Technology transfer: enablers and barriers - a review

Journal article


Ajay Kaushik, Kumar, S., Luthra, S. and Haleem, A. 2014. Technology transfer: enablers and barriers - a review. International Journal of Technology, Policy and Management. 14 (2), pp. 133-159. https://doi.org/10.1504/ijtpm.2014.060152
AuthorsAjay Kaushik, Kumar, S., Luthra, S. and Haleem, A.
Abstract

Technology Transfer (TT) has been identified as an important approach to achieve competitive advantage over other organisations. The objective of this paper is to contribute to the existing literature by comprehensively reviewing and identifying enablers and barriers to implement TT. In this paper, background of TT and major contributions given by various researchers in the field of TT has been presented. The ‘factors to enable TT implementation successfully (referred to as enablers)’ and ‘barriers to hinder this process of TT implementation’ have been identified. Based upon extensive literature review, conceptual model has been put forward. Enablers and barriers to implement TT need to be addressed and examined critically. This review will surely help researchers and practitioners in better understanding towards implementation of TT in most effective way.

Keywordsbarriers in implementation of technology transfer; conceptual model; enablers to implement technology transfer
Year2014
JournalInternational Journal of Technology, Policy and Management
Journal citation14 (2), pp. 133-159
PublisherInderscience
ISSN1468-4322
1741-5292
Digital Object Identifier (DOI)https://doi.org/10.1504/ijtpm.2014.060152
Web address (URL)http://dx.doi.org/10.1504/ijtpm.2014.060152
Output statusPublished
Publication dates31 Mar 2014
Publication process dates
Deposited10 Jul 2024
Permalink -

https://repository.derby.ac.uk/item/q743x/technology-transfer-enablers-and-barriers-a-review

  • 24
    total views
  • 0
    total downloads
  • 0
    views this month
  • 0
    downloads this month

Export as

Related outputs

A Sign Language Recognition System Using Artificial Intelligence
Dahiya, R., Dwivedi, N., Singh Rathore, A., Kalra, M., Chauhan, P., Ajay Kaushik and Sharma, R. 2024. A Sign Language Recognition System Using Artificial Intelligence. ISBM: World Conference on Information Systems for Business Management. Springer. https://doi.org/10.1007/978-981-99-8612-5_7
Breast Tumor Prediction Using SVM with Rain Fall Optimisation Algorithm
Parashar, K., Ajay Kaushik, Sharma, R. and Aman 2024. Breast Tumor Prediction Using SVM with Rain Fall Optimisation Algorithm. in: So In, C., Londhe, N. D., Bhatt, N. and Kitsing, M. (ed.) Information Systems for Intelligent Systems: Proceedings of ISBM 2023 Singapore Springer. pp. 167-180
An Integrated Web Based and Application Programming Interfaces for Disease Prediction Through Self Diagnosis
Anil Tak, Sarthak Jain, B. N. V. Gnandeep, Mradul, Nikhil Kaushik, Yogendra, Ajay Kaushik, Ritu Sharma and Aman 2024. An Integrated Web Based and Application Programming Interfaces for Disease Prediction Through Self Diagnosis. World Conference on Information Systems for Business Management. Springer. https://doi.org/10.1007/978-981-99-8612-5_8
A novel intrusion detection system for internet of things devices and data
Kaushik, A. and Al-Raweshidy, H. 2023. A novel intrusion detection system for internet of things devices and data. Wireless Networks. 30, pp. 285-294. https://doi.org/10.1007/s11276-023-03435-0
A Hybrid Latency- and Power-Aware Approach for Beyond Fifth-Generation Internet-of-Things Edge Systems
Kaushik, A. and Al-Raweshidy, H. 2022. A Hybrid Latency- and Power-Aware Approach for Beyond Fifth-Generation Internet-of-Things Edge Systems. IEEE Access. 10, pp. 87974 - 87989. https://doi.org/10.1109/access.2022.3200035
Post Quantum Public and Private Key Cryptography Optimized for IoT Security
Ajay Kaushik, Lakshmi Sai Srikar Vadlamani, Mohammed Mohsin Hussain, Milind Sahay, Rahul Singh, Ananya Komal Singh, S. Indu, Puneet Goswami and Nalliyanna Goundar Veerappan Kousik 2022. Post Quantum Public and Private Key Cryptography Optimized for IoT Security. Wireless Personal Communications. 129, pp. 893-909. https://doi.org/10.1007/s11277-022-10162-w
A Real-Time Intrusion Detection System for Bio-Medical and Cyber-Physical Systems
Ajay Kaushik and Raj, S. V. 2022. A Real-Time Intrusion Detection System for Bio-Medical and Cyber-Physical Systems. The 5th International Conference on Research in Humanities. Diamond Scientific Publishing . https://doi.org/10.33422/5th.icrhconf.2022.08.200
Loki: A Lightweight LWE Method with Rogue Bits for Quantum Security in IoT Devices
Rahul Singh, Mohammed Mohsin Hussain, Milind Sahay, S. Indu, Ajay Kaushik and Alok Kumar Singh 2020. Loki: A Lightweight LWE Method with Rogue Bits for Quantum Security in IoT Devices. International Conference on Information and Communication Technology for Intelligent Systems. Springer. https://doi.org/10.1007/978-981-15-7062-9_54
A Binary PSO Approach for Improving the Performance of Wireless Sensor Networks
Ajay Kaushik, Goswami, M., Manuja, M., Sreedevi, I. and Gupta, D. 2020. A Binary PSO Approach for Improving the Performance of Wireless Sensor Networks. Wireless Personal Communications. 113, pp. 263-297. https://doi.org/10.1007/s11277-020-07188-3
A Grey Wolf Optimization Based Algorithm for Optimum Camera Placement
Kaushik, A., Indu, S. and Gupta, D. 2019. A Grey Wolf Optimization Based Algorithm for Optimum Camera Placement. Wireless Personal Communications. 105, pp. 1143-1167. https://doi.org/10.1007/s11277-019-06140-4
Adaptive Mobile Sink for Energy Efficient WSN Using Biogeography-Based Optimization
Ajay Kaushik, Indu, S. and Gupta, D. 2019. Adaptive Mobile Sink for Energy Efficient WSN Using Biogeography-Based Optimization. International Journal of Mobile Computing and Multimedia Communications. 10 (3), pp. 1-22. https://doi.org/10.4018/ijmcmc.2019070101
A Grey Wolf Optimization Approach for Improving the Performance of Wireless Sensor Networks
Kaushik, A., Indu, S. and Gupta, D. 2019. A Grey Wolf Optimization Approach for Improving the Performance of Wireless Sensor Networks. Wireless Personal Communications. 106, pp. 1429-1449. https://doi.org/10.1007/s11277-019-06223-2
A Self-Configurable Event Coverage Approach for Wireless Sensor Networks
Ajay Kaushik, Yakkali, R. T., Indu, S., Ahmed, F., Gupta, D., Nayar, R. and Yadav, S. 2019. A Self-Configurable Event Coverage Approach for Wireless Sensor Networks. International Journal of Mobile Computing and Multimedia Communications. 10 (2), pp. 1-18. https://doi.org/10.4018/ijmcmc.2019040101
Nature-Inspired Algorithms in Wireless Sensor Networks
Ajay Kaushik, Indu, S. and Gupta, D. 2019. Nature-Inspired Algorithms in Wireless Sensor Networks. in: Banati, H., Mehta, S. and Kaur, P. (ed.) Nature-Inspired Algorithms for Big Data Frameworks Hershey, Pennsylvania IGI Global. pp. 75-92
Optimizing and Enhancing the Lifetime of a Wireless Sensor Network Using Biogeography Based Optimization
Ajay Kaushik, Indu, S. and Gupta, D. 2018. Optimizing and Enhancing the Lifetime of a Wireless Sensor Network Using Biogeography Based Optimization. Applications of Computing and Communication Technologies First International Conference, ICACCT 2018. Springer. https://doi.org/10.1007/978-981-13-2035-4_23
A novel load balanced energy conservation approach in WSN using biogeography based optimization
Ajay Kaushik, Indu, S. and Gupta, D. 2017. A novel load balanced energy conservation approach in WSN using biogeography based optimization. THE 2ND INTERNATIONAL CONFERENCE ON ENERGY ENGINEERING AND SMART MATERIALS: ICEESM 2017. AIP Publishing. https://doi.org/10.1063/1.5002507