IDEAS home Printed from https://ideas.repec.org/p/rug/rugwps/12-824.html
   My bibliography  Save this paper

Protecting Research and Technology from Espionage

Author

Listed:
  • D. THORLEUCHTER

    ()

  • D. VAN DEN POEL

Abstract

In recent years, governmental and industrial espionage becomes an increased problem for governments and corporations. Especially information about current technology development and research activities are interesting targets for espionage. Thus, we introduce a new and automated methodology that investigates the information leakage risk of projects in research and technology (R&T) processed by an organization concerning governmental or industrial espionage. Latent semantic indexing is applied together with machine based learning and prediction modeling. This identifies semantic textual patterns representing technologies and their corresponding application fields that are of high relevance for the organization’s strategy. These patterns are used to estimate organization’s costs of an information leakage for each project. Further, a web mining approach is processed to identify worldwide knowledge distribution within the relevant technologies and corresponding application fields. This information is used to estimate the probability that an information leakage occur. A risk assessment methodology calculates the information leakage risk for each project. In a case study, the information leakage risk of defense based R&T projects is investigated. This is because defense based R&T is of particularly interest by espionage agents. Overall, it can be shown that the proposed methodology is successful in calculation the espionage information leakage risk of projects. This supports an organization by processing espionage risk management.

Suggested Citation

  • D. Thorleuchter & D. Van Den Poel, 2012. "Protecting Research and Technology from Espionage," Working Papers of Faculty of Economics and Business Administration, Ghent University, Belgium 12/824, Ghent University, Faculty of Economics and Business Administration.
  • Handle: RePEc:rug:rugwps:12/824
    as

    Download full text from publisher

    File URL: http://wps-feb.ugent.be/Papers/wp_12_824.pdf
    Download Restriction: no

    References listed on IDEAS

    as
    1. Shirley Ho, 2007. "An Economic Analysis Of Military Intelligence," Defence and Peace Economics, Taylor & Francis Journals, pages 485-493.
    2. Kulve, Haico te & Smit, Wim A., 2003. "Civilian-military co-operation strategies in developing new technologies," Research Policy, Elsevier, pages 955-970.
    3. Crane, Andrew, 2005. "In the company of spies: When competitive intelligence gathering becomes industrial espionage," Business Horizons, Elsevier, vol. 48(3), pages 233-240.
    4. Merrill Whitney & James Gaisford, 1999. "An Inquiry Into the Rationale for Economic Espionage," International Economic Journal, Taylor & Francis Journals, pages 103-123.
    5. Rubenstein, Albert H. & Douds, Charles F. & Geschka, Horst & Kawase, Takeshi & Miller, John P. & Saintpaul, Raymond & Watkins, David, 1977. "Management perceptions of government incentives to technological innovation in england, Trance, West Germany and Japan," Research Policy, Elsevier, pages 324-357.
    6. Prinzie, Anita & Van den Poel, Dirk, 2006. "Investigating purchasing-sequence patterns for financial services using Markov, MTD and MTDg models," European Journal of Operational Research, Elsevier, vol. 170(3), pages 710-734, May.
    7. Eilon Solan & Leeat Yariv, 1998. "Games with Espionage," Discussion Papers 1257, Northwestern University, Center for Mathematical Studies in Economics and Management Science.
    8. Yu, Li & Hurley, Terrance M. & Kliebenstein, James B. & Orazem, Peter F., 2012. "Firm Size, Technical Change, and Wages in the Pork Sector, 1990-2005," Journal of Agricultural and Resource Economics, Western Agricultural Economics Association, vol. 37(2), August.
    9. D. Thorleuchter & D. Van Den Poel, 2012. "Improved Multilevel Security with Latent Semantic Indexing," Working Papers of Faculty of Economics and Business Administration, Ghent University, Belgium 12/811, Ghent University, Faculty of Economics and Business Administration.
    10. Ortega Jiménez, César H. & Garrido-Vega, Pedro & Pérez Díez de los Ríos, José Luis & García González, Santiago, 2011. "Manufacturing strategy-technology relationship among auto suppliers," International Journal of Production Economics, Elsevier, vol. 133(2), pages 508-517, October.
    11. Matsui, Akihiko, 1989. "Information leakage forces cooperation," Games and Economic Behavior, Elsevier, vol. 1(1), pages 94-115, March.
    12. D. Thorleuchter & D. Van Den Poel & A. Prinzie, 2011. "Analyzing existing customers’ websites to improve the customer acquisition process as well as the profitability prediction in B-to-B marketing," Working Papers of Faculty of Economics and Business Administration, Ghent University, Belgium 11/733, Ghent University, Faculty of Economics and Business Administration.
    13. Markus K. Brunnermeier, 2005. "Information Leakage and Market Efficiency," Review of Financial Studies, Society for Financial Studies, pages 417-457.
    14. Gorman, Michael E, 2002. "Types of Knowledge and Their Roles in Technology Transfer," The Journal of Technology Transfer, Springer, vol. 27(3), pages 219-231, June.
    15. Yu, Li & Hurley, Terrance & Kliebenstein, James & Orazem, Peter, 2012. "A test for complementarities among multiple technologies that avoids the curse of dimensionality," Economics Letters, Elsevier, vol. 116(3), pages 354-357.
    16. S. Ho, 2008. "Extracting the information: espionage with double crossing," Journal of Economics, Springer, pages 31-58.
    17. D. Thorleuchter & D. Van Den Poel & A. Prinzie & -, 2010. "A compared R&D-based and patent-based cross impact analysis for identifying relationships between technologies," Working Papers of Faculty of Economics and Business Administration, Ghent University, Belgium 10/632, Ghent University, Faculty of Economics and Business Administration.
    18. Solan, Eilon & Yariv, Leeat, 2004. "Games with espionage," Games and Economic Behavior, Elsevier, vol. 47(1), pages 172-199, April.
    19. D. Thorleuchter & D. Van Den Poel & A. Prinzie & -, 2009. "Mining Ideas from Textual Information," Working Papers of Faculty of Economics and Business Administration, Ghent University, Belgium 09/619, Ghent University, Faculty of Economics and Business Administration.
    20. D. Thorleuchter & D. Van Den Poel, 2012. "Protecting Research and Technology from Espionage," Working Papers of Faculty of Economics and Business Administration, Ghent University, Belgium 12/824, Ghent University, Faculty of Economics and Business Administration.
    Full references (including those not matched with items on IDEAS)

    Citations

    Citations are extracted by the CitEc Project, subscribe to its RSS feed for this item.
    as


    Cited by:

    1. D. Thorleuchter & D. Van Den Poel, 2012. "Protecting Research and Technology from Espionage," Working Papers of Faculty of Economics and Business Administration, Ghent University, Belgium 12/824, Ghent University, Faculty of Economics and Business Administration.
    2. D. Thorleuchter & D. Van Den Poel, 2013. "Quantitative Cross Impact Analysis with Latent Semantic Indexing," Working Papers of Faculty of Economics and Business Administration, Ghent University, Belgium 13/861, Ghent University, Faculty of Economics and Business Administration.
    3. D. Thorleuchter & D. Van Den Poel, 2013. "Semantic Compared Cross Impact Analysis," Working Papers of Faculty of Economics and Business Administration, Ghent University, Belgium 13/862, Ghent University, Faculty of Economics and Business Administration.

    More about this item

    Keywords

    Latent semantic indexing; SVD; Espionage; Risk assessment;

    NEP fields

    This paper has been announced in the following NEP Reports:

    Statistics

    Access and download statistics

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:rug:rugwps:12/824. See general information about how to correct material in RePEc.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: (Nathalie Verhaeghe). General contact details of provider: http://edirc.repec.org/data/ferugbe.html .

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    If CitEc recognized a reference but did not link an item in RePEc to it, you can help with this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your profile, as there may be some citations waiting for confirmation.

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service hosted by the Research Division of the Federal Reserve Bank of St. Louis . RePEc uses bibliographic data supplied by the respective publishers.