•Relevance in the literature of cybersecurity challenges in Industry 4.0.•Need to support the management in facing cybersecurity issues.•A reference framework as basis for cybersecurity management in ...I-4.0 contexts.
The cybersecurity issues represent a complex challenge for all companies committing to Industry 4.0 paradigm. On the other hand, the characterization of cybersecurity concept within Industry 4.0 contexts proved to be an emerging and relevant topic in the recent literature.
The paper proposes to analyse, through a systematic literature review approach, the way in which the existing state of art deals with the cybersecurity issues in Industry 4.0 contexts. In particular, the focus will be on the investigation of the main elements associated with cybersecurity theme (i.e. asset involved into cyber-attacks, system vulnerabilities, cyber threats, risks and countermeasures) within those industrial contexts where physical systems (machines, shop floors, plants) are connected each other via the Internet. Four areas of analysis are defined: definitions of cybersecurity and Industry 4.0 concepts, the industrial focus of the analysed studies, the cybersecurity characterization and the management attempts of cybersecurity issues. Through the literature review analysis, a framework of the main features characterizing each area is discussed, providing interesting evidences for future research and applications.
•Identify the primary challenges related to Industry 5.0 cybersecurity.•Determine the ranking among the challenges using GTMA.•Provide recommendations regarding critical aspects of Industry 5.0 ...cybersecurity.•Display the efficacy of the GTMA approach in the Context of Industry 5.0 related challenges.
The world is adopting the Industry 5.0 paradigm to increase human centricity, sustainability, and resilience in efficient, optimized, and profitable manufacturing systems. With benefits, however, come increased risks of economic and physical loss, driving the need for continuous improvement of Industry 5.0 cybersecurity. Implementation and advancement of adequate cybersecurity have created challenges that have been identified in the literature. In this study, key Industry 5.0 cybersecurity challenges and related sub-challenges are highlighted based on a literature review. Graph Theory and Matrix Approach (GTMA) is employed to analyze the challenges and determine relative importance based on permanent values of the variable permanent matrix (VPM). The results identify the most important Industry 5.0 cybersecurity challenges and reveal Industry 5.0 firms should primarily concentrate on supply chain vulnerabilities to decrease data loss and hacking in the organization's supply chain network. This study also recommends that executives and lawmakers acquire knowledge regarding cybersecurity challenges and prepare to deal with them. Addressing these and other subsequently prioritized challenges—the top five rounded out with emergent cybersecurity trends, non-availability of cybersecurity curriculum in education, embedded technical constraints, and absence of skilled employees and training—will lead the methodical development of holistic, robust cybersecurity programs. Firms accepting of this reality may implement such programs to mitigate evolving cyber-risk towards harnessing and sustaining the benefits of novel Industry 5.0 technologies.
•Cybersecurity breaches in the Industry 4.0 negatively affect business performance.•Analysis of the critical assets to be protected and the resulting business impacts.•A methodology to assess the ...impacts of cyber-attacks on 4.0-manufacturing systems.
An increasing number of cybersecurity breaches adversely affect business performance, by leveraging the vulnerabilities of networked manufacturing machines. In some cases, cyber-attacks on critical industrial equipment are able to undermine the corporate business model. Knowing and evaluating in advance the main critical assets to be protected from potential cyber-attacks and the business impacts that could occur is a source of competitive advantage.
Through the analysis of literature and an ethnographic research approach, this study proposes a structured classification of critical industrial assets within Industry 4.0 and potential adverse impacts on business performance due to breaches of cybersecurity. In particular, cybersecurity is analysed in terms of loss of confidentiality, integrity and availability of data associated with networked manufacturing machines. It is also suggested how critical assets and business impacts are correlated and how business impacts can be assessed. The proposed results can be organized in four steps for supporting companies in making decisions on cybersecurity policies. Moreover, both industry and academia can benefit from these results to conduct future analysis and investigation activities in the field of cybersecurity.
Cybersecurity is one of the main challenges faced by companies in the context of the Industrial Internet of Things (IIoT), in which a number of smart devices associated with machines, computers and ...people are networked and communicate with each other. In this connected industrial scenario, personnel need to be aware of cybersecurity issues in order to prevent or minimise the occurrence of cybersecurity incidents and corporate data breaches, and thus to make companies resilient to cyber-attacks. In addition, the recent increase in smart working due to the COVID-19 pandemic means that the need for cybersecurity awareness is more relevant than ever.
In this study, we carry out a systematic literature review in order to analyse how the existing state of the art deals with cybersecurity awareness in the context of IIoT, and to provide a comprehensive overview of this topic. Four areas of analysis are considered: (i) definitions of the concepts of cybersecurity awareness and information security awareness, with keyword extrapolation (e.g. cybersecurity control level, information and responsibility); (ii) the industrial context of the analysed studies (e.g. manufacturing, critical infrastructure); (iii) the techniques adopted to raise company awareness of cybersecurity (e.g. serious games, online questionnaires); and (iv) the main benefits of a large-scale campaign of cybersecurity awareness (e.g. the effectiveness of employees in terms of managing cybersecurity issues, identification of cyber-attacks). Practitioners and researchers can benefit from our analysis of the features of each area in their future research and applications.
•A literature review on cybersecurity awareness in IIoT contexts is conducted.•There are different definitions of cybersecurity awareness but with common keywords.•Some industries more than others are addressing cybersecurity awareness issues.•Several techniques support companies in complying with cybersecurity policies.•Improving cybersecurity awareness provides benefits to companies.
An ever-growing number of companies are moving toward the Industry 4.0 paradigm, adopting a range of advanced technologies (e.g., smart sensors, big data analytics, and cloud computing) and ...networking their manufacturing systems. This improves the efficiency and effectiveness of operations but also introduces new cybersecurity challenges. In this article, the impact assessment methodology is applied in the context of manufacturing systems 4.0 (also known as smart manufacturing systems, cyber manufacturing systems, or digital manufacturing systems), thus identifying the critical assets to be protected against cyber-attacks and assessing the business impacts in the case of subtractive and additive technologies. The research design of the single case study with multiple units of analysis is applied. In particular, a large company, a leader in the manufacturing of aeronautical components, is considered a representative case study, and its two main types of manufacturing cells that is, those based on networked computer numerical control machines and 3-D printers, are taken as applicative cases for the methodology. The application of the impact assessment methodology in the manufacturing context 4.0 of aeronautical components represents a useful guide for researchers in the field of cybersecurity and for companies intending to implement it in their smart manufacturing environments. In particular, based on this study, companies can define the critical manufacturing data to protect against cyber-attacks, isolate the business impacts in case of cybersecurity breaches, correlate the identified business impacts with the specific data category, and assess the level of business impacts.
•A Big Data Analytics (BDA) approach to manage real-time data analytics.•MBDAaaS framework applied in an aerospace manufacturing environment.•Adoption and implementation of Big Data Analytics ...technology in a case study.
Today, in a smart manufacturing environment based on the Industry 4.0 paradigm, people, technological infrastructure and machinery equipped with sensors can constantly generate and communicate a huge volume of data, also known as Big Data. The manufacturing industry takes advantage of Big Data and analytics evolution by improving its capability to bring out valuable information and knowledge from industrial processes, production systems and sensors. The adoption of model-based frameworks in the Big Data Analytics pipeline can better address user configuration requirements (e.g. type of analysis to perform, type of algorithm to be applied) and also provide more transparency and clearness on the execution of workflows and data processing. In the current state of art, an application of a model-based framework in a manufacturing scenario is missing. Therefore, in this study, by means of a case study research focused on data from sensors associated with Computer Numerical Control machines, the configuration and execution of a Big Data Analytics pipeline with a Model-based Big Data Analytics-as-a-Service framework is described. The case study provides to theoreticians and managerial experts useful evidence for managing real-time data analytics and deploying a workflow that addresses specific analytical goals, driven by user requirements and developer models, in a complex manufacturing domain.
The digital twin is currently recognized as a key technology allowing the digital representation of a real-world system. In smart manufacturing, the digital twin enables the management and analysis ...of physical and digital processes, products, and people in order to foster the sustainability of their lifecycles. Although past research addressed this topic, fragmented studies, a lack of a holistic view, and a lack of in-depth knowledge about digital twin concepts and structures are still evident in the domain of the shop floor digital twin. Manufacturing companies need an integrated reference framework that fits the main components of both physical and digital space. On the basis of a systematic literature review, this research aims to investigate the characteristics of the digital twin for shop floor purposes in the context of smart manufacturing. The “hexadimensional shop floor digital twin” (HexaSFDT) is proposed as a comprehensive framework that integrates all the main components and describes their relationships. In this way, manufacturing organizations can rely on an inclusive framework for supporting their journey in understanding the shop floor digital twin from a methodological and technological viewpoint. Furthermore, the research strengthens the reference literature by collecting and integrating relevant contributions in a unique framework.
The paper investigates information and communication technology (ICT)‐based and face‐to‐face interactions for knowledge sharing during the activities characterizing the innovation process rather than ...strategic or operative ones. It also discussed the benefits of working remotely in companies or in a network of companies, also due to the pandemic situation such as the one we are experiencing today. The research design is based on the exploitation of a case study in the aerospace sector. Qualitative data are collected with interviews, and a content analysis is applied for extracting data useful for exploring different kind of relationships. Three significant results are described about the role of face‐to‐face interactions in knowledge sharing; the interaction through ICT tools for communication; and the different types of support provided by ICT tools. The paper extends the state of the art with new evidence in the field of knowledge sharing and conversion for sustaining the innovation process. The findings are original since new insights for the analysis of relationships are provided. Furthermore, the research methodology is described in detail and can introduce managers and scientists in content analysis applications also for industrial exploitation.
Innovations in product development and process technologies represent a promising strategy to face the increasing competitiveness of modern markets in the global economy. Also, customer requirements ...become more and more specific and the complexity of products is still increasing. Industries need to adopt effective solutions during the product development process and to support, for sustainable purposes, all the phases of the product lifecycle. Advanced model-based solutions emerge for digitally supporting these industrial needs. In this context, a Model-Based Enterprise (MBE) represents an organization that adopts modeling technologies, such as Model-Based Definition (MBD) solutions, to integrate and manage both technical and business processes related to product design, production, support, and retirement. Past research discusses the model-based approaches focusing on technical product development, mainly referring to the design and the manufacturing phases. A wide perspective from the other phases of lifecycle seems to lack in the literature. By carrying out a systematic literature review, this research aims to investigate the relationships between the MBE approaches and the product lifecycle phases and to identify potential benefits and challenges. It enhances the academic knowledge domain by also shedding light on potential future research directions.