The effect of cloud-based IT architecture on IT exploration and exploitation: Enabling role of modularity and virtuality
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Son, I. | - |
dc.contributor.author | Lee, D. | - |
dc.contributor.author | Lee, G. | - |
dc.contributor.author | Yoo, Y. | - |
dc.date.accessioned | 2021-09-02T20:18:01Z | - |
dc.date.available | 2021-09-02T20:18:01Z | - |
dc.date.created | 2021-06-17 | - |
dc.date.issued | 2018 | - |
dc.identifier.issn | 2288-5404 | - |
dc.identifier.uri | https://scholar.korea.ac.kr/handle/2021.sw.korea/80401 | - |
dc.description.abstract | In today's turbulent business landscape, a firm's ability to explore new IT capabilities and exploit current ones is essential for enabling organizational agility and achieving high organizational performance. We propose IT exploration and exploitation as two critical organizational learning processes that are essential for gaining and sustaining competitive advantages. However, it remains unclear how the emerging cloud-based IT architecture affects an organization's ability to explore and exploit its IT capabilities. We conceptualize modularity and virtuality as two critical dimensions of emerging cloud-based IT architecture and investigate how they affect IT exploration and exploitation. We test our hypotheses using data obtained from our field survey of IT managers. We find that modularity is positively associated with both exploration and exploitation whereas virtuality is positively associated with exploration, but not with exploitation. We also find that the effect of modularity on exploitation is stronger than its effect on exploration. © 2018 Asia Pacific Journal of Information Systems. | - |
dc.language | English | - |
dc.language.iso | en | - |
dc.publisher | Korean Society of Management Information Systems | - |
dc.title | The effect of cloud-based IT architecture on IT exploration and exploitation: Enabling role of modularity and virtuality | - |
dc.type | Article | - |
dc.contributor.affiliatedAuthor | Lee, D. | - |
dc.identifier.doi | 10.14329/APJIS.2018.28.4.240 | - |
dc.identifier.scopusid | 2-s2.0-85063961668 | - |
dc.identifier.bibliographicCitation | Asia Pacific Journal of Information Systems, v.28, no.4, pp.240 - 257 | - |
dc.relation.isPartOf | Asia Pacific Journal of Information Systems | - |
dc.citation.title | Asia Pacific Journal of Information Systems | - |
dc.citation.volume | 28 | - |
dc.citation.number | 4 | - |
dc.citation.startPage | 240 | - |
dc.citation.endPage | 257 | - |
dc.type.rims | ART | - |
dc.type.docType | Article | - |
dc.identifier.kciid | ART002430818 | - |
dc.description.journalClass | 1 | - |
dc.description.journalRegisteredClass | scopus | - |
dc.description.journalRegisteredClass | kci | - |
dc.subject.keywordAuthor | Cloud-based IT architecture | - |
dc.subject.keywordAuthor | IT exploitation | - |
dc.subject.keywordAuthor | IT exploration | - |
dc.subject.keywordAuthor | Modularity | - |
dc.subject.keywordAuthor | Virtuality | - |
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.
(02841) 서울특별시 성북구 안암로 14502-3290-1114
COPYRIGHT © 2021 Korea University. All Rights Reserved.
Certain data included herein are derived from the © Web of Science of Clarivate Analytics. All rights reserved.
You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.