Core IS capabilities for exploiting information technology ...lacitym/coreIS.pdf · pg. 9....

Post on 22-Jun-2018

213 views 0 download

transcript

Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.

Core IS capabilities for exploiting information technologyDavid F Feeny; Leslie P WillcocksSloan Management Review; Spring 1998; 39, 3; ABI/INFORM Globalpg. 9

Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.

Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.

Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.

Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.

Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.

Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.

Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.

Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.

Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.

Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.

Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.

Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.