Technology-focused Acquisitions

Technology-focused Acquisitions

Author: Jan Paul Stein

Publisher: Walter de Gruyter GmbH & Co KG

Published: 2017-07-24

Total Pages: 228

ISBN-13: 311056209X

DOWNLOAD EBOOK

Technology-focused acquisitions are an important complement to the firm’s internal product development efforts. There is considerable heterogeneity when comparing individual technology-focused acquisitions – especially with respect to acquisition timing and the deal value. To resolve some of this heterogeneity the author introduces the novel distinction between performance- and functionality-focused acquisitions. He characterizes this distinction based on a theoretical analysis, a qualitative study, and turns to a sample of acquisitions in the field of artificial intelligence for the quantitative study. There are two key findings. First, performance-focused acquisitions take place earlier in a target’s life cycle than functionality-focused ones. Second, the deal value is – at a comparable stage in a target’s life cycle – higher for performance-focused acquisitions. This thesis is relevant for management scholars and managers alike: Scholars learn about the implications of the distinction between performance- and functionality-focused acquisitions on markets for technology. Managers gain insights into how this distinction may guide their strategic decision making.


Technology-focused Acquisitions

Technology-focused Acquisitions

Author: Jan Paul Stein

Publisher: Walter de Gruyter GmbH & Co KG

Published: 2017-07-24

Total Pages: 345

ISBN-13: 3110559307

DOWNLOAD EBOOK

Technology-focused acquisitions are an important complement to the firm’s internal product development efforts. There is considerable heterogeneity when comparing individual technology-focused acquisitions – especially with respect to acquisition timing and the deal value. To resolve some of this heterogeneity the author introduces the novel distinction between performance- and functionality-focused acquisitions. He characterizes this distinction based on a theoretical analysis, a qualitative study, and turns to a sample of acquisitions in the field of artificial intelligence for the quantitative study. There are two key findings. First, performance-focused acquisitions take place earlier in a target’s life cycle than functionality-focused ones. Second, the deal value is – at a comparable stage in a target’s life cycle – higher for performance-focused acquisitions. This thesis is relevant for management scholars and managers alike: Scholars learn about the implications of the distinction between performance- and functionality-focused acquisitions on markets for technology. Managers gain insights into how this distinction may guide their strategic decision making.


Acquisitions and Open Source Software Development

Acquisitions and Open Source Software Development

Author: Michael Vetter

Publisher: Springer Nature

Published: 2021-08-10

Total Pages: 192

ISBN-13: 3658350849

DOWNLOAD EBOOK

Participation of firms in Open Source Software (OSS) development is steadily increasing. In fact, a substantial part of OSS projects today are developed in informal collaboration between firms and a community of voluntary contributors. As more and more firms are active in OSS, acquisitions of firms active in OSS development occur increasingly often. Yet, despite the economic and practical importance of OSS, research has so far overlooked this phenomenon. This dissertation explores this phenomenon of acquisitions of firms active in OSS development. Michael Vetter examines the role of OSS in the pre-acquisition phase and the impact of acquisitions on OSS development in the post-acquisition phase. Using qualitative and quantitative research methods, the author examines acquisition motives, acquisition likelihood, timing of acquisitions, and outcomes of acquisitions and discuss mechanisms behind variations across acquisitions.The findings from the studies contribute to research on acquisitions and OSS development while also providing insights into how to leverage OSS in target search, selection and evaluation processes as well as how to effectively manage acquisitions of firms active in OSS and the communities around them.


Mergers and Acquisitions Security

Mergers and Acquisitions Security

Author: Edward Halibozek

Publisher: Elsevier

Published: 2005-05-19

Total Pages: 273

ISBN-13: 0080470653

DOWNLOAD EBOOK

In reaction to the continually changing business climate companies develop many business strategies to increase their competitiveness and improve profitability. Companies regularly reshape themselves continually exploring new markets and developing new products. When they can't expand into new markets or develop new products on their own, they seek alternatives. These alternatives include merging with or acquiring other companies to create a single more capable company. Companies acquire other companies for a wide variety of reasons. In some cases company survival may actually be the reason. What does this condition mean to the security professional? In the course of mergers and acquisitions, security plays a vital role in helping to make the endeavor successful. There are numerous titles on the business aspects of M&A such as the ones listed below. However, this unique book focuses on the role security plays in helping to make a merger, acquisition or divestiture successful. It addresses the fundamental security elements that are required to support the effort. In addition, it provides an integrated "how to" approach to implementing M&A security complete with methods and processes that have been quickly and cost-effectively implemented.- First book available that focuses on the role of the Security Manager in M&A - Case studies that highlight the role of the security manager; cases include both best practices as well as illustrations of nightmare examples of what NOT to do - Lead author is an expert that has participated in/managed security for more than 20 high-profile and large-scale acquisitions - Model processes, procedures, checklists, charts and sample forms all serve to ease immediate analysis and implementation in a merger or acquisition


Rapid Transformation

Rapid Transformation

Author: Behnam N. Tabrizi

Publisher: Harvard Business Press

Published: 2007

Total Pages: 338

ISBN-13: 1422118894

DOWNLOAD EBOOK

Shows you how to accomplish successful transformational change in your firm in just 90 days. Based on ten years of research into more than 500 leading companies - including 3M, IBM, GE, Nissan, Apple, Bay Networks, Verisign, HP and Best Buy - this book demystifies fast, effective change and lays out a roadmap for achieving it.


Research Handbook of Entrepreneurial Exit

Research Handbook of Entrepreneurial Exit

Author: Dawn R. DeTienne

Publisher: Edward Elgar Publishing

Published: 2015-02-27

Total Pages: 286

ISBN-13: 1782546979

DOWNLOAD EBOOK

With contributions from authors around the globe, Research Handbook of Entrepreneurial Exit explores this most important phenomenon in the entrepreneurial journey. This book presents a comprehensive review of the current issues in entrepreneurial exits


Mergers and Acquisitions

Mergers and Acquisitions

Author: David R. King

Publisher: Routledge

Published: 2018-10-30

Total Pages: 158

ISBN-13: 042989080X

DOWNLOAD EBOOK

The process of identifying and evaluating a target firm, completing a deal after its negotiation and announcement, and then integrating a target firm after legal combination is a multi-year process with uncertain returns to acquiring firms. Research on mergers and acquisitions (M&As) is progressing rapidly yet it remains fragmented across multiple research perspectives that largely examine different acquisition phases separately and coincide with a focus on different research variables. As a result, research fragmentation means that a researcher in one area may be unaware of research from related areas that is likely relevant. This contributes to research silos with M&A research displaying different traditions, starting points, and assumptions. Mergers and Acquisitions: A Research Overview summarizes the frontier in M&A research and provides insights into where it can be expanded. It undertakes the needed integration and reconciliation of research in order to derive practical knowledge for managing acquisitions from beginning to end, providing a summary of what is known and its implications for future research. This concise overview reconciles and integrates the state of the art in our understanding of mergers and acquisitions, providing an essential first stopping point in the research journey of students and scholars working in this area.


Artificial Intelligence and Data Mining for Mergers and Acquisitions

Artificial Intelligence and Data Mining for Mergers and Acquisitions

Author: Debasis Chanda

Publisher: CRC Press

Published: 2021-03-18

Total Pages: 263

ISBN-13: 0429755406

DOWNLOAD EBOOK

The goal of this book is to present a modeling framework for the Virtual Organization that is focused on process composition. This framework uses Predicate Calculus Knowledge Bases. Petri Net-based modeling is also discussed. In this context, a Data Mining model is proposed, using a fuzzy mathematical approach, aiming to discover knowledge. A Knowledge-Based framework has been proposed in order to present an all-inclusive knowledge store for static and dynamic properties. Toward this direction, a Knowledge Base is created, and inferences are arrived at. This book features an advisory tool for Mergers and Acquisitions of Organizations using the Fuzzy Data Mining Framework and highlights the novelty of a Knowledge-Based Service-Oriented Architecture approach and development of an Enterprise Architectural model using AI that serves a wide audience. Students of Strategic Management in business schools and postgraduate programs in technology institutes seeking application areas of AI and Data Mining, as well as business/technology professionals in organizations aiming to create value through Mergers and Acquisitions and elsewhere, will benefit from the reading of this book.


Technology, Policy, Law, and Ethics Regarding U.S. Acquisition and Use of Cyberattack Capabilities

Technology, Policy, Law, and Ethics Regarding U.S. Acquisition and Use of Cyberattack Capabilities

Author: National Research Council

Publisher: National Academies Press

Published: 2009-11-27

Total Pages: 391

ISBN-13: 0309138507

DOWNLOAD EBOOK

The United States is increasingly dependent on information and information technology for both civilian and military purposes, as are many other nations. Although there is a substantial literature on the potential impact of a cyberattack on the societal infrastructure of the United States, little has been written about the use of cyberattack as an instrument of U.S. policy. Cyberattacks-actions intended to damage adversary computer systems or networks-can be used for a variety of military purposes. But they also have application to certain missions of the intelligence community, such as covert action. They may be useful for certain domestic law enforcement purposes, and some analysts believe that they might be useful for certain private sector entities who are themselves under cyberattack. This report considers all of these applications from an integrated perspective that ties together technology, policy, legal, and ethical issues. Focusing on the use of cyberattack as an instrument of U.S. national policy, Technology, Policy, Law and Ethics Regarding U.S. Acquisition and Use of Cyberattack Capabilities explores important characteristics of cyberattack. It describes the current international and domestic legal structure as it might apply to cyberattack, and considers analogies to other domains of conflict to develop relevant insights. Of special interest to the military, intelligence, law enforcement, and homeland security communities, this report is also an essential point of departure for nongovernmental researchers interested in this rarely discussed topic.