DC Field | Value | Language |
---|---|---|
dc.contributor.advisor | Lee, Je-Ho | - |
dc.contributor.advisor | 이제호 | - |
dc.contributor.author | Lee, Jong-Seok | - |
dc.contributor.author | 이종석 | - |
dc.date.accessioned | 2011-12-27T04:19:39Z | - |
dc.date.available | 2011-12-27T04:19:39Z | - |
dc.date.issued | 2003 | - |
dc.identifier.uri | http://library.kaist.ac.kr/search/detail/view.do?bibCtrlNo=181195&flag=dissertation | - |
dc.identifier.uri | http://hdl.handle.net/10203/53398 | - |
dc.description | 학위논문(박사) - 한국과학기술원 : 경영공학전공, 2003.2, [ xii, 135 p. ] | - |
dc.description.abstract | This thesis examines the conditions under which exploration of a new, incompatible technology is conducive to firm growth in the presence of network externalities. In particular, this study is motivated by the divergent evolutions of the PC and the workstation markets in response to a new technology, reduced instruction set computing (RISC). Throughout the 1990s, the workstation market and the PC market followed divergent evolutionary paths in response to RISC. In the workstation market, RISC replaced CISC. Sun prospered by effectively shifting its technology base from CISC to RISC, while Digital Equipment lost its market share quickly by delaying the adoption of RISC. In contrast, Intel in the PC market has continued to prosper by making its new products compatible with the CISC architecture. Apparently, ensuring network benefits turned out to be more important than enhancing performance in the PC market. These contrasting cases raise a question: Under what circumstances should incumbents explore a new, incompatible technology? This study is to address this question by modeling the situation of two competing technologies in the presence of network externalities. The main distinctions arise in two primary aspects. First, we evaluate the viability of exploring alternative possibilities by modeling the evolution of the whole system. The supply-side dynamics matter in the discussion of the lock-in problem. Yet, little attention has been paid to this in the literature, where much of the discussion is comprised of the demand-side factor focusing mainly on network externalities. The methodological stance here is close in spirit to Nelson and Winter (1977, 1982). A benefit of this approach is that one need not assume that buyers and sellers know the future consequences of their choices. Thus far, standard economic analysis with this assumption has not been able to address how new, incompatible technologies are successfully introduced under uncertainty. Second, we clas... | eng |
dc.language | eng | - |
dc.publisher | 한국과학기술원 | - |
dc.subject | Technological Innovation | - |
dc.subject | Network Externalities | - |
dc.subject | RISC | - |
dc.subject | 기술혁신 | - |
dc.subject | 네트워크 외부성 | - |
dc.subject | CISC | - |
dc.title | Exploration and exploitation in the presence of network externalities | - |
dc.title.alternative | 네트워크 외부성과 기술선택 | - |
dc.type | Thesis(Ph.D) | - |
dc.identifier.CNRN | 181195/325007 | - |
dc.description.department | 한국과학기술원 : 경영공학전공, | - |
dc.identifier.uid | 000955296 | - |
dc.contributor.localauthor | Lee, Je-Ho | - |
dc.contributor.localauthor | 이제호 | - |
dc.title.subtitle | the role of power users | - |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.