{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,14]],"date-time":"2026-03-14T00:27:32Z","timestamp":1773448052964,"version":"3.50.1"},"publisher-location":"Cham","reference-count":40,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783319125732","type":"print"},{"value":"9783319125749","type":"electronic"}],"license":[{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-319-12574-9_12","type":"book-chapter","created":{"date-parts":[[2014,11,21]],"date-time":"2014-11-21T13:38:31Z","timestamp":1416577111000},"page":"135-147","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["An Integrated Framework for Innovation Management in Cyber Security and Privacy"],"prefix":"10.1007","author":[{"given":"Dharm","family":"Kapletia","sequence":"first","affiliation":[]},{"given":"Massimo","family":"Felici","sequence":"additional","affiliation":[]},{"given":"Nick","family":"Wainwright","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,11,18]]},"reference":[{"issue":"2","key":"12_CR1","doi-asserted-by":"publisher","first-page":"14","DOI":"10.1109\/MSP.2013.31","volume":"11","author":"D Maughan","year":"2013","unstructured":"Maughan, D., Balenson, D., Lindqvist, U., Tudor, Z.: Crossing the \u201cValley of Death\u201d: transitioning cybersecurity research into practice. IEEE Secur. Priv. 11(2), 14\u201323 (2013)","journal-title":"IEEE Secur. Priv."},{"key":"12_CR2","doi-asserted-by":"crossref","unstructured":"Anderson, R., Boehme, R., Clayton, R. Moore, T.: Security Economics and the Internal Market. ENISA (2008)","DOI":"10.1007\/978-0-387-09762-6_3"},{"key":"12_CR3","unstructured":"Downey, F.: Bridging the \u201cvalley of death\u201d: Response to the House of Commons Science and Technology Select Committee Bridging the \u201cvalley of death\u201d: Improving the Commercialisation of Research Inquiry from Engineering the Future. The Royal Academy of Engineering, London (2012)"},{"issue":"3\u20134","key":"12_CR4","doi-asserted-by":"publisher","first-page":"227","DOI":"10.1023\/A:1024980525678","volume":"28","author":"PE Auerswald","year":"2003","unstructured":"Auerswald, P.E., Branscomb, L.M.: Valleys of death and Darwinian seas: financing the invention to innovation transition in the United States. J. Technol. Transf. 28(3\u20134), 227\u2013239 (2003). (Kluwer Academic Publishers)","journal-title":"J. Technol. Transf."},{"issue":"2","key":"12_CR5","doi-asserted-by":"publisher","first-page":"12","DOI":"10.1109\/MSP.2013.33","volume":"11","author":"TV Benzel","year":"2013","unstructured":"Benzel, T.V., Lipner, S.: Crossing the great divide: transferring security technology from research to the market. IEEE Secur. Priv. 11(2), 12\u201313 (2013)","journal-title":"IEEE Secur. Priv."},{"issue":"2","key":"12_CR6","doi-asserted-by":"crossref","first-page":"24","DOI":"10.1109\/MSP.2012.160","volume":"11","author":"A D\u2019Amico","year":"2013","unstructured":"D\u2019Amico, A., O\u2019Brien, B., Larkin, M.: building a bridge across the transition chasm. IEEE Secur. Priv. 11(2), 24\u201333 (2013)","journal-title":"IEEE Secur. Priv."},{"key":"12_CR7","unstructured":"Mankins, J.C.: Technology readiness levels: a white paper. NASA (1995)"},{"key":"12_CR8","unstructured":"NASA: HRST technology assessments technology readiness levels, chart"},{"key":"12_CR9","unstructured":"Mankins, J.C.: Research & Development degree of difficulty (R&D3): a white paper. NASA (1998)"},{"key":"12_CR10","unstructured":"ENISA: Security economics and the internal market: evaluation of stakeholder replies (2008)"},{"key":"12_CR11","unstructured":"ENISA: Security economics and the internal market: ENISA conclusions on follow-up activities (2008)"},{"key":"12_CR12","unstructured":"EUROCONTROL: European operational concept validation methodology, E-OCVM version 3.0, volume I (2010)"},{"key":"12_CR13","unstructured":"EUROCONTROL: European operational concept validation methodology, E-OCVM version 3.0, volume II annexes (2010)"},{"key":"12_CR14","unstructured":"INSEAD: The global innovation index 2012: stronger innovation linkages for global growth. INSEAD and WIPO (2012)"},{"key":"12_CR15","unstructured":"ENISA: EP3R 2012 activity report. European Public+Private Partnership for Resilience (2012)"},{"key":"12_CR16","unstructured":"ENISA: EP3R 2013 work objectives. European Public+Private Partnership for Resilience (2013)"},{"key":"12_CR17","unstructured":"NIST: Between invention and innovation: an analysis of funding for early-stage technology development. NIST GCR 02\u2013841, November 2002"},{"key":"12_CR18","volume-title":"Taking Technical Risks: How Innovators, Executives, and Investors Manage High-Tech Risks","author":"GC Hartmann","year":"2003","unstructured":"Hartmann, G.C., Myers, M.B.: Technical risk, product specifications, and market risk. In: Branscomb, L.M., Auerswald, P.E. (eds.) Taking Technical Risks: How Innovators, Executives, and Investors Manage High-Tech Risks. MIT Press, Cambridge (2003)"},{"key":"12_CR19","unstructured":"European Commission: Pre-commercial procurement: driving innovation to ensure high public services in Europe. European Communities (2008)"},{"key":"12_CR20","unstructured":"European Commission: Opportunities for public technology procurement in the ICT-related sectors in Europe, final report (2008)"},{"key":"12_CR21","unstructured":"European Commission: Communication from the Commission to the European Parliament, The Council, The European Economic and Social Committee and the Committee of the Regions, Pre-commercial Procurement: Driving innovation to ensure sustainable high quality public services in Europe, SEC(2007) 1668, COM(2007) 799 final, Brussels (2007)"},{"key":"12_CR22","unstructured":"Felici, M., Wainwright, N.: Deliverable 6.4 \u2013 Future Internet Initiatives Year 1. SecCord Project No. 316622, November 2013"},{"issue":"3","key":"12_CR23","doi-asserted-by":"publisher","first-page":"28","DOI":"10.1109\/EMR.2003.24902","volume":"31","author":"D Probert","year":"2003","unstructured":"Probert, D., Radnor, M.: Frontier experiences from industry-academia consortia. IEEE Eng. Manag. Rev. 31(3), 28 (2003)","journal-title":"IEEE Eng. Manag. Rev."},{"issue":"6","key":"12_CR24","doi-asserted-by":"crossref","first-page":"49","DOI":"10.1080\/08956308.2007.11657472","volume":"50","author":"P Groenveld","year":"2007","unstructured":"Groenveld, P.: Roadmapping integrates business and technology. Res. Technol. Manag. 50(6), 49\u201358 (2007). (Industrial Research Institute)","journal-title":"Res. Technol. Manag."},{"issue":"6","key":"12_CR25","doi-asserted-by":"crossref","first-page":"31","DOI":"10.1080\/08956308.2007.11657471","volume":"50","author":"RR Cosner","year":"2007","unstructured":"Cosner, R.R., Hynds, E.J., Fusfeld, A.R., Loweth, C.V., Scouten, C., Albright, R.: Integrating roadmapping into technical planning. Res. Technol. Manag. 50(6), 31\u201348 (2007). (Industrial Research Institute)","journal-title":"Res. Technol. Manag."},{"key":"12_CR26","unstructured":"Department for Homeland Security: A roadmap for cybersecurity research. United States Government (2009)"},{"key":"12_CR27","unstructured":"Industrial Control Systems Joint Working Group: Cross-sector roadmap for cybersecurity of control systems. Department for Homeland Security, United States Government (2011)"},{"issue":"6","key":"12_CR28","doi-asserted-by":"crossref","first-page":"45","DOI":"10.1080\/08956308.2009.11657599","volume":"52","author":"MC Dissel","year":"2009","unstructured":"Dissel, M.C., Phaal, R., Farrukh, C.J., Probert, D.R.: Value roadmapping. Res. Technol. Manag. 52(6), 45\u201353 (2009). (Industrial Research Institute)","journal-title":"Res. Technol. Manag."},{"issue":"6","key":"12_CR29","doi-asserted-by":"publisher","first-page":"49","DOI":"10.5437\/08956308X5506902","volume":"55","author":"IJ Petrick","year":"2012","unstructured":"Petrick, I.J., Martinelli, R.: Driving disruptive innovation: problem finding and strategy setting in an uncertain world. Res. Technol. Manag. 55(6), 49\u201357 (2012). (Industrial Research Institute)","journal-title":"Res. Technol. Manag."},{"issue":"2","key":"12_CR30","doi-asserted-by":"crossref","first-page":"25","DOI":"10.1080\/08956308.2004.11671615","volume":"47","author":"M Radnor","year":"2004","unstructured":"Radnor, M., Probert, D.R.: Viewing the future. Res. Technol. Manag. 47(2), 25\u201326 (2004). (Industrial Research Institute)","journal-title":"Res. Technol. Manag."},{"issue":"3","key":"12_CR31","doi-asserted-by":"publisher","first-page":"80","DOI":"10.1109\/EMR.2004.25111","volume":"32","author":"R Phaal","year":"2004","unstructured":"Phaal, R., Farrukh, C., Probert, D.: Customizing roadmapping. IEEE Eng. Manag. Rev. 32(3), 80\u201391 (2004)","journal-title":"IEEE Eng. Manag. Rev."},{"key":"12_CR32","doi-asserted-by":"crossref","unstructured":"Phaal, R., Farrukh, C.J.P., Probert, D.R.: Developing a technology roadmapping system. In: Technology Management: A Unifying Discipline for Melting the Boundaries, Portland International Conference on Management of Engineering & Technology (PICMET), pp. 99\u2013111 (2005)","DOI":"10.1109\/PICMET.2005.1509680"},{"key":"12_CR33","unstructured":"European Commission: High Representative of the European Union for Foreign Affairs and Security Policy, Joint Communication to the European Parliament, The Council, The European Economic and Social Committee and the Committee of the Regions, Cybersecurity Strategy of the European Union: An Open, Safe and Secure Cyberspace, JOIN (2013) 1 final, Brussels (2013)"},{"key":"12_CR34","unstructured":"Department of Homeland Security, Science and Technology Directorate: A roadmap for cybersecurity research, November 2009"},{"key":"12_CR35","unstructured":"Cybersecurity R&D priorities, United States Homeland Security (2014)"},{"key":"12_CR36","unstructured":"Trustworthy cyberspace: strategic plan for the federal cybersecurity research and development program. Executive Office of the President National Science and Technology Council (2011)"},{"key":"12_CR37","unstructured":"NITRD: Cybersecurity game-change research & development recommendations. The Networking and Information Technology Research and Development (NITRD) Program (2010)"},{"key":"12_CR38","unstructured":"White House: cyberspace policy review: assuring a trusted and resilient information and communications infrastructure. United States Whitehouse publication (2009)"},{"key":"12_CR39","unstructured":"ESCSWG: Roadmap to achieve energy delivery systems cybersecurity. The Energy Sector Control Systems Working Group (ESCSWG), Sept (2011)"},{"key":"12_CR40","unstructured":"Space Foundation: U.S. non-military cybersecurity research & development and related policies, Cybersecurity, Federal Research and Development Strategic Plan. Space Foundation (2014)"}],"container-title":["Communications in Computer and Information Science","Cyber Security and Privacy"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-12574-9_12","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,13]],"date-time":"2025-05-13T20:12:52Z","timestamp":1747167172000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-12574-9_12"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783319125732","9783319125749"],"references-count":40,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-12574-9_12","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"value":"1865-0929","type":"print"},{"value":"1865-0937","type":"electronic"}],"subject":[],"published":{"date-parts":[[2014]]},"assertion":[{"value":"18 November 2014","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}