{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,30]],"date-time":"2025-07-30T13:17:42Z","timestamp":1753881462791,"version":"3.41.2"},"reference-count":53,"publisher":"Wiley","issue":"1","license":[{"start":{"date-parts":[[2021,9,6]],"date-time":"2021-09-06T00:00:00Z","timestamp":1630886400000},"content-version":"vor","delay-in-days":248,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100002338","name":"Ministry of Education of the People's Republic of China","doi-asserted-by":"publisher","award":["19C10276025"],"award-info":[{"award-number":["19C10276025"]}],"id":[{"id":"10.13039\/501100002338","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100008522","name":"China University of Political Science and Law","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100008522","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["onlinelibrary.wiley.com"],"crossmark-restriction":true},"short-container-title":["Complexity"],"published-print":{"date-parts":[[2021,1]]},"abstract":"<jats:p>Small\u2010 and medium\u2010sized enterprises (SMEs) establish asymmetric research and development (R&amp;D) alliance with core enterprises to improve innovation efficiency. Unfortunately, the gap in the status and bargaining power between enterprises in such partnerships makes the intellectual property risk situation complicated. While gaining support and assistance from core enterprises, SMEs face the risk of exposing their core knowledge and key resources, which seriously affects the stability of R&amp;D alliance and the sustainability of cooperative innovation. How to protect the intellectual property rights of SMEs in the asymmetric R&amp;D alliance and improve the alliance\u2019s stability is an urgent problem to be solved. Based on the theory of resource dependence and transaction cost, this study uses 260 high\u2010tech companies participating in the asymmetric R&amp;D alliance as a sample to conduct empirical research from the perspective of SMEs in a weak position. The purpose of this study is to sort out the types of intellectual property risks in the alliance and clarify the relationship between them and the stability of asymmetric R&amp;D alliance. Furthermore, this study examines the moderating effects of contract governance mechanisms and relational contracts to explore effective governance mechanisms at the alliance level. Empirical results show that the intellectual property investment risk and the intellectual property loss risk have a significant negative impact on the stability of asymmetric R&amp;D alliance. The contract governance mechanism negatively moderates the impact of intellectual property investment risk on the stability of the asymmetric R&amp;D alliance. The relationship governance mechanism negatively moderates the impact of intellectual property loss risk on the stability of the asymmetric R&amp;D alliance. The contract and relationship governance mechanism jointly negatively moderate the impact of intellectual property investment risk and loss risk on the stability of the asymmetric R&amp;D alliance.<\/jats:p>","DOI":"10.1155\/2021\/2949067","type":"journal-article","created":{"date-parts":[[2021,9,7]],"date-time":"2021-09-07T00:05:53Z","timestamp":1630973153000},"update-policy":"https:\/\/doi.org\/10.1002\/crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["The Relationship between Intellectual Property Risk and Stability of Asymmetric Research and Development Alliance"],"prefix":"10.1155","volume":"2021","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-4859-6283","authenticated-orcid":false,"given":"Jie","family":"Zhen","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9660-7565","authenticated-orcid":false,"given":"Zhuopin","family":"Guo","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6022-7384","authenticated-orcid":false,"given":"Yiying","family":"Qu","sequence":"additional","affiliation":[]},{"given":"Hao","family":"Ren","sequence":"additional","affiliation":[]}],"member":"311","published-online":{"date-parts":[[2021,9,6]]},"reference":[{"key":"e_1_2_11_1_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.omega.2019.102109"},{"key":"e_1_2_11_2_2","doi-asserted-by":"publisher","DOI":"10.1177\/0266242619842592"},{"key":"e_1_2_11_3_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.technovation.2018.07.005"},{"key":"e_1_2_11_4_2","doi-asserted-by":"publisher","DOI":"10.1108\/jkm-11-2016-0501"},{"key":"e_1_2_11_5_2","doi-asserted-by":"publisher","DOI":"10.1111\/roie.12214"},{"key":"e_1_2_11_6_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.intman.2008.12.006"},{"key":"e_1_2_11_7_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.jengtecman.2012.08.001"},{"key":"e_1_2_11_8_2","doi-asserted-by":"publisher","DOI":"10.1287\/mnsc.1060.0642"},{"key":"e_1_2_11_9_2","doi-asserted-by":"publisher","DOI":"10.3390\/su11236594"},{"key":"e_1_2_11_10_2","doi-asserted-by":"publisher","DOI":"10.2189\/asqu.53.2.295"},{"key":"e_1_2_11_11_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.jom.2014.09.009"},{"key":"e_1_2_11_12_2","doi-asserted-by":"publisher","DOI":"10.1002\/smj.2898"},{"key":"e_1_2_11_13_2","doi-asserted-by":"publisher","DOI":"10.1177\/0149206316655872"},{"key":"e_1_2_11_14_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.indmarman.2015.02.011"},{"key":"e_1_2_11_15_2","doi-asserted-by":"publisher","DOI":"10.1108\/jkm-05-2018-0326"},{"key":"e_1_2_11_16_2","first-page":"122","article-title":"Competing for the future","volume":"72","author":"Hamel G.","year":"1994","journal-title":"Harvard Business Review"},{"key":"e_1_2_11_17_2","doi-asserted-by":"publisher","DOI":"10.1002\/smj.4250160303"},{"key":"e_1_2_11_18_2","doi-asserted-by":"publisher","DOI":"10.1016\/s0148-2963(02)00284-9"},{"key":"e_1_2_11_19_2","doi-asserted-by":"publisher","DOI":"10.1111\/radm.12128"},{"key":"e_1_2_11_20_2","first-page":"740","article-title":"Analysis of intellectual property risk caused by partner\u2032s opportunistic behavior","volume":"25","author":"Zhang K. Y.","year":"2007","journal-title":"Studies in Science of Science"},{"key":"e_1_2_11_21_2","doi-asserted-by":"publisher","DOI":"10.1177\/0149206312439327"},{"key":"e_1_2_11_22_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.technovation.2014.07.011"},{"key":"e_1_2_11_23_2","doi-asserted-by":"publisher","DOI":"10.5172\/impp.2013.15.1.17"},{"key":"e_1_2_11_24_2","doi-asserted-by":"publisher","DOI":"10.1111\/radm.12126"},{"key":"e_1_2_11_25_2","doi-asserted-by":"publisher","DOI":"10.1111\/radm.12232"},{"key":"e_1_2_11_26_2","doi-asserted-by":"publisher","DOI":"10.1108\/jbim-01-2018-0052"},{"key":"e_1_2_11_27_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.scitotenv.2019.135261"},{"key":"e_1_2_11_28_2","doi-asserted-by":"publisher","DOI":"10.1177\/002224299606000404"},{"key":"e_1_2_11_29_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.indmarman.2005.01.004"},{"key":"e_1_2_11_30_2","doi-asserted-by":"publisher","DOI":"10.2753\/mis0742-1222300304"},{"key":"e_1_2_11_31_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.jbusres.2003.08.013"},{"key":"e_1_2_11_32_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.respol.2016.09.015"},{"key":"e_1_2_11_33_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.indmarman.2003.10.015"},{"key":"e_1_2_11_34_2","doi-asserted-by":"publisher","DOI":"10.1111\/j.1540-5885.2009.00343.x"},{"key":"e_1_2_11_35_2","doi-asserted-by":"publisher","DOI":"10.1002\/smj.581"},{"key":"e_1_2_11_36_2","first-page":"1159","article-title":"Networking behavior and contracting relationships among entrepreneurs in business incubators","volume":"38","author":"Ebbers J. J.","year":"2013","journal-title":"Entrepreneurship: Theory and Practice"},{"key":"e_1_2_11_37_2","doi-asserted-by":"publisher","DOI":"10.1177\/09717218211020476"},{"key":"e_1_2_11_38_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.indmarman.2015.11.011"},{"key":"e_1_2_11_39_2","doi-asserted-by":"publisher","DOI":"10.1515\/erj-2012-0007"},{"key":"e_1_2_11_40_2","doi-asserted-by":"publisher","DOI":"10.1177\/0149206313491289"},{"key":"e_1_2_11_41_2","doi-asserted-by":"publisher","DOI":"10.1108\/cms-07-2013-0129"},{"key":"e_1_2_11_42_2","doi-asserted-by":"publisher","DOI":"10.1002\/mde.1321"},{"key":"e_1_2_11_43_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.jom.2012.03.005"},{"key":"e_1_2_11_44_2","doi-asserted-by":"publisher","DOI":"10.1002\/smj.813"},{"key":"e_1_2_11_45_2","doi-asserted-by":"publisher","DOI":"10.1002\/mde.1198"},{"key":"e_1_2_11_46_2","doi-asserted-by":"publisher","DOI":"10.5465\/amp.2011.63886529"},{"key":"e_1_2_11_47_2","first-page":"1033","article-title":"Embedded ties and the acquisition of competitive capabilities","volume":"26","author":"Marcus M. E.","year":"2005","journal-title":"Strategic Management Journal"},{"key":"e_1_2_11_48_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.intman.2007.09.002"},{"volume-title":"Multivariate Data Analysis","year":"1998","author":"Hair J. F.","key":"e_1_2_11_49_2"},{"volume-title":"Multiple Regression: Testing and Interpreting Interactions","year":"1991","author":"Aiken L. S.","key":"e_1_2_11_50_2"},{"key":"e_1_2_11_51_2","first-page":"691","article-title":"Technologic strategic alliances\u2032 driving, cooperation optimizing and stability of strategic alliance","volume":"36","author":"Yang Z. L.","year":"2018","journal-title":"Studies in Science of Science"},{"key":"e_1_2_11_52_2","doi-asserted-by":"publisher","DOI":"10.1177\/0008125619885151"},{"key":"e_1_2_11_53_2","first-page":"1422","article-title":"Research on the reciprocity of opportunism behavior and governance mechanisms in the collaborative innovation","volume":"35","author":"Gao M. L.","year":"2017","journal-title":"Studies in Science of Science"}],"container-title":["Complexity"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/downloads.hindawi.com\/journals\/complexity\/2021\/2949067.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/complexity\/2021\/2949067.xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1155\/2021\/2949067","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,8,9]],"date-time":"2024-08-09T23:25:53Z","timestamp":1723245953000},"score":1,"resource":{"primary":{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/10.1155\/2021\/2949067"}},"subtitle":[],"editor":[{"given":"Yi","family":"Su","sequence":"additional","affiliation":[]}],"short-title":[],"issued":{"date-parts":[[2021,1]]},"references-count":53,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2021,1]]}},"alternative-id":["10.1155\/2021\/2949067"],"URL":"https:\/\/doi.org\/10.1155\/2021\/2949067","archive":["Portico"],"relation":{},"ISSN":["1076-2787","1099-0526"],"issn-type":[{"type":"print","value":"1076-2787"},{"type":"electronic","value":"1099-0526"}],"subject":[],"published":{"date-parts":[[2021,1]]},"assertion":[{"value":"2021-04-25","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2021-08-21","order":2,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2021-09-06","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}],"article-number":"2949067"}}