63) And in many cases with cyber attacks and cyber exploitations, the
2009 investigation into a series of Chinese cyber exploitations targeted
cyber exploitations can be equipped to carry out cyber attack.
Cyber Exploitation as a "Use of Force" Under Current
Cyber Exploitation as a Threat of Force Under Current
true in the case of cyber exploitation because the effects of such
Accordingly, this paper analyzes an important field of strategic technology planning in the context of open innovation, that is, the strategic planning of external technology exploitation.
External technology exploitation goes beyond the mere outward transfer of technology assets, which represents only the final stage of the external technology commercialization process.
In the firms that have adopted a strategic approach to technology planning in the context of open innovation, the planning of external technology exploitation constitutes the interface between the general corporate planning processes and the planning processes of external technology exploitation.
Therefore, the planning of external technology exploitation should be included in a firm's overall technology planning processes (7).
The technology strategies that are developed in these planning processes influence a company's overall innovation strategy and many individual tasks throughout the external technology exploitation process.
This is particularly true when the exploitation of external technology increasingly moves beyond the commercialization of residual technology assets that are not employed inside the firm.