Exploration and exploitation in the presence of network externalities : the role of power users네트워크 외부성과 기술선택

Cited 0 time in webofscience Cited 0 time in scopus
  • Hit : 445
  • Download : 0
DC FieldValueLanguage
dc.contributor.advisorLee, Je-Ho-
dc.contributor.advisor이제호-
dc.contributor.authorLee, Jong-Seok-
dc.contributor.author이종석-
dc.date.accessioned2011-12-27T04:19:39Z-
dc.date.available2011-12-27T04:19:39Z-
dc.date.issued2003-
dc.identifier.urihttp://library.kaist.ac.kr/search/detail/view.do?bibCtrlNo=181195&flag=dissertation-
dc.identifier.urihttp://hdl.handle.net/10203/53398-
dc.description학위논문(박사) - 한국과학기술원 : 경영공학전공, 2003.2, [ xii, 135 p. ]-
dc.description.abstractThis thesis examines the conditions under which exploration of a new, incompatible technology is conducive to firm growth in the presence of network externalities. In particular, this study is motivated by the divergent evolutions of the PC and the workstation markets in response to a new technology, reduced instruction set computing (RISC). Throughout the 1990s, the workstation market and the PC market followed divergent evolutionary paths in response to RISC. In the workstation market, RISC replaced CISC. Sun prospered by effectively shifting its technology base from CISC to RISC, while Digital Equipment lost its market share quickly by delaying the adoption of RISC. In contrast, Intel in the PC market has continued to prosper by making its new products compatible with the CISC architecture. Apparently, ensuring network benefits turned out to be more important than enhancing performance in the PC market. These contrasting cases raise a question: Under what circumstances should incumbents explore a new, incompatible technology? This study is to address this question by modeling the situation of two competing technologies in the presence of network externalities. The main distinctions arise in two primary aspects. First, we evaluate the viability of exploring alternative possibilities by modeling the evolution of the whole system. The supply-side dynamics matter in the discussion of the lock-in problem. Yet, little attention has been paid to this in the literature, where much of the discussion is comprised of the demand-side factor focusing mainly on network externalities. The methodological stance here is close in spirit to Nelson and Winter (1977, 1982). A benefit of this approach is that one need not assume that buyers and sellers know the future consequences of their choices. Thus far, standard economic analysis with this assumption has not been able to address how new, incompatible technologies are successfully introduced under uncertainty. Second, we clas...eng
dc.languageeng-
dc.publisher한국과학기술원-
dc.subjectTechnological Innovation-
dc.subjectNetwork Externalities-
dc.subjectRISC-
dc.subject기술혁신-
dc.subject네트워크 외부성-
dc.subjectCISC-
dc.titleExploration and exploitation in the presence of network externalities-
dc.title.alternative네트워크 외부성과 기술선택-
dc.typeThesis(Ph.D)-
dc.identifier.CNRN181195/325007-
dc.description.department한국과학기술원 : 경영공학전공, -
dc.identifier.uid000955296-
dc.contributor.localauthorLee, Je-Ho-
dc.contributor.localauthor이제호-
dc.title.subtitlethe role of power users-
Appears in Collection
KGSM-Theses_Ph.D.(박사논문)
Files in This Item
There are no files associated with this item.

qr_code

  • mendeley

    citeulike


rss_1.0 rss_2.0 atom_1.0