Extent: | Online-Ressource (X, 129 p. 30 illus, digital) |
---|---|
Series: | |
Type of publication: | Book / Working Paper |
Language: | English |
Notes: | Description based upon print version of record Contents; Introduction Innovation in China-Paradox or Paradigm?; Chapter-1; China as a Place to Innovate; 1.1 China Is the Number One Place for New R&D Labs; 1.1.1 Motivations for Establishing R&D Labs in China; 1.1.1.1 Input-oriented Motivations; 1.1.1.2 Performance-Oriented Motivations; 1.1.1.3 Business-Ecological Motivations; 1.1.2 Barriers for Managing R&D in China; 1.2 Siemens' SMART Principle and Reverse Innovation; 1.2.1 How to Enable Reverse Innovation?; Protection of Intellectual Property in China; Chapter-2; 2.1 Enforcement of IP-Rights in China 2.2 Appropriability Regimes and Their Mechanisms2.3 Patents as an Indicator of R&D Capabilities; Chapter-3; Dimensions of IP Protection in China; 3.1 Legal IP-related Illicit and Licit Threats; 3.2 Legal-Licit Related Threats; 3.3 Patents and Trademarks Are Not Enough; The IP Protection Star; Chapter-4; 4.1 Legal-driven Protection; 4.1.1 Legal-Proprietary Protection; 4.1.2 Protection by Legal Enforcement; 4.1.3 Legal-Contractual Protection Means; 4.1.4 Summary Legally-driven Protection; 4.2 Market-driven Protection; 4.2.1 Market-Monitoring of IP-related Know-How 4.2.2 Market-Relational Efforts to Enhance IP Awareness4.2.3 Market-Educational Efforts; 4.2.4 Summary Market-driven Protection; 4.3 Human-driven Protection; 4.3.1 Human-Controlling Protection Means; 4.3.2 Human-Motivational; 4.3.3 Protection by Human-Educational Means; 4.3.4 Summary Human-driven Protection; 4.4 Technology-driven Protection; 4.4.1 Application of Protective Technologies; 4.4.2 Technology-Intrinsic Protection Means; 4.4.3 Managing Technology and Technological Know-How Distribution; 4.4.4 Summary Technology-driven Protection; 4.5 Business-related Protection 4.5.1 Protection by Differentiation4.5.2 Protection by Operational Control; 4.5.3 Protection by Prevention: The Avoidance Tactic; 4.5.4 Summary Business-related Protection; Chapter-5; Integrated Management of Piracy Intelligence; 5.1 Evaluation of Key Technologies and Know-How; 5.2 Composition of Preventive Protection; 5.3 Piracy Intelligence and IP Monitoring; 5.4 Evaluation of Infringements and IP Threats; 5.5 Application of Factual and Legal Protection Means; 5.6 Institutionalizing IP Protection; 5.7 The Integrated Management Model for Piracy Intelligence Using the IP Protection Star EffectivelyChapter-6; 6.1 Determine What Needs to be Protected; 6.2 Be Creative in IPR Applications; 6.3 Protect IP Beyond IPR Protection; 6.4 Assimilate Cultural Differences; 6.5 Create Awareness, Retain Key Employees and Exploit Advantages as a Foreign Firm; 6.6 Establish Early Warning Signals by Means of Piracy Intelligence and IP Monitoring; 6.7 Generate IP for Differentiation and Exploit Differentiation for Protection; 6.8 Outperform Imitation by Process Excellence and Operational Control; 6.9 Exploit IP Threats and Learn from Imitation 6.10 Define Protection Tasks and Roles |
ISBN: | 978-3-642-30592-4 ; 978-3-642-30591-7 |
Other identifiers: | 10.1007/978-3-642-30592-4 [DOI] |
Source: | ECONIS - Online Catalogue of the ZBW |
Persistent link: https://www.econbiz.de/10014016342