Title:
Acquisition and diffusion of technology innovation

dc.contributor.advisor Mitra, Sabyasachi
dc.contributor.author Ransbotham, Samuel B., III en_US
dc.contributor.committeeMember Rothaermel, Frank
dc.contributor.committeeMember Slaughter, Sandra
dc.contributor.committeeMember Narasimhan, Sridhar
dc.contributor.committeeMember Ghosal, Vivek
dc.contributor.department Management en_US
dc.date.accessioned 2009-06-08T18:43:49Z
dc.date.available 2009-06-08T18:43:49Z
dc.date.issued 2008-03-31 en_US
dc.description.abstract In the first essay, I examine value created through external acquisition of nascent technology innovation. External acquisition of new technology is a growing trend in the innovation process, particularly in high technology industries, as firms complement internal efforts with aggressive acquisition programs. Yet, despite its importance, there is little empirical research on the timing of acquisition decisions in high technology environments. I examine the impact of target age on value created for the buyer. Applying an event study methodology to technology acquisitions in the telecommunications industry from 1995 to 2001, empirical evidence supports acquiring early in the face of uncertainty. The equity markets reward the acquisition of younger companies. In sharp contrast to the first essay, the second essay examines the diffusion of negative innovations. While destruction can be creative, certainly not all destruction is creative. Some is just destruction. I examine two fundamentally different paths to information security compromise an opportunistic path and a deliberate path. Through a grounded approach using interviews, observations, and secondary data, I advance a model of the information security compromise process. Using one year of alert data from intrusion detection devices, empirical analysis provides evidence that these paths follow two distinct, but interrelated diffusion patterns. Although distinct, I find empirical evidence that these paths both converge and escalate. Beyond the specific findings in the Internet security context, the study leads to a richer understanding of the diffusion of negative technological innovation. In the third essay, I build on the second essay by examining the effectiveness of reward-based mechanisms in restricting the diffusion of negative innovations. Concerns have been raised that reward-based private infomediaries introduce information leakage which decreases social welfare. Using two years of alert data, I find evidence of their effectiveness despite any leakage which may be occurring. While reward-based disclosures are just as likely to be exploited as non-reward-baed disclosures, exploits from reward-based disclosures are less likely to occur in the first week after disclosure. Further the overall volume of alerts is reduced. This research helps determine the effectiveness of reward mechanisms and provides guidance for security policy makers. en_US
dc.description.degree Ph.D. en_US
dc.identifier.uri http://hdl.handle.net/1853/28094
dc.publisher Georgia Institute of Technology en_US
dc.subject Security en_US
dc.subject Innovation en_US
dc.subject.lcsh Technological innovations
dc.subject.lcsh Diffusion of innovations
dc.subject.lcsh Malware (Computer software)
dc.subject.lcsh Commercial crimes
dc.subject.lcsh Computer networks Security measures
dc.title Acquisition and diffusion of technology innovation en_US
dc.type Text
dc.type.genre Dissertation
dspace.entity.type Publication
local.contributor.advisor Mitra, Sabyasachi
local.contributor.corporatename Scheller College of Business
relation.isAdvisorOfPublication 4f379214-85fc-4835-a5ea-ef6822a43306
relation.isOrgUnitOfPublication a2f83831-ae41-4d65-82ff-c8bf95db4ffb
Files
Original bundle
Now showing 1 - 1 of 1
Thumbnail Image
Name:
ransbotham_samuel_b_200805_phd.pdf
Size:
751.38 KB
Format:
Adobe Portable Document Format
Description: