IDEAS home Printed from https://ideas.repec.org/p/rug/rugwps/12-824.html
   My bibliography  Save this paper

Protecting Research and Technology from Espionage

Author

Listed:
  • D. THORLEUCHTER
  • D. VAN DEN POEL

Abstract

In recent years, governmental and industrial espionage becomes an increased problem for governments and corporations. Especially information about current technology development and research activities are interesting targets for espionage. Thus, we introduce a new and automated methodology that investigates the information leakage risk of projects in research and technology (R&T) processed by an organization concerning governmental or industrial espionage. Latent semantic indexing is applied together with machine based learning and prediction modeling. This identifies semantic textual patterns representing technologies and their corresponding application fields that are of high relevance for the organization’s strategy. These patterns are used to estimate organization’s costs of an information leakage for each project. Further, a web mining approach is processed to identify worldwide knowledge distribution within the relevant technologies and corresponding application fields. This information is used to estimate the probability that an information leakage occur. A risk assessment methodology calculates the information leakage risk for each project. In a case study, the information leakage risk of defense based R&T projects is investigated. This is because defense based R&T is of particularly interest by espionage agents. Overall, it can be shown that the proposed methodology is successful in calculation the espionage information leakage risk of projects. This supports an organization by processing espionage risk management.

Suggested Citation

  • D. Thorleuchter & D. Van Den Poel, 2012. "Protecting Research and Technology from Espionage," Working Papers of Faculty of Economics and Business Administration, Ghent University, Belgium 12/824, Ghent University, Faculty of Economics and Business Administration.
  • Handle: RePEc:rug:rugwps:12/824
    as

    Download full text from publisher

    File URL: http://wps-feb.ugent.be/Papers/wp_12_824.pdf
    Download Restriction: no
    ---><---

    References listed on IDEAS

    as
    1. Shirley Ho, 2007. "An Economic Analysis Of Military Intelligence," Defence and Peace Economics, Taylor & Francis Journals, vol. 18(6), pages 485-493.
    2. Prinzie, Anita & Van den Poel, Dirk, 2006. "Investigating purchasing-sequence patterns for financial services using Markov, MTD and MTDg models," European Journal of Operational Research, Elsevier, vol. 170(3), pages 710-734, May.
    3. Solan, Eilon & Yariv, Leeat, 2004. "Games with espionage," Games and Economic Behavior, Elsevier, vol. 47(1), pages 172-199, April.
    4. Yu, Li & Hurley, Terrance & Kliebenstein, James & Orazem, Peter, 2012. "A test for complementarities among multiple technologies that avoids the curse of dimensionality," Economics Letters, Elsevier, vol. 116(3), pages 354-357.
    5. Ortega Jiménez, César H. & Garrido-Vega, Pedro & Pérez Díez de los Ríos, José Luis & García González, Santiago, 2011. "Manufacturing strategy-technology relationship among auto suppliers," International Journal of Production Economics, Elsevier, vol. 133(2), pages 508-517, October.
    6. Matsui, Akihiko, 1989. "Information leakage forces cooperation," Games and Economic Behavior, Elsevier, vol. 1(1), pages 94-115, March.
    7. D. Thorleuchter & D. Van Den Poel & A. Prinzie, 2011. "Analyzing existing customers’ websites to improve the customer acquisition process as well as the profitability prediction in B-to-B marketing," Working Papers of Faculty of Economics and Business Administration, Ghent University, Belgium 11/733, Ghent University, Faculty of Economics and Business Administration.
    8. Gorman, Michael E, 2002. "Types of Knowledge and Their Roles in Technology Transfer," The Journal of Technology Transfer, Springer, vol. 27(3), pages 219-231, June.
    9. Choi, Jin Young & Lee, Jong Ha & Sohn, So Young, 2009. "Impact analysis for national R&D funding in science and technology using quantification method II," Research Policy, Elsevier, vol. 38(10), pages 1534-1544, December.
    10. S. Ho, 2008. "Extracting the information: espionage with double crossing," Journal of Economics, Springer, vol. 93(1), pages 31-58, February.
    11. D. Thorleuchter & D. Van Den Poel & A. Prinzie & -, 2009. "Mining Ideas from Textual Information," Working Papers of Faculty of Economics and Business Administration, Ghent University, Belgium 09/619, Ghent University, Faculty of Economics and Business Administration.
    12. D. VAN DEN POEL & Jan J. DE SCHAMPHELAERE & G. WETS, 2003. "Direct and Indirect Effects of Retail Promotions," Working Papers of Faculty of Economics and Business Administration, Ghent University, Belgium 03/202, Ghent University, Faculty of Economics and Business Administration.
    13. Scott Deerwester & Susan T. Dumais & George W. Furnas & Thomas K. Landauer & Richard Harshman, 1990. "Indexing by latent semantic analysis," Journal of the American Society for Information Science, Association for Information Science & Technology, vol. 41(6), pages 391-407, September.
    14. Jaffe, Adam B, 1986. "Technological Opportunity and Spillovers of R&D: Evidence from Firms' Patents, Profits, and Market Value," American Economic Review, American Economic Association, vol. 76(5), pages 984-1001, December.
    15. Kulve, Haico te & Smit, Wim A., 2003. "Civilian-military co-operation strategies in developing new technologies," Research Policy, Elsevier, vol. 32(6), pages 955-970, June.
    16. Crane, Andrew, 2005. "In the company of spies: When competitive intelligence gathering becomes industrial espionage," Business Horizons, Elsevier, vol. 48(3), pages 233-240.
    17. Merrill Whitney & James Gaisford, 1999. "An Inquiry Into the Rationale for Economic Espionage," International Economic Journal, Taylor & Francis Journals, vol. 13(2), pages 103-123.
    18. Rubenstein, Albert H. & Douds, Charles F. & Geschka, Horst & Kawase, Takeshi & Miller, John P. & Saintpaul, Raymond & Watkins, David, 1977. "Management perceptions of government incentives to technological innovation in england, Trance, West Germany and Japan," Research Policy, Elsevier, vol. 6(4), pages 324-357, October.
    19. D. Thorleuchter & D. Van Den Poel, 2012. "Improved Multilevel Security with Latent Semantic Indexing," Working Papers of Faculty of Economics and Business Administration, Ghent University, Belgium 12/811, Ghent University, Faculty of Economics and Business Administration.
    20. Markus K. Brunnermeier, 2005. "Information Leakage and Market Efficiency," Review of Financial Studies, Society for Financial Studies, vol. 18(2), pages 417-457.
    21. W. Buckinx & E. Moons & D. Van Den Poel & G. Wets, 2003. "Customer-Adapted Coupon Targeting Using Feature Selection," Working Papers of Faculty of Economics and Business Administration, Ghent University, Belgium 03/201, Ghent University, Faculty of Economics and Business Administration.
    22. V. L. Miguéis & D. Van Den Poel & A.S. Camanho & J. Falcao E Cunha, 2012. "Modeling Partial Customer Churn: On the Value of First Product-Category Purchase Sequences," Working Papers of Faculty of Economics and Business Administration, Ghent University, Belgium 12/790, Ghent University, Faculty of Economics and Business Administration.
    23. D. Thorleuchter & D. Van Den Poel & A. Prinzie & -, 2010. "A compared R&D-based and patent-based cross impact analysis for identifying relationships between technologies," Working Papers of Faculty of Economics and Business Administration, Ghent University, Belgium 10/632, Ghent University, Faculty of Economics and Business Administration.
    Full references (including those not matched with items on IDEAS)

    Citations

    Citations are extracted by the CitEc Project, subscribe to its RSS feed for this item.
    as


    Cited by:

    1. D. Thorleuchter & D. Van Den Poel, 2013. "Semantic Compared Cross Impact Analysis," Working Papers of Faculty of Economics and Business Administration, Ghent University, Belgium 13/862, Ghent University, Faculty of Economics and Business Administration.
    2. D. Thorleuchter & D. Van Den Poel, 2013. "Quantitative Cross Impact Analysis with Latent Semantic Indexing," Working Papers of Faculty of Economics and Business Administration, Ghent University, Belgium 13/861, Ghent University, Faculty of Economics and Business Administration.

    Most related items

    These are the items that most often cite the same works as this one and are cited by the same works as this one.
    1. D. Thorleuchter & D. Van Den Poel, 2012. "Technology Classification with Latent Semantic Indexing," Working Papers of Faculty of Economics and Business Administration, Ghent University, Belgium 12/814, Ghent University, Faculty of Economics and Business Administration.
    2. D. Thorleuchter & D. Van Den Poel, 2013. "Weak Signal Identification with Semantic Web Mining," Working Papers of Faculty of Economics and Business Administration, Ghent University, Belgium 13/860, Ghent University, Faculty of Economics and Business Administration.
    3. D. Thorleuchter & D. Van Den Poel, 2013. "Semantic Compared Cross Impact Analysis," Working Papers of Faculty of Economics and Business Administration, Ghent University, Belgium 13/862, Ghent University, Faculty of Economics and Business Administration.
    4. Jonas Send, 2021. "Contest Copycats: Adversarial Duplication of Effort in Contests," Working Papers tax-mpg-rps-2021-17, Max Planck Institute for Tax Law and Public Finance.
    5. Cuihong Fan & Byoung Heon Jun & Elmar G. Wolfstetter, 2019. "Induced Price Leadership and (Counter-)Spying Rivals' Play under Incomplete Information," CESifo Working Paper Series 7476, CESifo.
    6. D. Thorleuchter & D. Van Den Poel, 2012. "Improved Multilevel Security with Latent Semantic Indexing," Working Papers of Faculty of Economics and Business Administration, Ghent University, Belgium 12/811, Ghent University, Faculty of Economics and Business Administration.
    7. D. Thorleuchter & D. Van Den Poel, 2013. "Quantitative Cross Impact Analysis with Latent Semantic Indexing," Working Papers of Faculty of Economics and Business Administration, Ghent University, Belgium 13/861, Ghent University, Faculty of Economics and Business Administration.
    8. Barrachina, Alex & Tauman, Yair & Urbano, Amparo, 2014. "Entry and espionage with noisy signals," Games and Economic Behavior, Elsevier, vol. 83(C), pages 127-146.
    9. Po-Lu Chen, 2016. "Cross-Country Economic Espionage and Investment in Research and Development," International Journal of Economics and Finance, Canadian Center of Science and Education, vol. 8(4), pages 146-155, April.
    10. S. Ho, 2008. "Extracting the information: espionage with double crossing," Journal of Economics, Springer, vol. 93(1), pages 31-58, February.
    11. D. Thorleuchter & D. Van Den Poel & A. Prinzie, 2011. "Analyzing existing customers’ websites to improve the customer acquisition process as well as the profitability prediction in B-to-B marketing," Working Papers of Faculty of Economics and Business Administration, Ghent University, Belgium 11/733, Ghent University, Faculty of Economics and Business Administration.
    12. Shirley Ho, 2007. "An Economic Analysis Of Military Intelligence," Defence and Peace Economics, Taylor & Francis Journals, vol. 18(6), pages 485-493.
    13. Lee, Natalie, 2023. "Feigning ignorance for long-term gains," Games and Economic Behavior, Elsevier, vol. 138(C), pages 42-71.
    14. Takanobu Nakahara & Katsutoshi Yada, 2012. "Analyzing consumers’ shopping behavior using RFID data and pattern mining," Advances in Data Analysis and Classification, Springer;German Classification Society - Gesellschaft für Klassifikation (GfKl);Japanese Classification Society (JCS);Classification and Data Analysis Group of the Italian Statistical Society (CLADAG);International Federation of Classification Societies (IFCS), vol. 6(4), pages 355-365, December.
    15. Alex Barrachina & Yair Tauman & Amparo Urbano, 2021. "Entry with two correlated signals: the case of industrial espionage and its positive competitive effects," International Journal of Game Theory, Springer;Game Theory Society, vol. 50(1), pages 241-278, March.
    16. J. D’Haen & D. Van Den Poel & D. Thorleuchter, 2012. "Predicting Customer Profitability During Acquisition: Finding the Optimal Combination of Data Source and Data Mining Technique," Working Papers of Faculty of Economics and Business Administration, Ghent University, Belgium 12/818, Ghent University, Faculty of Economics and Business Administration.
    17. Vera Miguéis & Dirk Poel & Ana Camanho & João Falcão e Cunha, 2012. "Predicting partial customer churn using Markov for discrimination for modeling first purchase sequences," Advances in Data Analysis and Classification, Springer;German Classification Society - Gesellschaft für Klassifikation (GfKl);Japanese Classification Society (JCS);Classification and Data Analysis Group of the Italian Statistical Society (CLADAG);International Federation of Classification Societies (IFCS), vol. 6(4), pages 337-353, December.
    18. A. Prinzie & D. Van Den Poel, 2005. "Incorporating sequential information into traditional classification models by using an element/position- sensitive SAM," Working Papers of Faculty of Economics and Business Administration, Ghent University, Belgium 05/292, Ghent University, Faculty of Economics and Business Administration.
    19. Alex Barrachina & Yair Tauman & Amparo Urbano Salvador, 2014. "Entry with Two Correlated Signals," Discussion Papers in Economic Behaviour 0714, University of Valencia, ERI-CES.
    20. Ballings, Michel & Van den Poel, Dirk, 2015. "CRM in social media: Predicting increases in Facebook usage frequency," European Journal of Operational Research, Elsevier, vol. 244(1), pages 248-260.

    More about this item

    Keywords

    Latent semantic indexing; SVD; Espionage; Risk assessment;
    All these keywords.

    NEP fields

    This paper has been announced in the following NEP Reports:

    Statistics

    Access and download statistics

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:rug:rugwps:12/824. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Nathalie Verhaeghe (email available below). General contact details of provider: https://edirc.repec.org/data/ferugbe.html .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.