{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,6,1]],"date-time":"2022-06-01T22:40:07Z","timestamp":1654123207397},"reference-count":21,"publisher":"IGI Global","issue":"3","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010,7,1]]},"abstract":"<p>At Villanova University, there are several courses that focus on the role that technology plays in business. At the graduate level, it is required that students develop business technology strategies for their companies. This task is placed in context of the best practices around the development of business technology strategies. Part of the learning process is for students to understand all of the components of a useful strategy. In this regard, the author has developed templates that help students organize and develop their strategies. The templates form the basis for both the \u201ctheory\u201d and \u201cpractice\u201d of business technology strategy, and are presented in this paper to provide a framework for understanding the strategy development process and a lens through which the strategies in this special issue can be assessed.<\/p>","DOI":"10.4018\/jitr.2010070101","type":"journal-article","created":{"date-parts":[[2011,2,15]],"date-time":"2011-02-15T20:22:05Z","timestamp":1297801325000},"page":"1-10","source":"Crossref","is-referenced-by-count":0,"title":["Templates for the Development of Business Technology Strategies"],"prefix":"10.4018","volume":"3","author":[{"given":"Stephen J.","family":"Andriole","sequence":"first","affiliation":[{"name":"Villanova University, USA"}]}],"member":"2432","reference":[{"key":"jitr.2010070101-0","author":"S. J.Andriole","year":"1996","journal-title":"Managing Systems Requirements"},{"key":"jitr.2010070101-1","doi-asserted-by":"crossref","DOI":"10.4018\/978-1-59140-801-7","author":"S. J.Andriole","year":"2005","journal-title":"The 2nd Digital Revolution"},{"key":"jitr.2010070101-2","doi-asserted-by":"publisher","DOI":"10.1016\/0963-8687(92)90036-V"},{"issue":"4","key":"jitr.2010070101-3","first-page":"35","article-title":"A credibility equation for IT specialists.","volume":"38","author":"B. J.Bashein","year":"1997","journal-title":"Sloan Management Review"},{"key":"jitr.2010070101-4","doi-asserted-by":"publisher","DOI":"10.1147\/sj.321.0162"},{"key":"jitr.2010070101-5","first-page":"77","article-title":"Management by maxim: how business and IT managers can create IT infrastructures.","volume":"38","author":"M.Broadbent","year":"1997","journal-title":"Sloan Management Review"},{"key":"jitr.2010070101-6","doi-asserted-by":"publisher","DOI":"10.1287\/isre.8.2.125"},{"key":"jitr.2010070101-7","author":"A.Cullen","year":"2006","journal-title":"Creating The Strategic Plan For Today\u2019s IT"},{"key":"jitr.2010070101-8","first-page":"11","article-title":"Is your CIO adding value?","volume":"35","author":"M. J.Earl","year":"1994","journal-title":"Sloan Management Review"},{"issue":"3","key":"jitr.2010070101-9","first-page":"9","article-title":"Core IS capabilities for exploiting information technology.","volume":"39","author":"D. F.Feeny","year":"1998","journal-title":"Sloan Management Review"},{"key":"jitr.2010070101-10","unstructured":"Gadiesh, O., & Gilbert, J. L. (2001, May). Transforming corner office strategy into frontline action."},{"issue":"5","key":"jitr.2010070101-11","first-page":"122","article-title":"Managing by wire.","volume":"71","author":"S. H.Haeckel","year":"1993","journal-title":"Harvard Business Review"},{"key":"jitr.2010070101-12","unstructured":"Harvard Business Review, 73-79."},{"key":"jitr.2010070101-13","doi-asserted-by":"publisher","DOI":"10.1147\/sj.382.0472"},{"issue":"2","key":"jitr.2010070101-14","first-page":"1","article-title":"Key Issues for IT Executives 2004.","volume":"4","author":"J. N.Luftman","year":"2005","journal-title":"MIS Quarterly Executive"},{"issue":"1","key":"jitr.2010070101-15","first-page":"43","article-title":"Eight imperatives for the new IT organization.","volume":"31","author":"J. F.Rockart","year":"1996","journal-title":"Sloan Management Review"},{"issue":"1","key":"jitr.2010070101-16","first-page":"31","article-title":"Develop long term competitiveness through IT assets.","volume":"38","author":"J. W.Ross","year":"1996","journal-title":"Sloan Management Review"},{"issue":"11","key":"jitr.2010070101-17","first-page":"84","article-title":"Six IT decisions your IT people shouldn\u2019t make.","volume":"80","author":"J. W.Ross","year":"2002","journal-title":"Harvard Business Review"},{"key":"jitr.2010070101-18","author":"P.Weil","year":"2004","journal-title":"IT Governance"},{"key":"jitr.2010070101-19","author":"P.Weil","year":"2009","journal-title":"IT Savvy"},{"issue":"3","key":"jitr.2010070101-20","first-page":"50","article-title":"Pathways to e-Business leadership: Getting from bricks to clicks.","volume":"42","author":"L. P.Willcocks","year":"2001","journal-title":"Sloan Management Review"}],"container-title":["Journal of Information Technology Research"],"original-title":[],"language":"ng","link":[{"URL":"https:\/\/www.igi-global.com\/viewtitle.aspx?TitleId=47213","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,1]],"date-time":"2022-06-01T22:11:16Z","timestamp":1654121476000},"score":1,"resource":{"primary":{"URL":"https:\/\/services.igi-global.com\/resolvedoi\/resolve.aspx?doi=10.4018\/jitr.2010070101"}},"subtitle":[""],"short-title":[],"issued":{"date-parts":[[2010,7,1]]},"references-count":21,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2010,7]]}},"URL":"https:\/\/doi.org\/10.4018\/jitr.2010070101","relation":{},"ISSN":["1938-7857","1938-7865"],"issn-type":[{"value":"1938-7857","type":"print"},{"value":"1938-7865","type":"electronic"}],"subject":[],"published":{"date-parts":[[2010,7,1]]}}}