core is capabilities for exploiting information technology ...lacitym/coreis.pdf · pg. 9....

13
Reproduced with permission of the copyright owner. Further reproduction prohibited without permission. Core IS capabilities for exploiting information technology David F Feeny; Leslie P Willcocks Sloan Management Review; Spring 1998; 39, 3; ABI/INFORM Global pg. 9

Upload: lyphuc

Post on 22-Jun-2018

213 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Core IS capabilities for exploiting information technology ...lacitym/coreIS.pdf · pg. 9. Reproduced with ... crucial first steps of application — the development and maintenance

Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.

Core IS capabilities for exploiting information technologyDavid F Feeny; Leslie P WillcocksSloan Management Review; Spring 1998; 39, 3; ABI/INFORM Globalpg. 9

Page 2: Core IS capabilities for exploiting information technology ...lacitym/coreIS.pdf · pg. 9. Reproduced with ... crucial first steps of application — the development and maintenance

Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.

Page 3: Core IS capabilities for exploiting information technology ...lacitym/coreIS.pdf · pg. 9. Reproduced with ... crucial first steps of application — the development and maintenance

Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.

Page 4: Core IS capabilities for exploiting information technology ...lacitym/coreIS.pdf · pg. 9. Reproduced with ... crucial first steps of application — the development and maintenance

Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.

Page 5: Core IS capabilities for exploiting information technology ...lacitym/coreIS.pdf · pg. 9. Reproduced with ... crucial first steps of application — the development and maintenance

Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.

Page 6: Core IS capabilities for exploiting information technology ...lacitym/coreIS.pdf · pg. 9. Reproduced with ... crucial first steps of application — the development and maintenance

Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.

Page 7: Core IS capabilities for exploiting information technology ...lacitym/coreIS.pdf · pg. 9. Reproduced with ... crucial first steps of application — the development and maintenance

Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.

Page 8: Core IS capabilities for exploiting information technology ...lacitym/coreIS.pdf · pg. 9. Reproduced with ... crucial first steps of application — the development and maintenance

Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.

Page 9: Core IS capabilities for exploiting information technology ...lacitym/coreIS.pdf · pg. 9. Reproduced with ... crucial first steps of application — the development and maintenance

Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.

Page 10: Core IS capabilities for exploiting information technology ...lacitym/coreIS.pdf · pg. 9. Reproduced with ... crucial first steps of application — the development and maintenance

Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.

Page 11: Core IS capabilities for exploiting information technology ...lacitym/coreIS.pdf · pg. 9. Reproduced with ... crucial first steps of application — the development and maintenance

Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.

Page 12: Core IS capabilities for exploiting information technology ...lacitym/coreIS.pdf · pg. 9. Reproduced with ... crucial first steps of application — the development and maintenance

Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.

Page 13: Core IS capabilities for exploiting information technology ...lacitym/coreIS.pdf · pg. 9. Reproduced with ... crucial first steps of application — the development and maintenance

Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.