Cybersecurity has become a critical area to focus after recent hack attacks to key infrastructure and personal systems. This book reviews the building blocks of cybersecurity technologies and demonstrates the application of various technology intelligence methods through big data. Each chapter uses a different mining method to analyze these technologies through different kinds of data such as patents, tweets, publications, presentations, and other sources. It also analyzes cybersecurity methods in sectors such as manufacturing, energy and healthcare.
Cybersecurity has become a critical area to focus after recent hack attacks to key infrastructure and personal systems. This book reviews the building blocks of cybersecurity technologies and demonstrates the application of various technology intelligence methods through big data. Each chapter uses a different mining method to analyze these technologies through different kinds of data such as patents, tweets, publications, presentations, and other sources. It also analyzes cybersecurity methods in sectors such as manufacturing, energy and healthcare.
Tugrul U. Daim is Professor at the Maseeh College of Engineering and Computer Science and the Associate Director at the Mark O. Hatfield Cybersecurity & Cyber Defense Policy Center at Portland State University (Oregon, USA). He is also an Honorary Chair Professor at Chaoyang University of Technology in Taiwan. Dr. Daim is recognized worldwide for his research leadership in roadmapping and forecasting technologies. He was recently awarded a Fulbright grant. Marina Dabic is Full Professor of Entrepreneurship and International Business in the Faculty of Economics & Business at University of Zagreb, Croatia and Nottingham Business School, Nottingham Trent University, UK. Her research areas include entrepreneurship, international business, innovation, knowledge management, management of technology and the impact of innovation on CEE countries and has appeared in a wide variety of international journals.
Inhaltsangabe
1. Cybersecurity Technology: A Landscape Analysis.- 2. Cybersecurity technology: an analysis of the topic from 2011 to 2021.- 3. Cybersecurity and Technology Convergence: Analysis of AI, Blockchain, and IoT Using SNA.- 4. Patent Alert System.- 5. Technology Assessment of Cybersecurity.- 6. Science and Technology Gap Analysis of Cybersecurity Technology.- 7. 2030 Roadmap: Cybersecurity in Food E-Commerce.- 8. Cybersecurity Technology Roadmap: Data & Information Security for Smart Grid Industry.- 9. Healthcare Information Systems Security Maturity Assessment.- 10. Mapping the knowledge of cybersecurity in the manufacturing industry.- 11. Technology Domain Analysis: Ecosystem for Proactive Cybersecurity in The Energy Sector.
1. Cybersecurity Technology: A Landscape Analysis.- 2. Cybersecurity technology: an analysis of the topic from 2011 to 2021.- 3. Cybersecurity and Technology Convergence: Analysis of AI, Blockchain, and IoT Using SNA.- 4. Patent Alert System.- 5. Technology Assessment of Cybersecurity.- 6. Science and Technology Gap Analysis of Cybersecurity Technology.- 7. 2030 Roadmap: Cybersecurity in Food E-Commerce.- 8. Cybersecurity Technology Roadmap: Data & Information Security for Smart Grid Industry.- 9. Healthcare Information Systems Security Maturity Assessment.- 10. Mapping the knowledge of cybersecurity in the manufacturing industry.- 11. Technology Domain Analysis: Ecosystem for Proactive Cybersecurity in The Energy Sector.
Es gelten unsere Allgemeinen Geschäftsbedingungen: www.buecher.de/agb
Impressum
www.buecher.de ist ein Internetauftritt der buecher.de internetstores GmbH
Geschäftsführung: Monica Sawhney | Roland Kölbl | Günter Hilger
Sitz der Gesellschaft: Batheyer Straße 115 - 117, 58099 Hagen
Postanschrift: Bürgermeister-Wegele-Str. 12, 86167 Augsburg
Amtsgericht Hagen HRB 13257
Steuernummer: 321/5800/1497
USt-IdNr: DE450055826