TECHNOLOGY IDENTIFICATION IN RELATION TO EMBEDDED SYSTEMS

Embedded Systems (ES) are information processing systems consisting of a hybrid combination of hardware and software components integrated into a technical environment. Their main purpose is to control, regulate and monitor a system to secure efficiency, reliability and specificity for a certain application under realtime requirements. Their importance manifests in a considerably in creasing number of fields of technological applications, e.g. automotive, aviation and railway engineering, telecommunications as well as machinery and plant engineering. In this context, the identification of new technologies is an essential success factor in a highly competitive environment and therefore of high relevance for enterprises of ES. Hence, this paper analys es different types of methods, the importance of technology scouts, the process and relevant success factors related to the identification of new technologies in the field of ES. Open‐ended and guided interviews are chosen as research method consisting of a sample of 48 experts from several industries originating in the Europea n Metropolitan Area of Nuremberg, Germany. These interviews have been analysed employing a qualitative content analysis, which is a suitable method to systematically extract relevant information from text material. The results show that technology identification is of essential importance for companies of ES and beyond. Within the sample there e xist 15 relevant methods for the identification of new technologies, e.g. subject related publications, exhibitions, internet, customer and

[1]  Guido Reger,et al.  Technology Foresight in Companies: From an Indicator to a Network and Process Perspective , 2001, Technol. Anal. Strateg. Manag..

[2]  Alasdair Kemp Embedded systems: The other problem , 1997, Comput. Secur..

[3]  R. Rohrbeck Harnessing a Network of Experts for Competitive Advantage: Technology Scouting in the ICT Industry , 2010 .

[4]  Jakob Edler,et al.  Changes in the Strategic Management of Technology: Results of a Global Benchmarking Study , 2002 .

[5]  Colin Seymour-Ure,et al.  Content Analysis in Communication Research. , 1972 .

[6]  Tuomo Kässi,et al.  THE DELPHI METHOD AS A TOOL FOR ANALYZING TECHNOLOGY EVOLUTION: CASE OPEN SOURCE THIN COMPUTING , 2009 .

[7]  John J. McGonagle Keeping abreast of science and technology: Technical intelligence for business , 1997 .

[8]  Karen Golden-Biddle,et al.  Using Content Analysis to Elaborate Adolescent Theories of Organization , 2008 .

[9]  K. Blind,et al.  Revenue creation: business models for product-related services in international markets – the case of Zwick GmbH & Co. KG , 2011 .

[10]  M. Woerter Technology proximity between firms and universities and technology transfer , 2012 .

[11]  Tugrul U. Daim,et al.  Forecasting emerging technologies: Use of bibliometrics and patent analysis , 2006 .

[12]  C. Gomes,et al.  Company Size Effect in Innovative Performance , 2009 .

[13]  A. Payne,et al.  A Strategic Framework for Customer Relationship Management , 2005 .

[14]  Daniel A. Levinthal Surviving Schumpeterian Environments: An Evolutionary Perspective , 1992 .

[15]  Fred Phillips,et al.  On S-curves and tipping points , 2007 .

[16]  Lambert Spaanenburg,et al.  Embedded Systems Roadmap 2002 , 2002 .

[17]  Irene Spitsberg,et al.  Technology Landscape Mapping: At the Heart of Open Innovation , 2013 .

[18]  M. Wolff Scouting for Technology , 1992 .

[19]  Wolfgang Böhm,et al.  Challenges in Engineering for Software-Intensive Embedded Systems , 2012, Model-Based Engineering of Embedded Systems.

[20]  P. Mayring Qualitative Content Analysis , 2000 .

[21]  Ashish Sood,et al.  Technological Evolution and Radical Innovation , 2005 .

[22]  Michael Meuser,et al.  The Expert Interview and Changes in Knowledge Production , 2009 .

[23]  René Rohrbeck,et al.  Technology Scouting - a Case Study on the Deutsche Telekom Laboratories , 2007 .

[24]  Alan L. Porter,et al.  Tech Mining: Exploiting New Technologies for Competitive Advantage , 2004 .

[25]  Lorrie Faith Cranor,et al.  Improving phishing countermeasures: An analysis of expert interviews , 2009, 2009 eCrime Researchers Summit.

[26]  Alan L. Porter,et al.  QTIP: Quick technology intelligence processes , 2005 .

[27]  Ralph L. Rosnow,et al.  Essentials of Behavioral Research: Methods and Data Analysis , 1984 .

[28]  C. Gross The growth of China’s technology transfer industry over the next decade: implications for global markets , 2013 .

[29]  Paul Matthyssens,et al.  Creating competitive advantage in industrial services , 1998 .

[30]  E. Woodrum “Mainstreaming” content analysis in social science: Methodological advantages, obstacles, and solutions☆ , 1984 .

[31]  O. Budde,et al.  TECHNOLOGY AND INNOVATION RADARS: EFFECTIVE INSTRUMENTS FOR THE DEVELOPMENT OF A SUSTAINABLE INNOVATION STRATEGY AND SUCCESSFUL PRODUCT LAUNCHES , 2010 .

[32]  Patrick Ronde,et al.  Delphi analysis of national specificities in selected innovative areas in Germany and France , 2003 .

[33]  I. Røpke New technology in everyday life – social processes and environmental impact , 2001 .

[34]  H. Arnold,et al.  The Technology Radar - an Instrument of Technology Intelligence and Innovation Strategy , 2006, 2006 IEEE International Conference on Management of Innovation and Technology.

[35]  Gregory J. Skulmoski,et al.  Journal of Information Technology Education the Delphi Method for Graduate Research , 2022 .

[36]  H. Arman,et al.  Combining Methods in the Technology Intelligence Process: Application in an Aerospace Manufacturing Firm , 2010 .

[37]  Gary K. Jones,et al.  Determinants and performance impacts of external technology acquisition , 2001 .