{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,6]],"date-time":"2026-03-06T18:45:29Z","timestamp":1772822729983,"version":"3.50.1"},"publisher-location":"Cham","reference-count":37,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783032168474","type":"print"},{"value":"9783032168481","type":"electronic"}],"license":[{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2026]]},"DOI":"10.1007\/978-3-032-16848-1_34","type":"book-chapter","created":{"date-parts":[[2026,3,6]],"date-time":"2026-03-06T13:07:43Z","timestamp":1772802463000},"page":"459-469","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Cybersecurity: Review of Key Emerging Trends"],"prefix":"10.1007","author":[{"given":"Arnilde","family":"Fernades","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9281-7138","authenticated-orcid":false,"given":"Maria Prud\u00eancia","family":"Martins","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5614-3516","authenticated-orcid":false,"given":"Isabel","family":"Lopes","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2026,4,1]]},"reference":[{"key":"34_CR1","unstructured":"Kaspersky. What is cyber security?. https:\/\/www.kaspersky.com.br\/resource-center\/definitions\/what-is-cyber-security. Accessed 2 May 2025"},{"key":"34_CR2","unstructured":"Lopes, I.M., de S\u00e1-Soares, F.: Information Security Policies: A Content Analysis. In: 16th Pacific Asia Conference on Information Systems, PACIS 2012; Ho Chi Minh City; Viet Nam (2012)"},{"key":"34_CR3","unstructured":"ISO\/IEC (2009). ISO\/IEC 27000 \u2013 Information technology \u2013 Security techniques \u2013 Information security management systems \u2013 Overview and vocabulary. International Organization for Standardization\/International Electrotechnical Commission"},{"key":"34_CR4","doi-asserted-by":"publisher","first-page":"183","DOI":"10.5753\/sbbd_estendido.2023.25634","volume":"2023","author":"L Borges","year":"2023","unstructured":"Borges, L., Nogueira, M.: Introdu\u00e7\u00e3o \u00e0 ci\u00eancia de dados em ciberseguran\u00e7a. Anais Estendidos do XXXVIII Simp\u00f3sio Brasileiro de Bancos de Dados, Belo Horizonte, MG 2023, 183\u2013188 (2023)","journal-title":"Anais Estendidos do XXXVIII Simp\u00f3sio Brasileiro de Bancos de Dados, Belo Horizonte, MG"},{"issue":"2","key":"34_CR5","first-page":"191","volume":"2","author":"D Jerbi","year":"2023","unstructured":"Jerbi, D.: Beyond firewalls: navigating the jungle of emerging cybersecurity trends. J Curr Trends CompSci Res 2(2), 191\u2013195 (2023)","journal-title":"J Curr Trends CompSci Res"},{"key":"34_CR6","first-page":"93","volume":"2021","author":"D Brinkman","year":"2021","unstructured":"Brinkman, D.: Principles of cybersecurity. Principles of Cybersecurity 2021, 93\u2013127 (2021)","journal-title":"Principles of Cybersecurity"},{"key":"34_CR7","unstructured":"Casimiro, S.V.: Ciberseguran\u00e7a \u2013 Aspetos Legais. Comunica\u00e7\u00e3o oral apresentada na Seguran\u00e7a da Informa\u00e7\u00e3o e Gest\u00e3o do Risco na 3a Plataforma, Lisboa, http:\/\/www.afceaportugal.pt\/2014\/eventos\/12h10-Vieira_de_Almeida__Associados_s.pdf. Accessed 4 May 2025"},{"key":"34_CR8","doi-asserted-by":"crossref","unstructured":"Schaeffer-Filho, A.: Seguran\u00e7a cibern\u00e9tica 2030: experi\u00eancias, desafios e oportunidades. pp. 141\u2013166 (2023)","DOI":"10.5753\/sbc.13058.5.7"},{"key":"34_CR9","unstructured":"Lopes, I.M., de S\u00e1-Soares, F.: Information systems security policies: a survey in portuguese public administration. In: Proceedings of the IADIS International Conference Information System, Porto (Portugal), pp. 61\u201369 (2010)"},{"key":"34_CR10","doi-asserted-by":"crossref","unstructured":"Naqvi, B., Ardito, C.: Coping with Changing Contexts: A Healthcare Security Perspective, pp. 139\u2013146 (2022)","DOI":"10.1007\/978-3-030-98388-8_13"},{"issue":"4","key":"34_CR11","doi-asserted-by":"publisher","first-page":"399","DOI":"10.32628\/IJSRST52310432","volume":"10","author":"HU Salvi","year":"2023","unstructured":"Salvi, H.U., Surve, S.S.: Emerging trends and future prospects of cybersecurity technologies: addressing challenges and opportunities. Int. J. Sci. Res. Sci. Technol. 10(4), 399\u2013406 (2023)","journal-title":"Int. J. Sci. Res. Sci. Technol."},{"key":"34_CR12","unstructured":"Correio Neg\u00f3cios: A revolu\u00e7\u00e3o da computa\u00e7\u00e3o qu\u00e2ntica e a ciberseguran\u00e7a: desafios e oportunidades (2025). https:\/\/www.correionegocios.pt\/2025\/02\/13\/a-revolucao-da-computacao-quantica-e-a-ciberseguranca-desafios-e-oportunidades\/. Accessed 4 May 2025"},{"key":"34_CR13","doi-asserted-by":"crossref","unstructured":"Ara\u00fajo, G.S., Favarato, C.C., Ambrozio, A.J.R., Pompermayer, M.P., Santos, J.S.: \u201cAl\u00e9m do horizonte digital: o fasc\u00ednio da computa\u00e7\u00e3o qu\u00e2ntica. ARE, 7(2), 8015\u20138030 (2025)","DOI":"10.56238\/arev7n2-202"},{"key":"34_CR14","doi-asserted-by":"publisher","first-page":"8","DOI":"10.1007\/s11416-025-00552-6","volume":"21","author":"A Epishkina","year":"2025","unstructured":"Epishkina, A., Ermakov, V.: Homomorphic encryption for data protection in cloud computing. J Comput Virol Hack Tech 21, 8 (2025)","journal-title":"J Comput Virol Hack Tech"},{"key":"34_CR15","unstructured":"Splashtop. What is IoT?. https:\/\/www.splashtop.com\/pt\/blog\/what-is-iot?srsltid=AfmBOooBQk7aobZKzxlph-skrcsq3dItpXwlkgE6WvbS5-CM_05NlWw2. Accessed 5 May 2025"},{"issue":"61","key":"34_CR16","doi-asserted-by":"publisher","DOI":"10.55905\/rdelosv17.n61-193","volume":"17","author":"JVDS Cruz","year":"2024","unstructured":"Cruz, J.V.D.S., Casemiro, J.V., Gallizzi, J.E.S., Kalili, R.M.: Intelig\u00eancia artificial e ciberseguran\u00e7a: an\u00e1lise de amea\u00e7as emergentes e estrat\u00e9gias defensivas. REVISTA DELOS 17(61), e2954 (2024)","journal-title":"REVISTA DELOS"},{"key":"34_CR17","doi-asserted-by":"crossref","unstructured":"Pereira, R.F., Lemos, E.S.: O impacto da Internet das Coisas (IOT), da Intelig\u00eancia Artificial (IA) e da Realidade Virtual (RV) na seguran\u00e7a do trabalho, Revista Controle 23(1), 152\u2013173 (2024)","DOI":"10.32586\/rcda.v23i1.964"},{"key":"34_CR18","doi-asserted-by":"crossref","unstructured":"Lucio, Y.I.L., M\u00e1rceles Villalba, K., Donad, S.A.: Adaptive blockchain technology for a cybersecurity framework in IIoT. In: IEEE Revista Iberoamericana de Tecnologias del Aprendizaje 17(2), 178\u2013184 (2022)","DOI":"10.1109\/RITA.2022.3166857"},{"issue":"12","key":"34_CR19","doi-asserted-by":"publisher","DOI":"10.55905\/revconv.17n.12-061","volume":"17","author":"PC Santana","year":"2024","unstructured":"Santana, P.C., Duque, C.G.: A integra\u00e7\u00e3o da intelig\u00eancia artificial e do Blockchain e no contexto da organiza\u00e7\u00e3o da informa\u00e7\u00e3o. Contribuciones A Las Ciencias Sociales 17(12), e12424 (2024)","journal-title":"Contribuciones A Las Ciencias Sociales"},{"key":"34_CR20","doi-asserted-by":"crossref","unstructured":"Mampilly, A.J., Midhunchakkaravarthy, D.: Cybersecurity mesh architecture: a framework for enhanced compatibility and security in the digital age. In: Pon Selvan, C., Sehgal, N., Ruhela, S., Rizvi, N.U. (eds) International Conference on Innovation, Sustainability, and Applied Sciences. ICISAS 2023. Signals and Communication Technology. Springer (2025)","DOI":"10.1007\/978-3-031-68952-9_58"},{"issue":"3","key":"34_CR21","doi-asserted-by":"publisher","first-page":"927","DOI":"10.2298\/CSIS160804036G","volume":"13","author":"R Gon\u00e7alves","year":"2016","unstructured":"Gon\u00e7alves, R., Martins, J., Branco, F., Perez-Cota, M., Oliveira, A.-Y.: Increasing the reach of enterprises through electronic commerce: a focus group study aimed at the cases of Portugal and Spain. Comput. Sci. Inf. Syst. 13(3), 927\u2013955 (2016)","journal-title":"Comput. Sci. Inf. Syst."},{"key":"34_CR22","doi-asserted-by":"crossref","unstructured":"Teoh, C.S., Kamil Mahmood, A., Dzazali, S.: Cyber security challenges in organisations: a case study in Malaysia. In: 2018 4th International Conference on Computer and Information Sciences (ICCOINS), Kuala Lumpur, Malaysia, pp. 1\u20136 (2018)","DOI":"10.1109\/ICCOINS.2018.8510569"},{"key":"34_CR23","unstructured":"Svanadze, V., Gnatyuk, S.: Challenges and solutions for cybersecurity and information security management in organizations. Cybersecurity Providing in Information and Telecommunication Systems (2024)"},{"key":"34_CR24","doi-asserted-by":"publisher","first-page":"65044","DOI":"10.1109\/ACCESS.2022.3179822","volume":"10","author":"AW Khan","year":"2022","unstructured":"Khan, A.W., Zaib, S., Khan, F., Tarimer, I., Seo, J.T., Shin, J.: Analyzing and evaluating critical cyber security challenges faced by vendor organizations in software development: SLR based approach. IEEE Access 10, 65044\u201365054 (2022)","journal-title":"IEEE Access"},{"key":"34_CR25","unstructured":"Unravelling the Web of Issues and Challenges in Healthcare Cybersecurity for a Secure Tomorrow"},{"key":"34_CR26","doi-asserted-by":"crossref","unstructured":"Baptist, A.M.A., Halim, F.A., Abdillah, S.F., Othman, I.W., Abdullah, N.J.: Unravelling the web of issues and challenges in healthcare cybersecurity for a secure tomorrow. Business and Economic Research 13(4) (2023)","DOI":"10.5296\/ber.v13i4.21341"},{"key":"34_CR27","doi-asserted-by":"crossref","unstructured":"Bahuguna, A., Bisht, R.K., Pande, J.: Roadmap amid chaos: cyber security management for organisations, 9th International Conference on Computing, Communication and Networking Technologies (ICCCNT), Bengaluru, India, pp. 1\u20136 (2018)","DOI":"10.1109\/ICCCNT.2018.8493977"},{"key":"34_CR28","doi-asserted-by":"crossref","unstructured":"Choudhary, A. Chaudhary, A., Devi, S.: Cyber security with emerging technologies & challenges. In: 4th International Conference on Advances in Computing, Communication Control and Networking (ICAC3N), Greater Noida, India, pp. 1875\u20131879 (2022)","DOI":"10.1109\/ICAC3N56670.2022.10074579"},{"issue":"2","key":"34_CR29","doi-asserted-by":"publisher","first-page":"83","DOI":"10.3390\/fi17020083","volume":"17","author":"C Pereira","year":"2025","unstructured":"Pereira, C., et al.: Security and privacy in physical-digital environments: trends and opportunities. Future Internet 17(2), 83 (2025)","journal-title":"Future Internet"},{"key":"34_CR30","doi-asserted-by":"crossref","unstructured":"Guam\u00e1n, Y., Ninahualpa, G., Salazar, G., Guarda, T.: Comparative performance analysis between MQTT and COAP protocols for IoT with Raspberry pi 3 in IEEE 802.11 environments. In: 2020 15th Iberian Conference on Information Systems and Technologies (CISTI), pp. 1\u20136. IEEE (2020)","DOI":"10.23919\/CISTI49556.2020.9140905"},{"issue":"3","key":"34_CR31","doi-asserted-by":"publisher","first-page":"576","DOI":"10.51594\/csitrj.v5i3.872","volume":"5","author":"SA Daniel","year":"2024","unstructured":"Daniel, S.A., Victor, S.S.: Emerging trends in cybersecurity for critical infrastructure protection: a comprehensive review. Computer Science & IT Research Journal 5(3), 576\u2013593 (2024)","journal-title":"Computer Science & IT Research Journal"},{"key":"34_CR32","doi-asserted-by":"crossref","unstructured":"Aggarwal, V., Gupta, H.: A comprehensive analysis of emerging threats in the digital era. In: 2024 11th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions) (ICRITO), Noida, India, pp. 1\u20134 (2024)","DOI":"10.1109\/ICRITO61523.2024.10522348"},{"issue":"3","key":"34_CR33","doi-asserted-by":"publisher","first-page":"112","DOI":"10.32996\/jcsts.2023.5.3.9","volume":"5","author":"J Kaur","year":"2023","unstructured":"Kaur, J., et al.: Advanced cyber threats and cybersecurity innovation - strategic approaches and emerging solutions. Journal of Computer Science and Technology Studies 5(3), 112\u2013121 (2023)","journal-title":"Journal of Computer Science and Technology Studies"},{"issue":"5","key":"34_CR34","first-page":"6907","volume":"5","author":"RR Srivasatava","year":"2023","unstructured":"Srivasatava, R.R., Singh, M.: Innovative approaches in cybersecurity: addressing future trends, challenges, and incident response. International Research Journal of Modernization in Engineering Technology and Science 5(5), 6907\u20136910 (2023)","journal-title":"International Research Journal of Modernization in Engineering Technology and Science"},{"issue":"2","key":"34_CR35","doi-asserted-by":"publisher","first-page":"61","DOI":"10.5958\/2277-937X.2020.00016.7","volume":"9","author":"T Laba","year":"2020","unstructured":"Laba, T., Kuma, G.P.: The state of cyber security: theemerging threat trends. The Clarion- International Multidisciplinary Journal 9(2), 61\u201364 (2020)","journal-title":"The Clarion- International Multidisciplinary Journal"},{"key":"34_CR36","doi-asserted-by":"crossref","unstructured":"Bhambri, P., Anand, A.J.: Handbook of AI-Driven Threat Detection and Prevention: A Holistic Approach to Security (1st ed.). CRC Press (2025)","DOI":"10.1201\/9781003521020-1"},{"key":"34_CR37","doi-asserted-by":"crossref","unstructured":"Guarda, T., Augusto, M., Silva, C.: Competitive advantage in e-commerce: the case of database marketing. In Business, Economics, Financial Sciences, and Management, pp. 123\u2013130. Springer Berlin Heidelberg (2012)","DOI":"10.1007\/978-3-642-27966-9_18"}],"container-title":["Communications in Computer and Information Science","Advanced Research in Technologies, Information, Innovation and Sustainability"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-032-16848-1_34","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,6]],"date-time":"2026-03-06T13:07:46Z","timestamp":1772802466000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-032-16848-1_34"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026]]},"ISBN":["9783032168474","9783032168481"],"references-count":37,"URL":"https:\/\/doi.org\/10.1007\/978-3-032-16848-1_34","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"value":"1865-0929","type":"print"},{"value":"1865-0937","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026]]},"assertion":[{"value":"1 April 2026","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ARTIIS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Advanced Research in Technologies, Information, Innovation and Sustainability","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Cartagena de Indias","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Colombia","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"21 October 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"23 October 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"5","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"artiis2025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/artiis.org","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}