Résumés
Abstract
This paper assesses risks of knowledge leakage associated with training in technology transfers. Today states want to master sovereign technologies. As a consequence, exporting firms have adapted their offers to respond to customers’ requests and provide training in technology transfer contracts. We have recorded the perception of trainers regarding risks of knowledge leakage associated with training activities. Due to different interpretations of technology transfers and related risks, trainers’ assessment of knowledge leakages is not homogeneous in the training process. A typology of trainers and their typical behaviors in professional situations is proposed and leads to recommendations to mitigate knowledge leakages.
Keywords:
- Knowledge leakages,
- Risk,
- Technology transfers,
- Training,
- Sovereign technologies
Résumé
Cet article évalue les risques de fuite de connaissances associés à la formation dans le cadre des contrats de transfert de technologie. Aujourd’hui, les États veulent maîtriser les technologies souveraines. En conséquence, les entreprises exportatrices ont adapté leurs offres pour répondre aux demandes des clients et donc dispenser une formation. Après avoir recueilli la perception des formateurs engagés dans ces contrats, une typologie des formateurs et de leurs comportements typiques dans les différentes situations professionnelles est proposée. Le tout conduit à des recommandations pour atténuer les fuites de connaissances.
Mots-clés :
- Fuite de connaissances,
- Risque,
- Transfert de technologie,
- Formation,
- Technologies de souverainetés
Resumen
Este artículo evalúa los riesgos de la fuga de conocimientos asociados a la formación en los casos de transferencia de tecnología. Actualmente, los Estados desean controlar las tecnologías de soberanía. Como consecuencia, las empresas exportadoras proponen una formación en sus contratos de transferencia de tecnología. Al tomar en cuenta la percepción de los profesores que son confrontados a estas situaciones, hemos observado un riesgo importante de fuga de conocimiento. Por ello, proponemos una tipología de profesores y de sus comportamientos típicos en situación profesional, seguido de recomendaciones para disminuir dichas fugas y tener un mejor control de los conocimientos vendidos.
Palabras clave:
- Fuga de conocimiento,
- Riesgo,
- Transferencia de tecnología,
- Formación,
- Tecnología de soberanía
Parties annexes
Bibliography
- Agudelo, Carlos A., Bosua, Rachelle; Ahmad, Atif.; Maynard, Sean B. (2016). “Mitigating Knowledge Leakage Risk in Organizations through Mobile Devices”, 27th Australasian Conference on Information Systems, Wollongong NSW, Australia.
- Ahmad, Atif; Bosua, Rachelle; Scheepers, Rens (2014) “Protecting organizational competitive advantage: A knowledge leakage perspective”, Computers & Security, 42, 27-39.
- Ahmad, Atif; Tscherning, Heidi; Bosua, Rachelle; Scheepers; Rens (2015). “Guarding Against the Erosion of Competitive Advantage: A Knowledge Leakage Mitigation Model”. Thirty Sixth International Conference on Information Systems, Fort Worth 2015.
- Andersen, Jim (2012). “Protective capacity and absorptive capacity Managing the balance between retention and creation of knowledge-based resources”. The Learning Organization, 19(5), 440-452.
- Barbaroux, Pierre; Godé, Cécile (2012). “Changement technologique et transfert de compétences: une réflexion à partir du cas des équipages de transport de l’armée de l’air”. Management International, 16 (hors-série), 57-73.
- Bateson, Gregory (1984). La nature et la pensée. Paris: Seuil, 242 p.
- Brauer, Jurgen; Dunne, Paul (2004). Arms trade and economic development: theory, policy and cases in arms trade offsets. London; New York: Routledge, 344 p.
- Caravalho, Vitor R.; Balasubramanyan, Rammath; Cohen, William W. (2009). “Email Leaks and Recipient Suggestions: A User Study with Mozilla Thunderbird”. CHI 2009.
- Cohen, Wesley M.; Levinthal, Daniel A. (1990). “Absorptive Capacity: A New Perspective on Learning and Innovation”. Administrative Science Quarterly, 35(1), 128-52.
- Cohendet, Patrick; Llerena, Patrick (1999). “La conception de la firme comme processeur de connaissances”. Revue d’Economie Industrielle, 88(2), 211-235.
- Colwill, Carl (2009). “Human factors in information security: The insider threat - Who can you trust these days?” Information Security Technical Report, 14(4), 186-196.
- Cowan, Robin; David, Paul A.; Foray, Dominique (2000). “The explicit economics of knowledge codification and tacitness”. Industrial and Corporation Change, 9(2), 211-253.
- Davenport, Thomas H; Prusak, Laurence (1998). “Working Knowledge: How Organizations Manage What They Know”. Boston: Harvard Business School Press.
- DCBIS. (2015). “Offsets in Defense Trade Nineteenth Study Conducted Pursuant to Section 723 of the Defense Production Act of 1950, as Amended. U.S”. Department of Commerce Bureau of Industry and Security.
- Desouza, Kevin C. (2005). “New frontiers of knowledge management”. Basingstoke. 275 p.
- Desouza, Kevin C. (2006). “Knowledge Security: An Interesting Research Space”. Journal of Information Science and The Technology, 3(1), 1-7.
- Durst, Susanne; Ferenhof, Helio A. (2014). “Knowledge Leakages and Ways to Reduce Them in Small and Medium-Sized Enterprises (SMEs)”. Information, 5, 440-450.
- Easterby-Smith, Mark; Lyles, Marjorie A.;Tsang, Eric. W. (2008). “Inter-Organizational Knowledge Transfer: Current Themes and Future Prospects”. Journal of Management Studies, 45(4), 677-690.
- Foss, Nicolai J.; Husted, Kenneth; Michailova, Snejina (2010). “Governing Knowledge Sharing in Organizations: Levels of Analysis, Governance Mechanisms, and Research Directions”. Journal of Management Studies, 47(3), 455-482.
- Frishammar, Johan; Ericsson, Kristian; Patel, Pankaj C. (2015). “The dark side of knowledge transfer: Exploring knowledge leakage in joint R&D projects”. Technovation, 41-42, 75-88.
- Hébert, Jean-Paul (1996). “Offsets and French arms exports”. In S Martin (ed.), The economics of offsets. Defence procurement and countertrade. Harwood Academic Publishers, pp. 139-162.
- Hurmelinna, Pia; Kyläheiko, Kalevi; Jauhiainen, Tommi (2007). “The Janus face of the appropriability regime in the protection of innovations: theoretical re-appraisal and empirical analysis”. Technovation, 27(3), 133-144.
- Ianakiev, Gueorgui (2014). “Defence offsets: regulation and impact on the integration of the European defence equipment market”. The Evolving Boundaries of Defence: an assessment of recents shifts in defence activities (Emerald Publishing., Vol. 23). Bellais R (ed.).
- Jansen, Jos (2010). “Strategic Information Disclosure and Competition for an Imperfectly Protected Innovation”. The Journal of Industrial Economics, 58(2), 349-372.
- Jiang, Xu; Li, Mei; Gao, Shanxing; Bao, Yongchuan; Jiang, Feifei (2013). “Managing knowledge leakage in strategic alliances: The effects of trust and formal contracts”. Industrial Marketing Management, 42(6), 983-991.
- King, David R.; Nowack, Mark L. (2003). “The Impact of Government Policy on Technology Transfer: An Aircraft Industry Case Study”. Journal of Engineering and Technology Management, 20, 303-318.
- Lau, Antonio K. W.; Yam, Richard, C. M., Tang, Esther; P. Y.; Sun, H. Y. (2010). “Factors influencing the relationship between product modularity and supply chain integration”. International Journal of Operations & Production Management, 30(9), 951-977.
- Lebart, Lucien; Salem, André (1994). Statistique textuelle. Dunod. 342 p.
- Li, Juan; Poppo, Laura; Zhou, Zheng (2010). “Relational mechanisms, formal contracts, and local knowledge acquisition”. Strategic Management Journal, 31(4), 349-370.
- Liebeskind, Julia (1996). “Knowledge, strategy, and the theory of the firm”. Strategic Management Journal, 17(S2), 93-107.
- Mentzas, Gregoris; Apostolou, Dimitris; Abecker, Andreas; Young, Ron. (2003). “Knowledge Asset Management Beyond the Process-centred and Produd-centred Approaches”. Springer.
- Nonaka, Ikujiro; Takeuchi, Hirotaka (1995). The knowledge-creating company: how Japanese companies create the dynamics of innovation. New York: Oxford University Press.
- Nonaka, Ikujiro; Toyama, Ryoko; Konno, Noboru (2000). “SECI, ba, and Leadership: a unified model of dynamic knowledge creation”. Long Range Planning, 33(1), 5-34.
- Norman, Patricia (2001). Are Your Secrets Safe? Knowledge Protection in Strategic Alliances”. Business Horizons, 44(6), 51-60.
- Parker, Hamieda (2012). “Knowledge acquisition and leakage in inter-firm relationships involving new technology-based firms”. Management Decision, 50(9), 1618-1633.
- Polanyi, Michael (1967). The tacit dimension. London: Routledge and Keagan Paul.
- Ratineau, Pierre; Marchand, Pascal (2012). “Application de la méthode ALCESTE à de “gros” corpus”. 11eme Journées d’Analyse statistique des Données Textuelles (pp. 835-844).
- Reinert, Max. (1990). ALCESTE: “Une méthodologie d’analyse des données textuelles et une application”. Bulletin de Méthodologie Sociologique, 26, 24-54.
- Ria, Luc; Saury, Jacques; Sève, Carole; Durand, Marc (2001). “Les dilemmes des enseignants débutants”. Science et motricité, 42, 47-58. Accessed 19 March 2015
- Touraine, Alain. (1966). La conscience ouvrière. Le seuil. 399 p.
- Weick, Karl. E. (1995). Sensemaking in Organizations (SAGE Publications.). University of Michigan Business School, USA.