Transcript
Page 1: Core IS capabilities for exploiting information technology ...lacitym/coreIS.pdf · pg. 9. Reproduced with ... crucial first steps of application — the development and maintenance

Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.

Core IS capabilities for exploiting information technologyDavid F Feeny; Leslie P WillcocksSloan Management Review; Spring 1998; 39, 3; ABI/INFORM Globalpg. 9

Page 2: Core IS capabilities for exploiting information technology ...lacitym/coreIS.pdf · pg. 9. Reproduced with ... crucial first steps of application — the development and maintenance

Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.

Page 3: Core IS capabilities for exploiting information technology ...lacitym/coreIS.pdf · pg. 9. Reproduced with ... crucial first steps of application — the development and maintenance

Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.

Page 4: Core IS capabilities for exploiting information technology ...lacitym/coreIS.pdf · pg. 9. Reproduced with ... crucial first steps of application — the development and maintenance

Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.

Page 5: Core IS capabilities for exploiting information technology ...lacitym/coreIS.pdf · pg. 9. Reproduced with ... crucial first steps of application — the development and maintenance

Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.

Page 6: Core IS capabilities for exploiting information technology ...lacitym/coreIS.pdf · pg. 9. Reproduced with ... crucial first steps of application — the development and maintenance

Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.

Page 7: Core IS capabilities for exploiting information technology ...lacitym/coreIS.pdf · pg. 9. Reproduced with ... crucial first steps of application — the development and maintenance

Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.

Page 8: Core IS capabilities for exploiting information technology ...lacitym/coreIS.pdf · pg. 9. Reproduced with ... crucial first steps of application — the development and maintenance

Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.

Page 9: Core IS capabilities for exploiting information technology ...lacitym/coreIS.pdf · pg. 9. Reproduced with ... crucial first steps of application — the development and maintenance

Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.

Page 10: Core IS capabilities for exploiting information technology ...lacitym/coreIS.pdf · pg. 9. Reproduced with ... crucial first steps of application — the development and maintenance

Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.

Page 11: Core IS capabilities for exploiting information technology ...lacitym/coreIS.pdf · pg. 9. Reproduced with ... crucial first steps of application — the development and maintenance

Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.

Page 12: Core IS capabilities for exploiting information technology ...lacitym/coreIS.pdf · pg. 9. Reproduced with ... crucial first steps of application — the development and maintenance

Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.

Page 13: Core IS capabilities for exploiting information technology ...lacitym/coreIS.pdf · pg. 9. Reproduced with ... crucial first steps of application — the development and maintenance

Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.


Top Related