簡易檢索 / 詳目顯示

研究生: 黃榆珊
Huang, Yu-Shan
論文名稱: 從資安產品到資安服務之數位服務化歷程:以趨勢科技為例
From Cybersecurity Products to Cybersecurity Services: The Digital Servitization Journey of Trend Micro
指導教授: 黃振皓
Huang, Chen-Hao
學位類別: 碩士
Master
系所名稱: 管理學院 - 企業管理學系
Department of Business Administration
論文出版年: 2025
畢業學年度: 113
語文別: 中文
論文頁數: 96
中文關鍵詞: 資訊安全數位服務化制定理論社群控制
外文關鍵詞: Cybersecurity, Digital servitization, Enactment theory, Clan control
相關次數: 點閱:25下載:3
分享至:
查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報
  • 隨著企業對資安的要求提高,「笨重」的資安產品開始面臨嚴峻的市場挑戰。使用者越來越傾向於尋求全方位的資安解決方案,以提升其資安防護的效率和效果,而不再只是依賴如傳統防毒軟體般的單技術設備。這樣的需求轉變,進一步推動資安公司進行「數位服務化 (Digital Servitization)」轉型,從過去以產品為核心的模式,轉向以服務為主導的邏輯。然而,數位服務化的具體發展歷程與資源整合挑戰尚未充分揭示,特別是在資安公司如何有效協調以支持轉型目標方面。
    為了進一步探討此議題,本研究採用質性個案研究,並以全球資安領導廠商——趨勢科技 (Trend Micro) 作為個案,深入探討其數位服務化的轉型歷程,特別聚焦公司凝聚員工這一關鍵資源,以推動協同合作的策略。本研究依據趨勢科技在數位服務化過程中所面臨的不同挑戰,將其轉型歷程分為三個階段:「內部維運團隊的調整」、「外部維運夥伴的策略」、「維運部門和開發部門之間的整合」,並依序分析趨勢科技在各個階段的關鍵行動。本研究的研究貢獻在於深化研究者對數位服務化的理解,並歸納出一套有助於順利推動數位服務化轉型的發展歷程架構,為有意進行轉型之企業提供具體的參考依據。

    As businesses place increasing emphasis on cybersecurity, traditional “heavy” cybersecurity products are facing significant market challenges. Users are gradually seeking comprehensive cybersecurity solutions that enhance both the efficiency and effectiveness of protection, moving away from dependence on single-technology tools like conventional antivirus software. This shift in demand is driving cybersecurity companies toward a transformation known as “digital servitization,” which involves moving from a product-centric model to a service-oriented logic. However, the concrete development process of digital servitization and the challenges of resource integration remain underexplored, particularly regarding how cybersecurity companies can effectively coordinate their internal resources to support the transformation goals.
    To investigate this issue, this study adopts a qualitative case study approach, selecting Trend Micro, a global leader in the cybersecurity industry, as the focal case. The research examines the company’s digital servitization journey, specifically focusing on how it mobilizes and aligns employees as a vital resource to implement strategies that promote cross-functional collaboration. Based on the challenges faced by Trend Micro during digital servitization, we identify three stages in the transformation process: (1) restructuring the internal operations team, (2) achieving strategic alignment with external operations partners, and (3) integrating the operations and development departments. We then analyze the key actions taken at each stage.
    This research contributes to the theoretical understanding of digital servitization by presenting a structured transformation framework that highlights resource orchestration. The results provide practical implications for companies striving to navigate similar service-oriented transitions within the cybersecurity sector.

    摘要 i 誌謝 vi 目錄 vii 表目錄 x 圖目錄 xi 第一章 緒論 1 第一節 研究背景與動機 1 第二節 研究問題與目的 3 第三節 研究範圍與流程 4 第四節 論文架構 7 第二章 文獻探討 8 第一節 數位服務化 (Digital Servitization) 8 一、 理論發展 8 二、 相關研究 10 第二節 制定 (Enactment) 11 一、 理論發展 11 二、 相關研究 13 第三節 社群控制 (Clan Control) 14 一、 理論發展 14 二、 相關研究 16 第四節 靈巧 (Ambidexterity) 18 一、 理論發展 18 二、 相關研究 19 第三章 研究方法與架構 22 第一節 研究方法 22 一、 質性研究 22 二、 個案研究 24 第二節 研究架構 25 第三節 研究對象 27 第四節 資料蒐集與分析 29 一、 資料蒐集 29 二、 資料分析 32 第四章 個案描述 34 第一節 產業概況 34 一、 防毒軟體的介紹 34 二、 防毒軟體的挑戰 36 第二節 個案背景 38 一、 趨勢科技員工的核心價值 38 二、 趨勢科技提供的平台服務 39 三、 趨勢科技的組織改造 41 第五章 個案分析 42 第一節 萌芽期 42 一、 感知挑戰和機會 42 二、 社群認知 43 三、 社群控制 44 四、 靈巧 45 五、 實現數位服務 45 第二節 成長期 46 一、 感知挑戰和機會 46 二、 社群認知 47 三、 社群控制 48 四、 靈巧 49 五、 實現數位服務 50 第三節 成熟期 51 一、 感知挑戰和機會 51 二、 社群認知 52 三、 社群控制 53 四、 靈巧 54 五、 實現數位服務 55 第四節 三階段小結 56 第六章 研究結論與建議 59 第一節 結論與研究貢獻 59 一、 研究發現 59 二、 研究貢獻 60 第二節 研究限制與未來研究方向 61 一、 研究限制 61 二、 未來研究方向 62 參考文獻 63 附錄 82 訪談問題彙整 82

    Adler, P. S., Goldoftas, B., & Levine, D. I. (1999). Flexibility versus efficiency? A case study of model changeovers in the Toyota production system. Organization science, 10(1), 43-68.
    Ahmad, S., Wasim, S., Irfan, S., Gogoi, S., Srivastava, A., & Farheen, Z. (2019). Qualitative v/s. quantitative research-a summarized review. population, 1(2), 2828-2832.
    Ahuja, G., & Morris Lampert, C. (2001). Entrepreneurship in the large corporation: A longitudinal study of how established firms create breakthrough inventions. Strategic management journal, 22(6‐7), 521-543.
    Autio, E., Nambisan, S., Thomas, L. D., & Wright, M. (2018). Digital affordances, spatial affordances, and the genesis of entrepreneurial ecosystems. Strategic Entrepreneurship Journal, 12(1), 72-95.
    Baliga, A., Iftode, L., & Chen, X. (2008). Automated containment of rootkits attacks. computers & security, 27(7-8), 323-334.
    Ballatore, M., Gerrits, L., Kromes, R., Arena, L., & Verdier, F. (2023). Toward the Conception of a Multichain to Meet Users' Future Needs: A Design Science Research Approach to Digital Servitization in the Automotive Industry. IEEE Transactions on Engineering Management, 71, 9994-10008.
    Bandulet, F., Faisst, W., Eggs, H., Otyepka, S., & Wenzel, S. (2010). Software-as-a-Service as disruptive innovation in the enterprise application market. Software-as-a-Service: Anbieterstrategien, Kundenbedürfnisse und Wertschöpfungsstrukturen, 15-29.
    Basit, T. (2003). Manual or electronic? The role of coding in qualitative data analysis. Educational research, 45(2), 143-154.
    Benedettini, O., Neely, A., & Swink, M. (2015). Why do servitized firms fail? A risk-based explanation. International Journal of Operations & Production Management, 35(6), 946-979.
    Bigley, G. A., & Roberts, K. H. (2001). The incident command system: High-reliability organizing for complex and volatile task environments. Academy of Management Journal, 44(6), 1281-1299.
    Birkinshaw, J., & Gibson, C. (2004). Building ambidexterity into an organization. MIT Sloan management review.
    Bourgeois III, L. J. (1980). Strategy and environment: A conceptual integration. Academy of management Review, 5(1), 25-39.
    Brax, S. (2005). A manufacturer becoming service provider–challenges and a paradox. Managing Service Quality: An International Journal, 15(2), 142-155.
    Brock, J. K.-U., & Von Wangenheim, F. (2019). Demystifying AI: What digital transformation leaders can teach you about realistic artificial intelligence. California management review, 61(4), 110-134.
    Brown, J. S., & Duguid, P. (2001). Knowledge and organization: A social-practice perspective. Organization science, 12(2), 198-213.
    Bustinza, O. F., Gomes, E., Vendrell‐Herrero, F., & Tarba, S. Y. (2018). An organizational change framework for digital servitization: Evidence from the Veneto region. Strategic Change, 27(2), 111-119.
    Cao, Z., & Lumineau, F. (2015). Revisiting the interplay between contractual and relational governance: A qualitative and meta-analytic investigation. Journal of operations management, 33, 15-42.
    Cardinal, L. B., Kreutzer, M., & Miller, C. C. (2017). An aspirational view of organizational control research: Re-invigorating empirical work to better meet the challenges of 21st century organizations. Academy of Management Annals, 11(2), 559-592.
    Carter, N. (2014). The use of triangulation in qualitative research. Number 5/September 2014, 41(5), 545-547.
    Chen, T. M., & Robert, J.-M. (2004). The evolution of viruses and worms. In Statistical methods in computer security (pp. 289-310). CRC press.
    Child, J., & McGrath, R. G. (2001). Organizations unfettered: Organizational form in an information-intensive economy. Academy of Management Journal, 44(6), 1135-1148.
    Chirumalla, K., Leoni, L., & Oghazi, P. (2023). Moving from servitization to digital servitization: Identifying the required dynamic capabilities and related microfoundations to facilitate the transition. Journal of Business Research, 158, 113668.
    Chirumalla, K., Reyes, L. G., & Toorajipour, R. (2022). Mapping a circular business opportunity in electric vehicle battery value chain: A multi-stakeholder framework to create a win–win–win situation. Journal of Business Research, 145, 569-582.
    Choi, Y.-H., Li, L., Liu, P., & Kesidis, G. (2010). Worm virulence estimation for the containment of local worm outbreak. computers & security, 29(1), 104-123.
    Choudhury, V., & Sabherwal, R. (2003). Portfolios of control in outsourced software development projects. Information systems research, 14(3), 291-314.
    Chua, C. E. H., Lim, W.-K., Soh, C., & Sia, S. K. (2012). Enacting clan control in complex IT projects: A social capital perspective. Mis Quarterly, 577-600.
    Ciriello, R. F., Richter, A., & Mathiassen, L. (2024). Emergence of creativity in IS development teams: A socio-technical systems perspective. International Journal of Information Management, 74, 102698.
    Cook, S. D., & Brown, J. S. (1999). Bridging epistemologies: The generative dance between organizational knowledge and organizational knowing. Organization science, 10(4), 381-400.
    Cornelissen, J. P., & Clarke, J. S. (2010). Imagining and rationalizing opportunities: Inductive reasoning and the creation and justification of new ventures. Academy of management Review, 35(4), 539-557.
    Cornelissen, J. P., Mantere, S., & Vaara, E. (2014). The contraction of meaning: The combined effect of communication, emotions, and materiality on sensemaking in the Stockwell shooting. Journal of management studies, 51(5), 699-736.
    Creswell, J. W., & Poth, C. N. (2016). Qualitative inquiry and research design: Choosing among five approaches. Sage publications.
    Cui, T., Ye, J. H., & Tan, C. H. (2022). Information technology in open innovation: a resource orchestration perspective. Information & Management, 59(8), 103699.
    Cusumano, M. A., Kahl, S. J., & Suarez, F. F. (2015). Services, industry evolution, and the competitive strategies of product firms. Strategic management journal, 36(4), 559-575.
    Czarniawska, B. (2004). Narratives in social science research.
    Danneels, E. (2003). Tight–loose coupling with customers: The enactment of customer orientation. Strategic management journal, 24(6), 559-576.
    Davis, S. M. (1982). Transforming organizations: The key to strategy is context. Organizational Dynamics, 10(3), 64-80.
    Davoudi, N., Nayeri, N. D., Raiesifar, A., Poortaghi, S., & Ahmadian, S. (2016). Issues of theoretical sampling: A narrative review. Nursing and midwifery studies, 6(2), 1-9.
    de Lima, S. M., Silva, H. K. d. L., Luz, J. H. d. S., Lima, H. J. d. N., Silva, S. L. d. P., de Andrade, A. B., & da Silva, A. M. (2020). Artificial intelligence-based antivirus in order to detect malware preventively.
    Dehalwar, K., & Sharma, S. N. (2024). Exploring the distinctions between quantitative and qualitative research methods. Think India Journal, 27(1), 7-15.
    Denison, D. R., Hooijberg, R., & Quinn, R. E. (1995). Paradox and performance: Toward a theory of behavioral complexity in managerial leadership. Organization science, 6(5), 524-540.
    Dong, C., Liu, Y., Chen, J., Liu, X., Guo, W., & Chen, Y. (2020). An unsupervised detection approach for hardware trojans. IEEE Access, 8, 158169-158183.
    Donkoh, S., & Mensah, J. (2023). Application of triangulation in qualitative research. Journal of Applied Biotechnology and Bioengineering, 10(1), 6-9.
    Drucker, P. F. (1985). Innovation and entrepreneurship. Practice and Principles/Harper & Row.
    Dube, T., Raines, R., Peterson, G., Bauer, K., Grimaila, M., & Rogers, S. (2012). Malware target recognition via static heuristics. computers & security, 31(1), 137-147.
    Dutton, J. E., & Ashford, S. J. (1993). Selling issues to top management. Academy of management Review, 18(3), 397-428.
    Eisenhardt, K. M. (2000). Paradox, spirals, ambivalence: The new language of change and pluralism. Academy of management Review, 25(4), 703-705.
    Eloranta, V., Ardolino, M., & Saccani, N. (2021). A complexity management approach to servitization: the role of digital platforms. International Journal of Operations & Production Management, 41(5), 622-644.
    Fang, E., Palmatier, R. W., & Steenkamp, J.-B. E. (2008). Effect of service transition strategies on firm value. Journal of marketing, 72(5), 1-14.
    Favoretto, C., Mendes, G. H., Oliveira, M. G., Cauchick-Miguel, P. A., & Coreynen, W. (2022). From servitization to digital servitization: How digitalization transforms companies' transition towards services. Industrial Marketing Management, 102, 104-121.
    Feller, J., Finnegan, P., Hayes, J., & O’Reilly, P. (2012). ‘Orchestrating’sustainable crowdsourcing: A characterisation of solver brokerages. The Journal of Strategic Information Systems, 21(3), 216-232.
    Forain, I., de Oliveira Albuquerque, R., Sandoval Orozco, A. L., García Villalba, L. J., & Kim, T.-H. (2017). Endpoint security in networks: An openmp approach for increasing malware detection speed. Symmetry, 9(9), 172.
    Galbraith, J. R. (1982). Designing the innovating organization. Organizational Dynamics, 10(3), 5-25.
    Galunic, D. C., & Eisenhardt, K. M. (2001). Architectural innovation and modular corporate forms. Academy of Management Journal, 44(6), 1229-1249.
    Gavetti, G., & Levinthal, D. (2000). Looking forward and looking backward: Cognitive and experiential search. Administrative Science Quarterly, 45(1), 113-137.
    Gebauer, H., Paiola, M., Saccani, N., & Rapaccini, M. (2021). Digital servitization: Crossing the perspectives of digitization and servitization. In (Vol. 93, pp. 382-388): Elsevier.
    Geer, D., Jardine, E., & Leverett, E. (2020). On market concentration and cybersecurity risk. Journal of Cyber Policy, 5(1), 9-29.
    Gezer, A., Warner, G., Wilson, C., & Shrestha, P. (2019). A flow-based approach for Trickbot banking trojan detection. computers & security, 84, 179-192.
    Ghanad, A. (2023). An overview of quantitative research methods. International journal of multidisciplinary research and analysis, 6(08), 3794-3803.
    Ghemawat, P., & Ricart Costa, J. E. I. (1993). The organizational tension between static and dynamic efficiency. Strategic management journal, 14(S2), 59-73.
    Ghoshal, S., & Bartlett, C. A. (1994). Linking organizational context and managerial action: The dimensions of quality of management. Strategic management journal, 15(S2), 91-112.
    Gill, P., Stewart, K., Treasure, E., & Chadwick, B. (2008). Methods of data collection in qualitative research: interviews and focus groups. British dental journal, 204(6), 291-295.
    Glaser, B. G. (1978). Advances in the methodology of grounded theory: Theoretical sensitivity. University of California.
    Grönroos, C. (2011). A service perspective on business relationships: The value creation, interaction and marketing interface. Industrial Marketing Management, 40(2), 240-247.
    Gupta, A. K., Smith, K. G., & Shalley, C. E. (2006). The interplay between exploration and exploitation. Academy of Management Journal, 49(4), 693-706.
    Haber, N., Fargnoli, M., & Sakao, T. (2020). Integrating QFD for product-service systems with the Kano model and fuzzy AHP. Total Quality Management & Business Excellence, 31(9-10), 929-954.
    Hargadon, A. B., & Bechky, B. A. (2006). When collections of creatives become creative collectives: A field study of problem solving at work. Organization science, 17(4), 484-500.
    Harley, D., & Lee, A. (2007). Heuristic analysis–detecting unknown viruses. White paper] Eset.
    Harris, M. (2001). The rise of anthropological theory: A history of theories of culture. AltaMira Press.
    Henderson, J. C., & Lee, S. (1992). Managing I/S design teams: A control theories perspective. Management Science, 38(6), 757-777.
    Huang, C.-H., & Chou, T.-C. (2023). ICT as a collectively enacted artifact? A collective enactment perspective. Information & Management, 60(8), 103887.
    Huff, A. S. (1982). Industry influences on strategy reformulation. Strategic management journal, 3(2), 119-131.
    Hunter, J. E., & Schmidt, F. L. (2004). Methods of meta-analysis: Correcting error and bias in research findings. Sage.
    Jansen, J. J., George, G., Van den Bosch, F. A., & Volberda, H. W. (2008). Senior team attributes and organizational ambidexterity: The moderating role of transformational leadership. Journal of management studies, 45(5), 982-1007.
    Jardine, E. (2020). The case against commercial antivirus software: Risk homeostasis and information problems in cybersecurity. Risk analysis, 40(8), 1571-1588.
    Järvenpää, A.-T., Eriksson, P. E., & Larsson, J. (2022). Exploring a public client’s control systems in infrastructure projects from a relationship history perspective. Construction Management and Economics, 40(1), 56-71.
    Jaworski, B. J. (1988). Toward a theory of marketing control: environmental context, control types, and consequences. Journal of marketing, 52(3), 23-39.
    Kastalli, I. V., & Van Looy, B. (2013). Servitization: Disentangling the impact of service business model innovation on manufacturing firm performance. Journal of operations management, 31(4), 169-180.
    Katila, R., & Ahuja, G. (2002). Something old, something new: A longitudinal study of search behavior and new product introduction. Academy of Management Journal, 45(6), 1183-1194.
    Kearney, W. D., & Kruger, H. A. (2016). Theorising on risk homeostasis in the context of information security behaviour. Information & Computer Security, 24(5), 496-513.
    Keil, M., Rai, A., & Liu, S. (2013). How user risk and requirements risk moderate the effects of formal and informal control on the process performance of IT projects. European Journal of Information Systems, 22(6), 650-672.
    Kindström, D., & Kowalkowski, C. (2014). Service innovation in product-centric firms: A multidimensional business model perspective. Journal of Business & Industrial Marketing, 29(2), 96-111.
    Kirsch, L. J. (1996). The management of complex tasks in organizations: Controlling the systems development process. Organization science, 7(1), 1-21.
    Kirsch, L. J. (2004). Deploying common systems globally: The dynamics of control. Information systems research, 15(4), 374-395.
    Kirsch, L. J., Ko, D.-G., & Haney, M. H. (2010). Investigating the antecedents of team-based clan control: Adding social capital as a predictor. Organization science, 21(2), 469-489.
    Kirsch, L. J., Sambamurthy, V., Ko, D.-G., & Purvis, R. L. (2002). Controlling information systems development projects: The view from the client. Management Science, 48(4), 484-498.
    Kirsch, L. S. (1997). Portfolios of control modes and IS project management. Information systems research, 8(3), 215-239.
    Kohtamäki, M., Einola, S., & Rabetino, R. (2020). Exploring servitization through the paradox lens: Coping practices in servitization. International journal of production economics, 226, 107619.
    Kohtamäki, M., Parida, V., Oghazi, P., Gebauer, H., & Baines, T. (2019). Digital servitization business models in ecosystems: A theory of the firm. Journal of Business Research, 104, 380-392.
    Kohtamäki, M., Partanen, J., Parida, V., & Wincent, J. (2013). Non-linear relationship between industrial service offering and sales growth: The moderating role of network capabilities. Industrial Marketing Management, 42(8), 1374-1385.
    Kohtamäki, M., Rabetino, R., Einola, S., Parida, V., & Patel, P. (2021). Unfolding the digital servitization path from products to product-service-software systems: Practicing change through intentional narratives. Journal of Business Research, 137, 379-392.
    Kolagar, M., Parida, V., & Sjödin, D. (2022). Ecosystem transformation for digital servitization: A systematic review, integrative framework, and future research agenda. Journal of Business Research, 146, 176-200.
    Kowalkowski, C., Gebauer, H., Kamp, B., & Parry, G. (2017). Servitization and deservitization: Overview, concepts, and definitions. Industrial Marketing Management, 60, 4-10.
    Kowalkowski, C., Kindström, D., & Gebauer, H. (2013). ICT as a catalyst for service business orientation. Journal of Business & Industrial Marketing, 28(6), 506-513.
    Kowalkowski, C., Windahl, C., Kindström, D., & Gebauer, H. (2015). What service transition? Rethinking established assumptions about manufacturers' service-led growth strategies. Industrial Marketing Management, 45, 59-69.
    Kreutzer, M., Walter, J., & Cardinal, L. B. (2015). Organizational control as antidote to politics in the pursuit of strategic initiatives. Strategic management journal, 36(9), 1317-1337.
    Kurke, L. B. (1988). Does adaptation preclude adaptability? Strategy and performance. Institutional patterns and organizations: Culture and environment, 199-222.
    Lakshman, M., Sinha, L., Biswas, M., Charles, M., & Arora, N. K. (2000). Quantitative vs qualitative research methods. The Indian Journal of Pediatrics, 67, 369-377.
    Lant, T. K. (1999). A situated learning perspective on the emergence of knowledge and identity in cognitive communities. Advances in management cognition and organizational information processing, 6, 171-194.
    Latorre, J. M., Cerisola, S., Ramos, A., & Palacios, R. (2009). Analysis of stochastic problem decomposition algorithms in computational grids. Annals of Operations Research, 166, 355-373.
    Legard, R., Keegan, J., & Ward, K. (2003). In-depth interviews. Qualitative research practice: A guide for social science students and researchers, 6(1), 138-169.
    Leonard‐Barton, D. (1992). Core capabilities and core rigidities: A paradox in managing new product development. Strategic management journal, 13(S1), 111-125.
    Lerch, C., & Gotsch, M. (2015). Digitalized product-service systems in manufacturing firms: A case study analysis. Research-technology management, 58(5), 45-52.
    Levinthal, D. A., & March, J. G. (1993). The myopia of learning. Strategic management journal, 14(S2), 95-112.
    Lewis, M. W. (2000). Exploring paradox: Toward a more comprehensive guide. Academy of management Review, 25(4), 760-776.
    Liu, S. (2015). Effects of control on the performance of information systems projects: the moderating role of complexity risk. Journal of operations management, 36, 46-62.
    Liu, S., Zhang, J., Keil, M., & Chen, T. (2010). Comparing senior executive and project manager perceptions of IT project risk: a Chinese Delphi study. Information systems journal, 20(4), 319-355.
    Lu, X.-H., Huang, L.-H., & Heng, M. S. (2006). Critical success factors of inter-organizational information systems—A case study of Cisco and Xiao Tong in China. Information & Management, 43(3), 395-408.
    Lubatkin, M. H., Simsek, Z., Ling, Y., & Veiga, J. F. (2006). Ambidexterity and performance in small-to medium-sized firms: The pivotal role of top management team behavioral integration. Journal of management, 32(5), 646-672.
    Luz Martín‐Peña, M., Díaz‐Garrido, E., & Sánchez‐López, J. M. (2018). The digitalization and servitization of manufacturing: A review on digital business models. Strategic Change, 27(2), 91-99.
    Maitlis, S., & Sonenshein, S. (2010). Sensemaking in crisis and change: Inspiration and insights from Weick (1988). Journal of management studies, 47(3), 551-580.
    Mann, S., & Mann, S. (2016). Research interviews: Modes and types. The research interview: Reflective practice and reflexivity in research processes, 86-113.
    March, J. G. (1991). Exploration and exploitation in organizational learning. Organization science, 2(1), 71-87.
    Matthyssens, P., & Vandenbempt, K. (2008). Moving from basic offerings to value-added solutions: Strategies, barriers and alignment. Industrial Marketing Management, 37(3), 316-328.
    McGill, M. E., Slocum Jr, J. W., & Lei, D. (1992). Management practices in learning organizations. Organizational Dynamics, 21(1), 5-17.
    Meland, P. H., Bayoumy, Y. F. F., & Sindre, G. (2020). The Ransomware-as-a-Service economy within the darknet. computers & security, 92, 101762.
    Merriam, S. B. (2002). Introduction to qualitative research. Qualitative research in practice: Examples for discussion and analysis, 1(1), 1-17.
    Miller, D., & Friesen, P. H. (1986). Porter's (1980) generic strategies and performance: an empirical examination with American data: part I: testing Porter. Organization studies, 7(1), 37-55.
    Miller, J. G. (1978). Living systems. In: McGraw-Hill.
    Mohrman, S. A., Cohen, S. G., & Morhman Jr, A. M. (1995). Designing team-based organizations: New forms for knowledge work. Jossey-Bass.
    Nambisan, S., Wright, M., & Feldman, M. (2019). The digital transformation of innovation and entrepreneurship: Progress, challenges and key themes. Research policy, 48(8), 103773.
    Neely, A. (2008). Exploring the financial consequences of the servitization of manufacturing. Operations management research, 1, 103-118.
    O'Reilly III, C. A., & Tushman, M. L. (2013). Organizational ambidexterity: Past, present, and future. Academy of management Perspectives, 27(4), 324-338.
    Oliva, R., & Kallenberg, R. (2003). Managing the transition from products to services. International journal of service industry management, 14(2), 160-172.
    Opresnik, D., & Taisch, M. (2015). The value of big data in servitization. International journal of production economics, 165, 174-184.
    Orlikowski, W. J. (2000). Using technology and constituting structures: A practice lens for studying technology in organizations. Organization science, 11(4), 404-428.
    Ouchi, W. G. (1979). A conceptual framework for the design of organizational control mechanisms. Management Science, 25(9), 833-848.
    Ouchi, W. G. (1980). Markets, Bureaucracies, and Clans. Administrative Science Quarterly, 129-141.
    Paiola, M., & Gebauer, H. (2020). Internet of things technologies, digital servitization and business model innovation in BtoB manufacturing firms. Industrial Marketing Management, 89, 245-264.
    Pan, S. L., & Tan, B. (2011). Demystifying case research: A structured–pragmatic–situational (SPS) approach to conducting case studies. Information and organization, 21(3), 161-176.
    Patil, B. V., & Jadhav, R. J. (2014). Computer virus and antivirus software a brief review. International Journal of Advances in Management and Economics, 4(2), 1-4.
    Patton, M. Q. (2002). Qualitative research and evaluation methods (Vol. 3). Sage.
    Peretz-Andersson, E., Tabares, S., Mikalef, P., & Parida, V. (2024). Artificial intelligence implementation in manufacturing SMEs: A resource orchestration approach. International Journal of Information Management, 77, 102781.
    Pérez-Sánchez, A., & Palacios, R. (2022). Evaluation of local security event management system vs. standard antivirus Software. Applied Sciences, 12(3), 1076.
    Polit, D. F., & Beck, C. T. (2008). Nursing research: Generating and assessing evidence for nursing practice. Lippincott Williams & Wilkins.
    Porter, M. E., & Heppelmann, J. E. (2014). How smart, connected products are transforming competition. Harvard business review, 92(11), 64-88.
    Powers, W. (1973). Behavior: the control of perception. In: Aldine Pub. Co.
    Raisch, S., & Birkinshaw, J. (2008). Organizational ambidexterity: Antecedents, outcomes, and moderators. Journal of management, 34(3), 375-409.
    Rajala, A., Westerlund, M., Murtonen, M., & Starck, K. (2013). Servitization in a security business: Changing the logic of value creation. Technology Innovation Management Review, 3(8).
    Ravindran, V. (2019). Data analysis in qualitative research. Indian Journal of Continuing Nursing Education, 20(1), 40-45.
    Roulston, K. (2018). Triangulation in qualitative research. Retrieved June, 1, 2020.
    Schmidt, R., Lyytinen, K., Keil, M., & Cule, P. (2001). Identifying software project risks: An international Delphi study. Journal of management information systems, 17(4), 5-36.
    Scott, J. (2017). Signature based malware detection is dead. Institute for Critical Infrastructure Technology.
    Seale, C., Silverman, D., Gubrium, J. F., & Gobo, G. (2003). Qualitative research practice.
    Sheremata, W. A. (2000). Centrifugal and centripetal forces in radical new product development under time pressure. Academy of management Review, 25(2), 389-408.
    Sihag, V., & Rijsdijk, S. A. (2019). Organizational controls and performance outcomes: A meta‐analytic assessment and extension. Journal of management studies, 56(1), 91-133.
    Simsek, Z. (2009). Organizational ambidexterity: Towards a multilevel understanding. Journal of management studies, 46(4), 597-624.
    Singhal, P., & Raul, N. (2012). Malware Detection Module using Machine Learning Algorithms to Assist in Centralized Security in Enterprise Networks. International Journal of Network Security & Its Applications, 4(1), 61.
    Sitkin, S. B., Long, C. P., & Cardinal, L. B. (2020). Assessing the control literature: Looking back and looking forward. Annual review of organizational psychology and organizational behavior, 7(1), 339-368.
    Sjödin, D., Parida, V., Palmié, M., & Wincent, J. (2021). How AI capabilities enable business model innovation: Scaling AI through co-evolutionary processes and feedback loops. Journal of Business Research, 134, 574-587.
    Smircich, L., & Stubbart, C. (1985). Strategic management in an enacted world. Academy of management Review, 10(4), 724-736.
    Sproull, L. S., & Goodman, P. S. (1990). Technology and organizations: Integration and opportunities. Technology and organizations, 254-265.
    Starman, A. B. (2013). The case study as a type of qualitative research. Journal of Contemporary Educational Studies/Sodobna Pedagogika, 64(1).
    Strauss, A., & Corbin, J. (1990). Basics of qualitative research (Vol. 15). sage Newbury Park, CA.
    Strauss, A., & Corbin, J. (1998). Basics of qualitative research techniques.
    Struyf, B., Galvani, S., Matthyssens, P., & Bocconcelli, R. (2021). Toward a multilevel perspective on digital servitization. International Journal of Operations & Production Management, 41(5), 668-693.
    Stuckey, H. L. (2013). Three types of interviews: Qualitative research methods in social health. Journal of Social Health and Diabetes, 1(02), 056-059.
    Suarez, F. F., Cusumano, M. A., & Kahl, S. J. (2013). Services and the business models of product firms: An empirical analysis of the software industry. Management Science, 59(2), 420-435.
    Suppatvech, C., Godsell, J., & Day, S. (2019). The roles of internet of things technology in enabling servitized business models: A systematic literature review. Industrial Marketing Management, 82, 70-86.
    Sutton, J., & Austin, Z. (2015). Qualitative research: Data collection, analysis, and management. The Canadian journal of hospital pharmacy, 68(3), 226.
    Tashakkori, A., & Teddlie, C. (2010). Sage handbook of mixed methods in social & behavioral research. sage.
    Tenhiälä, A., & Helkiö, P. (2015). Performance effects of using an ERP system for manufacturing planning and control under dynamic market requirements. Journal of operations management, 36, 147-164.
    Tiwana, A. (2008). Does technological modularity substitute for control? A study of alliance performance in software outsourcing. Strategic management journal, 29(7), 769-780.
    Tiwana, A., & Keil, M. (2007). Does peripheral knowledge complement control? An empirical test in technology outsourcing alliances. Strategic management journal, 28(6), 623-634.
    Towry, K. L. (2003). Control in a teamwork environment—The impact of social ties on the effectiveness of mutual monitoring contracts. The Accounting Review, 78(4), 1069-1095.
    Tronvoll, B., Sklyar, A., Sörhammar, D., & Kowalkowski, C. (2020). Transformational shifts through digital servitization. Industrial Marketing Management, 89, 293-305.
    Ulaga, W., & Eggert, A. (2006). Value-based differentiation in business relationships: Gaining and sustaining key supplier status. Journal of marketing, 70(1), 119-136.
    Van Manen, M. (2016). Researching lived experience: Human science for an action sensitive pedagogy. Routledge.
    Vandermerwe, S., & Rada, J. (1988). Servitization of business: Adding value by adding services. European management journal, 6(4), 314-324.
    Vargo, S. L., & Lusch, R. F. (2008). Service-dominant logic: continuing the evolution. Journal of the Academy of marketing Science, 36, 1-10.
    Vendrell-Herrero, F., Bustinza, O. F., Parry, G., & Georgantzis, N. (2017). Servitization, digitization and supply chain interdependency. Industrial Marketing Management, 60, 69-81.
    Volberda, H. W., & Lewin, A. Y. (2003). Co‐evolutionary dynamics within and between firms: From evolution to co‐evolution. Journal of management studies, 40(8), 2111-2136.
    Wallace, L., Keil, M., & Rai, A. (2004a). How software project risk affects project performance: An investigation of the dimensions of risk and an exploratory model. Decision sciences, 35(2), 289-321.
    Wallace, L., Keil, M., & Rai, A. (2004b). Understanding software project risk: a cluster analysis. Information & Management, 42(1), 115-125.
    Walsham, G. (2006). Doing interpretive research. European Journal of Information Systems, 15(3), 320-330.
    Weick. (1993). The solapse of sensemaking in organisations: The Mann Gulch disasters'. Administrative Science Quarterly, 38(4), 628-652.
    Weick, K. E. (1988). Enacted sensemaking in crisis situations [1]. Journal of management studies, 25(4), 305-317.
    Weick, K. E. (2010). Reflections on enacted sensemaking in the Bhopal disaster. Journal of management studies, 47(3), 537-550.
    Weick, K. E., & Sutcliffe, K. M. (2003). Hospitals as cultures of entrapment: A re-analysis of the Bristol Royal Infirmary. California management review, 45(2), 73-84.
    Weick, K. E., Sutcliffe, K. M., & Obstfeld, D. (2005). Organizing and the process of sensemaking. Organization science, 16(4), 409-421.
    Weick, K. E., & Weick, K. E. (1995). Sensemaking in organizations (Vol. 3). Sage publications Thousand Oaks, CA.
    Wilkins, A. L., & Ouchi, W. G. (1983). Efficient cultures: Exploring the relationship between culture and organizational performance. Administrative Science Quarterly, 468-481.
    Wong, L. P. (2008). Data analysis in qualitative research: A brief guide to using NVivo. Malaysian family physician: the official journal of the Academy of Family Physicians of Malaysia, 3(1), 14.
    Yin, R. K. (2003). Case Study Research: Design and Methods (Vol. 5). SAGE.
    Yin, R. K. (2009). Case study research: Design and methods (Vol. 5). sage.
    Zhang, W., & Banerji, S. (2017). Challenges of servitization: A systematic literature review. Industrial Marketing Management, 65, 217-227.
    Zimmermann, A., Raisch, S., & Birkinshaw, J. (2015). How is ambidexterity initiated? The emergent charter definition process. Organization science, 26(4), 1119-1139.
    Zuo, Z.-h., Zhu, Q.-x., & Zhou, M.-t. (2006). Infection, imitation and a hierarchy of computer viruses. computers & security, 25(6), 469-473.

    下載圖示 校內:立即公開
    校外:立即公開
    QR CODE