{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,12,19]],"date-time":"2023-12-19T15:18:41Z","timestamp":1702999121747},"reference-count":56,"publisher":"Emerald","issue":"2","license":[{"start":{"date-parts":[[2010,6,8]],"date-time":"2010-06-08T00:00:00Z","timestamp":1275955200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.emerald.com\/insight\/site-policies"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010,6,8]]},"abstract":"Purpose<\/jats:title>During hyper\u2010competition, disruptive technological innovations germinate causing significant changes in software development organizations' (SDOs) knowledge. The scope and flexibility of the SDO's knowledge base increases; its volatility and the demand for efficiency grows. This creates germane needs to translate abstract knowledge into workable knowledge fast while delivering solutions. The aim of this article is to examine SDOs' responses to such learning challenges through an inductive, theory\u2010generating study which addresses the question: how did some SDOs successfully learn under these circumstances?<\/jats:p><\/jats:sec>Design\/methodology\/approach<\/jats:title>The article takes the form of an exploratory, theory\u2010building case study investigating seven SDOs' web\u2010development activities and associated changes in their learning routines during the dot\u2010com boom.<\/jats:p><\/jats:sec>Findings<\/jats:title>The SDOs increased their ability to learn broadly, deeply, and quickly \u2013 a learning contingency referred as \u201chyper\u2010learning\u201d \u2013 by inventing, selecting and configuring learning routines. Two sets of learning routines enabled broad and flexible exploratory\u2010knowledge identification and exploratory\u2010knowledge assimilation: distributed gate\u2010keeping; and brokering of external knowledge. Likewise, two sets of learning routines enabled fast and efficient exploitative\u2010knowledge transformation and exploitation: simple design rules; and peer networks. The authors further observed that SDOs created systemic connections between these routines allowing for fast switching and dynamic interlacing concurrently within the same organizational sub\u2010units. The authors refer to this previously unidentified form of organizational learning as parallel ambidexterity.<\/jats:p><\/jats:sec>Originality\/value<\/jats:title>The study contributes to organizational learning theories as applied to SDOs by recognizing a condition where knowledge scope, flexibility, efficiency and volatility increase. It also argues a new form of ambidexterity, parallel ambidexterity, was created and implemented in response to this set of requirements. Parallel ambidexterity differs from traditional exploitative forms where SDOs focus on improving and formalizing their operational knowledge and improving efficiency. It also differs from traditional explorative forms where SDOs focus on identifying and grafting and distributing external abstract knowledge by expanding knowledge scope, flexibility. Most importantly, parallel ambidexterity differs from the widely recognized forms of sequential and structural ambidexterity because exploration and exploitation take place at the same time within the same unit in holographic ways to address volatility. Here learning outcome are applied directly and fast to the tasks for which the learning was initiated.<\/jats:p><\/jats:sec>","DOI":"10.1108\/09593841011052156","type":"journal-article","created":{"date-parts":[[2010,5,29]],"date-time":"2010-05-29T11:00:23Z","timestamp":1275130823000},"page":"165-192","source":"Crossref","is-referenced-by-count":25,"title":["Learning routines and disruptive technological change"],"prefix":"10.1108","volume":"23","author":[{"given":"Kalle","family":"Lyytinen","sequence":"first","affiliation":[]},{"given":"Gregory","family":"Rose","sequence":"additional","affiliation":[]},{"given":"Youngjin","family":"Yoo","sequence":"additional","affiliation":[]}],"member":"140","reference":[{"key":"key2022020319591665500_b1","doi-asserted-by":"crossref","unstructured":"Attewell, P. (1992), \u201cTechnology diffusion and organizational learning: the case of business computing\u201d, Organization Science, Vol. 3 No. 1, pp. 1\u201019.","DOI":"10.1287\/orsc.3.1.1"},{"key":"key2022020319591665500_b2","doi-asserted-by":"crossref","unstructured":"Baldwin, C.Y. and Clark, K.B. (2000), Design Rules: The Power of Modularity, MIT Press, Cambridge, MA.","DOI":"10.7551\/mitpress\/2366.001.0001"},{"key":"key2022020319591665500_b56","doi-asserted-by":"crossref","unstructured":"Basu, A. and Kumar, A. (2002), \u201cResearch commentary: workflow management systems in e\u2010business\u201d, Informatino Systems Research, Vol. 13 No. 1, March, pp. 1\u201014.","DOI":"10.1287\/isre.13.1.1.94"},{"key":"key2022020319591665500_b3","doi-asserted-by":"crossref","unstructured":"Benner, M.J. and Tushman, M.L. (2003), \u201cExploitation, exploration, and process management: the productivity dilemma revisited\u201d, Academy of Management Review, Vol. 28 No. 2, pp. 238\u201056.","DOI":"10.5465\/amr.2003.9416096"},{"key":"key2022020319591665500_b4","doi-asserted-by":"crossref","unstructured":"Bergman, M., Lyytinen, K. and Mark, G. (2007), \u201cDesign boundary objects: an ecological view of design artifacts\u201d, Journal of the AIS, Vol. 8 No. 11, pp. 546\u201068.","DOI":"10.17705\/1jais.00144"},{"key":"key2022020319591665500_b5","doi-asserted-by":"crossref","unstructured":"Brown, S.L. and Eisenhardt, K.M. (1997), \u201cThe art of continuous change: linking complexity theory and time\u2010paced evolution in relentlessly shifting organizations\u201d, Administrative Science Quarterly, Vol. 42, pp. 1\u201034.","DOI":"10.2307\/2393807"},{"key":"key2022020319591665500_b6","doi-asserted-by":"crossref","unstructured":"Cohen, W.M. and Levinthal, D.A. (1990), \u201cAbsorptive capacity: a new perspective on learning and innovation\u201d, Administrative Science Quarterly, Vol. 35, pp. 128\u201052.","DOI":"10.2307\/2393553"},{"key":"key2022020319591665500_b7","unstructured":"D'Aveni, R.A. (1994), Hyper\u2010competition: Managing the Dynamics of Strategic Maneuvering, The Free Press, New York, NY."},{"key":"key2022020319591665500_b8","doi-asserted-by":"crossref","unstructured":"Dierickx, I. and Cool, K. (1989), \u201cAsset stock accumulation and sustainability of competitive advantage\u201d, Management Science, Vol. 35 No. 12, pp. 1504\u201011.","DOI":"10.1287\/mnsc.35.12.1504"},{"key":"key2022020319591665500_b9","doi-asserted-by":"crossref","unstructured":"Eisenhardt, K.M. (1989), \u201cBuilding theories from case study research\u201d, Academy of Management Review, Vol. 14 No. 4, pp. 532\u201050.","DOI":"10.5465\/amr.1989.4308385"},{"key":"key2022020319591665500_b10","doi-asserted-by":"crossref","unstructured":"Eisenhardt, K.M. and Graebner, M. (2007), \u201cTheory building from cases: opportunities and challenges\u201d, Academy of Management Journal, Vol. 50 No. 1, pp. 25\u201032.","DOI":"10.5465\/amj.2007.24160888"},{"key":"key2022020319591665500_b11","doi-asserted-by":"crossref","unstructured":"Eisenhardt, K.M. and Martin, J.A. (2000), \u201cDynamic capabilities: what are they?\u201d, Strategic Management Journal, Vol. 21, pp. 1105\u201021.","DOI":"10.1002\/1097-0266(200010\/11)21:10\/11<1105::AID-SMJ133>3.0.CO;2-E"},{"key":"key2022020319591665500_b12","doi-asserted-by":"crossref","unstructured":"Eisenhardt, K.M. and Tabrizi, B.N. (1995), \u201cAccelerating adaptive processes: product innovation in the global computer industry\u201d, Administrative Science Quarterly, Vol. 40, pp. 84\u2010110.","DOI":"10.2307\/2393701"},{"key":"key2022020319591665500_b13","doi-asserted-by":"crossref","unstructured":"Feldman, M. and Pentland, B. (2003), \u201cReconceptualizing organizational routines as a source of flexibility and change\u201d, Administrative Science Quarterly, Vol. 48, pp. 94\u2010118.","DOI":"10.2307\/3556620"},{"key":"key2022020319591665500_b14","unstructured":"Galbraith, J. (1973), Designing Complex Organizations, Addison\u2010Wesley, Reading, MA."},{"key":"key2022020319591665500_b55","doi-asserted-by":"crossref","unstructured":"Girard, M. and Stark, D. (2002), \u201cDistributing intelligence and organizing diversity in new media projects\u201d, Environment and Planning A, Vol. 34 No. 11, pp. 1927\u201049.","DOI":"10.1068\/a34197"},{"key":"key2022020319591665500_b15","doi-asserted-by":"crossref","unstructured":"Grant, R.M. (1996), \u201cProspering in dynamically\u2010competitive environments: organizational capability as knowledge integration\u201d, Organization Science, Vol. 7 No. 4, pp. 375\u201087.","DOI":"10.1287\/orsc.7.4.375"},{"key":"key2022020319591665500_b17","doi-asserted-by":"crossref","unstructured":"Gupta, A., Smith, K. and Shalley, C. (2006), \u201cThe interplay between exploration and exploitation\u201d, Academy of Management Journal, Vol. 49, pp. 693\u2010706.","DOI":"10.5465\/amj.2006.22083026"},{"key":"key2022020319591665500_b18","unstructured":"Hedberg, B. (1981), \u201cHow organizations learn and unlearn\u201d, in Nystrom, P. and Starbuck, W. (Eds), Handbook of Organizational Design, Oxford University Press, New York, NY, pp. 1\u201027."},{"key":"key2022020319591665500_b19","doi-asserted-by":"crossref","unstructured":"Holmqvist, M. (2004), \u201cExperiential learning processes of exploitation and exploration within and between organization: an empirical study of product development\u201d, Organization Science, Vol. 15 No. 1, pp. 70\u201081.","DOI":"10.1287\/orsc.1030.0056"},{"key":"key2022020319591665500_b20","doi-asserted-by":"crossref","unstructured":"Humphrey, W. (1989), Managing the Software Process, Addison\u2010Wesley Professional, New York, NY.","DOI":"10.1080\/09332480.1989.10554934"},{"key":"key2022020319591665500_b21","doi-asserted-by":"crossref","unstructured":"Iivari, J., Hirschheim, R. and Klein, H.K. (2004), \u201cTowards a distinctive body of knowledge for information systems experts: coding ISD process knowledge in two IS journals\u201d, Information Systems Journal, Vol. 14 No. 4, pp. 313\u201042.","DOI":"10.1111\/j.1365-2575.2004.00177.x"},{"key":"key2022020319591665500_b22","doi-asserted-by":"crossref","unstructured":"Jansen, J., Van Den Boschand, F.A. and Volberda, H.W. (2005), \u201cManaging potential and realized absorptive capacity: how do organizational antecedents matter?\u201d, Academy of Management Journal, Vol. 48 No. 6, pp. 999\u20101015.","DOI":"10.5465\/amj.2005.19573106"},{"key":"key2022020319591665500_b23","doi-asserted-by":"crossref","unstructured":"Kellogg, K.C., Orlikowski, W.J. and Yates, J. (2006), \u201cLife in the trading zone: structuring coordination across boundaries in postbureaucratic organizations\u201d, Organization Science, Vol. 17 No. 1, pp. 22\u201044.","DOI":"10.1287\/orsc.1050.0157"},{"key":"key2022020319591665500_b24","doi-asserted-by":"crossref","unstructured":"Kogut, B. and Zander, U. (1992), \u201cKnowledge of the firm, combinative capabilities and the replication of technology\u201d, Organization Science, Vol. 3 No. 3, pp. 383\u201097.","DOI":"10.1287\/orsc.3.3.383"},{"key":"key2022020319591665500_b25","unstructured":"Kurzweil, A. (2001), \u201cThe law of accelerating returns\u201d, available at: www.kurzweilai.net\/articles (accessed 10 October 2007)."},{"key":"key2022020319591665500_b29","doi-asserted-by":"crossref","unstructured":"Leifer, R. and Delbecq, A. (1978), \u201cOrganizational\/environmental interchange: a model of boundary\u2010spanning activity\u201d, Academy of Management Review, Vol. 3 No. 1, pp. 40\u201050.","DOI":"10.5465\/amr.1978.4296354"},{"key":"key2022020319591665500_b31","doi-asserted-by":"crossref","unstructured":"Lewin, A.Y. and Volberda, H.W. (1999), \u201cProlegomena on coevolution: a framework for research on strategy and new organizational forms\u201d, Organization Science, Vol. 10 No. 5, pp. 519\u201034.","DOI":"10.1287\/orsc.10.5.519"},{"key":"key2022020319591665500_b32","unstructured":"Lyytinen, K. (1987), \u201cA taxonomic perspective of information systems development: theoretical constructs and recommendations\u201d, in Boland, R. and Hirschheim, R. (Eds), Critical Issues in Information Systems, John Wiley, Chichester, pp. 3\u201043."},{"key":"key2022020319591665500_b33","doi-asserted-by":"crossref","unstructured":"Lyytinen, K. and Rose, G.M. (2003), \u201cThe disruptive nature of information technology innovations: the case of internet\u2010computing in systems development organizations\u201d, MIS Quarterly, Vol. 27 No. 4, pp. 557\u201096.","DOI":"10.2307\/30036549"},{"key":"key2022020319591665500_b35","doi-asserted-by":"crossref","unstructured":"Lyytinen, K. and Robey, D. (1999), \u201cLearning failure in information system development\u201d, Information Systems Journal, Vol. 9 No. 2, pp. 85\u2010101.","DOI":"10.1046\/j.1365-2575.1999.00051.x"},{"key":"key2022020319591665500_b36","doi-asserted-by":"crossref","unstructured":"MacCormack, A., Vergantiand, R. and Iansiti, M. (2001), \u201cDeveloping products on \u2018internet time\u2019: anatomy of a flexible development process\u201d, Management Science, Vol. 471 No. 1, pp. 133\u201050.","DOI":"10.1287\/mnsc.47.1.133.10663"},{"key":"key2022020319591665500_b37","doi-asserted-by":"crossref","unstructured":"March, J.G. (1991), \u201cExploration and exploitation in organizational learning\u201d, Organization Science, Vol. 2 No. 1, pp. 71\u201087.","DOI":"10.1287\/orsc.2.1.71"},{"key":"key2022020319591665500_b40","unstructured":"Nelson, R.R. and Winter, S.G. (1982), An Evolutionary Theory of Economic Change, Belknap Press, Cambridge, MA."},{"key":"key2022020319591665500_b41","unstructured":"Pries\u2010Heje, J., Baskerville, R.L., Levine, L. and Ramesh, B. (2004), \u201cThe high speed balancing game: how software companies cope with internet speed\u201d, Scandinavian Journal of Information Systems, Vol. 16 No. 1, pp. 11\u201054."},{"key":"key2022020319591665500_b42","doi-asserted-by":"crossref","unstructured":"Sambamurthy, V. and Zmud, R.W. (2000), \u201cThe organizing logic for an enterprise's IT activities in the digital era: a prognosis of practice and a call for research\u201d, Information Systems Research, Vol. 11 No. 2, pp. 105\u201014.","DOI":"10.1287\/isre.11.2.105.11780"},{"key":"key2022020319591665500_b43","doi-asserted-by":"crossref","unstructured":"Slaughter, S.A., Levine, L., Ramesh, B., Pries\u2010Hejeand, J. and Baskerville, R.L. (2006), \u201cAligning software process with strategy\u201d, MIS Quarterly, Vol. 30 No. 4, pp. 891\u2010918.","DOI":"10.2307\/25148758"},{"key":"key2022020319591665500_b44","doi-asserted-by":"crossref","unstructured":"Straub, D.W. and Watson, R.T. (2001), \u201cTransformational issues in researching IS and net\u2010enabled organizations\u201d, Information Systems Research, Vol. 12 No. 4, pp. 337\u201045.","DOI":"10.1287\/isre.12.4.337.9706"},{"key":"key2022020319591665500_b45","unstructured":"Strauss, A. and Corbin, J. (1990), Basics of Qualitative Research: Grounded Theory Procedure and Techniques, Sage, Newsbury Park, CA."},{"key":"key2022020319591665500_b46","doi-asserted-by":"crossref","unstructured":"Thomke, S. (1998), \u201cKnowledge experimentation in the design of new products\u201d, Management Science, Vol. 44 No. 6, pp. 743\u201062.","DOI":"10.1287\/mnsc.44.6.743"},{"key":"key2022020319591665500_b49","doi-asserted-by":"crossref","unstructured":"Tushman, M. and O'Reilly, C. (1996), \u201cAmbidextrous organization: managing evolutionary and revolutionary change\u201d, California Management Review, Vol. 38, pp. 1\u201023.","DOI":"10.2307\/41165852"},{"key":"key2022020319591665500_b48","doi-asserted-by":"crossref","unstructured":"Tushman, M.L. and Anderson, P. (1986), \u201cTechnological discontinuties and organizational environments\u201d, Administrative Science Quarterly, Vol. 31, pp. 439\u201065.","DOI":"10.2307\/2392832"},{"key":"key2022020319591665500_b50","doi-asserted-by":"crossref","unstructured":"Van Den Bosch, F.A., Volberdaand, H.W. and de Boer, M. (1999), \u201cCoevolution of firm absorptive capacity and knowledge environment: organizational forms and combinative capabilities\u201d, Organization Science, Vol. 10 No. 5, pp. 551\u201068.","DOI":"10.1287\/orsc.10.5.551"},{"key":"key2022020319591665500_b51","doi-asserted-by":"crossref","unstructured":"Winter, S.G. and Szulanski, G. (2001), \u201cReplication as strategy\u201d, Organization Science, Vol. 12 No. 6, pp. 730\u201043.","DOI":"10.1287\/orsc.12.6.730.10084"},{"key":"key2022020319591665500_b52","unstructured":"Yin, R.K. (2003), Case Study Research: Design and Methods, 2nd ed., Sage, Thousand Oaks, CA."},{"key":"key2022020319591665500_b53","doi-asserted-by":"crossref","unstructured":"Zahra, S.A. and George, G. (2002), \u201cAbsorptive capacity: a review, reconceptualization, and extension\u201d, Academy of Management Review, Vol. 27 No. 2, pp. 185\u2010203.","DOI":"10.5465\/amr.2002.6587995"},{"key":"key2022020319591665500_b54","doi-asserted-by":"crossref","unstructured":"Zhang, A. and Lyytinen, K. (2001), \u201cA framework for component reuse in a metamodelling based software development\u201d, Requirements Engineering Journal, Vol. 6, pp. 116\u201031.","DOI":"10.1007\/s007660170009"},{"key":"key2022020319591665500_frd1","doi-asserted-by":"crossref","unstructured":"Gupta, A.K. and Govindarajan, V. (2000), \u201cKnowledge flows within multinational corporations\u201d, Strategic Management Journal, Vol. 21, pp. 473\u201096.","DOI":"10.1002\/(SICI)1097-0266(200004)21:4<473::AID-SMJ84>3.0.CO;2-I"},{"key":"key2022020319591665500_frd2","doi-asserted-by":"crossref","unstructured":"Lambe, C.J. and Sperkman, R.E. (1997), \u201cAlliances, exernal technology acquisition, and discontinuous technological change\u201d, Journal of Product Innovation Management, Vol. 14 No. 2, pp. 102\u201016.","DOI":"10.1111\/1540-5885.1420102"},{"key":"key2022020319591665500_frd3","doi-asserted-by":"crossref","unstructured":"Lane, P., Salkand, J. and Lyles, A. (2001), \u201cIJV learning and performance\u201d, Strategic Management Journal, Vol. 22, pp. 1139\u201061.","DOI":"10.1002\/smj.206"},{"key":"key2022020319591665500_frd4","unstructured":"Lawrence, P. and Lorch, J. (1967), Organizations and Environment, Harvard University Press, Cambridge, MA."},{"key":"key2022020319591665500_frd5","doi-asserted-by":"crossref","unstructured":"Lewin, A.Y., Longand, C.D. and Caroll, N. (1999), \u201cThe coevolution of new organizational forms\u201d, Organization Science, Vol. 10 No. 5, pp. 570\u201081.","DOI":"10.1287\/orsc.10.5.535"},{"key":"key2022020319591665500_frd6","unstructured":"Lyytinen, K. and Rose, G. (2006), \u201cHow agile is agile enough? Explaining agility in software development using organizational learning theory\u201d, European Journal of Information Systems, Vol. 15 No. 2, pp. 183\u201099."},{"key":"key2022020319591665500_frd7","doi-asserted-by":"crossref","unstructured":"March, S., Hevnerand, A. and Ram, S. (2000), \u201cAn agenda for information technology research in heterogeneous and distributed environments\u201d, Infomation Systems Research, Vol. 11 No. 4, pp. 327\u201041.","DOI":"10.1287\/isre.11.4.327.11873"},{"key":"key2022020319591665500_frd8","doi-asserted-by":"crossref","unstructured":"Mukherjee, A.S., Lapre, M.A. and Wassenhove, L. (1998), \u201cKnowledge driven quality improvement\u201d, Management Science, Vol. 44 No. 11, pp. S35\u2010S49.","DOI":"10.1287\/mnsc.44.11.S35"},{"key":"key2022020319591665500_frd9","doi-asserted-by":"crossref","unstructured":"Tsai, W.P. (2001), \u201cKnowledge transfer in intraorganizational networks: effects of network position and absorptive capacity on business unit innovation and performance\u201d, Academy of Management Journal, Vol. 44 No. 5, pp. 996\u20101004.","DOI":"10.5465\/3069443"}],"container-title":["Information Technology & People"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/www.emeraldinsight.com\/doi\/full-xml\/10.1108\/09593841011052156","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/09593841011052156\/full\/xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/09593841011052156\/full\/html","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,2,3]],"date-time":"2022-02-03T20:16:25Z","timestamp":1643919385000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/09593841011052156\/full\/html"}},"subtitle":["Hyper\u2010learning in seven software development organizations during internet adoption"],"short-title":[],"issued":{"date-parts":[[2010,6,8]]},"references-count":56,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2010,6,8]]}},"alternative-id":["10.1108\/09593841011052156"],"URL":"https:\/\/doi.org\/10.1108\/09593841011052156","relation":{},"ISSN":["0959-3845"],"issn-type":[{"value":"0959-3845","type":"print"}],"subject":[],"published":{"date-parts":[[2010,6,8]]}}}