DC Field | Value | Language |
---|---|---|
dc.contributor.author | Lee, Jongseok | ko |
dc.contributor.author | Lee, Jeho | ko |
dc.contributor.author | Lee, Habin | ko |
dc.date.accessioned | 2008-05-07T02:14:12Z | - |
dc.date.available | 2008-05-07T02:14:12Z | - |
dc.date.created | 2012-02-06 | - |
dc.date.created | 2012-02-06 | - |
dc.date.issued | 2003-04 | - |
dc.identifier.citation | MANAGEMENT SCIENCE, v.49, no.4, pp.553 - 570 | - |
dc.identifier.issn | 0025-1909 | - |
dc.identifier.uri | http://hdl.handle.net/10203/4395 | - |
dc.description.abstract | This paper examines the conditions under which exploration of a new, incompatible technology is conducive to firm growth in the presence of network externalities. In particular, this study is motivated by the divergent evolutions of the PC and the workstation markets in response to a new technology: reduced instruction set computing (RISC). In the PC market, Intel has developed new microprocessors by maintaining compatibility with the established architecture, whereas it was radically replaced by RISC in the workstation market. History indicates that unlike the PC market, the workstation market consisted of a large number of power users, who are less sensitive to compatibility than ordinary users. Our numerical analysis indicates that the exploration of a new, incompatible technology is more likely to increase the chance of firm growth when there are a substantial number of power users or when a new technology is introduced before an established technology takes off. | - |
dc.language | English | - |
dc.language.iso | en_US | en |
dc.publisher | Informs | - |
dc.subject | LOCK-IN | - |
dc.subject | COMPATIBILITY | - |
dc.subject | INNOVATION | - |
dc.subject | MODEL | - |
dc.subject | TECHNOLOGIES | - |
dc.subject | COMPETITION | - |
dc.subject | INDUSTRY | - |
dc.subject | HISTORY | - |
dc.subject | FACES | - |
dc.title | Exploration and Exploitation in the Presence of Network Externalities | - |
dc.type | Article | - |
dc.identifier.wosid | 000182677200015 | - |
dc.identifier.scopusid | 2-s2.0-0043205025 | - |
dc.type.rims | ART | - |
dc.citation.volume | 49 | - |
dc.citation.issue | 4 | - |
dc.citation.beginningpage | 553 | - |
dc.citation.endingpage | 570 | - |
dc.citation.publicationname | MANAGEMENT SCIENCE | - |
dc.embargo.liftdate | 9999-12-31 | - |
dc.embargo.terms | 9999-12-31 | - |
dc.contributor.localauthor | Lee, Jeho | - |
dc.contributor.nonIdAuthor | Lee, Jongseok | - |
dc.contributor.nonIdAuthor | Lee, Habin | - |
dc.type.journalArticle | Article | - |
dc.subject.keywordAuthor | network externalities | - |
dc.subject.keywordAuthor | exploration and exploitation | - |
dc.subject.keywordAuthor | innovation | - |
dc.subject.keywordAuthor | technology | - |
dc.subject.keywordPlus | LOCK-IN | - |
dc.subject.keywordPlus | COMPATIBILITY | - |
dc.subject.keywordPlus | INNOVATION | - |
dc.subject.keywordPlus | MODEL | - |
dc.subject.keywordPlus | TECHNOLOGIES | - |
dc.subject.keywordPlus | COMPETITION | - |
dc.subject.keywordPlus | INDUSTRY | - |
dc.subject.keywordPlus | HISTORY | - |
dc.subject.keywordPlus | FACES | - |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.