Open Access System for Information Sharing

Login Library

 

Thesis
Cited 0 time in webofscience Cited 0 time in scopus
Metadata Downloads
Full metadata record
Files in This Item:
There are no files associated with this item.
DC FieldValueLanguage
dc.contributor.author이강하en_US
dc.date.accessioned2014-12-01T11:46:07Z-
dc.date.available2014-12-01T11:46:07Z-
dc.date.issued2010en_US
dc.identifier.otherOAK-2014-00007en_US
dc.identifier.urihttp://postech.dcollection.net/jsp/common/DcLoOrgPer.jsp?sItemId=000000538675en_US
dc.identifier.urihttps://oasis.postech.ac.kr/handle/2014.oak/509-
dc.descriptionMasteren_US
dc.description.abstractSince key technologies have become one of the core competencies in enterprises, a variety of technology strategies have appeared. However during the technology exploitation strategy process, companies often have to deal with practical problem. The problem lies in identifying which capabilities need to be concentrated upon to gain a future competitive advantage. Because of rapid changes to business environments, the most valuable and necessary capabilities for companies are also changing. Therefore, companies should anticipate the evolution of environment and optimize the balance between the demands of the environment and the organization’s capabilities. This paper suggests a methodology to identify the most important future events and to extract the key capabilities needed in a future environment for technology exploitation.It can help investment decision to develop capabilities according to the priority of capabilities and select the appropriate alternative for technology exploitation. In the case study, this methodology was applied to identify the most important events and extract the key capabilities of a company for smart grid technology exploitation.en_US
dc.languageengen_US
dc.publisher포항공과대학교en_US
dc.rightsBY_NC_NDen_US
dc.rights.urihttp://creativecommons.org/licenses/by-nc-nd/2.0/kren_US
dc.titleExtracting the key capabilities for technology exploitation using a joint analysis of internal and external environmentsen_US
dc.typeThesisen_US
dc.contributor.college정보통신대학원 정보통신학과en_US
dc.date.degree2010- 2en_US
dc.type.docTypeThesis-

qr_code

  • mendeley

Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.

Views & Downloads

Browse