{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,5]],"date-time":"2026-03-05T23:03:07Z","timestamp":1772751787293,"version":"3.50.1"},"reference-count":58,"publisher":"Emerald","issue":"11","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,11,6]]},"abstract":"<jats:sec>\n                    <jats:title>Purpose<\/jats:title>\n                    <jats:p>Key core technology is the most important weapon of the country, and breaking through the \u201cstrangled\u201d problem is one of the real problems that China\u2019s emerging industries and enterprises must solve. Accurately identifying the \u201cstrangled\u201d problem will help China accelerate the realization of high-level scientific and technological self-reliance and win the battle against key core technologies.<\/jats:p>\n                  <\/jats:sec>\n                  <jats:sec>\n                    <jats:title>Design\/methodology\/approach<\/jats:title>\n                    <jats:p>Combined with the characteristics of key core technologies, the key core technology evaluation system was constructed from four dimensions: technology innovation, technology radiation, technology economy and technology safety. We adopt the entropy TOPSIS method to evaluate the patents, and the patents with the top 5% scores are identified as key core technology patents. Then, this study identifies key core technology \u201cstrangled\u201d problems in three dimensions: technology value advantage, competitive advantage and quantitative advantage.<\/jats:p>\n                  <\/jats:sec>\n                  <jats:sec>\n                    <jats:title>Findings<\/jats:title>\n                    <jats:p>Taking the patent data of the global new generation information technology industry from 2011 to 2023 as a sample, 178 moderately \u201cstrangled\u201d technologies and 49 severely \u201cstrangled\u201d technologies are selected. The study results are consistent with the current situation of the new generation information technology industry\u2019s development, and verify the feasibility and reliability of the key core technology \u201cstrangled\u201d problem identification model.<\/jats:p>\n                  <\/jats:sec>\n                  <jats:sec>\n                    <jats:title>Originality\/value<\/jats:title>\n                    <jats:p>This study uses patent data to identify key core technologies and \u201cStrangled\u201d in the new generation information technology industry. It can provide a reference for relevant national departments and agencies, as well as universities and enterprises.<\/jats:p>\n                  <\/jats:sec>","DOI":"10.1108\/k-03-2024-0717","type":"journal-article","created":{"date-parts":[[2024,6,16]],"date-time":"2024-06-16T10:44:45Z","timestamp":1718534685000},"page":"6252-6280","source":"Crossref","is-referenced-by-count":4,"title":["Study on the identification of key core technology \u201cstrangled\u201d problem of the new generation information technology industry"],"prefix":"10.1108","volume":"54","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-5578-3901","authenticated-orcid":true,"given":"Xing","family":"Li","sequence":"first","affiliation":[{"name":"School of Economics and Management, Nanjing University of Science and Technology , ,","place":["Nanjing, China"]}]},{"given":"Fangyuan","family":"Zheng","sequence":"additional","affiliation":[{"name":"Bank of Nanjing , ,","place":["Nanjing, China"]}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0692-0962","authenticated-orcid":true,"given":"Yong","family":"Qi","sequence":"additional","affiliation":[{"name":"School of Intellectual Property, Nanjing University of Science and Technology , ,","place":["Nanjing, China"]}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4434-1053","authenticated-orcid":true,"given":"Hanbo","family":"Zhang","sequence":"additional","affiliation":[{"name":"School of Economics and Management, Nanjing University of Science and Technology , ,","place":["Nanjing, China"]}]}],"member":"140","published-online":{"date-parts":[[2024,6,17]]},"reference":[{"issue":"1","key":"2025110420325104100_ref001","doi-asserted-by":"publisher","first-page":"63","DOI":"10.1002\/smj.508","article-title":"Engaging the inventor: exploring licensing strategies for university inventions and the role of latent knowledge","volume":"27","author":"Agrawal","year":"2006","journal-title":"Strategic Management Journal"},{"issue":"2","key":"2025110420325104100_ref002","doi-asserted-by":"publisher","first-page":"279","DOI":"10.1142\/s1363919607001758","article-title":"Innovation, patents and economic growth","volume":"11","author":"Atun","year":"2007","journal-title":"International Journal of Innovation Management"},{"issue":"2","key":"2025110420325104100_ref003","doi-asserted-by":"publisher","first-page":"99","DOI":"10.1111\/j.1467-9957.1965.tb00050.x","article-title":"Trade liberalisation and \u2018revealed\u2019 comparative advantage","volume":"33","author":"Balassa","year":"1965","journal-title":"The Manchester School"},{"key":"2025110420325104100_ref004","doi-asserted-by":"publisher","DOI":"10.1016\/j.techfore.2023.122864","article-title":"Patent analysis based technology innovation assessment with the lens of disruptive innovation theory: a case of blockchain technological trajectories","volume":"196","author":"Bhatt","year":"2023","journal-title":"Technological Forecasting and Social Change"},{"issue":"19","key":"2025110420325104100_ref005","first-page":"80","article-title":"Identification of \u2018Neck stuck\u2019 technologies based on patent literature: a case study in the field of CNC machine tools","volume":"67","author":"Cao","year":"2023","journal-title":"Library and Information Service"},{"issue":"12","key":"2025110420325104100_ref006","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0241797","article-title":"Patent citation network analysis: a perspective from descriptive statistics and ERGMs","volume":"15","author":"Chakraborty","year":"2020","journal-title":"Plos One"},{"issue":"2","key":"2025110420325104100_ref007","doi-asserted-by":"publisher","first-page":"296","DOI":"10.1016\/j.cie.2006.11.006","article-title":"An application of AHP and sensitivity analysis for selecting the best slicing machine","volume":"52","author":"Chang","year":"2007","journal-title":"Computers and Industrial Engineering"},{"issue":"5","key":"2025110420325104100_ref008","first-page":"58","article-title":"Key core technology breakthroughs under the perspective of integrated innovation: theoretical framework and realization paths","volume":"43","author":"Chen","year":"2021","journal-title":"Journal of Social Sciences"},{"issue":"7","key":"2025110420325104100_ref009","first-page":"1","article-title":"Research on the breakthrough path of the problems \u2018blocking the neck\u2019 of key core technologies","volume":"20","author":"Chen","year":"2020","journal-title":"Innovation Science and Technology"},{"issue":"9","key":"2025110420325104100_ref010","first-page":"17","article-title":"Identification and application of \u2018bottleneck\u2019 issues in key core technologies: taking AI chips as an example","volume":"39","author":"Chen","year":"2023","journal-title":"Forum on Science and Technology in China"},{"key":"2025110420325104100_ref011","article-title":"Research on core technology breakthrough paths under the MOA framework: a case study of lithography industry","author":"Chen","year":"2024","journal-title":"Journal of Intelligence"},{"issue":"13","key":"2025110420325104100_ref012","doi-asserted-by":"publisher","first-page":"11443","DOI":"10.1016\/j.eswa.2012.04.014","article-title":"An SAO-based text mining approach to building a technology tree for technology planning","volume":"39","author":"Choi","year":"2012","journal-title":"Expert Systems with Applications"},{"issue":"2","key":"2025110420325104100_ref013","doi-asserted-by":"publisher","first-page":"191","DOI":"10.1016\/s0048-7333(01)00136-6","article-title":"Continental, national and sub-national innovation systems\u2014complementarity and economic growth","volume":"31","author":"Freeman","year":"2002","journal-title":"Research Policy"},{"issue":"5","key":"2025110420325104100_ref014","first-page":"106","article-title":"Identification and breakthrough strategy of stranglehold key technologies from a patent perspective: a case study in the OLED technology field","volume":"43","author":"Fu","year":"2024","journal-title":"Journal of Intelligence"},{"issue":"2","key":"2025110420325104100_ref015","doi-asserted-by":"publisher","first-page":"214","DOI":"10.1080\/14778238.2019.1638737","article-title":"Indexes of patent value: a systematic literature review and classification","volume":"18","author":"Grimaldi","year":"2020","journal-title":"Knowledge Management Research and Practice"},{"issue":"3","key":"2025110420325104100_ref016","first-page":"111","article-title":"Leading key core technologies tackling key problems with a grand strategic view","volume":"43","author":"Han","year":"2021","journal-title":"Macroeconomics"},{"issue":"2","key":"2025110420325104100_ref017","doi-asserted-by":"publisher","first-page":"307","DOI":"10.1016\/j.techfore.2012.09.014","article-title":"Patent value assessment and commercialization strategy","volume":"80","author":"Hsieh","year":"2013","journal-title":"Technological Forecasting and Social Change"},{"issue":"1","key":"2025110420325104100_ref018","first-page":"4","article-title":"Key part of core technology: concept, characters and breakthrough factors","volume":"40","author":"Hu","year":"2022","journal-title":"Studies in Science of Science"},{"issue":"5","key":"2025110420325104100_ref019","first-page":"188","article-title":"Path and mechanism of core technology breakthrough and domestic substitution: a longitudina case study of IFLY TEK intelligent speech technology","volume":"38","author":"Hu","year":"2022","journal-title":"Journal of Management World"},{"issue":"3","key":"2025110420325104100_ref020","first-page":"94","article-title":"Research on the construction and application of two-stage funnel selection model for \u2018neck-jamming\u2019 key core technologies","volume":"42","author":"Jiang","year":"2023","journal-title":"Journal of Intelligence"},{"key":"2025110420325104100_ref021","doi-asserted-by":"publisher","DOI":"10.1016\/j.tsep.2020.100675","article-title":"Performance evaluation of diesel\u2013additives ternary fuel blends: an experimental investigation, numerical simulation using hybrid Entropy\u2013TOPSIS method and economic analysis","volume":"20","author":"Kumar","year":"2020","journal-title":"Thermal Science and Engineering Progress"},{"issue":"2","key":"2025110420325104100_ref022","doi-asserted-by":"publisher","first-page":"402","DOI":"10.1108\/jkm-01-2020-0037","article-title":"A structured MPA approach to explore technological core competence, knowledge flow, and technology development through social network patentometrics","volume":"25","author":"Lai","year":"2021","journal-title":"Journal of Knowledge Management"},{"issue":"1","key":"2025110420325104100_ref023","doi-asserted-by":"publisher","first-page":"27","DOI":"10.1007\/s11192-007-0102-z","article-title":"An in-depth empirical analysis of patent citation counts using zero-inflated count data model: the case of KIST","volume":"70","author":"Lee","year":"2007","journal-title":"Scientometrics"},{"key":"2025110420325104100_ref024","doi-asserted-by":"publisher","first-page":"291","DOI":"10.1016\/j.techfore.2017.10.002","article-title":"Early identification of emerging technologies: a machine learning approach using multiple patent indicators","volume":"127","author":"Lee","year":"2018","journal-title":"Technological Forecasting and Social Change"},{"issue":"2","key":"2025110420325104100_ref025","doi-asserted-by":"publisher","first-page":"427","DOI":"10.1007\/s11192-012-0944-x","article-title":"Technological collaboration patterns in solar cell industry based on patent inventors and assignees analysis","volume":"96","author":"Lei","year":"2013","journal-title":"Scientometrics"},{"issue":"1","key":"2025110420325104100_ref026","doi-asserted-by":"publisher","first-page":"77","DOI":"10.1002\/asi.20732","article-title":"On the normalization and visualization of author co-citation data: salton's Cosine versus the Jaccard index","volume":"59","author":"Leydesdorff","year":"2008","journal-title":"Journal of the American Society for Information Science and Technology"},{"issue":"9","key":"2025110420325104100_ref027","first-page":"172","article-title":"Research on multi-level frame retrieval of artificial intelligence patents","volume":"42","author":"Li","year":"2023","journal-title":"Journal of Intelligence"},{"issue":"6","key":"2025110420325104100_ref030","first-page":"1006","article-title":"Research on the mechanism of technological dependence on economic security: based on the perspective of techno-economic security","volume":"41","author":"Liu","year":"2023","journal-title":"Studies in Science of Science"},{"key":"2025110420325104100_ref028","doi-asserted-by":"publisher","first-page":"1036","DOI":"10.1016\/j.proeng.2017.01.256","article-title":"Analysis on core technologies and cutting-edge technologies of new energy based on input-output method","volume":"174","author":"Liu","year":"2017","journal-title":"Procedia Engineering"},{"issue":"6","key":"2025110420325104100_ref029","first-page":"146","article-title":"Construction of keyword database for patent searching in the field of new generation information technology in nanjing","volume":"10","author":"Liu","year":"2023","journal-title":"Science and Technology and Innovation"},{"key":"2025110420325104100_ref031","doi-asserted-by":"publisher","first-page":"346","DOI":"10.1109\/tem.2021.3120709","article-title":"An approach to construct technological convergence networks across different IPC hierarchies and identify key technology fields","volume":"71","author":"Luan","year":"2021","journal-title":"IEEE Transactions on Engineering Management"},{"issue":"1","key":"2025110420325104100_ref032","first-page":"17","article-title":"Research on technology maturity measurement and analysis method based on patent value","volume":"18","author":"Luo","year":"2022","journal-title":"Digital Library Forum"},{"issue":"6","key":"2025110420325104100_ref033","doi-asserted-by":"publisher","first-page":"381","DOI":"10.1016\/j.lrp.2015.09.001","article-title":"An integrated framework for the selection and acquisition of core technologies: the case of Taiwan\u2019s LED industry","volume":"48","author":"Ma","year":"2015","journal-title":"Long Range Planning"},{"issue":"1","key":"2025110420325104100_ref034","doi-asserted-by":"publisher","first-page":"87","DOI":"10.1007\/bf02458398","article-title":"Productivity of research groups-relation between citation analysis and reputation within research communities","volume":"43","author":"Makino","year":"1998","journal-title":"Scientometrics"},{"key":"2025110420325104100_ref035","doi-asserted-by":"publisher","first-page":"375","DOI":"10.1016\/j.resconrec.2015.01.001","article-title":"Risk analysis in green supply chain using fuzzy AHP approach: a case study","volume":"104","author":"Mangla","year":"2015","journal-title":"Resources, Conservation and Recycling"},{"key":"2025110420325104100_ref036","doi-asserted-by":"publisher","first-page":"644","DOI":"10.1016\/j.techfore.2018.01.036","article-title":"Early identification of important patents: design and validation of citation network metrics","volume":"146","author":"Mariani","year":"2019","journal-title":"Technological Forecasting and Social Change"},{"issue":"10-11","key":"2025110420325104100_ref037","doi-asserted-by":"publisher","first-page":"956","DOI":"10.1016\/j.telpol.2016.04.003","article-title":"Identifying emerging core technologies for the future: case study of patents published by leading telecommunication organizations","volume":"40","author":"Noh","year":"2016","journal-title":"Telecommunications Policy"},{"issue":"2","key":"2025110420325104100_ref038","doi-asserted-by":"publisher","first-page":"405","DOI":"10.4218\/etrij.16.0115.0613","article-title":"Exploring promising technology in ICT sector using patent network and promising index based on patent information","volume":"38","author":"Park","year":"2016","journal-title":"ETRI Journal"},{"key":"2025110420325104100_ref039","doi-asserted-by":"publisher","DOI":"10.1016\/j.techfore.2022.122160","article-title":"Technology identification from patent texts: a novel named entity recognition method","volume":"186","author":"Puccetti","year":"2023","journal-title":"Technological Forecasting and Social Change"},{"issue":"3","key":"2025110420325104100_ref040","first-page":"31","article-title":"An analysis of the needs for building the key core technology breakthrough capabilities","volume":"45","author":"Qin","year":"2024","journal-title":"Science Research Management"},{"issue":"5","key":"2025110420325104100_ref041","first-page":"4","article-title":"Removing bottlenecks in critical core technologies from the perspective of innovation ecosystem: a case study of China\u2019s high-speed train traction system","volume":"26","author":"Song","year":"2024","journal-title":"Nankai Business Review"},{"key":"2025110420325104100_ref042","doi-asserted-by":"publisher","DOI":"10.1787\/5k4522wkw1r8-en","article-title":"Measuring patent quality: indicators of technological and economic value","author":"Squicciarini","year":"2013"},{"issue":"1","key":"2025110420325104100_ref043","first-page":"1","article-title":"Identification method and breakthrough path of \u2018neck-jamming\u2019 technologies under the background of sino-US trade friction: a case of the electronic information industry","volume":"38","author":"Tang","year":"2021","journal-title":"Science and Technology Progress and Policy"},{"issue":"3","key":"2025110420325104100_ref044","doi-asserted-by":"publisher","first-page":"509","DOI":"10.1007\/s11192-007-1698-8","article-title":"Factors to evaluate a patent in addition to citations","volume":"71","author":"Wang","year":"2007","journal-title":"Scientometrics"},{"issue":"6","key":"2025110420325104100_ref045","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0287034","article-title":"Analysis of international competitive situation of key core technology in strategic emerging industries: new generation of information technology industry as an example","volume":"18","author":"Wang","year":"2023","journal-title":"Plos One"},{"issue":"5","key":"2025110420325104100_ref046","first-page":"45","article-title":"Study on the path to breakthrough the dilemma of key core technology necked","volume":"13","author":"Wang","year":"2022","journal-title":"Tsinghua Business Review"},{"issue":"3","key":"2025110420325104100_ref047","doi-asserted-by":"publisher","first-page":"1229","DOI":"10.1007\/s11192-017-2444-5","article-title":"Requirement-oriented core technological components\u2019 identification based on SAO analysis","volume":"112","author":"Yang","year":"2017","journal-title":"Scientometrics"},{"key":"2025110420325104100_ref048","doi-asserted-by":"publisher","DOI":"10.1016\/j.techsoc.2023.102452","article-title":"Patent priority examination under mission orientation: can speed and quality coexist?","volume":"76","author":"Yang","year":"2024","journal-title":"Technology in Society"},{"issue":"3","key":"2025110420325104100_ref049","doi-asserted-by":"publisher","first-page":"435","DOI":"10.1023\/a:1016038617639","article-title":"Relation of the title length of a journal article to the length of the article","volume":"54","author":"Yitzhaki","year":"2002","journal-title":"Scientometrics"},{"issue":"12","key":"2025110420325104100_ref050","first-page":"34","article-title":"Research on the effect and mechanism of military-civilian synergy innovation of key technology from innovation chain perspective","volume":"41","author":"Yu","year":"2020","journal-title":"Journal of Technical Economics and Management"},{"issue":"4","key":"2025110420325104100_ref051","doi-asserted-by":"publisher","first-page":"923","DOI":"10.1007\/s10961-016-9524-1","article-title":"Time to patent at the USPTO: the case of emerging entrepreneurial firms","volume":"43","author":"Zahringer","year":"2018","journal-title":"The Journal of Technology Transfer"},{"issue":"6","key":"2025110420325104100_ref052","first-page":"5","article-title":"Research on the selection mechanism of the key and core technologics","volume":"49","author":"Zhang","year":"2020","journal-title":"Journal of Shaanxi Normal University (Philosophy and Social Sciences Edition)"},{"issue":"5","key":"2025110420325104100_ref053","first-page":"852","article-title":"Study on the evolution mechanism of breaking through key core technologies through industry-university-research deep integration","volume":"40","author":"Zhang","year":"2022","journal-title":"Studies in Science of Science"},{"issue":"2","key":"2025110420325104100_ref054","first-page":"20","article-title":"Concept definition, characteristic discrimination and breakthrough path of key core technology","volume":"39","author":"Zhang","year":"2023","journal-title":"Forum on Science and Technology in China"},{"issue":"4","key":"2025110420325104100_ref055","doi-asserted-by":"publisher","first-page":"1108","DOI":"10.1016\/j.joi.2016.09.006","article-title":"A hybrid similarity measure method for patent portfolio analysis","volume":"10","author":"Zhang","year":"2016","journal-title":"Journal of Informetrics"},{"issue":"3","key":"2025110420325104100_ref056","doi-asserted-by":"publisher","first-page":"1925","DOI":"10.1007\/s11192-017-2337-7","article-title":"An entropy-based indicator system for measuring the potential of patents in technological innovation: rejecting moderation","volume":"111","author":"Zhang","year":"2017","journal-title":"Scientometrics"},{"issue":"7","key":"2025110420325104100_ref057","first-page":"81","article-title":"Research on the methods of core patent identification based on industrial dimension","volume":"37","author":"Zheng","year":"2014","journal-title":"Information Studies: Theory and Application"},{"issue":"10","key":"2025110420325104100_ref058","first-page":"1","article-title":"A research on evaluation of the competitive situation of key core technologies","volume":"42","author":"Zheng","year":"2021","journal-title":"Science Research Management"}],"container-title":["Kybernetes"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/K-03-2024-0717\/full\/xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/k\/article-pdf\/54\/11\/6252\/10418066\/k-03-2024-0717en.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/www.emerald.com\/k\/article-pdf\/54\/11\/6252\/10418066\/k-03-2024-0717en.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,5]],"date-time":"2025-11-05T01:33:01Z","timestamp":1762306381000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.emerald.com\/k\/article\/54\/11\/6252\/1258516\/Study-on-the-identification-of-key-core-technology"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,6,17]]},"references-count":58,"journal-issue":{"issue":"11","published-print":{"date-parts":[[2025,11,6]]}},"URL":"https:\/\/doi.org\/10.1108\/k-03-2024-0717","relation":{},"ISSN":["0368-492X","1758-7883"],"issn-type":[{"value":"0368-492X","type":"print"},{"value":"1758-7883","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,6,17]]}}}