A Framework for Mitigating Leakage of Competitively Sensitive Knowledge in Start-ups
暂无分享,去创建一个
[1] Andrew H. Van de Ven,et al. Running in Packs to Develop Knowledge-Intensive Technologies , 2005, MIS Q..
[2] Paul A. Gompers,et al. Entrepreneurial Spawning: Public Corporations and the Genesis of New Ventures, 1986-1999 , 2003 .
[3] Kevin C. Desouza. Knowledge Security : An Interesting Research Space , 2006 .
[4] Daniel A. Levinthal,et al. ABSORPTIVE CAPACITY: A NEW PERSPECTIVE ON LEARNING AND INNOVATION , 1990 .
[5] David H. Hsu. Venture Capitalists and Cooperative Start-Up Commercialization Strategy , 2004, Manag. Sci..
[6] Atul Gupta,et al. Information systems security issues and decisions for small businesses: An empirical examination , 2005, Inf. Manag. Comput. Security.
[7] Joel A. C. Baum,et al. Picking winners or building them? Alliance, intellectual, and human capital as selection criteria in venture financing and performance of biotechnology startups , 2004 .
[8] Kevin C. Desouza,et al. Securing knowledge in organizations: lessons from the defense and intelligence sectors , 2005, Int. J. Inf. Manag..
[9] John Park,et al. Opportunity recognition and product innovation in entrepreneurial hi-tech start-ups: a new perspective and supporting case study , 2005 .
[10] A. B. Ruighaver,et al. Organisational Learning and Incident Response: Promoting Effective Learning Through The Incident Response Process , 2010, AISM 2010.
[11] Réjean Landry,et al. Managing the protection of innovations in knowledge-intensive business services , 2008 .
[12] Z. Ács,et al. The knowledge spillover theory of entrepreneurship , 2005 .
[13] Atif Ahmad,et al. Towards a knowledge perspective in information security risk assessments - an illustrative case study , 2009 .
[14] Graeme G. Shanks,et al. A case analysis of information systems and security incident responses , 2015, Int. J. Inf. Manag..
[15] Peter J. Denning,et al. Innovation as language action , 2006, CACM.
[16] Richard Baskerville,et al. Eating Our Own Cooking: Toward a More Rigorous Design Science of Research Methods , 2012 .
[17] Rachelle Bosua,et al. Protecting organizational competitive advantage: A knowledge leakage perspective , 2014, Comput. Secur..
[18] Atif Ahmad,et al. Understanding the Factors of Information Leakage through Online Social Networking to Safeguard Organizational Information , 2010 .
[19] Kathryn Graziano. The innovator's dilemma: When new technologies cause great firms to fail , 1998 .
[20] Stefan Thalmann,et al. Protecting organizational knowledge: a structured literature review , 2015, J. Knowl. Manag..
[21] S. Shane,et al. The Promise of Entrepreneurship as a Field of Research , 2000 .
[22] W. Neuman,et al. Basics of Social Research: Qualitative and Quantitative Approaches , 2006 .
[23] David R. Hannah. Should I Keep a Secret? The Effects of Trade Secret Protection Procedures on Employees' Obligations to Protect Trade Secrets , 2005, Organ. Sci..
[24] Jie Yang,et al. The effect of knowledge protection, knowledge ambiguity, and relational capital on alliance performance , 2007 .
[25] Henry R. Hertzfeld,et al. Intellectual property protection mechanisms in research partnerships , 2006 .
[26] M. Tushman,et al. Technological Discontinuities and Organizational Environments , 1986 .
[27] John Freeman,et al. Models of Innovation: Startups and Mature Corporations , 2007 .
[28] I. Nonaka. A Dynamic Theory of Organizational Knowledge Creation , 1994 .
[29] Sven-Volker Rehm,et al. Information management for innovation networks - an empirical study on the "who, what and how" in networked innovation , 2016, Int. J. Inf. Manag..
[30] Peter J. Denning. The social life of innovation , 2004, CACM.
[31] Arild Aspelund,et al. Initial resources' influence on new venture survival: a longitudinal study of new technology-based firms , 2005 .
[32] S. Shane. Why encouraging more people to become entrepreneurs is bad public policy , 2009 .
[33] William Cornish,et al. Intellectual Property: Omnipresent, Distracting, Irrelevant? , 2004 .
[34] Eric Ries,et al. The Lean Startup , 2011 .
[35] Dorothy E. Leidner,et al. Review: Knowledge Management and Knowledge Management Systems: Conceptual Foundations and Research Issues , 2001, MIS Q..
[36] Mike Wright,et al. Entrepreneurial Origin, Technological Knowledge, and the Growth of Spin‐Off Companies , 2011 .
[37] Herbert Snyder,et al. Intellectual capital and economic espionage: new crimes and new protections , 2009 .
[38] Steve Blank. Why the Lean Start-Up Changes Everything , 2013 .
[39] N. Bosma,et al. The Value of Human and Social Capital Investments for the Business Performance of Startups , 2004 .
[40] Pia Hurmelinna-Laukkanen,et al. DO SMEs BENEFIT FROM HRM-RELATED KNOWLEDGE PROTECTION IN INNOVATION MANAGEMENT? , 2011 .
[41] Salvatore T. March,et al. Design and natural science research on information technology , 1995, Decis. Support Syst..
[42] Willy C. Shih,et al. Will Our Partner Steal Our IP , 2013 .
[43] J. Gans,et al. The Product Market and the Market for 'Ideas': Commercialization Strategies for Technology Entrepreneurs , 2002 .