Your SlideShare is downloading. ×
Taiwan’s Information Security Policy Enhancement: An Analysis of Patent Indicators and Patent Document
Taiwan’s Information Security Policy Enhancement: An Analysis of Patent Indicators and Patent Document
Taiwan’s Information Security Policy Enhancement: An Analysis of Patent Indicators and Patent Document
Taiwan’s Information Security Policy Enhancement: An Analysis of Patent Indicators and Patent Document
Taiwan’s Information Security Policy Enhancement: An Analysis of Patent Indicators and Patent Document
Taiwan’s Information Security Policy Enhancement: An Analysis of Patent Indicators and Patent Document
Taiwan’s Information Security Policy Enhancement: An Analysis of Patent Indicators and Patent Document
Taiwan’s Information Security Policy Enhancement: An Analysis of Patent Indicators and Patent Document
Taiwan’s Information Security Policy Enhancement: An Analysis of Patent Indicators and Patent Document
Taiwan’s Information Security Policy Enhancement: An Analysis of Patent Indicators and Patent Document
Taiwan’s Information Security Policy Enhancement: An Analysis of Patent Indicators and Patent Document
Taiwan’s Information Security Policy Enhancement: An Analysis of Patent Indicators and Patent Document
Taiwan’s Information Security Policy Enhancement: An Analysis of Patent Indicators and Patent Document
Taiwan’s Information Security Policy Enhancement: An Analysis of Patent Indicators and Patent Document
Taiwan’s Information Security Policy Enhancement: An Analysis of Patent Indicators and Patent Document
Taiwan’s Information Security Policy Enhancement: An Analysis of Patent Indicators and Patent Document
Taiwan’s Information Security Policy Enhancement: An Analysis of Patent Indicators and Patent Document
Taiwan’s Information Security Policy Enhancement: An Analysis of Patent Indicators and Patent Document
Taiwan’s Information Security Policy Enhancement: An Analysis of Patent Indicators and Patent Document
Taiwan’s Information Security Policy Enhancement: An Analysis of Patent Indicators and Patent Document
Taiwan’s Information Security Policy Enhancement: An Analysis of Patent Indicators and Patent Document
Taiwan’s Information Security Policy Enhancement: An Analysis of Patent Indicators and Patent Document
Taiwan’s Information Security Policy Enhancement: An Analysis of Patent Indicators and Patent Document
Taiwan’s Information Security Policy Enhancement: An Analysis of Patent Indicators and Patent Document
Taiwan’s Information Security Policy Enhancement: An Analysis of Patent Indicators and Patent Document
Taiwan’s Information Security Policy Enhancement: An Analysis of Patent Indicators and Patent Document
Taiwan’s Information Security Policy Enhancement: An Analysis of Patent Indicators and Patent Document
Taiwan’s Information Security Policy Enhancement: An Analysis of Patent Indicators and Patent Document
Upcoming SlideShare
Loading in...5
×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

×
Saving this for later? Get the SlideShare app to save on your phone or tablet. Read anywhere, anytime – even offline.
Text the download link to your phone
Standard text messaging rates apply

Taiwan’s Information Security Policy Enhancement: An Analysis of Patent Indicators and Patent Document

902

Published on

Published in: Business, Technology
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
902
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
37
Comments
0
Likes
0
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
No notes for slide

Transcript

  • 1. Taiwan’s Information Security Policy Enhancement: An Analysis of Patent Indicators and Patent Document ICCMSE 2007@Corfu, Greece Nai-Wen Hsu ; Jr-Shiuan Liang; Yi-Chang Chen [email_address] ; [email_address] ; [email_address]
  • 2. [email_address] Provide the strategies for Taiwan’s government in drawing up science and technology policies.
  • 3. Outline
    • Introduction
    • Why patents?
    • Methods
      • Patent indicator analysis
      • Patent documents analysis
    • Results
    • Potential strategies
    • Conclusions
  • 4. The Method of Policy Formulation in Taiwan
    • Delphi
    • Focus groups
    • Discussion forums
  • 5. What Is the Problem?
    • One of information security policy goal in Taiwan :
      • Consolidation of national information & communication security
    Gap : What? When? Who?
      • Action plan...
  • 6. Our Approach
    • Patent indicators analysis
      • Provide comprehensive point of view
    • Patent document analysis
      • Discover the specific trend
  • 7. Why Patents?
    • Patent statistics is used to be economic indicators
      • Griliches Z., 1990. Patent Statistics as Economic Indicators: A Survey
    • To identify advanced technological areas and leading country (who)
      • Karki M. M. S., and Road K. S. K., 1997. Patent Citation Analysis: A Policy Analysis Tool
      • H. Ernst, 2003, Patent Information for Strategic Technology Management
    • Discover the trend by analyzing patent document (what)
      • Lent B., Agrawal R., and Srikant R.,1997. Discovering Trends in Text Databases
      • Sheremetyeva S., 2003, Natural Language Analysis of Patent Claims
  • 8. USPTO
    • United States Patent and Trademark Office
      • 6 million entries,
      • 70 countries,
      • open access database,
      • well-structured classification,
      • fixed format
  • 9. Work Flow
  • 10. USPTO UPC/726 to Taiwan’s IS Categorizations Ref: RDEC, 2005. Information Security Regulation Development Blueprint (Draft) 117 11, 12, 13 Firewall FW 232 14, 15 Virtual Private Network VPN 365 22, 23 Intrusion Prevention Systems IPS 299 22, 25 Vulnerability Management VM 354 22, 24 Malware Prevention MP 752 21, 26, 27, 28, 29, 30
    • Electronic Authentication Security
    • Access Control Method
    AC 1461 02, 03, 04, 05, 06, 07, 08, 09, 10, 21
    • Electronic Authentication Security
    • Network Access Control
    NA 783 02, 16, 17, 18, 19, 20, 21
    • Electronic Authentication Security
    • System Access Control
    SA Quant. UPC/726 IS categorizations in Taiwan Abbrev.
  • 11. Step 1: Patent Indicators Analysis
  • 12. Selected Countries US CA GB FR IL DE FI TW JP IE
  • 13. Patent Indicators
    • Number of Patent
    • Current Impact Index, CII
      • Number of citation -> Imply the capability of technology
    • Technology Cycle Time, TCT
      • Average year cited -> Measure the speed of innovation
    • Science Linkage Index, SLI
      • Comparison of scientific research to patent -> Evaluate the utilization of scientific research
    Ref: Narin F. and Hamilton K. S., 1996. Bibliometric performance measures
  • 14. Results of Step 1 Fig. 1 Patent issued by year Fig. 2 CII of category by country in 2004, 2005, 2006 Fig. 4 SLI of category by country Fig. 3 TCT of category by country
  • 15. Fig. 1 Patent issued by year
  • 16. Results of Step 1 Fig. 1 Patent issued by year Fig. 2 CII of category by country in 2004, 2005, 2006 Fig. 4 SLI of category by country Fig. 3 TCT of category by country
  • 17. Step 2: Patent Document Analysis
  • 18. Linguistic Preprocessing
    • Separate every patent into tokens
    • Noun, Verb, Adjective, or Adverb is already pre-defined in the WordNet dictionary file
    Ref: WordNet 3.0 Reference Manual, 2006 Feldman R. et al, 1998. Text Mining at the Term Level
  • 19. Candidate Phrase Generation
    • “ Noun Noun” or “Adjective Noun” are chosen as candidate phrase
    Ref: NooJ manual, 2006
  • 20. Association Rules Analysis
    • Find the association rules in sentences
      • phrase X -> phrase Y , support=10%, confidence=1%
    • Discover the trend by time period
      • upward, fair, downward
    Ref: Lent B., Agrawal R., and Srikant R.,1997. Discovering Trends in Text Databases
  • 21. Example
    • The system of claim 1, wherein each of the plurality of interrogation engines comprises intrusion detection, virus detection, spam detection or policy violation detection.
  • 22. Linguistic Preprocessing
    • Noun
      • system, claim, plurality, interrogation, engines, intrusion, detection, virus, detection, spam, detection, policy, violation, detection
    • Verb
      • comprises
    • Adjective
      • each
  • 23. Candidate Phrase Generation 1 interrogation engines 1 intrusion detection 1 virus detection 1 spam detection 1 policy violation 1 violation detection Frequency Phrases
  • 24. Association Rules Analysis
    • Association Rules
      • virus detection -> spam detection
    • Trend: upward
    2 2004 1 2003 0 1999 0 2000 1 2001 1 2002 2 2005 3 2006 Frequency Year
  • 25. Results of Step 2
  • 26. Potential Strategies
    • Taiwan promotes in e-readiness but lacks in systems/programs security:
      • Requires secure programming technique, correct and unified programming trait
      • Requires assessment scan on application systems codes
    Long-Term: To solve the fundamental problem
    • MP and IPS / MP and VM are similar:
      • Taiwan should integrate with others from Malware Prevention
    • Cover the insufficiency of Taiwan:
      • Israel and United States are the top priority cooperation partners
      • Israel performs well in Instruction Prevention System and Vulnerability Management
    Middle-Term: To implement the defense-in-depth strategy
    • Information security trend:
      • From network access layer security to application layer security
    • In Malware Prevention:
      • Prevent executable instructions attack from web browser
      • Prevent virus detection prevent the virus from spam or handheld computer
    Short-Term: To fit the trend
  • 27. Conclusion
    • Potential strategies could be proposed via our approach
    • Some better mining algorithms may be adopted in the future
  • 28. Thank you for your attention.

×