technology protection
Recently Published Documents


TOTAL DOCUMENTS

29
(FIVE YEARS 15)

H-INDEX

2
(FIVE YEARS 0)

Author(s):  
Tuan Anh Nguyen ◽  
Hiep Cong Pham ◽  
Martin Dick ◽  
Joan Richardson

This study employs a quantitative method to investigate different types of trust in m-payment adoption. It aims to overcome the limitation of previous studies which are lack of differentiating trust types and investigating any mediating effect to m-payment adoption. Data of the study was collected in Vietnam, one of fastest growing m-payment usage markets globally in 2019. The research found significant and positive impacts of m-payment provider trust, institution-based trust, and seller trust on the overall consumer trust, which then fully mediates the relationships of three trust types and m-payment adoption. The study also revealed that technology trust is embedded in m-payment provider trust, suggesting that the m-payment provider is considered fully responsible for ensuring technology protection from the perspective of the m-payment consumers. The results enable researchers to better understand trust characteristics in m-payment adoption as well as technology adoption in general. In addition, the findings are beneficial to practitioners such as policy makers, consultants, and m-payment service providers to improve different elements of consumer trust, leading to higher m-payment adoption.


2021 ◽  
Vol 13 (13) ◽  
pp. 7020
Author(s):  
Hyunae Park ◽  
Youngcheon Yoo ◽  
Hwansoo Lee

Given the importance of technologies to organizations, technology leakages can cause considerable financial losses and threaten the survival of firms. Although organizations use technology protection diagnostic models to prevent such leakages, most diagnostic models focus on cybersecurity, and the evaluation system is complex, making it difficult for SMEs to use it. This makes them unsuitable for the general technology protection diagnosis of companies. Hence, this study proposes a diagnostic model that assesses these technology protection capabilities of organizations from personnel and administrative perspectives. Drawing upon the individual elements of the 7S model—shared values, strategy, structure, systems, staff, style, and skills—our model analyzes the influence of the elements on the technology protection capabilities of organizations. To determine this influence, the study conducts a questionnaire survey among 435 employees from large, larger medium-sized, and small and medium enterprises. Using the partial least squares and the artificial neural network methods, the study determines the ranking of the relative importance of the 7s elements. The results show that the shared values element most significantly influences these capabilities. The remaining elements influence the technology protection capabilities in the following order from the greatest to the least effect: staff, strategy, structure, systems, style, and skills. These findings highlight the significance of developing an awareness of the necessity of technology protection among all the members of an organization.


2020 ◽  
Vol 5 (1) ◽  
pp. 15-35
Author(s):  
Runggu Prilia Ardes

ABSTRAKUndang-Undang Republik Indonesia Nomor 21 Tahun 2013 tentang Keantariksaan mengamanatkan Indonesia untuk menguasai teknologi keantariksaan secara mandiri. Namun, pemenuhan tujuan tersebut tidak mudah karena teknologi keantariksaan bersifat sensitif sehingga persebarannya dilindungi dan dibatasi oleh negara-negara maju. Wujud pelindungan tersebut adalah rezim pengendalian ekspor yang pada dasarnya bersifat soft law (hukum lunak), namun dalam penerapannya mengikat secara mutlak. Indonesia tengah menyusun sebuah Peraturan Pemerintah dengan harapan dapat meyakinkan negara-negara maju bahwa teknologi mereka akan aman di Indonesia. Tulisan ini hendak menganalisis bagaimana standar pengaturan pelindungan teknologi sensitif di negara-negara dan apakah ada kesenjangan antara praktik negara-negara dengan di Indonesia, dengan menggunakan metode perbandingan yaitu membandingkan peraturan di negara-negara (Uni Eropa dan Tiongkok) dengan peraturan Indonesia. Hasil analisis menunjukkan standar pengaturan pelindungan teknologi sensitif di negara-negara umumnya memuat (i) konsep pelindungan teknologi; (ii) penerapan rezim pengendalian ekspor internasional; (iii) daftar teknologi sensitif keantariksaan dan prinsip catch-all; (iv) perizinan dan penilaian; serta (v) pengawasan. Tulisan ini juga menemukan adanya kesenjangan antara standar tersebut dengan rancangan Peraturan Pemerintah di Indonesia. Kata kunci: pelindungan teknologi; pengendalian ekspor; teknologi sensitif. ABSTRACTLaw of the Republic of Indonesia Number 21 Year 2013 concerning Space Activities mandates Indonesia to master space technology independently. However, fulfilling these objectives is difficult because space technology is sensitive so that its distribution is protected and limited by developed countries. Such form of protection is export control regimes which is basically soft law but, in its application, is absolutely binding. Indonesia is currently drafting a Government Regulation in the hope of convincing developed countries that their technology will be safe in Indonesia. This paper intends to analyze how the standards for the regulation of the protection of sensitive technology in some States and whether there is a gap between such practices and in Indonesia, with comparative method which is comparing existing regulations in several States (European Union and China) with Indonesian regulations. The result of the analysis shows that the regulatory standards for sensitive technology protection in States generally consist of (i) the concept of technological protection; (ii) implementation of international export control regimes; (iii) list of space-sensitive technologies and the catch-all principle; (iv) licensing and assessment; and (v) supervision. This paper also finds gaps between these standards and the draft Government Regulation in Indonesia. Keywords: export control; sensitive technology; technology protection.


Sign in / Sign up

Export Citation Format

Share Document