移动商务风险要素分析与规避策略研究
详细信息    本馆镜像全文|  推荐本文 |  |   获取CNKI官网全文
摘要
随着移动终端设备的发展和普及,包括移动支付、移动股市、移动银行与移动办公等在内的各种移动服务开始走入大众生活。而面对移动商务经营环境的不断变化,每一项新移动服务的开发和经营都面临着如何在价值链层面开展合作、服务推广成本核算和未来收益分析等一系列精细化风险评估过程。虽然目前文献中对移动商务所涉及各方面的风险有一部分研究工作,但缺乏对移动商务进行系统风险评估、模拟和规避的流程和框架。
     在总结前人对移动商务风险研究的基础上,系统分析了移动商务的各类风险要素,将模糊推理技术、实物期权理论、供应链风险管理理论、投资组合理论应用于移动商务领域,为移动商务风险评估与规避引入了新的工具和方法,实现了学术研究的跨领域交叉。主要工作和创新点具体如下:
     首先运用Delphi法调查得出了移动商务风险的10大要素,按照SCP模型将风险要素划分为宏观环境、行业环境和企业运营三个层面,其中宏观环境风险包括经济环境风险、政策环境风险、技术环境风险和文化环境风险,产业环境风险包括同行业竞争风险、服务提供商合作风险和设备制造商合作风险,企业运营风险包括成本管理风险、内部融合风险和客户流失风险。对各风险要素按照重要性程度进行了排序并画出了风险坐标图,并与安永全球电信业风险审计报告的风险要素进行了对比。
     在风险要素调查的基础上,运用模糊认知影响图构建了移动商务风险要素关联模型。分析了短期价格策略、短期促销策略、网络建设投入和长期价格策略的联合风险控制效果。在模糊认知影响图的专家经验提取和模拟分析基础上,得出了如何有效平衡短期收益、短期风险、长期收益和长期风险的四类有代表性的风险控制策略。
     借鉴投资组合理论,提出了在风险对冲条件下不同风险特征的移动服务组合优化模型。按照风险是否可分散将移动商务风险划分为系统风险和非系统风险,分析了不同移动服务的消费者采纳、定价方式、成本构成和生命周期特征等特征差异,基于风险分散原理构建了移动服务组合对冲优化模型,实现了不同移动服务风险相互间更好的自然对冲。得出了不同风险容忍度下面移动服务组合预期收益的变化曲线,为运营商和服务提供商提供了移动服务组合的有效边界。
     在移动商务价值链合作层面具体的风险规避策略上,运用实物期权理论提出了移动商务风险分担的帕累托改进方法。通过实物期权协议,运营商能够购买服务提供商所开发移动服务未来收益的期权,从而实现了根据市场变化对移动服务生命周期内收益和风险价值链双方分担比例的动态调整,因此能够有效降低运营商和服务提供商的价值链合作风险、市场前景风险和成本管理风险。最后通过手机电视实例进行了风险规避有效性验证和灵敏度分析。
As the development and popularization of the mobile terminal equipment, various mobile service began to come into people's life, including mobile payment, mobile marketing, mobile banking and mobile office automation, But when facing with the constant changing of business environment, the development and management of every new mobile service is accompanied with a series of risk problems, such as the value chain cooperation, market promotion cost and forecasting the future profit. The current literatures have studied some aspects of mobile commerce risk. However, still we could find the lack of systematic analysis, evaluation and simulation framework for mobile commerce risk management.
     Based on the literature review of mobile commerce risk analysis, this study conducted a systematic analysis of all kinds of mobile commerce risk factors, with the application of the fuzzy reasoning method, real option theory, supply chain risk management theory and portfolio theory in mobile commerce fields, introducing new tools and methods for the mobile commerce risk assessment and avoidance, achieved the interdisciplinary intersect research for mobile commerce. The main work and highlights of this research can be listed as follows:
     First, this paper used the Delphi method to examine the top 10 risk factors of mobile commerce, which can be categorized into three dimensions of macro-environment risk, industrial risk and operational risk according to the SCP model. The dimensions of macro-environment risk are economic risk, political risk, technological risk and social & cultural risk; The dimension of industrial risk includes competition with other MNOs, cooperation with SPs and cooperation with manufacturers; The operational risk dimension includes cost management risk, consolidation risk and market risk. Then we calculated the risk exposure and risk matrix for each risk factor, comparing with Ernst & Young global telecommunication risk report.
     Based on the survey results of risk factors, using fuzzy cognitive influence diagram, this paper constructed a correlation analysis for mobile commerce risk factors. The risk control tactics using the combination of short-term price strategy, short-term promotion strategy, network construction strategy and long-term price strategy. Using the fuzzy cognitive influence diagram expert experience are extracted and simulation analysis are conducted, from this four types of typical risk control strategy are concluded to make a balance between short-term profit, short-term risk, long-term profit and the long-term risk.
     According to the portfolio theory, this paper categorized the mobile service into four types. According to whether it is diversifiable the mobile commerce risk could be separated into system risk and idiosyncratic risk, we analyzed the features of different mobile service from consumer adoption, pricing, the cost composition and life-cycle characteristic. Then we proposed a mobile service portfolio optimization model based on the risk diversification methodology, thus the best hedging of risk factors can be realized, the curves of profit under the different risk tolerance for the mobile service combination then can be drawn, providing the theoretical basis for the mobile network operators and service providers to achieve a better mobile service portfolio.
     For the specific risk avoidance strategies in the mobile commerce value chain, this paper achieved pareto improvement by the dynamic sharing of mobile commerce risk using real option theory. With the real option contract, the mobile network operators could purchase the option of a mobile service from service providers, thus the dynamic adjustment of returns and risk sharing can be achieved according to market changes in the life cycle of mobile service. So it can effectively reduce the value chain cooperation risk, market risk and cost management risk for both the mobile network operators and service providers. Finally, the risk avoidance effect is proved through mobile TV numerical example and sensitivity analysis is conducted.
引文
1 2010年全国电信业统计公报[R]. 中华人民共和国工业和信息化部,2010
    2 全球首席执行官调查报告[R].普华永道,2004.
    3 企业风险管理指南[R].甫瀚风险咨询,2007.
    [1]The Mobile Internet Report [R]. Morgan Stanley,2009. http://www.morganstanley.com/institutional/techresearch/mobile internet report12 2009.html
    [2]李岩.中国利用后发优势发展成为世界移动商务大国的分析[J].管理世界,2005,(7):162-165.
    [3]2009 Annual Report of Hutchison Whampoa Limited [R]. Hutchison Whampoa Limited,2009.
    [4]Gruber, H. An investment view of mobile telecommunications in the European Union [J]. Telecommunications Policy,1999,23 (7-8):521-538.
    [5]Pagani, M., Fine, C. H. Value network dynamics in 3G-4G wireless communications:A systems thinking approach to strategic value assessment [J]. Journal of Business Research,2008,61 (11):1102-1112.
    [6]Mullins, J. W., Sutherland, D. J. New product development in rapidly changing markets:An exploratory study [J]. Journal of Product Innovation Management, 1998,15 (3):224-236.
    [7]Schwiderski-Grosche, S., Knospe, H. Secure mobile commerce [J]. Electronics & Communication Engineering Journal,2002,14 (5):228-238
    [8]Wu, J.-H., Hisa, T.-L. Analysis of E-commerce innovation and impact:a hypercube model [J]. Electronic Commerce Research and Applications,2004,3 (4):389-404.
    [9]Mahatanankoon, P., Wen, H. J., Lim, B. Consumer-based m-commerce:exploring consumer perception of mobile applications [J]. Computer Standards & Interfaces, 2005,27 (4):347-357.
    [10]Shin, Y., Jeon, H., Choi, M. Analysis of the Consumer Preferences toward M-Commerce Applications Based on an Empirical Study [C]. International Conference on Hybrid Information Technology, Cheju Island,2006.
    [11]Schierholz, R., Kolbe, L. M., Brenner, W. Mobilizing customer relationship management:A journey from strategy to system design [J]. Business Process Management Journal,2007,13 (6):830-852.
    [12]鲁耀斌,陈致豫,董圆圆.我国移动商务供应链分析及其案例研究[J].研究与发展管理,2008,20(1):123-128.
    [13]Tsalgatidou, A., Veijalainen, J. Mobile Electronic Commerce:Emerging Issues [M]. Springer Berlin/Heidelberg,2000.
    [14]Lu, Y., Dong, Y., Wang, B. The mobile business value chain in China:a case study [J]. International Journal of Electronic Business,2007,5 (5):460-477.
    [15]移动梦网SP合作管理办法总则[R].中国移动通信集团广东有限公司,2008.http://wenku.baidu.com/view/846b480f76c66137ee06199d.html
    [16]林家宝,鲁耀斌,张龙.移动服务供应链的收益分配机制研究[J].管理学报,2009,6(7):906-909.
    [17]Nooteboom, B. Innovation and diffusion in small firms:theory and evidence [J]. Small Business Economics,1994,6 (5):327-347.
    [18]Feng, W., Shan, G., Li, Z. Research of Enterprises Independent Innovation Ability Based on the Angle of Projects-Driven [C]. IEEE,2009.
    [19]Sarker, S., Wells, J. D. Understanding mobile handheld device use and adoption [J]. Communications of the Acm,2003,46 (12):35-40.
    [20]Meso, P., Musa, P., Mbarika, V. Towards a model of consumer use of mobile information and communication technology in LDCs:the case of sub-Saharan Africa [J]. Information Systems Journa,2005,15 (2):119-146.
    [21]Yang, K. C. C. Exploring factors affecting the adoption of mobile commerce in Singapore [J]. Telematics and Informatics,2005,22 (3):257-277.
    [22]Sheena Leek, S. C. Consumer confusion in the Thai mobile phone market [J]. Journal of Consumer Behaviour,2006,5 (6):518-532.
    [23]Lee, C. C., Cheng, H. K., Cheng, H. H. An empirical study of mobile commerce in insurance industry:Task-technology fit and individual differences [J]. Decision Support Systems,2007,43 (1):95-110.
    [24]Sawng, Y. W., Han, H. S. Market analysis for the next-generation mobile communications (DMB) service from the perspective of innovation adoption and diffusion [J]. International Journal of Satellite Communications and Networking, 2007,25 (4):323-348.
    [25]Kuo, Y.-F., Yu, C.-W.3G telecommunication operators' challenges and roles:A perspective of mobile commerce value chain [J]. Technovation,2006,26 (12): 1347-1356.
    [26]Choi, S.-K., Lee, M.-H., Chung, G.-H. Competition in Korean mobile telecommunications market:business strategy and regulatory environment [J]. Telecommunications Policy,2001,25 (1-2):125-138.
    [27]Yuan, Y., Zheng, W., Wang, Y., et al. Xiaolingtong versus 3G in China:Which will be the winner? [J]. Telecommunications Policy,2006,30 (5-6):297-313.
    [28]Okazaki, S., Taylor, C. R. What is SMS advertising and why do multinationals adopt it? Answers from an empirical study in European markets [J]. Journal of Business Research,2008,61 (1):4-12.
    [29]Kuo, Y F., Chen, P. C. Selection of mobile value-added services for system operators using fuzzy synthetic evaluation [J]. Expert Systems with Applications, 2006,30:612-620.
    [30]Yeo, J., Huang, W. Mobile E-Commerce Outlook [J]. International Journal of Information Technology & Decision Making,2003,2 (2):313-332.
    [31]Croson, D. C., Fox, J. F., Ashurkov, V. L. Flexible entry strategies for emerging telecom markets [J]. Technological Forecasting and Social Change 57 (1-2):35-52.
    [32]Dewenter, R., Haucap, J. Demand elasticities for mobile telecommunications in Austria [J]. Jahrbucher Fur Nationalokonomie Und Statistik,2008,228 (1):49-63.
    [33]Munnukka, J. Dynamics of price sensitivity among mobile service customers [J]. Journal of Product & Brand Management,2005,14 (1):65-73.
    [34]COSO风险管理整合框架[R].美国COSO(反欺诈交易委员会)-普华永道,2004.http://wenku.baidu.com/view/62777429647d27284b7351f8.html
    [35]中央企业全面风险管理指引[R].国有资产监督管理委员会,2006.http://www.gov.cn/banshi/2006-06/22/content 317160.htm
    [36]Slywotzky, A. J., Drzik, J. Countering the biggest risk of all [J]. Harvard Business Review,2005,83 (4):78-+.
    [37]Miller, K. A framework for integrated risk management in international business [J]. Journal of international business studies,1992,23 (2):311-331.
    [38]Simons, R. Performance Measurement and Control Systems for Implementing Strategy [M]. Pearson Education,1999.
    [39]张良森.企业危机诱因及生成机理实证研究[D].复旦大学博士论文,2007.
    [40]Balachandra, R., Friar, J. H. Factors for success in R&D projects and new product innovation:A contextual framework [J]. Ieee Transactions on Engineering Management,1997,44 (3):276-287.
    [41]Baird, I. S., Thomas, H. Toward a Contingency Model of Strategic Risk Taking [J]. Academy of Management Review,1985,10 (2):230-243,.
    [42]Das, T., Teng, B. Strategic risk behaviour and its temporalities:between risk propensity and decision context [J]. Journal of Management Studies,2001,38 (4): 515-534.
    [43]企业风险管理指南[R].甫瀚风险咨询,2007.http://doc.mbalib.com/view/40702f235db3d3874214f895eb85ba9c.html
    [44]Gerpott, T. J., Jakopin, N. M. The degree of internationalization and the financial performance of European mobile network operators [J]. Telecommunications Policy,2005,29 (8):635-661.
    [45]Kim, S. The development of wireless telecommunications and local governments' policy responses:The US case [J]. Government Information Quarterly,2007,24 (3):611-623.
    [46]Bohlin, E. Business models and financial impacts of future mobile broadband networks [J]. Telematics and Informatics,2007,24 (3):217-237.
    [47]Harmantzis, F. C., Tanguturi, V. P. Investment decisions in the wireless industry applying real options [J]. Telecommunications Policy,2007,31 (2):107-123.
    [48]Tanguturi, V. P., Harmantzis, F. C. Migration to 3G wireless broadband internet and real options:The case of an operator in India [J]. Telecommunications Policy, 2006,30 (7):400-419.
    [49]中华人民共和国工业和信息化部.通信产业“十一五”投资指南:http://www.miit.gov.cn/n11293472/n11293832/n11294357/n11303314/11653015.h tml.
    [50]中华人民共和国工业和信息化部.积极稳妥做好3G牌照发放和推动TD-SCDMA发展工作:http://www.miit.gov.cn/n11293472/n11293832/n11293907/n11368223/11873070.html.
    [51]Han, X., Yu, J. Evaluating 3G licensing patterns for an indigenous standard in China [J]. International Journal of Information Technology & Decision Making, 2008,7 (3):451-470.
    [52]Wallin, M., Marve, T., Hakansson, P. K. Modern wireless telecommunication technologies and their electromagnetic compatibility with life-supporting equipment [J]. Anesthesia and Analgesia,2005,101 (5):1393-1400.
    [53]Mallat, N. Exploring consumer adoption of mobile payments-A qualitative study [J]. Journal of Strategic Information Systems,2007,16 (4):413-432.
    [54]Bones, E., Hasuold, P., Henriksen, E., et al. Risk analysis of information security in a mobile instant messaging and presence system for healthcare [J]. International Journal of Medical Informatics,2007,76 (9):677-687.
    [55]Benjamin, S. M. Spectrum abundance and the choice between private and public control [J]. New York University Law Review,2003,78 (6):2007-2102.
    [56]Westhoff, D., Girao, J., Acharya, M. Concealed data aggregation for reverse multicast traffic in sensor networks:Encryption, key distribution, and routing adaptation [J]. Ieee Transactions on Mobile Computing,2006,5(10):1417-1431.
    [57]Anwar, S. T. NTT DoCoMo and M-Commerce:A Case Study in Market Expansion and Global Strategy [J]. Thunderbird International Business Review,2002,44 (1): 139-164.
    [58]Lembke, J. Mobile commerce and the creation of a marketplace [J]. info,2002,4 (3):50-56.
    [59]Boretos, G. P. The future of the mobile phone business [J]. Technological Forecasting and Social Change,2007,74 (3):331-340.
    [60]Van den Bulte, C., Joshi, Y. V. New product diffusion with Influentials and imitators [J]. Marketing Science,2007,26 (3):400-421.
    [61]Bass, F. M. A new product growth for model consumer durables [J]. Management science,1969,15 (5):215-227.
    [62]Hendler, J., Golbeck, J. Metcalfe's law, Web 2.0, and the Semantic Web [J]. Journal of Web Semantics,2008,6(1):14-20.
    [63]Beck, R., Beimborn, D., Weitzel, T., et al. Network effects as drivers of individual technology adoption:Analyzing adoption and diffusion of mobile communication services [J]. Information Systems Frontiers,2008,10 (4):415-429.
    [64]Tanguturi, V, Harmantzis, F. Migration to 3G wireless broadband internet and real options:The case of an operator in India [J]. Telecommunications Policy,2006,30 (7):400-419.
    [65]Moriarty, R., Kosnik, T. High-tech marketing:concepts, continuity, and change [J]. Sloan Management Review,1989,30 (4):7-17.
    [66]Klepper, S. Entry, Exit, Growth, and Innovation over the Product Life Cycle [J]. American Economic Review,1996,86 (3):562-583.
    [67]Fontanelli, A. System-in-package technology:Opportunities and challenges [C]. 9th International Symposium on Quality Electronic Design, San Jose, CA, Ieee Computer Soc,2008.
    [68]Keil, M., Tiwana, A., Bush, A. Reconciling user and project manager perceptions of IT project risk:a Delphi study [J]. Information Systems Journal,2002,12 (2): 103-119.
    [69]Schmidt, R. Managing Delphi Surveys Using Nonparametric Statistical Techniques [J]. Decision Sciences,1997,28 (3):63-74.
    [70]Dalkey, N. C., Helmer, O. An Experimental Application of the Delphi Method:The Use of Experts [J]. Management Science,1963,9 (3):458-467.
    [71]Linstone, H. A., Turoff, M. The Delphi method:Techniques and applications [M]. Addison-Wesley Publ.,1975.
    [72]Holzmuller, H. H., Schluchter, J. Delphi study about the future of B2B marketplaces in Germany [J]. Electronic Commerce Research and Applications, 2002,1(1):2-19.
    [73]Addison, T. E-commerce project development risks:evidence from a Delphi survey [J]. International Journal of Information Management,2003,23 (1):25-40.
    [74]Delbecq, A. L., Van de Ven, A. H., Gustafson, D. H. Group techniques for program planning:A guide to nominal group and Delphi processes [M]. Green Briar Press, Middleton, WI,1975.
    [75]Adler, M., Ziglio, E. Gazing into the oracle:the Delphi method and its application to social policy and public health [M]. Jessica Kingsley Pub,1996.
    [76]Keil, M., Tiwana, A., Bush, A. Reconciling user and project manager perceptions of IT project risk:a Delphi study [J].2002,12 (2):103-119.
    [77]Boehm, B. W. Software Risk Management:Principles and Practices [J]. IEEE Software,1991,8 (1):32.
    [78]Schmidt, R., Lyytinen, K., Keil, M., et al. Identifying software project risks:An international Delphi study [J]. Journal of Management Information Systems,2001, 17 (4):5-36.
    [79]Cox Jr, A. T. What's wrong with risk matrices? [J]. Risk Analysis,2008,28 (2): 497-512.
    [80]安永全球电信中心.2009年度经营风险报告-电信业[R]. 2009.http://comm.ccidnet.com/art/9163/20090217/1678659 1.html
    [81]Bain, J. S. Industrial organization [M]. John Wiley & Sons,1968.
    [82]Enterprise Risk Management-Integrated Framework [R]. Committee of Sponsoring Organizations of the Treadway Commission,2004.
    [83]Howard, R. A. Bayesian decision models for system engineering [J]. IEEE Transactions on Systems Science and Cybernetics,1965,1 (1):36-40.
    [84]詹原瑞,陈珽.影响图理论方法和应用[M].天津大学出版社,1995.
    [85]Howard, R. A., Matheson, J. E. Influence Diagrams [J]. Decision Analysis,2005,2 (3):127-143.
    [86]Zadeh, L. A. Fuzzy sets [J]. Information and Control 1965,8 (3):338-353.
    [87]Yu, D. H. Modeling and measuring the effects of imprecision in accident management [J]. Annals of Nuclear Energy,2002,29 (7):821-833.
    [88]刘金兰,韩文秀,李光泉.关于工程项目风险分析的模糊影响图方法[J].系统工程学报,1994,9(2):81-88.
    [89]程铁信,王平,张伟波.模糊影响图评价算法的探讨[J].系统工程学报,2004,19(2):177-182.
    [90]陈赟,李晶晶,杨文安.模糊影响图评价高速公路经营风险[J].系统工程,2006,24(3):40-43.
    [91]Rodriguez-Muniz, L. J., Lopez-Diaz, M., Gil, M. A. Solving influence diagrams with fuzzy chance and value nodes [J]. European Journal of Operational Research, 2005,167 (2):444-460.
    [92]Lopez-Diaz, M., Rodriguez-Muniz, L. J. Influence diagrams with super value nodes involving imprecise information [J]. European Journal of Operational Research,2007,179 (1):203-219.
    [93]Kao, H. Y., Li, H. L. A diagnostic reasoning and optimal treatment model for bacteria infections with fuzzy information [J]. Computer Methods and Programs in Biomedicine,2005,77 (1):23-37.
    [94]Kao, H. Y. Diagnostic reasoning and medical decision-making with fuzzy influence diagrams [J]. Computer Methods and Programs in Biomedicine,2008,90 (1):9-16.
    [95]Kelly, G. A. The Psychology of Personal Constructs. [M]. Norton,1955.
    [96]Eden, C. Analyzing cognitive maps to help structure issues or problems [J]. European Journal of Operational Research,2004,159 (3):673-686.
    [97]Kosko, B. Fuzzy cognitive maps [J]. International Journal of Man-Machine Studies, 1986,24(1):65-75.
    [98]刘金兰,韩文秀,李光泉.关于认知影响图方法的研究[J].系统工程学报,1997,12(1):87-95.
    [99]Torra, V. A review of the construction of hierarchical fuzzy systems [J]. International Journal of Intelligent Systems,2002,17 (5):531-543.
    [100]Artzner, P., Delbaen, F., Eber, J. M., et al. Coherent measures of risk [J]. Mathematical Finance,1999,9 (3):203-228.
    [101]Song, Y. S., Yan, J. A. An overview of representation theorems for static risk measures [C].1st IMS China International Conference on Statistics and Probability, Zhejiang, PEOPLES R CHINA,2008.
    [102]Alexander, G. J., Baptista, A. M. A comparison of VaR and CVaR constraints on portfolio selection with the mean-variance model [J]. Management Science,2004, 50(9):1261-1273.
    [103]Allen, R., Athanassopoulos, A., Dyson, R. G., et al. Weights restrictions and value judgements in data envelopment analysis:Evolution, development and future directions [J]. Annals of Operations Research,1997,73:13-34.
    [104]Dyson, R. G., Allen, R., Camanho, A. S., et al. Pitfalls and protocols in DEA [J]. European Journal of Operational Research,2001,132 (2):245-259.
    [105]Banker, R., Charnes, A., Cooper, W. Some models for estimating technical and scale inefficiencies in data envelopment analysis [J]. Management science,1984: 1078-1092.
    [106]Jain, A. K., Murty, M. N., Flynn, P. J. Data clustering:A review [J]. Acm Computing Surveys,1999,31 (3):264-323.
    [107]Keynes, J. A Treatise on Money [M]. London:Macmillan,1930.
    [108]Hicks, J. Value and Capital [M]. Cambridge:Oxford University Press,1939.
    [109]Markowitz, H. Portfolio Selection [J]. The Journal of Finance,1952,7 (1):77-91.
    [110]Sharpe, W. F. A Theory of Market Equilibrium Under Conditions of Risk [J]. Journal of Finance,1964,19 (3):425-442.
    [111]Lintner, J. The Valuation of Risk Assets and the Selection of Risky Investments in Stock Portfolios and Capital Budgets [J]. The Review of Economics and Statistics, 1965,47(1):13-37.
    [112]Mossin, J. Equilibrium in a Capital Asset Market [J]. Econometrica,1966,34 (4): 768-783.
    [113]Black, F. Capital market equilibrium with restricted borrowing [J].1972,45 (3): 444-455.
    [114]Ross, S. A. The arbitrage theory of capital asset pricing [J].1976,13 (3):341-360.
    [115]Chu, P. Y. V., Hsu, Y. L., Fehling, M. A decision support system for project portfolio selection [J]. Computers in Industry,1996,32 (2):141-149.
    [116]Archer, N. P., Ghasemzadeh, F. A decision support system for project portfolio selection [J]. International Journal of Technology Management,1998,16 (1-3): 105-114.
    [117]Archer, N. P., Ghasemzadeh, F. An integrated framework for project portfolio selection [J].1999,17 (4):207-216.
    [118]Ghasemzadeh, F., Archer, N. P. Project portfolio selection through decision support [J]. Decision Support Systems,2000,29 (1):73-88.
    [119]Kumar, R. L. Managing risks in IT projects:an options perspective [J].2002,40 (1):63-74.
    [120]McFarlan, F. W. Portfolio approach to information systems [J]. Harvard Business Review,1981,59 (5):142-150.
    [121]Verhoef, C. Quantitative IT portfolio management [J]. Science of Computer Programming,2002,45 (1):1-96.
    [122]Costa, H. R., Barros, M. D. O., Travassos, G. H. Evaluating software project portfolio risks [J]. Journal of Systems and Software,2007,80 (1):16-31.
    [123]Stamelos, I., Angelis, L. Managing uncertainty in project portfolio cost estimation [J]. Information and Software Technology,2001,43 (13):759-768.
    [124]Ansoff, H. I. Strategies for Diversification [J]. Harvard Business Review,1957,35 (5):113-124.
    [125]Ansoff, H. I. A Model for Diversification [J]. Management Science,1958,4 (4): 392-414.
    [126]Hill, C. W. L., Hoskisson, R. E. Strategy and Structure in the Multiproduct Firm [J]. Academy of Management Review,1987,12 (2):331-341.
    [127]Rugman, A. M. International diversification and the multinational enterprise [M]. Lexington Books, Lexington, MA,1979.
    [128]Pearson, R., Richardson, D. Business networking in the industrial revolution [J]. Economic History Review,2001,54 (4):657-+.
    [129]Palich, L. E., Cardinal, L. B., Miller, C. C. Curvilinearity in the diversification-performance linkage:An examination of over three decades of research [J]. Strategic Management Journal,2000,21 (2):155-174.
    [130]Mansi, S. A., Reeb, D. M. Corporate diversification:What gets discounted? [J]. Journal of Finance,2002,57 (5):2167-2183.
    [131]Werner, S., Brouthers, L. E., Brouthers, K. D. International Risk and Perceived Environmental Uncertainty:The Dimensionality and Internal Consistency of Miller's Measure [J].1996,27 (3).
    [132]Brouthers, L. E., Brouthers, K. D., Werner, S. Perceived environmental uncertainty, entry mode choice and satisfaction with EC-MNC performance [J]. British Journal of Management,2000,11 (3):183-195.
    [133]Phylaktis, K., Xia, L. C. Sources of firms' industry and country effects in emerging markets [J]. Journal of International Money and Finance,2006,25 (3):459-475.
    [134]Eisenmann, T. R. The effects of CEO equity ownership and firm diversification on risk taking [J]. Strategic Management Journal,2002,23 (6):513-534.
    [135]Borghesi, R., Houston, J., Naranjo, A. Value, survival, and the evolution of firm organizational structure [J]. Financial Management,2007,36 (3):5-32.
    [136]Porter, M. Industrial organization and the evolution of concepts for strategic planning:The new learning [J]. Managerial and Decision Economics,1983,4 (3): 172-180.
    [137]Olla, P., Patel, N. V. A value chain model for mobile data service providers [J]. Telecommunications Policy,2002,26 (9-10):551-571.
    [138]Luehrman, T. A. Investment Opportunities as Real Options:Getting Started on the Numbers [J]. Harvard Business Review,1998,76 (4):51-67.
    [139]Luehrman, T. A. Strategy as a Portfolio of Real Options [J]. Harvard Business Review,1998,76 (5):89-99.
    [140]Hult, G., Craighead, C., Ketchen Jr, D. Risk Uncertainty and Supply Chain Decisions:A Real Options Perspective [J]. Decision Sciences,2010,41 (3): 435-458.
    [141]夏健明,陈元志.实物期权理论评述[J].上海金融学院学报,2005,(1):4-13.
    [142]Wang, X., Liu, L. Coordination in a retailer-led supply chain through option contract [J]. International Journal of Production Economics,2007,110 (1-2): 115-127.
    [143]Zhao, Y., Wang, S., Cheng, T., et al. Coordination of supply chains by option contracts:A cooperative game theory approach [J]. European Journal of Operational Research,2010.
    [144]Spinler, S., Huchzermeier, A. The valuation of options on capacity with cost and demand uncertainty [J]. European Journal of Operational Research,2006,171 (3): 915-934.
    [145]任玉珑,米旭明.创业投资生命周期决策方法研究[J].中国软科学,2003,(2):137-139.
    [146]Kumar, R. L.Managing risks in IT projects:an options perspective, Elsevier.40: 63-74.
    [147]Harmantzis, F., Tanguturi, V. Investment decisions in the wireless industry applying real options [J]. Telecommunications Policy,2007,31 (2):107-123.
    [148]Warren, A., Peers, M. Video retailers have day in court-Plaintiffs say supply deals between Blockbuster Inc. and studios violate laws [J]. Wall Street Journal,2002, 10.
    [149]Shapiro, C., Varian, H. Information rules [M]. Harvard business school press Boston, MA,1999.
    [150]Kim, J., Lee, D., Ahn, J. A dynamic competition analysis on the Korean mobile phone market using competitive diffusion model [J]. Computers & Industrial Engineering,2006,51 (1):174-182.
    [151]Gompers, P. A., Lerner, J. The venture capital cycle [M]. The MIT Press,2004.

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700