评估工业 5.0 网络安全挑战并确定优先次序的决策支持模型

Ifaz Ahmed , Niamat Ullah Ibne Hossain , Steven A Fazio , Marianna Lezzi , Md. Saiful Islam
{"title":"评估工业 5.0 网络安全挑战并确定优先次序的决策支持模型","authors":"Ifaz Ahmed ,&nbsp;Niamat Ullah Ibne Hossain ,&nbsp;Steven A Fazio ,&nbsp;Marianna Lezzi ,&nbsp;Md. Saiful Islam","doi":"10.1016/j.smse.2024.100018","DOIUrl":null,"url":null,"abstract":"<div><p>The world is adopting the Industry 5.0 paradigm to increase human centricity, sustainability, and resilience in efficient, optimized, and profitable manufacturing systems. With benefits, however, come increased risks of economic and physical loss, driving the need for continuous improvement of Industry 5.0 cybersecurity. Implementation and advancement of adequate cybersecurity have created challenges that have been identified in the literature. In this study, key Industry 5.0 cybersecurity challenges and related sub-challenges are highlighted based on a literature review. Graph Theory and Matrix Approach (GTMA) is employed to analyze the challenges and determine relative importance based on permanent values of the variable permanent matrix (VPM). The results identify the most important Industry 5.0 cybersecurity challenges and reveal Industry 5.0 firms should primarily concentrate on supply chain vulnerabilities to decrease data loss and hacking in the organization's supply chain network. This study also recommends that executives and lawmakers acquire knowledge regarding cybersecurity challenges and prepare to deal with them. Addressing these and other subsequently prioritized challenges—the top five rounded out with emergent cybersecurity trends, non-availability of cybersecurity curriculum in education, embedded technical constraints, and absence of skilled employees and training—will lead the methodical development of holistic, robust cybersecurity programs. Firms accepting of this reality may implement such programs to mitigate evolving cyber-risk towards harnessing and sustaining the benefits of novel Industry 5.0 technologies.</p></div>","PeriodicalId":101200,"journal":{"name":"Sustainable Manufacturing and Service Economics","volume":"3 ","pages":"Article 100018"},"PeriodicalIF":0.0000,"publicationDate":"2024-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S266734442400001X/pdfft?md5=7179e1c91971d098927ee02497051efb&pid=1-s2.0-S266734442400001X-main.pdf","citationCount":"0","resultStr":"{\"title\":\"A decision support model for assessing and prioritization of industry 5.0 cybersecurity challenges\",\"authors\":\"Ifaz Ahmed ,&nbsp;Niamat Ullah Ibne Hossain ,&nbsp;Steven A Fazio ,&nbsp;Marianna Lezzi ,&nbsp;Md. Saiful Islam\",\"doi\":\"10.1016/j.smse.2024.100018\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"<div><p>The world is adopting the Industry 5.0 paradigm to increase human centricity, sustainability, and resilience in efficient, optimized, and profitable manufacturing systems. With benefits, however, come increased risks of economic and physical loss, driving the need for continuous improvement of Industry 5.0 cybersecurity. Implementation and advancement of adequate cybersecurity have created challenges that have been identified in the literature. In this study, key Industry 5.0 cybersecurity challenges and related sub-challenges are highlighted based on a literature review. Graph Theory and Matrix Approach (GTMA) is employed to analyze the challenges and determine relative importance based on permanent values of the variable permanent matrix (VPM). The results identify the most important Industry 5.0 cybersecurity challenges and reveal Industry 5.0 firms should primarily concentrate on supply chain vulnerabilities to decrease data loss and hacking in the organization's supply chain network. This study also recommends that executives and lawmakers acquire knowledge regarding cybersecurity challenges and prepare to deal with them. Addressing these and other subsequently prioritized challenges—the top five rounded out with emergent cybersecurity trends, non-availability of cybersecurity curriculum in education, embedded technical constraints, and absence of skilled employees and training—will lead the methodical development of holistic, robust cybersecurity programs. Firms accepting of this reality may implement such programs to mitigate evolving cyber-risk towards harnessing and sustaining the benefits of novel Industry 5.0 technologies.</p></div>\",\"PeriodicalId\":101200,\"journal\":{\"name\":\"Sustainable Manufacturing and Service Economics\",\"volume\":\"3 \",\"pages\":\"Article 100018\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2024-01-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"https://www.sciencedirect.com/science/article/pii/S266734442400001X/pdfft?md5=7179e1c91971d098927ee02497051efb&pid=1-s2.0-S266734442400001X-main.pdf\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Sustainable Manufacturing and Service Economics\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://www.sciencedirect.com/science/article/pii/S266734442400001X\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Sustainable Manufacturing and Service Economics","FirstCategoryId":"1085","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S266734442400001X","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

摘要

全世界都在采用工业 5.0 范式,以提高制造系统的以人为本性、可持续性和适应性,从而实现高效、优化和盈利。然而,在带来好处的同时,经济和物质损失的风险也随之增加,这促使人们需要不断改进工业 5.0 的网络安全。实施和推进适当的网络安全带来了挑战,这些挑战已在文献中得到确认。本研究在文献综述的基础上,强调了工业 5.0 网络安全的主要挑战和相关子挑战。采用图论和矩阵方法(GTMA)分析这些挑战,并根据可变永久矩阵(VPM)的永久值确定相对重要性。研究结果确定了最重要的工业 5.0 网络安全挑战,并揭示了工业 5.0 企业应主要关注供应链漏洞,以减少组织供应链网络中的数据丢失和黑客攻击。本研究还建议企业高管和立法者掌握有关网络安全挑战的知识,并为应对这些挑战做好准备。应对这些挑战和其他随后优先考虑的挑战--前五位依次是新出现的网络安全趋势、教育中缺乏网络安全课程、嵌入式技术限制、缺乏熟练员工和培训--将引导企业有条不紊地制定全面、稳健的网络安全计划。接受这一现实的企业可实施此类计划,以降低不断演变的网络风险,从而利用和维持新型工业 5.0 技术的优势。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
A decision support model for assessing and prioritization of industry 5.0 cybersecurity challenges

The world is adopting the Industry 5.0 paradigm to increase human centricity, sustainability, and resilience in efficient, optimized, and profitable manufacturing systems. With benefits, however, come increased risks of economic and physical loss, driving the need for continuous improvement of Industry 5.0 cybersecurity. Implementation and advancement of adequate cybersecurity have created challenges that have been identified in the literature. In this study, key Industry 5.0 cybersecurity challenges and related sub-challenges are highlighted based on a literature review. Graph Theory and Matrix Approach (GTMA) is employed to analyze the challenges and determine relative importance based on permanent values of the variable permanent matrix (VPM). The results identify the most important Industry 5.0 cybersecurity challenges and reveal Industry 5.0 firms should primarily concentrate on supply chain vulnerabilities to decrease data loss and hacking in the organization's supply chain network. This study also recommends that executives and lawmakers acquire knowledge regarding cybersecurity challenges and prepare to deal with them. Addressing these and other subsequently prioritized challenges—the top five rounded out with emergent cybersecurity trends, non-availability of cybersecurity curriculum in education, embedded technical constraints, and absence of skilled employees and training—will lead the methodical development of holistic, robust cybersecurity programs. Firms accepting of this reality may implement such programs to mitigate evolving cyber-risk towards harnessing and sustaining the benefits of novel Industry 5.0 technologies.

求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
A decision support model for assessing and prioritization of industry 5.0 cybersecurity challenges Pivoting and pandemics: A game-theoretic framework for agile personal protective equipment supply chains Potential of recycled PLA in 3D printing: A review Sustainability perceptions towards digitalization of maintenance services – A survey Presenting a two-echelon multi-objective supply chain model considering the expiration date of products and solving it by applying MODM
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1