{"id":6136,"date":"2019-05-31T12:42:19","date_gmt":"2019-05-31T12:42:19","guid":{"rendered":"http:\/\/arielsheen.com\/?p=6136"},"modified":"2019-05-31T13:32:50","modified_gmt":"2019-05-31T13:32:50","slug":"translation-of-methodology-of-technology-surveillance-in-the-universities-and-research-centers","status":"publish","type":"post","link":"https:\/\/arielsheen.com\/index.php\/2019\/05\/31\/translation-of-methodology-of-technology-surveillance-in-the-universities-and-research-centers\/","title":{"rendered":"Translation of Methodology of Technology Surveillance in the Universities and Research Centers"},"content":{"rendered":"<p><a href=\"https:\/\/www.researchgate.net\/publication\/236088631_Methodology_of_Technology_Surveillance_in_the_universities_and_research_centers\"><strong>The Methodology of Technology Surveillance in Universities and Research Centers<span class=\"Apple-converted-space\">\u00a0<\/span><\/strong><\/a><\/p>\n<p><b>Abstract<span class=\"Apple-converted-space\">\u00a0<\/span><\/b><\/p>\n<p>The technological surveillance is very important at the present time in the development and success of the processes of R&amp;D. It is an organized, selective and permanent process, of capturing information of the exterior and of the own organization it has more than enough science and technology, to select it, to analyze it, to diffuse it and to communicate it, to transform it into knowledge for a better one taking of decisions. The existent methodologies of technological surveillance are characterized, intending a methodology for their application in one university of technical sciences, supported in a technological observatory. It is supplemented with the application of tools of discovery of knowledge based on patents for a research center. The technological surveillance in the Polytechnic Superior Institute of the Havana (CUJAE) with their technological observatory it has allowed to identify strategic programs of investigation, tendencies in the teachings of engineering and architecture, lead in technical and thematic sciences of investigation published in the Web of Science. Additionally maps of knowledge are obtained based on patents applied in the National Center for Scientific Research (CNIC). The implementation of the technological surveillance, their continuous improvement with new tools and their use for the own investigators, favorable the development and increment of programs and strategic lines of investigation (R&amp;D) guided to a pertinent innovation in the engineering and architecture, allowing to identify the evolution in the technological development, what prepares to the university and the investigation centers for the changes in the environment with a strategic focus.<span class=\"Apple-converted-space\">\u00a0<\/span><\/p>\n<p><b>Keywords: <\/b>technological surveillance; technological observatory; programs strategic of R&amp;D; map of knowledge of patents.<span class=\"Apple-converted-space\">\u00a0<\/span><\/p>\n<p>INTRODUCTION<\/p>\n<p>Technological surveillance is very important for the success of the R + D + i1 processes. It is defined as &#8220;the organized, selective and permanent process of capturing information from outside and of the organization about science and technology, selecting it, analyzing it, disseminating it and communicating it, in order to convert it into knowledge to make decisions with less risk and be able to anticipate changes \u201c2.<\/p>\n<p>The observation and analysis of the scientific and technological environment and of the present and future economic impacts for strategic decision making are part of the technological surveillance3. In the management of technological innovation4, surveillance is part of its processes, together with human resources, collaboration, project management, quality and its indicators. In the literature, different terms have also been adopted that are closely related, such as technological surveillance5,6, technological intelligence7,8,9,10, technological forecasting11,12,13 and technological evaluation11,14. In this article reference will be made to technological surveillance although other meanings are present.<\/p>\n<p>The adequate identification of the source of information is vital for technological surveillance15,16, with web pages increasingly being used, which include patent databases, scientific journals and university portals. The analysis of this information allows to make better decisions and anticipate the systematic changes of the environment17. As a trend, tools appear on the basis of Information Technology and Communications Technologies (ICTs), which is why we talk more about technological intelligence. Several systems are referred to for technological surveillance with the support of ICT, such as those based on methods such as TRIZ, an acronym in Russian for the theory of solving inventive problems, such as CAI (Computer Aided Innovation), for the generation of new concepts , based on scientific and technical knowledge (patent databases, scientific and technical encyclopedias) that analyze emerging technologies for technological forecasting and others are those that are parameterized, according to areas of interest on web pages, generating automatic alerts when detecting a change in one of the indicated web pages, which include Internet search bots, crawlers, spiders or spiders18.<\/p>\n<p>The objective of the article is to characterize some methodologies of technological surveillance with their processes that allow to identify and apply a methodological proposal of technological surveillance in a university of technical sciences, supported by a technological observatory. It shows the use of technological mining to detect technological opportunities in publications and the use of knowledge maps based on patents for a research center.<\/p>\n<p><b>MATERIALS AND METHODS<\/b><\/p>\n<p>As part of the materials and methods, a set of steps is shown to approach the methodological proposal for university and research centers with the identification of the processes and the application of technological surveillance tools (VT).<\/p>\n<p>1. Characterization of existing technological monitoring methodologies in terms of processes and authors that use and disseminate it.<\/p>\n<p>2. Creation of the technological observatory for the university environment.<\/p>\n<p>3. Design, application and analysis of results of guides for technological surveillance according to the source of information and the objective of the university center or<\/p>\n<p>investigation.<\/p>\n<p>Several VT methodologies reported in the literature were analyzed in terms of processes used, shown in Table 1, where FCV means critical surveillance factors.<\/p>\n<table cellspacing=\"0\" cellpadding=\"0\">\n<tbody>\n<tr>\n<td valign=\"middle\"><b>Morcillo, 2003<\/b>15<\/td>\n<td valign=\"middle\"><b>Mignogna, 1997<\/b>19<\/td>\n<td valign=\"middle\"><b>S\u00e1nchez et al, 2002<\/b>20<\/td>\n<td valign=\"middle\"><b>Le\u00f3n et al, 2006<\/b>21<\/td>\n<td valign=\"middle\"><b>Savioz, 2004<\/b>8<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<table cellspacing=\"0\" cellpadding=\"0\">\n<tbody>\n<tr>\n<td valign=\"middle\">Problem and objectives<\/td>\n<td valign=\"middle\">Planning and hypothesis<\/td>\n<td valign=\"middle\">Planning \/ Identification of needs, FCV<\/td>\n<td valign=\"middle\">Situation or problem, broken down<\/td>\n<td valign=\"middle\"><img decoding=\"async\" src=\"data:image\/png;base64,iVBORw0KGgoAAAANSUhEUgAAAFsAAAABCAYAAACxI9IIAAABYWlDQ1BrQ0dDb2xvclNwYWNlRGlzcGxheVAzAAAokWNgYFJJLCjIYWFgYMjNKykKcndSiIiMUmB\/yMAOhLwMYgwKicnFBY4BAT5AJQwwGhV8u8bACKIv64LMOiU1tUm1XsDXYqbw1YuvRJsw1aMArpTU4mQg\/QeIU5MLikoYGBhTgGzl8pICELsDyBYpAjoKyJ4DYqdD2BtA7CQI+whYTUiQM5B9A8hWSM5IBJrB+API1klCEk9HYkPtBQFul8zigpzESoUAYwKuJQOUpFaUgGjn\/ILKosz0jBIFR2AopSp45iXr6SgYGRiaMzCAwhyi+nMgOCwZxc4gxJrvMzDY7v\/\/\/\/9uhJjXfgaGjUCdXDsRYhoWDAyC3AwMJ3YWJBYlgoWYgZgpLY2B4dNyBgbeSAYG4QtAPdHFacZGYHlGHicGBtZ7\/\/9\/VmNgYJ\/MwPB3wv\/\/vxf9\/\/93MVDzHQaGA3kAFSFl7jXH0fsAAAAUSURBVBgZY2RgYCgG4lFA+xBgBwClDAB8bLGnrAAAAABJRU5ErkJggg==\" alt=\"pastedGraphic.png\" \/><\/td>\n<\/tr>\n<tr>\n<td valign=\"middle\">Sources of Information<\/td>\n<td rowspan=\"2\" valign=\"middle\">Internal-external compilation<\/td>\n<td rowspan=\"2\" valign=\"middle\">Search and Catch \/ observe, discover, search, detect, collect, capture<\/td>\n<td valign=\"middle\">Type and source of Information<\/td>\n<td valign=\"middle\">Formulation of information needs<\/td>\n<\/tr>\n<tr>\n<td valign=\"middle\">Search for information<\/td>\n<td valign=\"middle\">Search \/ Information gathering<\/td>\n<td valign=\"middle\">Collection of Information<\/td>\n<\/tr>\n<tr>\n<td valign=\"middle\">Analysis of Information<\/td>\n<td rowspan=\"2\" valign=\"middle\">Evaluaci\u00f3n &#8211; Validaci\u00f3n<span class=\"Apple-converted-space\">\u00a0<\/span><\/p>\n<p><img decoding=\"async\" src=\"data:image\/png;base64,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\" alt=\"pastedGraphic_1.png\" \/><\/td>\n<td rowspan=\"2\" valign=\"middle\">Analysis and organization \/ Analyze, Treat and Store<\/td>\n<td valign=\"middle\">Analysis of the information<\/td>\n<td valign=\"middle\">Analysis of the information<\/td>\n<\/tr>\n<tr>\n<td valign=\"middle\">Validation of Information<\/td>\n<td valign=\"middle\">Validation and adjustments<\/td>\n<td valign=\"middle\"><\/td>\n<\/tr>\n<tr>\n<td valign=\"middle\">Intelligence report<\/td>\n<td valign=\"middle\"><\/td>\n<td valign=\"middle\">Intelligence \/ added value, influence strategy<\/td>\n<td valign=\"middle\"><\/td>\n<td valign=\"middle\"><\/td>\n<\/tr>\n<tr>\n<td valign=\"middle\">Organizational<span class=\"Apple-converted-space\">\u00a0 <\/span>flows of<span class=\"Apple-converted-space\">\u00a0 <\/span>internal information, Diffusion<\/td>\n<td valign=\"middle\">Dissemination<\/td>\n<td valign=\"middle\">Communication: to managers, disseminate information, transfer knowledge<\/td>\n<td valign=\"middle\">Diffusion of the Information<\/td>\n<td valign=\"middle\">Dissemination of the Information<\/td>\n<\/tr>\n<tr>\n<td valign=\"middle\">Decision making<\/td>\n<td valign=\"middle\">Decision making<\/td>\n<td valign=\"middle\"><\/td>\n<td valign=\"middle\">Decision making\/ Strategies<\/td>\n<td valign=\"middle\">Application of the Information<\/td>\n<\/tr>\n<tr>\n<td valign=\"middle\"><b>(Porter, et al; 2005<\/b>5<b>; 2007<\/b>9<b>; 2009<\/b>6<b>)<\/b><\/td>\n<td valign=\"middle\"><b>Nossella A-, et al, 2008<\/b>22<\/td>\n<td valign=\"middle\"><b>V\u00e1zquez, L. 2009<\/b>23<\/td>\n<td valign=\"middle\"><b>Norma Francesa de Vigilancia, AFNOR,1998<\/b>24<\/td>\n<td valign=\"middle\"><b>Norma Espa\u00f1ola AENOR<\/b>2<\/td>\n<\/tr>\n<tr>\n<td valign=\"middle\">Definition of FCV Identification of resource information Definition of VT plan<\/td>\n<td valign=\"middle\"><\/td>\n<td valign=\"middle\">Identification of critical competitive and technological factors and problems<\/td>\n<td valign=\"middle\">Understanding of request and context. Definition \/ redefinition of surveillance and purpose axes<\/td>\n<td valign=\"middle\">Identification areas \/ objectives VT system, availability resources \/ information, Problem definition<\/td>\n<\/tr>\n<tr>\n<td rowspan=\"2\" valign=\"middle\">Search and Capture<\/td>\n<td rowspan=\"2\" valign=\"middle\">Collection of Data<\/td>\n<td rowspan=\"2\" valign=\"middle\">Identification and selection of sources of relevant information. Looking for information<\/td>\n<td valign=\"middle\">Determination of types of information, identification \/ selection of information sources<\/td>\n<td valign=\"middle\">Identification of Sources<span class=\"Apple-converted-space\">\u00a0<\/span><\/td>\n<\/tr>\n<tr>\n<td valign=\"middle\">Collection and selection of information<\/td>\n<td valign=\"middle\">Search<\/td>\n<\/tr>\n<tr>\n<td valign=\"middle\">Treatment and Analysis<\/td>\n<td valign=\"middle\">Analysis of data<\/td>\n<td valign=\"middle\">Analysis of Information. Analysis of Results<\/td>\n<td valign=\"middle\">Analysis and Organization<\/td>\n<td valign=\"middle\">Analysis and Organization<\/td>\n<\/tr>\n<tr>\n<td valign=\"middle\">Validation and Exploitation<\/td>\n<td valign=\"middle\">Organization \/ Purpose \/ implementation<\/td>\n<td valign=\"middle\">Competitive Intelligence<\/td>\n<td valign=\"middle\">Validation and adjustment \/ Synthesis and perspective<\/td>\n<td valign=\"middle\">Validation of the Information<\/td>\n<\/tr>\n<tr>\n<td valign=\"middle\"><\/td>\n<td valign=\"middle\">Diffusion of information<\/td>\n<td valign=\"middle\">Distribution of the Results<span class=\"Apple-converted-space\">\u00a0<\/span><\/td>\n<td valign=\"middle\">Communication of the Results<\/td>\n<td valign=\"middle\">Preparation of a report<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p><i>Tabla 1. Processes described in technological surveillance methodologies<\/i><\/p>\n<p>The methodologies present as the most common processes the search and analysis of information. The other processes vary depending on the scope and purpose of the surveillance and the dissemination that is carried out on the results of the same, including the users, as well as the decision-making process. It is appreciated that the technological surveillance &#8220;can be understood as a process, providing information about the technology (intelligence), the prediction of the directions that technological change will take (forecast) or the evaluation and exploration potential of the technologies that an entity must adopt (evaluation) The implementation of an organized system of technological surveillance requires multidisciplinary and horizontal approaches and requires its adaptation to the company&#8217;s environment and culture, and must be integrated into its usual procedures25.<\/p>\n<p><b>TECHNOLOGICAL OBSERVATORY OF THE UNIVERSITY CENTER OF TECHNICAL SCIENCES<\/b><\/p>\n<p>The Web can be seen as a wide and searchable virtual library26,21, which is no longer an object of study, only of librarianship or documentation professionals, to become an essential component for research27,28,29,30, even with the application of methods such as Data Envelopment Analysis (DEA) for the evaluation of the efficiency of research groups based on information from the Andalusian Scientific Information System (SICA) 31 or in support of Science and Technology Systems from the use of studies on the information of publications and patents32. All this information on the web has led to the creation of technological observatories.<\/p>\n<p>A Technological Observatory (OT) allows to manage the knowledge of organizations through the monitoring of the scientific and technological environment, to generate new knowledge. It allows to establish links with other organizations to share and receive information. It must be supported on a virtual platform that allows quick access to it and is aimed at the delivery of products or services resulting from the Technological Surveillance process. OT is known as a way to enhance the ability to detect changes and technological advances, with its degree of maturity and market opportunities. It employs techniques of technological surveillance33.<\/p>\n<p>At the &#8220;Jos\u00e9 Antonio Echeverr\u00eda&#8221; Higher Polytechnic Institute (CUJAE), the creation of the Technological Observatory in December 2006 was promoted in support of strategic planning. The OT portal of the CUJAE was designed using free software, with PHP programming language, with MySQL database manager, based on Joomla content management system (CMS) as Web applications to create and administer sites. contents quickly and easily. Among the most important objectives of the OT of the<\/p>\n<p>CUJAE meet: search, analysis and dissemination about teaching, publications and research in technical universities, the monitoring and publication of bulletins related to strategic research lines, the dissemination of personalized databases and the support of strategic decision making in these areas.<\/p>\n<p>EXPERIMENTATION OF TECHNOLOGICAL SURVEILLANCE IN THE CUJAE<\/p>\n<p>The experimentation on technological surveillance in the CUJAE has been carried out since 2007 to the present. Some of the surveillance studies refer to:<\/p>\n<p>\u2022 Analysis of international engineering and architecture trends in the top 200 universities in the ranking34.<\/p>\n<p>\u2022 The identification of pure and integrated research topics in engineering and architecture.<\/p>\n<p>\u2022 The identification of trends in curricula and models of educational management in the world, in particular for engineering and architecture.<\/p>\n<p>\u2022 The identification of the strategic research programs of the CUJAE, among which are Information and Communication Technologies (ICT), Environment, Life Sciences and Nanotechnologies.<\/p>\n<p>\u2022 The evaluation of innovation indicators of Ibero-American and European countries35. An OT analysis in 2008 with 117 universities from the world&#8217;s top 50036 regarding alignment to strategic research programs yields interesting data such as those shown in Figure 1.<\/p>\n<p>Figure 2 shows another analysis performed on the presence of research in Computer Engineering with 71.4% and Chemistry with 37.1% in the first 63 universities in the world ranking, according to the country of the university of origin.<\/p>\n<p>Figure 2. Representation of research in computer engineering and chemistry in the 63 first universities in the world<\/p>\n<p>As an example, table 2 shows some of the research topics found in the first 63 universities in Computer Engineering.<\/p>\n<table cellspacing=\"0\" cellpadding=\"0\">\n<tbody>\n<tr>\n<td valign=\"middle\"><b>Career<\/b><\/td>\n<td valign=\"middle\"><b>Pure Theme<\/b><\/td>\n<td valign=\"middle\"><b>Tem\u00e1tica integrada<\/b><\/td>\n<\/tr>\n<tr>\n<td valign=\"middle\">Informatic Engineering<\/td>\n<td valign=\"middle\">Science, engineering, computer design and strategy, software engineering, algorithms, programming languages, database management, data mining, machine learning, systems and computational architecture, information web systems, computer security, cryptography, parallel processing , distributed laboratory for digital libraries, interface analysis, integrated and operational systems, optimization systems, multimedia learning, high performance computing<\/td>\n<td valign=\"middle\">Computational biology, biocybernetics, bioinformatics, genome and computational neuroscience, learning systems, computational mathematics, robotics, control systems, compilers, advanced digital applications, analog-digital integrated circuits, computational dynamics of fluids, wireless systems, communications and networks wireless, computer networks, mobile computing and distributed systems, computational geology, computational dynamics, network control, digital signal processing and conduction, digital art, computer man interaction<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p><i>Table 2. Some topics of pure and integrated research in Computer Engineering in the first 63 universities<\/i><\/p>\n<p>ANALYSIS OF OPPORTUNITIES OF PUBLICATION AND PATENTS IN UNIVERSITY AND RESEARCH CENTERS<\/p>\n<p>The extraction of publication opportunities for mainstream journals, which make available abstracts, authors, years of publication, name of the journal, using techniques of mining technology5 is an application that has begun to be carried out in the CUJAE in 2010. If a concept has decreased over time, it could suggest that it has reached its limit of development and vice versa, which would generate an opportunity for publication. In turn, we can obtain the concept in which we are working with the authors that publish the most, establish contacts with them, know the impact of the citations in the research37 or even define the R &amp; D lines for which we have good own resources38.<\/p>\n<p>The sources of external information that the observatory currently has are the publications and patent databases fundamentally. Many of these databases provide RSS content syndication channels (&#8220;Rich Site Summary&#8221; or &#8220;Really Simple Syndication&#8221;) through which you can obtain the information contained in them. They are files in XML format that contain the last elements published by a Web site in a certain subject. Publications are obtained through the ScienceDirect RSS feeds that give free access to the title, the abstract, the authors, the year of publication, the journal, the volume and the number of articles it contains. The patent channels provide metadata such as the title of the patent, the inventor, the year of publication, a summary or description of the invention and the entity where the invention is applied and the scientific news channels allow obtaining the title of the news, the author, the date and a summary. The information provided by these RSS channels are retrieved in a MySQL repository in tables to store the different types of information sources.<\/p>\n<p>A first experimental approach was obtained with all the articles of the Information Systems magazine from 2005 to date, recovering a total of 220 records. Thus, the keywords are obtained from the summary of the article, to which technological mining techniques will be applied. The next minable view that has the fields of title, first author, second author, year and five words is shown in table 3.<\/p>\n<p>Through this information of the minable view, it can be obtained in an initial analysis with visualization techniques: What are the most approached topics ?, What are the leading researchers in a research area ?, What are the trends in the investigation?. In this way, research opportunities are obtained for the university environment. The implementation of this guide for the identification of technological opportunities will be generalized to other impact journals and other sources of information. It is also planned to establish a database with the internal information of the researches carried out, which allows to characterize the internal strengths in terms of scientific research and to be able to focus on journals where the strengths are directly taxed. YALE RapidMiner software will be used, being one of the most used worldwide in techmining, with a very friendly graphic interface.<\/p>\n<p>Other applications of knowledge discovery have been carried out with the use of the Automated System for Patent Surveillance (SiVigPat) 39, such as the study of the development of international patents (United States, Canada and Japan) related to corrosion and the protection40. Thus it was known that the largest number of patent applications are related to chemical additives with a tendency to increase the number of patents in electrochemical protection methods and monitoring from the year 1984. Figure 2 shows the result of the analysis in the fields of selected applications.<\/p>\n<p><b>CONCLUSIONS<\/b><\/p>\n<p>In universities and research centers, it is necessary to implement a technology surveillance methodology that involves as many actors as possible and the use of tools for capturing, analyzing, processing and disseminating information, as well as control indicators for this process and of the strategic research programs themselves.<\/p>\n<p>The Technological Observatory at CUJAE has fostered the development of strategic research programs and lines in the environment of engineering and architecture, allowing the identification of evolution in technological development, which in turn prepares the university for changes in the environment with a strategic focus.<\/p>\n<p>The channels or RSS technology becomes very efficient for obtaining external information (specifically from Science Direct), for technological surveillance in the university environment, together with the technological mining process, favoring clustering, the identification of publishing opportunities and the technological trends.<\/p>\n<p>The use of tools supported in ICT for technological surveillance allows the discovery of useful and relevant knowledge in support of strategies, development and decision making in R + D + i, which was demonstrated with the use of algorithms for the detection of opportunities for publication in the university environment and the use of the SiVigPat by the CNIC for the discovery of patent knowledge, exemplified for patents related to corrosion and protection.<\/p>\n<p><b>REFERENCIAS BIBLIOGR\u00c1FICAS<span class=\"Apple-converted-space\">\u00a0<\/span><\/b><\/p>\n<ol>\n<li>Escorsa, P.; Maspons, R. (2001) De la vigilancia tecnol\u00f3gica a la inteligencia competitiva. Prentice Hall, Madrid.<span class=\"Apple-converted-space\">\u00a0<\/span><\/li>\n<li>UNE 166000 EX (2002). Gesti\u00f3n de la I+D+I: Terminolog\u00eda y definiciones de las actividades de I+D+I. <i>Norma espa\u00f1ola experimental. AENOR, <\/i>Madrid, abril.<span class=\"Apple-converted-space\">\u00a0<\/span><\/li>\n<li>Jakobiak, F. (1992). Exemples commentes de veille. Technologique, Les \u00e9ditions d \u0301organisation. Paris.<\/li>\n<li>COTEC. (2004) Papel de las administraciones en la gesti\u00f3n empresarial de la innovaci\u00f3n. Colecci\u00f3n de innovaci\u00f3n pr\u00e1ctica. Perspectivas de futuro. Fundaci\u00f3n COTEC para la Innovaci\u00f3n tecnol\u00f3gica, Madrid. julio.<span class=\"Apple-converted-space\">\u00a0<\/span><\/li>\n<li>Porter, A. L. and S. W. Cunningham (2005). Tech mining. Exploiting New Technologies for Competitive Advantage. New Jersey, Wiley-Interscience.<span class=\"Apple-converted-space\">\u00a0<\/span><\/li>\n<li>Porter, A. L. (2009). Tech mining for future oriented technology analysis. Text Mining. A. U. M. Project.<span class=\"Apple-converted-space\">\u00a0<\/span><\/li>\n<li>Lichtenthaler, E. (2003). Third generation management of technology intelligence processes. <i>R and D Management <\/i>33(4): 361-375.<span class=\"Apple-converted-space\">\u00a0<\/span><\/li>\n<li>Savioz, P. (2004). Technology Intelligence. Concept Design and Implementation in Technology-based SMEs. Zurich.<span class=\"Apple-converted-space\">\u00a0<\/span><\/li>\n<li>Watts, R. J. and A. L. Porter (2007). Mining Conference Proceedings for Corporate Technology Knowledge Management. <i>International Journal of Innovation and Technology Management <\/i>4(2): 103-119.<span class=\"Apple-converted-space\">\u00a0<\/span><\/li>\n<li>Yoon, B. (2008). On the development of a technology intelligence tool for identifying technology opportunity. <i>Expert Systems with Applications <\/i>35(2008): 11.<\/li>\n<\/ol>\n<p>11.Garud, R. and D. Ahlstrom (1997). Technology assessment: a socio-cognitive perspective. <i>Journal of Engineering and Technology Management <\/i>14(1997): 23.<span class=\"Apple-converted-space\">\u00a0<\/span><\/p>\n<p>12.Anderson, T. R., T. U. Daim, et al. (2008). Technology forecasting for wireless communication. <i>Technovation <\/i>28(9): 602-614.<span class=\"Apple-converted-space\">\u00a0<\/span><\/p>\n<p>13. Zenobia, B., C. Weber, et al. (2009). Artificial markets: A review and assessment of a new venue for innovation research. <i>Technovation <\/i>29(5): 338-350.<span class=\"Apple-converted-space\">\u00a0<\/span><\/p>\n<p>14.Jolly, D. R. (2008). Chinese vs. European views regarding technology assessment: Convergent or divergent? <i>Technovation <\/i>28(12): 818-830.<span class=\"Apple-converted-space\">\u00a0<\/span><\/p>\n<p>15. Morcillo, P. (2003) Vigilancia e inteligencia competitiva: fundamentos e implicaciones.<span class=\"Apple-converted-space\">\u00a0<\/span><\/p>\n<p>Revista de Investigaci\u00f3n en Gesti\u00f3n de la Innovaci\u00f3n y Tecnolog\u00eda. VIGILANCIA TECNOL\u00d3GICA. N\u00famero 17, junio &#8211; julio 2003.<\/p>\n<p>16.Gim\u00e9nez T, E., A Rom\u00e1n (2001). Vigilancia tecnol\u00f3gica e inteligencia competitiva: conceptos, profesionales, servicios y fuentes de informaci\u00f3n. <i>El profesional de la <\/i>informaci\u00f3n 10 (5): 10.<\/p>\n<p>17. Medina J y E Orteg\u00f3n. (2006) Manual de prospectiva y decisi\u00f3n estrat\u00e9gica: bases te\u00f3ricas e instrumentos para Am\u00e9rica Latina y el Caribe. Instituto Latinoamericano y del Caribe de Planificaci\u00f3n Econ\u00f3mica y Social y CEPAL Naciones Unidas. septiembre, Santiago de Chile.<span class=\"Apple-converted-space\">\u00a0<\/span><\/p>\n<ol start=\"18\">\n<li>Mir, M y M. Casades\u00fas (2008). UNE 166002:2006: Estandarizar y sistematizar la I+D+i. La norma y la importancia de las TIC en su implementaci\u00f3n<i>. Revista Investigaci\u00f3n y Desarrollo. <\/i>DYNA Septiembre, Vol. 83, no 6: 325-331.<span class=\"Apple-converted-space\">\u00a0<\/span><\/li>\n<li>Mignogna R. P, (1997).<i>Competitive Intelligence<\/i>. http:\/\/www.chewy.gatech.edu\/t2s\/index\/ html.<\/li>\n<li>S\u00e1nchez, J. Marcela y Palop, F (2002), Herramientas de Software para la pr\u00e1ctica de la Inteligencia Competitiva en la empresa. Ed. Triz XXI. Madrid.<span class=\"Apple-converted-space\">\u00a0<\/span><\/li>\n<\/ol>\n<p>21. Le\u00f3n, A., Castellanos, O. y Vargas, F. (2006). Valoraci\u00f3n, selecci\u00f3n y pertinencia de herramientas de software utilizadas en vigilancia tecnol\u00f3gica. <i>Revista de Ingenier\u00eda e investigaci\u00f3n. <\/i>DYNA 26(1): 92-102.<span class=\"Apple-converted-space\">\u00a0<\/span><\/p>\n<p>22.Nosella Anna, Giorgio Petroni, Rossella Salandra (2008). Technological change and technology monitoring process: Evidence from four Italian case studies, <i>Journal Engineering. Technology Management. <\/i>25 (4) 321\u2013337<span class=\"Apple-converted-space\">\u00a0<\/span><\/p>\n<p>23. V\u00e1zquez Rey, L. (2009). Informe APEI sobre vigilancia tecnol\u00f3gica. Informe APEI 4. <i>APEI<\/i>. Gij\u00f3n, Espa\u00f1a: 64.<span class=\"Apple-converted-space\">\u00a0<\/span><\/p>\n<ol start=\"24\">\n<li>AFNOR, XPX50-053 (1998). Servicios de Vigilancia y Servicios de establecimiento de un Sistema de Vigilancia. <i>Norma francesa experimental<\/i>, abril,<\/li>\n<li>Palop, F.; Vicente, J. M. (1999) Vigilancia tecnol\u00f3gica e Inteligencia competitiva. Su potencial para la empresa espa\u00f1ola. <i>Serie Estudios Cotec<\/i>. N\u00famero 15. Fundaci\u00f3n COTEC. Madrid.<\/li>\n<li>Yao, J. T. and Y. Y. Yao (2003). Web-based Information Retrieval Support System: building research tools for scientists in the new information age. <i>Proceedings of the IEEE\/WIC International Conference on Web Intelligence<\/i>. Marzo.<\/li>\n<\/ol>\n<ol start=\"27\">\n<li>Cook, D. (2000). Collaboration to teach the critical thinking skills needed to become a successful Internet searcher: The planning of a WWW search engine workshop. <i>Research Strategies <\/i>17(2-3): 195-199.<\/li>\n<li>O&#8217;Hanlon, N. (2002). Net knowledge: Performance of new college students on an Internet skills proficiency test. <i>The Internet and Higher Education <\/i>5(1): 55-66.<span class=\"Apple-converted-space\">\u00a0<\/span><\/li>\n<li>Van Deursen, A. J. A. M. and J. A. G. M. van Dijk (2009). Using the Internet: Skill related problems in users&#8217; online behavior. <i>Interacting with Computers. <\/i>21(5-6): 393-402.<\/li>\n<\/ol>\n<p>30.Vasileiadou, E. and R. Vliegenthart (2009). Research productivity in the era of the internet revisited. Research <i>Policy <\/i>38(8): 1260-1268.<span class=\"Apple-converted-space\">\u00a0<\/span><\/p>\n<p>31. Pino JL, Francisco C, Mercedes D, Rosario B (2010). Evaluaci\u00f3n de la eficiencia de grupos de investigaci\u00f3n mediante an\u00e1lisis envolvente de datos (DEA), <i>El profesional de la informaci\u00f3n<\/i>, v. 19, N.2, marzo-abril.<span class=\"Apple-converted-space\">\u00a0<\/span><\/p>\n<p>32.Moed H, W Gl\u00e4nzelg, U Schmoch. (2005). Handbook of Quantitative Science and Technology Research. The use of publication and patent statistics studies on S&amp;T Systems. Springer Science Business Media.<span class=\"Apple-converted-space\">\u00a0<\/span><\/p>\n<p>33. Legite (2003). <i>El Observatorio Tecnol\u00f3gico del sector Textil. Seminario, Dinamizaci\u00f3n<\/i>. 23 de septiembre de 2003. Disponible en: http:\/\/www.itcl.es\/ificheros. Fecha de consulta: 8 de enero de 2008.<span class=\"Apple-converted-space\">\u00a0<\/span><\/p>\n<p>34.http:\/\/universidades.universia.es (2006). Ranking de universidades del mundo. Consultado el 18\/04\/06.<span class=\"Apple-converted-space\">\u00a0<\/span><\/p>\n<p>35.Delgado Mercedes, JL Pino, Sol\u00eds F, Barea R (2008). Evaluaci\u00f3n integrada de la innovaci\u00f3n, la tecnolog\u00eda y las competencias en la empresa. <i>Revista de I+D+i, mi+d. <\/i>N\u00famero 47, junio, Espa\u00f1a.<span class=\"Apple-converted-space\">\u00a0<\/span><\/p>\n<p>36.Delgado M, Yoel A, Marta I, Antonio D, Beatriz G, Olga I, (2009). Observatorio tecnol\u00f3gico en el entorno universitario e investigativo. XIII Seminario de Gesti\u00f3n tecnol\u00f3gica de la Asociaci\u00f3n Latino Iberomericano de gesti\u00f3n tecnol\u00f3gica. Innovaci\u00f3n y creatividad para el desarrollo sostenible. ALTEC 2009. 25-27 Noviembre, Cartagena de Indias, Colombia.<span class=\"Apple-converted-space\">\u00a0<\/span><\/p>\n<p>37. Ajiferuke Isola, Dietmar Wolfram (2009). Citer analysis as a measure of research impact: library and information science as a case study. Scientometrics, Springer, DOI 10.1007\/s11192-009-0127-6,<span class=\"Apple-converted-space\">\u00a0<\/span><\/p>\n<p>38.Mu\u00f1oz J, M Mart\u00ednez, J Vallejo (2006). La vigilancia tecnol\u00f3gica en la gesti\u00f3n de proyectos de I+D+i: recursos y herramientas. <i>El profesional de la informaci\u00f3n<\/i>. v. 15, n. 6, noviembre-diciembre.<span class=\"Apple-converted-space\">\u00a0<\/span><\/p>\n<p>39. Garc\u00eda B, F. Corvo (2007). Patent information in concrete corrosion research. <i>Revista CENIC Ciencias Qu\u00edmicas<\/i>, Vol 38, No 3, 410-414.<span class=\"Apple-converted-space\">\u00a0<\/span><\/p>\n<p>40. Garc\u00eda, B., Zayas, D. (2002) Manual de Usuarios del Sistema Automatizado de Vigilancia de Patentes, SiVigPat\u00ae, v. 3.0. CNIC.<span class=\"Apple-converted-space\">\u00a0<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>The Methodology of Technology Surveillance in Universities and Research Centers\u00a0 Abstract\u00a0 The technological surveillance is very important at the present time in the development and success of the processes of R&amp;D. It is an organized, selective and permanent process, of capturing information of the exterior and of the own organization it has more than enough &hellip; <a href=\"https:\/\/arielsheen.com\/index.php\/2019\/05\/31\/translation-of-methodology-of-technology-surveillance-in-the-universities-and-research-centers\/\" class=\"more-link\">Continue reading<span class=\"screen-reader-text\"> &#8220;Translation of Methodology of Technology Surveillance in the Universities and Research Centers&#8221;<\/span><\/a><\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","enabled":false},"version":2}},"categories":[102,92],"tags":[],"class_list":["post-6136","post","type-post","status-publish","format-standard","hentry","category-phd","category-translation"],"jetpack_publicize_connections":[],"acf":[],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p8e7kf-1AY","jetpack-related-posts":[],"_links":{"self":[{"href":"https:\/\/arielsheen.com\/index.php\/wp-json\/wp\/v2\/posts\/6136","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/arielsheen.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/arielsheen.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/arielsheen.com\/index.php\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/arielsheen.com\/index.php\/wp-json\/wp\/v2\/comments?post=6136"}],"version-history":[{"count":3,"href":"https:\/\/arielsheen.com\/index.php\/wp-json\/wp\/v2\/posts\/6136\/revisions"}],"predecessor-version":[{"id":6140,"href":"https:\/\/arielsheen.com\/index.php\/wp-json\/wp\/v2\/posts\/6136\/revisions\/6140"}],"wp:attachment":[{"href":"https:\/\/arielsheen.com\/index.php\/wp-json\/wp\/v2\/media?parent=6136"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/arielsheen.com\/index.php\/wp-json\/wp\/v2\/categories?post=6136"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/arielsheen.com\/index.php\/wp-json\/wp\/v2\/tags?post=6136"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}