Protecting organizational competitive advantage: A knowledge leakage perspective
暂无分享,去创建一个
[1] Juan E. Tapiador,et al. Bypassing information leakage protection with trusted applications , 2012, Comput. Secur..
[2] Pia Hurmelinna-Laukkanen,et al. Formation of the appropriability regime: Strategic and practical considerations , 2007 .
[3] R. Grant. Toward a Knowledge-Based Theory of the Firm,” Strategic Management Journal (17), pp. , 1996 .
[4] J. Barney. The Resource-Based Theory of the Firm , 1996 .
[5] S. Winter. Understanding dynamic capabilities , 2003 .
[6] Joseph T. Mahoney,et al. The resource-based view within the conversation of strategic management , 1992 .
[7] J. Liebeskind,et al. Knowledge, Strategy, and the Theory of the Firm , 1996 .
[8] Kathleen M. Eisenhardt,et al. DYNAMIC CAPABILITIES, WHAT ARE THEY? , 2000 .
[9] Pia Hurmelinna-Laukkanen,et al. THE EFFECTS OF HRM-RELATED MECHANISMS ON COMMUNICATION IN R&D COLLABORATION , 2010 .
[10] Richard Ford,et al. Web Information Leakage: Googling for gold , 2004 .
[11] Morten T. Hansen,et al. What's your strategy for managing knowledge? , 1999, Harvard business review.
[12] Albert H. Segars,et al. Knowledge Management: An Organizational Capabilities Perspective , 2001, J. Manag. Inf. Syst..
[13] Philip Powell,et al. Knowledge and Security , 2003, AMCIS.
[14] Dorothy E. Denning,et al. Information Warfare And Security , 1998 .
[15] Atif Ahmad,et al. Incorporating a knowledge perspective into security risk assessments , 2011 .
[16] Wolfgang Sofka,et al. Knowledge protection strategies of multinational firms--A cross-country comparison , 2010 .
[17] D. Leonard-Barton. CORE CAPABILITIES AND CORE RIGIDITIES: A PARADOX IN MANAGING NEW PRODUCT DEVELOPMENT , 1992 .
[18] J. Barney. Firm Resources and Sustained Competitive Advantage , 1991 .
[19] Eugene H. Spafford,et al. Understanding insiders: An analysis of risk-taking behavior , 2013, Inf. Syst. Frontiers.
[20] Finn Olav Sveen,et al. Overcoming organizational challenges to secure knowledge management , 2007, Inf. Syst. Frontiers.
[21] Holger Graf,et al. Gatekeepers in Regional Networks of Innovators , 2007 .
[22] D. Ketchen,et al. Reconsidering the Reputation—Performance Relationship: A Resource-Based View , 2010 .
[23] Robert M. Grant,et al. The knowledge-based view of the firm: Implications for management practice , 1997 .
[24] Kevin C. Desouza,et al. Knowledge risks in organizational networks: An exploratory framework , 2012, J. Strateg. Inf. Syst..
[25] Antoaneta P. Petkova,et al. Reputation as an Intangible Asset: Reflections on Theory and Methods in Two Empirical Studies of Business School Reputations , 2010 .
[26] JinKyu Lee,et al. Secure knowledge management and the semantic web , 2005, CACM.
[27] Marjorie A. Lyles,et al. Inter-Organizational Knowledge Transfer: Current Themes and Future Prospects , 2008 .
[28] Surendra Sarnikar,et al. A Framework for Assessing Knowledge Sharing Risks in Interorganizational Networks , 2009, AMCIS.
[29] Ann Majchrzak,et al. Safe Contexts for Interorganizational Collaborations Among Homeland Security Professionals , 2010, J. Manag. Inf. Syst..
[30] William David Salisbury,et al. Understanding the influence of organizational change strategies on information technology and knowledge management strategies , 2001, Decis. Support Syst..
[31] Kevin C. Desouza,et al. Securing knowledge in organizations: lessons from the defense and intelligence sectors , 2005, Int. J. Inf. Manag..
[32] Paul Hildreth,et al. The duality of knowledge , 2002, Inf. Res..
[33] Karel Cool,et al. Asset stock accumulation and sustainability of competitive advantage , 1989 .
[34] Clyde W. Holsapple,et al. Exploring secondary activities of the knowledge chain , 2005 .
[35] David W. Chadwick,et al. Guest editorial: A brief overview of data leakage and insider threats , 2013, Inf. Syst. Frontiers.
[36] Michael E. Whitman. Enemy at the gate: threats to information security , 2003, CACM.
[37] I. Nonaka,et al. SECI, Ba and Leadership: a Unified Model of Dynamic Knowledge Creation , 2000 .
[38] Debi Ashenden,et al. Risk Management for Computer Security , 2005 .
[39] Jay B. Barney,et al. Strategic Management and Competitive Advantage: Concepts and Cases , 2005 .
[40] Edwin B. Heinlein. Principles of information systems security , 1995, Comput. Secur..
[41] Patricia M. Norman. Are your secrets safe? Knowledge protection in strategic alliances , 2001 .
[42] Klaus Krippendorff,et al. Content Analysis: An Introduction to Its Methodology , 1980 .
[43] Thomas H. Davenport,et al. Book review:Working knowledge: How organizations manage what they know. Thomas H. Davenport and Laurence Prusak. Harvard Business School Press, 1998. $29.95US. ISBN 0‐87584‐655‐6 , 1998 .
[44] David T. Croasdell,et al. Protecting knowledge assets in multinational enterprises: a comparative case approach , 2009 .
[45] Kah-Hin Chai,et al. Network closure's impact on firms' competitive advantage: The mediating roles of knowledge processes , 2011 .
[46] I. Nonaka. A Dynamic Theory of Organizational Knowledge Creation , 1994 .
[47] Herbert J. Mattord,et al. Principles of Information Security , 2004 .
[48] M. Polanyi. Chapter 7 – The Tacit Dimension , 1997 .
[49] Pia Hurmelinna-Laukkanen,et al. WHAT'S SMALL SIZE GOT TO DO WITH IT? PROTECTION OF INTELLECTUAL ASSETS IN SMEs , 2009 .
[50] D. Teece,et al. DYNAMIC CAPABILITIES AND STRATEGIC MANAGEMENT , 1997 .
[51] Ali Amiri,et al. Dare to share: Protecting sensitive knowledge with data sanitization , 2007, Decis. Support Syst..
[52] Michelle L. Kaarst-Brown,et al. Sensitive information: A review and research agenda , 2005, J. Assoc. Inf. Sci. Technol..
[53] Margaret A. Peteraf. The cornerstones of competitive advantage: A resource‐based view , 1993 .
[54] Matthew B. Miles,et al. Qualitative Data Analysis: An Expanded Sourcebook , 1994 .
[55] Fenio Annansingh,et al. Exploring the Risks of Knowledge Leakage: An Information Systems Case Study Approach , 2012 .
[56] Sue Newell,et al. Knowledge Risks in Organizational Networks: The Practice Perspective , 2012, J. Strateg. Inf. Syst..