English  |  正體中文  |  简体中文  |  Post-Print筆數 : 27 |  Items with full text/Total items : 113648/144635 (79%)
Visitors : 51685592      Online Users : 618
RC Version 6.0 © Powered By DSPACE, MIT. Enhanced by NTU Library IR team.
Scope Tips:
  • please add "double quotation mark" for query phrases to get precise results
  • please goto advance search for comprehansive author search
  • Adv. Search
    HomeLoginUploadHelpAboutAdminister Goto mobile version
    Please use this identifier to cite or link to this item: https://nccur.lib.nccu.edu.tw/handle/140.119/149511


    Title: 營業秘密保護與知識管理保護整合應用之研究:以A個案公司為例
    The Research on the Integrated Application of Trade Secret Protection and Knowledge Management: A Case Study of Company A
    Authors: 李耿毅
    Li, Ken-Yi
    Contributors: 宋皇志
    Sung, Huang-Chih
    李耿毅
    Li, Ken-Yi
    Keywords: 營業秘密保護管理
    知識管理
    解決方案
    整合應用
    Trade secret management
    knowledge management
    solutions
    integrated applications
    Date: 2023
    Issue Date: 2024-02-01 11:06:10 (UTC+8)
    Abstract: 隨著新科技革命和全球化的加快,營業秘密日益成為企業重要的智慧財產權保護方式,同時也是全球各國關注的焦點。營業秘密的市場價值來自於其所帶來的競爭優勢,但為了維持營業秘密,必須採取適當的保密措施。然而,大數據技術的發展給保密措施的認定帶來新的挑戰。因此,本研究整合了文獻探討,確認了數位技術的保密措施類型。在涉及高度專業領域或技術時,可以引入產業專家的認定意見。

    本研究參考台積電的營業秘密註冊制度及營業秘密管理的經驗,建議出一套適合A個案公司執行的營業秘密保護管理措施。該措施可以提供A個案公司在營業秘密保護管理方面的參考方案,促進A個案公司在專業管理方面的提升,同時提高A個案公司的營業秘密保護管理水準,為A個案公司營業秘密保護管理的改善打下了基礎。

    不管是個人還是組織,營業秘密管理與知識管理的衝突與矛盾的風險一直存在著。例如個人隱性知識在共享和轉移過程之中所存在的風險、組織隱性知識在共享和轉移過程之中所存在的風險、開放性vs.保密性、知識共享vs.競爭優勢、知識管理工具 vs.營業秘密保護、個人知識 vs.公司知識,這些風險的存在也促使我們有必要保護隱性智慧財產權。如何做到調和營業秘密管理與知識管理的衝突與矛盾,必須改善營業秘密洩漏技術的防護措施、改善營業秘密洩漏風險的預警系統、改善營業秘密洩漏的應急策略、改善營業秘密洩漏風險迴路監測系統、改善營業秘密洩漏風險的補償措施、建構完備的知識共享平台、確認知識共享的範圍和層級、健全知識共享的管理機制、建構企業知識管理,安全共享的文化、制定明確的政策、分類和標示資訊、強化安全的措施、訓練和教育、促進合作關係、監測和審查、定期評估和調整。

    例如,台積電把技術資訊透過研發與製程相關流程分為多個段落,每位同仁只知道一小部份之營業秘密,從而降低同仁獲取全部營業秘密的風險,但是部份營業秘密之知識管理還是可以傳承,以調和營業秘密管理與知識管理的衝突與矛盾找到營業秘密管理與知識管理的平衡點。若員工將營業秘密洩漏給競爭對手,台積電將依據違反營業秘密法提出告訴。

    最後,涉及雲端服務技術的保密措施認定必須聚焦於營業秘密持有人的保密行為。而在雲端服務之中,資料可能受到帳戶密碼失竊、使用者認證失效以及未經授權的資料存取等威脅。若雲端服務平台的資料管理水準不足,可能導致資料易於被取得,進而直接影響營業秘密的秘密性和保密性的認定。

    解決知識管理和營業秘密管理之間的衝突和兩難需要綜合考量法律、技術、策略和訓練等多個方面。透過明確地定義、合法合規性、教育和技術支援等方式,可以實現有效的整合,同時保護機密資訊並促進知識共享。
    Due to the acceleration of the technological revolution and globalization, trade secrets have become increasingly important for enterprises to protect their intellectual property. They are now a focus of attention worldwide. The market value of trade secrets comes from the competitive advantage they provide. However, appropriate confidentiality measures must be taken to maintain them. However, the development of big data technology has presented new challenges for identifying confidentiality measures. This study integrates literature reviews to identify types of security measures in digital technologies. When dealing with highly specialized fields or technologies, it may be useful to consult industry experts.

    This study discusses TSMC's trade secret registration system and their experience in managing trade secrets. It proposes a set of trade secret protection measures that are suitable for a case company. This measure can address the trade secret protection and management issues faced by A Company, while also enhancing its professional management practices. It will improve the overall level of protection and management of A Company's business secrets, laying a solid foundation for future improvements in this area.

    The risk of conflict and contradiction between trade secret management and knowledge management always exists, whether for individuals or organizations. Risks in sharing and transferring personal and organizational tacit knowledge, as well as concerns regarding openness versus confidentiality, knowledge sharing versus competitive advantage, and the use of knowledge management tools versus trade secret protection, highlight the need to protect implicit intellectual property rights. To reconcile the conflict and contradiction between business secret management and knowledge management, it is necessary to enhance protection measures for preventing trade secret leakage, improve the early warning system for identifying trade secret leakage risks, develop an emergency strategy for responding to trade secret leakage incidents, establish a loop monitoring system for detecting trade secret leakage risks, and implement compensation measures for trade secret leakage risks. Construct a comprehensive knowledge sharing platform, confirm the scope and level of knowledge sharing, improve the management mechanism of knowledge sharing, construct enterprise knowledge management and a culture of safe sharing, formulate clear policies for information classification and labeling, enhance security measures, provide training and education, foster partnerships, monitor and review, and conduct periodic evaluation and adjustment. For instance, TSMC utilizes the trade secret registration system to divide its R&D and manufacturing processes into ten distinct stages. Each employee only knows a small part of the trade secrets, reducing the risk of colleagues obtaining all of them. However, managing some trade secrets' knowledge can still be inherited. Finding a balance between business secret management and knowledge management requires reconciling the conflict and contradiction between the two. If employees disclose trade secrets to competitors, TSMC will sue for violating trade secret laws.

    Finally, the confidentiality of the trade secret holder must be a primary consideration when determining confidentiality measures for cloud service technology. In cloud services, data may be threatened by account password theft, user authentication invalidation, and unauthorized data access. If the data management level of the cloud service platform is inadequate, the data may be easily obtained, which will directly affect the determination of confidentiality and trade secret protection.

    Resolving the conflicts and dilemmas between knowledge management and trade secret management requires a comprehensive consideration of legal, technical, strategic and training issues. Through clear definition, legal compliance, education and technical support, effective integration can be achieved while protecting confidential information and promoting knowledge sharing.
    Reference: 一、中文文獻
    1.王偉霖,(2020)營業秘密法理論與實務。臺北:元照出版公司,05。
    2.丁中原、謝銘洋,(2000)。營業秘密法解讀。北京:中國政法大學出版社,128-129。
    3.方明,(2004)。國際技術合作與轉讓中企業智慧財產權保護。現代經濟探討, (6):28-30。
    4.王駿,(2004)。商業秘密權利邊界之廓清。智慧財產權2013年第10期。
    5.孔祥俊,(1998)。商業秘密保護法原理。北京:中國法制出版社,212-214。
    6.白雲飛、賈玉平,(1997)。論商業秘密及其它法律護。法學家,(2):38。
    7.張耕,(2012)。商業秘密法。廈門大學出版社。
    8.狄克森,(2002)。共有知識:企業知識共享的方法與案例研究。北京:人民郵電出版社, 8-20。
    9.胡良榮、易小輝,(2014)。衝突與協調:人力資源的有序流動與商業秘密的充分保護:以強化勞動權保障和優化競業禁止制度為視角。智慧財產權,第6期。
    10.吳漢東,(2007)。智慧財產權法學(第5版) 。北京大學出版社。
    11.楊雄文、黃苑輝,(2019)。論大數據的營業秘密保護:以新浪微博訴脈脈不正當競爭案為視角。重慶工商大學學報(社會科學版)。
    12.董穎,(2012)。雲安全及營業秘密問題研究。電子智慧財產權,(12):60-65。
    13.劉瑛、耿雨亭,(2017)。大數據資料背景下的營業秘密保護。北京工業大學學報(社會科學版),(3):58-64。
    14.鄧靈斌,(2017)。企業隱性知識轉移中的智慧財產權風險及其規避研究。科技進步與對策。
    15.鄧恒,(2018)。論商業秘密保護中競業禁止協議的法律性質。西南民族大學學報,第2期。
    16.博登海默,(1999)。法理學:法律哲學與法律方法。中國政法大學出版社,第298頁。
    17.張玉瑞,(1994)。商業秘密法學。北京:中國法制出版社, 201。
    18.張玉瑞,(1999)。智慧財產權法學。北京:中國法制出版社,357。
    19.鄧社民,(2002)。商業秘密概念初探。智慧財產權,(2) : 27。
    20.唐海濱,(1999)。有關商業秘密立法的重點、難點問題。中國法學,(4) : 30。
    21.程宗璋,(1999)。論商業秘密及其法律保護。華東政法學院學報,(4) :35。
    22.馮曉青,(1997)。智慧財產權法學。長沙:中南工業大學出版社,346-347。
    23.鄭成思,(2001)。智慧財產權論(修訂本) 。北京: 法律出版社,279-280。
    24.祝磊著,(2008)。美國商業秘密法律制度研究。湖南人民出版社,73-74。
    25.郭琳佳、沈陵,(2015)。論商業秘密的範圍。內江科技,3月30日。
    26.謝福源,(2022)。台積公司推動「營業秘密註冊制度同學會」。全面升級產業競爭力,07/15。
    27.謝福源,(2022)。台美營業秘密管理發展。2022智權系列研討會。
    28.李淑蓮,(2022)。北美智權報。320期。
    29.鄧尼斯·昂科維克,(2002)。商業秘密。胡祥譯,北京:企業管理出版社, 69-70。
    30.彭昶霖,(2019)。論企業知識之管理與營業秘密之保護:以競業禁止為中心,政治大學科技管理與智慧財產權研究所碩士論文。
    31.賴文智,(2018)。企業知識管理與營業秘密保護,益思團隊。
    32.經濟部智慧財產局,(111)。企業保護營業秘密的重要策略步驟介紹,國際及法律事務室。

    二、英文文獻
    1.D'Amato, A. A., & Long, D. E. (1997). International intellectual property law. (pp. 197-201).
    2.Brown, S. A., Dennis, A. R., & Gant, D. B. (2006, January). Understanding the factors influencing the value of person-to-person knowledge sharing. In Proceedings of the 39th Annual Hawaii International Conference on System Sciences (HICSS'06) (Vol. 7, pp. 146b-146b). IEEE.
    3.Gagné, M. (2009). A model of knowledge‐sharing motivation. Human Resource Management: Published in Cooperation with the School of Business Administration, The University of Michigan and in alliance with the Society of Human Resources Management, 48(4), 571-589.
    4.Hendriks, P. (1999). Why share knowledge? The influence of ICT on the motivation for knowledge sharing. Knowledge and process management, 6(2), 91-100.
    5.Homsma, G. J., Van Dyck, C., De Gilder, D., Koopman, P. L., & Elfring, T. (2009). Learning from error: The influence of error incident characteristics. Journal of Business Research, 62(1), 115-122.
    6.Rabin, M. (1993). Incorporating fairness into game theory and economics. The American economic review, 1281-1302.
    7.Yang, J. T. D., Lee, W. L., & Tsai, C. Y. (2005, March). A Web-based bookmark tool with ontological approach for knowledge sharing of special interest groups. In 19th International Conference on Advanced Information Networking and Applications (AINA'05) Volume 1 (AINA papers) (Vol. 2, pp. 271-276). IEEE.
    8.Kankanhalli, A., Tan, B. C., & Wei, K. K. (2005). Contributing knowledge to electronic knowledge repositories: An empirical investigation. MIS quarterly, 113-143.
    9.Kewanee Oil Co. v. Bicron Corp.,416 US 470 (1974) Https://Supreme.Justia.Com/Cases/Federal/Us/416/470/.
    10.Li, X., Montazemi, A. R., & Yuan, Y. (2006). Agent-based buddy-finding methodology for knowledge sharing. Information & Management, 43(3), 283-296.
    11.Lin, T. C., & Huang, C. C. (2010). Withholding effort in knowledge contribution: The role of social exchange and social cognitive on project teams. Information & Management, 47(3), 188-196.
    12.Jones, M. C., Cline, M., & Ryan, S. (2006). Exploring knowledge sharing in ERP implementation: an organizational culture framework. Decision support systems, 41(2), 411-434.
    13.Hamel, G., & Prahalad, C. K. (1990). The core competence of the corporation. Harvard business review, 68(3), 79-91.
    14.Malloy, R. P. (1990). Law and economics: A comparative approach to theory and practice. (pp. 246).
    15.Brown, S. A., Dennis, A. R., & Gant, D. B. (2006, January). Understanding the factors influencing the value of person-to-person knowledge sharing. In Proceedings of the 39th Annual Hawaii International Conference on System Sciences (HICSS'06) (Vol. 7, pp. 146b-146b). IEEE.
    16.Mehigan, S., & Griffiths, D. (1996). Restraint of trade and business secrets: law and practice. (second edition) (pp. 391).
    17.Sui, L., & Yang, R. J. (2005, March). Study of knowledge sharing and strategy in enterprise knowledge management. In Proceedings of the Thirty-Seventh Southeastern Symposium on System Theory, 2005. SSST'05. (pp. 336-340). IEEE.
    18.Wu, S., Lin, C. S., & Lin, T. C. (2006, January). Exploring knowledge sharing in virtual teams: A social exchange theory perspective. In Proceedings of the 39th Annual Hawaii International Conference on System Sciences (HICSS'06) (Vol. 1, pp. 26b-26b). IEEE.
    Description: 碩士
    國立政治大學
    經營管理碩士學程(EMBA)
    110932082
    Source URI: http://thesis.lib.nccu.edu.tw/record/#G0110932082
    Data Type: thesis
    Appears in Collections:[經營管理碩士學程EMBA] 學位論文

    Files in This Item:

    File Description SizeFormat
    208201.pdf1111KbAdobe PDF0View/Open


    All items in 政大典藏 are protected by copyright, with all rights reserved.


    社群 sharing

    著作權政策宣告 Copyright Announcement
    1.本網站之數位內容為國立政治大學所收錄之機構典藏,無償提供學術研究與公眾教育等公益性使用,惟仍請適度,合理使用本網站之內容,以尊重著作權人之權益。商業上之利用,則請先取得著作權人之授權。
    The digital content of this website is part of National Chengchi University Institutional Repository. It provides free access to academic research and public education for non-commercial use. Please utilize it in a proper and reasonable manner and respect the rights of copyright owners. For commercial use, please obtain authorization from the copyright owner in advance.

    2.本網站之製作,已盡力防止侵害著作權人之權益,如仍發現本網站之數位內容有侵害著作權人權益情事者,請權利人通知本網站維護人員(nccur@nccu.edu.tw),維護人員將立即採取移除該數位著作等補救措施。
    NCCU Institutional Repository is made to protect the interests of copyright owners. If you believe that any material on the website infringes copyright, please contact our staff(nccur@nccu.edu.tw). We will remove the work from the repository and investigate your claim.
    DSpace Software Copyright © 2002-2004  MIT &  Hewlett-Packard  /   Enhanced by   NTU Library IR team Copyright ©   - Feedback