• Editorial Board +
• For Contributors +
• Journal Search +
Journal Search Engine
ISSN : 1598-7248 (Print)
ISSN : 2234-6473 (Online)
Industrial Engineering & Management Systems Vol.17 No.3 pp.444-453
DOI : https://doi.org/10.7232/iems.2018.17.3.444

# Information Sharing and Security for a Memory Channel Communication Network

Takaaki Kawanaka*, Shuichi Rokugawa, Hiroshi Yamashita
Institute for Innovation in International Engineering Education, Graduate School of Engineering, The University of Tokyo, Tokyo, Japan
Department of Commerce, Meiji University, Tokyo, Japan
Corresponding Author, E-mail: kawanaka@cce.t.u-tokyo.ac.jp
June 11, 2017 February 12, 2018 March 28, 2018

## ABSTRACT

In this study, the authors propose a model describing information sharing and information security measures in an organization using a memory channel communication network (CN). First, the authors highlight communication between the inner members of an organization and communication between inner and outer members, realizing a model describing intra-organizational information sharing and external information leakage. Utilizing this model, the authors determine the percentage of advanced information allocated to inner members most efficient for the organization from the viewpoint of information sharing and information security measures. Then, the allocation percentage is determined considering the structure of the CN and the characteristics of its members. The authors use simple numerical examples in order to confirm whether the model in this study truly represents communication in a real organization. The results confirm that the model is reality-based.

## 1. INTRODUCTION

Communication between the members of an organization involves members gathering and sharing information, and plays an important role in achieving common goals. Smooth communication within an organization is the foundation of maintaining competitive advantage in the case of a corporation (Nonaka et al., 1996). On the other hand, it must be recognized that information sharing involves the division of specific members of an organization into inner and outer members. From the perspective of inner members of an organization, there is information that may be shared with outer members, and information that must not be shared. Recent incidents of information leaks may be identified from this perspective. An example is the raised that South Korean president Park Geun Hye leaked the text of speeches and other confidential information to her old friend Choi Soon-sil, and for which she was arrested (Sang-Hun, 2016, 2017). This problem may be treated as one of information sharing between the inner and outer members of an organization, wherein information was shared with a friend not engaged in an official capacity and outside the president’s administration and the president. When leaks of confidential information similar to these at the national level occur in a private enterprise, then the confidential information is considered to be information on independently developed new technologies, strategic information on mergers or acquisitions, and the private information of customers. When this information is leaked outside of an organization, it leads to loss of corporate competitive advantage and damage to creditworthiness. Corporations and other organizations are presently seeking coexistent information sharing and information security measures (Cedillo-Campos et al., 2014; Vayrynen et al., 2013; Zhang and Li, 2006). Although the active sharing of confidential information may occur within an organization, organizations are not required to share their confidential information shared externally.

A network formed through communication is referred to as a communication network (CN), and many researchers such as Leavitt have previously embarked on studying the structure and characteristics of CN (Guetzkow and Dill, 1957; Leavitt, 1951; Shaw, 1954). Leavitt’s study of CN (Leavitt, 1951) established simple wheel type or Y type CN (Figure 1) as experimental patterns, and used working experiments to derive a relationship between the centrality of these networks and whether leaders appeared, the dissatisfaction of members, the amount of work, and the number of errors.

Thereafter, there have been many studies analyzing the characteristics of CN using such experiments. The authors’ research group has also proposed a series of analytical models for ascertaining the structure of CN through entropy (Ozeki et al., 1985a, 1985b; Ozeki and Katori, 1983; Yamashita, 1996; Yamashita, 2016; Yamashita and Kwon, 2015; Yamashita and Ozeki, 1994). However, past studies of CN aimed for as much active intra-organizational information sharing as possible, which involved specialized information sharing models. This meant that models tended to look at only one of the elements sought by the modern enterprise as described above—either information sharing or information security measures—and were thus divorced from reality.

Therefore, in this study, we will first begin by focusing upon both communication between the inner members of organizations and communication between inner and outer members. Then, we construct a model for ensuring information security outside of an organization while promoting internal information sharing. Next, based on the structure of CN and the characteristics of their members, we intend to find a solution to the problem of which members should receive information in advance for it to be effective in terms of both information sharing and information security measures. In particular, the authors will describe this problem using their proposed analytical model of a memory channel CN (Yamashita, 2016; Yamashita and Kwon, 2015) as a basis. Here, we assume that the probability of information enclosure ui and the probability of blocking information υi are each already known, and consider the problems of ① enlarging the amount of post-event information within an organization minus information outflow as much as possible, and ② estimating the percentage of information allocated in advance di in order to equalize it as much as possible. This allows for an analytical model that simplifies the complicated structure of an actual CN, but enables estimation of the most effective advanced information allocation percentage di in the CN, accounting for information security measures. Thus, by comparing the obtained di to phenomena in actual organizations, we may study the validity of our proposed model.

## 2. INFORMATION SECURITY

In contrast to information sharing is information security. External information security measures must be put in place so that information sharing tightens relationships between members and encourages organizational activity. The previously mentioned information leak by the president of South Korea (Sang-Hun, 2016) and the use of a private e-mail address for official business by Hilary Clinton in the U.S. (Lichtblau and Myers, 2016; Zurcher, 2016) are problems that have affected the political lives of the politicians involved. Information sharing and information security measures conflict with one another. Active information sharing makes it difficult to ensure information security, while strictly tightening information security measures risks creating obstacles to active information sharing. The ideal situation is one where information that is allowed to be shared is actively exchanged among those members who should share it, while information that must not be shared was not.

Hanaoka argues that information “sharing” and “secreting” are mutually opposing concepts, and organizations are bound by the omnipresence of the two. Organizational boundaries must serve as secure walls blocking certain types of information, while simultaneously allowing other types of information to remain seamless and unfenced. For example, setting up supply chain management (SCM) sharing of commonly handled product information is an essential condition for corporations connected to the supply chain. On the other hand, each of the corporations has information that must be kept confidential from the other corporations. In such cases, while complete transparency may be desired for the fences bounding one corporation, complete blocking may also be required at the same time (Bowler, 1981; Hanaoka, 2001; Hanaoka, 2003).

In this study, we shall attempt to analyze the characteristics of individual CN structures by describing the state of their coexistent information sharing and information security measures.

## 3. CONCEPTUAL DESCRIPTIONS OF A CN

CN A system comprised of multiple members or departments linked through intra-group communication is generally called a CN, and in this study, the authors express this as $N = { X ; Γ }$ based on prior research (Ozeki et al., 1985a). Here, if there are n members in a group, and the subscripts i and j are the members (individuals or departments) comprising an organization, then $X = { x 1 , x 2 , ... , x i , ... , x j , ... , x n } .$. In addition, Γ represents the possible communication in direct product space X2 for group X above, and $( x i , x j ) ∈ Γ$ holds when communication is possible between xi and xj Furthermore, the value of the arc (xi, xj) in communication Γ, if it is assumed that the probability of xi passing on information to xj is, pij may be considered a framework for the value graph N' as in formula (1) below (Yamashita, 1996).

$N ' = { X ' ; Γ }$
(1)

where, if there is a group with no arc, and pij is generally pij ＝0, then the matrix $P = ( p i j )$ assuming pij ≧ 0 as an element is generally the channel matrix (transition probability matrix) (Yamashita, 1996).

## 4. PREVIOUS RESEARCHES OF CNS

The research into CNs focused upon in this study divides CN structures into several types, and includes a large amount of research into experimentally analyzing their individual characteristics. A pioneering study in this was the experimental research by Leavitt (Leavitt, 1951). In this study, Leavitt established four types of CN (circle type, chain type, Y type and wheel type) and analyzed individual CNs as to whether leaders appeared, the dissatisfaction of members, the amount of work, and the number of errors. The results confirmed that CNs with higher centrality such as wheel type and Y type tended to see clear leaders and fewer errors, though less work, and that those on the periphery of a CN tended to be very dissatisfied. Subsequently, the authors’ research group also commenced a series of studies to ascertain the structure of a CN according to stationary allocation vectors (Ozeki et al., 1985a, 1985b; Ozeki and Katori, 1983; Yamashita, 1996; Yamashita and Ozeki, 1994). In the course of such studies, the authors have proposed a series of CN allocation models based on the disposition of Markov chains for estimating stationary allocation vectors from a channel matrix, and quantitatively ascertaining the structure of the CN in terms of entropy. These CN analytical models assume a “memoryless channel” CN in which no information remains in the memory of the sender when information is sent. However, as most CNs are actually “memory channel” CNs in which much information remains in the memory of the sender even after sending, the models are therefore divorced from reality. Subsequent studies of memory channels conducted by the authors (Yamashita, 2016; Yamashita and Kwon, 2015) have served as the basis for the present study. As information remains in the memory of the sender, we have made the problem of information security the subject of this study. Next, we will explain research into memoryless channels, followed by research into memory channels.

## 5. ANALYTICAL MODEL OF MEMORYLESS CHANNEL CN

In order to address the problem of how information should be allocated when there is repeated communication in a CN, the authors have proposed the following analytical model of a memoryless channel CN to estimate the allocation of information when each member is free to repeatedly communicate (Yamashita, 1996).

First, if it is assumed that the previously described channel matrix $P = ( p i j )$ and initial vector $a = ( a i )$ are already known, and P does not change in relation to time t, then

$s = lim t → ∞ a ⋅ P t$
(2)

is the stationary allocation vector $s = ( s i ) ,$ which expresses the allocation of information when there is freely repeated communication in a memoryless channel CN, provided that $s = ( s 1 , s 2 , ... , s i , ... , s n )$ and $a = ( a 1 , a 2 , ... , a i , ... , a n ) ,$ The above formula (2) expresses the probability that information is present with member xi when there is freely repeated communication; in other words, the allocation of information within a CN. This means that as long as a member has a large element si for stationary allocation vector s, they are a critical member for whom a large amount of information is collected. If matrix P (channel matrix) information is compressed into vectors according to this stationary allocation vector s, then it is possible to simplify a CN structure in describing it (Yamashita, 1996).

However, although the right side of formula (2) converges in the case of an aperiodic CN, it does not converge in the case of a periodic CN; therefore, it is possible to consider dividing aperiodic and periodic cases.

### <Aperiodic>

Depending on the disposition of Markov chains, in aperiodic CN formula (2) converges, and satisfies formula (3) at this time (Ozeki et al., 1985a).

$s ⋅ P = s$
(3)

Consequently, by solving the simultaneous equation in formula (3), we can find the stationary allocation vector s. In addition, since formula (3) returns to an characteristic value problem, if element n (number of members) in s is large, then if characteristic equation $( P T − λ ⋅ I ) ⋅ s T = 0$ is solved, and characteristic vector sT for characteristic value λ =1 (this is the maximum characteristic value (Kunisawa, 1975) is standardized so that the sum of the element is 1, then it is possible to find a solution for stationary allocation vector s.

### <Periodic>

In cases of a periodic CN, formula (2) does not converge; therefore, as in formula (4), the mean of each element qi(t) of the reliability vector q(t) for time t must be the stationary allocation vector s. When this happens, if the period is c, each element si of the stationary allocation vector may be expressed as in formula (4) (Yamashita, 1996).(5)

$s i = ∑ t = 1 c q i ( t ) / c$
(4)

$Provided that, q ( t ) = a ⋅ P t$
(5)

These models are all of memoryless channels, in which no memory of information is left with the sender of information.

## 6. CN ANALYTICAL MODEL OF MEMORY CHANNEL CN

In the previous section, we explained a method of expanding a memoryless channel CN model into a memory channel CN model. In situations in which a memory of information is left with the sender, situations arise in which the sender themselves holds important information and other members do not; that is, there is asymmetry in the information. In such circumstances, the sender is placed in the advantageous state of holding important information, and would be expected to enclose information in order to maintain superiority. In other words, the sender maintains information asymmetry by “enclosing” the information. The analytical model of a memory channel CN proposed by the authors in prior research (Yamashita, 2016; Yamashita and Kwon, 2015) is one for estimating the “advanced information allocation percentage,” by which more information is passed onto members within the CN, based upon consideration of “information enclosure” in which an information holder attempts to maintain “information asymmetry.” We will explain this below.

First, we assume the “information enclosure probability” of member xi comprising a memory channel CN to be , ui and then formulate the relationship of the information “enclosure matrix E (= unit matrix),” “nonenclosure matrix B,” allocation percentage vector for advanced information $d = ( d i ) ,$ and post-event information vector $y = ( y j )$ as in formula (6). However, information non-enclosure matrix B is a square matrix in graph theory in which $b i j ( = ( 1 − u i ) ⋅ g i j )$ is an element that applies information non-enclosure probability $( 1 − u i )$ to an element gij of an adjacency matrix $G = ( g i j ) .$ This element gij of an adjacency matrix G is a dummy variable that takes the value 1 when a member xi can transmit information to a member xj (an arc is present between xi and xj ) and 0 when it is not.

$y = d ( E + B )$
(6)

Next, based on formula (6), we find the allocation percentage for advanced information di such that ① it enlarges the amount of post-event information as much as possible, and ② it equalizes the advanced information allocation percentage as much as possible. Hence, according to a one-factor information channel model (Kunisawa, 1975) approach, we ascertain ① according to the weighted mean L of the inverse (1/ri) of the total per i of elements rij in the information transfer matrix $R ( = E + B )$ (formula (7)), and formulate ② as a maximization problem of H/L as in formula (9) by ascertaining it according to the allocation entropy H of advanced information (formula (8)). However, λ is a Lagrange multiplier. One method according to a one-factor information channel model is to reach a conclusion based upon inference (expanded inference) (Klir and Folger, 1988) from given information (insufficient evidence) when people or organizations are making decisions, such as when a conclusion is not reached. In particular, the above expanded inference is formulated as a maximization problem of Shannon entropy (Shannon, 1948) from the perspective that evidence ought to be fully recognized as being insufficient, while at the same time people or organizations are maximizing the same use of insufficient evidence, and then the choice probability in decision making is estimated (Arizono and Ohta, 1986; Herniter, 1973; Kapur et al., 1984; Yamashita, 2014).

$L = ∑ i d i ⋅ ( 1 / ∑ j r i j )$
(7)

$H = − ∑ i d i ⋅ log d i$
(8)

(9)

where, φ is convex relative to di, so when φ is partially derived by di and denotes 0, formula (10) is obtained.

$δ φ δ d i = ( H ' ⋅ L − H ⋅ L ' ) / L 2 + λ = { ( − log d i − 1 ) ⋅ L − H ⋅ ( 1 / ∑ j r i j ) } / L 2 + λ = 0$
(10)

Next, we apply di to both sides of formula (10), which if summed up by i becomes(11)

(11)

Thus, Lagrange multiplier λ becomes λ = 1/L. Therefore, when we substitute 1/L for λ in formula (10),(12)

${ ( − log d i − 1 ) ⋅ L − H ⋅ ( 1 / ∑ j r i j ) } / L 2 + 1 / L = { − ( log d i ) ⋅ L − H ⋅ ( 1 / ∑ j r i j ) } / L 2 = 0$
(12)

as a result, the following is obtained. (Kunisawa, 1975)(13)

$d i = e x p { − ( H / L ) ⋅ ( 1 / ∑ j r i j ) }$
(13)

where, if $e x p { − H / L } = W ,$, then the following simple formula is derived.

$d i = W 1 ∑ j r i j$
(14)

Furthermore, using the fact that the sum of di is 1 to numerically determine W, and substituting this W in formula (14), a solution is found for di, maximizing formula (9) (Kunisawa, 1975).

In this manner, by expanding the model from one for memoryless channels to one for memory channels, it becomes possible to more realistically describe the exchange of information between people. As in the above, it becomes possible to describe actual events in which the sender of information in an organization encloses the information, and thereby the applicability of the model is further widened in scope.

## 7. PROPOSED MODEL IN THIS STUDY

STUDY In this chapter, we will propose a model incorporating consideration of information security measures into the model in the preceding section. This may also be considered an example of applying a memory channel-based model. Here, information security will involve the handling of information such as that for new product development or that should only be handled intra-organizationally; in other words, information that should not be given to outer members. We will refer to such information as confidential information. Confidential information such as that for new product development should be carefully handled by intra-organizational members for the development of competitively advantageous products and enacting sales strategy. When such confidential information is shared with outer members of an organization, it may lead to a corporation losing competitive advantage to other companies. Confidential information should be shared as much as possible within an organization; however, it needs to be blocked to outside of the organization (Tan et al., 2016; Zhang et al., 2011). Here, we shall consider a communication network in which an outer member of an organization is represented by x6 as in Figure 2.

The exchange of information between x1 to x5 and x6 in Figure 2 is between the inner and outer members of an organization. Furthermore, in addition to the probability of information enclosure ui of members $x i ( i = 1 , ... , 5 )$ comprising the CN, members $x i ( i = 1 , ... , 5 )$ newly provide the probability of blocking information $v i ( i = 1 , ... , 5 )$ from an outer member 6x . In order to discuss only the outflow of information to outer member x6, the information outflow will be one-way only in this section. Consequently, the information transfer matrix $R ( = E + B )$ will consist of five rows and six columns (E and B are both five rows and six columns). The elements $r i j ( i = 1 , ... , 5 , j = 1 , ... , 6 )$ are, for example, represented as follows in a Y type CN. The elements in the sixth column of this matrix are minus the probability of blocking information υi from 1, and represent the information flowing to outside of an organization.

$R = ( 1 0 1 − u 1 0 0 1 − v 1 0 1 1 − u 2 0 0 1 − v 2 1 − u 3 1 − u 3 1 1 − u 3 0 1 − v 3 0 0 1 − u 4 1 1 − u 4 1 − v 4 0 0 0 1 − u 5 1 1 − v 5 )$

In this study, the focus is upon information security in a communication network. Here, using the previously explained memory channel CN analytical model as a basis, we shall prepare a model focusing upon information sharing and information security measures. Therefore, first, we shall assume that the probability of information enclosure ui and the probability of blocking information vi are each already known, and furthermore, shall consider the problems of ① enlarging the amount of postevent information within an organization minus information outflow as much as possible, and ② estimating the percentage of information allocated in advance di in order to equalize it as much as possible. Inner members of an organization should share information as much as possible, while there should be as little transmission as possible of confidential information from inner members to outer members. Such an organization is one in which both information sharing and information security measures have been established. This situation will be modeled according to a one-factor information channel model (Kunisawa, 1975; Yamashita, 2014) approach, as in prior research (Yamashita, 1996; Yamashita and Kwon, 2015). Now, we may ascertain ① according to the weighted mean L of the inverse of the value of subtracting $( 1 − v i ) ,$, which represents the outflowing information, from the total per i of elements rij in the information transfer matrix $R ( = E + B )$ (formula (16)), and if ② may be ascertained according to the advanced information allocation entropy H (formula (15)), then information security problems in an organization may be formulated as in formula (17) as a maximization problem of H/L. Here, enlarging the amount of information that may be transmitted by inner members of an organization, and reducing the amount of information transmitted by inner members to outer members as much as possible, is the same as enlarging the denominator within the parentheses in formula (16).

$H = − ∑ i = 1 5 d i ⋅ log d i$
(15)

$L = ∑ i = 1 5 { d i ⋅ 1 ∑ j = 1 5 r i j − ( 1 − v i ) }$
(16)

(17)

where, φ is convex relative to , di so when φ is partially derived by di and denotes 0, formula (18) is obtained.

$δ φ δ d i = ( H ′ ⋅ L − H ⋅ L ′ ) / L 2 + λ = [ ( − log d i − 1 ) ⋅ L − H ⋅ { 1 ∑ j = 1 5 r i j − ( 1 − v i ) } ] / L 2 + λ = 0$
(18)

Next, we apply di to both sides of formula (18), which if summed up by i becomes(19)

${ ( H − 1 ) ⋅ L − H ⋅ L } / L 2 + λ = 0$
(19)

Thus, Lagrange multiplier λ becomes λ=1/L. Therefore, when we substitute 1/L for λ in formula (18),(20)

$[ ( − log d i − 1 ) ⋅ L − H ⋅ { 1 ∑ j = 1 5 r i j − ( 1 − v i ) } ] / L 2 + 1 / L = [ − ( log d i ) ⋅ L − H ⋅ { 1 ∑ j = 1 5 r i j − ( 1 − v i ) } ] / L 2 = 0$
(20)

as a result, the following is obtained.(21)

$d i = e x p [ − ( H / L ) ⋅ { 1 ∑ j = 1 5 r i j − ( 1 − v i ) } ]$
(21)

Here, if $e x p [ − H / L ] = W ,$

$d i = W 1 ∑ j = 1 5 r i j − ( 1 − v i )$
(22)

where the sum of di is 1; therefore, it is possible to numerically determine one W such that the sum from putting i into formula (22) is 1. Furthermore, by substituting this W into formula (22), it is possible to determine a solution for di that maximizes formula (17).

## 8. EMPIRICAL ANALYSIS OF PROPOSED MODEL ACCORDING TO SIMPLE NUMERICAL EXAMPLES

Using the proposed model in this study, we shall perform an empirical analysis according to simple numerical examples. We establish numerical examples as in Tables 1 and 2 for a memory channel CN comprised of a total of six organizational members: five inner members and one outer member as shown in Figure 2. Thus, when we estimated the advanced information allocation probability , di we obtained the results in Tables 3 to 10. The greyedout sections of the tables indicated the largest of the five $d i ( d 1 , ... , d 5 )$ in a column. Tables 4, 5, 6, 7, 8, 9

＜numerical examples＞

(M. is an abbreviation for Measure.)

According to the results in Tables 3 to 10, we found that members with a small probability of information enclosure ui for information but a large probability of blocking information vi had a large advanced information allocation probability di. Here, we provide a circle type with the lowest centrality, which is little affected by the type of CN, for explanation (Tables 3 and 4). Case-1 and Case-2 in Table 3 are entirely the same in the results of estimating advanced information allocation di. In Table 1, the enclosure probability for information enclosure ui according to the inner members is entirely the same. Furthermore, in Table 2, the probability of blocking information vi according to the inner members is the same. This means that if the inner members consciously take the same action against closuring and the blocking for information, it can be understand as representing that they are able to get the information allocation with same probability. Next we discuss Case-3 to 6, then almost all of the greyed-out sections correspond to places where the probability of information enclosure ui was the smallest value of 0.1. Above all, places where the font is Gothic correspond to places where the probability of information enclosure ui was the smallest value of 0.1, and the probability of blocking information vi was the largest value of 0.9. This indicates that while information was being actively shared between members within an organization, advanced information should most often be allocated to exemplary members capable of strictly blocking confidential information to outside of the organization. In an actual organization, a state in which both information sharing and information security measures have been firmly established is an ideal one. However, it was felt that the analytical results from our models were valid and in conformance with reality.

Next, when we focus upon the type of CN, we find that CN structures with high centrality (Y type and wheel type) tend to be more scattered in the advanced information allocation percentage di among members than CN types with low centrality (circle type and chain type). As examples, let us explain focusing upon Case-4 and Measure 6 for each CN (places circled with a large border in Tables 4, 6, 8 and 10). In these places, the difference between the largest value and smallest value in the five di$( d 1 , ... , d 5 )$ in the column was 0.293 (circle type), 0.350 (chain type), 0.434 (Y type) and 0.529 (wheel type). The size of the difference depended upon whether a CN structure had high centrality. In addition, when we calculate the entropy for the five di in these places, it is 1.934 (circle type), 1.889 (chain type), 1.749 (Y type) and 1.723 (wheel type). Thus entropy was smaller the higher the centrality. This means that the concentration on specific members is higher, the more allocation of advanced information. In other words, the allocation percentage di for advanced information ought to be differentiated in as much as a network has significant differences in the amount size of communication between members. It is felt that these results conform to reality.

Furthermore, when we focus upon the greyed-out sections in Tables 3 to 10, in Tables 3 to 6 (circle type and chain type), there is a large amount of scattering of the greyed-out sections. However, in Tables 7 to 10 (Y type and wheel type), except for Case-6, the greyed-out sections are largely concentrated on x3. This indicates that in CN structures with high centrality, except for Case-6, advanced information allocation mostly went to 3x . In this case, the probability of information enclosure ui for information of x3 is large, and the probability of information enclosure ui for information of those on the periphery $( x 1 , x 2 , x 4 , x 5 )$ is small. When this happens, in many cases, advanced information allocation mostly goes to those on the periphery. In an actual organization, it is felt that allocating a lot of information among members who will share it without enclosure will result in active intra-organizational communication, so it is felt that the results here conform to reality. On the other hand, in cases such as Case-6, if the probability vi of those on the periphery blocking information is small (Case-6 in Tables 8 and 10, Measure 6), then more information will be allocated to x3 than to those on the periphery. This may be said to be the result of measures for members in order to prevent information leakage affecting the advanced information allocation probability di.

## 9. CONCLUSION

In this study, we proposed a CN model capable of describing information security problems, based upon research into memory channel CN in which a memory of information is left with its sender and advancements in the field, and past quantitative CN research using memoryless channels. We established two types of members comprising CN: inner members and outer members of an organization. We then estimated the advanced information allocation percentage of each member, so that information would be equally passed on between inner members as much as possible, while minimizing the outflow of confidential information from inner members to outer members. Thus, we used the proposed model in this study to conduct an empirical analysis using simple numerical examples, and as a result, obtained estimated values for advanced information allocation percentages in close conformance with reality. This is considered to be indicative of the validity of the proposed model. We hope that the results of this study may provide some suggestions for intra-organizational information sharing and information security measures.

## ACKNOWLEDGEMENT

This study is partially supported by JSPS KAKENHI Grant Number 16KT0101.

## Figure

Communication networks established by Leavitt (Leavitt, 1951).

Communication network with outer member x6.

## Table

Probability of information enclosure ui according to inner members xi(i=1, ..., 5)

Probability of blocking information vi to outer member x6 according to inner members xi

Results of estimating advanced information allocation di according to the proposed model in this study (Circle type Case-1-3)

Results of estimating advanced information allocation di according to the proposed model in this study (Circle type Case-4-6)

Results of estimating advanced information allocation di according to the proposed model in this study (Chain type Case-1-3)

Results of estimating advanced information allocation di according to the proposed model in this study (Chain type Case-4-6)

Results of estimating advanced information allocation di according to the proposed model in this study (Y type Case-1-3)

Results of estimating advanced information allocation di according to the proposed model in this study (Y type Case-4-6)

Results of estimating advanced information allocation di according to the proposed model in this study (Wheel type Case-1-3)

Results of estimating advanced information allocation di according to the proposed model in this study (Wheel type Case-4-6)

## REFERENCES

1. Arizono, I. and Ohta, H. (1986), A entropy model for marketing structure analysis and price decision of new brand , Naval Research Logistics Quarterly, 33(2), 251-260.
2. Bowler, T. D. (1981), General system theory: In scope and applicability, Elsevier North Holland, New York.
3. Cedillo-Campos, M. G. , Sanchez-Ramirez, C. , Vadali, S. , Villa, J. C. , and Menezes, M. B. C. (2014), Supply chain dynamics and the cross-border effect : The U.S.-Mexican border s case , Computers and Industrial Engineering, 72, 261-273.
4. Guetzkow, H. and Dill, W. R. (1957), Factors in the organizational development of task-oriented groups , Sociometry, 20(3), 175-204.
5. Hanaoka, S. (2001), Using IT to Improve Communication between Boundaries of Organizations: Case studies in Japanese Companies, Proceeding (CD-ROM ), 2001Information Science Conference, June 19-22Kracow, Poland.
6. Hanaoka, S. (2003), Boundaries of organizations and information ethics, Hakuto-Shobo Publishing Company. Herniter, J. D. (1973), An entropy model of brand purchase behavior , Journal of Marketing Research, 10(4), 361-375.
7. Kapur, J. N. , Bector, C. R. , and Kumar, U. (1984), A generalization of the entropy model for brand purchase behavior , Naval Research Logistics Quarterly, 31(2), 183-198.
8. Klir, G. J. and Folger, T. A. (1988), Fuzzy sets, uncertainty, and information, London: Prentice-Hall.
9. Kunisawa, K. (1975), Entropy model, JUSE Press, Ltd.
10. Leavitt, H. J. (1951), Some effects of certain communication patterns on group performance , Journal of Abnormal and Social Psychology, 46(1), 38-50.
11. Lichtblau, E. and Myers, S. L. (2016), Ex-F.B.I official acknowledges role in new Clinton email controversy, The New York Times (Oct. 18, 2016), http://www.nytimes.com/2016/10/19/us/politics/ex-fbi-official-hillaryclinton-email.html(2018.2.7).
12. Nonaka, I. , Takeuchi, H. , and Umemoto, K. (1996), The knowledge creating company, Toyo Keizai Inc.
13. Ozeki, M. and Katori, T. (1983), A structural analysis of communication network , Proceedings of Spring National Conference ofJapanIndustrial Management Association, 108-109.
14. Ozeki, M. , Ohno, T. , Yamashita, H. , and Hayakawa, A. (1985a), Effectiveness of organization in communication network considering learning: A structural analysis of communication network (Part 3 ), Proceedings of Spring National Conference ofJapanIndustrial Management Association, 219-220.
15. Ozeki, M. , Ohno, T. , Yamashita, H. , and Yotsumoto, Y. (1985b), Communication network considering differenceof personal ability: A structural analysis of communication network (Part 2 ), Proceedings of Spring National Conference ofJapanIndustrial Management Association, 217-218.
16. Sang-Hun, C. (2016), A presidential friendship has many South Koreans crying foul, The New York Times (Oct. 27, 2016), http://www.nytimes.com/2016/10/28/world/asia/south-korea-choi-soon-sil.html?rref=collection%2Ftimestopic%2FPark%20Geun-hye&action=click&contentCollection=timestopics&region=stream&module=stream_unit&version=latest&contentPlacement=76&pgtype=collection&_r=0(2018.2.7).
17. Sang-Hun, C. (2017), Park Geun-hye, South Korea s ousted leader, Is arrested and jailed to await trial,The New York Times (Mar. 30, 2017), https://www.nytimes.com/2017/03/30/world/asia/park-geun-hyesouth-korea-arrest.html (2018.4.22).
18. Shannon, C. E. (1948), A mathematical theory of communication, The Bell System Technical Journal, 27(3), 379-423, 27(4), 623-656.
19. Shaw, M. E. (1954), Some effects of problem complexity upon problem solution efficiency in different communication nets , Journal of Experimental Psychology, 48(3), 211-217.
20. Tan, K. H. , Wong, W. P. , and Chung, L. (2016), Information and knowledge leakage in supply Chain , Information Systems Frontiers, 18(3), 621-638.
21. Vayrynen, K. , Hekkala, R. , and Liias, T. (2013), Knowledge protection challenges of social media encountered by organizations , Journal of Organizational Computing and Electronic Commerce, 23(1-2), 34-55.
22. Yamashita, H. (1996), Human resource management: Theory and practice, Tokyo Keizai Joho Publishing Company. Yamashita, H. (2014), A single factor model of information channel using the standardized fuzzy entropy , The Bulletin of the Faculty of Commerce Meiji University, 96(4), 1-11.
23. Yamashita, H. (2016), An allocation model of prior information considering information importance in communication network , Proceedings of 56th National Conference ofJapanAssociation for Management Systems, 134-137.
24. Yamashita, H. and Kwon, S. (2015), An allocation model of prior information in communication network , Proceedings of 12th National Conference ofJapanAssociation for Communication, Information and Society, 36-39.
25. Yamashita, H. and Ozeki, M. (1994), A quantitative analysis model for communication accompanied withlearning in an organization , Journal of Japan Industrial Management Association, 44(6), 495-500.
26. Zhang, C. and Li, S. (2006), Secure information sharing in internet based supply chain management systems , Journal of Computer Information Systems, 46(4), 18-24.
27. Zhang, D. Y. , Zeng, Y. , Wang, L. , Li, H. , and Geng, Y. (2011), Modeling and evaluating information leakage caused by inferences in supply chains , Computers in Industry, 62(3), 351-363.
28. Zurcher, A. (2016), Hillary Clinton emails: What's it all about?, BBC News (Nov. 6, 2016), http://www.bbc.com/news/world-us-canada-31806907(2018.2.7).