LEADER 03296nam 22006135 450 001 9910735784803321 005 20251008145115.0 010 $a9783031348433 010 $a3031348435 024 7 $a10.1007/978-3-031-34843-3 035 $a(MiAaPQ)EBC30661939 035 $a(Au-PeEL)EBL30661939 035 $a(DE-He213)978-3-031-34843-3 035 $a(PPN)272254347 035 $a(CKB)27757821100041 035 $a(OCoLC)1391439176 035 $a(EXLCZ)9927757821100041 100 $a20230722d2023 u| 0 101 0 $aeng 135 $aurcnu|||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aCybersecurity $eA Technology Landscape Analysis /$fedited by Tugrul U Daim, Marina Dabi? 205 $a1st ed. 2023. 210 1$aCham :$cSpringer International Publishing :$cImprint: Springer,$d2023. 215 $a1 online resource (294 pages) 225 1 $aApplied Innovation and Technology Management,$x2662-9410 311 08$aPrint version: Daim, Tugrul U. Cybersecurity Cham : Springer International Publishing AG,c2023 9783031348426 327 $a1. Cybersecurity Technology: A Landscape Analysis -- 2. Cybersecurity technology: an analysis of the topic from 2011 to 2021 -- 3. Cybersecurity and Technology Convergence: Analysis of AI, Blockchain, and IoT Using SNA -- 4. Patent Alert System -- 5. Technology Assessment of Cybersecurity -- 6. Science and Technology Gap Analysis of Cybersecurity Technology -- 7. 2030 Roadmap: Cybersecurity in Food E-Commerce -- 8. Cybersecurity Technology Roadmap: Data & Information Security for Smart Grid Industry -- 9. Healthcare Information Systems Security Maturity Assessment -- 10. Mapping the knowledge of cybersecurity in the manufacturing industry -- 11. Technology Domain Analysis: Ecosystem for Proactive Cybersecurity in The Energy Sector. 330 $aCybersecurity has become a critical area to focus after recent hack attacks to key infrastructure and personal systems. This book reviews the building blocks of cybersecurity technologies and demonstrates the application of various technology intelligence methods through big data. Each chapter uses a different mining method to analyze these technologies through different kinds of data such as patents, tweets, publications, presentations, and other sources. It also analyzes cybersecurity methods in sectors such as manufacturing, energy and healthcare. 410 0$aApplied Innovation and Technology Management,$x2662-9410 606 $aBusiness information services 606 $aSecurity systems 606 $aTechnological innovations 606 $aIT in Business 606 $aSecurity Science and Technology 606 $aInnovation and Technology Management 615 0$aBusiness information services. 615 0$aSecurity systems. 615 0$aTechnological innovations. 615 14$aIT in Business. 615 24$aSecurity Science and Technology. 615 24$aInnovation and Technology Management. 676 $a005.8 700 $aDaim$b Tugrul U$0954519 701 $aDabic?$b Marina$00 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910735784803321 996 $aCybersecurity$93418566 997 $aUNINA