Liese H, Rulhoff S, Stjepandić J (2013) Enhancing product innovation by implementing intellectual property protection into the virtual product creation. In: Stjepandić J, Rock G, Bil C (eds) Concurrent engineering approaches for sustainable product development in a multi-disciplinary environment. Proceedings of the 19th ISPE international conference on concurrent engineering. Springer, London, pp 267–278
CrossRef
Google Scholar
Dyer JA (2014) The contest of the century: the new era of competition with China—and how America can win. Alfred A. Knopf, New York
Google Scholar
Herman BD (2013) The fight over digital rights: the politics of copyright and technology. Cambridge University Press, New York
CrossRef
Google Scholar
Atkinson B, Fitzgerald B (2014) A Short history of copyright. Springer International Publishing, Switzerland
CrossRef
Google Scholar
Azevedo ML, Silva ST, Afonso O (2012) Intellectual property rights and endogenous economic growth—uncovering the main gaps in the research agenda. In: Teixeira AAC (ed) Technological change. InTech, Rijeka, pp 45–64
Google Scholar
Stuiber P (2006) Doppelmayrs wundersame Seilbahnvermehrung in China, Die Welt, 17 Feb 2006. http://www.welt.de/print-welt/article198743/Doppelmayrs_wundersame_Seilbahnvermehrung_in_China.html. Accessed 22 March 2014
NN (2014) Apple Inc. v. Samsung Electronics Co., Ltd. Wikipedia. http://en.wikipedia.org/wiki/Apple_Inc._v._Samsung_Electronics_Co.,_Ltd. Accessed 15 March 2014
NN (2013) USA wollen stärker gegen Industriespionage aus China vorgehen, Portal financial.de, 21 Feb 2013. http://www.financial.de/news/agenturmeldungen/roundup-usa-wollen-starker-gegen-industriespionage-aus-china-vorgehen/. Accessed 23 March 2014
Neukirch R et al (2013) Das chinesische Problem. Der Spiegel 9, 25 Feb 2013. pp 20–22. http://www.spiegel.de/spiegel/print/d-91203384.html. Accessed 23 March 2014
NN (2013) Cyber Security Report 2013. Ergebnisse einer repräsentativen Befragung von Abgeordneten sowie Führungskräften in mittleren und großen Unternehmen. Deutsche Telekom/T-Systems. http://www.cybersecuritysummit.de/assets/downloads/131106_Cyber_Sicherheitsreport_2013_final.pdf. Accessed 15 March 2014
Richter R, Streb J (2009) Catching-up and falling behind knowledge spillover from American to German machine tool makers. Discussion Paper 09-2009, University of Hohenheim. https://fzid.uni-hohenheim.de/71978.html. Accessed 15 March 2014
Gragido W, Pirc J (2011) Cybercrime and espionage: an analysis of subversive multivector threats. Elsevier, Burlington
Google Scholar
Philpott J, Jolly A (2004) A handbook of intellectual property management: protecting, developing and exploiting your IP assets. Kogan Page, London
Google Scholar
Wong T, Dutfield G (2010) Intellectual property and human development: current trends and future scenarios. Cambridge University Press, Cambridge
CrossRef
Google Scholar
Smallwood RF (2012) Safeguarding critical e-documents: implementing a program for securing confidential information assets. Wiley, Hoboken
Google Scholar
VDMA (2013) Leitfaden zum Produkt- und Know-how-Schutz: Einführung von Schutzmaßnahmen gegen Produktpiraterie und Know-how-Abfluss. VDMA, Frankfurt
Google Scholar
McLay A (2014) Re-reengineering the dream: agility as competitive adaptability. Int J Agile Syst Manag 7(2):101–115
CrossRef
MathSciNet
Google Scholar
Bondar S, Ruppert C, Stjepandić J (2014) Ensuring data quality beyond change management in virtual enterprise. Int J Agile Syst Manag 7(3/4):304–323
CrossRef
Google Scholar
Stevenson M (2013) The role of services in flexible supply chains: an exploratory study. Int J Agile Syst Manag 6(4):307–323
CrossRef
Google Scholar
Fuchs HJ et al (2006) Piraten, Fälscher und Kopierer. Gabler Verlag, Wiesbaden
Google Scholar
Abele E, Kuske P, Lang H (2011) Schutz vor Produktpiraterie. Springer, Berlin
CrossRef
Google Scholar
Quandt S (2006) The insider treat benchmark report—strategies for data protection. White paper, Aberdeen Group, Jan 2006. http://www.aberdeen.com
Jolly A (2010) The innovation handbook: how to profit from your ideas, intellectual property and market knowledge, 2nd edn. Kogan Page, London
Google Scholar
McCarville MA (2012) Intellectual property, patents and innovation in aeronautics. In: Young TM, Hirst M (eds) Innovation in aeronautics. Woodhead Publishing, Cambridge, pp 263–303
CrossRef
Google Scholar
Meiwald T (2011) Konzepte zum Schutz vor Produktpiraterie und unerwünschtem Know-how-Abfluss. PhD thesis, TU Müchen
Google Scholar
Bader MA, Gassmann O, Ziegler N (2014) Managing the intellectual property portfolio. In: Gassmann O, Schweitzer F (eds) Management of the fuzzy front end of innovation. Springer International Publishing, Switzerland
Google Scholar
Bryer LG, Lebson JS, Asbell MD (2011) Intellectual property operations and implementation in the 21st century corporation. Wiley, Hoboken
Google Scholar
Wu CY, Trappey AJC, Trappey C (2012) Using patent ontology engineering for intellectual property defense support system. In: Stjepandić J, Rock G, Bil C (eds) Concurrent engineering approaches for sustainable product development in a multi-disciplinary environment. Proceedings of the 19th ISPE international conference on concurrent engineering, Springer, London, pp 207–218, 2013
Google Scholar
Hopgood AA (2011) Intelligent systems for engineers and scientists, 3rd edn. CRC Press, Boca Raton
Google Scholar
Liese H (2004) Wissensbasierte 3D-CAD repräsentation. TU Darmstadt PhD thesis, Shaker Verlag, Aachen
Google Scholar
Liese H, Stjepandić J (2004) Konstruktionsmethodik: Wissensbasierende 3D-CAD-Modellierung, CAD/CAM Report. Dressler Verlag, Heidelberg, 10. http://www.prostep.com/de/prostep/medien/cad-cam_kbe.htm. Accessed 15 March 2014
Alguezaui S, Filieri R (2014) A knowledge-based view of the extending enterprise for enhancing a collaborative innovation advantage. Int J Agile Syst Manag 7(2):116–131
CrossRef
Google Scholar
Elgh F (2014) Automated engineer-to-order systems a task oriented approach to enable traceability of design rationale. Int J Agile Syst Manag 7(3/4):324–347
CrossRef
Google Scholar
Ong SK, Xu QL, Nee AYC (2008) Design reuse in product development modeling, analysis and optimization. World Scientific Publishing, Singapore
Google Scholar
Trappey CV, Trappey AJC, Wu CY (2010) Clustering patents using non-exhaustive overlaps. J Syst Sci Syst Eng 19(2):162–181
CrossRef
Google Scholar
Han J, Kamber M (2006) Data mining: concepts and techniques, 2nd edn. Morgan Kaufmann Publisher, San Fransisco
Google Scholar
Trappey AJC, Trappey CV, Wu CY, Lin C-W (2012) A patent quality analysis for innovative technology and product development. Adv Eng Inform 26(1):26–34
CrossRef
Google Scholar
Trappey AJC, Chen LWL, Chang JYC, Yeh MFM (2014) Strategic development of LTE mobile communication technology based on patent map analysis. In: Cha J et al (eds) Proceedings of 21th ISPE international conference on concurrent engineering. IOS Press, Amsterdam, pp 441–450
Google Scholar
Yang J, Han S, Grau M, Mun D (2009) OpenPDM-based product data exchange among heterogeneous PDM systems in a distributed environment. Int J Adv Manufact Technol 40(9–10):1033–1043
CrossRef
Google Scholar
ProSTEP iViP Association (2008) Project Group “Enterprise Rights Management (ERM.Open)”. http://www.prostep.org/en/projects/enterprise-rights-management-ermopen.html. Accessed 15 May 2013
Spitznagel P, Liese H (2008) Intellectual property protection for CAD design. In: Proceedings of ProSTEP iViP Symposium 2008
Google Scholar
Wendenburg M (2012) Data exchange on the fast track, CAD/CAM Report Engineering. Hoppenstedt, Darmstadt, 6. http://www.prostep.com/en/mn/press/prostep-in-the-media/detailed-news/artikel/299/data-exchang.html. Accessed 15 May 2013
Liese H, Rulhoff S, Stjepandić J (2010) Securing product know-how by embedding intellectual property protection into the organization. In: Proceedings of 16th international conference on concurrent enterprising, Lugano, 21–23 June 2010
Google Scholar
Nawotki A (2001) Eine selektive Methode zur Verschlüsselung von Konstruktionsdaten mit Wavelets. PhD thesis, TU Kaiserslautern
Google Scholar
Yu F, Lu Z, Luo H, Wang P (2010) Three-dimensional model analysis and processing. Springer, Berlin
CrossRef
MATH
Google Scholar
Pfalzgraf P, Pfouga A, Trautmann T (2012) Cross enterprise change and release processes based on 3D PDF. In: Stjepandić J, Rock G, Bil C (eds) Concurrent engineering approaches for sustainable product development in a multi-disciplinary environment. Proceedings of the 19th ISPE international conference on concurrent engineering, Springer, London, pp 753–763, 2013
Google Scholar
Wang FH, Pan JS, Jain LC (2009) Innovations in digital watermarking techniques. Springer, Berlin
CrossRef
Google Scholar
Funk W (2008) Digital watermarking for NURBS-based 3D CAD models. TU Darmstadt PhD thesis, Logos-Verlag, Berlin
Google Scholar
Stockenberger D (2014) Schutz vor Produktpiraterie durch Kennzeichnung und Authentifizierung von Komponenten und Ersatzteilen im Maschinen- und Anlagenbau. PhD thesis, TU München
Google Scholar
Filipović B, Schimmer O (2012) Protecting embedded systems against product piracy. Technological background and preventive measures. Fraunhofer AIESEC, Garching
Google Scholar
Jacobs S (2011) Engineering information security: the application of systems engineering concepts to achieve information assurance. Wiley, Hoboken
CrossRef
Google Scholar
Fussan CJ et al (2010) Managementmaßnahmen gegen Produktpiraterie und Industriespionage. Gabler Verlag, Wiesbaden
CrossRef
Google Scholar
Böhme R (ed) (2013) The economics of information security and privacy. Springer, Berlin
Google Scholar
Martínez-Piva JM (ed) (2009) Knowledge generation and protection: intellectual property, innovation and economic development. Springer, New York
Google Scholar