336
Views
2
CrossRef citations to date
0
Altmetric
Articles

What matters in technology leakage in small and medium enterprises: the case of Korea

, &
Pages 543-555 | Received 05 Nov 2015, Accepted 14 Apr 2016, Published online: 02 Apr 2017

References

  • Ahmad, A., S. B. Maynard, and S. Park. 2014. “Information Security Strategies: Towards an Organizational Multi-Strategy Perspective.” Journal of Intelligent Manufacturing 25 (2): 357–370. doi: 10.1007/s10845-012-0683-0
  • Bessen, J., and E. Maskin. 2009. “Sequential Innovation, Patents, and Imitation.” The RAND Journal of Economics 40 (4): 611–635. doi: 10.1111/j.1756-2171.2009.00081.x
  • Chang, H. B. 2010. “The Design of Information Security Management System for SMEs Industry Technique Leakage Prevention.” Journal of Korea Multimedia Society 13 (1): 111–121.
  • Desouza, K. C. 2011. “Securing Intellectual Assets: Integrating the Knowledge and Innovation Dimensions.” International Journal of Technology Management 54 (2/3): 167–203. doi: 10.1504/IJTM.2011.039311
  • El Akremi, A., R. Perrigot, and I. Piot-Lepetit. 2015. “Examining the Drivers for Franchised Chains Performance Through the Lens of the Dynamic Capabilities Approach.” Journal of Small Business Management 53 (1): 145–165.
  • Eppinger, E., and G. Vladova. 2013. “Intellectual Property Management Practices at Small and Medium-Sized Enterprises.” International Journal of Technology Management 11 61 (1): 64–81. doi: 10.1504/IJTM.2013.050244
  • Fan, J. P., S. L. Gillan, and X. Yu. 2013. “Innovation or Imitation?: The Role of Intellectual Property Rights Protections.” Journal of Multinational Financial Management 23 (3): 208–234. doi: 10.1016/j.mulfin.2013.03.001
  • Henry, Emeric, Francisco Ruiz-Aliseda, and Innovation Beyond Patents: Technological Complexity as a Protection Against Imitation. 2012. “ CEPR Discussion Paper No. DP8870.” March. Available at SSRN: http://ssrn.com/abstract=2034088.
  • Ju, Y. H., S. Y. Sohn, J. S. Ahn, and J. Y. Choi. 2014. “Balanced Scorecard Based Performance Analysis of Accreditation for Engineering Education.” Industrial Engineering & Management Systems 13 (1): 67–86. doi: 10.7232/iems.2014.13.1.067
  • Kärrberg, P. 2007. “Information Systems Innovation: Definitions, Comparative Contexts, and Cognitive Models.” Veröffentlichung im Rahmen des 6th Annual Global Mobility Roundtable 1 (02.06): 2007.
  • Kim, Y. H., and H. B. Chang. 2014. “The Industrial Security Management Model for SMBs in Smart Work.” Journal of Intelligent Manufacturing 25 (2): 319–327. doi: 10.1007/s10845-012-0651-8
  • Lengnick-Hall, M. L., C. A. Lengnick-Hall, L. S. Andrade, and B. Drake. 2009. “Strategic Human Resource Management: The Evolution of the Field.” Human Resource Management Review 19 (2): 64–85. doi: 10.1016/j.hrmr.2009.01.002
  • Long, C. S., and M. H. Aziz. 2013. “Determinants for Product and Process Innovation: A Review in the Perspective of TQM Practices.” Advanced Materials Research 787: 1072–1076. doi: 10.4028/www.scientific.net/AMR.787.1072
  • Manca, F. 2010. “Technology Catch-Up and the Role of Institutions.” Journal of Macroeconomics 32 (4): 1041–1053. doi: 10.1016/j.jmacro.2010.07.004
  • Maskus, K. E., K. Saggi, and T. Puttitanun. 2003, April. “ Patent Rights and International Technology Transfer through Direct Investment and Licensing.” Conference on the International Public Goods and the Transfer of Technology after TRIPS. Duke University Law School.
  • Moore, S. B., and S. L. Manring. 2009. “Strategy Development in Small and Medium Sized Enterprises for Sustainability and Increased Value Creation.” Journal of Cleaner Production 17 (2): 276–282. doi: 10.1016/j.jclepro.2008.06.004
  • Östlin, J., E. Sundin, and M. Björkman. 2009. “Product Life-Cycle Implications for Remanufacturing Strategies.” Journal of Cleaner Production 17 (11): 999–1009. doi: 10.1016/j.jclepro.2009.02.021
  • Prajogo, D. I. 2006. “The Relationship Between Innovation and Business Performance – A Comparative Study Between Manufacturing and Service Firms.” Knowledge andProcess Management 13 (3): 218–225. doi: 10.1002/kpm.259
  • Robertson, P., and K. Smith. 2008. “Distributed Knowledge Bases in Low-and Medium-Technology Industries.” In Innovation in Low-tech Firms and Industries, edited by H. Hirsch-Kreinsen and D. Jacobson, 93–117. Cheltenham, UK: Edward Elgar.
  • Robertson, P., K. H. Smith, N. von Tunzelmann. 2009. “Innovation in Low-and Medium-Technology Industries.” Research Policy 38 (3): 441–446. doi: 10.1016/j.respol.2008.10.019
  • Ryan, M. P. 2010. “Patent Incentives, Technology Markets, and Public–Private Bio-Medical Innovation Networks in Brazil.” World Development 38 (8): 1082–1093. doi: 10.1016/j.worlddev.2009.12.013
  • Santamaría, L., M. J. Nieto, and A. Barge-Gil. 2009. “Beyond Formal R&D: Taking Advantage of Other Sources of Innovation in Low-and Medium-Technology Industries.” Research Policy 38 (3): 507–517. doi: 10.1016/j.respol.2008.10.004
  • Shenkar, O. 2010. “Copycats: How Smart Companies Use Imitation to Gain a Strategic Edge.” Strategic Direction 26 (10): 3–5. doi: 10.1108/02580541011080474
  • Sohn, S. Y., and Y. S. Kim. 2013. “Behavioral Credit Scoring Model for Technology-Based Firms that Considers Uncertain Financial Ratios Obtained from Relationship Banking.” Small Business Economics 41 (4): 931–943. doi: 10.1007/s11187-012-9457-5
  • Strickland, L. S., and L. E. Hunt. 2005. “Technology, Security, and Individual Privacy: New Tools, New Threats, and New Public Perceptions.” Journal of the American Society for Information Science and Technology 56 (3): 221–234. doi: 10.1002/asi.20122
  • Weill, P., and M. Vitale. 2002. “What IT Infrastructure Capabilities are Needed to Implement E-Business Models?” MIS Quarterly Executive 1 (1): 17–34.
  • Wells, J. D., D. E. Campbell, J. S. Valacich, and M. Featherman. 2010. “The Effect of Perceived Novelty on the Adoption of Information Technology Innovations: A Risk/Reward Perspective.” Decision Sciences 41 (4): 813–843. doi: 10.1111/j.1540-5915.2010.00292.x
  • Yan, Z. O. U., and L. I. U. Chao. 2012. “The Influence of Monopoly on Market Price and Social Equity.” The Theory and Practice of Finance and Economics 6: 2–6.
  • Zhang, D. Y., X. Cao, L. Wang, and Y. Zeng. 2012. “Mitigating the Risk of Information Leakage in a Two-Level Supply Chain Through Optimal Supplier Selection.” Journal of Intelligent Manufacturing 23 (4): 1351–1364. doi: 10.1007/s10845-011-0527-3

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.