评估工业 5.0 网络安全挑战并确定优先次序的决策支持模型

Ifaz Ahmed , Niamat Ullah Ibne Hossain , Steven A Fazio , Marianna Lezzi , Md. Saiful Islam
{"title":"评估工业 5.0 网络安全挑战并确定优先次序的决策支持模型","authors":"Ifaz Ahmed ,&nbsp;Niamat Ullah Ibne Hossain ,&nbsp;Steven A Fazio ,&nbsp;Marianna Lezzi ,&nbsp;Md. Saiful Islam","doi":"10.1016/j.smse.2024.100018","DOIUrl":null,"url":null,"abstract":"<div><p>The world is adopting the Industry 5.0 paradigm to increase human centricity, sustainability, and resilience in efficient, optimized, and profitable manufacturing systems. With benefits, however, come increased risks of economic and physical loss, driving the need for continuous improvement of Industry 5.0 cybersecurity. Implementation and advancement of adequate cybersecurity have created challenges that have been identified in the literature. In this study, key Industry 5.0 cybersecurity challenges and related sub-challenges are highlighted based on a literature review. Graph Theory and Matrix Approach (GTMA) is employed to analyze the challenges and determine relative importance based on permanent values of the variable permanent matrix (VPM). The results identify the most important Industry 5.0 cybersecurity challenges and reveal Industry 5.0 firms should primarily concentrate on supply chain vulnerabilities to decrease data loss and hacking in the organization's supply chain network. This study also recommends that executives and lawmakers acquire knowledge regarding cybersecurity challenges and prepare to deal with them. Addressing these and other subsequently prioritized challenges—the top five rounded out with emergent cybersecurity trends, non-availability of cybersecurity curriculum in education, embedded technical constraints, and absence of skilled employees and training—will lead the methodical development of holistic, robust cybersecurity programs. Firms accepting of this reality may implement such programs to mitigate evolving cyber-risk towards harnessing and sustaining the benefits of novel Industry 5.0 technologies.</p></div>","PeriodicalId":101200,"journal":{"name":"Sustainable Manufacturing and Service Economics","volume":"3 ","pages":"Article 100018"},"PeriodicalIF":0.0000,"publicationDate":"2024-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S266734442400001X/pdfft?md5=7179e1c91971d098927ee02497051efb&pid=1-s2.0-S266734442400001X-main.pdf","citationCount":"0","resultStr":"{\"title\":\"A decision support model for assessing and prioritization of industry 5.0 cybersecurity challenges\",\"authors\":\"Ifaz Ahmed ,&nbsp;Niamat Ullah Ibne Hossain ,&nbsp;Steven A Fazio ,&nbsp;Marianna Lezzi ,&nbsp;Md. Saiful Islam\",\"doi\":\"10.1016/j.smse.2024.100018\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"<div><p>The world is adopting the Industry 5.0 paradigm to increase human centricity, sustainability, and resilience in efficient, optimized, and profitable manufacturing systems. With benefits, however, come increased risks of economic and physical loss, driving the need for continuous improvement of Industry 5.0 cybersecurity. Implementation and advancement of adequate cybersecurity have created challenges that have been identified in the literature. In this study, key Industry 5.0 cybersecurity challenges and related sub-challenges are highlighted based on a literature review. Graph Theory and Matrix Approach (GTMA) is employed to analyze the challenges and determine relative importance based on permanent values of the variable permanent matrix (VPM). The results identify the most important Industry 5.0 cybersecurity challenges and reveal Industry 5.0 firms should primarily concentrate on supply chain vulnerabilities to decrease data loss and hacking in the organization's supply chain network. This study also recommends that executives and lawmakers acquire knowledge regarding cybersecurity challenges and prepare to deal with them. Addressing these and other subsequently prioritized challenges—the top five rounded out with emergent cybersecurity trends, non-availability of cybersecurity curriculum in education, embedded technical constraints, and absence of skilled employees and training—will lead the methodical development of holistic, robust cybersecurity programs. Firms accepting of this reality may implement such programs to mitigate evolving cyber-risk towards harnessing and sustaining the benefits of novel Industry 5.0 technologies.</p></div>\",\"PeriodicalId\":101200,\"journal\":{\"name\":\"Sustainable Manufacturing and Service Economics\",\"volume\":\"3 \",\"pages\":\"Article 100018\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2024-01-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"https://www.sciencedirect.com/science/article/pii/S266734442400001X/pdfft?md5=7179e1c91971d098927ee02497051efb&pid=1-s2.0-S266734442400001X-main.pdf\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Sustainable Manufacturing and Service Economics\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://www.sciencedirect.com/science/article/pii/S266734442400001X\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Sustainable Manufacturing and Service Economics","FirstCategoryId":"1085","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S266734442400001X","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

摘要

全世界都在采用工业 5.0 范式,以提高制造系统的以人为本性、可持续性和适应性,从而实现高效、优化和盈利。然而,在带来好处的同时,经济和物质损失的风险也随之增加,这促使人们需要不断改进工业 5.0 的网络安全。实施和推进适当的网络安全带来了挑战,这些挑战已在文献中得到确认。本研究在文献综述的基础上,强调了工业 5.0 网络安全的主要挑战和相关子挑战。采用图论和矩阵方法(GTMA)分析这些挑战,并根据可变永久矩阵(VPM)的永久值确定相对重要性。研究结果确定了最重要的工业 5.0 网络安全挑战,并揭示了工业 5.0 企业应主要关注供应链漏洞,以减少组织供应链网络中的数据丢失和黑客攻击。本研究还建议企业高管和立法者掌握有关网络安全挑战的知识,并为应对这些挑战做好准备。应对这些挑战和其他随后优先考虑的挑战--前五位依次是新出现的网络安全趋势、教育中缺乏网络安全课程、嵌入式技术限制、缺乏熟练员工和培训--将引导企业有条不紊地制定全面、稳健的网络安全计划。接受这一现实的企业可实施此类计划,以降低不断演变的网络风险,从而利用和维持新型工业 5.0 技术的优势。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
A decision support model for assessing and prioritization of industry 5.0 cybersecurity challenges

The world is adopting the Industry 5.0 paradigm to increase human centricity, sustainability, and resilience in efficient, optimized, and profitable manufacturing systems. With benefits, however, come increased risks of economic and physical loss, driving the need for continuous improvement of Industry 5.0 cybersecurity. Implementation and advancement of adequate cybersecurity have created challenges that have been identified in the literature. In this study, key Industry 5.0 cybersecurity challenges and related sub-challenges are highlighted based on a literature review. Graph Theory and Matrix Approach (GTMA) is employed to analyze the challenges and determine relative importance based on permanent values of the variable permanent matrix (VPM). The results identify the most important Industry 5.0 cybersecurity challenges and reveal Industry 5.0 firms should primarily concentrate on supply chain vulnerabilities to decrease data loss and hacking in the organization's supply chain network. This study also recommends that executives and lawmakers acquire knowledge regarding cybersecurity challenges and prepare to deal with them. Addressing these and other subsequently prioritized challenges—the top five rounded out with emergent cybersecurity trends, non-availability of cybersecurity curriculum in education, embedded technical constraints, and absence of skilled employees and training—will lead the methodical development of holistic, robust cybersecurity programs. Firms accepting of this reality may implement such programs to mitigate evolving cyber-risk towards harnessing and sustaining the benefits of novel Industry 5.0 technologies.

求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信