Christensen theory of disruptive innovation

Assignment Help Basic Computer Science
Reference no: EM133245622

Question

Christensen's theory of disruptive innovation has been widely applied to not just numerous business fields, but also arenas outside business such as higher education, public schools, health care, and journalism. Lepore (2014) Download Lepore (2014)argues that the ideas of innovation and disruption, employed originally in business, are not applicable to arenas "whose values and goals are remote from the values and goals of business," because, as she argues, "obligations that lie outside the realm of earnings ... are fundamentally different from the obligations that a business executive has to employees, partners, and investors." Do you agree with Lepore that the disruptive innovation theory should not be applied to fields outside business? Explain your position in this debate.

Reference no: EM133245622

Questions Cloud

Profession or occupation uses medical terminology : Besides healthcare professionals what other profession or occupation uses medical terminology?
Preparing passengers invoices and boarding passes : Preparing Passengers invoices, boarding passes - Long term data storage to fulfill the regulations the airport must maintain (keep) the passenger
Business intelligence play bigger role in corporate planning : How can business intelligence play a bigger role in corporate planning? How has business analytics assisted your selected organisation?
Solarwinds breach : In early 2020, hackers secretly broke into Texas-based SolarWinds systems and added malicious code into the company's software system.
Christensen theory of disruptive innovation : Christensen's theory of disruptive innovation has been widely applied to not just numerous business fields,
Responsibilities within information assurance plan : Comprehensively addresses components of information assurance as they relate to individual roles and responsibilities within the information assurance plan.
Evaluates key ethical and legal considerations : Evaluates key ethical and legal considerations related to information assurance that must be taken into account by the key leaders within the organization
Definitions for classifications of confidential-secret : Beside the definitions for classifications of confidential, secret, etc., what other criteria are commonly used to determine the classification of an informatio
Take-away : What is the most important learning that you obtained from the reading and will be helpful to you going forward in your studies and career?

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Conventional computer-aided manufacturing industry

The recent advances in information and communication technology (ICT) has promoted the evolution of conventional computer-aided manufacturing industry

  Biometric identification devices

Research and write Biometric assessment on your company's use of Biometric Identification devices

  Best method for selecting from among

The net present value (NPV) method is considered to be the best method for selecting from among mutually exclusive projects because the NPV method.

  Develop research and data analytical skills

Develop research and data analytical skills for use in solving business problems.

  Write a new trans1t10n table and derive minimal-risk

Write a new trans1t10n table and derive minimal-risk excitation and output equations for the state table in Table 7-5 using the "simple t" state assignment in Table 7-6 and D flip-flops.

  Important to assess and document your education

Why is it important to assess and document your education, training, work experience, and accomplishments?

  Determine the actual operating cost

A heat pump with a coefficient of performance of 3.8 provides energy at an average rate of 75,000 kJ/h to maintain a building at 21°C on a day when the outside temperature is 0°C. If electricity costs 8 cents per

  Identify the internal and external processes

Identify the internal and external processes used by auditors for the organization you choose.

  Develop the truth table for the new portion of the function

(Design Problem) Now consider a different way to achieve the same result. Keep the Calendar system exactly as discussed in class. But, add a new component that takes as inputs the four outputs-d28, d29, d30, and d31-and maps these into the five ou..

  Data storage management

Describe how you manage all of your massive daily data and whether you think you like the system you have or you need to make it better somehow.

  What is the definition of a timsort algorithm

What is the definition of a Timsort algorithm? What distinguishes a Timsort algorithm from others, such as sequential search and binary search?

  Dimensions of management culture comparison chart

This requires skill and competency as a graduate-level student, and the challenge is the entire rationale behind the Discussion Board Forum 6 deliverable.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd