DOI QR코드

DOI QR Code

Use of Patent Anlysis for the Future Skills-needs in Information Security

  • Hwang, Gyu-hee (Korea Research Institute for Vocational Education and Training (KRIVET)) ;
  • Ju, In-Joong (Korea Research Institute for Vocational Education and Training (KRIVET)) ;
  • Ban, Ga-woon (Korea Research Institute for Vocational Education and Training (KRIVET)) ;
  • Lee, Kack-Hee (Korea Research Institute for Vocational Education and Training (KRIVET))
  • 투고 : 2015.05.26
  • 심사 : 2015.09.14
  • 발행 : 2015.12.31

초록

This study attempts to develop a methodology that analyzes patent applications to identify future skills, in particular in the sector of information security, recently into the spotlight. Matching skill elements from the International Patent Classification (IPC) with skill units from job analysis, the study tries to track trends in the skills needs based on IPC time-pattern. It then verifies the validity of the outlook for future skills needs by addressing the situation through the use of patents. The research assesses the usability of patent information for this type of analysis. While this study is limited to the information security sector by using Korean patent information, it can be expanded in the future to other areas and patents in the United States and Europe.

키워드

I. Introduction

At the 2012 Seville International Conference on Future-oriented Technology Analysis (FTA), FTA was regarded as a method to better prepare for the future and/or shape it in order to achieve a favorable outcome. This study attempts to broaden the FTA to identify future skills needs, which constitutes a critical subject for education and training. It is noted that there is still no research on the future skills needs linked to FTA, including patent analysis.

In the study of future skills needs, the crucial issue is how to proceed to identify future skills needs. On that matter, this study argues that some information derived from patent data can be used in the identification of future skills needs as a measurement of future technological trends.

As for forecasting and/or anticipating future skills, conventional studies analyze or 'interpret' changes of skills needs already occurring. By contrast, this study attempts to search for future skills needs directly derived from technological innovation. Conventional skills analysis focuses on labor market information. This information is useful for the analysis of the present and near future, but it has limitation on the analysis of newly emerging technology beyond information (CEDFOP, 2012; Lowery et al., 2008; Schmidt et al., 2004). This is a common limitation because conventional forecasting of workforce demand and supply is mainly focused on quantitative demand changes by industry and occupation.

The analysis of future skills needs that is required should contain tangible contents of skills needed; this analysis can be called a qualitative forecast, which is different from existing quantitative forecast on workforce demand and supply (Hwang, Coh and Lee, 2011; Hwang, Joo and Coh, 2011; Hwang and Lee, 2010). This qualitative supplement to a quantitative study can normally be altered through expert panel discussions, but it faces several challenges from the shortage of verification instruments. So, this study attempts to conduct a verifiable qualitative analysis on the specific and measurable basis of patent information. However, such analysis might be regarded as another quantitative approach or, despite the use of patent data, it might simply be called a limited quantitative approach in the interpretation and linkage carried out by experts on job and curriculum analysis.

Section 2 reviews the feasibility of analysis of future skills needs through patent data at theoretical level. It discusses a knowledge base and a knowledge network along with the possibility of examining future skills needs through patent data, and suggests a forecast methodology of future skills needs.

Section 3 proposes analytical statements on issues related to initial skills needs derived from the examination of current jobs in information security occupations. It links International Patent Classification (IPC) of information security technology to the skills needs.

Section 4 analyzes trends in the timescale of IPC on information security technology, carries out forecasting on skills needs, and verifies the appropriateness of actual forecast skills needs. In conclusion, the study discusses the achievements, limitations and future research directions of investigating future skills needs through patent data.

 

II . In Using Patent Data to Detect Future Skills Needs

1. Skills and Knowledge

In this study, skills include technology and dexterity, and thus can be considered an interchangeable concept with knowledge. Knowledge in this context focuses on knowledge as competence and acquaintance rather than propositional knowledge. On top of knowledge as competence and acquaintance, there are transcendent knowledge and logical knowledge that are closely related to propositional knowledge. As regards epistemology, knowledge can be classified into three categories (Balconi et al., 2007): Firstly, knowledge means an ability to do something (knowledge as competence) ranging from simple behaviors to complex cognitive behaviors, i.e. from use of simple hammers to use of complex languages. Secondly, knowledge is a familiar behavior of getting to know someone or something through past experiences (knowledge as acquaintance), like remembering the faces of frequently encountering people. Thirdly, propositional knowledge is recognition of the necessity of modifying certain information at hand. This is an inherent nature of mankind as an advanced species.

Knowledge as competence and knowledge as acquaintance are discussed by Gibbons et al. (1994), who analyze, in a useful fashion, the changes in knowledge production methods with a focus on modern science and technology. Gibbons et al. examine the transition of knowledge production method, naming knowledge production in a traditional method as Mode 1 knowledge and knowledge production in a new method that transformed traditional knowledge production as Mode 2 knowledge. While Mode 1 indicates knowledge forming that occurs within the boundary of certain disciplines, Mode 2 indicates knowledge forming that occurs through inter-discipline or trans-discipline. Nowotny et al. (2003) regard Mode 1 knowledge forming as a further development of existing science and technology measured on an academic standard, while they regard Mode 2 knowledge forming as a new paradigm of knowledge creation.

In the midst of rapid technological progress, Mode 2-type knowledge is also expanding (Cowan et al., 2000). Simple restructuring of existing knowledge is not sufficient, and it requires continuous knowledge creation. This kind of knowledge creation enhances knowledge convergence. In other words, the key to knowledge creation lies in the active participation in a continuous process of converging knowledge. In this context, simply absorbing convergent knowledge as a response has its limitation.

2. Usage of Patent as a Tool of FTA

For a while, patent data have been regarded as one of the most important sources or tools for FTA. With free accessibility in most countries, patent data provides valuable information on technological development and allows the analysis of emerging technologies, for instance, text mining in Yoon et al. (2004), Tseng et al. (2007) and An et al. (2011) and pattern recognition in Cong et al. (2010).

After reviewing several technology forecasting methodologies and models, Daim et al. (2006) propose the integration of multiple methodologies for forecasting in the areas of fuel cell, food safety and optical storage – integrating patent analysis and bibliometrics consisting of System Dynamics, Scenarios and Growth Curves. They insist on the need to develop such integrated tools for technology forecasting. Furthermore, Daim et al. (2006) suggest the inclusion of a Delphi methodology involving experts in FTA. Previously, after compiling several methods of analysis on future technology and considering recent changes in science and technology, including information technology, Porter et al. (2004) address several challenges related to the feasibilities and (current) limitations of FTA, and they offer steps for further advances.

Cagnin et al. (2013) insist that an appropriate combination of quantitative and qualitative methods should be made for specific purpose and context. It should enable confidence building through inclusiveness and transparency in all processes linked to rigorous methods. They warn that there is no uniform and proven FTA methodology, and that applying relevant methods in a rigorous manner is more important than assembling a set of highly sophisticated methods.

Even though combining quantitative and qualitative approaches is needed to bring about a better understanding of societal challenges and complex interrelated systems, Haegeman et al. (2013) explore aspects which ought to be considered in future analysis such as epistemological differences, cultural differences and conceptual differences.

3. Patent Analysis and Knowledge

Saviotti (2004, 2007) argues that knowledge has two different attributes in knowledge creation and utilization: (Proposition 1) knowledge has a co-relational structure; (Proposition 2) knowledge has a retrievable/interpretative structure. These attributes of knowledge can construct a (knowledge) network (Saviotti, 2009, 25-26). The ‘advent of new technology' and more recent 'convergence of knowledge' can be analyzed as this type of knowledge network.

Patent data could be used for examining this knowledge network. Due to skills resulting from a technological innovation, the examination of patent data - itself a product of technological innovation - could provide keys to the analysis of future skills needs. The structure of data embedded in patents could play a critical role as a “proxy meter” in understanding the structures of R&D activities and related knowledge. Quantifying and structuring patent data make it possible to understand the development and structure of knowledge.

4. Methodological Scheme in This Study

This study has selected the sector of information security that has witnessed considerable technological advances in recent years. It is also relatively well organized as to the skills needs identified through an analysis of jobs at a particular point in time, following a pilot.

This study is configured in five large schemes: (1) extraction of skill units based on job analysis; (2) extraction of skill elements based on patent analysis; (3) matching IPC skill elements with skill units from job analysis1 ; (4) tracking skills needs forecasting from patent trends; (5) verification of the validity of skills needs outlook.

Figure 1Methodological scheme

Correcting a search formula recursively via IPC analysis carried out the identification of patent, and the final search formula was determined through skills analysis. From the initial formula setting, security professionals provided consultation in a repetitive corrective process. A total of 174,155 patents were finally identified.

The identification of skills unit from jobs was carried out through a meta-analysis of related domestic and international job configurations. Especially, a substantial level of support was secured from US job data.

The mapping and matching of skill elements from IPC code with skills units from existing job studies is conducted in collaboration with information security professionals. The mapping is key to analyze skills trend from a patent trend.

Future skills needs for information security is drawn from an exploratory analysis of the timeline trend of the skills elements based on patent data. Continuous consultation with professionals on the results of the analysis helped distinguish the broad case from a narrow case of connection between IPC code and skills units in the sector of information security2. Also, the distinction was arrived at between whole applied patterns and top 20 patent-applied companies.

Upon observing the apparent gap between forecast results and actual results, a better methodology could be developed by raising the validity of actual data. To test the degree of attributing the entire forecast results, including consistent forecast results, to the validity of actual situations, surveys of experts and companies were carried out.

 

III. Job Analysis and Patent in Information Security

1. Information Security

The field of ICT, which has recently experienced significant technological advances and represents relatively well-organized necessary skills needs identified through an analysis of actual jobs, was selected through a pre-analysis. This helped select subjects and method application to develop a methodology. The consistently rapid technological advances in the ICT sector since the 1990s was confirmed by annual trends in the number of registered patents in the U.S. Patent and Trademark Office.3

The pre-analysis has also gone through expert consultation to check the validity of identifying technological advances in ICT from patent data. Furthermore, due to the relative clarity of job description, the ICT technology sector was deemed suitable for the analysis of current skills needs. It was recognized that this sector, through an analysis of patent, allows for a relatively easy comparison of forecasting demands for significantly advanced ICT skills. On this basis, the focus on the sector of information security was finalized.

On Table 1, the physical security element is to be excluded from information security in this research because it goes beyond the brief of the study. Since both the application service security and the convergence security can be regarded as instrumental in information security, the study defines the range of information security by focusing on network and system security, including common base security. The technology of common base security was not analyzed separately, but examined as a component in the analysis of the network and system security.

Table 1Source: Ministry of Knowledge Economy (2011)

2. Skill Unit from Job Analysis

Before examining job configuration and skills needs for information security, the current and prospective status of human resources was considered by tapping into existing researches. The information for the analysis of job configuration and knowledge requirement was gathered through expert advice and material data from inside and outside of the country (Simpson et al., 2006; Yoo and Kim, 2009). After reviewing the knowledge requirement for the information protection and education certification program in the United States, relevant research material was collected to carry out the analysis of the information security job in Korea. As a final step, expert opinions were sought to identify the skills needs for information security jobs.

The result of identifying skills through a review of the nature of the jobs is presented in Table 2 as necessary skills corresponding to the sub-classification of job category. Patents are analyzed in response to these required skills.

Table 2Job configuration & required skills for information security sector

3. Extraction of Patent Information

The basic element for analyzing a patent is an examination of patent application to Korean Intellectual Property Office each year. This data was extracted from KIPRIS DB (http://kpat.kipris.or.kr/). In fashioning a search formula, the first step involved a basic search using IPC. In the second step, the IPC code was re-extracted (7-digit level) from the search results obtained in the first step. In the third step, a keyword search was carried out of the patent summary. After running the entire analysis process based on the third search formula, all the previous analyses were run again by modifying the search formula. The search results on information security patent eventually covered 174,155 patents filed as of September 30, 2013.

Figure 2Patents pending for information security

4. Mapping Skill Element to Skill Unit from Job Analysis

In matching IPC-extracted patents with required skills, the skills that could not be comprised within IPC were excluded, and the IPC that does not include information security was also disregarded. Meanwhile, matching multiple IPCs with one skill unit was allowed as well as matching one IPC with several skill units, with regard to IPC as a skill element.

The matching results were obtained through consultation with experts. On the Table 3, H04W008 Network data management4 appeared to be the required skills element of (B-1) ISMS (Information Security Management System), (B-8) Network security5, (J-1) Security architecture, and (K-1) Firewall configuration. While (B-1) ISMS (Information Security Management System) is a match not only to H04W008 ‘Network data management,’ but also to H04W004 ‘Services or facilities specially adapted for wireless communication networks,’ but also to H04W012 ‘Security arrangements and Authentication,’ G06F019 ‘Digital computing or data processing equipment or methods, specially adapted for specific applications,’ H04W028 ‘Network traffic or resource management’ and H04W064 ‘Locating users or terminals for network management purposes.’ In matching skill units (derived from job analysis) with skill elements (derived from IPC), the distinction of specific skill elements and basic skill elements is also considered, in order to allow for certain skill elements to become basic skill elements, thus, not necessarily becoming an element of specific skill needs.6

Table 3Note: 1. Relevance is expressed as “1” 2. For code description, go to http://www.wipo.int/classifications/ipc/en/ G06F005 Methods or arrangements for data conversion without changing the order or content of the data handled G06F009 Arrangements for programme control, e.g. control unit (programme control for peripheral devices G06F 13/10) G06F017 Digital computing or data processing equipment or methods, specially adapted for specific functions G06F019 Digital computing or data processing equipment or methods, specially adapted for specific applications (G06F 17/00 takes precedence; data processing systems or methods specially adapted for administrative, commercial, financial, managerial, supervisory or forecasting purposes G06Q) G06F021 Security arrangements for protecting computers or computer systems against unauthorized activity (multiprogramming G06F 9/46; protection against unauthorized use of memory G06F 12/14; dispensing apparatus actuated by coded identity card or credit card G07F 7/08; equipment anti-theft monitoring by a central station G08B 26/00; secret or secure communication H04L 9/00; data switching networks H04L 12/00 G06K007 Methods or arrangements for sensing record carriers (G06K 9/00 takes precedence) G06K001 Methods or arrangements for marking the record carrier in digital fashion G06K007 Methods or arrangements for sensing record carriers (G06K 9/00 takes precedence; methods or arrangements for marking the record carrier in digital fashion G06K 1/00) G06T001 General purpose image data processing G09C001 Apparatus or methods whereby a given sequence of signs, e.g. an intelligible text, is transformed into an unintelligible sequence of signs by transposing the signs or groups of signs or by replacing them by others according to a predetermined system (cryptographic typewriters G09C 3/00) H04B001 Details of transmission systems, not covered by a single one of groups H04B 3/00-H04B 13/00; Details of transmission systems not characterised by the medium used for transmission (tuning resonant circuits H03J) H04B001 Details of transmission systems, not covered by a single one of groups H04B 3/00-H04B 13/00; Details of transmission systems not characterised by the medium used for transmission H04J001 Frequency-division multiplex systems (H04J 14/02 takes precedence) H04K001 Secret communication (ciphering or deciphering apparatus per seG09C; systems with reduced bandwidth or suppressed carrier H04B 1/66; spread spectrum techniques in general H04B 1/69; by using a sub-carrier H04B 14/08; by multiplexing H04J; transmission systems for secret digital information H04L 9/00; secret or subscription television systems H04N 7/16) H04L009 Arrangements for secret or secure communication H04W004 Services or facilities specially adapted for wireless communication networks H04W008 Network data management H04W012 Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity H04W028 Network traffic or resource management H04W048 Access restriction; Network selection; Access point selection H04W060 Registration, e.g. affiliation to network; De-registration, e.g. terminating affiliation H04W064 Locating users or terminals for network management purposes, e.g. mobility management H04W080 Wireless network protocols or protocol adaptations to wireless operation, e.g. WAP [Wireless Application Protocol] H04W084 Network topologies H04W088 Devices specially adapted for wireless communication networks, e.g. terminals, base stations or access point devices H04W092 Interfaces specially adapted for wireless communication networks

 

IV. Forecasting the Skills Needs from Patent Analysis

1. Trend of Expected Skills Needs from Patent Trend

Given a particular skill Si, the required skill forecast for t period is defined as , while the frequency of is which is the sum of the frequency that appeared7 for multiple Si related IPC during t period. For example, while IPCs related to the skill of (B-1) ISMS (Information Security Management System) are G06F019, G06Q040, H04W004, H04W008, H04W012 H04W028, and H04W064, N(SB-12000) for year 2005 and has a total frequency of 4,823 among the patents filed in 2005. The result is presented in Table 4 where the relative size of IPC is derived from the division of yearly total frequency on Table 5. Based on the relative size of IPC on Table 58, the trend in the skills needs is shown on Figure 3.

Table 4Trend of skills needs from absolute size of IPC

Table 5Trend of skills needs from relative size of IPC

Figure 3Trends of the skills needs based on IPC time-pattern

2. Forecasting and Verification of Skills Needs

Based on the timeline trend, mainly since 2005, two categories are examined as increasing and decreasing trends, on Figure 3. In the findings, the distinction between specific skill elements only and the inclusion of basic skill elements was made. Furthermore, the distinction between the whole pattern of patent application and top 20 patent-applied companies only was also made. After conducting 2×2 analyses with overall similar results in terms of trends, Table 6 shows the whole pattern of patent applications with specific skill elements only.

Table 6Note: ① Skills that continue to hold importance ② Newly emerging skills ③ Converted to general purpose skills ④ Importance decreasing skills

Regardless of the differences of treatment in the patent analysis, ① (B8) ‘Network security’ appears to be the skill that continues to hold a great deal of importance, while ② (F1) ‘Encryption algorithm,’ (B7) ‘Data security,’ (N-2) ‘Cryptology,’ (A-1) ‘Security vulnerability analysis,’ (A-3) ‘Simulated hacking and simulated penetration’ and (B-6) ‘PC Security’ were presented as newly-emerging skills. In addition, ③ (B1) ‘Information security management system,’ (K13) ‘Authentication service,’ (K -11) ‘Mobile device management,’ (M1) ‘Vulnerability analysis,’ (J-1) ‘Security architecture,’ (K-1) ‘Firewall building’ and (K-7) ‘OTP’ were presented as skills being incorporated into basic skills with receding independence compared to the past. Based on the forecast that includes general-purpose technology IPC, (B-2) ‘Security policy,’ (Q-1) ‘Security audit’ and (Q-2) ‘Information security event management’ are also expected to be newly emerging skills.

To verify the validity of the reality of these forecast results, a survey of information security companies and of relevant experts was conducted. Table 5 presents these findings as well as the forecast results that include a general-purpose technology IPC. The survey results were generally similar, with the exception of a high frequency for (B-6) ‘PC security' in ② ‘newly emerging skills’ in the category of ‘manufacturer only,’ and ① ‘skills that continue to hold importance’ in the category of ‘expert group.’ These results can be interpreted as supporting the findings of the skills needs forecast carried out by examining the entire patent filings, including general-purpose technology IPC (Fisher’s Exact-Test is significant, with the significant level of 5%).

 

V. Concluding Remarks

This study attempts to develop a methodology that analyzes patent applications to identify future skills, in particular in the sector of information security, recently in the spotlight. Matching skill elements from IPC with skill units from job analysis, the study tries to track trends of the skills needs based on IPC time-pattern. It then verifies the validity of the outlook for future skills needs by addressing the situation through the use of patents. The research assesses the usability of patent information by showing how it can be utilized in the analysis on future skills needs.

The skills needs identified from the patent information in late 2000s in the information security sector substantially mirror the skills needs identified in 2013. However, the accuracy of matching the skills needs forecast in different fields or timeline with the actual skills needs is not guaranteed. Furthermore, differences in the speed and pattern of technological advances are revealed owing to differences in technological characteristics and differences in various socio-economic environments within which technologies are implemented. The most important issue in this study is ‘Matching required skills with jobs within IPC', but it is worth noting that more specific and detailed methods beyond the current one utilizing the 0-1 matrix would be required.

Despite its limitations, this current study might be worth refining the methodology to identify future skills needs by using patent information, because there is still no research in this specific area. While this study is limited to the sector of information security by using Korean patent information, it can be expanded in the future to other areas and patents in the United States and Europe. Technological change is a global phenomenon, so the analysis of global patent information ought to be a valuable contribution.

참고문헌

  1. An, X.Y. and Wu, Q.Q. (2011) Co-word analysis of the trends in stem cells field based on subject heading weighting, Scientometrics, 88, 133-144. https://doi.org/10.1007/s11192-011-0374-1
  2. Balconi, M. et al. (2007) The ‘codification debate’ revisited: a conceptual framework to analyze the role of tacit knowledge in economics, Industrial and Corporate Change, 16(5), 823-849. https://doi.org/10.1093/icc/dtm025
  3. Cagnin, C., Havas, A. and Saritas, O. (2013) Future-oriented technology analysis: its potential to address disruptive transformations, Technological Forecasting & Social Change, 80, 379-385. https://doi.org/10.1016/j.techfore.2012.10.001
  4. CEDEFOP (2012) Skills Supply and Demand in Europe-Methodological Framework, Luxembourg: Publications Office of the European Union.
  5. Cong, H. and Tong, L-H. (2010) Pattern-oriented associative rule-based patent classification, Expert Systems with Applications, 37(3), 2395-2404. https://doi.org/10.1016/j.eswa.2009.07.069
  6. Cowan, R. et al. (2000) The Explicit Economics of Knowledge Codification and Tacitness, England: Oxford University Press.
  7. Daim, T. (2006) Forecasting emerging technologies: use of bibliometrics and patent analysis, Technological Forecasting and Social Change, 73(8), 981-1012. https://doi.org/10.1016/j.techfore.2006.04.004
  8. Gibbons, M. et al. (1994) The New Production of Knowledge: The Dynamics of Science and Research in Contemporary Societies, London: SAGE.
  9. Haegeman, K., Marinelli, E., Scapolo, F., Ricci, A. and Sokolov, A. (2013) Quantitative and qualitative approaches in Future-oriented Technology Analysis (FTA): from combination to integration? Technological Forecasting and Social Change, 80(3), 386-397. https://doi.org/10.1016/j.techfore.2012.10.002
  10. Hwang, G. and Lee, J. (2010) Technological innovation & future skills - with focus on green car growth, Journal of Korea Technology Innovation Society, 13(3), 399-422. (in Korean)
  11. Hwang, G., Coh, B. and Lee, J. (2011) Utilizing patent analysis in future skills need analysis - with focus on green technology of steel industry, Vocational Ability Development Study, 14(3), 79-104, (in Korean).
  12. Hwang, G., Joo, I. and Coh, B. (2011) Future Skills Need Analysis by Patent Analysis - With Focus on Automobile Battery as Industry Convergence, KRIVET (in Korean).
  13. Lowery, D. et al. (2008) Future Skill Needs - Projections and Employers’ Views, NCVER.
  14. Ministry of Knowledge Economy (2011) IT Information Technology Competitiveness Analysis. (in Korean)
  15. Nowotny, H., Scott, P. and Gibbons, M. (2003) ‘Mode 2’ revisited: the new production of knowledge, Minerva, 41(3), 179-194. https://doi.org/10.1023/A:1025505528250
  16. Porter, A.L. et al. (2004) Technology futures analysis: toward integration of the field and new methods, Technological Forecasting & Social Change, 71, 287-303. https://doi.org/10.1016/j.techfore.2003.11.004
  17. Saviotti, P.P. (2004) Considerations about the production and utilization of knowledge, Journal of Institutional and Theoretical Economics, 160, 100-121. https://doi.org/10.1628/093245604773861140
  18. Saviotti, P.P. (2007) On the dynamics of generation and utilization of knowledge: the local character of knowledge, Structural Change and Economic Dynamics, 18, 387-408. https://doi.org/10.1016/j.strueco.2007.03.003
  19. Saviotti, P.P. (2009) Knowledge networks: structure and dynamics, in Andreas Pyka et al. (eds.) Innovation Networks: New Approaches in Modeling and Analyzing, Springer, 19-41.
  20. Schmidt, S.L. et al. (eds.) (2004) Identifying Skill Needs for the Future: From Research to Policy and Practice, Office for Official Publications of the European Communities.
  21. Simpson, H.K. et al. (2006) Development and Application of Skill Standards for Security Practitioners, USA: Defense Personal Security Research Center.
  22. Tseng, Y-H., Lin, C-J. and Lin, Y-I. (2007) Text mining techniques for patent analysis, Information Processing and Management 43, 1216-1247. https://doi.org/10.1016/j.ipm.2006.11.011
  23. Yoo, H. and Kim, T. (2009) Considering information security professionals’ career to analyze knowledge and skills requirement, Journal of Korea Institute of Information Security and Cryptology, 19(4), 77-89. (in Korean)
  24. Yoon, B. and Park, Y. (2004) A text-mining-based patent network: analytical tool for high-technology trend, Journal of High Technology, Management Research, 15, 37-50. https://doi.org/10.1016/j.hitech.2003.09.003