In this paper we study how the existence of a functioning market for technology differentially conditions the entry strategy and survival of different types of entrants, and the role of scale, marketing ability and technical assets using the context of the Information Security Market (ISM). Markets for technology facilitate entry of firms that lack proprietary technology and increase vertical specialization. However, they also increase the relative advantage of downstream capabilities, which is reflected in the relatively improved performance of incumbent Information and Communication Technologies (ICT) firms compared to startups. We find that diversifying entrants perform better relative to startups. Contrary to earlier studies, we find th...
Why do firms become different as they grow over time? This thesis seeks to answer this question by l...
This article examines the entry into and survival in the U.S. software market by a sample of firms b...
This paper researches the information security value in e-entrepreneurship by revising the literatur...
My dissertation makes use of a unique dataset of the Information Security Market (ISM) to advance ou...
The paper analyses the birth of the encryption software industry (ESI), a new niche in the software ...
The paper analyses the birth of the Encryption Software Industry (ESI), a new niche in the software ...
he paper analyses the birth of the encryption software industry (ESI), a new niche in the software i...
This paper seeks to explore the drivers of startups' survival in turbulent industries, characterized...
Recent scholarship on entrepreneurship suggests that the pre-entry know-how of start-ups, embodied i...
The Information Technology industry is characterized by constant technological changes, fast clock s...
This paper seeks to explore the drivers of survival in environments characterized by high rates of e...
This paper seeks to explore the drivers of survival in environments characterized by high rates of e...
This paper seeks to explore the drivers of startups ’ survival in turbulent industries, characterize...
Recent scholarship on entrepreneurship suggests that the pre-entry know-how and experience of new en...
The aim of this paper is to explore how the survival likelihood of innovative entrants in highly dyn...
Why do firms become different as they grow over time? This thesis seeks to answer this question by l...
This article examines the entry into and survival in the U.S. software market by a sample of firms b...
This paper researches the information security value in e-entrepreneurship by revising the literatur...
My dissertation makes use of a unique dataset of the Information Security Market (ISM) to advance ou...
The paper analyses the birth of the encryption software industry (ESI), a new niche in the software ...
The paper analyses the birth of the Encryption Software Industry (ESI), a new niche in the software ...
he paper analyses the birth of the encryption software industry (ESI), a new niche in the software i...
This paper seeks to explore the drivers of startups' survival in turbulent industries, characterized...
Recent scholarship on entrepreneurship suggests that the pre-entry know-how of start-ups, embodied i...
The Information Technology industry is characterized by constant technological changes, fast clock s...
This paper seeks to explore the drivers of survival in environments characterized by high rates of e...
This paper seeks to explore the drivers of survival in environments characterized by high rates of e...
This paper seeks to explore the drivers of startups ’ survival in turbulent industries, characterize...
Recent scholarship on entrepreneurship suggests that the pre-entry know-how and experience of new en...
The aim of this paper is to explore how the survival likelihood of innovative entrants in highly dyn...
Why do firms become different as they grow over time? This thesis seeks to answer this question by l...
This article examines the entry into and survival in the U.S. software market by a sample of firms b...
This paper researches the information security value in e-entrepreneurship by revising the literatur...