The Role of Boundary Objects in Entrepreneurship: Moving Towards an Interaction- Learning Nexus
MetadataShow full item record
We activate the concept of entrepreneurial opportunity, asking the critical question of 'what do entrepreneurs do with opportunities?' This fresh perspective takes the concept of opportunity, currently stalled in the literature, into two important new directions of interaction and learning. We argue that one of the active roles of an entrepreneur is to objectify an opportunity, articulating it in some concrete boundary object form to facilitate interaction with a range of stakeholders. Doing so kicks off a cycle of interaction and learning, by which entrepreneurs and stakeholders reflect on and transform various boundary objects that embody an entrepreneurial opportunity. In the process, opportunity takes an actionable shape that advances the creation of a new venture, while simultaneously advancing the entrepreneur's understanding of how new ventures come to be. We illuminate the co- participative learning mechanisms that underlie how boundary objects operate in a theoretical model that builds on prior research on boundary objects and learning and derive propositions on how boundary objects mediate entrepreneurial interaction.
The article of record as published may be found at http://dx.doi.org/10.5465/AMBPP.2016.13681abstract
Showing items related by title, author, creator and subject.
Naval Postgraduate School Center for Homeland Defense and Security (CHDS) (Monterey, California. Naval Postgraduate SchoolCenter for Homeland Defense and Security, 2006-10);October 2006. Welcome to Volume 2, Issue Three of Homeland Security Affairs. This issue is dedicated to the memory of Lacy Suiter. I believe Lacy would be embarrassed by the idea of dedicating an issue of anything to him. ...
Adams, Curtis G. (Monterey, California: Naval Postgraduate School, 2018-03);Military intelligent ground vehicle systems (MIGVS) have a wide variation in computationally controlled behavior logic that involves the interaction of both cyber and physical components as well as more typical systems ...
Monroy, Pauline (Monterey, California: Naval Postgraduate School, 2017-06);The military relies heavily on computer systems. Without a strong method of authentication to access these systems, threats to confi-dentiality, integrity, and availability of government information are likely to be more ...