scispace - formally typeset
Search or ask a question

How has the perception of IT as a proprietary asset evolved over the past decade? 


Best insight from top research papers

The perception of IT as a proprietary asset has evolved over the past decade. Initially, there was a belief that IT could not produce competitive advantage and was becoming a commodity . However, the rise of software ecosystems (SECO) and the need for asset governance mechanisms in proprietary SECOs have highlighted the importance of protecting intellectual property and maintaining control over IT assets . The adoption of standards, both proprietary and open source, has also played a role in shaping the perception of IT as a proprietary asset. In the past, mainframe producers sought maximum control over standards architectures, while in the PC era, unintentional surrender of control led to the dominance of Microsoft and Intel . Overall, the perception of IT as a proprietary asset has shifted towards recognizing the need for governance, protection of intellectual property, and strategic control over IT assets in order to achieve competitive advantage .

Answers from top 5 papers

More filters
Papers (5)Insight
The provided paper does not directly address the perception of IT as a proprietary asset over the past decade.
The provided paper does not discuss the perception of IT as a proprietary asset over the past decade.
The provided paper does not directly address the evolution of the perception of IT as a proprietary asset over the past decade.
The provided paper does not directly discuss the perception of IT as a proprietary asset over the past decade.
The provided paper does not discuss the evolution of the perception of IT as a proprietary asset over the past decade.

Related Questions

How do people's perceptions of privacy change over time?5 answersPeople's perceptions of privacy can change over time. A longitudinal panel study found that there are positive relations between the perceived value of privacy, privacy concerns, and privacy protection between individuals. Additionally, the study revealed that a temporal increase in the perceived value of privacy was related to increased protection behaviors at the individual level. This suggests that individual privacy concerns may not be as important for temporal protection as previously assumed, but that a recognition of collective privacy can temporarily change people's privacy behavior. The analysis of focus groups in Slovakia also showed that privacy is a complex phenomenon that is understood as an interplay between different privacy norms guiding specific contexts and more general approaches to privacy. These findings indicate that people's perceptions of privacy can be influenced by both individual and collective considerations, as well as by specific contexts and social norms.
How attitudes about financial risk management have changed over time?4 answersAttitudes about financial risk management have evolved over time. In the 1970s, research laid the foundations for risk management practices that were implemented in the 1980s, revolutionizing Wall Street. The development of financial markets brought both benefits and risks, leading to a growing concern for risk management in financial institutions and governments. Studies have shown that preferences and emotions, such as happiness, anger, and fear, can predict changes in risk attitudes. In Australia, individuals generally reduced their tolerance for risk over time, but certain factors like education, wealth, and self-employment increased the likelihood of risk tolerance. Financial regulators, central banks, and banks have become increasingly preoccupied with risk management, with new regulations and standards like Basel III emphasizing the importance of risk controls. Overall, attitudes about financial risk management have shifted as a result of research, market developments, individual characteristics, and regulatory interventions.
How did IT-services evolve in companies over time?3 answersIT-services in companies have evolved over time. Initially, IT outsourcing started in the form of time sharing in the 1960s, then progressed to the application service provision (ASP) model in the late 90s, and eventually to pure services in the early 2000s. With the rise of the digital economy, enterprises have increasingly shifted towards services, including software as a service, platforms as a service, and infrastructure as a service. The service management system has become an important aspect of business, with processes and documentation being determined according to standard ISO/IEC 20000-1:2018. The growth of the service sector has been influenced by the Internet and the information revolution, leading to the availability of electronic services delivered over the internet. In today's IT market, companies need to incorporate trends such as 'Green IT' and 'Cloud computing', which offer flexible and scalable IT services, such as software as a service and platform as a service.
How does open source storage compare to proprietary storage?5 answersOpen source storage and proprietary storage have different characteristics. Open source storage systems, such as Ceph and Swift, are freely available and offer various features for cloud storage platforms. They have been studied and analyzed extensively, focusing on criteria such as consistency, data placement method, read and write operations, security, and other aspects. On the other hand, proprietary storage systems, like those offered by dCache, provide integrated support for different use-cases, including high throughput data ingest, wide access, and easy integration with existing systems. They also offer features such as quality-of-service management, heterogeneous system support, parallel NFS extension, and delegated authorization schemes. While open source storage lacks formal documentation and research, it can be a cost-effective and ecologically friendly option, suitable for open source hardware projects and DIY settings. In contrast, proprietary storage may offer more advanced features and support, but it often comes at a higher cost and limited accessibility.
How has financial inclusion changed in the last 10 years?3 answersFinancial inclusion has undergone significant changes in the last 10 years. There has been increasing interest in the relationship between poverty, debt, and financial exclusion, as well as the multidirectional causal linkages between financial exclusion and debt. Government regulations, legacy IT systems, and organizational friction have hindered banks from meeting the needs of the unbanked and underbanked, creating opportunities for Fintech firms. Efforts towards financial inclusion have been made in India, with the introduction of Jan-Dhan Accounts and relaxed KYC norms and restrictions on mobile banking. India has also implemented banking sector reforms to improve financial inclusion, but challenges remain in efficiently allocating financial resources and maintaining financial stability. Overall, financial inclusion has become a priority in policy and social developments, with a focus on providing affordable banking services to disadvantaged and low-income groups.
How do students' perceptions of software applications change over time?5 answersStudents' perceptions of software applications can change over time. A study conducted at North Carolina State University found that after experiencing pair programming, most students indicated a stronger preference to work with another student and believed that pairing made them more organized and saved time on homework assignments. Another study conducted in a junior-level software engineering course found that students' perceived top-ranked risks in agile software development teams were remarkably different from previously published checklists, and the risk management strategies adopted by students were inherently collaborative. These findings suggest that students' perceptions of collaboration and risk management in software development can evolve through hands-on experiences and exposure to real-world scenarios.