|
|
|
|
LEADER |
00000cam a2200000Mi 4500 |
001 |
JSTOR_ocn609859940 |
003 |
OCoLC |
005 |
20231005004200.0 |
006 |
m o d |
007 |
cr n||---||||| |
008 |
100427s2010 xx o 000 0 eng d |
040 |
|
|
|a EBLCP
|b eng
|e pn
|c EBLCP
|d IDEBK
|d OCLCQ
|d E7B
|d N$T
|d OCLCQ
|d UMI
|d B24X7
|d DEBSZ
|d OCLCQ
|d JSTOR
|d OCLCF
|d OCLCQ
|d NLE
|d YDXCP
|d OCLCQ
|d SI#
|d COO
|d OCLCQ
|d AGLDB
|d LIV
|d OCLCQ
|d MERUC
|d OCLCQ
|d JBG
|d IOG
|d OCLCO
|d OCLCA
|d VTS
|d CEF
|d OCLCQ
|d LVT
|d STF
|d UAB
|d M8D
|d OCLCO
|d UKAHL
|d VT2
|d OCLCQ
|d OCLCO
|d MM9
|d UX1
|d OCLCO
|d OCLCQ
|
019 |
|
|
|a 729014454
|a 816373831
|a 856889490
|a 860568827
|a 904286940
|a 1103259727
|a 1129356327
|a 1153033615
|a 1175633876
|a 1192341791
|a 1240528934
|
020 |
|
|
|a 9781849280389
|q (electronic bk.)
|
020 |
|
|
|a 184928038X
|q (electronic bk.)
|
020 |
|
|
|z 1282529005
|
020 |
|
|
|z 9781282529007
|
020 |
|
|
|z 1849280371
|
020 |
|
|
|z 9781849280372
|
029 |
1 |
|
|a AU@
|b 000051584255
|
029 |
1 |
|
|a AU@
|b 000052007049
|
029 |
1 |
|
|a DEBBG
|b BV041431816
|
029 |
1 |
|
|a DEBBG
|b BV043033320
|
029 |
1 |
|
|a DEBSZ
|b 396352685
|
029 |
1 |
|
|a DEBSZ
|b 398276838
|
029 |
1 |
|
|a DEBSZ
|b 421529121
|
029 |
1 |
|
|a AU@
|b 000067109776
|
029 |
1 |
|
|a AU@
|b 000068791379
|
035 |
|
|
|a (OCoLC)609859940
|z (OCoLC)729014454
|z (OCoLC)816373831
|z (OCoLC)856889490
|z (OCoLC)860568827
|z (OCoLC)904286940
|z (OCoLC)1103259727
|z (OCoLC)1129356327
|z (OCoLC)1153033615
|z (OCoLC)1175633876
|z (OCoLC)1192341791
|z (OCoLC)1240528934
|
037 |
|
|
|a CL0500000269
|b Safari Books Online
|
037 |
|
|
|a 22573/ctt4k5kvh
|b JSTOR
|
050 |
|
4 |
|a QA76.9.A25
|
072 |
|
7 |
|a UB
|2 bicssc
|
072 |
|
7 |
|a COM
|x 060040
|2 bisacsh
|
072 |
|
7 |
|a COM
|x 043050
|2 bisacsh
|
072 |
|
7 |
|a COM
|x 053000
|2 bisacsh
|
072 |
|
7 |
|a BUS104000
|2 bisacsh
|
072 |
|
7 |
|a COM000000
|2 bisacsh
|
082 |
0 |
4 |
|a 005.8
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Kress, Robert E.
|
245 |
1 |
0 |
|a IT Governance to Drive High Performance :
|b Lessons from Accenture.
|
260 |
|
|
|a Ely :
|b IT Governance Pub.,
|c 2010.
|
300 |
|
|
|a 1 online resource (47 pages)
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
520 |
|
|
|a This pocket guide provides you with an insider's detailed description of Accenture's IT governance policy and details its governance structure. It will showhow effective IT governance links IT strategy and IT decisions to Accenture's business strategy and business priorities. Following the best practices approach set out in this pocket guide will serve as an excellent starting point for any organisation with ambitions to achieve high performance.
|
588 |
0 |
|
|a Print version record.
|
505 |
0 |
|
|a INTRODUCTION; IT governance contributes to high performance; Encouraging innovation; Reinventing IT; Best practices in IT governance; CHAPTER 1: SETTING AN IT GOVERNANCE POLICY; Starting with IT strategy; Governing principles; Accountability is key; CHAPTER 2: BUILDING AN IT GOVERNANCE STRUCTURE; Accenture Capital Committee; IT Steering Committee (ITSC); IT organization; Business sponsors; Stakeholders; Top management sets the tone; CHAPTER 3: LEVERAGING THE STRUCTURE; Global vs. local; Integrating with planning and budgeting; Establishing and measuring target benefits.
|
505 |
8 |
|
|a The case for visual conferencingCHAPTER 4: CASCADING IT GOVERNANCE; IT investment governance; IT product and service governance; Supporting managed services; IT standards and architecture; CHAPTER 5: ADAPTING ACCENTURE'S IT GOVERNANCE TO OTHER ORGANIZATIONS; Optimizing IT with smart governance.
|
590 |
|
|
|a JSTOR
|b Books at JSTOR Evidence Based Acquisitions
|
590 |
|
|
|a JSTOR
|b Books at JSTOR Demand Driven Acquisitions (DDA)
|
590 |
|
|
|a JSTOR
|b Books at JSTOR All Purchased
|
610 |
2 |
7 |
|a Accenture (Firm)
|2 blmlsh
|
650 |
|
0 |
|a Computer security.
|
650 |
|
6 |
|a Sécurité informatique.
|
650 |
|
7 |
|a COMPUTERS
|x Internet
|x Security.
|2 bisacsh
|
650 |
|
7 |
|a COMPUTERS
|x Networking
|x Security.
|2 bisacsh
|
650 |
|
7 |
|a COMPUTERS
|x Security
|x General.
|2 bisacsh
|
650 |
|
7 |
|a BUSINESS & ECONOMICS
|x Corporate Governance.
|2 bisacsh
|
650 |
|
7 |
|a Computer security.
|2 fast
|0 (OCoLC)fst00872484
|
776 |
0 |
8 |
|i Print version:
|z 9781849280372
|
856 |
4 |
0 |
|u https://jstor.uam.elogim.com/stable/10.2307/j.ctt5hh6jz
|z Texto completo
|
938 |
|
|
|a Askews and Holts Library Services
|b ASKH
|n AH26414467
|
938 |
|
|
|a Books 24x7
|b B247
|n bks00056012
|
938 |
|
|
|a EBL - Ebook Library
|b EBLB
|n EBL499609
|
938 |
|
|
|a ebrary
|b EBRY
|n ebr10496564
|
938 |
|
|
|a EBSCOhost
|b EBSC
|n 391140
|
938 |
|
|
|a ProQuest MyiLibrary Digital eBook Collection
|b IDEB
|n 252900
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 3236437
|
994 |
|
|
|a 92
|b IZTAP
|