M S T IT

advertisement
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
MAKING SENSE OF TECHNOLOGY TRENDS IN THE IT LANDSCAPE:
A DESIGN SCIENCE APPROACH FOR DEVELOPING CONSTRUCTS
AND METHODOLOGIES IN IT ECOSYSTEMS ANALYSIS
Gediminas Adomavicius, Jesse C. Bockstedt, Alok Gupta
Department of Information and Decision Sciences, and MIS Research Center
Carlson School of Management, University of Minnesota
Minneapolis, MN 55455
{gadomavicius; jbockstedt; agupta}@csom.umn.edu
Phone: (612) 624-8030
Robert J. Kauffman
Center for Advancing Business through Information Technology (CABIT)
W. P. Carey School of Business, Arizona State University
Tempe, AZ 85251
rkauffman@asu.edu
Phone: (480) 965-2613
Last revised: September 21, 2007
Currently Under Review at MIS Quarterly (third round)
i
3
MAKING SENSE OF TECHNOLOGY TRENDS IN THE IT LANDSCAPE:
A DESIGN SCIENCE APPROACH FOR DEVELOPING CONSTRUCTS
AND METHODOLOGIES IN IT ECOSYSTEMS ANALYSIS
4
5
6
7
8
9
10
11
12
13
14
Acknowledgments. The authors would like to thank the Digital Technology Center and the Carlson
School of Management, University of Minnesota, for providing joint financial support of this research.
Rob Kauffman thanks the MIS Research Center, the Center for Advancing Business through Information
Technologies, and the W. P. Carey Chair for partial support. The authors would also like to thank the
organizers and participants of the “Innovation and Innovation Management” mini-track at the 2006 Hawaii International Conference on System Sciences for valuable comments and discussion on an early version of this manuscript. We also thank IT experts who willingly provided their valuable time for evaluating constructs and methods developed in this research. The special issue guest co-editors, Sal March and
Veda Storey, were instrumental in helping us to develop this research. We also are indebted to the
anonymous associate editor and three reviewers, who offered useful assistance and guidance for improving the quality of our manuscript.
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
Author Biographies
1
2
Gediminas Adomavicius (gadomavicius@csom.umn.edu) is currently a Digital Technology Center Assistant Professor of Information and Decision Sciences at the Carlson School of Management, University
of Minnesota. He received his Ph.D. in Computer Science from New York University. His research has
been published in several leading Information Systems and Computer Science journals, including Information Systems Research, ACM Transactions on Information Systems, IEEE Transactions on Knowledge
and Data Engineering, INFORMS Journal on Computing, and Data Mining and Knowledge Discovery.
He received the NSF CAREER award in 2006 for his research on personalization technologies.
Jesse C. Bockstedt (jbockstedt@csom.umn.edu) is a doctoral candidate in the Information and Decision
Sciences Department at the Carlson School of Management, University of Minnesota. His research interests include digital entertainment goods, technology evolution, and the impact of new ITs on markets,
products, and consumer experiences. He has published in Communications of the ACM, International
Journal of Electronic Commerce and Information Technology and Management. He has presented at the
INFORMS Conference on Information Systems and Technology and the Hawaii International Conference
on System Sciences, where his work was nominated for the best paper award.
Alok Gupta (agupta@csom.umn.edu) is the department chair and Carlson School Professor of Information and Decision Sciences at the University of Minnesota. He received his Ph.D. in MSIS from UT Austin in 1996. His research has been published in various information systems, economics, and computer
science journals such as Management Science, ISR, MISQ, CACM, JMIS, Decision Sciences, Journal of
Economic Dynamics and Control, Computational Economics, DSS, IJEC, IEEE Internet Computing, and
JOC. He received NSF CAREER award in 2001 for his research on online auctions. He serves on the
editorial boards of ISR, JMIS and DSS and various national an international research centers.
Robert J. Kauffman (rkauffman@asu.edu) is the W.P. Carey Chair in Information Systems at the W.P.
Carey School of Business, Arizona State University, and past Director of MIS Research Center, and Professor, Information and Decision Sciences at the Carlson School of Management of the University of
Minnesota. His research interests span the economics of IS, technology adoption, competitive strategy
and technology, IT value, strategic pricing and technology, supply chain management, and theory development and empirical methods for IS research. He has won numerous research awards, including the
2006 “best research award” for modeling and strategic decision making research on embedded standards
in technology-based products from the IEEE International Society for Engineering Management. His recent article on value-at-risk in IT services was the runner-up for best paper award at the 2007 Hawaii International Conference on Systems Science. His publications appear in Management Science, Organization Science, ISR, JMIS, MISQ, Decision Sciences, and other leading journals.
ii
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
MAKING SENSE OF TECHNOLOGY TRENDS IN THE IT LANDSCAPE:
A DESIGN SCIENCE APPROACH FOR DEVELOPING CONSTRUCTS
AND METHODOLOGIES IN IT ECOSYSTEMS ANALYSIS
ABSTRACT
An important problem for firms making IT investment and development decisions is analyzing
the complex IT landscape to understand trends in IT development. The sheer number of available technologies and the complex set of relationships among them make IT landscape analysis
extremely challenging for innovators, senior managers, and policymakers. Most IT consuming
firms rely on third parties and suppliers for strategic recommendations on IT investments which
can lead to biased and generic advice. Based on the design science research paradigm, this article defines a new set of constructs and methodologies by conceptualizing an ecosystem model of
technology evolution to help practitioners address this important business problem. The objective of these artifacts are: (1) to provide a formal problem representation for the analysis of technology development trends in the IT landscape, and (2) to suggest reusable structures which ensure that the complex technological environment is considered in the analysis of technology
trends. We adopt a process theory perspective and use a combination of visual mapping and
quantification strategies to develop a new empirical method to identify patterns of technology
evolution and a state diagram-based methodology to represent evolutionary transitions over time.
We illustrate the qualitative application of our proposed constructs and methodologies using the
example of digital music technologies. We also develop an associated quantitative empirical
methodology, which is illustrated with the example of wireless networking technologies. We
evaluate the utility of our proposed constructs by conducting in-depth interviews with several IT
industry experts and demonstrating the complementarities between our proposed approach and
existing techniques for technology forecasting.
Keywords: Design science, ecosystem model, evolutionary patterns, IT landscape analysis,
management of technology, paths of influence, technology ecosystem, technology evolution.
iii
MAKING SENSE OF TECHNOLOGY TRENDS IN THE IT LANDSCAPE:
A DESIGN SCIENCE APPROACH FOR DEVELOPING CONSTRUCTS
AND METHODOLOGIES IN IT ECOSYSTEMS ANALYSIS
1
2
3
4
1. INTRODUCTION
5
6
7
The landscape of information technology (IT) is in a constant state of change. There are an
8
overwhelming number of technologies available for use by organizations and that set continu-
9
ously grows at a steady pace. Additionally, the economic scope of IT investments is typically
10
very large, which adds significant pressure in the IT investment and development decision-
11
making process. Most IT managers indicate that it is difficult, if not impossible, to accurately
12
forecast advances and trends in IT. Nevertheless, senior managers need to understand the nature
13
of technological change and be able to accurately interpret the IT landscape 1 to position their
14
firms’ high-value technology investments and to achieve success with emerging market opportu-
15
nities.
16
Through interviews with IT industry experts we have learned much about how firms analyze
17
the IT landscape. We have found that this analysis and the IT strategic decision-making process
18
itself are often outsourced to third parties.
19
20
21
“It's kind of a funny thing. In IT it's okay to outsource your future decision-making, but with the business
you would never do that...[Companies] outsource their IT decision making just because it's so complicated.” -- VP of Global IT Infrastructure at a Fortune 500 company.
22
The difficulty of making these decisions typically requires skills and expertise beyond the capa-
23
bilities of most firms. As a result, many firms rely on reports produced by consulting companies
24
such as Gartner, Forrester, and IDC, and advice provided by their existing IT partners and sup-
1
Throughout the paper we use the terms IT landscape and IT ecosystem quite often. IT landscape is commonly
used by practitioners to describe the overall IT environment. IT ecosystem is a term that we operationally define as
the IT landscape centered around a specific set of technologies in a specific context that is the subject of analysis
using the methods and artifacts that we will shortly propose.
1
1
pliers. We recognize that such input can be helpful in the decision-making process; however,
2
our in-depth discussions with experts, whom we interviewed, identified two key concerns. First,
3
advice provided by existing partners and suppliers is often biased; existing suppliers have an in-
4
centive to encourage firms to continue their investment. Second, reports produced by third par-
5
ties are usually too general and often lack formal analysis of the IT landscape, relying primarily
6
on expert opinion and simple extrapolations to make recommendations.
7
8
9
10
“The main challenge is the dynamic nature of the whole rapidly changing IT environment...what we need
are more formal frameworks and tools to help see more clearly the current and potential future technology
landscapes. There is definitely room for improvement in developing these types of tools for managers.” -Senior Academic Researcher and IT Industry Consultant
11
To address these problems, we propose a new theory-based conceptual approach, a set of
12
new constructs, and a novel methodology for formally analyzing the IT landscape and identify-
13
ing trends in IT evolution. Adomavicius et al. (2007) proposed a new ecosystem model of tech-
14
nology evolution for understanding the dynamic and complex nature of technological evolution.
15
Building on this model, we follow a technological determinism viewpoint (Smith and Marx
16
1994) and use a process theory approach (Mohr 1982, Langley 1999) to develop a new set of
17
problem representation constructs and a novel methodology for identifying patterns of technol-
18
ogy evolution in the IT landscape. We incorporate the temporal aspect of technology evolution
19
and visually represent transitions between patterns of technology evolution over time. The goal
20
of our new approach and methodology is to complement existing techniques and provide firms
21
that make IT investment and development decisions with a more formal technique for analyzing
22
specific IT ecosystems and the interdependent relationships among the technologies they contain.
23
In developing and evaluating this new set of constructs and methodology, we adhere to the
24
principles of design science research, as outlined by Hevner et al. (2004) and March and Smith
25
(1995). Design science involves the construction of new artifacts to solve important organiza-
2
1
tional IT problems. Hevner et al. (2004) note that the definition of the IT artifact, as it applies to
2
design science, is both broader and narrower than the definitions outlined in prior literature.
3
Specifically, they include constructs, models, and methods in their definition, but do not include
4
people or elements of organizations. We present a new set of constructs, a model for represent-
5
ing relationships between ITs, and a new methodology for identifying and representing patterns
6
of technology evolution. This set of artifacts constitutes a new process for evaluating the IT
7
landscape, which is aimed to address the key business problem described earlier. This research
8
aims to explain the structure of relationships among ITs in a technology ecosystem, and to help
9
practitioners analyze the changes that occur in this structure over time. Whinston and Geng
10
(2004) argue that research that clearly impacts the IT artifact is important for furthering the IS
11
research field. As noted by Benbasat and Zmud (2003), the IS discipline includes methodologi-
12
cal practices and capabilities involved in the planning, construction, and implementation of IT
13
artifacts. This research follows in that vein by providing a new set of tools for analysts involved
14
in the IT investment and development decision-making process.
15
An important aspect of design science is the evaluation of the proposed artifacts, i.e., the util-
16
ity of the proposed artifacts must be demonstrated. To perform this evaluation we conducted in-
17
depth semi-structured interviews with a set of knowledgeable IT industry experts. These inter-
18
views were conducted to provide: (1) further understanding and motivation for the business and
19
organizational IT problem we address; (2) an evaluation of the utility of our proposed approach
20
in real-world settings; and (3) suggestions for improvements and future work. We constructed
21
structured interviews for four groups of IT industry experts to provide robustness to our utility
22
evaluation and capture differences of opinion. These groups were: IT industry senior managers
23
and executives, IT industry consultants, IT industry research staff and analysts, and senior aca-
3
1
demic researchers with expertise in the IT industry. We further demonstrated the utility of our
2
proposed approach by drawing insights from a qualitative example and quantitative empirical
3
analysis on two real-world IT ecosystems. We also provide in-depth discussion on the comple-
4
mentarities between our proposed approach and existing techniques that firms employ for evalu-
5
ating the IT landscape.
6
The remainder of the article proceeds as follows. Section 2 briefly reviews the foundations
7
of the research, and discusses sense-making from process data and the ecosystem model of tech-
8
nology evolution. Section 3 defines our analytical constructs and outlines the new problem rep-
9
resentation structure for exhibiting relationships among ITs within an ecosystem. Section 4 pro-
10
vides some examples of patterns of technology evolution, based on the constructs and model pre-
11
sented in Section 3. In Section 5, we illustrate the application of the constructs with a qualitative
12
example on the digital music industry and present a state-diagram-based visualization approach.
13
Section 6 presents a quantitative application of our constructs using a new empirical method for
14
identifying temporal changes in an IT ecosystem. The empirical method is used to analyze a
15
dataset containing over 3,000 new product certifications by the Wi-Fi Alliance (www.wi-fi.org).
16
Section 7 provides an evaluation of the utility of our proposed approach using in-depth inter-
17
views with IT industry experts. It also offers a detailed discussion of the complementarities be-
18
tween our approach and existing techniques that are used by firms and their consultants for tech-
19
nology forecasting. Section 8 provides the summary of main contributions as well as discusses
20
the limitations of our proposed approach and opportunities for future work.
21
2. CONCEPTUAL FOUNDATIONS
22
Decision-making and justification for IT investments is of strategic importance for modern firms
23
and can be difficult for even the most-seasoned and knowledgeable managers in the presence of
4
1
technology, organizational, and market complexity (Clemons and Weber 1990, Bacon 1992). An
2
important aspect of the IT investment decision-making process is analyzing the market landscape
3
to identify trends in IT development, which is often helpful for investment planning and product
4
development strategies. Formal analysis in this domain has traditionally been difficult primarily
5
due to the sheer number of available technologies and the complex inter-relationships among
6
them. Compounding this problem is the fact that practitioner knowledge of the historical drivers,
7
relationships, and patterns of technology evolution is often limited, and rarely is it well-
8
structured knowledge outside the realm of the IT forecasting and consulting firm ‘gurus.’ The
9
objective of this research is to address this problem by providing industry practitioners with a
10
new set of tools for analyzing the IT landscape. Our artifacts consist of a representation structure
11
and a set of constructs for defining a technology ecosystem, and a new methodology for identify-
12
ing trends within an ecosystem, consistent with the design science research paradigm outlined by
13
Hevner et al. (2004). We build upon existing theory related to technology evolution and IT in-
14
novation, and use a process theory approach for defining the constructs upon which we formu-
15
late and develop our tools.
16
2.1. The Process Theory Perspective for Design Science Research
17
Process theory provides the ideal theoretical lens for developing tools to analyze the IT land-
18
scape. Understanding the complex IT landscape and changes that occur within it over time re-
19
quires sensemaking (Weick 1979) of an environment that consists of many technologies and rela-
20
tionships. Process theories are concerned with explaining how outcomes evolve or develop over
21
time (Mohr 1982, Markus and Robey 1988), and, therefore, the process theory approach is a
22
proper base for developing tools for evaluating changes in the IT landscape.
5
1
The process theory approach has been used extensively in IS research, most notably as a base
2
for structuration analysis (Orlikowski and Robey 1991, Orlikowski 1993), and for modeling se-
3
quences of events (Abbot 1990, Newman and Robey 1992). In each of these cases, the process
4
theory approach was applied to inform the development of new techniques for analyzing com-
5
plex process data. Process data are difficult to analyze and manipulate because they deal mainly
6
with sequences of events, often involve multiple levels and units of analysis, vary in terms of
7
temporal precision and duration, and tend to focus on eclectic phenomena such as changing rela-
8
tionships (Langley 1999). This description matches the type of data used to analyze trends in an
9
IT landscape very well – event data (e.g., new technology introductions) consisting of multiple
10
types of technologies with differing attributes and various temporal measures. Our objective, as
11
noted earlier, is to develop tools that help practitioners understand how technologies evolve over
12
time and why they evolve in a certain way, which is also a key objective of process-data-related
13
research (Van de Ven and Huber 1990).
14
Langley (1999) outlines seven strategies for sensemaking and theorizing with process data,
15
and our current research uses a combination of two of them – the quantification strategy and the
16
visual mapping strategy – to develop its theoretical perspective and empirical methodology. The
17
quantification strategy, as exemplified by the research of Van de Ven and Poole (1990), involves
18
the systematic coding of events according to predetermined characteristics. It further involves
19
gradually reducing the complexity of the process data to a set of quantitative time series that can
20
be analyzed using empirical methods (e.g., Garud and Van de Ven 1992, Romanelli and
21
Tushman 1994). The visual mapping strategy, which can be used for the development and veri-
22
fication of theoretical ideas, involves producing graphical representations of process data to pre-
23
sent large quantities of data in relatively little space (Miles and Huberman 1994). Visual map-
6
1
pings allow simultaneous representations of a large number of dimensions and can be easily used
2
to show precedence, parallel processes, and the passage of time (Langley 1999). A diagram can
3
provide an intermediate step between raw data and theory development, and the comparison of
4
several diagrams can help researchers look for common sequences of events, patterns, and pro-
5
gressions in the data (Langley and Truax 1994). Both organization researchers (e.g., Meyer
6
1991, Meyer and Goes 1988) and decision researchers (e.g., Mintzberg et al. 1976, Pentland
7
1995) use the visual mapping strategy to develop process maps.
8
Our research combines the principles and sensemaking strategies of process theory with the
9
formal guidelines of design science research (Hevner et al. 2004) to develop new tools for mod-
10
eling and analyzing technology evolution. Our tools are designed to provide structure and a
11
means of analyzing the complex IT landscape by producing graphical representations of patterns
12
and trends. We use a quantification strategy to define a set of constructs for coding technology
13
innovation types and a methodology for empirically identifying patterns of technology evolution.
14
We also use a visual mapping strategy to represent these patterns over time, which is illustrated
15
through two examples of IT evolution. The two strategies complement each other by providing
16
theoretical and methodological underpinnings for the new artifacts that we present.
17
2.2 The Technology Ecosystem
18
A technology ecosystem view is a useful approach for representing the many technologies and
19
relationships that make up the IT landscape. Following this analogy, an IT ecosystem is com-
20
prised of a set of technologies that interact with and impact the success of one another. Hannan
21
and Freeman’s (1977 and 1989) seminal work on organizational ecology has sparked the in-
22
creased use of an ecological analogy in business and organization research. The theoretical per-
23
spective of organizational ecology is used to examine: (1) the environment in which organiza-
7
1
tions compete, and (2) the birth and death processes of firms. Strategy researchers have also
2
adopted a biological ecosystem model in the analysis of business relationships and strategic deci-
3
sion-making (Iansiti and Levien 2002, 2004). Managers and academicians are recognizing the
4
value of the ecosystem metaphor for understanding the complex network of business relation-
5
ships within and across industries (Harte et al. 2001). Most recently, IS researchers have also
6
begun to adopt an ecosystem perspective: Quaadgras (2005) used network modeling techniques
7
to define the RFID business ecosystem and forecast firm participation, Nickerson and zur
8
Muehlen (2006) analyzed Internet standards creation using a population ecology model, and
9
Funk (2007) presented a hierarchy of relationships between technologies to determine the timing
10
of dominant technology designs.
11
Although the ecosystem view is proving to be important in business and research, in most
12
cases the ecosystem perspective has been used merely as means of starting discussion. There has
13
been a lack of development of analytical tools that provide real value to practitioners based on an
14
ecological perspective. Additionally, previous research incorporating the ecosystem analogy has
15
focused primarily on industrial ecosystems and relationships between firms and organizations.
16
The current research applies the ecosystem analogy to the task of understanding the relationships
17
among technologies in the IT landscape. Two recent papers provide insights for modeling trends
18
in technology evolution using an ecosystem view. Lyytinen and Rose (2003) developed a model
19
of disruptive IT innovation that considers the interrelationships between technological innova-
20
tions at the systems development, infrastructure, and IT service levels. Considering cross-level
21
impacts of innovation is a key step in understanding the relationships between technologies as an
22
ecosystem. Adomavicius et al. (2007) developed a formal ecosystem model of technology evolu-
23
tion for the purposes of representing relationships that occur with technology changes. We build
8
1
on this model to develop a new set of constructs and methods for identifying trends in techno-
2
logical changes within an IT ecosystem.
3
The term technology ecosystem emphasizes the organic nature of technology development
4
and innovation that is often absent in standard forecasting and analytical methods. The tradi-
5
tional notion of an “ecosystem” in biological sciences describes a habitat for a variety of differ-
6
ent species that co-exist, influence each other, and are affected by various external forces. In the
7
ecosystem, the evolution of one species affects and is affected by the evolution of other species.
8
By considering the technology ecosystem as an interrelated set of technologies, a manager can
9
more successfully identify factors that may impact innovation, development, and adoption of
10
11
new technologies—and ultimately the success of the business activities that use the innovations.
The ecosystem model of technology evolution (Adomavicius et al. 2007) integrates the
12
strengths of many modeling methods and theoretical frameworks in economics, engineering, and
13
organizational theory. Three key research streams are combined to provide a comprehensive
14
conceptual model of evolution within a technology ecosystem. First, the population perspective
15
(Saviotti and Metcalfe 1984, Saviotti 1996) proposes that multiple interrelated technologies
16
should be viewed as a system or population whose characteristics and members change over
17
time. This concept of viewing technologies as an interrelated system is also supported by Dosi’s
18
technology paradigms (1982), Nelson and Winter’s technology regimes (1982), Laudan’s tech-
19
nology complexes (1984), and Sood and Tellis’ platform of innovation (2005). Second, complex
20
systems of technologies can be organized in hierarchies (Clark 1985, Rosenkopf and Nerkar
21
1999), which leads to the definition of specific roles played by technologies in the ecosystem.
22
Three levels of the hierarchy are typically considered. In particular, component-level technolo-
23
gies combine to form product-level technologies, and products are then combined to form a sys-
9
1
tem of use. Co-evolution of technologies in this model occurs both within and across levels in
2
the hierarchy (Campbell 1990, Rosenkopf and Nerkar 1999). Finally, technologies tend to fol-
3
low specific trajectories (Dosi 1982) and patterns of innovation (Sahal 1981 and 1985) through
4
the process of technology evolution. Baldwin and Clark (1997 and 2000) argue that, in the “age
5
of modularity,” specific design rules govern the common patterns of technological innovation.
6
These include the combination of two technological modules into one, or the augmentation of an
7
existing module into a new module.
8
We next build on technology ecosystem theory and use a process theory approach to develop
9
our model and constructs. We develop a means of representing the IT landscape analysis prob-
10
lem in terms of an IT ecosystem. We then present a methodology for identifying and analyzing
11
trends in technological change within an IT ecosystem over time.
12
3. MODEL AND CONSTRUCTS
13
The core of our model is a set of roles and relationships that are used to code technology innova-
14
tions and represents patterns of technological change in an ecosystem. In this section, we discuss
15
our use of theory (Gregor 2006) in support of our effort to design artifacts and define constructs
16
that provide foundations for a new visual representation and empirical approach for modeling
17
technology evolution patterns over time.
18
3.1 Roles in the Technology Ecosystem
19
The hierarchical nature of technologies within a population leads to the identification of specific
20
roles that technologies can play within the ecosystem (Adomavicius et al. 2007). By acting
21
through these roles, classes of technologies can influence each other’s evolution and develop-
22
ment through common patterns of innovation. Specifically, the three roles that technologies play
10
1
within an ecosystem are: product and application, component, and support and infrastructure, as
2
defined in Adomavicius et al. (2007).
3
The product and application role describes technologies that are built up from a set of com-
4
ponents, and are designed to perform a specific set of functions or satisfy a specific set of needs.
5
This role includes the focal technology and other technologies in direct competition with it in the
6
given context and associated with a specific application or use. By focal technology, we mean
7
the technology in which the analyst is most interested for the purpose of analysis. By a given
8
context, we are referring to some capability, use or application of the focal technology. For ex-
9
ample, in the digital music technology ecosystem, an MP3 player (a focal technology) plays a
10
product role because it is composed of several components and is designed to provide a specific
11
service to its user: storing and playing digital music files (a given context). Additionally, MP3
12
players can compete with related technologies, such as CD players and satellite radio devices.
13
The component role describes technologies that are used as components or subsystems in
14
more complex technologies. Components are necessary for the product and application role
15
technologies to perform their functions in the given context of use. For example, there are sev-
16
eral technologies that act as components for the personal computer: microprocessors, RAM
17
chips, hard disk drives, etc. Individually and in combination, these components provide different
18
functionality to the product role technologies. This is an important relationship in the ecosystem
19
because individual technologies can act as components in multiple technologies and contain
20
components themselves. Consider the hard disk drive. It acts as a component in PCs, MP3 play-
21
ers, and many other devices. However, the hard disk drive also has a set of component technolo-
22
gies itself, including DC spindle motors, actuators, and platters. So, in our approach, the as-
23
signment of technology roles and the scope of an ecosystem are based on relevance to the focal
11
1
2
technology and the specific context of analysis.
The support and infrastructure role describes technologies that work in conjunction or col-
3
laboration with (or as a peripheral to) product and application role technologies. The distinction
4
between the component role and the support and infrastructure role is that components are neces-
5
sary for the design and are part of the physical structure of another more complex technology,
6
while support and infrastructure technologies simply work in combination with other technolo-
7
gies. A key point about the support and infrastructure role is that technologies add value to the
8
technologies they support. For example, a printer is not physically necessary for the design and
9
use of a PC, but it supports the PC’s functionality, expands the PC’s system of use, and together
10
they provide additional value and services to their users.
11
3.2 Paths of Influence in the Technology Ecosystem
12
The decision to invest in or develop a new technology often requires the manager to understand
13
trends in technological change to capitalize on market opportunities. Since technologies change
14
over time, any practical model of technological evolution must consider the temporal aspects of
15
such change.
16
Technological determinism and social construction of technology are two competing theories
17
that attempt to explain the change in technology over time. Technological determinism posits
18
that technological development drives social and cultural changes (Smith and Marx 1994), while
19
social construction argues the opposite: society and culture determine technological development
20
(Bjiker et al. 1987). A related, yet slightly different debate exists in the economics and manage-
21
ment literature. Demand-side forces, such as consumer and market needs, drive technological
22
development (e.g., Adner and Levinthal 2001, Clark 1985, Malerba et al. 1999). Another per-
23
spective though is that supply-side forces, such as firm capabilities and R&D, are responsible
12
1
(e.g., Dosi 1982, Sahal 1985). Below we model technological change as relationships between
2
specific technologies over time, which closely relates to the supply-side and technology deter-
3
minism perspectives. Our model is focused on the technical forces that drive technological
4
change (Nelson 1995) and does not explicitly model external forces such as society, culture, and
5
the demand environment. We recognize that society and culture impact the development and
6
evolution of technology. However, our model is targeted towards domain experts that are aware
7
of market forces and their target audience. In addition, in most firms that are consumers of IT,
8
IT investment decisions are for internal purposes and social construction is less of a concern.
9
While our long-term goal is to incorporate these forces and develop more comprehensive set of
10
interactions, in this paper we focus on reducing technological complexity while increasing the
11
understanding of the IT landscape for the purpose of technology forecasting. For this study, we
12
conjecture that domain experts will be able to define their contexts with appropriate considera-
13
tion for market and social forces – as demonstrated by the digital music example in Section 5.
14
Boland et al. (2003) argue that understanding the information technology adoption requires
15
an integrated view of the innovation process. In particular, their work highlights the importance
16
of history and the effects of time in understanding innovation (Arthur 1989) and viewing it as a
17
continuous “path creation” process. Similarly, to represent the influence that current technolo-
18
gies have on future technologies, the technology ecosystem model of Adomavicius et al. (2007)
19
defined paths of influence, which occur within or across the component, product and application,
20
and support and infrastructure technology roles within the ecosystem.
21
Technological evolution and development is complex and can take many paths through the
22
layers within a technology ecosystem. Therefore, paths of influence are possible from any of the
23
current states to any of the future states of the technology roles within an ecosystem. For exam-
13
1
ple, the current component technologies can potentially influence the development of new prod-
2
uct technologies, representing a specific path of influence: Component Role (C) Æ Prod-
3
uct/Application Role* (P*). Here the asterisk (*) is used to indicate a future state of a technol-
4
ogy role in the ecosystem, and C, P, I are used as abbreviations for component role, product and
5
application role, and support and infrastructure role, respectively. Roles without an asterisk rep-
6
resent current states in the ecosystem.
7
Paths of influence represent the influence one technology role has on another in the evolution
8
of a set of technologies in the ecosystem. For example, the success of the DVD player has
9
helped drive the development of new DVD component technologies. These include recordable
10
DVD ROMs, multi-layer DVD ROMs, and new blue-ray and HD technologies (PÆC*). Simi-
11
larly, the evolution of infrastructure technologies can drive the development of new product
12
technologies. For example, the wide cellular phone network provides infrastructure for new
13
phone services and applications such as text messaging and picture mail (IÆP*). Paths of influ-
14
ence follow the design science paradigm (Hevner et al. 2004), as they are a set of constructs that
15
provide a problem representation structure for analyzing technological interdependencies in
16
technology evolution. Table 1 presents a 3 x 3 matrix that classifies possible paths of influence.
17
INSERT TABLE 1 ABOUT HERE
18
We have discussed the roles technologies can play in an ecosystem and the paths of influence
19
possible between technology roles. These constitute the constructs of our model, and in the next
20
section we discuss several examples of patterns of technology evolution using these constructs.
21
We derive these constructs directly from the theory developed in Adomavicius et al. (2007). We
22
develop new methodologies for analyzing technology evolution based on these constructs and
23
using strategies of sensemaking from process data. In Section 4, we use these constructs as the
14
1
basis for a visual mapping strategy that generates graphical representations of evolutionary pat-
2
terns, and in Section 5 we demonstrate this using a qualitative evaluation of the digital music
3
technology ecosystem. In Section 6, we demonstrate how these constructs can be used to de-
4
velop a quantification strategy that empirically identifies evolutionary patterns using a data set of
5
over 3,000 wireless networking technologies.
6
4. REPRESENTING PATTERNS OF TECHNOLOGY EVOLUTION
7
Sahal (1981 and 1985) defines an analytical framework for understanding patterns of technologi-
8
cal evolution. The author identifies several specific patterns, including invention, innovation,
9
and diffusion, and recognizes that technology development follows an evolutionary process.
10
Additionally, the author notes that the temporal evolution of any system that is subject to a col-
11
lection of random changes is characterized, in general, by prolonged oscillations. Therefore, the
12
existence of recurring fluctuations in innovation and technology evolution should be expected.
13
Worlton (1998) investigates the recent evolution of high-performance computing and identifies
14
patterns of technological change. He notes that technological change typically occurs in four
15
stages: invention, innovation, diffusion, and change of scale. Rosenberg (1994, p. 74) shows that
16
“technological forces exist which may lead to cyclical behavior in certain industries, where ma-
17
jor innovations come to substitute for one another sequentially in time.” Also, Baldwin and
18
Clark (1997 and 2000) argue that, due to increased modularity, specific design rules can lead to
19
predictable innovation patterns.
20
4.1 Coding and Representation
21
We next define a visual mapping strategy for representing patterns of technological change based
22
on the roles technologies can play and the paths of influence among them within an ecosystem.
23
Visual mapping strategies provide a means for simultaneously representing multiple dimensions
15
1
and can help researchers identify common patterns, sequences, and progressions in process data
2
(Langley 1999, Langley and Truax 1994). For example, Nickerson and zur Muehlen (2006)
3
demonstrate the use of a population ecology perspective to map out the complexities in Internet
4
standards making. They use a visual mapping strategy to represent the “space-time network” of
5
the migration of ideas generated during Web services standards development. Similarly, Lyyti-
6
nen et al. (2003) use a visual mapping strategy to represent path creations in industries as a result
7
of IT-led innovations.
8
As technologies evolve, some new technologies are introduced, and some existing technolo-
9
gies die out. An ecosystem’s form and content change as well as the patterns of evolution occur-
10
ring within the ecosystem. The component, product, and infrastructure roles can be used to code
11
technologies according to their position within an ecosystem. Within a specific time period, the
12
quantity of technologies in each role determines the dominance of a role in the ecosystem. Tran-
13
sitions from one set of dominant roles in the ecosystem to another set can then be represented by
14
paths of influence and over time evolutionary patterns can be represented as collections of the
15
paths of influence occurring in the technology ecosystem. At any given point in time, any col-
16
lection of paths of influence can be at work in the ecosystem. Table 1 provides a pattern tem-
17
plate, and Figure 1 provides examples of several evolutionary patterns, each one represented by a
18
collection of certain paths of influence occurring at the same time.
19
INSERT FIGURE 1 ABOUT HERE
20
An alternative representation of the patterns can be achieved using a graph-based approach.
21
The nodes in Figure 2 represent the collection of component (C), product (P), and infrastructure
22
(I) technologies at each time in the evolutionary process. The edges between nodes represent the
23
individual paths of influence as outlined earlier. Finally, the evolutionary patterns are repre-
16
1
sented by the set of edges in each time period.
2
INSERT FIGURE 2 ABOUT HERE
3
An aspect of the power of coding technologies into the component, product, and infrastruc-
4
ture roles is the complexity that emerges from a seemingly simple model. Three roles may seem
5
to offer a rather simple representation, however, nine possible paths of influence emerge from
6
these roles and dozens of possible patterns of technology evolution emerge as various combina-
7
tions of different paths of influence. The three technology roles provide a simple set of con-
8
structs that is strongly based on a synthesis of prior literature and provide a means for represent-
9
ing a large number of complex patterns of technological change.
10
4.2 Example Patterns of Technology Evolution
11
To demonstrate the mapping technique described above, we present five examples of technology
12
evolution patterns. (See Figure 1.) They are based on observations of real-world instances of
13
technology evolution and development, and some of these patterns can also be traced back to in-
14
novation theory outlined at the beginning of this section.
15
Product Development. The first example pattern of technology evolution describes the ini-
16
tial stages of the evolution of a particular product technology. In this pattern, the ecosystem may
17
exhibit many different product and component technologies, as designs are being developed and
18
accepted. We call this the product development pattern because the primary paths of influence at
19
work in the ecosystem deal with the impacts of new technology components and products on
20
each other. (See Figure 1a.) For example, in the personal computing ecosystem the introduction
21
of the first personal digital assistants (PDAs), such as the Apple Newton and the Palm Pilot, re-
22
quired the simultaneous development of products, the PDAs themselves (PÆP*), and compo-
23
nents, microprocessors, micro hard disk drives, touch screens, etc. (CÆC*). Component tech-
17
1
nologies are developed and refined to meet requirements of new products (PÆC*) and, similarly,
2
product designs are modified and refined based on the newly available components (CÆP*).
3
Product and Infrastructure Alignment. A second pattern – product and infrastructure
4
alignment – depicts a scenario where a set of infrastructure technologies already exists. (See
5
Figure 1b.) Infrastructure technologies provide incentives for the ongoing use and adoption of
6
product technologies in an ecosystem and enhance the utility of existing technologies. New
7
products, in turn, leverage existing infrastructure to provide new services and functionality. For
8
example, in the European mobile phone ecosystem there was a mutual development of 3G wire-
9
less networks and the mobile phones that would operate on them. New network capabilities
10
drive innovations in mobile phones and the desire to provide more functionality in phones drives
11
the development of the network. This demonstrates a collection of paths of influence, (e.g.,
12
PÆI*, I*ÆP), working in parallel to ensure interoperability of products and infrastructure.
13
Feed-Forward Evolution. Two more patterns describe what Campbell (1990, 1994) calls
14
cross-level co-evolution. The paths of influence in the upper right section of the 3 x 3 matrix are
15
feed-forward paths of influence. In each case, evolution of current technologies impacts tech-
16
nologies at higher levels of the technology hierarchy in the future state. (See Figure 1c.) The
17
introduction of an evolved component technology can drive evolution of the product technolo-
18
gies that will use this new component. When new components are combined to create a new
19
product, this path of influence reflects the process of design and compilation. For example, in
20
the digital camera ecosystem the development of color LCDs, high-capacity solid-state storage
21
devices, and CMOS sensors for image capture provided the component technology enhance-
22
ments to create a digital camera product technology (CÆP*).
23
Feed-Back Evolution. The paths of influence in the lower left section of the 3 x 3 matrix re-
18
1
fer to feed-back paths of influence in technology evolution. (See Figure 1d.) Often the use of a
2
technology impacts the development and evolution of the technologies on which it depends. For
3
example, in the web programming ecosystem the development of many new Internet component
4
technologies such as Dynamic HTML or Active Server Pages (ASP) resulted from the continu-
5
ous growth of the World Wide Web (IÆC*). Also, once a support or infrastructure technology
6
is in place, it provides opportunities for a new product technology to leverage the services and
7
facilities it provides. The widespread adoption of instant messaging (IM) paved the way for new
8
products and applications, such as IM-based video conferencing, file transfer, and online game
9
software, leveraging the existing infrastructure (IÆP*).
10
Incremental Evolution. The last example pattern, incremental evolution, represents within-
11
level co-evolution and continuous development and refinement of technologies within each role.
12
(See Figure 1e.) For example, Moore’s Law explains that processing power of integrated chips
13
will double approximately every eighteen months, and ongoing research and development con-
14
tinues to uphold this law (CÆC*). In the mobile phone ecosystem, camera phones are an exam-
15
ple of the integration of two existing technologies, digital cameras and mobile phones, to create a
16
new product (PÆP*) and continuous expansion and refinement in the cellular network is an ex-
17
ample of incremental infrastructure evolution (IÆI*). Incremental evolution can be considered a
18
type of steady-state evolution in which expected incremental technological progress occurs
19
within a role.
20
Although the ability to identify single patterns of evolution in technology ecosystems pro-
21
vides additional insights for managers making technology-related decisions, a more significant
22
contribution of the ecosystem model is its ability to provide a systematic approach for describing
23
the temporal changes (transitions) in the ecosystem using these evolutionary patterns. In the next
19
1
section, we use an example to illustrate the utility of our approach by examining how a series of
2
evolutionary transitions can be represented by connecting multiple patterns over time, which can
3
lead to the identification of some intrinsic patterns (e.g., in certain cases representing evolution-
4
ary cycles) that can be utilized in technology forecasting.
5. QUALITATIVE APPLICATION: EVOLUTIONARY TRANSITIONS IN
DIGITAL MUSIC TECHNOLOGIES
5
6
7
8
We next use the landscape of digital music technologies evolution to provide a demonstration of
9
a qualitative approach for applying the constructs and patterns discussed in Sections 3 and 4.
10
This example demonstrates the design and use of our constructs and communicates their rele-
11
vance for both IS research and practice. We identify technology evolution patterns, and use the
12
visual mapping strategy (Langley 1999) to create a state diagram to map the patterns of techno-
13
logical change and cycles of innovation that emerge from patterns of evolution discussed in Sec-
14
tion 4.
15
5.1 Qualitative Analysis Approach
16
We use the evolution of digital music technologies to demonstrate the effectiveness of identify-
17
ing transitions between common evolutionary patterns in technology ecosystems. The digital
18
music technology ecosystem is an ideal setting for analysis. It includes many different compo-
19
nent, product, and infrastructure technologies. Furthermore, most digital music technologies
20
have only existed since the mid-1990s, yet there has been a significant amount of technological
21
change in this ecosystem. Demand for these technologies has skyrocketed over the past several
22
years, so we expect to see many new product introductions and new entrants in the market. Ad-
23
ditionally, digital music technologies span the consumer electronics, entertainment, and com-
24
puter industries, which suggest that there is an underlying complexity in their design and rela-
25
tionships within the ecosystem. Furthermore, digital music technologies have revolutionized the
20
1
consumption of music and other forms of media, and most people can relate to these technolo-
2
gies since they likely own or use them. We will show that, in its young life, the digital music
3
ecosystem has passed through at least two evolutionary cycles.
4
In developing this qualitative example, we follow the descriptive approach outlined by Hev-
5
ner et al. (2004) to demonstrate the application of our proposed constructs. We used LexisNexis
6
and Internet search tools to gather announcements, news stories, and historical records related to
7
technologies in the digital music ecosystem between 1989 and 2006. In total, we gathered in-
8
formation on approximately 100 related technologies (e.g., flash-based storage, LCD screens,
9
MP3 players, digital music services). These were coded into examples of new technologies in
10
the component, product and infrastructure roles. Using information on the timing of technology
11
releases, we developed a rich qualitative interpretation of technology trends in the ecosystem.
12
While we do provide insights on the nature of digital music technology evolution, the objective
13
of this analysis is to illustrate the use of our artifacts for analyzing an IT ecosystem qualitatively.
14
5.2 Technology Evolution in the Digital Music Ecosystem
15
The demand for digitally-formatted music files, players, and services has grown steadily over the
16
past five years. In fact, a new digital music market has developed with many technological in-
17
novations and rapid consumer adoption. Since it was originally patented in Germany in 1989,
18
the MP3 audio compression format has had a significant impact on the traditional music indus-
19
try. In 1999, peer-to-peer (P2P) file sharing networks gained rapid acceptance, sparking legal
20
battles and the development of new encryption and file-tracking technologies. In February 1999,
21
Sub Pop Records became one of the first labels to begin releasing music in the MP3 format
22
(Wired News 1999). Since then, the introduction of mass storage digital music players and on-
23
line digital music retailers has transformed the music business. Table 2 and Figure 3 provide
21
1
multiple illustrations of the timeline and two cycles of the evolution of digital music technolo-
2
gies.
3
4
INSERT TABLE 2 AND FIGURE 3 ABOUT HERE
The first cycle of digital music technology evolution started with the introduction of the MP3
5
compression format and software applications for playing MP3-encoded music files. The birth
6
period of the digital music industry was characterized primarily by the initial product develop-
7
ment pattern of technology evolution, where component technologies (such as the MP3 compres-
8
sion format) and product technologies (digital music software, such as WinAmp) were being re-
9
fined as they gained more attention. Activities in this era included the refinement of the MP3
10
format by integrating it into MPEG-1 in 1992 and MPEG-2 in 1994. Once MP3 files reached a
11
reasonable level of adoption, feed-forward patterns of technology evolution took over as new
12
product and infrastructure technologies were introduced based on the MP3 encryption format.
13
The first portable MP3 player, the 32MB MPMan device from Eiger Labs, was released in mid-
14
1998 (Van Buskirk 2005), and P2P networks were introduced with Napster’s inception in May
15
1999. Both technologies emerged because of the popularity of the MP3 compression format.
16
As popularity increased for the technologies in the digital music ecosystem, additional infra-
17
structure technologies were developed, including refinements to P2P networks and the introduc-
18
tion of new MP3 standards, such as Microsoft’s WMA and Apple’s AAC. As a result of the con-
19
tinued growth in popularity of digital music products and technologies, feed-back patterns of
20
technology evolution took hold, and new components and products, such as higher capacity flash
21
storage based players, were developed. At this point the majority of MP3 players were flash-
22
storage-based and virtually all MP3 file distribution occurred over P2P networks.
23
A second evolutionary cycle began when innovations in components, such as high-capacity
22
1
micro hard disk drives, led to the initial product development of hard disk drive-based MP3
2
players, such as the Apple iPod and the Creative Nomad Jukebox. These new HDD-based play-
3
ers sparked a new feed-forward patterns of evolution that resulted in the introduction and adop-
4
tion of new online music services, such as iTunes and Napster 2.0, as well as a slew of accesso-
5
ries for portable MP3 players, such as FM transmitters and voice recorders. With the presence of
6
multiple online music providers and portable MP3 players, technology evolution became focused
7
on the alignment of infrastructure and product technologies. The wide adoption of the second-
8
generation digital music technologies led to feed-back patterns that included introduction of new
9
products using new components such as color LCD screens.
10
5.3 Mapping the Analysis Back to the Constructs
11
The events that occurred in the digital music technology ecosystem can be represented as pat-
12
terns of technological change using the roles and paths of influence defined in Section 4. Figure
13
4 provides a visual representation of the two evolutionary cycles that were described above. This
14
represents a series of evolutionary transitions that represents connections between multiple evo-
15
lutionary patterns over time. Coding the technologies into roles allowed us to identify paths of
16
influence, represented by the arrows in Figure 4, and multiple patterns of technology evolution,
17
represented by the collection of arrows in each time period. As the figure shows, we can then
18
depict the sequence of 3 x 3 matrices representing paths of influence as a state diagram. We be-
19
lieve that both qualitative and quantitative data can be used to develop these evolutionary paths
20
and cycles, enabling an analyst to understand and predict next generation of technologies in the
21
desired context. Our development is supported by prior research, which shows that innovation
22
typically occurs in specific patterns (Sahal 1981 and 1985, Baldwin and Clark 2000, Worlton
23
1998) and in some cases cycles (Rosenkopf and Nerkar 1999, Worlton 1998). It also shows that
23
1
2
3
new innovations typically replace existing ones (Rosenkopf and Nerkar 1999).
INSERT FIGURE 4 ABOUT HERE
Based on the previous cycles, an analyst might forecast that the next cycle of technology evo-
4
lution in the music industry will begin as new components are introduced that allow for even
5
more advanced features in product technologies. For example, the evolution of components that
6
are used across multiple ecosystems may result in the convergence of hand-held computing de-
7
vices (e.g. PDAs, cellular phones, MP3 players, digital cameras). In fact, Motorola introduced
8
one of the first MP3-enabled mobile phones (Shillingford 2005), and the Sony/Ericsson Walk-
9
man MP3 phone grew sales by 33% in the second quarter of 2006 (Ewing and Burrows 2006), as
10
demand expanded in the presence of falling prices. Microsoft released a new multimedia-
11
playing (audio, video, and software) hand-held device called a “Zune” in November 2006, and
12
Apple released its “iPhone,”an iPod-Phone hybrid device, in mid-2007.
13
Currently, the ecosystem is rapidly evolving, with reconsideration being given to embedded
14
digital rights management (DRM), extensions involving web services on hand-held devices, GPS
15
built-in functionality for location-based shopping, and component innovations that will eventu-
16
ally support mobile TV. These all reflect digital convergence with technology components that
17
have been developed outside the hand-held sphere of technological influence. The ecosystem
18
view allows the manager to model these types of evolutionary patterns as well as track and ana-
19
lyze their progression over time (including the identification of transitions and cycles), which
20
will provide a better understanding of the dynamic nature of technology evolution.
6. QUANTITATIVE APPLICATION: EVOLUTIONARY TRANSITIONS
IN WI-FI TECHNOLOGIES
21
22
23
24
To further substantiate the application of our constructs and model, we developed a new empiri-
25
cal methodology to identify technology evolution patterns by combining a quantification strategy
24
1
with the visual mapping state-diagram-based approach for sensemaking from process data
2
(Langley 1999, Van de Ven and Poole 1990). A quantitative approach for analyzing the IT land-
3
scape provides a strong complement to the qualitative approach we demonstrated in Section 5.
4
When sufficient data on the introduction of technologies are available, a quantitative approach
5
provides additional rigor to the identification of evolutionary patterns. We follow guidelines in
6
Hevner et al. (2004) and use an analysis of real data to demonstrate our empirical methodology.
7
6.1. Data
8
The wireless networking ecosystem provides an appropriate context for applying our empirical
9
methodology for several reasons. Similar to the digital music technology ecosystem example,
10
wireless networking technologies are relatively young but have experienced a large amount of
11
technological change; in addition, these technologies also fit into the computer and consumer
12
electronics industries, so complexity is high. However, unlike digital music technologies, wire-
13
less networking technologies have had clearly-defined generations based on IEEE standards.
14
The existence of these standards suggests that recognizable patterns may exist, and our empirical
15
methodology can be validated by identifying those patterns. Furthermore, wireless networking
16
technologies are used not just by individuals but also by firms and organizations. They can also
17
be certified by the Wi-Fi Alliance (www.wi-fi.org), which maintains a database of product certi-
18
fications and makes the data publicly available:
19
20
21
22
“The Wi-Fi Alliance is a global, non-profit industry trade association with more than 200 member companies devoted to promoting the growth of wireless local area networks (WLAN). Our certification programs
ensure the interoperability of WLAN products from different manufacturers, with the objective of enhancing the wireless user experience.”
23
This provides an opportunity to compare and contrast different ecosystems, and to evaluate our
24
constructs and visual mapping strategy with both qualitative and quantitative analyses.
25
We collected data on over 3,000 certifications for new wireless networking (802.11) tech-
25
1
nologies awarded by the Wi-Fi Alliance. The member companies of the Wi-Fi Alliance include
2
3Com, Apple, Dell, Intel, Linksys, and many others. Certifications are awarded for ten different
3
technology categories: access points, cellular convergence products, compact flash adapters, em-
4
bedded clients, Ethernet client devices, external cards, internal cards, PDAs, USB client devices,
5
and wireless printers. Technologies can be certified based on IEEE communication standard
6
(802.11a, b, g, d, and h), security (e.g., WPA, and WPA2), authentication protocol (e.g., EAP,
7
and PEAP), and quality of service (e.g., WMM). 2
Generally, historical product data that includes comprehensive technical specifications and
8
9
dates of release is difficult to obtain. However, the Wi-Fi Alliance certifications have been
10
awarded to a substantial number of products, with most certified prior to their commercial re-
11
lease. For this reason, we have used the date of certification as a proxy for the date of innovation
12
for a new technology, and the type of certification as a proxy for the technical specifications of
13
the product. Both are readily observed, and the former is likely to occur close to the date of in-
14
novation, and so they represent acceptable empirical proxies.
15
We coded the Wi-Fi certification categories into the ecosystem roles (component, product,
16
and infrastructure) based on our operationalization of the theory of the ecosystem model of tech-
17
nology evolution. Compact flash adapters, internal cards, external cards, and USB client devices
18
were coded as component technologies, because each clearly acts as a component by providing
19
wireless capabilities for product devices. We coded access points, Ethernet client devices, and
20
wireless printers as infrastructure, because these technologies either form or extend the network
2
WPA (Wi-Fi protected access) is a standard for wireless network security. For more information, see
en.wikipedia.org/wiki/WPA. EAP (extensible authentication protocol) is a universal authentication framework frequently used in wireless networks, and PEAP is an open-standard authentication framework based on EAP proposed
by Cisco, Microsoft, and RSA Security. See en.wikipedia.org/wiki/Extensible_Authentication_Protocol for additional information. WMM (Wi-Fi multimedia, also known as WME – wireless multimedia extensions) is a standard
that provides basic quality of service (QoS) for wireless networks by prioritizing traffic according to the following
access categories: voice, video, best effort, and background. en.wikipedia.org/wiki/WMM offers details.
26
1
infrastructure necessary for wireless communication. Finally, we coded PDAs, embedded cli-
2
ents, and cellular convergence technologies as products, because each represents a product de-
3
vice that provides fully functioning wireless networking capabilities to the end user. 3 Coding
4
the wireless technologies into appropriate roles will lead to the identification of dominant roles
5
and the paths of influence between roles. The collections of these paths of influence at different
6
time periods will represent patterns of technology evolution in the ecosystem.
7
6.2. Empirical Methodology
8
Following a quantification strategy similar to Van de Ven and Poole (1990), we present a meth-
9
odology for reducing the complexity of technology evolution process data to a set of time-based
10
quantitative data that can be used to empirically identify patterns. Table 3 provides a high-level
11
description of the steps in the methodology.
INSERT TABLE 3 ABOUT HERE
12
13
First, raw technology evolution data must be coded according to the component, product, and
14
infrastructure roles within a specific ecosystem (Step 1 in Table 3). As noted above, the wireless
15
networking data were coded based on the product category assigned to a technology in the Wi-Fi
16
Alliance certification. Technical specifications for wireless networking technologies exhibit a
17
natural progression over time. For example, the IEEE 802.11b standard was introduced prior to
18
the 802.11g standard and, therefore, new technology introductions are distributed accordingly,
19
based on their technical specifications. We use the technical specifications of IEEE communica-
20
tion standard (802.11b versus 802.11g) and the basic security standard (WPA1 versus WPA2) to
21
identify different generations of wireless technologies. We independently analyzed each 802.11
3
Cellular convergence certifications are awarded to cellular phones that are Wi-Fi enabled. Embedded clients are
certifications for PCs, laptops, and other end user devices that are certified with internal Wi-Fi capabilities.
27
1
and WPA generation (i.e., two generations in each category) and then made comparisons across
2
generations to identify cycles of technology evolution.
3
Next, to derive a baseline for the number of new technologies introduced over time, we esti-
4
mate a function of the frequency of all technologies introduced across all roles (Step 2 in Table
5
3). This function provides an approximation for the total innovative activity in the technology
6
ecosystem over time. A wide variety of approximation techniques may be used for this purpose.
7
For example, for the wireless network data we used a five-month moving average of the fre-
8
quency counts (i.e., to eliminate random monthly fluctuations and obtain the underlying trend)
9
and estimated the frequency curve using a polynomial approximation function. In this specific
10
case, a sixth-degree polynomial provided a good fit with R2 values over 90%. Figure 5 depicts
11
the estimation for the frequency of technology introductions in the 802.11b generation.
12
INSERT FIGURE 5 ABOUT HERE
13
We next derived threshold frequency functions for each role using the frequency function es-
14
timated for all technology introductions (Step 3 in Table 3). If we assume that the introductions
15
of new technologies are independent of the role to which they belong and there are no interde-
16
pendencies across roles, we would expect to see the number of technology introductions in each
17
role over time be proportional to the total number of technology introductions in the ecosystem.
18
With this in mind, we derive estimated frequency functions for each role based on the proportion
19
each role has of the total number of technology introductions. For reference, the set of technolo-
20
gies released in the 802.11b generation is 54.4% components, 10.4% products, and 35.2% infra-
21
structure, and the set released in the 802.11g generation is 45.9% components, 8.0% products,
22
and 46.1% infrastructure. In Figure 6, the top curve represents the estimated frequency function
23
for all technologies and the three curves below represent the proportional frequency estimates for
28
1
components, infrastructure, and products, respectively from the top.
2
INSERT FIGURE 6 ABOUT HERE
3
Estimating the proportional frequency curves is necessary in order to take into account scale
4
differences in the number of technologies introduced in each role. In the context of the wireless
5
networking data, the total number of product certifications is significantly lower than the number
6
of component and infrastructure certifications. There are several possible reasons for the lower
7
number of product certifications. In particular, one certification for an embedded client or cellu-
8
lar convergence technology is often applied to multiple product models using the same technol-
9
ogy. For example, Dell may certify one laptop-embedded client and then apply the certification
10
to multiple laptops using the same client. Also, not all product technologies in this ecosystem
11
need to be certified. For example, a laptop that uses a wireless adapter is a product technology in
12
this ecosystem; however, the laptop itself is not certified; only the adapter is.
13
The proportional frequency functions are used as thresholds for determining the dominant
14
technology roles over time (see Step 4 in Table 3). If the number of actual technologies released
15
for a certain role is above (below) the threshold, then one can argue that there is proportionally
16
more (less) innovative activity occurring in that role than expected under the assumption of inde-
17
pendent technology introductions and no interdependencies among roles. Using error bars, in
18
this case exogenously set at ±5% of the threshold curve value, actual frequencies of technology
19
introductions in each role are compared to the threshold (plus or minus error) to determine which
20
roles are dominant at what times. Figures 7 and 8 present this comparison for the 802.11b and
21
802.11g wireless technology generations. In the figures, the solid line with error bars is the thre-
22
shold curve, the dotted line represents the actual frequency counts per month, and the smoothed
23
line represents a five-month moving average of the frequency counts. From these plots it is ap-
29
1
parent that over time the dominant technology roles vary. For example, for the 802.11b genera-
2
tion it is clear that component and infrastructure technologies either trace the threshold or surpass
3
it for the first half of the generation, but they begin to lag in the second half as product technolo-
4
gies begin to dominate. Similar patterns are apparent in the 802.11g figure.
5
INSERT FIGURES 7 AND 8 ABOUT HERE
6
The results of the threshold comparisons discussed above can be represented using the visual
7
mapping strategy discussed previously. By identifying the dominant technology roles in each
8
time period, a state diagram can be created to represent the transitions across technology evolu-
9
tion patterns (see Step 5 in Table 3). The next section provides the examples of state diagrams
10
obtained from the Wi-Fi certification data using the proposed methodology.
11
6.3. Mapping the Analysis Results Back to the Constructs
12
Based on the analysis presented in Figures 7 and 8 for the 802.11b and 802.11g wireless tech-
13
nologies, the state diagram in Figure 9 was generated, which allows several general trends to be
14
observed. The empirical method described above identifies the dominant technology type within
15
each time period (represented as nodes in Figure 9), and the expert can then define the transitions
16
from one time period to the next (represented as arrows in Figure 9) using contextual information
17
from the domain. In particular, it is apparent that innovations in product technologies clearly lag
18
the introduction of new component and infrastructure technologies. As 802.11b component and
19
infrastructure innovation intensity begins to drop off, an increase in 802.11b product certifica-
20
tions develops as well as the initial certifications for 802.11g components and infrastructure (i.e.,
21
the next innovation cycle begins). In addition, product innovations initially lag component and
22
infrastructure innovations, but for the second generation this lag is shorter, likely because
23
802.11g products are backwards-compatible with 802.11b components and infrastructure.
30
1
Manufacturers are able introduce the next generation (802.11g) of wireless product technologies
2
more quickly without having to wait for the widespread development of 802.11g components
3
and infrastructure.
4
5
INSERT FIGURES 9 AND 10 ABOUT HERE
A state diagram for the WPA1 and WPA2 generations in the same wireless networking data
6
is presented in Figure 10. In this case, it is also apparent that component technology innovations
7
predate product and infrastructure technology innovations. In the WPA2 generation it is very
8
clear that the progression of technological innovation was from components to infrastructures to
9
products, while in the WPA1 case there is an initial component precedence followed by a domi-
10
nance of infrastructure and products.
11
Using the information provided by these two cycles of technology evolution in the Wi-Fi
12
ecosystem, an analyst may be able to forecast that the lag between component and infrastructure
13
technology innovations and product technology innovations will continue to reduce, and eventu-
14
ally simultaneous innovation across all technology roles will occur. In 2006, Linksys demon-
15
strated routers (infrastructure) and Internal cards (components) that operate on the emerging
16
802.11n standard (Garcia 2006) and Dell Computer shipped an 802.11n laptop client (product)
17
using Broadcom chipsets (Corner 2006). As of mid-2007, there has not yet been widespread
18
adoption of 802.11n-ready infrastructure capabilities and clients, and sentiments in the current
19
marketplace suggest some lag in next-generation wireless product technologies, as infrastructure
20
capabilities catch up and consumers become aware of the benefits (Thornycroft 2007).
21
6.4 Comparison of Digital Music and Wireless Networking Technologies
22
The qualitative example of digital music evolution and the quantitative analysis of the wireless
23
network technologies demonstrated that different patterns of technological change can occur in
31
1
different ecosystems. The difference in the digital music and Wi-Fi evolutionary patterns might
2
be explained in part by the influence of infrastructure technologies as either supporting or ena-
3
bling other technologies within the ecosystem. Specifically, in the digital music ecosystem, in-
4
frastructure technologies typically play a supporting role – they are not required for the use of
5
digital music products but provide additional value (e.g., online digital music stores, FM trans-
6
mitters). In contrast, in the Wi-Fi ecosystem, infrastructure technologies had to be developed
7
first simply to make wireless networking possible for product technologies. Then, as the ecosys-
8
tem developed, new infrastructure technologies, such as wireless printers, supported the product
9
technologies by providing additional value to their use. The existence of two different types of
10
infrastructure roles – supporting and enabling – provides a possible explanation of different evo-
11
lutionary cycles across different ecosystems.
12
There are also other possible explanations for the different patterns in these ecosystems. For
13
example, digital music technologies are typically purchased by individuals while wireless net-
14
working technologies are purchased by both individuals and firms. The social construction of
15
technology view would argue that different social and cultural environments around the use of
16
each technology lead to different patterns of innovation. Similarly, demand-driven theories of
17
innovation would argue that the consumer and market will demand different functionality from
18
the technologies in each of these ecosystems, and therefore their evolution should be different.
19
7. UTILITY EVALUATION OF THE PROPOSED ARTIFACTS
20
The utility of a new artifact must be demonstrated using well-formulated and well-executed
21
evaluation techniques. To demonstrate the utility of our proposed artifacts, we follow Hevner et
22
al. (2004), who suggested seven evaluation methods, two of which are appropriate for the con-
23
text we have studied. The first of these is the observational approach, which is exemplified by
32
1
case study and interviewing methods. We used this approach to evaluate the effectiveness of our
2
proposed artifacts in the business environment. We accomplished this through a number of one-
3
hour structured interviews with IT industry experts. The second is the descriptive approach. We
4
employed the informed argument method, an instance of the descriptive approach, by using in-
5
formation from the knowledge base of our research domain to build arguments for the utility of
6
our proposed artifacts. We accomplished this by assessing common techniques that are used in
7
practice for analyzing the IT landscape, and pointing out how our artifacts complement these
8
techniques to improve analysis capabilities and achieve utility.
9
10
11
7.1 Interviews with IT Industry Experts
12
1987, Eisenhardt 1989) and is one of the most important data gathering tools in qualitative re-
13
search (Myers and Newman 2007). We chose to use interviews as our primary technique for
14
evaluating the utility of our proposed artifacts for two reasons. First, our proposed artifacts are
15
novel and not directly comparable to existing IT landscape analysis techniques on any specific
16
quantitative performance measures, so we must rely on qualitative evaluation techniques. Sec-
17
ond, interviews provide a means for capturing extremely rich data and, in this case, can be used
18
to evaluate the potential utility of our proposed artifacts in a business setting by allowing us to
19
capture the informed opinions of IT industry experts.
Conducting interviews is a key technique for performing IS case study research (Benbasat et al.
20
The Interview Process. Our interview approach was based on an interview script that was
21
developed ahead of time and pre-tested to ensure that the questions we asked would be under-
22
stood and properly interpreted, that they would yield the appropriate kinds of insights, and that
23
they would be scoped to encourage open-ended input while they delivered answers that would
24
help us to gauge the utility of the technological artifacts in our research. The interviewer en-
33
1
sured that all questions in the script were covered during the interview; however, related topics
2
of discussion were permitted in order to increase the richness of the information we captured.
3
The interview included an opening, introduction, key questions, and a closing (Myers and New-
4
man 2007). The interview script and additional information about the development and imple-
5
mentation of interviews are provided in an appendix at the end of this paper. The opening was
6
used as a means of introducing the interviewer and interviewee and capturing basic background
7
demographic information about the interviewee. The introduction was used to explain the pur-
8
pose of the interview.
9
The interviewee was then asked questions about: (1) the business and organizational problem
10
of analyzing the IT landscape for technology investment and development decision-making; (2)
11
the utility of our proposed artifacts, based on their strengths and weaknesses in a context of use;
12
and (3) potential improvements that might be appropriate to our proposed artifacts. Between the
13
first two sets of questions, the interviewee was given a three-page handout that summarized our
14
proposed approach. This was the first time the interviewee was introduced to our proposed arti-
15
facts. The interviewer subsequently spent, on average, twenty to thirty minutes explaining and
16
demonstrating the proposed approach, using the handout as a guide. The interviewer answered
17
questions raised by the interviewee during this discussion. The closing of the interview was a
18
simple debriefing and included a request for follow-up interviews, as needed. The interviews
19
took a little less than one hour each.
20
Interview Subjects. We interviewed a set of IT industry experts with participants from four
21
distinct populations: (1) IT industry senior managers and executives, (2) IT industry consultants,
22
(3) IT industry research staff and analysts, and (4) senior academic researchers with expertise on
23
the IT industry. We interviewed a total of twelve experts, three in each group. Each participant
34
1
had well over ten years of experience in the IT industry or academia, and over ten years of ex-
2
perience in a management or decision-making role. All participants evaluated themselves to
3
have a high level of understanding of the landscape of current and past ITs, which validated our
4
participant selection process. The participants hailed from Fortune 500 companies, technology
5
research and government organizations, and well-known research universities.
6
Question Coverage. To evaluate our proposed approach, we created questions in our inter-
7
view script to evoke discussion of the interviewee’s opinions about four key aspects of our arti-
8
facts for analyzing and understanding the IT landscape. (See Table 4.) First, we evaluated the
9
usefulness of the proposed constructs in the ecosystem model. In particular, we asked if the use
10
of the component, product, and infrastructure roles was a useful model for representing tech-
11
nologies within an ecosystem. We also queried their opinions about the use of paths of influence
12
to classify temporal relationships. Second, we evaluated the logic of the qualitative and quanti-
13
tative methodologies for identifying and visualizing trends in the IT landscape. Here our ques-
14
tions directed the discussion to the soundness of the methodologies and the insights produced by
15
following them. Third, we evaluated the utility of the information produced by the proposed
16
qualitative and quantitative methodologies. Here we directed the discussion to the interviewee’s
17
opinions about the usefulness of the information about technology trends to practitioners and or-
18
ganizations involved in the IT investment or development decision-making process. We also
19
captured opinions about the format and understandability of the output graphs and diagrams.
20
Fourth, we captured the interviewee’s opinions about how our methods complement existing ap-
21
proaches for analyzing the IT landscape. The interviewees’ feedback regarding these four issues
22
led us to identify several key dimensions of utility for our proposed artifacts, which we describe
23
in the remainder of Section 7.
35
1
INSERT TABLE 4 ABOUT HERE
2
7.2. Results of the Interviews: Key Dimensions of Utility
3
Responses to the first set of interview questions provided motivation and shaping of the business
4
and organizational problem our proposed artifacts address. Several key insights came out of this
5
part of the interview. The majority of the participants noted that the staff and management of
6
most IT-consuming companies do not have the time or expertise to perform the necessary analy-
7
sis of the IT landscape, and so they must outsource this process to third parties. Additionally,
8
every participant noted the reliance of IT organizations on reports produced by the companies
9
like Gartner, Forrester, and IDC. Multiple participants also noted that current IT investments
10
and partnerships play a significant role in future investments, and often IT investment decisions
11
are outsourced to partners and suppliers. This yielded important information for us on the locus
12
of likely value for our proposed artifacts – not necessarily through direct use by IT managers
13
within a company, but instead through the consultants, partners, and agents with whom they
14
work in the implementation of their strategic, operational, and product-related use of IT.
15
In general, all of the participants found value in our proposed artifacts for evaluating the IT
16
landscape. Four key dimensions about the utility of our proposed artifacts consistently emerged
17
in their opinions regarding the value of our research. In particular, these artifacts support com-
18
plexity reduction, help to structure investment decisions, provide a formal method for quantify-
19
ing technology ecosystem evolution, and support the identification of the locus of value for post-
20
investment evaluation. We discuss each of these in succession, and provide our respondents’
21
reactions to illustrate our arguments about utility.
22
Complexity Reduction. The general consensus of the experts we interviewed was that the
23
use of technology roles and the paths of influence provide a novel and useful way of reducing the
36
1
complexity of the IT landscape while maintaining the important relationships between technolo-
2
gies. Our interviewees’ commented:
3
4
“[The roles and model] are very clever because you compress the universe of possibilities and make the
ecosystem understandable.” -- Senior Technology Analyst at a Fortune 500 transportation company
5
6
7
“This is a very good way to think about the problem ... it explains the technology ecosystem very well and is
nice way of trying to break up very complex phenomena.” -- Managing Director of a Government IT Organization
8
The exercise of defining the technology ecosystem provides two useful insights to the user of
9
the proposed constructs from the points of view of our respondents. First, it forces the analyst to
10
consider interdependencies among technologies and realize the complexity of the technology
11
ecosystem. Second, it provides structure (based on the concepts of technology roles and paths of
12
influence) to reduce this complexity using a system view of the IT landscape and captures the
13
technology ecosystem from the analyst’s point of view. Each of these aspects enhances the us-
14
er’s ability to understand the nature of relationships in the IT landscape.
15
Structure for IT Investment Decision-Making. The interviewees also reported:
16
17
“This approach provides structure to the conversation and decision-making process for IT investment." -Director of Business Development at a major university IT-related research center
18
19
20
21
“This [approach] brings the ability to work on [the IT investment decision-making problem] interdisciplinarily within an organization. You could present this to the CEO, engineering guys, marketing guys, and
they would all know what you were talking about. They may ask different questions, but they would all find
it useful.” -- Former VP of a Fortune 500 technology company, current IT industry private consultant
22
Through the interviews we discovered evidence of a lack of structure in how firms go about ana-
23
lyzing the IT landscape. They typically rely on third-party reports and advice from suppliers and
24
partners, as we noted earlier, but this apparently is still not sufficient. Our proposed methodol-
25
ogy provides a means for generating representations of the IT landscape and associated technol-
26
ogy trends that are relevant to the firm’s interests and business contexts. A majority of the par-
27
ticipants also noted that the proposed approach is a useful tool for decision-makers across differ-
28
ent functional roles in the organization. The participants felt that senior managers and strategic
37
1
planners, as well as technical managers and engineers, could all benefit from understanding the
2
IT landscape and technology trends in terms of the proposed technology ecosystem model. In
3
general, the consensus of the participants was that the proposed methods should be useful in the
4
IT investment and development decision-making process.
5
Formal Method to Quantify Technological Change. The proposed methods provide a for-
6
mal technique for quantifying trends in technological change within the IT landscape. Our inter-
7
viewees noted that the techniques most commonly used by firms to analyze the IT landscape are
8
informal and ad hoc:
9
10
11
12
"Most work on this problem is informal and this is one of only a few formal approaches I have seen. Attempts to formally quantify things are a good thing. This is a formal methodology to add some quantification to the analysis by [companies like Gartner]." -- Senior Consultant at a Fortune 500 technology company
13
14
“The systematic approach this provides is useful. […] Most strategic IT decisions are made using less formal types of analysis.” -- Senior Technology Analyst at a Fortune 500 transportation company
15
It turns out that only few firms – including those producing industry reports – use formal
16
quantitative means to produce technology forecasts, aside from simple linear extrapolation. All
17
interviewees found the quantification aspect of the proposed methods to be useful, and most also
18
commented that our formal approach will complement existing techniques well and will provide
19
firms with new and useful information for making IT investment and development decisions.
20
Locus of Value for the Artifacts. We also learned where the value of our proposed artifacts
21
will be the highest, which is another important aspect of their utility. This is similar to the locus
22
of value construct (Kauffman and Weill, 1989), which describes where value flows are most like-
23
ly to occur. A consultant and a senior manager offered the following comments:
24
25
26
27
“Companies that can benefit most from this are the technology producers, like for example IBM, Microsoft,
and Sun. These are the ones defining the future technologies. By looking at a systematic way of how technology got to where it is today it may help [technology producers] determine what types of technologies
are needed.” -- Senior Consultant at a Fortune 500 technology company
28
29
“For analysis purposes, this sort of model is very good and should definitely help analysts at Gartner or
Forrester produce reports for managers.” -- IT Manager at a Fortune 500 retail company
38
1
Based on interviews, an interesting finding for us was that, in terms of the locus of value, the
2
interview participants differentiated between the utilities of different artifacts: (1) the utility of
3
the proposed model, constructs, and the information produced by our methods (i.e., resulting
4
graphs and diagrams of specific ecosystems), and (2) the utility of methodologies themselves for
5
conducting IT landscape analysis and producing various patterns of technology evolution. The
6
participants indicated that the information produced by our proposed methods would be useful to
7
decision-makers in both IT-consuming and IT-producing firms. On the other hand, the majority
8
of the interview participants felt that using the proposed approach to actually conduct the analy-
9
sis of the IT landscape would be most beneficial to firms that either produce IT or produce the
10
industry reports on trends in IT. Understanding the trends in technology evolution that led to the
11
current state of the IT landscape should prove vital in determining what directions IT develop-
12
ment initiatives should follow in the future. Furthermore, the reality of IT landscape analysis is
13
that IS and corporate strategy staff members at most IT-consuming firms have neither the time,
14
the resources, nor the technology and market knowledge to conduct formal analyses. So, even if
15
the techniques for analyzing the landscape improve, IT-consuming firms will still likely rely on
16
third parties to conduct their technology assessments and analyses for them. As a result, new
17
formal approaches for analyzing the IT landscape, such as what we propose, should add value to
18
both the firms producing the forecasts and the firms consuming them.
19
Through our interviews we also captured recommendations and suggestions for enhancing
20
the proposed artifacts. We review the most important suggestions in Section 8, where we elabo-
21
rate on the limitations and future directions for this research.
22
7.3. The Fifth Dimension: The Complementary Value of the Proposed Artifacts
23
24
“This [approach] should be very useful for helping educate analysts about the [IT] landscape. It is complementary to other existing approaches.” -- Senior Researcher at a Fortune 500 technology company.
39
1
An additional aspect of utility that was suggested by most of the interview participants was that
2
our proposed methods will complement well existing techniques for analyzing the IT landscape.
3
To delve deeper into the potential complementarities, we evaluated the strengths and weaknesses
4
of many common approaches for technology forecasting and IT landscape analysis and discuss
5
how our approach specifically complements each of them.
6
Table 5 provides an outline of common technology forecasting and planning techniques used
7
in industry, including trend analysis, expert opinion, modeling and simulation, and scenario
8
analysis. Although specific methods are most often proprietary, firms, such as Gartner, use some
9
version and/or combination of these techniques to generate their IT forecasts and reports. The
10
constructs and methods presented in this article are intended to complement firms’ proprietary
11
approaches, and provide an additional means for viewing technology evolution. Our approach
12
utilizes elements of trend analysis and modeling techniques, enables mapping of the historical
13
relationships among technologies, and can provide useful insights regarding the next possible
14
evolutionary steps within an ecosystem. In particular, at a given point in time, our approach may
15
complement existing technology forecasting methods (as noted in the last row of Table 5) by
16
providing structured input and formal analysis of the past and current states of the IT landscape.
17
18
INSERT TABLE 5 ABOUT HERE
Another relevant industry analysis approach is a technology roadmap. A technology road-
19
map is a tool that is typically used for planning purposes, such as in product, strategic, ser-
20
vice/capability, and process planning (Kostoff and Schaller 2001, Rinne 2004, Phaal et al. 2004).
21
Technology roadmaps provide a way to identify, evaluate, and select strategic alternatives by
22
mapping structural and temporal relationships among R&D, technologies, potential products, and
23
markets (Kostoff and Schaller 2001, Rinne 2004). The process of generating a technology
40
1
roadmap follows a visual mapping strategy not unlike we have presented. Our methods com-
2
plement technology roadmaps by providing a problem representation vocabulary that extends
3
current road-mapping techniques, and provides a more formal quantitative method for identify-
4
ing trends in technological change. Technology roadmaps are designed to outline the set of pos-
5
sible future strategies for a specific firm (Kostoff and Schaller 2001), and our technique adds to
6
this by providing a method for historically evaluating the evolution of an entire set of interrelated
7
technologies (represented by technology roles within the ecosystem) using similar visual repre-
8
sentation techniques.
9
As noted in Table 5, all technology forecasting methods have inherent assumptions, and the
10
accuracy of these assumptions influences the predictive accuracy of the forecast. Most of these
11
methods, with the exception of some regression and econometric approaches, are not predictive
12
in the sense of classical variance theory (Mohr 1982), where a set of predictor variables is used
13
to predict the level of some outcome variable. The basic assumption in all forecasting tech-
14
niques, including the ones that a variance theory would suggest, is that the historical trends and
15
patterns will continue into the future following the same dynamics. Our approach follows the
16
same basic assumption: if technological change will continue to occur following the same pat-
17
terns identified using our methods, then we can make reasonable forecasts about the future.
18
8. CONCLUSION, LIMITATIONS, AND FUTURE WORK
19
Following the design science research paradigm, the major contribution of this research is the
20
development of a new set of artifacts for: (1) codifying technological innovations based on the
21
role they play within an ecosystem of interrelated technologies, (2) identifying dominant tech-
22
nology types within an ecosystem using real-world data, and (3) visually representing patterns of
23
technological change over time based on dominant technological roles. These artifacts comprise
41
1
a new technique for analyzing the IT landscape to inform the IT investment and development
2
decision-making process. This article contributes to the IS research field in several additional
3
ways. We provide a review of relevant IS and organizational science research on technology
4
evolution and construct a theoretical perspective that integrates and builds upon previous ideas.
5
We incorporate strategies for sensemaking of complex data (e.g., quantification and visual map-
6
ping) from process theory. In addition, we provide insightful analysis on the evolution of tech-
7
nologies in the digital music and wireless networking ecosystems. We employ interviews with
8
senior technology managers, consultants, and industry researchers as a means to demonstrate
9
utility of our proposed artifacts, and we also review existing technology forecasting methods and
10
theoretical perspectives on technological change.
11
To develop the methodologies presented in this article, we used a combination of the visual
12
mapping and quantitative strategies for sensemaking from process data (Langley 1999). These
13
strategies do have their limitations. Process mapping and visual representations may exclude
14
some dimensions of data ambiguity, and graphical forms may be biased toward the representa-
15
tion of certain types of information over others. The conclusions derived may sometimes have
16
rather mechanical qualities since these representations deal more with the surface structure of
17
activity sequences than the underlying forces (Langley 1999). On the other hand, since the goal
18
of quantification strategies is to reduce complexity, their use may sometimes lead to a loss of
19
richness in the process data (Langley 1999). A common criticism of the process theory in gen-
20
eral is that, although it can produce enriched understanding and explanation, it often lacks pre-
21
dictive power (Van de Ven 1992).
22
23
To address the limitations of process theory, Langley (1999) suggests that both the quantitative and visual mapping strategies should be used in combination with other approaches. We
42
1
chose to use these two in combination because they complement each other well. Visual map-
2
ping provides additional contextual information that may be lost in quantification, while quanti-
3
fication provides an opportunity to apply empirical rigor that is missing in visualization. Fur-
4
thermore, we demonstrated the use of our model’s constructs in both qualitative (digital music
5
technologies) and quantitative (Wi-Fi technologies) investigations. The constructs were used
6
successfully to identify evolutionary patterns in both scenarios thus suggesting their usefulness.
7
All models are abstractions of the real world and, therefore, depend on the assumptions used
8
in their construction. In this research we relied on the assumption, based on our synthesis of
9
prior literature and our observations of the real world, that the common roles technologies play in
10
an ecosystem are components, products, and infrastructure. Another choice we make in this
11
model is to follow the technological determinism approach (Smith and Marx 1994) and currently
12
exclude the role of external forces such as market dynamics, the demand environment, society,
13
and culture. Multiple interview participants recommended expanding our model in future re-
14
search to include more external forces and context-specific factors. Excluding these factors may
15
result in a loss of contextual richness; however, by limiting the number of factors considered in
16
the model we gain control and specificity, and reduce complexity for the user of our methods.
17
An objective of our approach is to demonstrate that the patterns of technological change can
18
be identified using a model based solely on relationships between technologies. We do recog-
19
nize, however, the potential contribution of including these external factors in the analysis of the
20
IT landscape. We plan to expand the current model and methodology to include more aspects of
21
the external environment, such as market demand and social forces. Combining the technologi-
22
cal determinism view with the social constructivism view will likely provide many new insights
23
and opportunities for further improving techniques for analyzing the IT environment.
43
1
Although an important goal was to develop general constructs and methods for mapping out
2
evolutionary patterns in technology ecosystems, our research provided insights about possible
3
specific innovation and evolution drivers in specific technology ecosystems. We point to some
4
of these in our quantitative and qualitative analyses in Sections 5 and 6 (e.g., the possible differ-
5
ence in evolutionary trends when you have supporting vs. enabling types of infrastructure). Us-
6
ing our ecosystem-based approach as a basis, in future research we will analyze ecosystem-
7
specific drivers of innovation within several IT ecosystems and explore their similarities and dif-
8
ferences.
9
The interview participants who evaluated our proposed artifacts provided three additional
10
important recommendations and comments for expansions to the current research. First, there
11
was a suggestion that exploring the directionality of paths of influence may provide interesting
12
insights on technological development. In the current model, we looked primarily at positive
13
relationships – an innovation of a technology in one role provides an opportunity for the devel-
14
opment of a new technology in another role. There may be negative relationships between tech-
15
nologies though. For example, a new technology may make a series of existing technologies ob-
16
solete, thus effectively exterminating a portion of the ecosystem. Considering the directionality
17
of the relationships between technologies also reinforces the ecological analogy in which both
18
birth and death processes occur.
19
Second, the time scale may be used more effectively in the quantitative analysis to identify
20
lags in transitions between patterns in technology trends. Quantifying such lags may provide a
21
predictive tool for forecasting the occurrence of future trends. Third, two of the interview par-
22
ticipants noted that they would expect data collection for performing the proposed analysis to be
23
difficult for many firms. We recognize the importance of this comment and note that many
44
1
technology services companies are investing significantly in new business intelligence tools for
2
extracting quantifiable data from the seas of information available on and off the Internet. As
3
these tools evolve, rich data on the IT landscape should become more readily available, and we
4
plan to investigate opportunities for integrating our proposed approach with these tools.
5
References
6
7
Adner, R. and Levinthal, D. “Demand heterogeneity and technology evolution: Implications for
product and process innovation,” Management Science, (47:5), May 2001, pp. 611-628.
8
9
10
Adomavicius, G., Bockstedt, J., Gupta, A., and Kauffman, R.J. “Technology roles and paths of
influence in an ecosystem model of technology evolution,” Information Technology and Management, (8:2), April 2007, pp. 185-202.
11
12
Arthur, W.B. “Competing technologies, increasing returns, and lock-in by historical events,”
Economic Journal (99:394), March 1989, pp. 116-131.
13
14
Bacon, C.J. “The use of decision criteria in selecting information systems/Technology investments,” MIS Quarterly (16:3) September 1992, pp. 335-353.
15
16
Baldwin, C.Y. and Clark, K.B. “Managing in the age of modularity,” Harvard Business Review
(75:5), September 1997, pp. 84-93.
17
18
Baldwin, C.Y. and Clark, K.B. Design Rules: The Power of Modularity, The MIT Press, Cambridge, MA, 2000.
19
20
Benbasat, I., Goldstein, D.K., and Mead, M. “The case research strategy in studies of information systems,” MIS Quarterly (11:3) September 1987, pp. 369-386.
21
22
Benbasat. I. and Zmud, R.W. “The identity crisis within the IS discipline: Defining and communicating the discipline’s core properties”, MIS Quarterly, (27:2), June 2003, pp. 183-194.
23
24
25
Boland, R.J., Lyytinen, K. and Yoo, Y. “Path creation with digital 3D representation: Networks
of innovation in architectural design and construction,” Sprouts: Working Papers on Information Environments, Systems and Organizations, (3:1), Winter 2003, pp 1-28.
26
27
28
Campbell, D.T. “Levels of organization, downward causation, and the selection-theory approach
to evolutionary epistemology,” in Theories of the Evolution of Knowing, G. Greenberg and E.
Tobach (eds.), Lawrence Erlbaum, Hillsdale, NJ, 1990, pp. 1-17.
29
30
31
Campbell, D.T. “How individual and face-to-face group selection undermine firm selection in
organizational evolution,” in Evolutionary Dynamics in Organizations, J.A.C. Baum and J.V.
Singh (eds.),Oxford University Press, New York, NY, 1994, pp. 23-38.
32
33
Clark, K.B. “The interaction of design hierarchies and market concepts in technological evolution,” Research Policy, (14:5), October 1985, pp. 235-251.
34
35
Clemons, E.K and Weber, W. “Strategic Information Technology Investments: Guidelines for
Decision Makers,” Journal of Management Information Systems (7:2) Fall 1990, pp. 9-28
45
1
2
Corner, S. “Dell puts next gen WiFi, 802.11n, into laptops,” ITWire, July 18, 2006, available at
www.itwire.com.au/content/view/4995/127/ (last accessed September 17, 2007).
3
4
Dosi, G. “Technological paradigms and technological trajectories,” Research Policy, (11:3), June
1982, pp. 147-162.
5
6
Eisenhardt, K.M. “Building theories from case study research,” The Academy of Management
Review, (14:4) October 1989, pp. 532-550.
7
8
9
Ewing, J. and Burrows, P. “Will Apple answer Sony’s call?” Business Week, July 31, 2006,
available online at www.businessweek.com/magazine/content/06_31/c3995016.htm (last accessed March 31, 2007).
10
11
Funk, J. L. “Technological change within hierarchies: The case of the music industry,” Economics of Innovation and New Technology, (16:1), January 2007, pp. 1-16.
12
13
Garcia, A. “First 802.11n products show standard’s promise,” eWeek, April 24, 2006, available
at www.eweek.com/article2/0,1895,1952659,00.asp (last accessed September 17, 2007).
14
15
Garud, R. and Van de Ven, A.H. “An empirical evaluation of the internal corporate venturing
process,” Strategic Management Journal, (13: Special Issue), Summer 1992, pp. 93-109.
16
17
Gregor, S. “The nature of theory in information systems,” MIS Quarterly, (30:3), September
2006, pp. 611-642.
18
19
Hannan, M.T., and Freeman, J. “The population ecology of organizations,” American Journal of
Sociology, (82), March 1977, pp. 929-964.
20
21
Hannan, M.T. and Freeman, J. Organizational Ecology, Harvard University Press, Cambridge,
MA, 1989.
22
23
24
Harte, J., Shireman, B., Burke, A., and Scarlett, L. “Business as a living system: The value of
industrial ecology (a roundtable discussion),” California Management Review, (43:3), Spring
2001, pp. 16-25.
25
26
Hevner, A.R., March, S.T., Park, J., and Ram, S. “Design science in information systems research,” MIS Quarterly, (28:1), March 2004, pp. 75-105.
27
28
29
Iansiti, M. and Levien, R. “The new operational dynamics of business ecosystems: Implications
for policy, operations and technology strategy,” Working paper 03-030, Harvard Business
School, Cambridge, MA, 2002.
30
31
32
Iansiti, M. and Levien, R. The Keystone Advantage: What New Dynamics of Business Ecosystems Mean for Strategy, Innovation, and Sustainability, Harvard Business School Press, Boston, MA, 2004.
33
34
35
36
Kauffman, R.J., and Weill, P. “An evaluative framework for research on the performance effects
of information technology investment,” in Proceedings of the 10th International Conference on
Information Systems, J.I. Degross, J.C. Henderson and B.R. Konsynski (eds.), Boston, MA,
December 4-6, 1989, pp. 377-388
37
38
Kostoff, R.N. and Schaller, R.R. “Science and technology roadmaps,” IEEE Transactions on
Engineering Management, (48:2), May 2001, pp. 132-143.
39
40
Langley, A. “Strategies of theorizing from process data,” Academy of Management Review,
(24:4), October 1999, pp. 691-710
46
1
2
Langley, A. and Truax, J. “A process study of new technology adoption in smaller manufacturing firms,” Journal of Management Studies, (31:5), September 1994, pp. 619-652.
3
4
Laudan, R. (ed.) Nature of Technological Knowledge. Are Models of Scientific Change Relevant? Reidel, Dordrecht, Netherlands, 1984.
5
6
7
Lyytinen, K. and Rose, G.M. “The disruptive nature of information technology innovations: The
case of Internet computing in systems development organizations,” MIS Quarterly, (27:4), December 2003, pp. 557-595.
8
9
10
Malerba, F., Nelson, R., Orsenigo, L., and Winter, S. “History-friendly models of industry evolution: The case of computer industries,” Industrial and Corporate Change, (8:1), March 1999,
pp. 1-36.
11
12
March, S.T and Smith, G.F. “Design and natural science research on information technology,”
Decision Support Systems, (15:4), December 1995, pp. 251-266.
13
14
Markus, L. and Robey, D. “Information technology and organizational change: Causal structure
in theory and research,” Management Science, (34:5), May 1988, pp. 583-598.
15
16
Meyer, A.D. “Visual data in organizational research,” Organization Science, (2:2), May 1991,
pp. 218-236.
17
18
Meyer, A.D. and Goes, J. “Organizational assimilation of innovations: A multilevel contextual
analysis,” Academy of Management Journal, (31:4), December 1988, pp. 897-923.
19
Miles, M.B. and Huberman, A.M. Qualitative data analysis, Sage, Newbury Park, CA, 1994.
20
21
Millet, S.M and Honton, E.J. A Manager’s Guide to Technology Forecasting and Strategy Analysis Methods, Battelle Press, Columbus, OH, 1991.
22
23
Mintzberg, H., Raisinghani, D., and Theoret, A. “The structure of unstructured decision processes,” Administrative Science Quarterly, (21:2), June 1976, 246-275.
24
Mohr, L.B. Explaining Organizational Behavior, Jossey-Bass, San Francisco, CA, 1982.
25
26
Myers, M.D., and Newman, M. “The qualitative interview in IS research: Examining the craft,”
Information and Organization, (17:1) January 2007, pp. 2-26.
27
28
Nelson, R.R. “Recent evolutionary theorizing about economic change,” Journal of Economic
Literature, (33:1), March 1995, pp. 48-90.
29
30
Nelson, R.R. and Winter, S.G. An Evolutionary Theory of Economic Change, Belknap Press of
Harvard University Press, Cambridge, MA, 1982.
31
32
Newman, M. and Robey, D. “A social process model of user-analyst relationships,” MIS Quarterly, (16:2) June 1992, pp. 249-266.
33
34
Nickerson, J.V. and zur Muehlen, M. “The ecology of standards processes: Insights from Interenet standard making,” MIS Quarterly, (30:Special Issue), August 2006, pp. 467-488.
35
36
Orlikowski, W.J. “CASE tools as organizational change: Investigating incremental and radical
changes in systems development,” MIS Quarterly, (17:3), September 1993, pp. 309-340.
37
38
Orlikowski, W.J. and Robey, D. “Information technology and the structuring of organizations,”
Information Systems Research, (2:2), June 1991, pp. 143-169.
47
1
2
Pentland, B.T. “Grammatical models of organizational processes,” Organization Science, (6:5),
September 1995, pp. 541-556.
3
4
5
Phaal, R., Farrukh, C.J.P., and Probert, D.R. “Technology roadmapping – A planning framework
for evolution and revolution,” Technological Forecasting and Social Change, (71:1), January
2004, pp. 5-26.
6
7
Porter, A. L., Roper, A. T., Mason, T. W., Rossini, F. A., and Banks, J. Forecasting and Management of Technology, Wiley-Interscience, New York, NY, 1991.
8
9
10
Quaadgras, A. 2005. “Who joins the platform? The case of the RFID business ecosystem,” in
Proceedings of the 38th Hawaii International Conference on System Sciences, R. H. Sprague
(ed.), Big Island, HI. January 3-6, 2005, IEEE Computing Society Press, Los Alamitos, CA.
11
12
Rinne, M. “Technology roadmaps: Infrastructure for innovation,” Technological Forecasting
and Social Change, (71:1), January 2004, pp. 67-80.
13
14
Romanelli, E. and Tushman M. “Organizational transformation as punctuated equilibrium,”
Academy of Management Journal, (37:5), October 1994, pp. 1141-1166.
15
16
Rosenberg, N. Exploring the Black Box: Technology, Economics, History, Cambridge University
Press, London, UK, 1994.
17
18
19
20
Rosenkopf, L. and Nerkar, A. “On the complexity of technological evolution: Exploring coevolution within and across hierarchical levels in optical disk technology,” in Variations in Organization Science: In Honor of Donald T. Campbell, J.A.C Baum, and B. McKelvey (eds.),
Sage Publications, Thousand Oaks, CA, 1999, pp. 169-183.
21
Sahal, D. Patterns of Technological Innovation. Addison-Wesley, Reading, MA, 1981.
22
23
Sahal, D. “Technological guideposts and innovation avenues,” Research Policy, (14:2), April
1985, pp. 61-82.
24
25
Saviotti, P.P. Technology Evolution, Variety and the Economy, Edward Elgar Publishing, Cheltenham, UK, 1996.
26
27
Saviotti, P.P., and Metcalfe, J.S. “A theoretical approach to construction of technological output
indicators,” Research Policy, (13:3), June 1984, pp. 141-51.
28
29
Shillingford, J. “Sony Ericsson launches Walkmans,” BBC News, February 14, 2005, available at
news.bbc.co.uk/1/hi/business/4265777.stm (last accessed September 17, 2007).
30
31
Smith, M.R. and Marx, L. (eds.) Does Technology Drive History? The Dilemma of Technological Determinism, MIT Press, Cambridge, MA, 1994.
32
33
Sood, A. and Tellis, G.J. “Technological evolution and radical innovation,” Journal of Marketing
(69:3), July 2005, pp. 152-168.
34
35
36
Thornycroft, P. “Designing for speed: Preparing for the 802.11n adoption wave,” The Edge,
Aruba Networks, Sunnyvale, CA, August 6, 2007, available at edge.arubanetworks.com/ article/designed-speed-preparing-802-11n-adoption-wave (last accessed on September 17, 2007).
37
38
39
Tushman, M.L. and Rosenkopf, L. “On the organizational determinants of technological change:
Toward a sociology of technological evolution,” in Research in Organizational Behavior, B.
Staw and L. Cummings (eds.), JAI Press, Greenwich, CT, 1992, pp. 311-347.
48
1
2
3
Van Buskirk, E. “Bragging rights to the world’s first MP3 player,” CNET News, available at
news.com.com/2010-1041_3-5548180.html (last accessed September 17, 2007), January 15,
2005.
4
5
Van de Ven, A.H. “Suggestions for studying strategy process: A research note,” Strategic Management Journal, (13:Special Issue), Summer 1992, pp. 169-188.
6
7
Van de Ven, A.H. and Huber, G.P. “Longitudinal field research methods for studying processes
of organizational change,” Organization Science, (1:3), August 1990, pp. 213-219.
8
9
Van de Ven, A.H. and Poole, M.S. “Methods for studying innovation development in the Minnesota Innovation Research Program,” Organization Science, (1:3), August 1990, pp. 313-335.
10
Weick, K. The Social Psychology of Organizing, Addison-Wesley, Reading, MA, 1979.
11
12
13
Whinston, A.B. and Geng, X. “Operationalizing the essential role of the information technology
artifact in information systems research: Gray areas, pitfalls, and the importance of strategic
ambiguity,” MIS Quarterly, (28:2), June 2004, pp. 149-159.
14
15
Wired News. “Sub Pop enters MP3 domain,” February 24, 1999, available at www.wired.com/
news/culture/0,1284,18107,00.html (last accessed September 17, 2007).
16
17
18
Worlton, J. “Some patterns of technological change in high performance computers,” in Proceedings of Supercomputing 1988, IEEE Computing Society Press, Orlando, FL, November
14-18, 1998, pp. 312-320.
49
1
Table 1. Paths of Influence in a Technology Ecosystem
COMPONENT
PRESENT STATE
(C)
PRODUCT
PRESENT STATE
(P)
INFRASTRUCTURE
PRESENT STATE
(I)
COMPONENT
FUTURE STATE (C*)
Component Evolution
Examples: microprocessors
and Moore's Law, digital camera mega- pixels.
Product-Driven Component
Development
Examples: Blue-ray DVD,
digital encryption technology
PRODUCT
FUTURE STATE (P*)
Design and Compilation
Examples: digital camera,
MP3 players, PCs
INFRASTRUCTURE
FUTURE STATE (I*)
Standards and Infrastructure Development
Examples: XML, RFID
Product Integration and
Evolution
Examples: camera phones,
Wi-Fi-enabled PDAs
Diffusion and Adoption
Examples: digital camera
infrastructure, software
applications designed for
Windows OS
Support Evolution
Examples: growth of mobile cellular phone network, Internet 2.0
Infrastructure-Driven
Infrastructure-Leveraging
Component Development
Product Development
Examples: Internet technologies, Examples: instant messaging
802.11g Wi-Fi equipment
services, picture mail
2
3
Table 2. Timeline of Digital Music Technologies
YEAR
1989
1996
1998
Feb 1999
May 1999
May 2000
Jan 2001
Jul 2001
Oct 2001
Mar 2002
Apr 2003
Oct 2003
Sep 2004
May 2005
Oct 2005
Sep 2006
Aug 2006
July 2007
Sep 2007
EVENT
German MP3 patent
US MP3 patent
First portable MP3 player (32 MB)
Sub Pop distributes MP3 music
Napster founded
Transactional watermarking developed
Apple iTunes music applications released
Napster injunction
10 GB Apple iPod introduced
20 GB iPod for PC introduced
40 GB iPod introduced
Dell DJ introduced
iTunes online music store opens
MSN online music store opens
Yahoo online music store opens
First iPod with video capabilities
iTunes starts selling full length movies
160 GB 1.8 inch HDD introduced
iPhone (MP3 player/phone) introduced
160 GB Video iPod introduced
4
50
1
Table 3. Empirical Methodology Overview
STEP
1. Coding
2. Frequency
Estimation
3. Threshold
Determination
4. Dominant Role
Identification
5. Pattern
Identification
DESCRIPTION
Raw data on technology introductions is coded into the component, product,
and infrastructure roles.
A function of the frequency of all technology introductions over time is estimated.
Based on the proportion of technologies of each role within the overall number of technology introductions, a threshold function is derived for each role.
Actual frequency of technology introductions is compared to threshold function for each role to determine dominant roles in each time period.
Transitions between dominant roles in adjacent time periods are mapped out.
2
3
4
Table 4. Coverage of Interview Questions: Key Issues for Evaluation
ISSUE
Constructs
Logic of
Methodology
Information
Produced
Relationship to
Existing Techniques
DESCRIPTION
Is the ecosystem model, with its technology roles and paths of influence, a useful
approach for representing the evolution of ITs? Does this representation improve managerial capabilities for analysis? Does it aid the processes of IT investment and development decision-making?
Are the qualitative and quantitative methodologies we propose for identifying
trends in technology evolution sound? Do they produce new insights?
Is the information produced by the proposed artifacts useful to practitioners?
Does it aid in IT investment and development decision-making?
Do the proposed artifacts complement existing techniques to provide new insights and improved analysis of IT evolution?
5
51
1
2
Table 5. Overview of the Traditional Technology Forecasting/Modeling Methods and How
Our Approach Complements Them
3
TREND
ANALYSIS
EXPERT
OPINION
Description
Historical trends are
extended into the future
using mathematical and
statistical techniques.
Domain expert opinions
are collected and analyzed.
Examples
Extrapolation, time
series estimation, regression and econometrics, S-curve estimation
Past trends will continue into future.
Delphi method, interviews, questionnaires, idea
generation
Assumptions
Strengths
Quantifiable and databased forecasts, shortterm accuracy
Weaknesses
Requires a significant
amount of data, which
can be difficult to obtain. Can be inaccurate
for long time horizons.
Experts know significantly
more about a domain than
others. Group opinions are
better than individual
opinions.
Experts typically possess
detailed knowledge of
subject matter that produces high-quality forecasts.
Difficult to identify experts. Knowledge is typically implicit (internalized). Group forecasts
may be affected by social
and psychological factors.
A formal quantitative
approach and a representation of the past and current
IT landscape that can
structure discussion
among experts.
MODELING AND
SIMULATION
Simplified representation
of structure and dynamics
of real world created to
forecast or simulate future
outcomes.
Cross-impact analysis,
system dynamics analysis,
path and tree analysis
SCENARIOS
Plausible set of outcomes
for some aspect of future
is created and analyzed.
Complex structures and
processes can be captured
effectively by simplified
models.
Descriptive vs. normative
scenarios, baseline vs.
optimistic vs. pessimistic
scenarios
Imaginative descriptions
can reasonably capture
the full set of future possibilities.
Models reduce complexity
and highlight the most
important factors. Process
of building a model can
provide insights.
Models often ignore qualitative and contextual factors.
Effective way to communicate forecasts. Incorporate a wide range of
qualitative and quantitative data.
Can be highly speculative
and not firmly based in
reality.
A view of relationships
A representation of the
A formal representation
Our Apbetween multiple techstructure of the IT landof the past and present
proach
nologies
that
complescape
that
can
inform
the
ecosystem which can be
Complements and informs indevelopment of a more
used as quantifiable input
ments This
depth analysis of a sinrealistic simulation.
for generating scenarios.
by Method gle technology attribute.
Providing:
Note: Based on the technology forecasting methods discussed in Porter et al. (1991) and Millet and Honton (1991).
4
5
52
1
Figure 1. Example Patterns of Technological Change
C*
2
P*
C*
I*
P*
I*
P*
I*
C
P
I
C
P
I
a) Product Development
b) Product and Infra.
Alignment
c) Feed-forward
C*
P*
I*
C
P
I
C*
P*
I*
C
P
I
e) Incremental
d) Feed-back
3
4
C*
C
P
I
Figure 2. Transformation between Different State Diagram Representations
C*
C
P
I
P*
C
C
P
P
I
I
I*
5
6
53
1
2
Figure 3. Digital Music Technology Evolution Cycles
3
4
5
Figure 4. Digital Music Technology Graph-Based State Diagram
6
7
54
1
2
Figure 5. Estimating the Monthly Frequency of 802.11b Technology Certifications Using a
Polynomial Approximation Function
45
40
Actual Frequency
Polynomial Estimation
Certifications
35
30
25
20
15
10
5
3
4
5
6
6
Se
p0
-0
6
M
ar
5
Se
p0
-0
5
M
ar
4
Se
p0
-0
4
M
ar
3
Se
p0
-0
3
M
ar
2
Se
p0
-0
2
M
ar
1
Se
p0
-0
1
M
ar
0
Se
p0
M
ar
-0
0
0
Figure 6. Proportional Frequency Functions for the Total Number of Certifications and
Each Technology Role
35
Total
Components
Products
Infrastructure
Certifications
30
25
20
15
10
5
6
p0
Se
-0
6
M
ar
5
p0
Se
-0
5
M
ar
4
p0
Se
-0
4
M
ar
3
p0
Se
-0
3
M
ar
2
p0
Se
-0
2
M
ar
1
p0
Se
-0
1
M
ar
0
p0
Se
7
M
ar
-0
0
0
55
Certifications
4
-0
0
p0
M 0
ar
-0
Se 1
p0
M 1
ar
-0
Se 2
p0
M 2
ar
-0
Se 3
p0
M 3
ar
-0
Se 4
p0
M 4
ar
-0
Se 5
p0
M 5
ar
-0
Se 6
p06
Se
M
ar
Certifications
M
ar
-0
Se 0
p00
M
ar
-0
Se 1
p01
M
ar
-0
Se 2
p02
M
ar
-0
Se 3
p03
M
ar
-0
Se 4
p04
M
ar
-0
Se 5
p05
M
ar
-0
Se 6
p06
2
M
ar
-0
Se 0
p0
M 0
ar
-0
Se 1
p0
M 1
ar
-0
Se 2
p0
M 2
ar
-0
Se 3
p0
M 3
ar
-0
Se 4
p0
M 4
ar
-0
Se 5
p05
M
ar
-0
Se 6
p06
Certifications
1
Figure 7. Actual Frequencies of 802.11b Technologies Plotted against Threshold Functions
45
40
802.11b Components
35
Threshold
5-Month Moving Average
Actual Frequency
30
25
20
15
10
5
0
8
7
802.11b Products
6
5
4
3
2
1
0
3
25
802.11b Infrastructure
20
15
10
5
0
56
4
ec
-0
M 2
ar
Ju 03
n0
Se 3
pD 03
ec
-0
M 3
ar
Ju 04
nSe 04
pD 04
ec
-0
M 4
ar
Ju 05
nSe 05
pD 05
ec
-0
M 5
ar
Ju 06
nSe 06
pD 06
ec
-0
6
D
Certifications
ec
-0
M 2
ar
-0
Ju 3
nSe 03
pD 03
ec
-0
M 3
ar
-0
Ju 4
nSe 04
pD 04
ec
-0
M 4
ar
Ju 05
nSe 05
pD 05
ec
-0
M 5
ar
Ju 06
nSe 06
pD 06
ec
-0
6
D
Certifications
ec
-0
M 2
ar
-0
Ju 3
nSe 03
pD 03
ec
-0
M 3
ar
-0
Ju 4
nSe 04
pD 04
ec
-0
M 4
ar
-0
Ju 5
nSe 05
pD 05
ec
-0
M 5
ar
-0
Ju 6
nSe 06
pD 06
ec
-0
6
D
Certifications
1
Figure 8. Actual Frequencies of 802.11g Technologies Plotted against Threshold Functions
60
50
802.11g Components
45
Threshold
5-Month Moving Average
Actual Frequency
40
30
20
10
0
2
25
802.11g Products
20
15
10
5
0
3
50
802.11g Infrastructure
40
35
30
25
20
15
10
5
0
57
1
2
Figure 9. State Diagram for 802.11b and 802.11g Generations
(6-month periods, starting March 2000)
3
4
5
6
Figure 10. State Diagram for the WPA 1 and WPA 2 Generations
(6-month periods, starting March 2000)
C
C
C
C
C
C
C
P
P
P
P
P
P
P
I
I
I
I
I
I
I
C
C
C
C
C
C
P
P
P
P
P
P
I
I
I
I
I
I
11
12
13
WPA1
WPA2
7
7
8
9
10
Period
58
APPENDIX: INTERVIEW SCRIPT
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
Participant name ____________________________________________
Participant organization ______________________________________
Participant title _____________________________________________
1) Present introductory paragraph (Handout 1) to participant.
a. Provide a summary of the introductory paragraph
b. Ask permission to record the interview (audio) and mark that you asked them
2) Gather demographic information (2 minutes)
a. Years of general experience
Less than 5 5-10 More than 10
b. Years of experience in IT industry or research
Less than 5 5-10 More than 10
c. Years of experience making IT related decisions (tech acquisitions, investments,
etc.)
Less than 5 5-10 More than 10
d. How would you rate your knowledge of the IT landscape
low
medium
high
e. Education ______________________________________________
3) Gather information on experience with technology forecasting, IT landscape analysis, etc.
(10 -15 Minutes)
Based on your experience, how are technologies chosen in the information technology (IT)
investment and development decision processes? i.e., How do organizations typically go
about analyzing the IT landscape to discover potential technologies to invest in?
ASK ALL OF THESE TOGETHER UPFRONT (HISTORICAL, CURRENT, FORECASTING)
How important do you think historical technology analysis of is for making decisions about
IT investment/development? (Rate 1-5 and then explain)
1
2
3
4
5
Very Unimportant
33
34
35
36
37
Neither important or
unimportant
Somewhat important
Very important
Please explain
How important do you think evaluating the current landscape of IT is for making investment/development decisions? (Rate 1-5 and then explain)
1
2
3
4
5
Very Unimportant
38
39
Somewhat Unimportant
Somewhat Unimportant
Neither important or
unimportant
Somewhat important
Very important
Please explain
59
1
2
3
How important do you think predicting the future landscape of IT (technology forecasting) is
for making decisions about IT investment/development?
Please Rate
1
2
3
4
5
Very Unimportant
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
Somewhat important
Very important
What types of techniques, methods, or tools have you or your company/organization used (or
are familiar with) to analyze the past, current and future landscape of information technology?
Based on your experience, what are common challenges in IT landscape analysis, forecasting
and the IT investment/development decision making process? In what ways, if any, do you
think existing tools/methods/techniques could be improved?
How effective do you feel existing tools/methods/techniques are for analyzing the technology
landscape and performing technology forecasting?
1
2
3
4
5
Somewhat ineffective
Neither effective or
ineffective
Somewhat effective
Very effective
Please explain
4) Provide handouts H2-1, H2-2, and H2-3 and discuss our proposed theory and method
(10-15 minutes)
a. Discuss the objective/motivation for the proposed technique
b. Go over constructs (with specific examples)
c. Go over paths of influence (with specific examples)
d. Discuss the Music case study
e. Discuss the method of identifying trends
f. Discuss the Wi-Fi example case study
5) Gather reactions to methodology (10-15 minutes)
a. Goal of methodology
How effective do you feel the proposed methodology is in providing a new technique for identifying and analyzing patterns in technology evolution?
1
2
3
4
5
Very ineffective
39
Neither important or
unimportant
Please explain
Very ineffective
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
Somewhat Unimportant
Somewhat ineffective
Neither effective or
ineffective
Somewhat effective
Very effective
Please explain
60
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
b. Roles
Do you feel the use of the component, product, and infrastructure roles help in
understanding the nature of technology evolution? If so, how do you think they
create value?
Are there any missing or unnecessary roles? Please Explain
c. Relationships
Do you feel the method for identifying relationships between technology roles is
provides better understanding about the evolution of focal technology? Please
Explain
Do you feel the classification of paths of influence is complete? Please Explain
What do you think are the strengths and weaknesses of the technology roles and
paths of influence?
d. Logic of the method
Do you feel the method (qualitative and quantitative) for identifying patterns of
technology evolution is sound? Please Explain
Are there any assumptions or steps in the method that seem unreasonable? Please
Explain
e. Information output
Do you feel the information generated using the proposed methodology is useful?
Please Explain
Do you feel the graphical representation of trends is useful? Please Explain
What do you think are the strengths and weaknesses of the information generated
by the proposed methodology?
f. Overall utility of the approach
What is your general reaction to the proposed methodology and its utility for analyzing technology trends?
61
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
If you feel the proposed methodology and approach is useful, how is it useful for
organizations?
Do you feel the proposed conceptual approach and methodology would benefit
organizations making IT forecasts? Please Explain
Do you feel the proposed conceptual approach and methodology would aid in the
IT investment/development decision making process? Please Explain
Overall, what do you feel are the strengths and weaknesses of the proposed conceptual approach and methodology?
Who do you think is the most appropriate user of the proposed conceptual approach and methodology, if any? Please Explain
6) Debriefing
a. Provide the participant with the debriefing handout.
b. Give the participant a summary of the debriefing handout
c. Ask if they have any questions or additional comments
d. Point out the contact information
e. Discuss possibility of a follow up
f. Thank them and give them a thank you gift
62
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
Handout 1: Description of Study and Purpose of Interview
We are a group of information systems researchers from XXXXXXXXXXX XXXXXXXXX
XXXXXXXXXXXX. We are currently developing new methods for analyzing the evolution of
information technology (IT) with the goal of providing useful tools to IT professionals to aid in
the IT investment decision making process. We are conducting interviews with IT industry
managers, IT industry consultants, IT industry researchers, and academic researches to gather
impressions and evaluations of our proposed conceptual approach and methods. This interview
will take approximately 45 minutes and will consist of four parts. First, we will ask for some
background information about you, your organization, and your experience and understanding of
information technology landscape analysis and forecasting. Second, we will present you with a
brief document outlining our proposed conceptual approach and methodology. We will explain
our conceptual approach and methodology using the document as a supplement; we will allow
time for any questions you might have. Third, we will ask for your reactions and evaluation of
the proposed theory and methodology. Fourth, we will perform a short debriefing. Thank you
for your participation. You may quit the interview at any time. Your personal information will
not be shared or published. The input of industry experts and academics is necessary to produce
new tools that are useful, practical, and accessible to our intended users and we highly value your
input.
Do you give us permission to record the audio of this interview?
Yes _________ No _________
63
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
Handout 2-1: Overview of theory and constructs
Motivation
• The IT landscape is complex with many technologies and interdependencies.
• This makes the information technology investment decision making process is difficult.
• Can we create a methodology that systematically identifies patterns in technology evolution to
help inform managers making these decisions?
Technology Ecosystem
• A theoretical construct that is used to represent multiple associated ITs and the interdependent relationships among them over time.
• A technology ecosystem is centered on a focal technology in a certain context and consists of a
set of technologies acting in specific roles and influencing each other through paths of influence.
Focal Technology and Context
• The focal technology and its context are the center of the technology ecosystem. Example: mobile phone in the context of wireless entertainment.
• A technology ecosystem representation is flexible, choosing a different focal technology and/or
context changes the representation.
Technology Roles
• Components are the elemental pieces or subsystems that make up complex technologies. Examples: RAM chip, microprocessor, CMOS sensor.
• Products are built up from a set of components, and are designed to interact with a user to perform a specific set of functions. Examples, MP3 player, digital camera, personal computer.
• Infrastructure technologies work in conjunction or collaboration with (or as a peripheral to)
products to add value to users. Examples: laser printer, Ethernet, network attached storage.
Technology Relationships
• There are clear relationships between the components, products and infrastructure (e.g., digital
camera ecosystem
• Over time, technologies in each role change and evolve which impacts related technologies.
• The Paths of Influence matrix classifies these interactions.
• An evolutionary pattern is identified from multiple paths of influence over time.
COMPONENT
FUTURE STATE (C*)
PRODUCT
FUTURE STATE (P*)
INFRASTRUCTURE
FUTURE STATE (I*)
COMPONENT
PRESENT STATE (C)
Component Evolution
Design and Compilation
Standards and Infrastructure Development
PRODUCT
PRESENT STATE (P)
Product-Driven Component Development
Product Integration and
Evolution
Diffusion and Adoption
INFRASTRUCTURE
PRESENT STATE (I)
Infrastructure-Driven
Component Development
Infrastructure-Leveraging
Product Development
Support Evolution
64
1
Handout 2-2: Overview of qualitative method and example
YEAR
1989
1996
1998
Feb 1999
May 1999
May 2000
Jan 2001
Jul 2001
Oct 2001
Mar 2002
Apr 2003
Oct 2003
EVENT
German MP3 patent
US MP3 patent
First portable MP3 player (32 MB)
Sub Pop distributes MP3 music
Napster founded
Transactional watermarking developed
Apple iTunes music applications released
Napster injunction
10 GB Apple iPod introduced
20 GB iPod for PC introduced
40 GB iPod introduced
Dell DJ introduced
iTunes online music store opens
Sep 2004 MSN online music store opens
May 2005 Yahoo online music store opens
2
3
4
5
6
65
Handout 2-3: Overview of quantitative methodology and example
STEP
1. Coding
2. Frequency
Estimation
3. Threshold
Determination
4. Dominant Role
Identification
5. Pattern
Identification
3
4
DESCRIPTION
Raw data on technology introductions is coded into the component, product,
and infrastructure roles.
A function of the frequency of all technology introductions over time is estimated.
Based on the proportion of technologies within each role within the overall
number of technology introductions, a threshold function is derived for each
role.
Actual frequency of technology introductions is compared to threshold function for each role to determine dominant roles in each time period.
Transitions between dominant roles in adjacent time periods are mapped out.
Threshold Plots
45
8
802.11b Components
40
25
20
15
20
6
Certifications
Certifications
Actual Frequency
30
802.11b Infrastructure
7
5-Month Moving Average
35
25
802.11b Products
Threshold
Certifications
1
2
5
15
4
3
10
2
10
5
1
5
0
M 1
ar
-0
2
p0
M 2
ar
-0
Se 3
p0
M 3
ar
-0
Se 4
p0
M 4
ar
-0
Se 5
p05
M
ar
-0
Se 6
p06
Se
-0
1
p0
M
ar
Se
0
-0
0
p0
M
ar
Se
M 0
ar
-0
1
p0
M 1
ar
-0
Se 2
p0
M 2
ar
-0
Se 3
p0
M 3
ar
-0
Se 4
p0
M 4
ar
-0
Se 5
p0
M 5
ar
-0
Se 6
p06
Se
-0
0
p0
M
ar
0
Se
p01
M
ar
-0
Se 2
p02
M
ar
-0
Se 3
p03
M
ar
-0
Se 4
p04
M
ar
-0
Se 5
p05
M
ar
-0
Se 6
p06
0
-0
1
M
ar
Se
p0
M
ar
5
6
7
Se
-0
0
0
Pattern Identification
8
66
1
2
3
4
5
6
7
Handout 3: Debriefing
Interviewer: XXXXXXXXXXXXXXXXX
Date/Time of Interview ___________________________
Research Team:
XXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXX
8
9
XXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXX
10
11
XXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXX
12
13
XXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXX
14
15
16
17
18
19
20
21
22
23
24
If you wish to follow up with our research team for any reason please contact:
XXXXXXXXXXXXXX
XXXXXXXXXXX
XXXXXXXXXXX
XXXXXXXXXXX
XXXXXXXXXXX
XXXXXXXXXXX
XXXXXXXXXXX
67
Download