|
[1] ACSI. (2015). ACSI 2015 Year in Review: Slumping Customer Satisfaction Across Much of the U.S. Economy Retrieved February 16, 2016, from https://www.theacsi.org/images/stories/images/news/15dec_year-review_press.pdf [2] Aigbe, P., & Akpojaro, J. (2014). Analysis of Security Issues in Electronic Payment Systems. International Journal of Computer Applications, 108(10). [3] Albright, R. E., & Kappel, T. A. (2003). Technology roadmapping: roadmapping the corporation. Research Technology Management, 46(2), 31-59. [4] Alia, M. A., Tamimi, A. A., & AL-Allaf, O. N. A. (2014). Cryptography Based Authentication Methods. Paper presented at the Proceedings of the World Congress on Engineering and Computer, London, UK. [5] Authorize.Net. (2015). How Credit Card Processing Works. Retrieved November 23, 2015, from http://www.authorize.net/resources/howitworksdiagram/ [6] Bank for International Settlements. (2014). Committee on Payments and Market Infrastructures: Non-banks in retail payments (978-92-9131-655-7). Retrieved from Bank for International Settlements website: http://www.bis.org/cpmi/publ/d118.pdf [7] Barney, J. A. (2002). A Study of Patent Mortality Rates: Using Statistical Survival Analysis to Rate and Value Patent Assets. AIPLA Quarterly Journal, 30(3), 317-352. [8] Berthiaume, D. (2015, December, 29). Pitney Bowes: The top five e-commerce drivers for 2016 are …. Chain Store Age. Retrieved from http://www.chainstoreage.com/article/pitney-bowes-top-five-e-commerce-drivers-01-are- [9] Capgemini. (2013). Evolving E-Commerce Market Dynamics. Retrieved from Capgemini website: https://www.capgemini.com/resource-file-access/resource/pdf/evolving_e-commerce_market_dynamics.pdf [10] Chang, L. (2016, May, 18). A brick-and-mortar Amazon store may be coming to a city near you. Digital Trends. Retrieved from http://www.digitaltrends.com/web/amazon-brick-and-mortar/#:sz1U69mBJtz0WA [11] Chen, D. Z., Lin, W. Y., & Huang, M. H. (2007). Using essential patent index and essential technological strength to evaluate industrial technological innovation competitiveness. Scientometrics, 71(1), 101-116. [12] Choi, S., Kim, H., Yoon, J., Kim, K., & Lee, J. Y. (2013). An SAO‐based text‐mining approach for technology roadmapping using patent information. R&d Management, 43(1), 52-74. [13] Cybersource. (2012). Tokenization. Retrieved from Cybersource website: https://www.cybersource.com/content/dam/cybersource/Payment_Tokenization_Overview.pdf [14] Cybersource. (2015). How Payment Processing Works. Retrieved November 23, 2015, from http://www.cybersource.com/developers/getting_started/how_payment_processing_works/#next [15] Czajkowski, A. (2015). International Patent Classification. [PowerPoint slides] Retrieved from http://www.turin-ip.com/course-documents/training-material-2015/mr-czajkowski/International%20Patent%20Classification.pdf [16] Daim, T. U., Rueda, G., Martin, H., & Gerdsri, P. (2006). Forecasting emerging technologies: Use of bibliometrics and patent analysis. Technological forecasting and social change, 73(8), 981-1012. [17] Duguet, E., & MacGarvie, M. (2005). How well do patent citations measure flows of technology? Evidence from French innovation surveys. Economics of Innovation and New Technology, 14(5), 375-393. [18] eMarketer. (2014). Retail Sales Worldwide Will Top $22 Trillion This Year [Press release]. Retrieved from eMarketer website: http://www.emarketer.com/Article/Retail-Sales-Worldwide-Will-Top-22-Trillion-This-Year/1011765 [19] eMarketer. (2015). US Proximity Mobile Payment Transactions to Reach $8.71 Billion in 2015 [Press release]. Retrieved from eMarketer website: http://www.emarketer.com/Article/US-Proximity-Mobile-Payment-Transactions-Reach-871-Billion-2015/1013278 [20] Ernst, H., & Omland, N. (2011). The Patent Asset Index–A new approach to benchmark patent portfolios. World Patent Information, 33(1), 34-41. [21] European Payments Council. (2014). EPC White Paper Mobile Wallet Payments (EPC 163-13). Retrieved from European Payments Council website: http://www.europeanpaymentscouncil.eu/index.cfm/knowledge-bank/epc-documents/epc-white-paper-mobile-wallet-payments-and-feedback-questionnaire/epc163-13-v20-white-paper-mobile-wallet-payments/ [22] European Union Agency for Network and Information Security. (2013). eID Authentication methods in e-Finance and e-Payment services. Retrieved from European Union Agency for Network and Information Security (ENISA) website: https://www.enisa.europa.eu/activities/identity-and-trust/library/deliverables/eIDA-in-e-finance-and-e-payment-services/at_download/fullReport [23] Federal Financial Institutions Examination Council. (2005). Authentication in an internet banking environment. Financial Institution Letter (FIL-103-2005). Retrieved from FFIEC website: http://www.ffiec.gov/ [24] First Data. (2009). Data Encryption and Tokenization: An Innovative One-Two Punch to Increase Data Security and Reduce the Challenges of PCI DSS Compliance. Retrieved from First Data webstie: http://www.firstdata.com/downloads/thought-leadership/fd_encrypt_token_pci_whitepaper.pdf [25] First Data. (2010). A Primer on Payment Security Technologies: Encryption and Tokenization. Retrieved from First Data website: https://www.firstdata.com/downloads/thought-leadership/primer-on-payment-security-technologies.pdf [26] Fischer, T., & Leidinger, J. (2014). Testing patent value indicators on directly observed patent value—An empirical analysis of Ocean Tomo patent auctions. Research Policy, 43(3), 519-529. [27] Gambardella, A., Harhoff, D., & Verspagen, B. (2008). The value of European patents. European Management Review, 5(2), 69-84. [28] Goode Intelligence. (2012). Two-Factor Authentication Goes Mobile. Retrieved from Goode Intelligence website: http://www.goodeintelligence.com/white-papers/download/twofactor-authentication-goes-mobile [29] Goode Intelligence. (2015). Biometrics for Payments-Payments Security Gets Personal. Retrieved May 14, 2016, from http://www.goodeintelligence.com/report-store/view/biometrics-for-payments-payment-security-gets-personal-market-technology-analysis-adoption-strategies-forecasts-20152020 [30] Grimaldi, M., Cricelli, L., Giovanni, M. D., & Rogo, F. (2015). The patent portfolio value analysis: A new framework to leverage patent information for strategic technology planning. Technological forecasting and social change, 94, 286-302. [31] Groenveld, P. (1997). Roadmapping integrates business and technology. Research Technology Management, 40(5), 48-55. [32] Grube, C. (2010). Measuring the Immeasurable: Valuing Patent Protection of Knowledge-Based Competitive Advantages. Germany: Springer Gabler. [33] Gruber, T. R. (1993). A translation approach to portable ontology specifications. Knowledge acquisition, 5(2), 199-220. [34] Guellec, D., & Van Pottelsberghe de la Potterie, B. (2000). Applications, grants and the value of patent. Economics letters, 69(1), 109-114. [35] Harhoff, D., & Hoisl, K. (2007). Institutionalized incentives for ingenuity—patent value and German Emploees' inventions Act. Research Policy, 36(8), 1143-1162. [36] Harhoff, D., Scherer, F. M., & Vopel, K. (2003). Citations, family size, opposition and the value of patent rights. Research Policy, 32(8), 1343-1363. [37] Huang, Y., Zhang, Y., Ma, J., Porter, A. L., & Wang, X. (2015). Tracing Technology Evolution Pathways by Combining Tech Mining and Patent Citation Analysis. Paper presented at the Portland International Conference on Management of Engineering & Technology (PICMET), Oregon, USA. [38] IDC. (2014). Location-Based Services: An Important Building Block to Enhance the Customer Experience. Retrieved from Cisco website: http://www.cisco.com/c/dam/en/us/solutions/collateral/enterprise-networks/connected-mobile-experiences/location-based-services.pdf [39] Jakobsson, M., Shi, E., Philippe, G., & Chow, R. (2009). Implicit Authentication for Mobile Devices. Paper presented at the Proceedings of the 4th USENIX Conference on Hot topics in Security Montreal, Canada. [40] Jones, K. S. (1972). A statistical interpretation of term specificity and its application in retrieval. Journal of documentation, 28(1), 11-21. [41] Kayser, V., Goluchowicz, K., & Bierwisch, A. (2014). Text Mining For Technology Roadmapping—The Strategic Value Of Information. International Journal of Innovation Management, 18(3), 1-23. [42] Kessler, G. C. (2016). An Overview of Cryptography. Retrieved March 9, 2016, from http://www.garykessler.net/library/crypto.html#purpose [43] Kostoff, R. N., & Schaller, R. R. (2001). Science and technology roadmaps. IEEE Transactions on Engineering Management, 48(2), 132-143. [44] Kou, W. (2003). Payment Technologies for E-Commerce. Germany: Springer-Verlag Berlin Heidelberg. [45] KPMG. (2014). E-commerce in China: Driving a new consumer culture [Press release]. Retrieved from KPMG website: http://www.kpmg.com/CN/en/IssuesAndInsights/ArticlesPublications/Newsletters/China-360/Documents/China-360-Issue15-201401-E-commerce-in-China.pdf [46] Lang, J. C. (2001). Management of intellectual property rights: Strategic patenting. Journal of Intellectual Capital, 2(1), 8-26. [47] Lanjouw, J. O., & Schankerman, M. (2001). Characteristics of patent litigation: a window on competition. The RAND Journal of Economics, 32(1), 129-151. [48] Lanjouw, J. O., & Schankerman, M. (2004). Patent quality and research productivity: Measuring innovation with multiple indicators. The Economic Journal, 114(495), 441-465. [49] Lee, S. (2013). Linking technology roadmapping to patent analysisTechnology Roadmapping for Strategy and Innovation (pp. 267-284). Berlin Heidelberg: Springer-Verlag. doi:10.1007/978-3-642-33923-3 [50] Lee, S., Kang, S., Park, Y., & Park, Y. (2007). Technology roadmapping for R&D planning: The case of the Korean parts and materials industry. Technovation, 27(8), 433-445. [51] Lee, S., Lee, S., Seol, H., & Park, Y. (2008). Using patent information for designing new product and technology: keyword based technology roadmapping. R&d Management, 38(2), 169-188. [52] Lemley, M. A., & Shapiro, C. (2005). Probabilistic patents. Journal of Economic Perspectives, 75-98. [53] Leong, L. (2015, December, 30). Tech Trends to Look Forward to in 2016. IGN Asia. Retrieved from http://www.ign.com/articles/2015/12/30/tech-trends-to-look-forward-to-in-2016 [54] Lerner, J. (1994). The importance of patent scope: an empirical analysis. The RAND Journal of Economics, 25(2), 319-333. [55] Lin, F. R., Wei, C. P., & Lin, Y. K. (2008). Deriving technology roadmaps with tech mining techniques. Paper presented at the Proceedings of Pacific Asia Conference on Information Systems (PACIS), Suzhou, China. [56] Luhn, H. P. (1957). A statistical approach to mechanized encoding and searching of literary information. IBM Journal of research and development, 1(4), 309-317. [57] Martinez-Ruiz, A., & Aluja-Banet, T. (2009). Toward the definition of a structural equation model of patent value: PLS path modelling with formative constructs. REVSTAT–Statistical Journal, 7(3), 265-290. [58] Mohabeer, H., Soyjaudah, K. M. S., & Pavaday, N. (2011). Enhancing the Performance of Neural Network Classifier Using Selected Biometric features. Paper presented at the Sensors Technologies and Applications (SENSORCOMM), Riviera, French. [59] Munari, F., & Oriani, R. (2011). The Economic Valuation of Patents: Methods and Applications. United Kingdom: Edward Elgar Publishing. [60] OECD. (2015). Enquiries into Intellectual Property's Economic Impact. Retrieved from OECD website: http://www.oecd.org/sti/ieconomy/KBC2-IP.Final.pdf [61] Park, Y., Yoon, B., & Lee, S. (2005). The idiosyncrasy and dynamism of technological innovation across industries: patent citation analysis. Technology in Society, 27(4), 471-485. [62] Paypal. (2015). Guide To Payment Processing Terms. Retrieved November 23, 2015, from https://www.paypal.com/ca/webapps/mpp/brc/payment-processing-terms [63] Perez, S. (2016, April, 4). Amazon takes on PayPal and others with launch of Amazon Payments partner program. TechCrunch. Retrieved from http://techcrunch.com/2016/04/04/amazon-takes-on-paypal-and-others-with-launch-of-amazon-payments-partner-program/ [64] Phaal, R., Farrukh, C. J. P., & Probert, D. R. (2004). Technology roadmapping—a planning framework for evolution and revolution. Technological forecasting and social change, 71(1), 5-26. [65] Quick, J. M. (2016). R Tutorial Series. Retrieved April 11, 2016, from http://rtutorialseries.blogspot.tw/2012/03/r-tutorial-series-centering-variables.html?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed:+RTutorialSeries+%28R+Tutorial+Series%29 [66] R Core Team. (2015). R: A language and environment for statistical computing. R Foundation for Statistical Computing. Vienna, Austria. Retrieved from http://www.R-project.org/ [67] Reitzig, M. (2004). Improving patent valuations for management purposes—validating new indicators by analyzing application rationales. Research Policy, 33(6), 939-957. [68] Salton, G., & Buckley, C. (1988). Term-weighting approaches in automatic text retrieval. Information processing & management, 24(5), 513-523. [69] Sapsalis, E., Van Pottelsberghe de la Potterie, B., & Navon, R. (2006). Academic versus industry patenting: An in-depth analysis of what determines patent value. Research Policy, 35(10), 1631-1645. [70] Sheldon, J. G. (1992). How to Write a Patent Application. New York: Practicing Law Institute. [71] Shi, E., Niu, Y., Jakobsson, M., & Chow, R. (2011). Implicit Authentication through Learning User Behavior Information Security: 13th International Conference, ISC 2010, Boca Raton, FL, USA, October 25-28, 2010, Revised Selected Papers (pp. 99-113). Berlin, Heidelberg: Springer Berlin Heidelberg. [72] Smart Card Alliance. (2011). The Mobile Payments and NFC Landscape: A U.S. Perspective (PC-11002). Retrieved from Smart Card Alliance website: http://www.smartcardalliance.org/resources/pdf/Mobile_Payments_White_Paper_091611.pdf [73] Sreekumaran, S., Mathew, M., & Nag, D. (2010). Patent price dynamics in the context of patent age and patent latent variables. Paper presented at the Portland International Conference on Management of Engineering & Technology (PICMET), Phuket, Thailand. [74] Steiner, I. (2012, March, 20). PayPal versus Alipay in China. EcommerceBytes. Retrieved from http://www.ecommercebytes.com/cab/abn/y12/m03/i20/s04 [75] Suh, J. H., & Park, S. C. (2009). Service-oriented technology roadmap (SoTRM) using patent map for R&D strategy of service industry. Expert Systems with Applications, 36(3), 6754-6772. [76] Tan, M. (2004). E-payment: The Digital Exchange. Singapore: Singapore University Press. [77] Thomson Reuters. (2015). Patent Fields (And Tags). Retrieved December 16, 2015, from http://www.thomsoninnovation.com/tip-innovation/support/help/patent_fields.htm#title_original [78] Thomson Reuters. (2016). Thomson Innovation. Retrieved January 21, 2016, from www.thomsonreuters.com [79] Trappey, A. J. C., Trappey, C. V., Chung, C. L. S., & Chang, M. W. J. (2016). The Analysis of Additive Manufacturing IP Evolution for Biomedical Applications. Paper presented at the International Conference on Interactive Digital Media (ICIDM), Auckland, New Zealand. [80] Trappey, A. J. C., Trappey, C. V., & Wu, C.-Y. (2009). Automatic patent document summarization for collaborative knowledge systems and services. Journal of Systems Science and Systems Engineering, 18(1), 71-94. [81] Trappey, C. V., Trappey, A. J. C., & Wu, C.-Y. (2010). Clustering patents using non-exhaustive overlaps. Journal of Systems Science and Systems Engineering, 19(2), 162-181. [82] Trappey, C. V., Wu, H.-Y., Taghaboni-Dutta, F., & Trappey, A. J. C. (2011). Using patent data for technology forecasting: China RFID patent analysis. Advanced Engineering Informatics, 25(1), 53-64. [83] Tucker, K., Tucker, D., Eastham, J., Gibson, E., Varma, S., & Daim, T. (2014). Network Based Technology Roadmapping for Future Markets: Case of 3D Printing. Technology and Investment, 5(3), 137-156. [84] Turban, E., King, D., Lee, J. K., Liang, T.-P., & Turban, D. C. (2015). Electronic Commerce: A Managerial and Social Networks Perspective (8 ed.). Switzerland: Springer International Publishing. [85] Van Zeebroeck, N. (2011). The puzzle of patent value indicators. Economics of Innovation and New Technology, 20(1), 33-62. [86] Van Zeebroeck, N., & Van Pottelsberghe de la Potterie, B. (2008). Filing strategies and patent value. Economics of Innovation and New Technology, 20(6), 539-561. [87] Wanetick, D. (2010). How Patent Vulnerability Impacts Valuation. The CPA Journal, 80(11), 3-5. [88] Wang, Y.-H., Trappey, A. J. C., & Trappey, C. V. (2015). Life Cycle Analysis of the Optical Disc Industry Market Innovation and Development. Innovation, 17(2), 196-216. [89] WIPO. (2015). Protecting your Inventions Abroad: Frequently Asked Questions About the Patent Cooperation Treaty (PCT). Retrieved December 21, 2015, from http://www.wipo.int/pct/en/faqs/faqs.html [90] WIPO. (2015). WIPO Guide to Using Patent Information (L434/3E). Retrieved from WIPO website: http://www.wipo.int/edocs/pubdocs/en/patents/434/wipo_pub_l434_03.pdf [91] WIPO. (2016). Patent families. Retrieved June 16, 2016, from https://www.epo.org/searching-for-patents/helpful-resources/first-time-here/patent-families.html [92] Wirecard. (2015). Wirecard and Alipay sign agreement for innovative POS payment acceptance. Retrieved June, 7, 2016, from https://www.wirecard.com/newsroom/press-releases/newsdetail/wirecard-and-alipay-sign-agreement-for-innovative-pos-payment-acceptance/ [93] Yoon, B., & Phaal, R. (2013). Structuring technological information for technology roadmapping: data mining approach. Technology Analysis & Strategic Management, 25(9), 1119-1137. [94] Zhou, S. (2015, June, 2). Many netizens fall victim to fraud. China Daily. Retrieved from http://www.chinadaily.com.cn/china/2015-06/02/content_20884103.htm |