ISSN 2521-4306
HOME  | CHINESE
Article Search
Recommended Articles
Feature Articles

 

 

HOME Article SearchSearch
Journal of Management and Business Research, 2011
28( 3 ):219-246
DOI: 10.6504/JOM.2011.28.03.01
Title
The Exploration and Exploitation of Technologies in between of the Core and the Periphery-Insurance Business Method Patents
Author
Abstract
There are many conversations and practices regarding to the core and periphery in the real life. We are curiously whether there exists a phenomenon of “core” and “periphery” in technological development and its governance problems? This study is based on the network perspective and techniques of social network analysis to explore the technological phenomenon during the period of technological development. Two of our key findings in technological implication are as follows: first, in technological network the “core” position with “highly dense” structure can generate an effect of “network closure”, and to facilitate the knowledge sharing and deeper understanding. The innovation approach is toward “exploitation”. On the contrary, the “periphery” position with “highly sparse” structure can generate an effect of “structure hole”, and to acquire new technologies or novel insight. The innovation approach is toward “exploration”. The contributions of this paper are to capture the dynamic relationship among technologies for reflecting the technological realities, and furthermore, consolidating the perspective of network structure and organizational learning to conclude the relationship between core/periphery and exploration/exploitation.
Key Words
Core/Periphery, Exploitation, Exploration, Structural Differentiation, Social Network Analysis.
DOWNLOAD
13F.-1, No.4, Sec. 1, Roosevelt Rd., Zhongzheng Dist., Taipei City 100, Taiwan TEL:(886-2) 3343-1151 FAX:(886-2) 2393-9143 email: jom@mail.management.org.tw    Copyright © 2018 by Chinese Management Association