“…Research projects in this area investigate technologies to apply them in a specific security and defence application field (Thorleuchter, Van den Poel, & Prinzie, 2010b). Thus, some of them may be a profitable target for espionage and they have to be protected from information leakage hazard (Thorleuchter & Van den Poel, 2011c;Thorleuchter, Weck, & Van den Poel, 2012a;Thorleuchter, Weck, & Van den Poel, 2012b).…”