Abstract
This chapter provides a case study of a cybersecurity accelerator, recently established in Australia, in response to the growing threat of cybercrime. The accelerator has been launched as a joint venture between an IT service provider and a university, with the backing of the regional government. In setting up and differentiating the accelerator particular attention has been paid to the deal flow quality, selective engagement of a broad range of mentors with deep skills and the establishment of an environment conducive to innovation. As will be discussed in this chapter, these factors increase the likelihood of success based on developing strong and dynamic networks, building founders’ skills and increasing collaboration within the ecosystem. This chapter demonstrates how the principles of transformational entrepreneurship are being utilised within this context to build a successful accelerator to tackle a challenging situation.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Australian Bureau of Statistics. (2015). Frameworks for Australian Social Statistics – Information and Communication Technology. ABS Publication Number 4160.0.55.001. Retrieved from http://www.abs.gov.au/ausstats/abs@.nsf/Lookup/by%20Subject/4160.0.55.001~Jun%202015~Main%20Features~Information%20and%20communication%20technology~10018.
Australian Cyber Security Centre. (2015). 2015 Threat Report. Retrieved from https://www.acsc.gov.au/publications/index.htm.
Australian Industry Report. (2016). Chapter 2: Economic Conditions. Retrieved from https://www.industry.gov.au/Pages/default.aspx.
Camillus, J. C. (2008). Strategy as a Wicked Problem. Harvard Business Review, 86(5), 98–106.
Cardwell, T. (2013, July). Plugging the Cyber-Security Skills Gap. Computer Fraud & Security, 7, 5–10.
Carlsson, S., & Corvello, V. (2011). Open Innovation. European Journal of Innovation Management, 14(4), 408–411.
Chesbrough, H. W. (2006). Open Innovation: The New Imperative for Creating and Profiting from Technology. Boston, MA: Harvard Business Press.
Cohan, P. (2017). How Cambridge and Silicon Valley Became Startup Hubs. Forbes. Retrieved from https://www.forbes.com/sites/petercohan/2017/07/18/how-cambridge-and-silicon-valley-became-startup-hubs/#433bf6a237a7.
de Jong, J. P., & Freel, M. (2010). Absorptive Capacity and the Reach of Collaboration in High Technology Small Firms. Research Policy, 39(1), 47–54.
Eftekhari, N., & Bogers, M. (2015). Open for Entrepreneurship: How Open Innovation Can Foster New Venture Creation. Creativity and Innovation Management, 24(4), 574–584.
Feld, B. (2012). Startup Communities: Building an Entrepreneurial Ecosystem in Your City. Hoboken, NJ: Wiley.
Furnell, S., Fischer, P., & Finch, A. (2017, February). Can’t Get the Staff? The Growing Need for Cyber-Security Skills. Computer Fraud & Security, 2, 5–10.
Giuliani, E., Morrison, A., Pietrobelli, C., & Rabellotti, R. (2010). Who Are the Researchers That Are Collaborating with Industry? An Analysis of the Wine Sectors in Chile, South Africa and Italy. Research Policy, 39(6), 748–761.
Goktepe-Hulten, D. (2009). University-Industry Technology Transfer: Who Needs TTOs? International Journal of Technology Transfer and Commercialisation, 9(1–2), 40–52.
Goldfarb, B., & Henrekson, M. (2003). Bottom-Up Versus Top-Down Policies Towards the Commercialization of University Intellectual Property. Research Policy, 32(4), 639–658.
Gruber, M., & Henkel, J. (2006). New Ventures Based on Open Innovation – An Empirical Analysis of Start-Up Firms in Embedded Linux. International Journal of Technology Management, 33(4), 356–372.
Haeussler, C., & Colyvas, J. A. (2011). Breaking the Ivory Tower: Academic Entrepreneurship in the Life Sciences in UK and Germany. Research Policy, 40(1), 41–54.
Hui, K., Kim, S. H., & Wang, Q. (2017). Cybercrime Deterrence and International Legislation: Evidence from Distributed Denial of Service Attacks. MIS Quarterly, 41(2), 497–523.
Innovation and Science Australia. (2017). Australia 2030: Prosperity Through Innovation. Australian Government, Canberra. Retrieved from https://www.industry.gov.au/Innovation-and-Science-Australia/Australia-2030/Pages/default.aspx.
International Organization for Standardization. (2012). Information Technology – Security Techniques – Guidelines for Cybersecurity. ISO/IEC Publication Number 27032:2012. Retrieved from https://www.iso.org/standard/44375.html.
Kask, J., & Linton, G. (2013). Business Mating: When Start-Ups Get It Right. Journal of Small Business & Entrepreneurship, 26(5), 511–536.
Kinner, C. (2015). Boosting High-Impact Entrepreneurship in Australia – A Role for Universities. Retrieved from http://www.chiefscientist.gov.au/2015/10/media-release-building-a-culture-of-entrepreneurship/.
Kitson, M., Howells, J., Braham, R., & Westlake, S. (2009). The Connected University: Driving Recovery and Growth in the UK Economy. London: National Endowment for Science, Technology and the Arts.
Markman, G. D., Phan, P. H., Balkin, D. B., & Gianiodis, P. T. (2005). Entrepreneurship and University-Based Technology Transfer. Journal of Business Venturing, 20(2), 241–263.
Marmer, M. (2012). Transformational Entrepreneurship: Where Technology Meets Societal Impact. Harvard Business Review. Retrieved from https://hbr.org/2012/04/transformational-entrepreneurs.
Perkmann, M., Tartari, V., McKelvey, M., Autio, E., Brostrom, A., d’Este, P., et al. (2012). Academic Engagement vs. Commercialization: A Systematic Review of Research on University Relations with Industry: Mimeo.
Press, G. (2017). 6 Reasons Israel Became a Cybersecurity Powerhouse Leading the $82 Billion Industry. Forbes. Retrieved from https://www.forbes.com/sites/gilpress/2017/07/18/6-reasons-israel-became-a-cybersecurity-powerhouse-leading-the-82-billion-industry/#588faa3420aa.
Radojevich-Kelley, N., & Hoffman, D. L. (2012). Analysis of Accelerator Companies: An Exploratory Case Study of Their Programs, Processes, and Early Results. Small Business Institute Journal, 8(2), 54–70.
Ratten, V., & Jones, P. (2018). Transformational Entrepreneurship: An Overview. In Transformational Entrepreneurship (pp. 13–29). London: Routledge.
Seet, P., Jones, J., Oppelaar, L., & de Zubielqui, G. C. (2018). Beyond ‘Know-What’ and ‘Know-How’ to ‘Know-Who’: Enhancing Human Capital with Social Capital in an Australian Start-Up Accelerator. Asia Pacific Business Review, 24(2), 233–260.
Sieger, P., Fueglistaller, U., & Zellweger, T. (2016). Student Entrepreneurship 2016: Insights from 50 Countries. St. Gallen/Bern: KMU-HSG/IMU. Retrieved from http://www.guesssurvey.org/publications/publications/international-reports.html.
Sutton, D. (2017, July 10). Cyber Security: A Practitioner’s Guide. Swindon, UK: BCS Learning & Development. ISBN-13: 978-1-78017-340-5.
Weiblen, T., & Chesbrough, H. W. (2015). Engaging with Startups to Enhance Corporate Innovation. California Management Review, 57(2), 66–90.
World Economic Forum. (2018). Cybercrime. Retrieved from https://www.weforum.org/projects/cybercrime.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 The Author(s)
About this chapter
Cite this chapter
Round, H. (2019). Case Study: Transformational Entrepreneurship in Australia. In: Maas, G., Jones, P. (eds) Transformational Entrepreneurship Practices. Palgrave Pivot, Cham. https://doi.org/10.1007/978-3-030-11524-1_5
Download citation
DOI: https://doi.org/10.1007/978-3-030-11524-1_5
Published:
Publisher Name: Palgrave Pivot, Cham
Print ISBN: 978-3-030-11523-4
Online ISBN: 978-3-030-11524-1
eBook Packages: Business and ManagementBusiness and Management (R0)