Technology Focused Acquisitions
Download Technology Focused Acquisitions full books in PDF, epub, and Kindle. Read online free Technology Focused Acquisitions ebook anywhere anytime directly on your device. Fast Download speed and no annoying ads. We cannot guarantee that every ebooks is available!
Author | : Jan Paul Stein |
Publisher | : Walter de Gruyter GmbH & Co KG |
Total Pages | : 228 |
Release | : 2017-07-24 |
Genre | : Business & Economics |
ISBN | : 311056209X |
Technology-focused acquisitions are an important complement to the firm’s internal product development efforts. There is considerable heterogeneity when comparing individual technology-focused acquisitions – especially with respect to acquisition timing and the deal value. To resolve some of this heterogeneity the author introduces the novel distinction between performance- and functionality-focused acquisitions. He characterizes this distinction based on a theoretical analysis, a qualitative study, and turns to a sample of acquisitions in the field of artificial intelligence for the quantitative study. There are two key findings. First, performance-focused acquisitions take place earlier in a target’s life cycle than functionality-focused ones. Second, the deal value is – at a comparable stage in a target’s life cycle – higher for performance-focused acquisitions. This thesis is relevant for management scholars and managers alike: Scholars learn about the implications of the distinction between performance- and functionality-focused acquisitions on markets for technology. Managers gain insights into how this distinction may guide their strategic decision making.
Author | : Jan Paul Stein |
Publisher | : Walter de Gruyter GmbH & Co KG |
Total Pages | : 345 |
Release | : 2017-07-24 |
Genre | : Business & Economics |
ISBN | : 3110559307 |
Technology-focused acquisitions are an important complement to the firm’s internal product development efforts. There is considerable heterogeneity when comparing individual technology-focused acquisitions – especially with respect to acquisition timing and the deal value. To resolve some of this heterogeneity the author introduces the novel distinction between performance- and functionality-focused acquisitions. He characterizes this distinction based on a theoretical analysis, a qualitative study, and turns to a sample of acquisitions in the field of artificial intelligence for the quantitative study. There are two key findings. First, performance-focused acquisitions take place earlier in a target’s life cycle than functionality-focused ones. Second, the deal value is – at a comparable stage in a target’s life cycle – higher for performance-focused acquisitions. This thesis is relevant for management scholars and managers alike: Scholars learn about the implications of the distinction between performance- and functionality-focused acquisitions on markets for technology. Managers gain insights into how this distinction may guide their strategic decision making.
Author | : Michael Vetter |
Publisher | : Springer Nature |
Total Pages | : 192 |
Release | : 2021-08-10 |
Genre | : Business & Economics |
ISBN | : 3658350849 |
Participation of firms in Open Source Software (OSS) development is steadily increasing. In fact, a substantial part of OSS projects today are developed in informal collaboration between firms and a community of voluntary contributors. As more and more firms are active in OSS, acquisitions of firms active in OSS development occur increasingly often. Yet, despite the economic and practical importance of OSS, research has so far overlooked this phenomenon. This dissertation explores this phenomenon of acquisitions of firms active in OSS development. Michael Vetter examines the role of OSS in the pre-acquisition phase and the impact of acquisitions on OSS development in the post-acquisition phase. Using qualitative and quantitative research methods, the author examines acquisition motives, acquisition likelihood, timing of acquisitions, and outcomes of acquisitions and discuss mechanisms behind variations across acquisitions.The findings from the studies contribute to research on acquisitions and OSS development while also providing insights into how to leverage OSS in target search, selection and evaluation processes as well as how to effectively manage acquisitions of firms active in OSS and the communities around them.
Author | : Letizia Mortara |
Publisher | : |
Total Pages | : 55 |
Release | : 2012 |
Genre | : Research, Industrial |
ISBN | : 9781902546391 |
Author | : Edward Halibozek |
Publisher | : Elsevier |
Total Pages | : 273 |
Release | : 2005-05-19 |
Genre | : Business & Economics |
ISBN | : 0080470653 |
In reaction to the continually changing business climate companies develop many business strategies to increase their competitiveness and improve profitability. Companies regularly reshape themselves continually exploring new markets and developing new products. When they can't expand into new markets or develop new products on their own, they seek alternatives. These alternatives include merging with or acquiring other companies to create a single more capable company. Companies acquire other companies for a wide variety of reasons. In some cases company survival may actually be the reason. What does this condition mean to the security professional? In the course of mergers and acquisitions, security plays a vital role in helping to make the endeavor successful. There are numerous titles on the business aspects of M&A such as the ones listed below. However, this unique book focuses on the role security plays in helping to make a merger, acquisition or divestiture successful. It addresses the fundamental security elements that are required to support the effort. In addition, it provides an integrated "how to" approach to implementing M&A security complete with methods and processes that have been quickly and cost-effectively implemented.- First book available that focuses on the role of the Security Manager in M&A - Case studies that highlight the role of the security manager; cases include both best practices as well as illustrations of nightmare examples of what NOT to do - Lead author is an expert that has participated in/managed security for more than 20 high-profile and large-scale acquisitions - Model processes, procedures, checklists, charts and sample forms all serve to ease immediate analysis and implementation in a merger or acquisition
Author | : Behnam N. Tabrizi |
Publisher | : Harvard Business Press |
Total Pages | : 338 |
Release | : 2007 |
Genre | : Business & Economics |
ISBN | : 1422118894 |
Shows you how to accomplish successful transformational change in your firm in just 90 days. Based on ten years of research into more than 500 leading companies - including 3M, IBM, GE, Nissan, Apple, Bay Networks, Verisign, HP and Best Buy - this book demystifies fast, effective change and lays out a roadmap for achieving it.
Author | : B. Kumar |
Publisher | : Springer |
Total Pages | : 151 |
Release | : 2012-11-14 |
Genre | : Business & Economics |
ISBN | : 1137005904 |
A casebook that discusses all the mega mergers and acquisitions in terms of value, that have happened in different industry sectors such as pharmacy, technology, telecommunications, media and entertainment, electrical and electronics, energy, finance, consumer goods, metals, and automobile and airlines.
Author | : David R. King |
Publisher | : Routledge |
Total Pages | : 158 |
Release | : 2018-10-30 |
Genre | : Business & Economics |
ISBN | : 042989080X |
The process of identifying and evaluating a target firm, completing a deal after its negotiation and announcement, and then integrating a target firm after legal combination is a multi-year process with uncertain returns to acquiring firms. Research on mergers and acquisitions (M&As) is progressing rapidly yet it remains fragmented across multiple research perspectives that largely examine different acquisition phases separately and coincide with a focus on different research variables. As a result, research fragmentation means that a researcher in one area may be unaware of research from related areas that is likely relevant. This contributes to research silos with M&A research displaying different traditions, starting points, and assumptions. Mergers and Acquisitions: A Research Overview summarizes the frontier in M&A research and provides insights into where it can be expanded. It undertakes the needed integration and reconciliation of research in order to derive practical knowledge for managing acquisitions from beginning to end, providing a summary of what is known and its implications for future research. This concise overview reconciles and integrates the state of the art in our understanding of mergers and acquisitions, providing an essential first stopping point in the research journey of students and scholars working in this area.
Author | : Dawn R. DeTienne |
Publisher | : Edward Elgar Publishing |
Total Pages | : 286 |
Release | : 2015-02-27 |
Genre | : Business & Economics |
ISBN | : 1782546979 |
With contributions from authors around the globe, Research Handbook of Entrepreneurial Exit explores this most important phenomenon in the entrepreneurial journey. This book presents a comprehensive review of the current issues in entrepreneurial exits
Author | : National Research Council |
Publisher | : National Academies Press |
Total Pages | : 391 |
Release | : 2009-11-27 |
Genre | : Technology & Engineering |
ISBN | : 0309138507 |
The United States is increasingly dependent on information and information technology for both civilian and military purposes, as are many other nations. Although there is a substantial literature on the potential impact of a cyberattack on the societal infrastructure of the United States, little has been written about the use of cyberattack as an instrument of U.S. policy. Cyberattacks-actions intended to damage adversary computer systems or networks-can be used for a variety of military purposes. But they also have application to certain missions of the intelligence community, such as covert action. They may be useful for certain domestic law enforcement purposes, and some analysts believe that they might be useful for certain private sector entities who are themselves under cyberattack. This report considers all of these applications from an integrated perspective that ties together technology, policy, legal, and ethical issues. Focusing on the use of cyberattack as an instrument of U.S. national policy, Technology, Policy, Law and Ethics Regarding U.S. Acquisition and Use of Cyberattack Capabilities explores important characteristics of cyberattack. It describes the current international and domestic legal structure as it might apply to cyberattack, and considers analogies to other domains of conflict to develop relevant insights. Of special interest to the military, intelligence, law enforcement, and homeland security communities, this report is also an essential point of departure for nongovernmental researchers interested in this rarely discussed topic.