A transferability evaluation model for intellectual property

被引:16
|
作者
Ko, Namuk [1 ]
Jeong, Byeongki [1 ]
Seo, Wonchul [2 ]
Yoon, Janghyeok [1 ]
机构
[1] Konkuk Univ, Dept Ind Engn, 120 Neungdong Ro, Seoul 05029, South Korea
[2] Pukyong Natl Univ, Grad Sch Management Technol, 45 Yongso Ro, Busan 48513, South Korea
基金
新加坡国家研究基金会;
关键词
Intellectual property; Transferability; Evaluation model; Deep neural network; Patent mining; RESEARCH-AND-DEVELOPMENT; TECHNOLOGY OPPORTUNITY DISCOVERY; PATENT VALUE; EMPIRICAL-ANALYSIS; NEURAL-NETWORK; INDICATORS; INNOVATION; CLASSIFICATION; IDENTIFICATION; LITIGATION;
D O I
10.1016/j.cie.2019.04.011
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
As a type of intellectual property rights, patents are a vast source of human-generated technological knowledge; as such, patent evaluations from various perspectives have long been of primary interest to researchers. However, although patents are transferable assets with economic and technological value, limited attention has been paid to the possibility of realizing a patent's potential through its transaction. Consequently, this study develops a patent transferability evaluation model by applying deep neural networks (DNNs) to various patent indicators and the corresponding historical patent rights transaction data. To this end, this study (1) constructs a patent database with patents and their corresponding historical patent rights transaction data from the Korean Patent Office database; (2) defines how to extract a variety of patent indicators related to patent transferability that do not depend on forward citations; (3) builds a patent transferability evaluation model based on DNN; and (4) validates the performance and effectiveness of the developed model. This study contributes to the literature by being one of the first to quantitatively evaluate patents in terms of transferability and, thus, the proposed model can be used for valuing patents and distinguishing quality patents that are marketable.
引用
收藏
页码:344 / 355
页数:12
相关论文
共 50 条
  • [41] Knowledge spillovers and intellectual property rights
    Samaniego, Roberto M.
    INTERNATIONAL JOURNAL OF INDUSTRIAL ORGANIZATION, 2013, 31 (01) : 50 - 63
  • [42] Protecting intellectual property to enhance firm performance: does it work for SMEs?
    Agostini, Lara
    Filippini, Roberto
    Nosella, Anna
    KNOWLEDGE MANAGEMENT RESEARCH & PRACTICE, 2016, 14 (01) : 96 - 105
  • [43] The future of three-dimensional printing: Intellectual property or intellectual confinement?
    Santoso, Stephanie M.
    Wicker, Stephen B.
    NEW MEDIA & SOCIETY, 2016, 18 (01) : 138 - 155
  • [44] The triple helix model and intellectual property: The case of the University of Brasilia
    Borges, Polyana de Almeida
    de Araujo, Livia Pereira
    Lima, Larisse A.
    Ghesti, Grace Ferreira
    Carmo, Talita Souza
    WORLD PATENT INFORMATION, 2020, 60
  • [45] Creation of Intellectual Property Based on Natural Language Generation Model
    Rene, Antonio Oliveira Nzinga
    Matsui, Takeshi
    Onoda, Shigeaki
    Okuhara, Koji
    2020 JOINT 11TH INTERNATIONAL CONFERENCE ON SOFT COMPUTING AND INTELLIGENT SYSTEMS AND 21ST INTERNATIONAL SYMPOSIUM ON ADVANCED INTELLIGENT SYSTEMS (SCIS-ISIS), 2020, : 169 - 174
  • [46] CONSUMER DECISION MODEL OF INTELLECTUAL PROPERTY THEFT IN EMERGING MARKETS
    Lalovic, Gordana
    Reardon, Saule Amirebayeva
    Vida, Irena
    Reardon, James
    ORGANIZATIONS AND MARKETS IN EMERGING ECONOMIES, 2012, 3 (01) : 58 - 74
  • [47] The role of intellectual property rights in a directed technical change model
    Afonso, Oscar
    Magalhaes, Manuela
    INTERNATIONAL JOURNAL OF FINANCE & ECONOMICS, 2021, 26 (02) : 2142 - 2176
  • [49] Dynamic competition and intellectual property rights in a model of product development
    de Villemeur, Etienne Billette
    Ruble, Richard
    Versaevel, Bruno
    JOURNAL OF ECONOMIC DYNAMICS & CONTROL, 2019, 100 : 270 - 296
  • [50] An evolutionary step in intellectual property rights - Artificial intelligence and intellectual property
    Davies, Colin R.
    COMPUTER LAW & SECURITY REVIEW, 2011, 27 (06) : 601 - 619