![Page 1: Core IS capabilities for exploiting information technology ...lacitym/coreIS.pdf · pg. 9. Reproduced with ... crucial first steps of application — the development and maintenance](https://reader031.vdocuments.us/reader031/viewer/2022030817/5b2c1c4b7f8b9a594c8bc72d/html5/thumbnails/1.jpg)
Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.
Core IS capabilities for exploiting information technologyDavid F Feeny; Leslie P WillcocksSloan Management Review; Spring 1998; 39, 3; ABI/INFORM Globalpg. 9
![Page 2: Core IS capabilities for exploiting information technology ...lacitym/coreIS.pdf · pg. 9. Reproduced with ... crucial first steps of application — the development and maintenance](https://reader031.vdocuments.us/reader031/viewer/2022030817/5b2c1c4b7f8b9a594c8bc72d/html5/thumbnails/2.jpg)
Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.
![Page 3: Core IS capabilities for exploiting information technology ...lacitym/coreIS.pdf · pg. 9. Reproduced with ... crucial first steps of application — the development and maintenance](https://reader031.vdocuments.us/reader031/viewer/2022030817/5b2c1c4b7f8b9a594c8bc72d/html5/thumbnails/3.jpg)
Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.
![Page 4: Core IS capabilities for exploiting information technology ...lacitym/coreIS.pdf · pg. 9. Reproduced with ... crucial first steps of application — the development and maintenance](https://reader031.vdocuments.us/reader031/viewer/2022030817/5b2c1c4b7f8b9a594c8bc72d/html5/thumbnails/4.jpg)
Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.
![Page 5: Core IS capabilities for exploiting information technology ...lacitym/coreIS.pdf · pg. 9. Reproduced with ... crucial first steps of application — the development and maintenance](https://reader031.vdocuments.us/reader031/viewer/2022030817/5b2c1c4b7f8b9a594c8bc72d/html5/thumbnails/5.jpg)
Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.
![Page 6: Core IS capabilities for exploiting information technology ...lacitym/coreIS.pdf · pg. 9. Reproduced with ... crucial first steps of application — the development and maintenance](https://reader031.vdocuments.us/reader031/viewer/2022030817/5b2c1c4b7f8b9a594c8bc72d/html5/thumbnails/6.jpg)
Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.
![Page 7: Core IS capabilities for exploiting information technology ...lacitym/coreIS.pdf · pg. 9. Reproduced with ... crucial first steps of application — the development and maintenance](https://reader031.vdocuments.us/reader031/viewer/2022030817/5b2c1c4b7f8b9a594c8bc72d/html5/thumbnails/7.jpg)
Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.
![Page 8: Core IS capabilities for exploiting information technology ...lacitym/coreIS.pdf · pg. 9. Reproduced with ... crucial first steps of application — the development and maintenance](https://reader031.vdocuments.us/reader031/viewer/2022030817/5b2c1c4b7f8b9a594c8bc72d/html5/thumbnails/8.jpg)
Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.
![Page 9: Core IS capabilities for exploiting information technology ...lacitym/coreIS.pdf · pg. 9. Reproduced with ... crucial first steps of application — the development and maintenance](https://reader031.vdocuments.us/reader031/viewer/2022030817/5b2c1c4b7f8b9a594c8bc72d/html5/thumbnails/9.jpg)
Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.
![Page 10: Core IS capabilities for exploiting information technology ...lacitym/coreIS.pdf · pg. 9. Reproduced with ... crucial first steps of application — the development and maintenance](https://reader031.vdocuments.us/reader031/viewer/2022030817/5b2c1c4b7f8b9a594c8bc72d/html5/thumbnails/10.jpg)
Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.
![Page 11: Core IS capabilities for exploiting information technology ...lacitym/coreIS.pdf · pg. 9. Reproduced with ... crucial first steps of application — the development and maintenance](https://reader031.vdocuments.us/reader031/viewer/2022030817/5b2c1c4b7f8b9a594c8bc72d/html5/thumbnails/11.jpg)
Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.
![Page 12: Core IS capabilities for exploiting information technology ...lacitym/coreIS.pdf · pg. 9. Reproduced with ... crucial first steps of application — the development and maintenance](https://reader031.vdocuments.us/reader031/viewer/2022030817/5b2c1c4b7f8b9a594c8bc72d/html5/thumbnails/12.jpg)
Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.
![Page 13: Core IS capabilities for exploiting information technology ...lacitym/coreIS.pdf · pg. 9. Reproduced with ... crucial first steps of application — the development and maintenance](https://reader031.vdocuments.us/reader031/viewer/2022030817/5b2c1c4b7f8b9a594c8bc72d/html5/thumbnails/13.jpg)
Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.