Measuring security development in information technologies: A scientometric framework using arXiv e-prints

被引:2
作者
David, Dimitri Percia [1 ,2 ,5 ]
Marechal, Loic [2 ,4 ]
Lacube, William [2 ]
Gillard, Sebastien [1 ,3 ]
Tsesmelis, Michael [2 ]
Maillart, Thomas [1 ]
Mermoud, Alain [2 ]
机构
[1] Univ Geneva, Informat Sci Inst, Geneva Sch Econ & Management, 40 Blvd Pont Arve, CH-1211 Geneva, Switzerland
[2] Armasuisse Sci & Technol, Cyber Def Campus, Feuerwerkstr 39, CH-3602 Thun, Switzerland
[3] Swiss Fed Inst Technol, Mil Acad, Chair Def Econ, CH-8903 Birmensdorf, Switzerland
[4] Univ Lausanne, Dept Informat Syst, HEC Lausanne, UNIL Chamberonne, Internef Bldg, CH-1015 Lausanne, Switzerland
[5] Univ Appl Sci Western Switzerland HES SO Valais Wa, Inst Entrepreneurship & Management, Techno Pole 1, CH-3960 Le Foyer, Sierre, Switzerland
关键词
Technology mining; Technology management; Security economics; Time-series econometrics; Natural language processing; Opinion mining; SCIENCE-AND-TECHNOLOGY; FORECASTING TECHNOLOGY; SENTIMENT ANALYSIS; NETWORK ANALYSIS; CROSS-SECTION; OPINION; PATENTS; TRENDS; POLICY; RISK;
D O I
10.1016/j.techfore.2023.122316
中图分类号
F [经济];
学科分类号
02 ;
摘要
We study security-development patterns in computer-science technologies through (i) the security attention among technologies, (ii) the relation between technological change and security development, and (iii) the effect of opinion on security development. We perform a scientometric analysis on arXiv e-prints (n = 340, 569) related to 20 computer-science technology categories. Our contribution is threefold. First, we characterize both processes of technological change and security development: while most technologies follow a logistic-growth process, the security development follows an AR(1) process or a random walk with positive drift. Moreover, over the lifetime of computer-science technologies, the security development surges at a late stage. Second, we document no relation between the technological change and the security development. Third, we identify an inverse relation between security attention and experts' opinion. Along with these results, we introduce new methods for modeling security-development patterns for broader sets of technologies.
引用
收藏
页数:18
相关论文
共 110 条
[1]  
ABERNATHY WJ, 1978, TECHNOL REV, V80, P40
[2]  
Adamuthe A.C., 2014, INT J COMPUT APPL, V106, P14
[3]   The emergence of emerging technologies [J].
Adner, R ;
Levinthal, DA .
CALIFORNIA MANAGEMENT REVIEW, 2002, 45 (01) :50-+
[4]   MARKET FOR LEMONS - QUALITY UNCERTAINTY AND MARKET MECHANISM [J].
AKERLOF, GA .
QUARTERLY JOURNAL OF ECONOMICS, 1970, 84 (03) :488-500
[5]   SPR-SMN: scientific paper recommendation employing SPECTER with memory network [J].
Ali, Zafar ;
Qi, Guilin ;
Kefalas, Pavlos ;
Khusro, Shah ;
Khan, Inayat ;
Muhammad, Khan .
SCIENTOMETRICS, 2022, 127 (11) :6763-6785
[6]   Deriving technology intelligence from patents: Preposition-based semantic analysis [J].
An, Jaehyeong ;
Kim, Kyuwoong ;
Mortara, Letizia ;
Lee, Sungjoo .
JOURNAL OF INFORMETRICS, 2018, 12 (01) :217-236
[7]   Important citations identification with semi-supervised classification model [J].
An, Xin ;
Sun, Xin ;
Xu, Shuo .
SCIENTOMETRICS, 2022, 127 (11) :6533-6555
[8]   The hunt for S-shaped growth paths in technological innovation:: a patent study [J].
Andersen, B .
JOURNAL OF EVOLUTIONARY ECONOMICS, 1999, 9 (04) :487-526
[9]   Why information security is hard - An economic perspective [J].
Anderson, R .
17TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS, 2001, :358-365
[10]  
Anderson R., 2007, 4 BIANNUAL C EC SOFT, P19