Advanced Search
MyIDEAS: Login to save this paper or follow this series

Protecting Research and Technology from Espionage

Contents:

Author Info

  • D. THORLEUCHTER

    ()

  • D. VAN DEN POEL

Abstract

In recent years, governmental and industrial espionage becomes an increased problem for governments and corporations. Especially information about current technology development and research activities are interesting targets for espionage. Thus, we introduce a new and automated methodology that investigates the information leakage risk of projects in research and technology (R&T) processed by an organization concerning governmental or industrial espionage. Latent semantic indexing is applied together with machine based learning and prediction modeling. This identifies semantic textual patterns representing technologies and their corresponding application fields that are of high relevance for the organization’s strategy. These patterns are used to estimate organization’s costs of an information leakage for each project. Further, a web mining approach is processed to identify worldwide knowledge distribution within the relevant technologies and corresponding application fields. This information is used to estimate the probability that an information leakage occur. A risk assessment methodology calculates the information leakage risk for each project. In a case study, the information leakage risk of defense based R&T projects is investigated. This is because defense based R&T is of particularly interest by espionage agents. Overall, it can be shown that the proposed methodology is successful in calculation the espionage information leakage risk of projects. This supports an organization by processing espionage risk management.

Download Info

If you experience problems downloading a file, check if you have the proper application to view it first. In case of further problems read the IDEAS help page. Note that these files are not on the IDEAS site. Please be patient as the files may be large.
File URL: http://www.feb.ugent.be/nl/Ondz/wp/Papers/wp_12_824.pdf
Download Restriction: no

Bibliographic Info

Paper provided by Ghent University, Faculty of Economics and Business Administration in its series Working Papers of Faculty of Economics and Business Administration, Ghent University, Belgium with number 12/824.

as in new window
Length: 17 pages
Date of creation: Dec 2012
Date of revision:
Handle: RePEc:rug:rugwps:12/824

Contact details of provider:
Postal: Hoveniersberg 4, B-9000 Gent
Phone: ++ 32 (0) 9 264 34 61
Fax: ++ 32 (0) 9 264 35 92
Web page: http://www.ugent.be/eb
More information through EDIRC

Related research

Keywords: Latent semantic indexing; SVD; Espionage; Risk assessment;

This paper has been announced in the following NEP Reports:

References

References listed on IDEAS
Please report citation or reference errors to , or , if you are the registered author of the cited work, log in to your RePEc Author Service profile, click on "citations" and make appropriate adjustments.:
as in new window
  1. Rubenstein, Albert H. & Douds, Charles F. & Geschka, Horst & Kawase, Takeshi & Miller, John P. & Saintpaul, Raymond & Watkins, David, 1977. "Management perceptions of government incentives to technological innovation in england, Trance, West Germany and Japan," Research Policy, Elsevier, vol. 6(4), pages 324-357, October.
  2. Merrill Whitney & James Gaisford, 1999. "An Inquiry Into the Rationale for Economic Espionage," International Economic Journal, Taylor & Francis Journals, vol. 13(2), pages 103-123.
  3. Akihiko Matsui, 1988. "Information Leakage Forces Cooperation," Discussion Papers 786, Northwestern University, Center for Mathematical Studies in Economics and Management Science.
  4. Crane, Andrew, 2005. "In the company of spies: When competitive intelligence gathering becomes industrial espionage," Business Horizons, Elsevier, vol. 48(3), pages 233-240.
  5. D. Thorleuchter & D. Van Den Poel, 2012. "Protecting Research and Technology from Espionage," Working Papers of Faculty of Economics and Business Administration, Ghent University, Belgium 12/824, Ghent University, Faculty of Economics and Business Administration.
  6. Shirley Ho, 2007. "An Economic Analysis Of Military Intelligence," Defence and Peace Economics, Taylor & Francis Journals, vol. 18(6), pages 485-493.
  7. Yu, Li & Hurley, Terrance & Kliebenstein, James & Orazem, Peter, 2012. "A test for complementarities among multiple technologies that avoids the curse of dimensionality," Economics Letters, Elsevier, vol. 116(3), pages 354-357.
  8. Gorman, Michael E, 2002. " Types of Knowledge and Their Roles in Technology Transfer," The Journal of Technology Transfer, Springer, vol. 27(3), pages 219-31, June.
  9. D. Thorleuchter & D. Van Den Poel & A. Prinzie, 2011. "Analyzing existing customers’ websites to improve the customer acquisition process as well as the profitability prediction in B-to-B marketing," Working Papers of Faculty of Economics and Business Administration, Ghent University, Belgium 11/733, Ghent University, Faculty of Economics and Business Administration.
  10. Ortega Jiménez, César H. & Garrido-Vega, Pedro & Pérez Díez de los Ríos, José Luis & García González, Santiago, 2011. "Manufacturing strategy-technology relationship among auto suppliers," International Journal of Production Economics, Elsevier, vol. 133(2), pages 508-517, October.
  11. Markus K. Brunnermeier, 2005. "Information Leakage and Market Efficiency," Review of Financial Studies, Society for Financial Studies, vol. 18(2), pages 417-457.
  12. Prinzie, Anita & Van den Poel, Dirk, 2006. "Investigating purchasing-sequence patterns for financial services using Markov, MTD and MTDg models," European Journal of Operational Research, Elsevier, vol. 170(3), pages 710-734, May.
  13. D. Thorleuchter & D. Van Den Poel & A. Prinzie & -, 2009. "Mining Ideas from Textual Information," Working Papers of Faculty of Economics and Business Administration, Ghent University, Belgium 09/619, Ghent University, Faculty of Economics and Business Administration.
  14. D. Thorleuchter & D. Van Den Poel & A. Prinzie & -, 2010. "A compared R&D-based and patent-based cross impact analysis for identifying relationships between technologies," Working Papers of Faculty of Economics and Business Administration, Ghent University, Belgium 10/632, Ghent University, Faculty of Economics and Business Administration.
  15. Solan, Eilon & Yariv, Leeat, 2004. "Games with espionage," Games and Economic Behavior, Elsevier, vol. 47(1), pages 172-199, April.
  16. D. Thorleuchter & D. Van Den Poel, 2012. "Improved Multilevel Security with Latent Semantic Indexing," Working Papers of Faculty of Economics and Business Administration, Ghent University, Belgium 12/811, Ghent University, Faculty of Economics and Business Administration.
  17. S. Ho, 2008. "Extracting the information: espionage with double crossing," Journal of Economics, Springer, vol. 93(1), pages 31-58, February.
  18. Kulve, Haico te & Smit, Wim A., 2003. "Civilian-military co-operation strategies in developing new technologies," Research Policy, Elsevier, vol. 32(6), pages 955-970, June.
Full references (including those not matched with items on IDEAS)

Citations

Citations are extracted by the CitEc Project, subscribe to its RSS feed for this item.
as in new window

Cited by:
  1. D. Thorleuchter & D. Van Den Poel, 2013. "Quantitative Cross Impact Analysis with Latent Semantic Indexing," Working Papers of Faculty of Economics and Business Administration, Ghent University, Belgium 13/861, Ghent University, Faculty of Economics and Business Administration.
  2. D. Thorleuchter & D. Van Den Poel, 2012. "Protecting Research and Technology from Espionage," Working Papers of Faculty of Economics and Business Administration, Ghent University, Belgium 12/824, Ghent University, Faculty of Economics and Business Administration.
  3. D. Thorleuchter & D. Van Den Poel, 2013. "Semantic Compared Cross Impact Analysis," Working Papers of Faculty of Economics and Business Administration, Ghent University, Belgium 13/862, Ghent University, Faculty of Economics and Business Administration.

Lists

This item is not listed on Wikipedia, on a reading list or among the top items on IDEAS.

Statistics

Access and download statistics

Corrections

When requesting a correction, please mention this item's handle: RePEc:rug:rugwps:12/824. See general information about how to correct material in RePEc.

For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: (Nathalie Verhaeghe).

If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

If references are entirely missing, you can add them using this form.

If the full references list an item that is present in RePEc, but the system did not link to it, you can help with this form.

If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your profile, as there may be some citations waiting for confirmation.

Please note that corrections may take a couple of weeks to filter through the various RePEc services.