Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Positive Organizational Scholarship: Foundations of a New Discipline

Buy

Positive Organizational Scholarship is a path-breaking scholarly volume exploring the dynamics in organizations that lead to extraordinary individual and organizational performance.

Just as positive psychology focuses on exploring optimal individual psychological states rather than pathological ones, Positive Organizational Scholarship focuses attention on optimal organizational states—the dynamics in organizations that lead to the development of human strength, foster resiliency in employees, make healing restoration, and reconciliation possible, and cultivate extraordinary individual and organizational performance.

Written by internationally renowned scholars and authors, Positive Organizational Scholarship offers practical guidance for managers and a future research agenda for understanding and enabling positive organizational behavior.

About the Editors

Kim S. Cameron is professor of organizational behavior and human resource management at the University of Michigan Business School and professor of higher education in the School of Education at the University of Michigan.

Jane E. Dutton is the William Russell Kelly Professor of Business Administration and professor of psychology at the University of Michigan.

Robert E. Quinn is the Margaret Elliot Tracy Collegiate Professor of Organizational Behavior and Human Resource Management at the University of Michigan Business School.

(HTML tags aren't allowed.)

Service-Oriented Computing: Agents, Semantics, and Engineering: AAMAS 2007 International Workshop, SOCASE 2007, Honolulu, HI, USA, May 14, 2007, Proceedings
Service-Oriented Computing: Agents, Semantics, and Engineering: AAMAS 2007 International Workshop, SOCASE 2007, Honolulu, HI, USA, May 14, 2007, Proceedings
This book constitutes the refereed proceedings of the International Workshop on Service-Oriented Computing: Agents, Semantics, and Engineering, SOCASE 2007, held in Honolulu, HI, USA as an associated event of AAMAS 2007, the main international conference on autonomous agents and multi-agent systems. The volume is rounded off with selected four best...
iPhoto '09: The Missing Manual
iPhoto '09: The Missing Manual

With iPhoto '09, Apple's popular photo organizer and editing program is better than ever. Unfortunately, intuitive as it may be, iPhoto still has the power to confuse anyone who uses it. That's why more people rely on our Missing Manual than any other iPhoto resource. Author and New York Times tech columnist David...

Data Mining the Web: Uncovering Patterns in Web Content, Structure, and Usage
Data Mining the Web: Uncovering Patterns in Web Content, Structure, and Usage
Learn How To Convert Web Data Into Web Knowledge

This text demonstrates how to extract knowledge by finding meaningful connections among data spread throughout the Web. Readers learn methods and algorithms from the fields of information retrieval, machine learning, and data mining which, when combined, provide a solid...


Extreme Programming Explored
Extreme Programming Explored
In Extreme Programming Explored, you can read about best practices as learned from the concrete experience of successful XP developers. Author and programmer Bill Wake provides answers to practical questions about XP implementation. Using hands-on examples--including code samples written in the Java programming...
Microsoft Outlook 2010 Step by Step
Microsoft Outlook 2010 Step by Step

Bill Gates’s dream of “a computer on every desktop” is becoming more and more of a reality—many people today work (and play) on computers both in the office and at home. But desktop computers are even becoming a thing of the past. Laptops, netbooks, and other portable computers, as well as Windows Mobile devices,...

A Secure Portal Using Websphere Portal V5 and Tivoli Access Manager V4.1
A Secure Portal Using Websphere Portal V5 and Tivoli Access Manager V4.1
This Redbook focuses on the security aspect of Portal’s single access point to help IT architects, IT specialists, security architects and security administrators understand and implement portal security using a secure portal solution.

Portals provide a personalized single point of access to applications, content, people and processes...

©2021 LearnIT (support@pdfchm.net) - Privacy Policy