13
Reproduced with permission of the copyright owner. Further reproduction prohibited without permission. Core IS capabilities for exploiting information technology David F Feeny; Leslie P Willcocks Sloan Management Review; Spring 1998; 39, 3; ABI/INFORM Global pg. 9

Core IS capabilities for exploiting information technology ...lacitym/coreIS.pdf · pg. 9. Reproduced with ... crucial first steps of application — the development and maintenance

  • Upload
    lyphuc

  • View
    215

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Core IS capabilities for exploiting information technology ...lacitym/coreIS.pdf · pg. 9. Reproduced with ... crucial first steps of application — the development and maintenance

Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.

Core IS capabilities for exploiting information technologyDavid F Feeny; Leslie P WillcocksSloan Management Review; Spring 1998; 39, 3; ABI/INFORM Globalpg. 9

Page 2: Core IS capabilities for exploiting information technology ...lacitym/coreIS.pdf · pg. 9. Reproduced with ... crucial first steps of application — the development and maintenance

Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.

Page 3: Core IS capabilities for exploiting information technology ...lacitym/coreIS.pdf · pg. 9. Reproduced with ... crucial first steps of application — the development and maintenance

Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.

Page 4: Core IS capabilities for exploiting information technology ...lacitym/coreIS.pdf · pg. 9. Reproduced with ... crucial first steps of application — the development and maintenance

Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.

Page 5: Core IS capabilities for exploiting information technology ...lacitym/coreIS.pdf · pg. 9. Reproduced with ... crucial first steps of application — the development and maintenance

Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.

Page 6: Core IS capabilities for exploiting information technology ...lacitym/coreIS.pdf · pg. 9. Reproduced with ... crucial first steps of application — the development and maintenance

Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.

Page 7: Core IS capabilities for exploiting information technology ...lacitym/coreIS.pdf · pg. 9. Reproduced with ... crucial first steps of application — the development and maintenance

Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.

Page 8: Core IS capabilities for exploiting information technology ...lacitym/coreIS.pdf · pg. 9. Reproduced with ... crucial first steps of application — the development and maintenance

Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.

Page 9: Core IS capabilities for exploiting information technology ...lacitym/coreIS.pdf · pg. 9. Reproduced with ... crucial first steps of application — the development and maintenance

Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.

Page 10: Core IS capabilities for exploiting information technology ...lacitym/coreIS.pdf · pg. 9. Reproduced with ... crucial first steps of application — the development and maintenance

Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.

Page 11: Core IS capabilities for exploiting information technology ...lacitym/coreIS.pdf · pg. 9. Reproduced with ... crucial first steps of application — the development and maintenance

Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.

Page 12: Core IS capabilities for exploiting information technology ...lacitym/coreIS.pdf · pg. 9. Reproduced with ... crucial first steps of application — the development and maintenance

Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.

Page 13: Core IS capabilities for exploiting information technology ...lacitym/coreIS.pdf · pg. 9. Reproduced with ... crucial first steps of application — the development and maintenance

Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.