Papers by Pouya Majd Pezeshki

The first part of this study summarizes technology transfer methods, and then it looks at how esp... more The first part of this study summarizes technology transfer methods, and then it looks at how espionage has never been easier. This paper features a report on who the spies are, why they steal electronic data and what techniques they use. Also speculates on what the potential costs of espionage could be to nations and organizations. In order to shed light on the illegal aspects, this paper looks at some recent cases of industrial espionage, involving major multinationals. At the other hand we introduced a range of measures that can be taken to reduce the likelihood of becoming a target for industrial espionage and minimize the effects if you are attacked. In this paper we study from two perspectives; first from who use industrial espionage techniques to achieve technology and second from who try to protect his own assets contain trade secrets, technologies, etc through necessary prevention measures. So we introduce industrial espionage techniques which are often used and prevention techniques which should take place. At end we evaluate and rank suitable prevention methods by using Friedman Test. This paper implies Review industrial espionage cases and finds a quantitative methodology based on a structured framework, for ranking the most appropriate prevention method. Send questionnaire to selected managers of information security in high-tech organizations in Iran to evaluate each methods of industrial espionage, and to find which ones are used more than others and rank the prevention methods to make information secured.

Nowadays by considering globalization it becomes more important to achieve new
technologies in de... more Nowadays by considering globalization it becomes more important to achieve new
technologies in developing countries. Development and technology transfer play a major
role in developing of industries in these countries. Especially downstream petrochemical
made governments to pay more attention and concern about new technologies to be
transferred because of its products which made much more added value in compare with
midstream and upstream petrochemical products. The petrochemical industry is usually
divided into three major components: Upstream, midstream and downstream. Midstream
operations are generally included in the downstream category. The downstream
petrochemical industry includes basic chemicals, fertilizers and nitrogen compounds,
plastics and synthetic rubber in primary forms, man-made fibres, rubber products, plastics
products and other chemical products like pesticides and pesticides. In this paper we
evaluate criteria of technology transfer methods in order to determine a list of
prioritization for these methods in downstream petrochemical industry in developing
countries. The approach is based on the Group TOPSIS technique (Technique for Order
Preference by Similarity to Ideal Solution). Evaluating the methods of technology
transfer shows that the most suitable method is industrial espionage. Industrial espionage
is a technique to gain technical information and transferring the technology without
permission from the owner of information or technology. Although there are ethical
doubts about this method due to illegal actions which are known as a crime but
sometimes it may become a logical decision to achieve required information and
technology.

The first part of this study summarizes technology transfer methods and then it looks at how espi... more The first part of this study summarizes technology transfer methods and then it looks at how espionage has never been easier. This study features a report on who the spies are why they steal electronic data and what techniques they use. Also speculates on what the potential costs of espionage could be to nations and organizations. In order to shed light on the illegal aspects, this study looks at some recent cases of industrial espionage, involving major multinationals. At the other hand we introduced a range of measures that can be taken to reduce the likelihood of becoming a target for industrial espionage and minimize the effects if you are attacked. In this study we study from two perspectives; first from who use industrial espionage techniques to achieve technology and second from who try to protect his own assets contain trade secrets and technologies etc., through necessary prevention measures. So, the researchers introduce industrial espionage techniques which are often used and prevention techniques which should take place. At end we evaluate and rank suitable prevention methods by using group TOPSIS (Technique for Order Preference by Similarity to Ideal Solution) approach. This study implies review industrial espionage cases and finds a quantitative methodology based on a structured framework for ranking the most appropriate prevention method. Send questionnaire to selected managers of information security in high tech organizations in Iran to evaluate each methods of industrial espionage and to find which ones are used more than others and rank the prevention methods to make information secured.

This research attempts to introduce important criteria which have effects on selecting the best b... more This research attempts to introduce important criteria which have effects on selecting the best brands in beverage industries in Iran, also to evaluate the weight of each criterion for selecting the best brand in the case Persian beverage market. Weighting methods are divided into two categories: objective methods and subjective methods. In this paper entropy were selected from objective methods and Analytic Hierarchy Process (AHP) were selected from subjective methods which lead in two weight vectors, then integration of both vectors results in the effect coefficient of brand selecting criteria. Experts’ opinions are gathered by questionnaire. Then the major criteria weights are analyzed using the analytic hierarchy process and entropy, final weights are then determined using the compromised weighting method. Brand resonance performs the most important role among all criteria by Persian consumers of beverage products. Many consumers are not fully informed when shopping for products and services, reliance on known and recognized brand names becomes important. First we gathered the most important criteria of brand equity from literatures, which could be listed as, corporation ability association, brand awareness, quality perception, brand resonance, brand extensibility, price flexibility, and repurchase intention.
Uploads
Papers by Pouya Majd Pezeshki
technologies in developing countries. Development and technology transfer play a major
role in developing of industries in these countries. Especially downstream petrochemical
made governments to pay more attention and concern about new technologies to be
transferred because of its products which made much more added value in compare with
midstream and upstream petrochemical products. The petrochemical industry is usually
divided into three major components: Upstream, midstream and downstream. Midstream
operations are generally included in the downstream category. The downstream
petrochemical industry includes basic chemicals, fertilizers and nitrogen compounds,
plastics and synthetic rubber in primary forms, man-made fibres, rubber products, plastics
products and other chemical products like pesticides and pesticides. In this paper we
evaluate criteria of technology transfer methods in order to determine a list of
prioritization for these methods in downstream petrochemical industry in developing
countries. The approach is based on the Group TOPSIS technique (Technique for Order
Preference by Similarity to Ideal Solution). Evaluating the methods of technology
transfer shows that the most suitable method is industrial espionage. Industrial espionage
is a technique to gain technical information and transferring the technology without
permission from the owner of information or technology. Although there are ethical
doubts about this method due to illegal actions which are known as a crime but
sometimes it may become a logical decision to achieve required information and
technology.