351
Views
4
CrossRef citations to date
0
Altmetric
Original Articles

Outsourcing the IC's Stovepipes?

Pages 573-593 | Published online: 02 Feb 2011

References

  • See Trish Williams, op. cit., p. 22; Steve Konicki, op. cit., p. 38; John Storck, "Knowledge Diffusion Through Strategic Communities," Sloan Management Review, Vol. 41, No. 2, Winter 2000, pp. 63-74; R. Kochareker, "K-Commerce: Knowledge-based Commerce Architecture With Convergence of E-commerce and Knowledge Management," Information Systems Management, Vol. 18, No. 2, Spring 2001, pp. 30-35; Jan Duffy, "Knowledge Management Finally Becomes Mainstream," Information Management Journal, Vol. 35, No. 4, October 2001, pp. 62-65.
  • Martyn Warwick, "Get It in Writing," The Euronet, Vol. 1, No. 7, pp. 46-52.
  • See John Deutch and Jeffrey H. Smith, "Smarter Intelligence," Foreign Policy January/February 2002, pp. 64-69; Gregory F. Treverton, Reshaping National Intelligence for an Age of Information (Cambridge: Cambridge University Press, 2001); Arthur S. Hulnick, Fixing the Spy Machine: Preparing American Intelligence for the Twenty-First Century (Westport, Conn.: Praeger, 1999); Bruce D. Berkowitz and Allen E. Goodman, Best Truth: Intelligence in the Information Age (New Haven: Yale University Press, 2000); Preparing for the 21st Century: An Appraisal of U.S. Intelligence, Report of the Commission on the Roles and Capabilities of the United States Intelligence Community, 1996; Maurice R. Greenberg, Chairman, Making Intelligence Smarter: The Future of U.S. Intelligence, Report of an Independent Task Force, Council On Foreign Relations, 1996.
  • Christine B. Tayntor, "A Practical Guide to Staff Augmentation and Outsourcing," Information Systems Management, Vol. 18, No. 1, Winter 2001, pp. 84-91.
  • Patrick Cohen, "Learning to Let Go," CA Magazine, Vol. 134, No. 9, November 2001, p. 41.
  • Jim Barthold, "Together Apart," Telephony, Vol. 241, No. 7, 13 August 2001, p. 46.
  • Simon Holland and Tony Siebert, "You Can't Do Everything," Telecommunications, Vol. 35, No. 9, September 2001, pp. 53-57.
  • Vernon Loeb, "U.S. Intelligence Efforts to Get Major Review," The Washington Post, 12 May 2001, p. A3.
  • Peggy Carr, "Primary Research for Competitive Intelligence: Techniques for Actionability Within Your Organization," Business Information Alert, Vol. 13, No. 6, June 2001, p. 8.
  • Steve Konicki, "Groupthink Gets Smart," Informationweek, Vol. 87, No. 1, January 2002, p. 38.
  • Douglas Garr, Fortune, special issue, Summer 2001, p. 90.
  • Kathleen Melymuka, "The Next IT Strategy: The Information Utility," Computerworld, Vol. 35, No. 41, 8 October 2001, p. 35.
  • Tom Field, "How to Get In and Out of an Outsourcing Deal," CIO, Vol. 15, No. 6, 15 December 2001-1 January 2002, p. 85.
  • Larry Greenemeier, "Business Process Outsourcing Grows," Informationweek, 14 January 2002, p. 49.
  • Bob Rouse, "Outsourcing for Better Results," Latin Finance 131, October 2001 supp. Technological Edge, pp. 18-19.
  • Gregg D. Michael, "Data Center Outsourcing and the Bottom Line," Cost Engineering, Vol. 44, No. 1, January 2002, pp. 14-16.
  • Lenny Liebmann, "Tactical Outsourcing: A Smart Play in Uncertain Times," Communications News, Vol. 38, No. 12, December 2001, p. 50.
  • Ibid., p. 19.
  • Jeff Kaplan, "The Realities of Outsourcing," Network World, Vol. 19, No. 2, 14 January 2002, p. 33.
  • Tristan Simmons, "Selective Outsourcing," Telecommunications--International Edition, Vol. 34, No. 12, December 2000, p. 12.
  • Kelley Damore, "From the Editor's Desk: Rise of Outsourcing," Crn, 21 January 2002, p. 22.
  • Sandy Borthick, "Outsourcing Trends: Customers and Market Mature," Business Communications Review, Vol. 31, No. 7, July 2001, p. 29.
  • Pamela Harper, "How to Keep Your Organizational Reality From Sabotaging Your Outsource Strategy," The Secured Lender, Vol. 58, No. 1, January/February 2002, p. 64.
  • Jim Morgan, "Buyers Mull Turning Outsourcing Into a Strategy," Purchasing, Vol. 129, No. 7, 19 October 2000, pp. 24-28.
  • Jaikumar Vijayan, "Outsource Security with Care, Conference Attendees Warn," Computerworld, Vol. 35, No. 50, 10 December 2001, p. 8; Chad Saunders and Yolande E. Chan, "Rapid-Growth Firms: The Challenge of Managing Information Technology," Ivey Business Journal, Vol. 66, No. 3, January/February 2002, p. 63.
  • Danny Ertel, "Alliance Management: A Blueprint for Success," Financial Executive, Vol. 17, No. 9, December 2001, p. 36.
  • Ross Kindler, "The Three C's of Outsourcing," Association Management, Vol. 53, No. 8, August 2001, p. 154.
  • Stephanie Morgan, "How to Manage Outsourcing," People Management, Vol. 7, No. 9, 3 May 3 2001, pp. 44-45.
  • Joe Auer, "Looking Beyond 'Needs'," Computerworld, Vol. 36, No. 3, 14 January 2002, p. 23.
  • Tim Stud, "R&D Outsourcing Ups and Downs," R&D Magazine, Vol. 43, No. 9, September 2001, p. 9.
  • Robert Zahler, "Technology Outsourcing: It Hasn't Gotten Any Easier," Association Management, Vol. 53, No. 3, 28 March 2001, p. 28.
  • Nicholas G. Carr, "Partnering Is Such Sweet Sorrow," Business 2.0, Vol. 3, No. 2, February 2002, p. 93.
  • Special Report: Government IT Future: Panel of Experts Ponders Next Challenges for Government," Government Computer News, Vol. 19, No. 19, 10 July 2000, pp. 22-24.
  • Erik K. Clemens and Elizabeth T. Gray, "The Confidence Game," CIO, Vol. 15, No. 2, 15 October 2001, pp. 52-55.
  • Treverton , Gregory F. 2001 . Reshaping National Intelligence for an Age of Information , 104 – 107 . Cambridge : Cambridge University Press .
  • Berkowitz , Bruce D. and Goodman , Allan E. 2000 . Best Truth: Intelligence in the Information Age , 67 – 71 . New Haven : Yale University Press .
  • Hulnick , Arthur S. 1999 . Fixing the Spy Machine: Preparing American Intelligence for the Twenty-First Century , 54 – 56 . Westport, Conn. : Praeger .
  • Trish Williams, "Knowledge Management Initiatives," Washington Technology, Vol. 15, No. 23, 5 March 2001, p. 22.
  • See Trish Williams, op. cit., p. 22; David Landsbergen, Jr. and George Wolken, Jr., "Realizing the Promise: Government Information Systems and the Fourth Generation of Information Technology," Public Administration Review, Vol. 61, No. 2, March/April 2001, pp. 206-220; Elizabeth D. Liddy, "Information Security and Sharing," Online, Vol. 25, No. 3, May/June 2001, pp. 28-30.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.