Protecting research and technology from espionage

In recent years, governmental and industrial espionage becomes an increased problem for governments and corporations. Especially information about current technology development and research activities are interesting targets for espionage. Thus, we introduce a new and automated methodology that investigates the information leakage risk of projects in research and technology (R&T) processed by an organization concerning governmental or industrial espionage. Latent semantic indexing is applied together with machine based learning and prediction modeling. This identifies semantic textual patterns representing technologies and their corresponding application fields that are of high relevance for the organization's strategy. These patterns are used to estimate organization's costs of an information leakage for each project. Further, a web mining approach is processed to identify worldwide knowledge distribution within the relevant technologies and corresponding application fields. This information is used to estimate the probability that an information leakage occur. A risk assessment methodology calculates the information leakage risk for each project. In a case study, the information leakage risk of defense based R&T projects is investigated. This is because defense based R&T is of particularly interest by espionage agents. Overall, it can be shown that the proposed methodology is successful in calculation the espionage information leakage risk of projects. This supports an organization by processing espionage risk management.

[1]  George Kingsley Zipf,et al.  Human behavior and the principle of least effort , 1949 .

[2]  Shirley J. Ho AN ECONOMIC ANALYSIS OF MILITARY INTELLIGENCE , 2007 .

[3]  Dirk Thorleuchter,et al.  Usability Based Modeling for Advanced IT-Security – An Electronic Engineering Approach , 2012 .

[4]  Dirk Thorleuchter,et al.  Extracting Consumers Needs for New Products - A Web Mining Approach , 2010, 2010 Third International Conference on Knowledge Discovery and Data Mining.

[5]  Michael E. Gorman,et al.  Types of Knowledge and Their Roles in Technology Transfer , 2002 .

[6]  Jie Yang,et al.  The effect of knowledge protection, knowledge ambiguity, and relational capital on alliance performance , 2007 .

[7]  Chao-Fu Hong,et al.  Opportunities for Crossing the Chasm between Early Adopters and the Early Majority through New Uses of Innovative Products , 2011, Rev. Socionetwork Strateg..

[8]  Jianping Zeng,et al.  Topics modeling based on selective Zipf distribution , 2012, Expert Syst. Appl..

[9]  Pedro Garrido-Vega,et al.  Manufacturing strategy-technology relationship among auto suppliers , 2011 .

[10]  Horst Geschka,et al.  The idea and project database of WELLA AG , 2002, Int. J. Technol. Manag..

[11]  Warren R. Greiff,et al.  A theory of term weighting based on exploratory data analysis , 1998, SIGIR '98.

[12]  Albert H. Rubenstein,et al.  Management Perceptions of Government Incentives to Technological Innovation in England, France, West Germany and Japan : Research Policy , 1988 .

[13]  S. J. Ho,et al.  Extracting the information: espionage with double crossing , 2008 .

[14]  Maximilien Kintz,et al.  Aggregating web-based ideation platforms , 2012 .

[15]  Markus K. Brunnermeier Information Leakage and Market Efficiency , 2005 .

[16]  William T. Warner International technology transfer and economic espionage , 1994 .

[17]  Hui Xiong,et al.  A semantic term weighting scheme for text categorization , 2011, Expert Syst. Appl..

[18]  James Fleck,et al.  Technology, the Technology Complex and the Paradox of Technological Determinism , 2001, Technol. Anal. Strateg. Manag..

[19]  Geert Wets,et al.  Customer-adapted coupon targeting using feature selection , 2004, Expert Syst. Appl..

[20]  Giri Sivanesan The human factor in espionage , 2011 .

[21]  Dirk Thorleuchter,et al.  Extraction of Ideas from Microsystems Technology , 2012, CSIE 2012.

[22]  Iraklis Oikonomou The European Defence Agency and EU military space policy: Whose space odyssey? , 2012 .

[23]  C. Jothi Venkateswaran,et al.  Fuzzy Temporal Clustering Approach for E-Commerce Websites , 2012 .

[24]  Dirk Thorleuchter,et al.  Technology classification with latent semantic indexing , 2013, Expert Syst. Appl..

[25]  Hsu-Hao Tsai,et al.  Global data mining: An empirical study of current trends, future forecasts and technology diffusions , 2012, Expert Syst. Appl..

[26]  So Young Sohn,et al.  Impact analysis for national R&D funding in science and technology using quantification method II , 2009 .

[27]  Cornelius Herstatt,et al.  Need assessment in practice: Methods, experiences and trends , 2002 .

[28]  Merrill E. Whitney,et al.  An Inquiry Into the Rationale for Economic Espionage , 1999 .

[29]  Andrew Beng Jin Teoh,et al.  An online AUC formulation for binary classification , 2012, Pattern Recognit..

[30]  A. Jaffe Technological Opportunity and Spillovers of R&D: Evidence from Firms&Apos; Patents, Profits and Market Value , 1986 .

[31]  Rossitza Setchi,et al.  User-oriented ontology-based clustering of stored memories , 2012, Expert Syst. Appl..

[32]  Youngjoong Ko,et al.  Text classification from unlabeled documents with bootstrapping and feature projection techniques , 2009, Inf. Process. Manag..

[33]  Hans Radder,et al.  Science, Technology and the Science-Technology Relationship , 2009 .

[34]  Dirk Thorleuchter,et al.  Improved multilevel security with latent semantic indexing , 2012, Expert Syst. Appl..

[35]  Dirk Thorleuchter,et al.  Vertrauliche Verarbeitung staatlich eingestufter Information – die Informationstechnologie im Geheimschutz , 2008, Informatik-Spektrum.

[36]  A. Matsui Information Leakage Forces Cooperation , 1989 .

[37]  P. K. Marhavilas,et al.  Risk analysis and assessment methodologies in the work sites: On a review, classification and comparative study of the scientific literature of the period 2000–2009 , 2011 .

[38]  P. Pattynama,et al.  Receiver operating characteristic (ROC) analysis: basic principles and applications in radiology. , 1998, European journal of radiology.

[39]  Leeat Yariv,et al.  Games with espionage , 2004, Games Econ. Behav..

[40]  Dirk Thorleuchter,et al.  Mining ideas from textual information , 2010, Expert Syst. Appl..

[41]  Dirk Thorleuchter,et al.  Using Webcrawling of Publicly Available Websites to Assess E-commerce Relationships , 2012, 2012 Annual SRII Global Conference.

[42]  Jae Kyeong Kim,et al.  A literature review and classification of recommender systems research , 2012, Expert Syst. Appl..

[43]  João Falcão e Cunha,et al.  Modeling partial customer churn: On the value of first product-category purchase sequences , 2012, Expert systems with applications.

[44]  Andrew Jones Industrial espionage in a hi-tech world , 2008 .

[45]  Dirk Thorleuchter,et al.  Predicting e-commerce company success by mining the text of its publicly-accessible website , 2012, Expert Syst. Appl..

[46]  Horst Geschka,et al.  Creativity Techniques in Product Planning and Development : A View from West Germany : R&D Management , 1983 .

[47]  James Kliebenstein,et al.  A Test for Complementarities Among Multiple Technologies that Avoids the Curse of Dimensionality , 2012 .

[48]  Dirk Van den Poel,et al.  Investigating purchasing-sequence patterns for financial services using Markov, MTD and MTDg models , 2006, Eur. J. Oper. Res..

[49]  Paul D. Allison,et al.  Logistic Regression Using the SAS System : Theory and Application , 1999 .

[50]  Dirk Thorleuchter,et al.  A compared R&D-based and patent-based cross impact analysis for identifying relationships between technologies , 2010 .

[51]  Dirk Thorleuchter,et al.  Predicting customer profitability during acquisition: Finding the optimal combination of data source and data mining technique , 2013, Expert Syst. Appl..

[52]  J. Sobel,et al.  STRATEGIC INFORMATION TRANSMISSION , 1982 .

[53]  James Allan,et al.  Automatic structuring and retrieval of large text files , 1994, CACM.

[54]  Olga Demidova,et al.  Risk assessment for improved treatment of health considerations in EIA , 2005 .

[55]  Geert Wets,et al.  Direct and indirect effects of retail promotions on sales and profits in the do-it-yourself market , 2003, Expert Syst. Appl..

[56]  Dirk Thorleuchter,et al.  Mining Innovative Ideas to Support New Product Research and Development , 2010 .

[57]  E. DeLong,et al.  Comparing the areas under two or more correlated receiver operating characteristic curves: a nonparametric approach. , 1988, Biometrics.

[58]  Dirk Thorleuchter,et al.  Semantic technology classification — A defence and security case study , 2011, 2011 International Conference on Uncertainty Reasoning and Knowledge Engineering.

[59]  Chung-Hong Lee,et al.  An information fusion approach to integrate image annotation and text mining methods for geographic knowledge discovery , 2012, Expert Syst. Appl..

[60]  T. Landauer,et al.  Indexing by Latent Semantic Analysis , 1990 .

[61]  Michael W. Berry,et al.  Mining consumer product data via latent semantic indexing , 1999, Intell. Data Anal..

[62]  Hong Ji,et al.  Quantitative risk assessment model of hazardous chemicals leakage and application , 2012 .

[63]  Selçuk Çebi,et al.  A fuzzy risk assessment model for hospital information system implementation , 2012, Expert Syst. Appl..

[64]  Dirk Thorleuchter,et al.  Granular Deleting in Multi Level Security Models – An Electronic Engineering Approach , 2012 .

[65]  C. F. Douds,et al.  Management perceptions of government incentives to technological innovation in england, Trance, West Germany and Japan , 1977 .

[66]  Yuh-Min Chen,et al.  Developing a semantic-enable information retrieval mechanism , 2010, Expert Syst. Appl..

[67]  Annapoornima M. Subramanian,et al.  An empirical examination of the science-technology relationship in the biotechnology industry , 2010 .

[68]  Xue Li,et al.  Unified collaborative filtering model based on combination of latent features , 2010, Expert Syst. Appl..

[69]  Arnold Reisman A taxonomic view of illegal transfer of technologies: A case study , 2006 .

[70]  Dirk Thorleuchter,et al.  Analyzing existing customers' websites to improve the customer acquisition process as well as the profitability prediction in B-to-B marketing , 2012, Expert Syst. Appl..

[71]  Dirk Thorleuchter,et al.  Mining Social Behavior Ideas of Przewalski Horses , 2011 .

[72]  Dirk Van den Poel,et al.  Predicting home-appliance acquisition sequences: Markov/Markov for Discrimination and survival analysis for modeling sequential information in NPTB models , 2007, Decis. Support Syst..

[73]  Dirk Thorleuchter,et al.  Companies website optimising concerning consumer's searching for new products , 2011, 2011 International Conference on Uncertainty Reasoning and Knowledge Engineering.

[74]  Willem A. Smit,et al.  Civilian-military co-operation strategies in developing new technologies , 2003 .

[75]  Gregoris Mentzas,et al.  Using latent topics to enhance search and recommendation in Enterprise Social Software , 2012, Expert Syst. Appl..

[76]  Paul Almeida,et al.  Knowledge sourcing by foreign multinationals: Patent citation analysis in the U.S. semiconductor industry , 1996 .

[77]  Dirk Thorleuchter,et al.  Using NMF for Analyzing War Logs , 2012, Future Security.

[78]  Dirk Thorleuchter,et al.  High granular multi-level-security model for improved usability , 2011, 2011 International Conference on System science, Engineering design and Manufacturing informatization.

[79]  Andrew Crane,et al.  In the Company of Spies: When Competitive Intelligence Gathering Becomes Industrial Espionage , 2005 .

[80]  Dirk Thorleuchter,et al.  Improved Emergency Management by a Loosely Coupled Logistic System , 2012, Future Security.

[81]  J. Hanley,et al.  The meaning and use of the area under a receiver operating characteristic (ROC) curve. , 1982, Radiology.