2,293 research outputs found

    Exploring the Growing Fluidity of Organizational Boundaries with a Value-Creating Perspective

    Get PDF
    In the era of sharing economy, to get great economic and business value from cloud services, including cost avoidance, cost savings, rapid deployment, scalability, management simplicity, better security and resiliency, the organization transformational flexibility is becoming the core business strategies. As an organization responds to the emergence of digitalization, this study presents four sharing economy models by comparing the sharing economy platforms, then examined a few notable papers that have helped set the stage for current conceptualization, especially concerning the impact of innovative sharing technologies on the organizational boundaries and business value chain system. Finally, the results reconstructed traditional value chains with three stages, including redeploying slack resources, inter collaboration, and value-creating acquisitions. And the finding is that structures digitalization processes through the lens of organizational with cloud service and edge computing. The objective of this article is to advance our understanding of the impact of innovative sharing technologies on the organizational boundaries and business value chain system

    Message from SIM

    Get PDF

    Technological-Integration Challenges – The Case of Digital-Technology Companies

    Get PDF
    This research examines the technology-related integration challenges to acquisitions in digital industries and how these challenges can be managed. Historically, companies seeking to increase markets, products or customers have utilized the strategic growth process of mergers and acquisitions. Their motivation was primarily to utilize economies of scale and operational synergies to integrate acquisition targets that were similar in product, market, and customer demographics. The aim of these acquisitions was to scale the acquisition products to its own markets and customers while potentially gaining new markets and customers in the process. For companies in the digital-technology industry, the path to growth in these fast-paced markets is through the acquisition of innovation-based technologies from new and emerging companies to complement their current R&D strategies. The incumbent enterprises look for emerging technology companies as acquisition targets in order to stay ahead of the increasingly fast technology-development lifecycle. The acquisition and integration process for these types of companies present challenges to practitioners that are very different from what has been experienced in the past and will present new research opportunities for scholars researching the related domains

    The Development of Information Assurance and Cyber Security Competencies

    Get PDF
    Information assurance and cybersecurity has become a critical element in the daily lives of almost every individual and organization across the globe. To be able to protect Personal Identity Information (PII), Intellectual Property (IP) and organizational trademarks requires producing more cybersecurity practitioners. The problem being addressed by this study is the identification of comprehensive competency levels for information assurance and cybersecurity practitioners is unknown. This research created definitions for three levels of cybersecurity practitioners that can be utilized by government, industry and academia individuals and organizations. 14 core competencies for cybersecurity practitioners were identified and defined. The Qualtrics survey was distributed through email by sending a link to survey participants. To obtain the opinions of the government the survey was distributed to the United States Army Information Technology and Security community and the Department of Homeland Security (DHS) Office of Technology. To gain insight from the academia community the survey was distributed to the Purdue community and affiliates of the Center for Education and Research in Information Assurance and Security (CERIAS) and the Department of Computer and Information Technology. For input from the industry the following Information Assurance and Security departments of the following companies received the survey: Lockheed Martin Cybersecurity, Cook Medical, RSA Security, LLC., Dell, Cisco, SAP Software Solutions, and Business Applications and Technology. The data was analyzed using SPSS a statistical software package available to Purdue faculty, staff, and students. Overall there were 61 government participants, 27 industry participants, and 13 academia participants. The one-way ANOVA test for all the government, industry and academia practitioners yielded many significant findings. Some of the most important competencies that spanned across all affiliations and levels were Access Control and Incident Management and Response. This research aimed to identify a broad list of competencies that could be used to design training, curriculum, and certification courses for cybersecurity practitioners

    The Internet's Effects on Global Production Networks: Challenges and Opportunities for Managing in Developing Asia

    Get PDF
    Placing global production networks (GPN) on the Internet poses a fundamental challenge, but also creates new opportunities for managing in Developing Asia. Network flagships can now select best-performing suppliers on a global scale, increasing the pressure on Asian suppliers. But the transition form EDI to the Internet may also provide new opportunities for Asian suppliers, by reducing barriers to network entry, and by enhancing knowledge diffusion. A conceptual framework is introduced to assess how the Internet reshapes business organization and GPN. That framework is applied to one of the role models of managing in Asia, Taiwan's Acer Group. The paper highlights a vicious circle that must be broken to reap the benefits of the Internet: Asian firms must reduce a huge efficiency gap between manufacturing and the management of supporting digital information systems (DIS). The challenge is to embrace the Internet as flexible infrastructures that support not only information exchange, but also knowledge sharing, creation and utilization. The Internet facilities this task: it provides new opportunities for the outsourcing of mission-critical support services.

    Developing Acquisition IS Integration Capabilities: The Learning Processes of Novice Acquirers

    Get PDF
    Existing theory suggests that to successfully integrate information systems post-acquisition, an acquiring company must leverage two capabilities; diagnosis and integration execution. This paper seeks to understand how an inexperienced acquirer can develop these capabilities in anticipation of an acquisition. It uses a case study to understand the learning processes a novice acquirer engages in as they develop them. It finds the novice acquirer, applies trial and error, experimental, and vicarious learning processes, while actively avoiding improvisational learning. The results of the study contribute to the existing acquisition IS integration literature by specifically addressing the limited understanding of how novice acquirers can learn the required IS integration capabilities

    Late Innovation Strategies in Asian Electronics Industries: A Conceptual Framework and Illustrative Evidence

    Get PDF
    This paper was published in Oxford Development Studies special issue in honor of the late Professor Linsu Kim. The paper reviews evidence on the evolution of electronics design in Asia's leading electronics exporting countries, to establish what capabilities have been developed, and to shed light on the forces that are driving "late innovation" strategies. It also reviews intellectual sources that can be used to theoretically ground these hypotheses. Using a well-known taxonomy of innovation that distinguishes incremental, modular, architectural and radical innovations, and the concept of "disruptive technologies", I argue that Asian firms may have realistic chances to engage in incremental innovations as well as in architectural innovations. However, to sustain "late innovation" strategies over a longer period, "complex system integration" capabilities are necessary to provide the missing link.
    • …
    corecore