研究生: |
許珮慈 Pei Tzu Hsu |
---|---|
論文名稱: |
商業模式創新為基之專利路徑探索:以電子商務金流模式創新與智財演進為案例 Patent Road-Map Discovery Based on Business Model Innovation: The Case of E-Commerce Payment Innovation and Patent Evolution |
指導教授: |
張瑞芬
Amy J.C. Trappey |
口試委員: |
樊晉源
侯建良 |
學位類別: |
碩士 Master |
系所名稱: |
工學院 - 工業工程與工程管理學系 Department of Industrial Engineering and Engineering Management |
論文出版年: | 2016 |
畢業學年度: | 104 |
語文別: | 英文 |
論文頁數: | 69 |
中文關鍵詞: | 電子商務 、電子支付 、技術路徑圖 、商業模式創新 |
外文關鍵詞: | e-commerce (EC), e-payment, technology roadmap, business model innovation |
相關次數: | 點閱:2 下載:0 |
分享至: |
查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報 |
隨著電子商務商業模式的發展,新興的金流技術、電子支付方法逐漸成為驅動電子商務事業的成功關鍵。一個好的電子商務商業模式若能結合安全且創新的電子支付系統,不但能為企業創造無窮商機,又若能利用專利權的保護,防止競爭者模仿或抄襲商業模式所使用之技術或方法,將更能強化企業的全球競爭優勢。此研究提出以專利資訊為基之技術路徑模式和藉以評估專利價值的標竿比較方法論,使得電商企業除了透過商業模式的發展來檢視自己和競爭者於電子商務金流的專利布局外,還能衡量其專利組合所確立之市場能力與地位。本研究首先建構電子支付領域的技術本體論和本體論詞庫,再透過電腦輔助的方式自動擷取每篇專利的關鍵字組合,將關鍵字與本體論詞庫作進一步的比對和技術分類後,以技術路徑圖方法視覺化公司的專利分布及其對應之商業模式,最後藉由本研究所制定的專利價值指標比較企業與其競爭對手的相對優勢,協助該企業從中研擬出合適的策略以符合商業模式的發展。本研究以阿里巴巴和亞馬遜兩家全球領先的電子商務公司之電子支付技術及專利數據作為案例研究的基礎,實際分析兩家公司之金流技術路徑暨全球競爭力,期以此案例解析,提供EC經營管理者做決策分析時之有利參考方法與工具。
Advanced technologies have lowered the entry barriers of e-commerce (EC) industry. The level of customer satisfaction is considered to be an important factor that drives the growth rate of EC sales. Understanding and satisfying customer expectations for payment experiences critically important. Because the EC industry is still evolving, related payment services have to be adequately developed so as to meet the requirements of customers. The EC enterprises usually adopt electronic payment (e-payment) methods to settle financial transactions among merchants and customers. A successful e-payment service creates new business opportunities and requires patent protection to prevent infringement from competitors. This research develops a computer-assisted approach incorporating text-mining method to classify each patent and visualize patent portfolios using roadmaps to explore novelty and possible strategic information of EC enterprises. The framework first constructs the e-payment ontology and identifies the key term library of each ontology element by experts. The next step is to use computer-assisted method to extract key terms of each patent based on frequently appeared terms from primary and Derwent World Patent Index (DWPI) patent information. After key term extraction, this research matches each patent with the libraries and maps onto roadmaps to visualize patent portfolios. This research also employs patent value indicators to highlight the relative competitive advantages. By applying roadmapping and value assessment, the positions making enterprises outperform in the competitive EC environment can be identified and benchmarked. This research studies two leading EC operators in the US and Asia, i.e., Amazon and Alibaba, as a case study and uses their e-payment patents as input to implement the proposed analysis. The patent portfolios and analytical results underlying their competitive advantages and future business development implications are discussed.
[1] ACSI. (2015). ACSI 2015 Year in Review: Slumping Customer Satisfaction Across Much of the U.S. Economy Retrieved February 16, 2016, from https://www.theacsi.org/images/stories/images/news/15dec_year-review_press.pdf
[2] Aigbe, P., & Akpojaro, J. (2014). Analysis of Security Issues in Electronic Payment Systems. International Journal of Computer Applications, 108(10).
[3] Albright, R. E., & Kappel, T. A. (2003). Technology roadmapping: roadmapping the corporation. Research Technology Management, 46(2), 31-59.
[4] Alia, M. A., Tamimi, A. A., & AL-Allaf, O. N. A. (2014). Cryptography Based Authentication Methods. Paper presented at the Proceedings of the World Congress on Engineering and Computer, London, UK.
[5] Authorize.Net. (2015). How Credit Card Processing Works. Retrieved November 23, 2015, from http://www.authorize.net/resources/howitworksdiagram/
[6] Bank for International Settlements. (2014). Committee on Payments and Market Infrastructures: Non-banks in retail payments (978-92-9131-655-7). Retrieved from Bank for International Settlements website: http://www.bis.org/cpmi/publ/d118.pdf
[7] Barney, J. A. (2002). A Study of Patent Mortality Rates: Using Statistical Survival Analysis to Rate and Value Patent Assets. AIPLA Quarterly Journal, 30(3), 317-352.
[8] Berthiaume, D. (2015, December, 29). Pitney Bowes: The top five e-commerce drivers for 2016 are …. Chain Store Age. Retrieved from http://www.chainstoreage.com/article/pitney-bowes-top-five-e-commerce-drivers-01-are-
[9] Capgemini. (2013). Evolving E-Commerce Market Dynamics. Retrieved from Capgemini website: https://www.capgemini.com/resource-file-access/resource/pdf/evolving_e-commerce_market_dynamics.pdf
[10] Chang, L. (2016, May, 18). A brick-and-mortar Amazon store may be coming to a city near you. Digital Trends. Retrieved from http://www.digitaltrends.com/web/amazon-brick-and-mortar/#:sz1U69mBJtz0WA
[11] Chen, D. Z., Lin, W. Y., & Huang, M. H. (2007). Using essential patent index and essential technological strength to evaluate industrial technological innovation competitiveness. Scientometrics, 71(1), 101-116.
[12] Choi, S., Kim, H., Yoon, J., Kim, K., & Lee, J. Y. (2013). An SAO‐based text‐mining approach for technology roadmapping using patent information. R&d Management, 43(1), 52-74.
[13] Cybersource. (2012). Tokenization. Retrieved from Cybersource website: https://www.cybersource.com/content/dam/cybersource/Payment_Tokenization_Overview.pdf
[14] Cybersource. (2015). How Payment Processing Works. Retrieved November 23, 2015, from http://www.cybersource.com/developers/getting_started/how_payment_processing_works/#next
[15] Czajkowski, A. (2015). International Patent Classification. [PowerPoint slides] Retrieved from http://www.turin-ip.com/course-documents/training-material-2015/mr-czajkowski/International%20Patent%20Classification.pdf
[16] Daim, T. U., Rueda, G., Martin, H., & Gerdsri, P. (2006). Forecasting emerging technologies: Use of bibliometrics and patent analysis. Technological forecasting and social change, 73(8), 981-1012.
[17] Duguet, E., & MacGarvie, M. (2005). How well do patent citations measure flows of technology? Evidence from French innovation surveys. Economics of Innovation and New Technology, 14(5), 375-393.
[18] eMarketer. (2014). Retail Sales Worldwide Will Top $22 Trillion This Year [Press release]. Retrieved from eMarketer website: http://www.emarketer.com/Article/Retail-Sales-Worldwide-Will-Top-22-Trillion-This-Year/1011765
[19] eMarketer. (2015). US Proximity Mobile Payment Transactions to Reach $8.71 Billion in 2015 [Press release]. Retrieved from eMarketer website: http://www.emarketer.com/Article/US-Proximity-Mobile-Payment-Transactions-Reach-871-Billion-2015/1013278
[20] Ernst, H., & Omland, N. (2011). The Patent Asset Index–A new approach to benchmark patent portfolios. World Patent Information, 33(1), 34-41.
[21] European Payments Council. (2014). EPC White Paper Mobile Wallet Payments (EPC 163-13). Retrieved from European Payments Council website: http://www.europeanpaymentscouncil.eu/index.cfm/knowledge-bank/epc-documents/epc-white-paper-mobile-wallet-payments-and-feedback-questionnaire/epc163-13-v20-white-paper-mobile-wallet-payments/
[22] European Union Agency for Network and Information Security. (2013). eID Authentication methods in e-Finance and e-Payment services. Retrieved from European Union Agency for Network and Information Security (ENISA) website: https://www.enisa.europa.eu/activities/identity-and-trust/library/deliverables/eIDA-in-e-finance-and-e-payment-services/at_download/fullReport
[23] Federal Financial Institutions Examination Council. (2005). Authentication in an internet banking environment. Financial Institution Letter (FIL-103-2005). Retrieved from FFIEC website: http://www.ffiec.gov/
[24] First Data. (2009). Data Encryption and Tokenization: An Innovative One-Two Punch to Increase Data Security and Reduce the Challenges of PCI DSS Compliance. Retrieved from First Data webstie: http://www.firstdata.com/downloads/thought-leadership/fd_encrypt_token_pci_whitepaper.pdf
[25] First Data. (2010). A Primer on Payment Security Technologies: Encryption and Tokenization. Retrieved from First Data website: https://www.firstdata.com/downloads/thought-leadership/primer-on-payment-security-technologies.pdf
[26] Fischer, T., & Leidinger, J. (2014). Testing patent value indicators on directly observed patent value—An empirical analysis of Ocean Tomo patent auctions. Research Policy, 43(3), 519-529.
[27] Gambardella, A., Harhoff, D., & Verspagen, B. (2008). The value of European patents. European Management Review, 5(2), 69-84.
[28] Goode Intelligence. (2012). Two-Factor Authentication Goes Mobile. Retrieved from Goode Intelligence website: http://www.goodeintelligence.com/white-papers/download/twofactor-authentication-goes-mobile
[29] Goode Intelligence. (2015). Biometrics for Payments-Payments Security Gets Personal. Retrieved May 14, 2016, from http://www.goodeintelligence.com/report-store/view/biometrics-for-payments-payment-security-gets-personal-market-technology-analysis-adoption-strategies-forecasts-20152020
[30] Grimaldi, M., Cricelli, L., Giovanni, M. D., & Rogo, F. (2015). The patent portfolio value analysis: A new framework to leverage patent information for strategic technology planning. Technological forecasting and social change, 94, 286-302.
[31] Groenveld, P. (1997). Roadmapping integrates business and technology. Research Technology Management, 40(5), 48-55.
[32] Grube, C. (2010). Measuring the Immeasurable: Valuing Patent Protection of Knowledge-Based Competitive Advantages. Germany: Springer Gabler.
[33] Gruber, T. R. (1993). A translation approach to portable ontology specifications. Knowledge acquisition, 5(2), 199-220.
[34] Guellec, D., & Van Pottelsberghe de la Potterie, B. (2000). Applications, grants and the value of patent. Economics letters, 69(1), 109-114.
[35] Harhoff, D., & Hoisl, K. (2007). Institutionalized incentives for ingenuity—patent value and German Emploees' inventions Act. Research Policy, 36(8), 1143-1162.
[36] Harhoff, D., Scherer, F. M., & Vopel, K. (2003). Citations, family size, opposition and the value of patent rights. Research Policy, 32(8), 1343-1363.
[37] Huang, Y., Zhang, Y., Ma, J., Porter, A. L., & Wang, X. (2015). Tracing Technology Evolution Pathways by Combining Tech Mining and Patent Citation Analysis. Paper presented at the Portland International Conference on Management of Engineering & Technology (PICMET), Oregon, USA.
[38] IDC. (2014). Location-Based Services: An Important Building Block to Enhance the Customer Experience. Retrieved from Cisco website: http://www.cisco.com/c/dam/en/us/solutions/collateral/enterprise-networks/connected-mobile-experiences/location-based-services.pdf
[39] Jakobsson, M., Shi, E., Philippe, G., & Chow, R. (2009). Implicit Authentication for Mobile Devices. Paper presented at the Proceedings of the 4th USENIX Conference on Hot topics in Security Montreal, Canada.
[40] Jones, K. S. (1972). A statistical interpretation of term specificity and its application in retrieval. Journal of documentation, 28(1), 11-21.
[41] Kayser, V., Goluchowicz, K., & Bierwisch, A. (2014). Text Mining For Technology Roadmapping—The Strategic Value Of Information. International Journal of Innovation Management, 18(3), 1-23.
[42] Kessler, G. C. (2016). An Overview of Cryptography. Retrieved March 9, 2016, from http://www.garykessler.net/library/crypto.html#purpose
[43] Kostoff, R. N., & Schaller, R. R. (2001). Science and technology roadmaps. IEEE Transactions on Engineering Management, 48(2), 132-143.
[44] Kou, W. (2003). Payment Technologies for E-Commerce. Germany: Springer-Verlag Berlin Heidelberg.
[45] KPMG. (2014). E-commerce in China: Driving a new consumer culture [Press release]. Retrieved from KPMG website: http://www.kpmg.com/CN/en/IssuesAndInsights/ArticlesPublications/Newsletters/China-360/Documents/China-360-Issue15-201401-E-commerce-in-China.pdf
[46] Lang, J. C. (2001). Management of intellectual property rights: Strategic patenting. Journal of Intellectual Capital, 2(1), 8-26.
[47] Lanjouw, J. O., & Schankerman, M. (2001). Characteristics of patent litigation: a window on competition. The RAND Journal of Economics, 32(1), 129-151.
[48] Lanjouw, J. O., & Schankerman, M. (2004). Patent quality and research productivity: Measuring innovation with multiple indicators. The Economic Journal, 114(495), 441-465.
[49] Lee, S. (2013). Linking technology roadmapping to patent analysisTechnology Roadmapping for Strategy and Innovation (pp. 267-284). Berlin Heidelberg: Springer-Verlag. doi:10.1007/978-3-642-33923-3
[50] Lee, S., Kang, S., Park, Y., & Park, Y. (2007). Technology roadmapping for R&D planning: The case of the Korean parts and materials industry. Technovation, 27(8), 433-445.
[51] Lee, S., Lee, S., Seol, H., & Park, Y. (2008). Using patent information for designing new product and technology: keyword based technology roadmapping. R&d Management, 38(2), 169-188.
[52] Lemley, M. A., & Shapiro, C. (2005). Probabilistic patents. Journal of Economic Perspectives, 75-98.
[53] Leong, L. (2015, December, 30). Tech Trends to Look Forward to in 2016. IGN Asia. Retrieved from http://www.ign.com/articles/2015/12/30/tech-trends-to-look-forward-to-in-2016
[54] Lerner, J. (1994). The importance of patent scope: an empirical analysis. The RAND Journal of Economics, 25(2), 319-333.
[55] Lin, F. R., Wei, C. P., & Lin, Y. K. (2008). Deriving technology roadmaps with tech mining techniques. Paper presented at the Proceedings of Pacific Asia Conference on Information Systems (PACIS), Suzhou, China.
[56] Luhn, H. P. (1957). A statistical approach to mechanized encoding and searching of literary information. IBM Journal of research and development, 1(4), 309-317.
[57] Martinez-Ruiz, A., & Aluja-Banet, T. (2009). Toward the definition of a structural equation model of patent value: PLS path modelling with formative constructs. REVSTAT–Statistical Journal, 7(3), 265-290.
[58] Mohabeer, H., Soyjaudah, K. M. S., & Pavaday, N. (2011). Enhancing the Performance of Neural Network Classifier Using Selected Biometric features. Paper presented at the Sensors Technologies and Applications (SENSORCOMM), Riviera, French.
[59] Munari, F., & Oriani, R. (2011). The Economic Valuation of Patents: Methods and Applications. United Kingdom: Edward Elgar Publishing.
[60] OECD. (2015). Enquiries into Intellectual Property's Economic Impact. Retrieved from OECD website: http://www.oecd.org/sti/ieconomy/KBC2-IP.Final.pdf
[61] Park, Y., Yoon, B., & Lee, S. (2005). The idiosyncrasy and dynamism of technological innovation across industries: patent citation analysis. Technology in Society, 27(4), 471-485.
[62] Paypal. (2015). Guide To Payment Processing Terms. Retrieved November 23, 2015, from https://www.paypal.com/ca/webapps/mpp/brc/payment-processing-terms
[63] Perez, S. (2016, April, 4). Amazon takes on PayPal and others with launch of Amazon Payments partner program. TechCrunch. Retrieved from http://techcrunch.com/2016/04/04/amazon-takes-on-paypal-and-others-with-launch-of-amazon-payments-partner-program/
[64] Phaal, R., Farrukh, C. J. P., & Probert, D. R. (2004). Technology roadmapping—a planning framework for evolution and revolution. Technological forecasting and social change, 71(1), 5-26.
[65] Quick, J. M. (2016). R Tutorial Series. Retrieved April 11, 2016, from http://rtutorialseries.blogspot.tw/2012/03/r-tutorial-series-centering-variables.html?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed:+RTutorialSeries+%28R+Tutorial+Series%29
[66] R Core Team. (2015). R: A language and environment for statistical computing. R Foundation for Statistical Computing. Vienna, Austria. Retrieved from http://www.R-project.org/
[67] Reitzig, M. (2004). Improving patent valuations for management purposes—validating new indicators by analyzing application rationales. Research Policy, 33(6), 939-957.
[68] Salton, G., & Buckley, C. (1988). Term-weighting approaches in automatic text retrieval. Information processing & management, 24(5), 513-523.
[69] Sapsalis, E., Van Pottelsberghe de la Potterie, B., & Navon, R. (2006). Academic versus industry patenting: An in-depth analysis of what determines patent value. Research Policy, 35(10), 1631-1645.
[70] Sheldon, J. G. (1992). How to Write a Patent Application. New York: Practicing Law Institute.
[71] Shi, E., Niu, Y., Jakobsson, M., & Chow, R. (2011). Implicit Authentication through Learning User Behavior Information Security: 13th International Conference, ISC 2010, Boca Raton, FL, USA, October 25-28, 2010, Revised Selected Papers (pp. 99-113). Berlin, Heidelberg: Springer Berlin Heidelberg.
[72] Smart Card Alliance. (2011). The Mobile Payments and NFC Landscape: A U.S. Perspective (PC-11002). Retrieved from Smart Card Alliance website: http://www.smartcardalliance.org/resources/pdf/Mobile_Payments_White_Paper_091611.pdf
[73] Sreekumaran, S., Mathew, M., & Nag, D. (2010). Patent price dynamics in the context of patent age and patent latent variables. Paper presented at the Portland International Conference on Management of Engineering & Technology (PICMET), Phuket, Thailand.
[74] Steiner, I. (2012, March, 20). PayPal versus Alipay in China. EcommerceBytes. Retrieved from http://www.ecommercebytes.com/cab/abn/y12/m03/i20/s04
[75] Suh, J. H., & Park, S. C. (2009). Service-oriented technology roadmap (SoTRM) using patent map for R&D strategy of service industry. Expert Systems with Applications, 36(3), 6754-6772.
[76] Tan, M. (2004). E-payment: The Digital Exchange. Singapore: Singapore University Press.
[77] Thomson Reuters. (2015). Patent Fields (And Tags). Retrieved December 16, 2015, from http://www.thomsoninnovation.com/tip-innovation/support/help/patent_fields.htm#title_original
[78] Thomson Reuters. (2016). Thomson Innovation. Retrieved January 21, 2016, from www.thomsonreuters.com
[79] Trappey, A. J. C., Trappey, C. V., Chung, C. L. S., & Chang, M. W. J. (2016). The Analysis of Additive Manufacturing IP Evolution for Biomedical Applications. Paper presented at the International Conference on Interactive Digital Media (ICIDM), Auckland, New Zealand.
[80] Trappey, A. J. C., Trappey, C. V., & Wu, C.-Y. (2009). Automatic patent document summarization for collaborative knowledge systems and services. Journal of Systems Science and Systems Engineering, 18(1), 71-94.
[81] Trappey, C. V., Trappey, A. J. C., & Wu, C.-Y. (2010). Clustering patents using non-exhaustive overlaps. Journal of Systems Science and Systems Engineering, 19(2), 162-181.
[82] Trappey, C. V., Wu, H.-Y., Taghaboni-Dutta, F., & Trappey, A. J. C. (2011). Using patent data for technology forecasting: China RFID patent analysis. Advanced Engineering Informatics, 25(1), 53-64.
[83] Tucker, K., Tucker, D., Eastham, J., Gibson, E., Varma, S., & Daim, T. (2014). Network Based Technology Roadmapping for Future Markets: Case of 3D Printing. Technology and Investment, 5(3), 137-156.
[84] Turban, E., King, D., Lee, J. K., Liang, T.-P., & Turban, D. C. (2015). Electronic Commerce: A Managerial and Social Networks Perspective (8 ed.). Switzerland: Springer International Publishing.
[85] Van Zeebroeck, N. (2011). The puzzle of patent value indicators. Economics of Innovation and New Technology, 20(1), 33-62.
[86] Van Zeebroeck, N., & Van Pottelsberghe de la Potterie, B. (2008). Filing strategies and patent value. Economics of Innovation and New Technology, 20(6), 539-561.
[87] Wanetick, D. (2010). How Patent Vulnerability Impacts Valuation. The CPA Journal, 80(11), 3-5.
[88] Wang, Y.-H., Trappey, A. J. C., & Trappey, C. V. (2015). Life Cycle Analysis of the Optical Disc Industry Market Innovation and Development. Innovation, 17(2), 196-216.
[89] WIPO. (2015). Protecting your Inventions Abroad: Frequently Asked Questions About the Patent Cooperation Treaty (PCT). Retrieved December 21, 2015, from http://www.wipo.int/pct/en/faqs/faqs.html
[90] WIPO. (2015). WIPO Guide to Using Patent Information (L434/3E). Retrieved from WIPO website: http://www.wipo.int/edocs/pubdocs/en/patents/434/wipo_pub_l434_03.pdf
[91] WIPO. (2016). Patent families. Retrieved June 16, 2016, from https://www.epo.org/searching-for-patents/helpful-resources/first-time-here/patent-families.html
[92] Wirecard. (2015). Wirecard and Alipay sign agreement for innovative POS payment acceptance. Retrieved June, 7, 2016, from https://www.wirecard.com/newsroom/press-releases/newsdetail/wirecard-and-alipay-sign-agreement-for-innovative-pos-payment-acceptance/
[93] Yoon, B., & Phaal, R. (2013). Structuring technological information for technology roadmapping: data mining approach. Technology Analysis & Strategic Management, 25(9), 1119-1137.
[94] Zhou, S. (2015, June, 2). Many netizens fall victim to fraud. China Daily. Retrieved from http://www.chinadaily.com.cn/china/2015-06/02/content_20884103.htm