001472091 000__ 03639cam\\22006017i\4500 001472091 001__ 1472091 001472091 003__ OCoLC 001472091 005__ 20230908003329.0 001472091 006__ m\\\\\o\\d\\\\\\\\ 001472091 007__ cr\cn\nnnunnun 001472091 008__ 230728s2023\\\\sz\a\\\\o\\\\\000\0\eng\d 001472091 019__ $$a1391129014 001472091 020__ $$a9783031348433$$q(electronic bk.) 001472091 020__ $$a3031348435$$q(electronic bk.) 001472091 020__ $$z3031348427 001472091 020__ $$z9783031348426 001472091 0247_ $$a10.1007/978-3-031-34843-3$$2doi 001472091 035__ $$aSP(OCoLC)1391343150 001472091 040__ $$aGW5XE$$beng$$erda$$epn$$cGW5XE$$dYDX 001472091 049__ $$aISEA 001472091 050_4 $$aQA76.9.A25 001472091 08204 $$a005.8$$223/eng/20230728 001472091 24500 $$aCybersecurity :$$ba technology landscape analysis /$$cTugrul U. Daim, Marina Dabić, editors. 001472091 264_1 $$aCham, Switzerland :$$bSpringer,$$c2023. 001472091 300__ $$a1 online resource (192 pages) :$$billustrations (black and white, and color). 001472091 336__ $$atext$$btxt$$2rdacontent 001472091 337__ $$acomputer$$bc$$2rdamedia 001472091 338__ $$aonline resource$$bcr$$2rdacarrier 001472091 4901_ $$aApplied innovation and technology management 001472091 5050_ $$a1. Cybersecurity Technology: A Landscape Analysis -- 2. Cybersecurity technology: an analysis of the topic from 2011 to 2021 -- 3. Cybersecurity and Technology Convergence: Analysis of AI, Blockchain, and IoT Using SNA -- 4. Patent Alert System -- 5. Technology Assessment of Cybersecurity -- 6. Science and Technology Gap Analysis of Cybersecurity Technology -- 7. 2030 Roadmap: Cybersecurity in Food E-Commerce -- 8. Cybersecurity Technology Roadmap: Data & Information Security for Smart Grid Industry -- 9. Healthcare Information Systems Security Maturity Assessment -- 10. Mapping the knowledge of cybersecurity in the manufacturing industry -- 11. Technology Domain Analysis: Ecosystem for Proactive Cybersecurity in The Energy Sector. 001472091 506__ $$aAccess limited to authorized users. 001472091 520__ $$aCybersecurity has become a critical area to focus after recent hack attacks to key infrastructure and personal systems. This book reviews the building blocks of cybersecurity technologies and demonstrates the application of various technology intelligence methods through big data. Each chapter uses a different mining method to analyze these technologies through different kinds of data such as patents, tweets, publications, presentations, and other sources. It also analyzes cybersecurity methods in sectors such as manufacturing, energy and healthcare. 001472091 588__ $$aDescription based on print version record. 001472091 650_0 $$aComputer security. 001472091 655_0 $$aElectronic books. 001472091 7001_ $$aDaim, Tugrul Unsal,$$d1967-$$eeditor. 001472091 7001_ $$aDabić, Marina,$$eeditor. 001472091 77608 $$iPrint version:$$tCYBERSECURITY.$$d[Place of publication not identified] : SPRINGER INTERNATIONAL PU, 2023$$z3031348427$$w(OCoLC)1378387048 001472091 830_0 $$aApplied innovation and technology management. 001472091 852__ $$bebk 001472091 85640 $$3Springer Nature$$uhttps://univsouthin.idm.oclc.org/login?url=https://link.springer.com/10.1007/978-3-031-34843-3$$zOnline Access$$91397441.1 001472091 909CO $$ooai:library.usi.edu:1472091$$pGLOBAL_SET 001472091 980__ $$aBIB 001472091 980__ $$aEBOOK 001472091 982__ $$aEbook 001472091 983__ $$aOnline 001472091 994__ $$a92$$bISE