Technology transfer to China: conflict of interest within multinational corporations
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Abschlussarbeit Buch |
Sprache: | English |
Veröffentlicht: |
Frankfurt/M. ; San Francisco
Europ. Management Publ.
2005
|
Ausgabe: | 1. ed. |
Schlagworte: | |
Online-Zugang: | Inhaltstext Inhaltsverzeichnis |
Beschreibung: | Hergestellt on demand |
Beschreibung: | XII, 230 S. graph. Darst. |
ISBN: | 3938877014 |
Internformat
MARC
LEADER | 00000nam a2200000 c 4500 | ||
---|---|---|---|
001 | BV021697141 | ||
003 | DE-604 | ||
005 | 20110906 | ||
007 | t | ||
008 | 060816s2005 gw d||| m||| 00||| eng d | ||
015 | |a 06,N10,0543 |2 dnb | ||
015 | |a 06,B29,0097 |2 dnb | ||
016 | 7 | |a 978395581 |2 DE-101 | |
020 | |a 3938877014 |c (BoD GmbH) Pp. : EUR 49.90 |9 3-938877-01-4 | ||
024 | 3 | |a 9783938877012 | |
035 | |a (OCoLC)71216381 | ||
035 | |a (DE-599)BVBBV021697141 | ||
040 | |a DE-604 |b ger |e rakddb | ||
041 | 0 | |a eng | |
044 | |a gw |c XA-DE-HE | ||
049 | |a DE-M382 |a DE-703 |a DE-1102 |a DE-83 |a DE-2070s |a DE-188 | ||
050 | 0 | |a HC430.T4 | |
082 | 0 | |a 338.9260951 |2 22/ger | |
084 | |a QC 344 |0 (DE-625)141272: |2 rvk | ||
084 | |a 330 |2 sdnb | ||
100 | 1 | |a Rössing, Sönke M. |e Verfasser |4 aut | |
245 | 1 | 0 | |a Technology transfer to China |b conflict of interest within multinational corporations |c Sönke M. Rössing |
250 | |a 1. ed. | ||
264 | 1 | |a Frankfurt/M. ; San Francisco |b Europ. Management Publ. |c 2005 | |
300 | |a XII, 230 S. |b graph. Darst. | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
500 | |a Hergestellt on demand | ||
502 | |a Zugl.: Vallendar, Wiss. Hochsch. für Unternehmensführung, Diss., 2004 | ||
650 | 4 | |a Multinationales Unternehmen | |
650 | 4 | |a Conflict of interests |z China | |
650 | 4 | |a International business enterprises |z China | |
650 | 4 | |a Technology transfer |z China | |
650 | 0 | 7 | |a Multinationales Unternehmen |0 (DE-588)4075092-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Technologietransfer |0 (DE-588)4059277-7 |2 gnd |9 rswk-swf |
651 | 7 | |a China |0 (DE-588)4009937-4 |2 gnd |9 rswk-swf | |
655 | 7 | |0 (DE-588)4113937-9 |a Hochschulschrift |2 gnd-content | |
689 | 0 | 0 | |a Multinationales Unternehmen |0 (DE-588)4075092-9 |D s |
689 | 0 | 1 | |a Technologietransfer |0 (DE-588)4059277-7 |D s |
689 | 0 | 2 | |a China |0 (DE-588)4009937-4 |D g |
689 | 0 | |5 DE-604 | |
856 | 4 | 2 | |q text/html |u http://deposit.dnb.de/cgi-bin/dokserv?id=2772537&prov=M&dok_var=1&dok_ext=htm |3 Inhaltstext |
856 | 4 | 2 | |m HBZ Datenaustausch |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=014911128&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
999 | |a oai:aleph.bib-bvb.de:BVB01-014911128 |
Datensatz im Suchindex
_version_ | 1804135526084640768 |
---|---|
adam_text | Contents
Figures v
Tables viii
Abbreviations x
1 Introduction to the Research Problem 1
1.1 Problem Purpose 1
1.2 Background k Definition of Terras G
1.2.1 Technology and Intellectual Property 7
1.2.2 Technology Transfer 9
1.2.3 Expropriation Risks 11
1.3 Literature Review Research Gap 12
1.3.1 Organizational conflict 12
1.3.2 HQ Subsidiary Relationship 11
1.3.3 The Foreign Firm in China 17
1.3.4 Research Gap 19
1.4 Research Methodology 20
1.5 Structure of the Dissertation 21
2 Theoretical Analysis of the Conflict Situation 25
2.1 Selection of Theories 25
2.2 Organizational Conflict Theory 27
2.2.1 Introduction to Conflict Theory 27
2.2.2 Organizational Conflict and Technology Transfer 29
2.2.3 Conflict Management in the Multinational Corporation 39
2.3 Game Theory ^
2.3.1 Introduction to Game Theory 11
2.3.2 Technology Transfer as a Game 10
2.3.3 Information and Cooperation in the Technology Transfer Game . ¦ (
3 Proposed Technology Transfer Framework 67
3.1 Structuring the Conflict Situation f 8
3.1.1 Vulnerability W
3.1.2 Competitive advantage
iii
Contents
3.2 Types of conflict situations 75
3.2.1 Type Alert: High Vulnerability and Competitive Advantage ... 75
3.2.2 Type Ambiguity: Low Vulnerability and Competitive Advantage . 77
3.2.3 Type Slack: Low Vulnerability and Absence of Competitive Ad¬
vantage 78
3.3 Designing the Conflict Situation 78
3.3.1 Before technology transfer: Reducing Information Asymmetries . 80
3.3.2 Cooperation in repeated technology transfer 84
4 Empirical Method for the Evaluation of the Proposed Technology Trans¬
fer Framework 89
4.1 Case Studies as the Appropriate Research Method 89
4.2 Case Study Design 91
4.2.1 Multiple case design 91
4.2.2 Selection of Cases 92
4.2.3 Description of Cases 94
4.2.4 Case Study Protocol Design 99
4.2.5 Pretest 104
4.3 Data Collection k Analysis 105
4.3.1 Data Collection 105
4.3.2 Analysis of the Data 106
4.4 Research Design Quality 108
4.4.1 Reliability 108
4.4.2 External Validity 109
4.4.3 Construct Validity 109
5 Presentation of the Empirical Results from Case Study Research 113
5.1 Existence of a Conflict Situation 115
5.1.1 Expropriation risks in China 115
5.1.2 Interdependence and Technology Transfer 126
5.1.3 Information Asymmetry between Headquarters and Subsidiary . . 134
5.1.4 Technology transfer and conflict of interest 137
5.2 Structuring the Conflict Situation 140
5.2.1 Vulnerability of Transferred Technology 140
5.2.2 Competitive Advantage and Technology Transfer 153
5.2.3 Identifying Conflict Types 156
5.2.4 Conflict Types and Conflict Intensity 157
5.3 Designing the Conflict Situation 161
5.3.1 Reducing Information Asymmetry 161
5.3.2 Cooperation in Repeated Technology Transfer 167
6 Implications from the Results of the Case Study Research for the Con¬
flict Situation 173
6.1 Research Implications 173
iv
Contents
6.1.1 Structuring the Conflict Situation 173
6.1.2 Existence of a Conflict Situation 178
6.1.3 Designing the Conflict Situation 179
6.2 Managerial Implications 183
6.2.1 MNCs Facing Expropriation Risks in China 183
6.2.2 Developing and Implementing a Technology Transfer Strategy . . 181
6.3 Further Research and Research Agenda 188
6.3.1 Further Research 188
6.3.2 Research Agenda 191
7 Conclusion 193
Appendix 196
A Interview Guide 197
B Example of a Technology Transfer Tracking Form 205
C Summary of the Results for the Research Propositions 207
References 212
v
List of Figures
1.1 Example for Expropriation in the Automotive Industry in China 3
1.2 Research Objective and Questions 6
1.3 Major Empirical Studies on Organizational Conflict 13
1.4 Major Empirical Studies on the Headquarters Subsidiary Relationship . . 16
1.5 Illustration of the Research Gap 19
1.6 Research Method 21
1.7 Structure of the Dissertation 22
2.1 Classification of Conflicts 28
2.2 Stakeholder Groups in the Conflict Situation 30
2.3 Vertical Interdependence in the Headquarters Subsidiary Relationship . . 33
2.4 Cooperative Interests vs. Competitive Interests 3G
2.5 Conflict Resolution Styles for Interpersonal Conflict 40
2.6 Game theoretic Modeling of the Conflict Situation 47
2.7 Cost, and Benefits for Both Headquarters and Subsidiary as a Proxy for
the Estimation of their Payoffs 52
2.8 Bi matrix of the Sequential Technology Transfer Game 53
2.9 The Extensive Form of the Sequential Technology Transfer Game .... 54
2.10 The Simplified Bi matrix of the Sequential Technology Transfer Game . . 55
2.11 Bi matrix of the Sequential Technology Transfer Game under Incomplete
Information 57
2.12 The Extensive Form of Technology Transfer Game under Perfect. Com¬
plete Information and Exogenous Uncertainty 58
2.13 Extensive Form of the Technology Transfer Game with Complete but
Imperfect Information GO
2.14 Strategic Form of the Prisoner s Dilemma 62
2.15 Illustration of the Tit for tat Strategy 04
2.16 Assumptions about Model Extensions in the technology transfer game . . 66
3.1 Overview of the Conceptual Framework 68
3.2 Dimensions of the Vulnerability Construct 70
3.3 Types of Conflict Situations 76
3.4 Strategies for Designing the Conflict Situation 80
3.5 Distribution of the Proposition across the Framework 88
vii
List of Figures
4.1 Phases within Case Study Research 110
5.1 Frequency of Formal and Informal Technology Transfer Across 12 Head¬
quarters Subsidiary Pairs 129
5.2 Assessment of Vulnerability of Transferred Technologies by Participating
MNCs in the Sample 152
6.1 Managerial Framework for Drafting and Implementing Technology Trans¬
fer Strategies 186
viii
List of Tables
2.1 Stakeholder Groups and their Goals in the Conflict Situation 32
2.2 Typical Negative Consequences of Organizational Conflict 38
4.1 Examples of Case Studies in International and Chinese Settings 91
4.2 Description of the Sampling Process 94
4.3 Summary of the Major Characteristics of the Interviewed MNCs 95
4.4 Design of Selected Case Study Questions 101
4.5 Reliability and Validity in Case Study Research 108
5.1 Structure of Chapters Five and Six and their Relationship Ill
5.2 Perception of Imitation Risks among Interviewees ll(i
5.3 Expected Changes by Interviewees in Imitation Risks 117
5.4 Respondents Evaluation of the Chinese IPR Protection Framework ... 119
5.5 Comments on IPR Regime in China by Four Selected Cases 120
5.6 Respondents Experience with Enforcement of Chinese Il R Law 121
5.7 Incidences of Technology Expropriation as Observed by Respondents . . 122
5.8 Means by which Technology was Expropriated 12. !
5.9 Recipient of Expropriated Technology (Leakage points) 121
5.10 Types of Expropriated Technology 121
5.11 Expropriation Risk and Experienced Incidences by Three Selected Cases 125
5.12 Technology Commitment of the MNCs to China as Compared to the
Home Country 127
5.13 Methods to Evaluate Risks Relating to Technology Transfer 133
5.14 Perception of Information Asymmetries by Headquarters and Subsidiary
by Pairs 1M
5.15 Headquarters Dependence on Subsidiary Supplied Information 13G
5.16 Competitiveness of Interests in the Headquarters subsidiary Relationship 138
5.17 Relationship between Employee Turnover and Expropriation Ill
5.18 Relationship between Product Observation and Expropriation (Selected
Cases; Subsidiary Perspective) 1 13
5.19 Absorptive Capacities of Leakage Points (Selected Cases: Subsidiary Per¬
spective) 147
5.20 Protection Mechanism Used by Participating MNCs 149
5.21 Summary of the Results of the Propositions relating to the Vulnerability
Construct I 1
ix
List of Tables
5.22 Technology Representing Competitive Advantage and Scope of its Trans¬
fer to China (Headquarters Perspective) 154
5.23 Classification of Cases by Conflict Type 157
C.I Summary of Results for Propositions Relating to Vulnerability 208
C.2 Summary of Results for Propositions Relating to Competitive Advantage 209
C.3 Summary of Results for Propositions Relating to Type Alert 209
C.4 Summary of Results for Propositions Relating to Types Ambiguity and
Slack 210
C.5 Summary of Results for Propositions Relating to Conflict design (1 of 2) 210
C.6 Summary of Results for Propositions Relating to Conflict design (2 of 2) 211
x
|
adam_txt |
Contents
Figures v
Tables viii
Abbreviations x
1 Introduction to the Research Problem 1
1.1 Problem Purpose 1
1.2 Background k Definition of Terras G
1.2.1 Technology and Intellectual Property 7
1.2.2 Technology Transfer 9
1.2.3 Expropriation Risks 11
1.3 Literature Review Research Gap 12
1.3.1 Organizational conflict 12
1.3.2 HQ Subsidiary Relationship 11
1.3.3 The Foreign Firm in China 17
1.3.4 Research Gap 19
1.4 Research Methodology 20
1.5 Structure of the Dissertation 21
2 Theoretical Analysis of the Conflict Situation 25
2.1 Selection of Theories 25
2.2 Organizational Conflict Theory 27
2.2.1 Introduction to Conflict Theory 27
2.2.2 Organizational Conflict and Technology Transfer 29
2.2.3 Conflict Management in the Multinational Corporation 39
2.3 Game Theory ^
2.3.1 Introduction to Game Theory 11
2.3.2 Technology Transfer as a Game 10
2.3.3 Information and Cooperation in the Technology Transfer Game . ¦" (
3 Proposed Technology Transfer Framework 67
3.1 Structuring the Conflict Situation f'8
3.1.1 Vulnerability W
3.1.2 Competitive advantage ''
iii
Contents
3.2 Types of conflict situations 75
3.2.1 Type Alert: High Vulnerability and Competitive Advantage . 75
3.2.2 Type Ambiguity: Low Vulnerability and Competitive Advantage . 77
3.2.3 Type Slack: Low Vulnerability and Absence of Competitive Ad¬
vantage 78
3.3 Designing the Conflict Situation 78
3.3.1 Before technology transfer: Reducing Information Asymmetries . 80
3.3.2 Cooperation in repeated technology transfer 84
4 Empirical Method for the Evaluation of the Proposed Technology Trans¬
fer Framework 89
4.1 Case Studies as the Appropriate Research Method 89
4.2 Case Study Design 91
4.2.1 Multiple case design 91
4.2.2 Selection of Cases 92
4.2.3 Description of Cases 94
4.2.4 Case Study Protocol Design 99
4.2.5 Pretest 104
4.3 Data Collection k Analysis 105
4.3.1 Data Collection 105
4.3.2 Analysis of the Data 106
4.4 Research Design Quality 108
4.4.1 Reliability 108
4.4.2 External Validity 109
4.4.3 Construct Validity 109
5 Presentation of the Empirical Results from Case Study Research 113
5.1 Existence of a Conflict Situation 115
5.1.1 Expropriation risks in China 115
5.1.2 Interdependence and Technology Transfer 126
5.1.3 Information Asymmetry between Headquarters and Subsidiary . . 134
5.1.4 Technology transfer and conflict of interest 137
5.2 Structuring the Conflict Situation 140
5.2.1 Vulnerability of Transferred Technology 140
5.2.2 Competitive Advantage and Technology Transfer 153
5.2.3 Identifying Conflict Types 156
5.2.4 Conflict Types and Conflict Intensity 157
5.3 Designing the Conflict Situation 161
5.3.1 Reducing Information Asymmetry 161
5.3.2 Cooperation in Repeated Technology Transfer 167
6 Implications from the Results of the Case Study Research for the Con¬
flict Situation 173
6.1 Research Implications 173
iv
Contents
6.1.1 Structuring the Conflict Situation 173
6.1.2 Existence of a Conflict Situation 178
6.1.3 Designing the Conflict Situation 179
6.2 Managerial Implications 183
6.2.1 MNCs Facing Expropriation Risks in China 183
6.2.2 Developing and Implementing a Technology Transfer Strategy . . 181
6.3 Further Research and Research Agenda 188
6.3.1 Further Research 188
6.3.2 Research Agenda 191
7 Conclusion 193
Appendix 196
A Interview Guide 197
B Example of a Technology Transfer Tracking Form 205
C Summary of the Results for the Research Propositions 207
References 212
v
List of Figures
1.1 Example for Expropriation in the Automotive Industry in China 3
1.2 Research Objective and Questions 6
1.3 Major Empirical Studies on Organizational Conflict 13
1.4 Major Empirical Studies on the Headquarters Subsidiary Relationship . . 16
1.5 Illustration of the Research Gap 19
1.6 Research Method 21
1.7 Structure of the Dissertation 22
2.1 Classification of Conflicts 28
2.2 Stakeholder Groups in the Conflict Situation 30
2.3 Vertical Interdependence in the Headquarters Subsidiary Relationship . . 33
2.4 Cooperative Interests vs. Competitive Interests 3G
2.5 Conflict Resolution Styles for Interpersonal Conflict 40
2.6 Game theoretic Modeling of the Conflict Situation 47
2.7 Cost, and Benefits for Both Headquarters and Subsidiary as a Proxy for
the Estimation of their Payoffs 52
2.8 Bi matrix of the Sequential Technology Transfer Game 53
2.9 The Extensive Form of the Sequential Technology Transfer Game . 54
2.10 The Simplified Bi matrix of the Sequential Technology Transfer Game . . 55
2.11 Bi matrix of the Sequential Technology Transfer Game under Incomplete
Information 57
2.12 The Extensive Form of Technology Transfer Game under Perfect. Com¬
plete Information and Exogenous Uncertainty 58
2.13 Extensive Form of the Technology Transfer Game with Complete but
Imperfect Information GO
2.14 Strategic Form of the Prisoner's Dilemma 62
2.15 Illustration of the Tit for tat Strategy 04
2.16 Assumptions about Model Extensions in the technology transfer game . . 66
3.1 Overview of the Conceptual Framework 68
3.2 Dimensions of the Vulnerability Construct 70
3.3 Types of Conflict Situations 76
3.4 Strategies for Designing the Conflict Situation 80
3.5 Distribution of the Proposition across the Framework 88
vii
List of Figures
4.1 Phases within Case Study Research 110
5.1 Frequency of Formal and Informal Technology Transfer Across 12 Head¬
quarters Subsidiary Pairs 129
5.2 Assessment of Vulnerability of Transferred Technologies by Participating
MNCs in the Sample 152
6.1 Managerial Framework for Drafting and Implementing Technology Trans¬
fer Strategies 186
viii
List of Tables
2.1 Stakeholder Groups and their Goals in the Conflict Situation 32
2.2 Typical Negative Consequences of Organizational Conflict 38
4.1 Examples of Case Studies in International and Chinese Settings 91
4.2 Description of the Sampling Process 94
4.3 Summary of the Major Characteristics of the Interviewed MNCs 95
4.4 Design of Selected Case Study Questions 101
4.5 Reliability and Validity in Case Study Research 108
5.1 Structure of Chapters Five and Six and their Relationship Ill
5.2 Perception of Imitation Risks among Interviewees ll(i
5.3 Expected Changes by Interviewees in Imitation Risks 117
5.4 Respondents'Evaluation of the Chinese IPR Protection Framework . 119
5.5 Comments on IPR Regime in China by Four Selected Cases 120
5.6 Respondents'Experience with Enforcement of Chinese Il'R Law 121
5.7 Incidences of Technology Expropriation as Observed by Respondents . . 122
5.8 Means by which Technology was Expropriated 12.'!
5.9 Recipient of Expropriated Technology (Leakage points) 121
5.10 Types of Expropriated Technology 121
5.11 Expropriation Risk and Experienced Incidences by Three Selected Cases 125
5.12 Technology Commitment of the MNCs to China as Compared to the
Home Country 127
5.13 Methods to Evaluate Risks Relating to Technology Transfer 133
5.14 Perception of Information Asymmetries by Headquarters and Subsidiary
by Pairs ' 1M
5.15 Headquarters'Dependence on Subsidiary Supplied Information 13G
5.16 Competitiveness of Interests in the Headquarters subsidiary Relationship 138
5.17 Relationship between Employee Turnover and Expropriation Ill
5.18 Relationship between Product Observation and Expropriation (Selected
Cases; Subsidiary Perspective) 1 13
5.19 Absorptive Capacities of Leakage Points (Selected Cases: Subsidiary Per¬
spective) 147
5.20 Protection Mechanism Used by Participating MNCs 149
5.21 Summary of the Results of the Propositions relating to the Vulnerability
Construct I"'1
ix
List of Tables
5.22 Technology Representing Competitive Advantage and Scope of its Trans¬
fer to China (Headquarters Perspective) 154
5.23 Classification of Cases by Conflict Type 157
C.I Summary of Results for Propositions Relating to Vulnerability 208
C.2 Summary of Results for Propositions Relating to Competitive Advantage 209
C.3 Summary of Results for Propositions Relating to Type Alert 209
C.4 Summary of Results for Propositions Relating to Types Ambiguity and
Slack 210
C.5 Summary of Results for Propositions Relating to Conflict design (1 of 2) 210
C.6 Summary of Results for Propositions Relating to Conflict design (2 of 2) 211
x |
any_adam_object | 1 |
any_adam_object_boolean | 1 |
author | Rössing, Sönke M. |
author_facet | Rössing, Sönke M. |
author_role | aut |
author_sort | Rössing, Sönke M. |
author_variant | s m r sm smr |
building | Verbundindex |
bvnumber | BV021697141 |
callnumber-first | H - Social Science |
callnumber-label | HC430 |
callnumber-raw | HC430.T4 |
callnumber-search | HC430.T4 |
callnumber-sort | HC 3430 T4 |
callnumber-subject | HC - Economic History and Conditions |
classification_rvk | QC 344 |
ctrlnum | (OCoLC)71216381 (DE-599)BVBBV021697141 |
dewey-full | 338.9260951 |
dewey-hundreds | 300 - Social sciences |
dewey-ones | 338 - Production |
dewey-raw | 338.9260951 |
dewey-search | 338.9260951 |
dewey-sort | 3338.9260951 |
dewey-tens | 330 - Economics |
discipline | Wirtschaftswissenschaften |
discipline_str_mv | Wirtschaftswissenschaften |
edition | 1. ed. |
format | Thesis Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02317nam a2200565 c 4500</leader><controlfield tag="001">BV021697141</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20110906 </controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">060816s2005 gw d||| m||| 00||| eng d</controlfield><datafield tag="015" ind1=" " ind2=" "><subfield code="a">06,N10,0543</subfield><subfield code="2">dnb</subfield></datafield><datafield tag="015" ind1=" " ind2=" "><subfield code="a">06,B29,0097</subfield><subfield code="2">dnb</subfield></datafield><datafield tag="016" ind1="7" ind2=" "><subfield code="a">978395581</subfield><subfield code="2">DE-101</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">3938877014</subfield><subfield code="c">(BoD GmbH) Pp. : EUR 49.90</subfield><subfield code="9">3-938877-01-4</subfield></datafield><datafield tag="024" ind1="3" ind2=" "><subfield code="a">9783938877012</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)71216381</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV021697141</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rakddb</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="044" ind1=" " ind2=" "><subfield code="a">gw</subfield><subfield code="c">XA-DE-HE</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-M382</subfield><subfield code="a">DE-703</subfield><subfield code="a">DE-1102</subfield><subfield code="a">DE-83</subfield><subfield code="a">DE-2070s</subfield><subfield code="a">DE-188</subfield></datafield><datafield tag="050" ind1=" " ind2="0"><subfield code="a">HC430.T4</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">338.9260951</subfield><subfield code="2">22/ger</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">QC 344</subfield><subfield code="0">(DE-625)141272:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">330</subfield><subfield code="2">sdnb</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Rössing, Sönke M.</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Technology transfer to China</subfield><subfield code="b">conflict of interest within multinational corporations</subfield><subfield code="c">Sönke M. Rössing</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">1. ed.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Frankfurt/M. ; San Francisco</subfield><subfield code="b">Europ. Management Publ.</subfield><subfield code="c">2005</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">XII, 230 S.</subfield><subfield code="b">graph. Darst.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Hergestellt on demand</subfield></datafield><datafield tag="502" ind1=" " ind2=" "><subfield code="a">Zugl.: Vallendar, Wiss. Hochsch. für Unternehmensführung, Diss., 2004</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Multinationales Unternehmen</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Conflict of interests</subfield><subfield code="z">China</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">International business enterprises</subfield><subfield code="z">China</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Technology transfer</subfield><subfield code="z">China</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Multinationales Unternehmen</subfield><subfield code="0">(DE-588)4075092-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Technologietransfer</subfield><subfield code="0">(DE-588)4059277-7</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="651" ind1=" " ind2="7"><subfield code="a">China</subfield><subfield code="0">(DE-588)4009937-4</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)4113937-9</subfield><subfield code="a">Hochschulschrift</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Multinationales Unternehmen</subfield><subfield code="0">(DE-588)4075092-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Technologietransfer</subfield><subfield code="0">(DE-588)4059277-7</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">China</subfield><subfield code="0">(DE-588)4009937-4</subfield><subfield code="D">g</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="q">text/html</subfield><subfield code="u">http://deposit.dnb.de/cgi-bin/dokserv?id=2772537&prov=M&dok_var=1&dok_ext=htm</subfield><subfield code="3">Inhaltstext</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">HBZ Datenaustausch</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=014911128&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-014911128</subfield></datafield></record></collection> |
genre | (DE-588)4113937-9 Hochschulschrift gnd-content |
genre_facet | Hochschulschrift |
geographic | China (DE-588)4009937-4 gnd |
geographic_facet | China |
id | DE-604.BV021697141 |
illustrated | Illustrated |
index_date | 2024-07-02T15:16:02Z |
indexdate | 2024-07-09T20:41:54Z |
institution | BVB |
isbn | 3938877014 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-014911128 |
oclc_num | 71216381 |
open_access_boolean | |
owner | DE-M382 DE-703 DE-1102 DE-83 DE-2070s DE-188 |
owner_facet | DE-M382 DE-703 DE-1102 DE-83 DE-2070s DE-188 |
physical | XII, 230 S. graph. Darst. |
publishDate | 2005 |
publishDateSearch | 2005 |
publishDateSort | 2005 |
publisher | Europ. Management Publ. |
record_format | marc |
spelling | Rössing, Sönke M. Verfasser aut Technology transfer to China conflict of interest within multinational corporations Sönke M. Rössing 1. ed. Frankfurt/M. ; San Francisco Europ. Management Publ. 2005 XII, 230 S. graph. Darst. txt rdacontent n rdamedia nc rdacarrier Hergestellt on demand Zugl.: Vallendar, Wiss. Hochsch. für Unternehmensführung, Diss., 2004 Multinationales Unternehmen Conflict of interests China International business enterprises China Technology transfer China Multinationales Unternehmen (DE-588)4075092-9 gnd rswk-swf Technologietransfer (DE-588)4059277-7 gnd rswk-swf China (DE-588)4009937-4 gnd rswk-swf (DE-588)4113937-9 Hochschulschrift gnd-content Multinationales Unternehmen (DE-588)4075092-9 s Technologietransfer (DE-588)4059277-7 s China (DE-588)4009937-4 g DE-604 text/html http://deposit.dnb.de/cgi-bin/dokserv?id=2772537&prov=M&dok_var=1&dok_ext=htm Inhaltstext HBZ Datenaustausch application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=014911128&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis |
spellingShingle | Rössing, Sönke M. Technology transfer to China conflict of interest within multinational corporations Multinationales Unternehmen Conflict of interests China International business enterprises China Technology transfer China Multinationales Unternehmen (DE-588)4075092-9 gnd Technologietransfer (DE-588)4059277-7 gnd |
subject_GND | (DE-588)4075092-9 (DE-588)4059277-7 (DE-588)4009937-4 (DE-588)4113937-9 |
title | Technology transfer to China conflict of interest within multinational corporations |
title_auth | Technology transfer to China conflict of interest within multinational corporations |
title_exact_search | Technology transfer to China conflict of interest within multinational corporations |
title_exact_search_txtP | Technology transfer to China conflict of interest within multinational corporations |
title_full | Technology transfer to China conflict of interest within multinational corporations Sönke M. Rössing |
title_fullStr | Technology transfer to China conflict of interest within multinational corporations Sönke M. Rössing |
title_full_unstemmed | Technology transfer to China conflict of interest within multinational corporations Sönke M. Rössing |
title_short | Technology transfer to China |
title_sort | technology transfer to china conflict of interest within multinational corporations |
title_sub | conflict of interest within multinational corporations |
topic | Multinationales Unternehmen Conflict of interests China International business enterprises China Technology transfer China Multinationales Unternehmen (DE-588)4075092-9 gnd Technologietransfer (DE-588)4059277-7 gnd |
topic_facet | Multinationales Unternehmen Conflict of interests China International business enterprises China Technology transfer China Technologietransfer China Hochschulschrift |
url | http://deposit.dnb.de/cgi-bin/dokserv?id=2772537&prov=M&dok_var=1&dok_ext=htm http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=014911128&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
work_keys_str_mv | AT rossingsonkem technologytransfertochinaconflictofinterestwithinmultinationalcorporations |