Font Size: a A A

Research On Industrial Technology Security Formation Mechanism And Measurement

Posted on:2020-12-27Degree:DoctorType:Dissertation
Country:ChinaCandidate:D F YangFull Text:PDF
GTID:1369330575473139Subject:Technical Economics and Management
Abstract/Summary:PDF Full Text Request
A global technology chain produces many problems affecting the safety of industrial technology.Based on the theory of technology gap,this paper studies the formation mechanism and measurement method of industrial technology security,constructs the measurement model of industrial technology security and the identification model of core technology,and verifies the scientificity and validity of the model through empirical research.The main research work and conclusions of this paper are as follows:(1)The existing literature is sorted out and reviewed,and the focus of research is clarified.The issue of industrial technology security is based on the macro-economic security and the medium-sized industrial security.Industrial Technology Gap is the cause of Industrial technology security,the connotation of industrial technological security is defined,and the classification and characteristics of industrial technological security are analyzed.Under the framework of technology gap theory,this paper constructs a three-force model of industrial technology gap and studies the formation mechanism of industrial technology security under the framework of technology gap theory.(2)Basic on the above research,this paper constructs a measurement model of industrial technology security,analyses the advantages of using patent information to measure industrial technology security,and constructs a three-force model(ICD model for short)to measure technology gap,as"the gap between industrial technology innovation ability,industrial technology control ability and industrial technology development ability".On this basis,appropriate indicators are selected to construct the measurement.The index system,the technology gap model and the measurement model of industrial technology security are established according to the technology gap model,and the security is divided into sectors.(3)The impact of single technology on industrial technology security is studied from the perspective of technology.Based on the theory of technology gap,the identification model of core technology is constructed to identify and classify the core technology.By selecting appropriate indicators to build the index system of core technology identification,building the core technology intensity model and technology classification standards,identifying the core technology,and creating rules to classify the core technology based on the impact of the core technology on the technology gap,deepening the core technology research.(4)The OLED flat panel display industry and the fifth generation mobile communication industry are selected for empirical research.The research results show that in the OLED flat panel display industry,industrial technology security and industrial technology innovation security of American is the best,industrial technology control security of Korean is the best,and Japan's industrial technology development security is the best.Eleven core patents have been identified,covering three upstream areas of the industrial chain:the preparation of OLED materials,the design of driving circuits and the manufacture of components.The core technologies are concentrated in two groups:H01L5 1/50 and H01L5 1/52.The classification results of core technologies are obtained.In the 5G mobile communication industry,the security of industrial technology,industrial technology innovation,industrial technology control of the United States always maintained an absolute security position,while Sweden has the best industrial technology development.All 11 core patents mainly involving mutual recognition and communication of D2D and location measurement between devices.Core technologies are concentrated in H04W72/04 and H04W76/02.The classification results of core technologies are obtained.
Keywords/Search Tags:Industrial Technology Security, Technology Gap, Three Force Model, Industrial Technology Security Degree, Core Technology Identification
PDF Full Text Request
Related items