Abstract
Given the importance of technologies to organizations, technology leakages can cause considerable financial losses and threaten the survival of firms. Although organizations use technology protection diagnostic models to prevent such leakages, most diagnostic models focus on cybersecurity, and the evaluation system is complex, making it difficult for SMEs to use it. This makes them unsuitable for the general technology protection diagnosis of companies. Hence, this study proposes a diagnostic model that assesses these technology protection capabilities of organizations from personnel and administrative perspectives. Drawing upon the individual elements of the 7S model—shared values, strategy, structure, systems, staff, style, and skills—our model analyzes the influence of the elements on the technology protection capabilities of organizations. To determine this influence, the study conducts a questionnaire survey among 435 employees from large, larger medium-sized, and small and medium enterprises. Using the partial least squares and the artificial neural network methods, the study determines the ranking of the relative importance of the 7s elements. The results show that the shared values element most significantly influences these capabilities. The remaining elements influence the technology protection capabilities in the following order from the greatest to the least effect: staff, strategy, structure, systems, style, and skills. These findings highlight the significance of developing an awareness of the necessity of technology protection among all the members of an organization.
Funder
National Research Foundation of Korea
Subject
Management, Monitoring, Policy and Law,Renewable Energy, Sustainability and the Environment,Geography, Planning and Development
Reference53 articles.
1. Research on Digital Forensic Readiness Design in a Cloud Computing-Based Smart Work Environment
2. Top Five Cases of Huawei IP Theft and Patent Infringementhttps://www.prosperousamerica.org/top_five_cases_of_huawei_ip_theft_and_patent_infringement
3. Top Ten Cases of Chinese IP Thefthttps://www.prosperousamerica.org/top_ten_cases_of_chinese_ip_theft
4. Knowledge acquisition and leakage in inter‐firm relationships involving new technology‐based firms
5. The design of information security management system for SMEs industry technique leakage prevention;Chang;J. Korea Multimed. Soc.,2010
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献