+ All Categories
Home > Documents > Core IS capabilities for exploiting information technology ...lacitym/coreIS.pdf · pg. 9....

Core IS capabilities for exploiting information technology ...lacitym/coreIS.pdf · pg. 9....

Date post: 22-Jun-2018
Category:
Upload: lyphuc
View: 213 times
Download: 0 times
Share this document with a friend
13
Reproduced with permission of the copyright owner. Further reproduction prohibited without permission. Core IS capabilities for exploiting information technology David F Feeny; Leslie P Willcocks Sloan Management Review; Spring 1998; 39, 3; ABI/INFORM Global pg. 9
Transcript
Page 1: Core IS capabilities for exploiting information technology ...lacitym/coreIS.pdf · pg. 9. Reproduced with ... crucial first steps of application — the development and maintenance

Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.

Core IS capabilities for exploiting information technologyDavid F Feeny; Leslie P WillcocksSloan Management Review; Spring 1998; 39, 3; ABI/INFORM Globalpg. 9

Page 2: Core IS capabilities for exploiting information technology ...lacitym/coreIS.pdf · pg. 9. Reproduced with ... crucial first steps of application — the development and maintenance

Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.

Page 3: Core IS capabilities for exploiting information technology ...lacitym/coreIS.pdf · pg. 9. Reproduced with ... crucial first steps of application — the development and maintenance

Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.

Page 4: Core IS capabilities for exploiting information technology ...lacitym/coreIS.pdf · pg. 9. Reproduced with ... crucial first steps of application — the development and maintenance

Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.

Page 5: Core IS capabilities for exploiting information technology ...lacitym/coreIS.pdf · pg. 9. Reproduced with ... crucial first steps of application — the development and maintenance

Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.

Page 6: Core IS capabilities for exploiting information technology ...lacitym/coreIS.pdf · pg. 9. Reproduced with ... crucial first steps of application — the development and maintenance

Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.

Page 7: Core IS capabilities for exploiting information technology ...lacitym/coreIS.pdf · pg. 9. Reproduced with ... crucial first steps of application — the development and maintenance

Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.

Page 8: Core IS capabilities for exploiting information technology ...lacitym/coreIS.pdf · pg. 9. Reproduced with ... crucial first steps of application — the development and maintenance

Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.

Page 9: Core IS capabilities for exploiting information technology ...lacitym/coreIS.pdf · pg. 9. Reproduced with ... crucial first steps of application — the development and maintenance

Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.

Page 10: Core IS capabilities for exploiting information technology ...lacitym/coreIS.pdf · pg. 9. Reproduced with ... crucial first steps of application — the development and maintenance

Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.

Page 11: Core IS capabilities for exploiting information technology ...lacitym/coreIS.pdf · pg. 9. Reproduced with ... crucial first steps of application — the development and maintenance

Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.

Page 12: Core IS capabilities for exploiting information technology ...lacitym/coreIS.pdf · pg. 9. Reproduced with ... crucial first steps of application — the development and maintenance

Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.

Page 13: Core IS capabilities for exploiting information technology ...lacitym/coreIS.pdf · pg. 9. Reproduced with ... crucial first steps of application — the development and maintenance

Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.


Recommended