SlideShare uma empresa Scribd logo
1 de 28
Taiwan’s Information Security Policy Enhancement: An Analysis of Patent Indicators and Patent Document     ICCMSE 2007@Corfu, Greece   Nai-Wen Hsu ; Jr-Shiuan Liang; Yi-Chang Chen  [email_address] ;  [email_address] ;  [email_address]
[email_address] Provide the strategies for Taiwan’s government in drawing up science and technology policies.
Outline ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
The Method of Policy Formulation in Taiwan ,[object Object],[object Object],[object Object]
What Is the Problem? ,[object Object],[object Object],Gap :  What?  When?  Who?  ,[object Object]
Our Approach ,[object Object],[object Object],[object Object],[object Object]
Why Patents? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
USPTO ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Work Flow
USPTO UPC/726 to Taiwan’s IS Categorizations  Ref: RDEC, 2005. Information Security Regulation Development Blueprint (Draft)  117 11, 12, 13  Firewall FW 232 14, 15  Virtual Private Network VPN 365 22, 23  Intrusion Prevention Systems IPS 299 22, 25  Vulnerability Management VM 354 22, 24  Malware Prevention MP 752 21, 26, 27, 28, 29, 30  ,[object Object],[object Object],AC 1461 02, 03, 04, 05, 06, 07, 08, 09, 10, 21  ,[object Object],[object Object],NA 783 02, 16, 17, 18, 19, 20, 21  ,[object Object],[object Object],SA Quant.  UPC/726 IS categorizations in Taiwan Abbrev.
Step 1:  Patent Indicators Analysis
Selected Countries US CA GB FR IL DE FI TW JP IE
Patent Indicators ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Ref: Narin F. and Hamilton K. S., 1996. Bibliometric performance measures
Results of Step 1 Fig. 1 Patent issued by year Fig. 2 CII of category by country in 2004, 2005, 2006 Fig. 4 SLI of category by country Fig. 3 TCT of category by country
Fig. 1 Patent issued by year
Results of Step 1 Fig. 1 Patent issued by year Fig. 2 CII of category by country in 2004, 2005, 2006 Fig. 4 SLI of category by country Fig. 3 TCT of category by country
Step 2:   Patent Document Analysis
Linguistic Preprocessing ,[object Object],[object Object],Ref: WordNet 3.0 Reference Manual, 2006  Feldman R. et al, 1998. Text Mining at the Term Level
Candidate Phrase Generation ,[object Object],Ref: NooJ manual, 2006
Association Rules Analysis ,[object Object],[object Object],[object Object],[object Object],Ref: Lent B., Agrawal R., and Srikant R.,1997. Discovering Trends in Text Databases
Example ,[object Object]
Linguistic Preprocessing ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Candidate Phrase Generation 1 interrogation engines 1 intrusion detection 1 virus detection 1 spam detection 1 policy violation  1 violation detection Frequency Phrases
Association Rules Analysis ,[object Object],[object Object],[object Object],2 2004 1 2003 0 1999 0 2000 1 2001 1 2002 2 2005 3 2006 Frequency Year
Results of Step 2
Potential Strategies ,[object Object],[object Object],[object Object],Long-Term:  To solve the fundamental problem ,[object Object],[object Object],[object Object],[object Object],[object Object],Middle-Term: To implement the defense-in-depth strategy ,[object Object],[object Object],[object Object],[object Object],[object Object],Short-Term:  To fit the trend
Conclusion  ,[object Object],[object Object]
Thank you for your attention.

Mais conteúdo relacionado

Semelhante a Taiwan’s Information Security Policy Enhancement: An Analysis of Patent Indicators and Patent Document

Software Security in the Real World
Software Security in the Real WorldSoftware Security in the Real World
Software Security in the Real WorldMark Curphey
 
Caveon Webinar Series: Lessons Learned from EATP and CSDPTF November 2013
Caveon Webinar Series:  Lessons Learned  from EATP and CSDPTF November 2013Caveon Webinar Series:  Lessons Learned  from EATP and CSDPTF November 2013
Caveon Webinar Series: Lessons Learned from EATP and CSDPTF November 2013Caveon Test Security
 
Conrad PDES Spring 2006
Conrad PDES Spring 2006Conrad PDES Spring 2006
Conrad PDES Spring 2006Mark Conrad
 
Information Security Assessment Offering
Information Security Assessment OfferingInformation Security Assessment Offering
Information Security Assessment Offeringeeaches
 
IRJET - Lightweight ECC based RFID Authentication Protocol
IRJET - Lightweight ECC based RFID Authentication ProtocolIRJET - Lightweight ECC based RFID Authentication Protocol
IRJET - Lightweight ECC based RFID Authentication ProtocolIRJET Journal
 
Life After Compliance march 2010 v2
Life After Compliance march 2010 v2Life After Compliance march 2010 v2
Life After Compliance march 2010 v2SafeNet
 
DevOps for Highly Regulated Environments
DevOps for Highly Regulated EnvironmentsDevOps for Highly Regulated Environments
DevOps for Highly Regulated EnvironmentsDevOps.com
 
Table of Content - International Journal of Managing Information Technology (...
Table of Content - International Journal of Managing Information Technology (...Table of Content - International Journal of Managing Information Technology (...
Table of Content - International Journal of Managing Information Technology (...IJMIT JOURNAL
 
HYBRIDIZED MODEL FOR DATA SECURITY BASED ON SECURITY HASH ANALYSIS (SHA 512) ...
HYBRIDIZED MODEL FOR DATA SECURITY BASED ON SECURITY HASH ANALYSIS (SHA 512) ...HYBRIDIZED MODEL FOR DATA SECURITY BASED ON SECURITY HASH ANALYSIS (SHA 512) ...
HYBRIDIZED MODEL FOR DATA SECURITY BASED ON SECURITY HASH ANALYSIS (SHA 512) ...IJNSA Journal
 
TSSG Security research unit May11_zdooly
TSSG Security research unit May11_zdoolyTSSG Security research unit May11_zdooly
TSSG Security research unit May11_zdoolyzdooly
 
EXPLORING CRITICAL VULNERABILITIES IN SIEM IMPLEMENTATION AND SOC SERVICE PRO...
EXPLORING CRITICAL VULNERABILITIES IN SIEM IMPLEMENTATION AND SOC SERVICE PRO...EXPLORING CRITICAL VULNERABILITIES IN SIEM IMPLEMENTATION AND SOC SERVICE PRO...
EXPLORING CRITICAL VULNERABILITIES IN SIEM IMPLEMENTATION AND SOC SERVICE PRO...IJNSA Journal
 
六合彩香港-六合彩
六合彩香港-六合彩六合彩香港-六合彩
六合彩香港-六合彩baoyin
 
2008: Web Application Security Tutorial
2008: Web Application Security Tutorial2008: Web Application Security Tutorial
2008: Web Application Security TutorialNeil Matatall
 
USE OF NETWORK FORENSIC MECHANISMS TO FORMULATE NETWORK SECURITY
USE OF NETWORK FORENSIC MECHANISMS TO FORMULATE NETWORK SECURITYUSE OF NETWORK FORENSIC MECHANISMS TO FORMULATE NETWORK SECURITY
USE OF NETWORK FORENSIC MECHANISMS TO FORMULATE NETWORK SECURITYIJMIT JOURNAL
 
Use of network forensic mechanisms to formulate network security
Use of network forensic mechanisms to formulate network securityUse of network forensic mechanisms to formulate network security
Use of network forensic mechanisms to formulate network securityIJMIT JOURNAL
 
DNA Synthesis Technologies and Services Market, 2022-2035.pptx
DNA Synthesis Technologies and Services Market, 2022-2035.pptxDNA Synthesis Technologies and Services Market, 2022-2035.pptx
DNA Synthesis Technologies and Services Market, 2022-2035.pptxApurvaPhulari1
 
What Every Organization Should Log And Monitor
What Every Organization Should Log And MonitorWhat Every Organization Should Log And Monitor
What Every Organization Should Log And MonitorAnton Chuvakin
 
Lessons Learned from Implementing the Cybersecurity Capacity Maturity Model f...
Lessons Learned from Implementing the Cybersecurity Capacity Maturity Model f...Lessons Learned from Implementing the Cybersecurity Capacity Maturity Model f...
Lessons Learned from Implementing the Cybersecurity Capacity Maturity Model f...Carolin Weisser
 
Big Data: Privacy and Security Aspects
Big Data: Privacy and Security AspectsBig Data: Privacy and Security Aspects
Big Data: Privacy and Security AspectsIRJET Journal
 

Semelhante a Taiwan’s Information Security Policy Enhancement: An Analysis of Patent Indicators and Patent Document (20)

Software Security in the Real World
Software Security in the Real WorldSoftware Security in the Real World
Software Security in the Real World
 
Caveon Webinar Series: Lessons Learned from EATP and CSDPTF November 2013
Caveon Webinar Series:  Lessons Learned  from EATP and CSDPTF November 2013Caveon Webinar Series:  Lessons Learned  from EATP and CSDPTF November 2013
Caveon Webinar Series: Lessons Learned from EATP and CSDPTF November 2013
 
Conrad PDES Spring 2006
Conrad PDES Spring 2006Conrad PDES Spring 2006
Conrad PDES Spring 2006
 
Information Security Assessment Offering
Information Security Assessment OfferingInformation Security Assessment Offering
Information Security Assessment Offering
 
IRJET - Lightweight ECC based RFID Authentication Protocol
IRJET - Lightweight ECC based RFID Authentication ProtocolIRJET - Lightweight ECC based RFID Authentication Protocol
IRJET - Lightweight ECC based RFID Authentication Protocol
 
Life After Compliance march 2010 v2
Life After Compliance march 2010 v2Life After Compliance march 2010 v2
Life After Compliance march 2010 v2
 
DevOps for Highly Regulated Environments
DevOps for Highly Regulated EnvironmentsDevOps for Highly Regulated Environments
DevOps for Highly Regulated Environments
 
Table of Content - International Journal of Managing Information Technology (...
Table of Content - International Journal of Managing Information Technology (...Table of Content - International Journal of Managing Information Technology (...
Table of Content - International Journal of Managing Information Technology (...
 
HYBRIDIZED MODEL FOR DATA SECURITY BASED ON SECURITY HASH ANALYSIS (SHA 512) ...
HYBRIDIZED MODEL FOR DATA SECURITY BASED ON SECURITY HASH ANALYSIS (SHA 512) ...HYBRIDIZED MODEL FOR DATA SECURITY BASED ON SECURITY HASH ANALYSIS (SHA 512) ...
HYBRIDIZED MODEL FOR DATA SECURITY BASED ON SECURITY HASH ANALYSIS (SHA 512) ...
 
TSSG Security research unit May11_zdooly
TSSG Security research unit May11_zdoolyTSSG Security research unit May11_zdooly
TSSG Security research unit May11_zdooly
 
EXPLORING CRITICAL VULNERABILITIES IN SIEM IMPLEMENTATION AND SOC SERVICE PRO...
EXPLORING CRITICAL VULNERABILITIES IN SIEM IMPLEMENTATION AND SOC SERVICE PRO...EXPLORING CRITICAL VULNERABILITIES IN SIEM IMPLEMENTATION AND SOC SERVICE PRO...
EXPLORING CRITICAL VULNERABILITIES IN SIEM IMPLEMENTATION AND SOC SERVICE PRO...
 
六合彩香港-六合彩
六合彩香港-六合彩六合彩香港-六合彩
六合彩香港-六合彩
 
2008: Web Application Security Tutorial
2008: Web Application Security Tutorial2008: Web Application Security Tutorial
2008: Web Application Security Tutorial
 
USE OF NETWORK FORENSIC MECHANISMS TO FORMULATE NETWORK SECURITY
USE OF NETWORK FORENSIC MECHANISMS TO FORMULATE NETWORK SECURITYUSE OF NETWORK FORENSIC MECHANISMS TO FORMULATE NETWORK SECURITY
USE OF NETWORK FORENSIC MECHANISMS TO FORMULATE NETWORK SECURITY
 
Use of network forensic mechanisms to formulate network security
Use of network forensic mechanisms to formulate network securityUse of network forensic mechanisms to formulate network security
Use of network forensic mechanisms to formulate network security
 
DNA Synthesis Technologies and Services Market, 2022-2035.pptx
DNA Synthesis Technologies and Services Market, 2022-2035.pptxDNA Synthesis Technologies and Services Market, 2022-2035.pptx
DNA Synthesis Technologies and Services Market, 2022-2035.pptx
 
What Every Organization Should Log And Monitor
What Every Organization Should Log And MonitorWhat Every Organization Should Log And Monitor
What Every Organization Should Log And Monitor
 
NTAP & LSC Tech Survey Highlights
NTAP & LSC Tech Survey HighlightsNTAP & LSC Tech Survey Highlights
NTAP & LSC Tech Survey Highlights
 
Lessons Learned from Implementing the Cybersecurity Capacity Maturity Model f...
Lessons Learned from Implementing the Cybersecurity Capacity Maturity Model f...Lessons Learned from Implementing the Cybersecurity Capacity Maturity Model f...
Lessons Learned from Implementing the Cybersecurity Capacity Maturity Model f...
 
Big Data: Privacy and Security Aspects
Big Data: Privacy and Security AspectsBig Data: Privacy and Security Aspects
Big Data: Privacy and Security Aspects
 

Último

Unveiling the Soundscape Music for Psychedelic Experiences
Unveiling the Soundscape Music for Psychedelic ExperiencesUnveiling the Soundscape Music for Psychedelic Experiences
Unveiling the Soundscape Music for Psychedelic ExperiencesDoe Paoro
 
Horngren’s Financial & Managerial Accounting, 7th edition by Miller-Nobles so...
Horngren’s Financial & Managerial Accounting, 7th edition by Miller-Nobles so...Horngren’s Financial & Managerial Accounting, 7th edition by Miller-Nobles so...
Horngren’s Financial & Managerial Accounting, 7th edition by Miller-Nobles so...ssuserf63bd7
 
Entrepreneurship lessons in Philippines
Entrepreneurship lessons in  PhilippinesEntrepreneurship lessons in  Philippines
Entrepreneurship lessons in PhilippinesDavidSamuel525586
 
Guide Complete Set of Residential Architectural Drawings PDF
Guide Complete Set of Residential Architectural Drawings PDFGuide Complete Set of Residential Architectural Drawings PDF
Guide Complete Set of Residential Architectural Drawings PDFChandresh Chudasama
 
20200128 Ethical by Design - Whitepaper.pdf
20200128 Ethical by Design - Whitepaper.pdf20200128 Ethical by Design - Whitepaper.pdf
20200128 Ethical by Design - Whitepaper.pdfChris Skinner
 
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptx
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptxThe-Ethical-issues-ghhhhhhhhjof-Byjus.pptx
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptxmbikashkanyari
 
Church Building Grants To Assist With New Construction, Additions, And Restor...
Church Building Grants To Assist With New Construction, Additions, And Restor...Church Building Grants To Assist With New Construction, Additions, And Restor...
Church Building Grants To Assist With New Construction, Additions, And Restor...Americas Got Grants
 
Healthcare Feb. & Mar. Healthcare Newsletter
Healthcare Feb. & Mar. Healthcare NewsletterHealthcare Feb. & Mar. Healthcare Newsletter
Healthcare Feb. & Mar. Healthcare NewsletterJamesConcepcion7
 
WSMM Media and Entertainment Feb_March_Final.pdf
WSMM Media and Entertainment Feb_March_Final.pdfWSMM Media and Entertainment Feb_March_Final.pdf
WSMM Media and Entertainment Feb_March_Final.pdfJamesConcepcion7
 
NAB Show Exhibitor List 2024 - Exhibitors Data
NAB Show Exhibitor List 2024 - Exhibitors DataNAB Show Exhibitor List 2024 - Exhibitors Data
NAB Show Exhibitor List 2024 - Exhibitors DataExhibitors Data
 
PSCC - Capability Statement Presentation
PSCC - Capability Statement PresentationPSCC - Capability Statement Presentation
PSCC - Capability Statement PresentationAnamaria Contreras
 
20220816-EthicsGrade_Scorecard-JP_Morgan_Chase-Q2-63_57.pdf
20220816-EthicsGrade_Scorecard-JP_Morgan_Chase-Q2-63_57.pdf20220816-EthicsGrade_Scorecard-JP_Morgan_Chase-Q2-63_57.pdf
20220816-EthicsGrade_Scorecard-JP_Morgan_Chase-Q2-63_57.pdfChris Skinner
 
Cybersecurity Awareness Training Presentation v2024.03
Cybersecurity Awareness Training Presentation v2024.03Cybersecurity Awareness Training Presentation v2024.03
Cybersecurity Awareness Training Presentation v2024.03DallasHaselhorst
 
GUIDELINES ON USEFUL FORMS IN FREIGHT FORWARDING (F) Danny Diep Toh MBA.pdf
GUIDELINES ON USEFUL FORMS IN FREIGHT FORWARDING (F) Danny Diep Toh MBA.pdfGUIDELINES ON USEFUL FORMS IN FREIGHT FORWARDING (F) Danny Diep Toh MBA.pdf
GUIDELINES ON USEFUL FORMS IN FREIGHT FORWARDING (F) Danny Diep Toh MBA.pdfDanny Diep To
 
1911 Gold Corporate Presentation Apr 2024.pdf
1911 Gold Corporate Presentation Apr 2024.pdf1911 Gold Corporate Presentation Apr 2024.pdf
1911 Gold Corporate Presentation Apr 2024.pdfShaun Heinrichs
 
Cyber Security Training in Office Environment
Cyber Security Training in Office EnvironmentCyber Security Training in Office Environment
Cyber Security Training in Office Environmentelijahj01012
 
Memorándum de Entendimiento (MoU) entre Codelco y SQM
Memorándum de Entendimiento (MoU) entre Codelco y SQMMemorándum de Entendimiento (MoU) entre Codelco y SQM
Memorándum de Entendimiento (MoU) entre Codelco y SQMVoces Mineras
 
How Generative AI Is Transforming Your Business | Byond Growth Insights | Apr...
How Generative AI Is Transforming Your Business | Byond Growth Insights | Apr...How Generative AI Is Transforming Your Business | Byond Growth Insights | Apr...
How Generative AI Is Transforming Your Business | Byond Growth Insights | Apr...Hector Del Castillo, CPM, CPMM
 
Appkodes Tinder Clone Script with Customisable Solutions.pptx
Appkodes Tinder Clone Script with Customisable Solutions.pptxAppkodes Tinder Clone Script with Customisable Solutions.pptx
Appkodes Tinder Clone Script with Customisable Solutions.pptxappkodes
 
1911 Gold Corporate Presentation Apr 2024.pdf
1911 Gold Corporate Presentation Apr 2024.pdf1911 Gold Corporate Presentation Apr 2024.pdf
1911 Gold Corporate Presentation Apr 2024.pdfShaun Heinrichs
 

Último (20)

Unveiling the Soundscape Music for Psychedelic Experiences
Unveiling the Soundscape Music for Psychedelic ExperiencesUnveiling the Soundscape Music for Psychedelic Experiences
Unveiling the Soundscape Music for Psychedelic Experiences
 
Horngren’s Financial & Managerial Accounting, 7th edition by Miller-Nobles so...
Horngren’s Financial & Managerial Accounting, 7th edition by Miller-Nobles so...Horngren’s Financial & Managerial Accounting, 7th edition by Miller-Nobles so...
Horngren’s Financial & Managerial Accounting, 7th edition by Miller-Nobles so...
 
Entrepreneurship lessons in Philippines
Entrepreneurship lessons in  PhilippinesEntrepreneurship lessons in  Philippines
Entrepreneurship lessons in Philippines
 
Guide Complete Set of Residential Architectural Drawings PDF
Guide Complete Set of Residential Architectural Drawings PDFGuide Complete Set of Residential Architectural Drawings PDF
Guide Complete Set of Residential Architectural Drawings PDF
 
20200128 Ethical by Design - Whitepaper.pdf
20200128 Ethical by Design - Whitepaper.pdf20200128 Ethical by Design - Whitepaper.pdf
20200128 Ethical by Design - Whitepaper.pdf
 
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptx
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptxThe-Ethical-issues-ghhhhhhhhjof-Byjus.pptx
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptx
 
Church Building Grants To Assist With New Construction, Additions, And Restor...
Church Building Grants To Assist With New Construction, Additions, And Restor...Church Building Grants To Assist With New Construction, Additions, And Restor...
Church Building Grants To Assist With New Construction, Additions, And Restor...
 
Healthcare Feb. & Mar. Healthcare Newsletter
Healthcare Feb. & Mar. Healthcare NewsletterHealthcare Feb. & Mar. Healthcare Newsletter
Healthcare Feb. & Mar. Healthcare Newsletter
 
WSMM Media and Entertainment Feb_March_Final.pdf
WSMM Media and Entertainment Feb_March_Final.pdfWSMM Media and Entertainment Feb_March_Final.pdf
WSMM Media and Entertainment Feb_March_Final.pdf
 
NAB Show Exhibitor List 2024 - Exhibitors Data
NAB Show Exhibitor List 2024 - Exhibitors DataNAB Show Exhibitor List 2024 - Exhibitors Data
NAB Show Exhibitor List 2024 - Exhibitors Data
 
PSCC - Capability Statement Presentation
PSCC - Capability Statement PresentationPSCC - Capability Statement Presentation
PSCC - Capability Statement Presentation
 
20220816-EthicsGrade_Scorecard-JP_Morgan_Chase-Q2-63_57.pdf
20220816-EthicsGrade_Scorecard-JP_Morgan_Chase-Q2-63_57.pdf20220816-EthicsGrade_Scorecard-JP_Morgan_Chase-Q2-63_57.pdf
20220816-EthicsGrade_Scorecard-JP_Morgan_Chase-Q2-63_57.pdf
 
Cybersecurity Awareness Training Presentation v2024.03
Cybersecurity Awareness Training Presentation v2024.03Cybersecurity Awareness Training Presentation v2024.03
Cybersecurity Awareness Training Presentation v2024.03
 
GUIDELINES ON USEFUL FORMS IN FREIGHT FORWARDING (F) Danny Diep Toh MBA.pdf
GUIDELINES ON USEFUL FORMS IN FREIGHT FORWARDING (F) Danny Diep Toh MBA.pdfGUIDELINES ON USEFUL FORMS IN FREIGHT FORWARDING (F) Danny Diep Toh MBA.pdf
GUIDELINES ON USEFUL FORMS IN FREIGHT FORWARDING (F) Danny Diep Toh MBA.pdf
 
1911 Gold Corporate Presentation Apr 2024.pdf
1911 Gold Corporate Presentation Apr 2024.pdf1911 Gold Corporate Presentation Apr 2024.pdf
1911 Gold Corporate Presentation Apr 2024.pdf
 
Cyber Security Training in Office Environment
Cyber Security Training in Office EnvironmentCyber Security Training in Office Environment
Cyber Security Training in Office Environment
 
Memorándum de Entendimiento (MoU) entre Codelco y SQM
Memorándum de Entendimiento (MoU) entre Codelco y SQMMemorándum de Entendimiento (MoU) entre Codelco y SQM
Memorándum de Entendimiento (MoU) entre Codelco y SQM
 
How Generative AI Is Transforming Your Business | Byond Growth Insights | Apr...
How Generative AI Is Transforming Your Business | Byond Growth Insights | Apr...How Generative AI Is Transforming Your Business | Byond Growth Insights | Apr...
How Generative AI Is Transforming Your Business | Byond Growth Insights | Apr...
 
Appkodes Tinder Clone Script with Customisable Solutions.pptx
Appkodes Tinder Clone Script with Customisable Solutions.pptxAppkodes Tinder Clone Script with Customisable Solutions.pptx
Appkodes Tinder Clone Script with Customisable Solutions.pptx
 
1911 Gold Corporate Presentation Apr 2024.pdf
1911 Gold Corporate Presentation Apr 2024.pdf1911 Gold Corporate Presentation Apr 2024.pdf
1911 Gold Corporate Presentation Apr 2024.pdf
 

Taiwan’s Information Security Policy Enhancement: An Analysis of Patent Indicators and Patent Document

  • 1. Taiwan’s Information Security Policy Enhancement: An Analysis of Patent Indicators and Patent Document ICCMSE 2007@Corfu, Greece Nai-Wen Hsu ; Jr-Shiuan Liang; Yi-Chang Chen [email_address] ; [email_address] ; [email_address]
  • 2. [email_address] Provide the strategies for Taiwan’s government in drawing up science and technology policies.
  • 3.
  • 4.
  • 5.
  • 6.
  • 7.
  • 8.
  • 10.
  • 11. Step 1: Patent Indicators Analysis
  • 12. Selected Countries US CA GB FR IL DE FI TW JP IE
  • 13.
  • 14. Results of Step 1 Fig. 1 Patent issued by year Fig. 2 CII of category by country in 2004, 2005, 2006 Fig. 4 SLI of category by country Fig. 3 TCT of category by country
  • 15. Fig. 1 Patent issued by year
  • 16. Results of Step 1 Fig. 1 Patent issued by year Fig. 2 CII of category by country in 2004, 2005, 2006 Fig. 4 SLI of category by country Fig. 3 TCT of category by country
  • 17. Step 2: Patent Document Analysis
  • 18.
  • 19.
  • 20.
  • 21.
  • 22.
  • 23. Candidate Phrase Generation 1 interrogation engines 1 intrusion detection 1 virus detection 1 spam detection 1 policy violation 1 violation detection Frequency Phrases
  • 24.
  • 26.
  • 27.
  • 28. Thank you for your attention.