{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,3]],"date-time":"2025-12-03T17:26:06Z","timestamp":1764782766959,"version":"3.41.2"},"reference-count":59,"publisher":"Emerald","issue":"1","license":[{"start":{"date-parts":[[2002,2,1]],"date-time":"2002-02-01T00:00:00Z","timestamp":1012521600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.emerald.com\/insight\/site-policies"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2002,2,1]]},"abstract":"<jats:p>Using a case study in the temporary services industry, this paper illustrates the common concerns of large multinational corporations with their legacy information systems. The paper uses the popular concept of the organizational life cycle to demonstrate how and when to respond to new competitive challenges and opportunities. Organizational and systems rigidities faced by large and mature firms are identified. These rigidities include: a multitude of diverse and globally dispersed systems that need to remain operational while new systems are being implemented, thus diverting staff attention from development to maintenance; formalized, but possibly outdated business processes are embedded into existing information systems; within each functional area, \u201cownership\u201d relationships exist regarding business processes and related IT systems; and difficulties in achieving cross\u2010functional consensus for cross\u2010functional systems.<\/jats:p>","DOI":"10.1108\/02635570210414613","type":"journal-article","created":{"date-parts":[[2002,7,28]],"date-time":"2002-07-28T18:52:34Z","timestamp":1027882354000},"page":"5-16","source":"Crossref","is-referenced-by-count":22,"title":["Competitive agility and the challenge of legacy information systems"],"prefix":"10.1108","volume":"102","author":[{"given":"Sabine B.","family":"Reddy","sequence":"first","affiliation":[]},{"given":"Ram","family":"Reddy","sequence":"additional","affiliation":[]}],"member":"140","reference":[{"key":"key2022020220343901900_B1","unstructured":"Abernathy, W. (1978), The Productivity Dilemma: Roadblock to Innovation in the Automobile Industry, Johns Hopkins University Press, Baltimore, MD."},{"key":"key2022020220343901900_B2","doi-asserted-by":"crossref","unstructured":"Adler, R.W. (1996), \u201cTransfer pricing for world\u2010class manufacturing\u201d, Long Range Planning, Vol. 29, pp. 69\u201075.","DOI":"10.1016\/0024-6301(95)00067-4"},{"key":"key2022020220343901900_B3","doi-asserted-by":"crossref","unstructured":"Agarwal, R. (1997), \u201cSurvival of firms over the product life cycle\u201d, Southern Economic Journal, Vol. 63, pp. 571\u201084.","DOI":"10.2307\/1061095"},{"key":"key2022020220343901900_B4","doi-asserted-by":"crossref","unstructured":"Bakos, J. and Treacy, M. (1986), \u201cInformation technology and corporate strategy: a research perspective\u2019, MIS Quarterly, Vol. 10 No.2, pp. 107\u201019.","DOI":"10.2307\/249029"},{"key":"key2022020220343901900_B5","doi-asserted-by":"crossref","unstructured":"Beath, C. and Ives, B. (1986), \u201cCompetitive information systems in support of pricing\u201d, MIS Quarterly, pp. 85\u201096.","DOI":"10.2307\/248883"},{"key":"key2022020220343901900_B6","unstructured":"Benjamin, R., Rockart, J., Morton, M.S. and Wyman, J. (1984), \u201cInformation technology: a strategic opportunity\u201d, Sloan Management Review, Spring, pp. 27\u201034."},{"key":"key2022020220343901900_B7","doi-asserted-by":"crossref","unstructured":"Birou, L.M., Fawcett, S.E. and Magnan, G.M. (1998), \u201cThe product life cycle: a tool for functional strategic alignment\u201d, International Journal of Purchasing and Materials, Spring, pp. 37\u201051.","DOI":"10.1111\/j.1745-493X.1998.tb00047.x"},{"key":"key2022020220343901900_B8","unstructured":"Bourgeois III, L.J., Duhaime, I.M. and Stimpert, J.L. (1999), Strategic Management: A Managerial Perspective, The Dryden Press, Fort Worth, TX."},{"key":"key2022020220343901900_B9","doi-asserted-by":"crossref","unstructured":"Brynjolfsson, E. (1993), \u201cThe productivity paradox of information technology\u201d, Communications of the ACM, Vol. 36 No. 12, pp. 67\u201077.","DOI":"10.1145\/163298.163309"},{"key":"key2022020220343901900_B10","unstructured":"Business Wire (1999), \u201cOlsten Corporation unveils precise system at global human resource management conference\u201d, 28 June."},{"key":"key2022020220343901900_B11","unstructured":"Cash, J. and Konsynski, B. (1985), \u201cIS redraws competitive boundaries\u201d, Harvard Business Review, Vol. 63 No. 2, pp. 134\u201042."},{"key":"key2022020220343901900_B12","doi-asserted-by":"crossref","unstructured":"Chakravarthy, B. (1984), \u201cStrategic self\u2010renewal: a planning framework for today\u201d, Academy of Management Review, Vol. 3, pp. 536\u201047.","DOI":"10.5465\/amr.1984.4279703"},{"key":"key2022020220343901900_B13","doi-asserted-by":"crossref","unstructured":"Clark, K.B. and Wheelwright, S.C. (1992), \u201cOrganizing and leading \u2018heavyweight\u2019 development teams\u201d, California Management Review, Vol. 34 No. 3, pp. 9\u201028.","DOI":"10.2307\/41167421"},{"key":"key2022020220343901900_B14","doi-asserted-by":"crossref","unstructured":"Clemons, E. (1986), \u201cInformation systems for sustainable competitive advantage\u201d, Information and Management, Vol. 11,  pp. 131\u20106.","DOI":"10.1016\/0378-7206(86)90010-8"},{"key":"key2022020220343901900_B15","doi-asserted-by":"crossref","unstructured":"Clemons, E. and Row, M. (1991), \u201cSustaining IT advantage: the role of structural differences\u201d, MIS Quarterly, September, pp. 275\u201092.","DOI":"10.2307\/249639"},{"key":"key2022020220343901900_B16","doi-asserted-by":"crossref","unstructured":"Cohen, M.A. and Whang, S. (1997), \u201cCompeting in product and service: a product life\u2010cycle model\u201d, Management Science, Vol. 43,  pp. 535\u201045.","DOI":"10.1287\/mnsc.43.4.535"},{"key":"key2022020220343901900_B17","unstructured":"Davenport, T.H. (1998), \u201cPutting the enterprise into the enterprise system\u201d, Harvard Business Review, Vol. 76 No. 4, pp. 121\u201032."},{"key":"key2022020220343901900_B18","doi-asserted-by":"crossref","unstructured":"Donaldson, L. (1985), \u201cOrganization design and the life\u2010cycle of products\u201d, Journal of Management Studies, Vol. 22 No. 1, pp. 25\u201037.","DOI":"10.1111\/j.1467-6486.1985.tb00240.x"},{"key":"key2022020220343901900_B19","unstructured":"(The) Economist (1999), \u201cAfter the deal\u201d, The Economist, 9 January."},{"key":"key2022020220343901900_B20","unstructured":"European Commission (1995), \u201cCouncil definitely adopts directive on protection of personal data\u201d, European Commission Press Release IP\/95\/822."},{"key":"key2022020220343901900_B21","doi-asserted-by":"crossref","unstructured":"Hage, J. and Aiken, M. (1969), \u201cRoutine technology, social structure and organizational goals\u201d, Administrative Science Quarterly, Vol. 14 No. 3, pp. 366\u201076.","DOI":"10.2307\/2391132"},{"key":"key2022020220343901900_B22","unstructured":"Hamel, G. and Prahalad, C.K. (1994), Competing for the Future, Harvard Business School Press, Boston, MA."},{"key":"key2022020220343901900_B23","doi-asserted-by":"crossref","unstructured":"Hewitt, F. (1999), \u201cInformation technology mediated business process management \u2013 lessons from the supply chain\u201d, International Journal of Technology Management, Vol. 17 No. 1\/2, pp. 37\u201053.","DOI":"10.1504\/IJTM.1999.002707"},{"key":"key2022020220343901900_B24","doi-asserted-by":"crossref","unstructured":"Hofer, C. (1975), \u201cToward a contingency theory of strategy\u201d, Academy of Management Journal, December, pp. 784\u2010810.","DOI":"10.5465\/255379"},{"key":"key2022020220343901900_B25","unstructured":"IBM (1981), Business Systems Planning: Information Systems Planning Guide, IBM, London."},{"key":"key2022020220343901900_B26","unstructured":"Jooss, R. (1998), \u201cWindow to the future\u201d, Credit Union Management, July, pp. 38\u201041."},{"key":"key2022020220343901900_B27","doi-asserted-by":"crossref","unstructured":"Karimi, J., Gupta, Y.P. and Somers, T.M. (1996), \u201cThe congruence between a firm\u2019s competitive strategy and information technology leader\u2019s rank and role\u201d, Journal of Management Information Systems, Vol. 13 No. 1.","DOI":"10.1080\/07421222.1996.11518112"},{"key":"key2022020220343901900_B28","unstructured":"Keen, P.G.W. (1991), Shaping the Future: Business Design through Information Technology, Harvard Business School Press, Boston, MA."},{"key":"key2022020220343901900_B29","unstructured":"Kelly Services (1999), PR News Wire, 20 August."},{"key":"key2022020220343901900_B30","doi-asserted-by":"crossref","unstructured":"Kettinger, W.J., Grover, V. and Segars, A.H. (1995), \u201cDo strategic systems really pay off? An analysis of classic strategic IT cases\u201d, Information Systems Management, Vol. 12, Winter, pp. 35\u201043.","DOI":"10.1080\/07399019508962953"},{"key":"key2022020220343901900_B31","unstructured":"Kimberly, J.R., Miles, R.H. and Associates (1980), The Organizational Life Cycle, Jossey\u2010Bass, San Francisco, CA."},{"key":"key2022020220343901900_B32","unstructured":"King, J. (1999), \u201cBig merger year leaves out IT\u201d, Computerworld, 20 December, p. 20."},{"key":"key2022020220343901900_B33","unstructured":"Klepper, S. (1996), \u201cEntry, exit, growth, and innovation over the product life cycle\u201d, The American Economic Review, Vol. 86, pp. 562\u201083."},{"key":"key2022020220343901900_B34","doi-asserted-by":"crossref","unstructured":"Laughlin, S. (1999), \u201cAn ERP game plan\u201d, The Journal of Business Strategy, Vol. 20 No. 1, pp. 32\u20107.","DOI":"10.1108\/eb039981"},{"key":"key2022020220343901900_B35","doi-asserted-by":"crossref","unstructured":"Lowry, J.R. (1997), \u201cThe life cycle of shopping centers\u201d, Business Horizons, Vol. 40, pp. 77\u201086.","DOI":"10.1016\/S0007-6813(97)90029-X"},{"key":"key2022020220343901900_B36","unstructured":"McFarlan, F.W. (1995), \u201cHow to manage an IT outsourcing alliance\u201d, Sloan Management Review, Vol. 36 No. 2, pp. 9\u201023."},{"key":"key2022020220343901900_B37","unstructured":"Manpower Inc. (1997), Manpower Inc. Annual Report, Manpower Inc."},{"key":"key2022020220343901900_B38","unstructured":"Manpower Inc. (1999), 10K Filing, Manpower Inc., 31 March."},{"key":"key2022020220343901900_B39","doi-asserted-by":"crossref","unstructured":"Marks, M.L. (1997), \u201cConsulting in mergers and acquisitions \u2013 interventions spawned by recent trends\u201d, Journal of Organizational Change Management, Vol. 10 No. 3.","DOI":"10.1108\/09534819710171112"},{"key":"key2022020220343901900_B40","doi-asserted-by":"crossref","unstructured":"Miles, R.E. and Snow, C.C. (1978), Organizational Strategy, Structure, and Process, McGraw\u2010Hill, New York, NY.","DOI":"10.2307\/257544"},{"key":"key2022020220343901900_B41","unstructured":"Milwaukee Journal Sentinel (1997), \u201cKelly forecasts decline\u201d, 5 November, Business Section, p. 1."},{"key":"key2022020220343901900_B42","doi-asserted-by":"crossref","unstructured":"Mintzberg, H. (1978), \u201cPatterns in strategy formation\u201d, Management Science, Vol. 24 No. 9, pp. 934\u201048.","DOI":"10.1287\/mnsc.24.9.934"},{"key":"key2022020220343901900_B43","doi-asserted-by":"crossref","unstructured":"Noffsinger, W.B, Niedbalski, R., Blanks, M. and Emmart, N. (1998), \u201cLegacy object modeling speeds software integration\u201d, Communications of the ACM, Vol. 41 No. 12, pp. 80\u20109.","DOI":"10.1145\/290133.290153"},{"key":"key2022020220343901900_B44","doi-asserted-by":"crossref","unstructured":"Osborn, C.S. (1998), \u201cSystems for sustainable organizations: emergent strategies, interactive controls and semi\u2010formal information\u201d, Journal of Management Studies, Vol. 35 No. 4, pp. 481\u2010509.","DOI":"10.1111\/1467-6486.00106"},{"key":"key2022020220343901900_B45","unstructured":"Penrose, E.T. (1952), \u201cBiological analogies in the theory of the firm\u201d, American Economic Review, Vol. 42, pp. 804\u201019."},{"key":"key2022020220343901900_B46","unstructured":"Porter, M.E. (1980), Competitive Strategy: Techniques for Analyzing Industries and Competitors, The Free Press, New York, NY."},{"key":"key2022020220343901900_B47","unstructured":"Porter, M.E. and Millar, V.E. (1985), \u201cHow information gives you competitive advantage\u201d, Harvard Business Review, Vol. 65 No. 4, pp. 149\u201060."},{"key":"key2022020220343901900_B48","doi-asserted-by":"crossref","unstructured":"Powell, T.C. and Dent\u2010Micallef, A. (1997), \u201cInformation technology as competitive advantage: the role of human, business, and technology resources\u201d, Strategic Management Journal, Vol. 18 No. 5, pp. 375\u2010405.","DOI":"10.1002\/(SICI)1097-0266(199705)18:5<375::AID-SMJ876>3.0.CO;2-7"},{"key":"key2022020220343901900_B49","doi-asserted-by":"crossref","unstructured":"Rackoff, N., Wiseman, C. and Ullrich, W. (1985), \u201cIS is for competitive advantage: implementation of a planning process\u201d, MIS Quarterly, Vol. 9, pp. 285\u201094.","DOI":"10.2307\/249229"},{"key":"key2022020220343901900_B50","unstructured":"Radosevic, L. (1998), \u201cBang for the budget\u201d, CIO Magazine, 15 July."},{"key":"key2022020220343901900_B51","doi-asserted-by":"crossref","unstructured":"Ryan, C. and Riggs, W.E. (1996), \u201cRedefining the product cycle: the five\u2010element product wave\u201d, Business Horizons, Vol. 39, pp. 33\u201040.","DOI":"10.1016\/S0007-6813(96)90064-6"},{"key":"key2022020220343901900_B52","unstructured":"Schneider, P. (1999), \u201cWanted: ERPeople skills\u201d, CIO Magazine, 1 March."},{"key":"key2022020220343901900_B53","unstructured":"Thyfault, M.E. (1999), \u201cIT puts the right people in the right place\u201d, Information Week, 27 September, pp. 247\u201055."},{"key":"key2022020220343901900_B54","unstructured":"Van De Velde, R. (1992), \u201cCASE adoption at Imperial Oil\u201d, Journal of Systems Management, September, pp. 24\u201038."},{"key":"key2022020220343901900_B55","doi-asserted-by":"crossref","unstructured":"Vernon, R. (1979), \u201cThe product life cycle hypothesis in a new international environment\u201d, Oxford Bulletin of Economics and Statistics, Vol. 41 No. 4, pp. 255\u201067.","DOI":"10.1111\/j.1468-0084.1979.mp41004002.x"},{"key":"key2022020220343901900_B56","unstructured":"Weichert, T. (1997), \u201cDie Europ\u00e4ische Datenschutzrichtlinie und Datenschutzregelungen im Ausland\u201d, in HBV Fachtagung, Datentransfer International: Entwicklungstrends \u2013 Datenschutz \u2013 Gestaltung und Mitbestimmung, M\u00f6rfelden\/Walldorf."},{"key":"key2022020220343901900_B57","doi-asserted-by":"crossref","unstructured":"Wernerfelt, B. and Karnani, A. (1987), \u201cCompetitive strategy under uncertainty\u201d, Strategic Management Journal, Vol. 8, March\u2010April, pp. 187\u201094.","DOI":"10.1002\/smj.4250080209"},{"key":"key2022020220343901900_B58","unstructured":"Wooldridge, A. (1995), \u201cA survey of multinationals: big is back \u2013 who wants to be a giant?\u2019, The Economist, 24 June."},{"key":"key2022020220343901900_B59","unstructured":"Yourdon Inc. (1993), Yourdon Systems Method, Prentice\u2010Hall, Englewood Cliffs, NJ"}],"container-title":["Industrial Management &amp; Data Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/www.emeraldinsight.com\/doi\/full-xml\/10.1108\/02635570210414613","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/02635570210414613\/full\/xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/02635570210414613\/full\/html","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,24]],"date-time":"2025-07-24T23:37:02Z","timestamp":1753400222000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.emerald.com\/imds\/article\/102\/1\/5-16\/174323"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2002,2,1]]},"references-count":59,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2002,2,1]]}},"alternative-id":["10.1108\/02635570210414613"],"URL":"https:\/\/doi.org\/10.1108\/02635570210414613","relation":{},"ISSN":["0263-5577"],"issn-type":[{"type":"print","value":"0263-5577"}],"subject":[],"published":{"date-parts":[[2002,2,1]]}}}