Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Carliss Y. Baldwin is active.

Publication


Featured researches published by Carliss Y. Baldwin.


Archive | 2006

Modularity in the Design of Complex Engineering Systems

Carliss Y. Baldwin; Kim B. Clark

Modularity accommodates uncertainty because the particular elements of a modular design may be changed after the fact and in unforeseen ways as long as the design rules are obeyed. Thus, within a modular architecture, new module designs may be substituted for older ones easily and at low cost. This chapter will make three basic points. First, we will show that modularity is a financial force that can change the structure of an industry. Then, we will explore the value and costs that are associated with constructing and exploiting a modular design. Finally we will examine the ways in which modularity shapes organizations and the risks that it poses for particular firms.


Industrial and Corporate Change | 2016

The Mirroring Hypothesis: Theory, Evidence and Exceptions

Lyra J. Colfer; Carliss Y. Baldwin

The mirroring hypothesis predicts that organizational ties within a project, firm, or group of firms (e.g. communication, collocation, employment) will correspond to the technical patterns of dependency in the work being performed. A thorough understanding of the phenomenon is difficult to achieve because relevant work is scattered across multiple fields. This paper presents a unified picture of mirroring in terms of theory, evidence and exceptions. First, we formally define mirroring and argue that it is an approach to technical problem-solving that conserves scarce cognitive resources. We then review 142 empirical studies, divided by organizational form into (1) industry studies; (2) firm studies; and (3) studies of open collaborative projects. The industry and firm studies indicate that mirroring is a prevalent pattern but not universal. However, there is evidence of a mirroring ‘trap’: firms focused on the current technical architecture may fall victim to architectural innovations arising outside their boundaries. Thus in technologically dynamic industries, partial mirroring, where knowledge boundaries are drawn more broadly than operational boundaries, is likely to be a superior strategy. Firms can also strategically ‘break the mirror’ in two ways: by implementing modular partitions within their own boundaries; or by building relational contracts that support technical interdependency across their boundaries. Finally, in contrast to industry and firm studies, studies of open collaborative projects, most of which focused on software, were not supportive of the hypothesis. We argue that these contradictory results arise because digital technologies make possible new modes of coordination that enable groups to deviate from classical mirroring as seen within firms. This working paper includes Appendix A, which describes our detailed findings by category. Appendix B, a tabular summary of the 142 studies in our sample, is available on request from the authors.


Nature Biotechnology | 2013

Prize-based contests can provide solutions to computational biology problems

Karim R. Lakhani; Kevin J. Boudreau; Po-Ru Loh; Lars Backstrom; Carliss Y. Baldwin; Eric Lonstein; Mike Lydon; Alan MacCormack; Ramy Arnaout; Eva C. Guinan

Advances in biotechnology have fuelled the generation of unprecedented quantities of data across the life sciences. However, finding individuals who can address such “big data” problems effectively has become a significant research bottleneck. Historically, prize-based contests have had striking success in attracting unconventional individuals who can solve difficult challenges. To determine whether this approach could solve a real “big data” biologic algorithm problem, we used a complex immunogenomics problem as the basis for a two-week online contest broadcast to participants outside academia and biomedical disciplines. Participants in our contest generated over 600 submissions containing 89 novel computational approaches to the problem. Thirty submissions exceeded the benchmark performance of NIH’s MegaBLAST. The best achieved both greater accuracy and speed (x1000). Here we show the potential of using online prize-based contests to access individuals without domain-specific backgrounds to address big data challenges in life sciences.


Communications of The Ais | 2008

The Sciences of Design: Observations on an Emerging Field

Sandeep Purao; Carliss Y. Baldwin; Alan R. Hevner; Veda C. Storey; Jan Pries-Heje; Brian K. Smith; Ying Zhu

The boundaries and contours of design sciences continue to undergo definition and refinement. In many ways, the sciences of design defy disciplinary characterization. They demand multiple epistemologies, theoretical orientations (e.g. construction, analysis or intervention) and value considerations. As our understanding of this emerging field of study grows, we become aware that the sciences of design require a systemic perspective that spans disciplinary boundaries. The Doctoral Consortium at the Design Science Research Conference in Information Sciences and Technology (DESRIST) was an important milepost in their evolution. It provided a forum where students and leading researchers in the design sciences challenged one another to tackle topics and concerns that are similar across different disciplines. This paper reports on the consortium outcomes and insights from mentors who took part in it. We develop a set of observations to guide the evolution of the sciences of design. It is our intent that the observations will be beneficial, not only for IS researchers, but also for colleagues in allied disciplines who are already contributing to shaping the sciences of design.


California Management Review | 2013

IP Modularity: Profiting from Innovation by Aligning Product Architecture with Intellectual Property

Joachim Henkel; Carliss Y. Baldwin; WIlly C. Shih

In this paper we explain how firms seeking to take advantage of distributed innovation and outsourcing can bridge the tension between value creation and value capture by modifying the modular structure of their technical systems. Specifically, we introduce the concept of “IP modularity”, a special form of modularity that seeks to protect and capture value from intellectual property (IP). We define what it means for a system to be “IP-modular,” and illustrate the application of this concept in a number of practical situations. From the examples, we derive a comprehensive framework that can be used to design and evaluate value capture strategies for modular systems.


Journal of Financial Economics | 1991

Choosing the method of sale: A clinical study of Conrail

Carliss Y. Baldwin; Sugato Bhattacharyya

This paper analyzes the sale of Conrail (Consolidated Rail Corporation) and finds three problems: first, a contingent claim gave the seller (the U.S. Government) conflicting objectives; second, bidders in the auction valued Conrail differently and thus did not compete effectively; and third, Conrails management had an information advantage over the seller and outside bidders. These three factors can be present in any corporate divestiture and will tend to decrease the sellers revenue. We discuss how different methods of sale (e.g., two-stage auctions and parallel secret negotiations) will counteract these problems to varying degrees, although we find no single ‘best’ method.


hawaii international conference on system sciences | 2014

Visualizing and Measuring Enterprise Application Architecture: An Exploratory Telecom Case

Robert Lagerström; Carliss Y. Baldwin; Alan MacCormack; Stephan Aier

We test a method for visualizing and measuring enterprise application architectures. The method was designed and previously used to reveal the hidden internal architectural structure of software applications. The focus of this paper is to test if it can also uncover new facts about the applications and their relationships in an enterprise architecture, i.e., if the method can reveal the hidden external structure between software applications. Our test uses data from a large international telecom company. In total, we analyzed 103 applications and 243 dependencies. Results show that the enterprise application structure can be classified as a core-periphery architecture with a propagation cost of 25%, core size of 34%, and architecture flow through of 64%. These findings suggest that the method could be effective in uncovering the hidden structure of an enterprise application architecture.


Strategic Management Journal | 2014

Modularity and Intellectual Property Protection

Carliss Y. Baldwin; Joachim Henkel

Modularity is a means of partitioning technical knowledge about a product or process. When state-sanctioned intellectual property (IP) rights are ineffective or costly to enforce, modularity can be used to hide information and thus protect IP. We investigate the impact of modularity on IP protection by formally modeling the threat of expropriation by agents. The principal has three options to address this threat: trust, licensing, and paying agents to stay loyal. We show how the principal can influence the value of these options by modularizing the system and by hiring clans of agents, thus exploiting relationships among them. Extensions address screening and signaling in hiring, the effects of an imperfect legal system, and social norms of fairness. We illustrate our arguments with examples from practice.


Research Policy | 2014

Hidden Structure: Using Network Methods to Map System Architecture

Carliss Y. Baldwin; Alan MacCormack; John Rusnak

In this paper, we describe an operational methodology for characterizing the architecture of complex technical systems and demonstrate its application to a large sample of software releases. Our methodology is based upon directed network graphs, which allows us to identify all of the direct and indirect linkages between the components in a system. We use this approach to define three fundamental architectural patterns, which we label core–periphery, multi-core, and hierarchical. Applying our methodology to a sample of 1286 software releases from 17 applications, we find that the majority of releases possess a “core–periphery” structure. This architecture is characterized by a single dominant cyclic group of components (the “Core”) that is large relative to the system as a whole as well as to other cyclic groups in the system. We show that the size of the Core varies widely, even for systems that perform the same function. These differences appear to be associated with different models of development – open, distributed organizations develop systems with smaller Cores, while closed, co-located organizations develop systems with larger Cores. Our findings establish some “stylized facts” about the fine-grained structure of large, real-world technical systems, serving as a point of departure for future empirical work.


Archive | 2006

Where Do Transactions Come From? A Network Design Perspective on the Theory of the Firm

Kim B. Clark; Carliss Y. Baldwin

Our goal in this paper is to explain the location of transactions (and contracts) in a larger system of production. We first characterize the system as a network of tasks and transfers. While transfers between agents are necessary and ubiquitous, the mundane transaction costos of standardizing, counting, valuing and paying for what is transferred make it impossible for all transfers to be transactions. We go on to argue that the modular structure of the network determines its pattern of mundane transction costs, and thus establishes where cost-effective transactions can be located.

Collaboration


Dive into the Carliss Y. Baldwin's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Eric von Hippel

Massachusetts Institute of Technology

View shared research outputs
Top Co-Authors

Avatar

Robert Lagerström

Royal Institute of Technology

View shared research outputs
Top Co-Authors

Avatar

C. Jason Woodard

Franklin W. Olin College of Engineering

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Karen Hopper Wruck

Max M. Fisher College of Business

View shared research outputs
Top Co-Authors

Avatar

Michael C. Jensen

National Bureau of Economic Research

View shared research outputs
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge