Identyfikatory
Warianty tytułu
Języki publikacji
Abstrakty
The paper addresses a managerial problem related to ensuring cybersecurity of information and knowledge resources in production enterprises interested in the implementation of INDUSTRY 4.0 technologies. The material presented shows the results of experimental research of a qualitative nature, using two expert inventive methods: brain-netting and a fuzzy formula of inference. The experts' competences included the following three variants of the industrial application of the INDUSTRY 4.0 concept: (1) high production volumes achieved using a dedicated and fully robotic production line (2) the manufacture of short, personalized series of products through universal production cells, and (3) the manufacture of specialized unit products for individual customers. The Google Forms software was used to collect these expert opinions. The conclusions of the research carried out using the brain-netting method point to nine variants of the cybersecurity strategy of IT networks and knowledge base resources in manufacturing enterprises represented by the experts. The results of the research using the fuzzy formula of inference are numerically and situationally defined relations linking the above-mentioned nine strategies with five types of cyber-attacks. The summary record of these relations as the basis for managerial cybersecurity recommendations has a matrix form.
Słowa kluczowe
Wydawca
Czasopismo
Rocznik
Tom
Strony
30--38
Opis fizyczny
Bibliogr. 20 poz., rys., tab.
Twórcy
autor
- Poznan University of Technology, Faculty of Engineering Management, ul. J. Rychlewskiego 2, 60-965 Poznan, Poland
Bibliografia
- Atlam H.F., Walters R.J., Wills G.B., and Daniel J. (2019), Fuzzy logic with expert judgment to implement an adaptive risk-based access control model for IoT, Mobile Networks and Applications, Vol. 26, pp. 2545–2557.
- Brooks Ch.J., Grow Ch., Graig Ph., and Shirt D. (2018), Cybersecurity. Essentials, Wiley.
- Cappelli D.M., Moore A.P., and Trzeciak R. (2012), The CERT Guide to Insider Treats, Addison-Wesley Professional.
- Copertari L.F. (2021), Comprehensive project risk management methodology, Advances in Social Sciences Research Journal, No. 1, Vol. 8, pp. 94–115.
- Curran K. (2020), Cyber security and the remote workforce, Computer Fraud & Security, ELSEVIER, No. 6, Vol. 2020, pp. 11–12.
- Hadnagy Ch. (2014), Social Engineering: The Science of Human Hacking, Wiley.
- Kalkowska J. (2018), Pro-exploitation Approach in the Processes of Creating Public Transport Vehicles, Publishing House of the Poznan University of Technology, (in Polish).
- Kalkowska J. and Pacholski L. (2017), Simulation technologies in agile reconfiguration of assembly production process, Organization Review, No. 2, pp. 49–55 (in Polish).
- Lee I. (2021), Cybersecurity: risk management framework and investment cost analysis, Business Horizons, No. 4, Vol. 16, pp. 66–71.
- McClure S., Kurtz G., and Scambray J. (2012), Hacking Exposed 7: Network Security Secrets and Solutions,
- McGrow Hill. Murino T., Naviglio G., Romano E., Guerra L., Revetria R., Mosca R., and Cassettari L.C. (2012), World Class Manufacturing Implementation Model, Applied Mathematics in Electrical and Computer Engineering, Cambridge, Harvard, pp. 371–376.
- Pacholski L. (1998), Fuzzy Logic Application in Ergonomic Renewal of Multiagent Manufacturing Systems, Cybernetics and Systems: An International Journal, Vol. 29, pp. 715–728.
- Pacholski L. (2020), Managerial Premises for the Implementation of the Industry 4.0 Concept on the Car Assembly Technology Line, [in:] Sustainable Economic Development and Advancing Education Excellence in the Era of Global Pandemic, Proceedings of the 36th International Business Information Management Association Conference (IBIMA), pp. 4189–4199.
- Pacholski L. and Kalkowska J. (2019), Prospectives of Ergonomics and Organization Paradigms’ Changes of Machines Manufacturing Processes, [in:] Pacholski L., Kalkowska J., Kielbasa P., [eds.] Ergonomics in the Face of the Challenges of Mass and Globalization in Production, Cracow University of Technology and Polish Academy of Arts and Sciences Editorial Board, pp. 5–52, (in Polish).
- Pacholski L. and Piotrowski K. (2008), Political Ergonomics, Macroergonomic Battles, Human Factors and Ergonomics in Manufacturing, No. 5, Vol. 185, Wiley-Blackwell, pp. 515–524.
- Parkinson S. (2017), Use of access control to minimise ransomware impact, Network Security, No. 7, Vol. 2017, pp. 5–8.
- Shostack A. (2014), Threat Modeling. Designing for Security, Wiley.
- Shrama M. and Kodali R. (2008), Development of a Framework for Manufacturing Excellence, Measuring Business Excellence, No. 4, Vol. 12, pp. 50–66.
- Szczerbicki E. and Nguyen N.T., Cognitive Systems, Concepts, Processes, and Techniques for the Age of Industry 4.0, An International Journal Cybernetics and Systems, No. 5, Vol. 52, pp 293–295.
- Trzcieliński S. (2011), Agile Enterprise, Publishing House of the Poznan University of Technology (in Polish).
Uwagi
Opracowanie rekordu ze środków MEiN, umowa nr SONP/SP/546092/2022 w ramach programu "Społeczna odpowiedzialność nauki" - moduł: Popularyzacja nauki i promocja sportu (2022-2023)
Typ dokumentu
Bibliografia
Identyfikator YADDA
bwmeta1.element.baztech-515994ba-935b-4f21-9933-5456e9e7a655