首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 343 毫秒
1.
在技术演化进程中的技术动荡期,多种不连续性技术同时涌现,但最终只有一种新技术能够成为主导范式,其他技术则自然消亡.以前的研究强调了外部环境和随机事件在技术消亡过程中的角色,如网格外部性、顾客选择、专利施加的障碍和政府管制,等等.然而,这只是对技术消亡的部分解释.本研究对此进行了拓展,将技术消亡归因于企业可控的战略因素,认为不可控的外部因素是企业战略选择的结果,企业可以对技术选择过程进行控制.  相似文献   

2.
企业标准化战略如何与企业外部技术标准联盟网络以及内部技术能力相匹配,关系到企业能否推动主导设计形成。本文基于组态视角,利用2017年至2019年101家参与中国电动汽车标准制定企业的标准与专利数据,运用模糊集定性比较分析(fsQCA)方法,探究标准化战略与技术标准联盟网络、技术能力的匹配效应对赢得战略性新兴产业主导设计的复杂影响机制。研究结果揭示了三类赢得主导设计的驱动模式:多点联结主导型、强强联合助推型、网络寡头驱动型。本研究发现对于认识和阐释主导设计驱动路径的因果复杂性具有重要的理论与实践指导意义,也为企业如何采取合理有效的标准化战略赢得主导设计提供了新的见解。  相似文献   

3.
企业战略风险识别研究   总被引:17,自引:0,他引:17  
在对国内外有关企业战略风险研究的评介基础上,本文重新界定战略风险的内涵和特点,着重研究了企业战略风险识别过程中的风险因素和风险形成机理。分析指出了战略环境、战略资源、战略知识、战略、结构、流程六个相关的因素为企业战略风险因素,研究认为它们之间的动态不协调、不配称是企业战略风险发生的直接原因,并且构建了企业战略风险形成机理模型。  相似文献   

4.
企业技术发展战略选择的多维结构分析简介   总被引:3,自引:0,他引:3  
本研究通过对企业技术发展与其影响因素的关联分析,选择影响企业技术发展的四个重要因素(产业市场结构,产业主导技术生命周期、企业规模、企业技术能力)作为基向量构成企业多维评价结构模型,据此将企业适当分类,并建立企业技术发展战略集合。在此基础上选择十种有研究意义的企业形态,根据不同的形态企业的特征和不同企业技术发展战略的适用范围,提出不同企业形态(或处于不同发展阶段的企业)适宜的技术发展战略及战略重点。最后选择若干企业进行案例分析。  相似文献   

5.
基于青州中联水泥战略变革过程的单案例纵向研究,深入探讨了产能过剩行业的国有企业战略转型背后的主导逻辑问题。研究发现产能过剩行业的国有企业战略转型过程中存在整合式差异化主导逻辑和创新共享主导逻辑两种类型;主导逻辑具有动态演化的特征属性,快速响应机制和杠杆撬动机制驱动了整合式差异化主导逻辑的形成,创新赋能机制和多元协同机制则驱动了整合式差异化主导逻辑向创新共享主导逻辑进一步演化。最后,进一步讨论了企业战略变革过程中的主导逻辑与行业逻辑脱耦和耦合的问题,并整合"熵"的原理具体分析了脱耦与耦合的过程机制。研究结果为传统企业的战略变革提供了理论参考和实践借鉴。  相似文献   

6.
企业集群作为企业发展的方向之一,已成为政府和企业关注的焦点。在前人企业集群理论研究的基础上,对传统企业集群和高技术企业集群形成模式进行了比较研究,提出自然禀赋、政府作用、高技术企业战略和人文因素四种企业集群的成因,并对每种企业集群形成模式的特征、集群中企业的组织结构和运行模式、学习与创新机制以及不同因素对企业集群的影响作了比较,指出了我国在促进企业集群形成尤其是高技术企业集群形成应因地制宜。对企业集群模式进行现实有效的选择。  相似文献   

7.
白长虹  刘春华 《科研管理》2014,35(3):99-107
国际化发展战略是企业做强做大的必由之路,海尔和华为公司国际化战略的成功实施对中国企业国际化战略研究具有重要的现实和实践意义。扎根理论研究方法是一种科学有效的定性研究方法,以海尔和华为公司为例,以扎根理论为主导工具进行研究,得出两家公司在实施国际化战略的过程中都采取了国际化人才战略及重要的领导人影响因素的结论。从而,给予其他企业在探索国际化道路上以启发和借鉴。  相似文献   

8.
珠三角基于企业突破性创新战略的新兴产业培育途径   总被引:1,自引:0,他引:1  
企业突破性创新战略是新兴产业形成的重要基础。创新高地、卓有成效的产学研模式、创新的商业模式以及良好的产业发展环境是激励企业突破性创新活动的重要因素。珠三角可以把企业个体创新、原有产业突破以及技术突破作为新兴产业的培育途径,实施企业、制度、文化三大主导战略可以作为珠三角新兴产业的形成路线。  相似文献   

9.
基于集成管理理论的企业危机预警机制研究   总被引:2,自引:0,他引:2  
基于集成管理理论从企业发展战略角度,对企业范围内面临的各种危机因素进行了系统分析,研究建立了一种新的企业危机预警指标体系。基于人工神经网络(ANN)对企业危机预警方法进行了重新设计,并进一步研究提出了建立这种预警机制的策略组合。  相似文献   

10.
企业知识管理系统的柔性战略分析   总被引:2,自引:0,他引:2  
企业知识管理系统(EKMS)中最关键的是知识获取。如果一个企业的知识获取战略具有柔性,那么整个企业的EKMS就具有柔性。文章首先分析了EKMS柔性的制约因素:边界搜寻倾斜(marginal search)与路径依赖性(path-depen-dence);然后通过分析企业知识获取过程,指出EKMS的柔性很大程度上取决于企业的主导逻辑(Domain Logic)的柔性,它是EKMS柔性的决定因素;最后分别从柔性的四个维度研究了EKMS的柔性战略。  相似文献   

11.
This study examined how students who had no prior experience with videoconferencing would react to the use of videoconferencing as an instructional medium. Students enrolled in seven different courses completed a questionnaire at the beginning of the semester and again at the end of the semester. Students at the origination and remote sites did not differ in their reactions toward videoconferencing but there was a significant difference for gender. Women reacted less favorably to videoconferencing. Compared to the beginning of the semester, students reported significantly less positive attitudes toward taking a course through videoconferencing at the end of the semester. There were no significant differences in students' attitudes toward videoconferencing across courses at the beginning of the semester but there were significant differences across the courses at the end of the semester. The results suggest the need for better preparation for both students and instructors.  相似文献   

12.
Ajoint study by Prof. ZHANG Zhibin from the CAS Institute of Zoology and his co-workers from Norway, US and Swiss have indicated that historical outbreaks of migratory locusts in China were associated with cold spells, suggesting that China's projected climate warming could decrease the pest's numbers. The study was published in Proceedings of theNational Academy of Sciences on 17 September, 2007.  相似文献   

13.
A computer-mediated group is a complex entity whose members exchange many types of information via multiple means of communication in pursuit of goals specific to their environment. Over time, they coordinate technical features of media with locally enacted use to achieve a viable working arrangement. To explore this complex interaction, a case study is presented of the social networks of interactions and media use among members of a class of computer-supported distance learners. Results show how group structures associated with project teams dominated who communicated with whom, about what, and via which media over the term, and how media came to occupy their own communication niches: Webboard for diffuse class-wide communication; Internet Relay Chat more to named others but still for general communication across the class; and e-mail primarily for intrateam communication. Face-to-face interaction, occurring only during a short on-campus session, appears to have had a catalytic effect on social and emotional exchanges. Results suggest the need to structure exchanges to balance class-wide sharing of ideas with subgroup interactions that facilitate project completion, and to provide media that support these two modes of interaction.  相似文献   

14.
CAS should stick to the principle of rendering service to, and giving impetus for, the development of China's science enterprise by making S&T innovations, said CAS President LU Yongxiang. The CAS president made the remarks in a recent talk to communicate the gist of the winter session of the Party's Leading-member Group at CAS, which was held from 7 to 11 January in Beijing.  相似文献   

15.
With great care, Dr. ZHOU Zhonghe takes out a package wrapped by cotton tissue from a drawer and says: "This is the gem of our collections: the fossil of a bird that lived 125 million years ago!" Then, pointing at a tiny mound, he explains: "Look, this is the claw and that is the head. It was in the egg shell and ready to hatch ... The species fell into a family of waterside inhabitants."  相似文献   

16.
Electronic data interchange (EDI) provides means for interorganizational communication, creates network externalities, requires an advanced information technology (IT) infrastructure, and relies on standards. In the diffusion of such innovations, institutional involvement is imperative. Such institutions contain governmental agencies, national and global standardization organizations, local government, and nonprofit private organizations like industry associations. The last type of organizations we call intermediating institutions. They intermediate or coordinate ("inscribe") the activities of a group of would-be adopters. Unfortunately, little is known of how these organizations shape the EDI diffusion trajectory. In this article we examine one specific type of intermediating organizations?industry associations?and how they advanced the EDI diffusion process in the grocery sectors of Hong Kong, Denmark and Finland. We identify six institutional measures, placed into a matrix formed by the mode of involvement (influence vs. regulation) and the type of diffusion force (supply push vs. demand pull), that can be mobilized to further the EDI diffusion. Industry associations were found to be active users of all these measures to varying degrees. Their role was critical especially in knowledge building, knowledge deployment, and standard setting. Furthermore, institutional involvement varied due to policy and cultural contingencies and power dependencies.  相似文献   

17.
The increasing prospects of digital piracy has prompted the perceived need by electronic publishers to adopt technical systems of protection, and governments to reform their copyright laws. This article is a preliminary study of the management of intellectual property by electronic publishers, defined as those involved in the production of online databases, and CD-ROMs. It focuses on three main issues: (1) how electronic publishers view the increasing threat of piracy; (2) the methods of protection employed to protect intellectual property in digital format; and (3) the importance of technological protection of intellectual property in electronic publications. The analysis is based on a sample of 23 UK electronic publishers. The interviews revealed an interesting assortment of protection methods and did not show that technological protection was a preferred way. Instead, the means of protection, in addition to copyright law, comprised niche markets, pricing, trust, bad publicity, and nontechnical and technical means.  相似文献   

18.
Long-standing conflict between domain name registrants and trademark holders prompted the Internet Corporation for Assigned Names and Numbers (ICANN) to create a global, mandatory arbitration procedure known as the Uniform Dispute Resolution Policy (UDRP). The UDRP has been used in 2166 cases involving 3938 domain names as of 1 November 2000. The policy gives the initiator of a complaint, generally a trademark holder, the right to choose which ICANN-accredited dispute resolution service provider (RSP) will handle the case. During the preparation of the UDRP,some feared that complainant selection would lead to "forum shopping" that might bias the results. This article performs a statistical assessment of the forum-shopping thesis and finds support for it. There are statistically significant differences in the various RSPs' propensity to take away names from defendants; there are also major differences in the number of cases brought to each RSP. RSPs who take away names have the larger share of cases. The study examines other variables that might explain differences in market share, such as price, the plaintiff's nationality, or the time taken to decide a case. It finds that nationality and time also are correlated with market share. The study concludes that shopping for a favorable outcome is an important factor in the UDRP.  相似文献   

19.
Prof. Raymond C.K. Chen, a neuropsychologist with the CAS Institute of Psychology, has made novel progress in his studies of schizophrenia. His work has been reported by a recent issue of Behavioural Neurology.  相似文献   

20.
The main premise of this article is that in information societies generally, and in virtual social contexts particularly, a distinctive style of interaction to facilitate the communication of difference, heterotopic communication , has emerged. It rests on two cultural foundations: an ideological belief in the positive, socially integrating power of communication, and a prevailing ethic of instrumental rationality, subjective individualism, and strategically practiced self-interest. The former is demonstrated by the use of simulation and spectacle as sources of information; exhibitionism/voyeurism as a communicative style; and the awareness of surveillance. The latter is seen in the competitive use of knowledge as a commodity; a surface globalism masking deep parochialism; lateral as well as vertical information inequity; and the use of public versus private as strategies for engagement rather than as spaces. Those who engage in heterotopic communication resort to their 'own devices' both in the sense of personal agendas, strategies, interests, and interpretations, and in the form of the telecommunication tools that help realize them. These personal and technological devices allow individuals with the right educational and technical resources to avoid exposure to disagreement, difference, or other information that does not serve their direct purposes or reflect their particular views of the world; yet they also help convey the appearance of openness, availability, and cooperation. This style of interaction is used strategically in combination with information and communication technologies to gain social or economic advantages, but it may encourage social separatism and parochialism, inhibit the negotiation of disputes, and emphasize competing interests.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号