Dell Computer's Michael Dell. Interview by Joan Magretta. , 1998, Harvard business review.
[17] Monica Yap,et al. Follow the sun: distributed extreme programming development , 2005, Agile Development Conference (ADC'05).
[18] N. Kaka. A choice of models , 2003 .
[19] R. Nolan,et al. How to Manage an IT Outsourcing Alliance , 1995 .
[20] O. Granstrand,et al. Multi-Technology Corporations: Why They Have “Distributed” Rather Than “Distinctive Core” Competencies , 1997 .
[21] Jun Rekimoto,et al. Time-machine computing: a time-centric approach for the information environment , 1999, UIST '99.
[22] D. Rosenfield,et al. The New Dynamics of Global Manufacturing Site Location , 1994 .
[23] Erran Carmel,et al. The Maturation of Offshore Sourcing of Information Technology Work , 2002, MIS Q. Executive.
[24] Soon Ang,et al. Employment outsourcing in information systems , 1996, CACM.
[25] Jen-Her Wu,et al. A methodology for designing form-based decision support systems , 2004, Decis. Support Syst..
[26] Duvvuru Sriram,et al. Artificial intelligence in engineering design (Volume III): knowledge acquisition, commercial systems, and integrated environments , 1992 .
[27] K. Subramanian,et al. Leveraging Resources in Global Software Development , 2001, IEEE Softw..
[28] Ravi Aron,et al. Enabled Strategic Outsourcing : Knowledge Intensive Firms , Information Work and the Extended Organizational Form , 2002 .
[29] Wang Xin,et al. Supporting design reuse based on integrated design rationale , 2001, 2001 IEEE International Conference on Systems, Man and Cybernetics. e-Systems and e-Man for Cybernetics in Cyberspace (Cat.No.01CH37236).
[30] P. Bain,et al. ‘An assembly line in the head’: work and employee relations in the call centre , 1999 .
[31] JoAnne Yates,et al. It's About Time: Temporal Structuring in Organizations , 2002, Organ. Sci..
[32] Ram D. Sriram,et al. Conflict mitigation system for collaborative engineering , 1995, Artificial Intelligence for Engineering Design, Analysis and Manufacturing.
[33] Joan Magretta,et al. The Power of Virtual Integration: An Interview with Dell Computer''s Michael Dell , 1998 .
[34] N. Venkat Venkatraman,et al. Offshoring Without Guilt , 2004 .
[35] A. Bartmess,et al. Building Competitive Advantage through a Global Network of Capabilities , 1993 .
[36] W. Powell. Learning from Collaboration: Knowledge and Networks in the Biotechnology and Pharmaceutical Industries , 1998 .
[37] S. Wheelwright,et al. The new logic of high-tech R&D , 1999 .
[38] J. Barney. How a Firm's Capabilities Affect Boundary Decisions , 1999 .
[39] P. Klahr,et al. Managing Customer Support Knowledge , 1998 .
[40] Nicholas G. Carr. In Praise of Walls , 2004 .
[41] David A. Light. Cross-Cultural Lessons in Leadership , 2003 .
[42] N. Venkatraman,et al. Theorizing the Future of Strategy: Questions for Shaping Strategy Research in the Knowledge Economy , 2006 .
[43] P. Drucker. They're not employees, they're people. , 2002, Harvard business review.
[44] Blaz Zupan,et al. A function-decomposition method for development of hierarchical multi-attribute decision models , 2004, Decis. Support Syst..
[45] Amar Gupta. A four-faceted knowledge-based approach to surmounting borders , 2001, J. Knowl. Manag..
[46] Erran Carmel,et al. Tactical Approaches for Alleviating Distance in Global Software Development , 2001, IEEE Softw..
[47] David Gelernter,et al. Lifestreams: an alternative to the desktop metaphor , 1996, CHI Conference Companion.
[48] Xin Wang,et al. Supporting design reuse based on integrated design rationale , 2001, SMC.
[49] Stephen Tallman,et al. Internationalization, Globalization, and Capability-Based Strategy , 2002 .
[50] N. Venkatraman. Beyond Outsourcing: Managing IT Resources as a Value Center , 1997 .
[51] J. B. Quinn,et al. STRATEGIC OUTSOURCING: LEVERAGING KNOWLEDGE CAPABILITIES , 1999 .
[52] Clayton M. Christensen. The past and future of competitive advantage , 2001 .
[53] Danny Miller,et al. Strategic Integration: Competing in the Age of Capabilities , 2000 .
[54] K. Peattie,et al. Meeting the Closed-Loop Challenge: The Case of Remanufacturing , 2004 .
[55] International Conference: Information Technology Based Higher Education and Training , 2000 .
[56] M. J. Earl,et al. The Risks of Outsourcing IT , 1996 .