[size=16.000000pt]
[size=16.000000pt]目录:
[size=12.000000pt]Porter, M.E. “The Five Competitive Forces that Shape Strategy,” [size=12.000000pt]Harvard Business Review,[size=12.000000pt]January 2008, pp. 79-93.
[size=12.000000pt]
[size=12.000000pt]Hagel, III J., Brown, J.S., and Davison, L. “Shaping Strategy in a World of Constant Disruption,”[size=12.000000pt]Harvard Business Review, [size=12.000000pt]October 2008, pp. 81-89.
[size=12.000000pt]
[size=12.000000pt]Ward, J., Daniel, E., and Peppard, J. “Building Better Business Cases for IT Investments,” [size=12.000000pt]MISQuarterly Executive, [size=12.000000pt](7:1), March 2008, pp. 1-15.
[size=12.000000pt]
[size=12.000000pt]McAfee, E., and Brynjolfsson, E. “Investing in the IT that Makes a Competitive Difference,”[size=12.000000pt]Harvard Business Review, [size=12.000000pt]July-August 2008, pp. 2-11.
[size=12.000000pt]
[size=12.000000pt]Smith, H.A., McKeen, J.D., Cranston, C., and Benson, M. “Investment Spend Optimization: ANew Approach to IT Investment at BMO Financial Group,” [size=12.000000pt]MIS Quarterly Executive, [size=12.000000pt](9:2), June2010, pp. 65-81.
[size=12.000000pt]
[size=12.000000pt]Weill, P. “Don’t Just Lead, Govern: How Top-Performing Firms Govern IT,” [size=12.000000pt]MIS QuarterlyExecutive, [size=12.000000pt](3:1), March 2004, pp. 1-17.
[size=12.000000pt]
[size=12.000000pt]Smith, H.A. and McKeen, J.D. “Creating a Process-Centric Organization at FCC: SOA from theTop Down,” [size=12.000000pt]MIS Quarterly Executive, [size=12.000000pt](7:2), June 2008, pp. 71-84.
[size=12.000000pt]
[size=12.000000pt]Kettinger, W.J., Marchand, D.A., and Davis, J.M. “Designing Enterprise IT Architectures toOptimize Global Flexibility and Standardization in Global Business,” [size=12.000000pt]MIS Quarterly Executive,[size=12.000000pt](9:2), June 2010, pp. 95-113
[size=12.000000pt]
[size=12.000000pt]Cullen, S., Seddon, P., and Willcocks, L.P. “Managing Outsourcing: The Life Cycle Imperative,”[size=12.000000pt]MIS Quarterly Executive, [size=12.000000pt](4:1), March 2005, pp. 229-246.
[size=12.000000pt]
[size=12.000000pt]Poston, R.S., Kettinger, W.J., and Simon, J.C. “Managing the Vendor Set: Achieving Best Pricingand Quality Service in IT Outsourcing,” [size=12.000000pt]MIS Quarterly Executive, [size=12.000000pt](8:2), June 2009, pp. 45-58.
[size=12.000000pt]
[size=12.000000pt]Willcocks, [size=11.000000pt]L., and Griffiths, C. “The [size=12.000000pt]Crucial role of Middle Management in Outsourcing,” [size=12.000000pt]MISQuarterly Executive, [size=12.000000pt](9:3), September 2010, [size=11.000000pt]pp. 177-193.
[size=12.000000pt]
[size=12.000000pt]Schooley, B., Horan, T. and Marich, M. “Managing IT Collaboration in Multi-OrganizationalTime-Critical Services,” [size=12.000000pt]MIS Quarterly Executive, [size=12.000000pt](9:3), September 2010, pp. 147-161.
[size=12.000000pt]
[size=12.000000pt]Kayworth, T. and Whitten, D. “Effective Information Security Requires a Balance of Social andTechnology Factors,” [size=12.000000pt]MIS Quarterly Executive, [size=12.000000pt](9:3), September 2010, pp. [size=11.000000pt]163-175.