Platform Enterprise Business Model: Their Essence and Particularity
Abstract
Purpose: The purpose of this is present research to explore the essence and particularity of platform enterprise business model.
Design/Methodology/Approach: Grounded theory are used to abstract the elements of platform by two step coding, and then social network relation analysis are used for the core modules and their relation of platform enterprise business model.
Findings: The present study abstracted four core modules and constructed the platform model structure, and analyzed its essence and particularity.
Originality/Value: In most research of business model, the value creation and capture are seen as the core of value logic, while this study found that the value delivery and creation are more important for a platform enterprise business model.
Downloads
References
Chengde Zheng, Ailin Xu, Jiaying Zhao. (2011), "Analysis of business model based on case studies", Management Science, Vol 24, pp.1-13.
Chesbrough, H. (2010), "Business model innovation: opportunities and barriers". Long range planning, 43(2), 354-363.
Hongjiang L, Ming Cheng, Jin Li. (2012), "Dimensions and complexity of the business model of the structure of Measurement", China Industrial Economy, Vol. 11, pp.110-1522.
Johnson, M. W., Christensen, C. M., & Kagermann, H. (2008). “Reinventing your business model”. Harvard business review, 86(12), 57-68.
Jun Liu. (2009), Overall lecture-UCINET network analysis software Practical Guide, Harbin Publishing House, Harbin.
Limin Gong, Shisong Jinag, Jiang Wei. (2011), “Nature, methods of business model and future research directions”,Foreign Economics and Management,Vol 33, pp.1-8.
Na Wang, Liwen Tan. (2010), “Pricing bilateral market research platform based on the theory of enterprise” , Capital University of Economics and Business, Vol. 2, pp. 59-63.
Osterwalder, A., & Pigneur, Y. (2002), “Business models and their elements”. In Position paper for the international workshop on business models, Lausanne, Switzerland.
Osterwalder, A., Pigneur, Y., & Tucci, C. L. (2005). Clarifying business models: Origins, present, and future of the concept. Communications of the association for Information Systems, Vol.1 6 No 1, 1.
Qin Wang. (2011), “Innovative value-based network reconfiguration Business Model”, China Industrial Economy, Vol. 1, pp.79-88.
Shichang Fu, Huifen Wang. (2011), “Theoretical system and research trends in the business model definitions and concepts of nature”, China Science and Technology Forum, Vol. 2, pp.70-76.
Sinfield, J. V., Calder, E., McConnell, B., & Colson, S. (2011), “How to identify new business models”. MitSloan Management Review, Vol.53, pp.84-92.
Strauss, A., & Corbin, J. M. (1990). Basics of qualitative research: Grounded theory procedures and techniques. Sage Publications, Inc.
Teece, D. J. (2010), “Business models, business strategy and innovation”.Long range planning, 43(2), 172-194.
Yu Cheng, Jnaguo Su. (2013), “Theoretical model business model: elements and their relationships”, China Industrial Economy, Vol. 1, pp.141-153.
Weiru Chen, Zhuoxuan Yu. (2013), Platform Strategy, Zhongxin Publishing House, Beijing.
Xuedong Wang, Dahai Dong. (2013), “Comments on the expression pattern of foreign business models to build and integration of expression patterns”, Foreign Economics and Management,Vol.4, pp.49-61.
Zott, C., & Amit, R. (2010), “Business model design: an activity system perspective”. Long range planning, 43(2), 216-226.
Zott, C., Amit, R., & Massa, L. (2011), “The business model: recent developments and future research”. Journal of management, 37(4), 1019-1042.
TRANSFER OF COPYRIGHT
JRBEM is pleased to undertake the publication of your contribution to Journal of Research in Business Economics and Management.
The copyright to this article is transferred to JRBEM(including without limitation, the right to publish the work in whole or in part in any and all forms of media, now or hereafter known) effective if and when the article is accepted for publication thus granting JRBEM all rights for the work so that both parties may be protected from the consequences of unauthorized use.