Cyber risk at the edge: current and future trends on cyber risk analytics and artificial intelligence in the industrial internet of things and industry 4.0 supply chains

Cybersecurity - Tập 3 - Trang 1-21 - 2020
Petar Radanliev1, David De Roure1, Kevin Page1, Jason R. C. Nurse2, Rafael Mantilla Montalvo3, Omar Santos3, La’Treall Maddox3, Pete Burnap4
1Oxford e-Research Centre, Engineering Sciences Department, University of Oxford, Oxford, England
2School of Computing, University of Kent, Kent, England, UK
3Cisco Research Centre, Research Triangle Park, Durham, North Carolina, USA
4School of Computer Science and Informatics, Cardiff University, Cardiff, Wales, UK

Tóm tắt

Digital technologies have changed the way supply chain operations are structured. In this article, we conduct systematic syntheses of literature on the impact of new technologies on supply chains and the related cyber risks. A taxonomic/cladistic approach is used for the evaluations of progress in the area of supply chain integration in the Industrial Internet of Things and Industry 4.0, with a specific focus on the mitigation of cyber risks. An analytical framework is presented, based on a critical assessment with respect to issues related to new types of cyber risk and the integration of supply chains with new technologies. This paper identifies a dynamic and self-adapting supply chain system supported with Artificial Intelligence and Machine Learning (AI/ML) and real-time intelligence for predictive cyber risk analytics. The system is integrated into a cognition engine that enables predictive cyber risk analytics with real-time intelligence from IoT networks at the edge. This enhances capacities and assist in the creation of a comprehensive understanding of the opportunities and threats that arise when edge computing nodes are deployed, and when AI/ML technologies are migrated to the periphery of IoT networks.

Tài liệu tham khảo

Agyepong E, Cherdantseva Y, Reinecke P, Burnap P (2019) Challenges and performance metrics for security operations center analysts: a systematic review. J Cyber Secur Technol 4(1):1–28. https://doi.org/10.1080/23742917.2019.1698178 Ahmed SH, Kim G, Kim D (2013) Cyber physical system: architecture, applications and research challenges. IFIP Wireless Days (WD) 2013:1–5. https://doi.org/10.1109/WD.2013.6686528 Akinrolabu O, Nurse JRC, Martin A, New S (2019) Cyber risk assessment in cloud provider environments: current models and future needs. Comput Secur 87:101600. https://doi.org/10.1016/j.cose.2019.101600 Allen and Hamilton. (2014). Cyber Power Index: Findings and Methodology. Retrieved from https://www.sbs.ox.ac.uk/cybersecurity-capacity/system/files/EIU - Cyber Power Index Findings and Methodology.pdf Almeida L, Santos F, Oliveira L (2016) Structuring Communications for Mobile Cyber-Physical Systems. https://doi.org/10.1007/978-3-319-26869-9_3 Al-Mudimigh, A. S., Zairi, M., & Ahmed, A. M. M. (2004). Extending the concept of supply chain: The effective management of value chains. Int J Prod Econ, 87(3), 309–320 AMP (2013) Advanced Manufacturing Partnership. In: NIST Advanced Manufacturing Office Retrieved from https://www.nist.gov/amo/programs Anderson G (2016) The economic impact of technology infrastructure for smart manufacturing. NIST Econ Anal Briefs 4. https://doi.org/10.6028/NIST.EAB.4 Anderson R, Moore T (2006) The economics of information security. Sci AAAS 314(5799):610–613 Retrieved from http://science.sciencemag.org/content/314/5799/610.full Ani, U. D., Watson, J. D. M., Nurse, J. R. C., Cook, A., & Maple, C. (2019). A review of critical infrastructure protection approaches: improving security through responsiveness to the dynamic Modelling landscape. PETRAS/IET Conference Living in the Internet of Things: Cybersecurity of the IoT - 2019, 1–16. Retrieved from http://arxiv.org/abs/1904.01551. Accessed 1 Oct 2019 Anthi, E., Williams, L., & Burnap, P. (2018). Pulse: an adaptive intrusion detection for the internet of things. Living Internet Things 35 (4 pp.). doi: https://doi.org/10.1049/cp.2018.0035 Anthi E, Williams L, Slowinska M, Theodorakopoulos G, Burnap P (2019) A supervised intrusion detection system for smart home IoT devices. IEEE Internet Things J 6(5):9042–9053. https://doi.org/10.1109/JIOT.2019.2926365 Anthonysamy P, Rashid A, Chitchyan R (2017) Privacy Requirements: Present & Future. In: 2017 IEEE/ACM 39th international conference on software engineering: software engineering in society track (ICSE-SEIS), pp 13–22. https://doi.org/10.1109/ICSE-SEIS.2017.3 Ashton K (2011) In the real world, things matter more than ideas. RFID J 22(7) Retrieved from http://www.rfidjournal.com/articles/pdf?4986. Accessed 1 Oct 2019 ASI, A. for strategic initiatives. (2016). National Technology initiative, Agency for Strategic Initiatives. Retrieved May 10, 2017, from Government of Russia website: https://asi.ru/eng/nti/. Accessed 1 Oct 2019 Axon L, Alahmadi B, Nurse JRC, Goldsmith M, Creese S (2018) Sonification in Security Operations Centres: What do Security Practitioners Think? Proceedings of the Workshop on Usable Security (USEC) at the Network and Distributed System Security (NDSS) Symposium, pp 1–12 Retrieved from https://www.cs.ox.ac.uk/files/9802/2018-USEC-NDSS-aangc-preprint.pdf Balaji B, Al Faruque MA, Dutt N, Gupta R, Agarwal Y (2015) Models, abstractions, and architectures, Proceedings of the 52nd Annual Design Automation Conference on - DAC ‘15, pp 1–6. https://doi.org/10.1145/2744769.2747936 Bauer W, Hämmerle M, Schlund S, Vocke C (2015) Transforming to a Hyper-connected Society and Economy – Towards an “Industry 4.0.”. Procedia Manufacturing 3:417–424. https://doi.org/10.1016/j.promfg.2015.07.200 Benveniste A (2010) Loosely Time-Triggered Architectures for Cyber-Physical Systems. 2010 Design. Automation & Test in Europe Conference & Exhibition, Dresden, pp 3–8. https://doi.org/10.1109/DATE.2010.5457246 Benveniste A, Bouillard A, Caspi P (2010) A unifying view of loosely time-triggered architectures. In: Proceedings of the tenth ACM international conference on embedded software - EMSOFT ‘10, p 189. https://doi.org/10.1145/1879021.1879047 Bhave A, Krogh BH, Garlan D, Schmerl B (2011) View consistency in architectures for cyber-physical systems. In: 2011 IEEE/ACM second international conference on cyber-physical systems, pp 151–160. https://doi.org/10.1109/ICCPS.2011.17 Biener C, Eling M, Wirfs JH (2014) Insurability of cyber risk 1, The Geneva Association, pp 1–4 Retrieved from https://www.genevaassociation.org/media/891047/ga2014-if14-biener_elingwirfs.pdf Blatter J, Haverland M (2012) Designing case studies. https://doi.org/10.1057/9781137016669 Bloem da Silveira Junior LA, Vasconcellos E, Vasconcellos Guedes L, Guedes LFA, Costa RM (2018) Technology roadmapping: A methodological proposition to refine Delphi results. Technol Forecast Soc Chang 126:194–206. https://doi.org/10.1016/J.TECHFORE.2017.08.011 Böhm F, Menges F, Pernul G (2018) Graph-based visual analytics for cyber threat intelligence. Cybersecurity 1(1):1–19. https://doi.org/10.1186/s42400-018-0017-4 Bouws, T., Kramer, F., Heemskerk, P., Van Os, M., Van Der Horst, T., Helmer, S., … De Heide, M. (2015). Smart Industry: Dutch Industry Fit for the Future. https://doi.org/527727 Boyes H, Hallaq B, Cunningham J, Watson T (2018) The industrial internet of things (IIoT): an analysis framework. Comput Ind 101:1–12. https://doi.org/10.1016/J.COMPIND.2018.04.015 Brass I, Tanczer L, Carr M, Elsden M, Blackstock J (2018) Standardising a moving target: the development and evolution of IoT security standards. Living Internet Things 24:9. https://doi.org/10.1049/cp.2018.0024 Brass I, Pothong K, Tanczer L, Carr M (2019) Standards, Governance and Policy. Cybersecurity of the Internet of Things (IoT): PETRAS Stream Report. https://doi.org/10.13140/RG.2.2.15925.42729 Brettel M, Fischer FG, Bendig D, Weber AR, Wolff B (2016) Enablers for self-optimizing production Systems in the Context of Industrie 4.0. Procedia CIRP 41:93–98. https://doi.org/10.1016/j.procir.2015.12.065 Breza M, Tomic I, McCann J (2018) Failures from the environment, a report on the first FAILSAFE workshop. ACM SIGCOMM Comput Commun Rev 48(2):40–45. https://doi.org/10.1145/3213232.3213238 Bryceson KP, Slaughter G (2010) Alignment of performance metrics in a multi-enterprise agribusiness: achieving integrated autonomy? Int J Product Perform Manag 59(4):325–350 Carruthers, K. (2016). Internet of things and beyond: cyber-physical systems - IEEE internet of things. IEEE Internet of Things. Retrieved from http://iot.ieee.org/newsletter/may-2016/internet-of-things-and-beyond-cyber-physical-systems.html Charmaz K (2006) Constructing grounded theory : a practical guide through qualitative analysis. Sage Publications, London Córdova F, Durán C, Sepúlveda J, Fernández A, Rojas M (2012) A proposal of logistic services innovation strategy for a mining company. J Technol Manag Innov 7(1):175–185 CRACS. (2018). Petras - cyber risk assessment for coupled systems (CRACS). Retrieved February 20, 2020, from EPSRC website: https://petras-iot.org/project/cyber-risk-assessment-for-coupled-systems-cracs/ Craggs B, Rashid A (2017) Smart cyber-physical systems: beyond usable security to security ergonomics by design. In: 2017 IEEE/ACM 3rd International Workshop on Software Engineering for Smart Cyber-Physical Systems (SEsCPS), pp 22–25. https://doi.org/10.1109/SEsCPS.2017.5 CVSS. (2019). Common vulnerability scoring system SIG. Retrieved December 26, 2017, from FIRST.org website: https://www.first.org/cvss/ David M (2005) Science in society. Palgrave Macmillan, New York DCMS. (2017). UK digital strategy 2017 - GOV.UK; Department for Culture, media and sport. Retrieved from https://www.gov.uk/government/publications/uk-digital-strategy/uk-digital-strategy de Reuver M, Sørensen C, Basole RC (2017) The digital platform: a research agenda. J Inf Technol 33(2):1–12. https://doi.org/10.1057/s41265-016-0033-3 De Roure, D., Page, K. R., Radanliev, P., & Van Kleek, M. (2019a). Complex coupling in cyber-physical systems and the threats of fake data. Living in the Internet of Things (IoT 2019), 2019 Page, 11 (6 pp.). doi: https://doi.org/10.1049/cp.2019.0136 De Roure D, Hendler JA, James D, Nurmikko-Fuller T, Van Kleek M, Willcox P (2019b) Towards a cyberphysicalweb science: A social machines perspective on pokémon go, WebSci 2019 - Proceedings of the 11th ACM Conference on Web Science, pp 65–69. https://doi.org/10.1145/3292522.3326043 De Roure D, Hooper C, Page K, Tarte S, Willcox P (2015) Observing Social Machines Part 2, Proceedings of the ACM Web Science Conference on ZZZ - WebSci ‘15, pp 1–5. https://doi.org/10.1145/2786451.2786475 Dillon TS, Zhuge H, Wu C, Singh J, Chang E (2011) Web-of-things framework for cyber-physical systems. Concurrency Comput 23(9):905–923. https://doi.org/10.1002/cpe.1629 DiMase D, Collier ZA, Heffner K, Linkov I (2015) Systems engineering framework for cyber physical security and resilience. Environ Syst Decisions 35(2):291–300. https://doi.org/10.1007/s10669-015-9540-y Dombrowski U, Wagner T (2014) Mental strain as field of action in the 4th industrial revolution. Procedia CIRP 17:100–105. https://doi.org/10.1016/j.procir.2014.01.077 Dotoli M, Fanti MP, Meloni C, Zhou MC (2005) A multi-level approach for network design of integrated supply chains. Int J Prod Res 43(20):4267–4287. https://doi.org/10.1080/00207540500142316 Easterby-Smith M, Thorpe R, Lowe A (2002) Management research : an introduction. Sage Publications, London Eggenschwiler J, Agrafiotis I, Nurse JR (2016) Insider threat response and recovery strategies in financial services firms. Comput Fraud Secur 2016(11):12–19. https://doi.org/10.1016/S1361-3723(16)30091-4 Eisenhardt KM (1989) Building theories from case study research. Acad Manag Rev 14(4):532. https://doi.org/10.2307/258557 Eriksson P, Kovalainen A (2008) Qualitative methods in business research. Sage, London Evans, P. C., & Annunziata, M. (2012). Industrial Internet: Pushing the Boundaries of Minds and Machines. Retrieved from https://www.ge.com/docs/chapters/Industrial_Internet.pdf FAIR. (2020). FAIR risk analytics platform management. Retrieved December 26, 2017, from FAIR-U model website: https://www.fairinstitute.org/fair-u Faller C, Feldmüller D (2015) Industry 4.0 learning factory for regional SMEs. Procedia CIRP 32:88–91. https://doi.org/10.1016/j.procir.2015.02.117 Frohlich M, Westbrook R (2001) Arcs of integration: an international study of supply chain strategies G20. (2016). G20 New Industrial Revolution Action Plan. Retrieved from http://g20chn.org/English/Documents/Current/201609/P020160908738867573193.pdf Gershenfeld, N. A. (1999). When things start to think. Retrieved from https://books.google.com/books?hl=en&lr=&id=J8GLAwAAQBAJ&oi=fnd&pg=PP2&dq=When+Things+Start+to+Think&ots=8HHfEEuYYh&sig=vSgqQS_0PtX0cH_E_d0uDVTYlCI#v=onepage&q=When things start to think&f=false Ghirardello K, Maple C, Ng D, Kearney P (2018) Cyber security of smart homes: development of a reference architecture for attack surface analysis. Living Internet Things 45:10. https://doi.org/10.1049/cp.2018.0045 Giordano A, Spezzano G, Vinci A (2016) A smart platform for large-scale cyber-physical systems. https://doi.org/10.1007/978-3-319-26869-9_6 Glaser BG, Strauss AL (1967) The discovery of grounded theory : strategies for qualitative research. Routledge, Abingdon Gordon LA, Loeb MP (2002) The economics of information security investment. ACM Trans Inf Syst Secur 5(4):438–457. https://doi.org/10.1145/581271.581274 Goulding C (2002) Grounded theory : a practical guide for management, business and market researchers. Sage Publications, London GTAI. (2014). Industrie 4.0 smart manufacturing for the future. Retrieved from https://www.gtai.de/GTAI/Content/EN/Invest/_SharedDocs/Downloads/GTAI/Brochures/Industries/industrie4.0-smart-manufacturing-for-the-future-en.pdf Gubbi J, Buyya R, Marusic S, Palaniswami M (2013) Internet of things (IoT): A vision, architectural elements, and future directions. Futur Gener Comput Syst 29(7):1645–1660. https://doi.org/10.1016/j.future.2013.01.010 Gummesson E (2000) Qualitative methods in management research. Sage Publications, London Hahn A, Ashok A, Sridhar S, Govindarasu M (2013) Cyber-physical security Testbeds: architecture, application, and evaluation for smart grid. IEEE Trans Smart Grid 4(2):847–855. https://doi.org/10.1109/TSG.2012.2226919 Hermann M, Pentek T, Otto B (2016) Design principles for Industrie 4.0 scenarios. In: 2016 49th Hawaii international conference on system sciences (HICSS), pp 3928–3937. https://doi.org/10.1109/HICSS.2016.488 Hussain F (2017) Internet of everything. In: Internet of Things: Building Blocks and Business Models: SpringerBriefs in Electrical and Computer Engineering, pp 1–11. https://doi.org/10.1007/978-3-319-55405-1_1 IAM. (2018). Petras - Impact Assessment Model for the IoT (IAM). Retrieved February 20, 2020, from EPSRC website: https://petras-iot.org/project/impact-assessment-model-for-the-iot-iam/ IIC. (2016). The Industrial Internet of Things, Volume B01: Business Strategy and Innovation Framework; Industrial Internet Consortium. https://doi.org/IIC:PUB:B01:V1.0:PB:20161115 IIC. (2017). The Industrial Internet of Things Volume G5: Connectivity Framework; Industrial Internet Consortium. Retrieved from http://www.iiconsortium.org/pdf/IIC_PUB_G5_V1.0_PB_20170228.pdf Industrie 4.0. (2017). Plattform Industrie 4.0 - Testbeds. Retrieved May 13, 2017, from http://www.plattform-i40.de/I40/Navigation/EN/InPractice/Testbeds/testbeds.html IVI. (2017). Industrial Value Chain Reference Architecture; Industrial Value Chain Initiative. Retrieved from https://iv-i.org/en/docs/Industrial_Value_Chain_Reference_Architecture_170424.pdf Jayaram J, Tan K-C (2010) Supply chain integration with third-party logistics providers. Int J Prod Econ 125(2):262–271 Jazdi N (2014) Cyber physical systems in the context of industry 4.0. In: 2014 IEEE international conference on automation, quality and testing, robotics, pp 1–4. https://doi.org/10.1109/AQTR.2014.6857843 Jensen JC, Chang DH, Lee EA (2011) A model-based design methodology for cyber-physical systems, 2011 7th International Wireless Communications and Mobile Computing Conference, pp 1666–1671. https://doi.org/10.1109/IWCMC.2011.5982785 John, P. (2017). High Value Manufacturing Catapult. Retrieved from https://ec.europa.eu/growth/tools-databases/regional-innovation-monitor/sites/default/files/report/High value manufacturing Catapult_1.Pdf Kambatla K, Kollias G, Kumar V, Grama A (2014) Trends in big data analytics. J Parallel Distrib Comput 74:2561–2573. https://doi.org/10.1016/j.jpdc.2014.01.003 Kang W, Kapitanova K, Son SH (2012) RDDS: A real-time data distribution Service for Cyber-Physical Systems. IEEE Trans Ind Inform 8(2):393–405. https://doi.org/10.1109/TII.2012.2183878 Kaplan, R. S., & Norton, D. P. (1996). Using the balanced scorecard as a strategic management system. Harvard business review Boston Kirkpatrick K (2013) Software-defined networking. Commun ACM 56(9):16. https://doi.org/10.1145/2500468.2500473 Koch, R., & Rodosek, G. (2016). Proceedings of the 15th European Conference on Cyber Warfare and Security : ECCWS 2016 : hosted by Universität der Bundeswehr, Munich, Germany 7–8 July 2016. Retrieved from https://books.google.co.uk/books?hl=en&lr=&id=ijaeDAAAQBAJ&oi=fnd&pg=PA145&dq=economic+impact+of+cyber+risk&ots=50mTo8TVSV&sig=sD4V76yG5tG6IZIglmnGz3L1qqw&redir_esc=y#v=onepage&q=economic impact of cyber risk&f=false Kolberg D, Zühlke D (2015) Lean automation enabled by industry 4.0 technologies. IFAC-PapersOnLine 48(3):1870–1875. https://doi.org/10.1016/j.ifacol.2015.06.359 La HJ, Kim SD (2010) A service-based approach to designing cyber physical systems, 2010 IEEE/ACIS 9th international conference on computer and information science, pp 895–900. https://doi.org/10.1109/ICIS.2010.73 Lee B, Cooper R, Hands D, Coulton P (2019a) Design drivers: A critical enabler to meditate value over the NPD process within internet of things, 4d Conference Proceedings: Meanings of Design in the Next Era. DML (Design Management Lab), Ritsumeikan University, Osaka, pp 96–107 Osaka Lee, B., Cooper, R., Hands, D., & Coulton, P. (2019b). Value creation for IoT: Challenges and opportunities within the design and development process. Living in the Internet of Things (IoT 2019). IET, Living in the Internet of Things 2019, London, United Kingdom, 1–8. Retrieved from doi: https://doi.org/10.1049/cp.2019.0127 Lee J, Bagheri B, Kao H-A (2015) A cyber-physical systems architecture for industry 4.0-based manufacturing systems. In: Manufacturing Letters (Vol. 3). https://doi.org/10.1016/j.mfglet.2014.12.001 Lee J, Kao H-A, Yang S (2014) Service innovation and smart analytics for industry 4.0 and big data environment. Procedia CIRP 16:3–8. https://doi.org/10.1016/j.procir.2014.02.001 Leitão P, Colombo AW, Karnouskos S (2016) Industrial automation based on cyber-physical systems technologies: prototype implementations and challenges. Comput Ind 81:11–25. https://doi.org/10.1016/j.compind.2015.08.004 Leng K, Chen X (2012) A genetic algorithm approach for TOC-based supply chain coordination. Appl Math Inform Sci 6(3):767–774 Leonard TC (2008) Richard H. Thaler, Cass R. Sunstein, nudge: improving decisions about health, wealth, and happiness. Constit Polit Econ 19(4):356–360. https://doi.org/10.1007/s10602-008-9056-2 Lewis D, Brigder D (2004) Market researchers make increasing use of brain imaging. Adv Clin Neurosci Rehabil 5(3):36–37 Retrieved from http://www.acnr.co.uk/pdfs/volume5issue3/v5i3specfeat.pdf Li L (2017) China’s manufacturing locus in 2025: With a comparison of “Made-in-China 2025” and “Industry 4.0.”. Technol Forecasting Soc Change. https://doi.org/10.1016/J.TECHFORE.2017.05.028 Li W, Liu K, Belitski M, Ghobadian A, O’Regan N (2016) E-leadership through strategic alignment: an empirical study of small- and medium-sized enterprises in the digital age. J Inf Technol 31(2):185–206. https://doi.org/10.1057/jit.2016.10 Longstaff TA, Haimes YY (2002) A holistic roadmap for survivable infrastructure systems. IEEE Trans Syst Man Cybern Syst Hum 32(2):260–268. https://doi.org/10.1109/TSMCA.2002.1021113 Lu H-P, Weng C-I (2018) Smart manufacturing technology, market maturity analysis and technology roadmap in the computer and electronic product manufacturing industry. Technol Forecast Soc Chang. https://doi.org/10.1016/j.techfore.2018.03.005 Madaan A, Nurse J, de Roure D, O’Hara K, Hall W, Creese S (2018) A storm in an IoT Cup: The Emergence of Cyber-Physical Social Machines. SSRN Electron J. https://doi.org/10.2139/ssrn.3250383 Madakam S, Ramaswamy R, Tripathi S (2015) Internet of things (IoT): A literature review. J Comput Commun 3(3):164–173. https://doi.org/10.4236/jcc.2015.35021 Manthou V, Vlachopoulou M, Folinas D (2004) Virtual e-chain (VeC) model for supply chain collaboration. Int J Prod Econ 87(3):241–250 Maple C, Bradbury M, Le AT, Ghirardello K (2019) A connected and autonomous vehicle reference architecture for attack surface analysis. Appl Sci 9(23):5101. https://doi.org/10.3390/app9235101 Marwedel P, Engel M (2016) Cyber-physical systems: opportunities, Challenges and (Some) Solutions. https://doi.org/10.1007/978-3-319-26869-9_1 MEICA. (2015). Industria Conectada 4.0: La transformación digital de la industria española Dossier de prensa; Ministry of Economy Industry and Competitiveness Accessibility. Retrieved from http://www.lamoncloa.gob.es/serviciosdeprensa/notasprensa/Documents/081015 dossier prensa Industria 4 0.Pdf Melnyk SA, Narasimhan R, DeCampos HA (2014) Supply chain design: issues, challenges, frameworks and solutions. Int J Prod Res 52(7):1887–1896. https://doi.org/10.1080/00207543.2013.787175 Mentzer JT, DeWitt W, Keebler JS, Min S, Nix NW, Smith CD, Zacharia ZG (2001) Defining supply chain management. In: Journal of Business logistics (Vol. 22). Wiley Online Library Metallo C, Agrifoglio R, Schiavone F, Mueller J (2018) Understanding business model in the internet of things industry. Technol Forecast Soc Chang. https://doi.org/10.1016/J.TECHFORE.2018.01.020 METI. (2015). NRS, New Robot Strategy - Vision Strategy and Action Plan; Ministry of Economy Trade and Industry of Japan. Retrieved from http://www.meti.go.jp/english/press/2015/pdf/0123_01b.pdf METIJ (2015) RRI, robot revolution initiative - summary of Japan’s robot strategy - It’s vision, strategy and action plan. Ministry of Economy, Trade and Industry of Japan, Japan. Retrieved from http://www.meti.go.jp/english/press/2015/pdf/0123_01c.pdf Miles MB, Huberman AM, Saldaña J (1983) Qualitative data analysis : a methods sourcebook MIUR (2014) Italian Technology Cluster: Intelligent Factories. Ministry of Education Universities and Research Retrieved May 9, 2017, from Cluster Tecnologico Nazionale Fabbrica Intelligente | Imprese, università, organismi di ricerca, associazioni e enti territoriali: insieme per la crescita del Manifatturiero, Italy. website: http://www.fabbricaintelligente.it/en/ Müller JM, Buliga O, Voigt K-I (2018) Fortune favors the prepared: how SMEs approach business model innovations in industry 4.0, Technological Forecasting and Social Change. https://doi.org/10.1016/J.TECHFORE.2017.12.019 Nicolescu R, Huth M, Radanliev P, De Roure D (2018a) Mapping the values of IoT. J Inf Technol 33(4):345–360. https://doi.org/10.1057/s41265-018-0054-1 Nicolescu, R., Huth, M., Radanliev, P., & De Roure, D. (2018b). State of The Art in IoT - Beyond Economic Value. Retrieved from https://iotuk.org.uk/wp-content/uploads/2018/08/State-of-the-Art-in-IoT-–-Beyond-Economic-Value2.pdf NIF. (2016). New Industrial France: Building France’s industrial future - updated text from the 2013 version. Retrieved from https://www.economie.gouv.fr/files/files/PDF/web-dp-indus-ang.pdf Niggemann O, Biswas G, Kinnebrew JS, Khorasgani H, Volgmann S, Bunte A (2015) Data-driven monitoring of cyber-physical systems leveraging on big data and the internet-of-things for diagnosis and control, International Workshop on the Principles of Diagnosis (DX), pp 185–192 Retrieved from http://ceur-ws.org/Vol-1507/dx15paper24.pdf Nikulin C, Graziosi S, Cascini G, Araneda A, Minutolo M (2013) An algorithm for supply chain integration based on OTSM-TRIZ. Procedia Soc Behav Sci 75:383–396 Nurse J, Creese S, De Roure D (2017) Security risk assessment in internet of things systems. IT Professional 19(5):20–26. https://doi.org/10.1109/MITP.2017.3680959 Nurse JR, Radanliev P, Creese S, De Roure D (2018) Realities of risk: ‘if you can’t understand it, you can’t properly assess it!’: The reality of assessing security risks in internet of things systems. Living Internet Things 2018:1–9. https://doi.org/10.1049/cp.2018.0001 Okutan A, Werner G, Yang SJ, McConky K (2018) Forecasting cyberattacks with incomplete, imbalanced, and insignificant data. Cybersecurity 1(1):1–16. https://doi.org/10.1186/s42400-018-0016-5 Okutan A, Yang SJ (2019) ASSERT: attack synthesis and separation with entropy redistribution towards predictive cyber defense. Cybersecurity 2(1):1–18. https://doi.org/10.1186/s42400-019-0032-0 Ouyang, J., Lin, S., Jiang, S., Hou, Z., Wang, Y., Wang, Y., … Hou, Zhenyu; Wang, Yong; Wang, Y. (2014). SDF: software-defined flash for web-scale internet storage systems. Proceedings of the 19th international conference on architectural support for programming languages and operating systems - ASPLOS ‘14, 42(1), 471–484. doi: https://doi.org/10.1145/2541940.2541959 Paltridge B (2017) Peer review in academic settings. In: The Discourse of Peer Review, pp 1–29. https://doi.org/10.1057/978-1-137-48736-0_1 Pan M, Sikorski J, Kastner CA, Akroyd J, Mosbach S, Lau R, Kraft M (2015) Applying industry 4.0 to the Jurong Island Eco-Industrial Park. Energy Procedia 75:1536–1541. https://doi.org/10.1016/j.egypro.2015.07.313 Perez-Franco R (2016) Rethinking your supply chain strategy: a brief guide PETRAS. (2020). Impact of Cyber Risk at the Edge: Cyber Risk Analytics and Artificial Intelligence (CRatE). Retrieved February 17, 2020, from https://petras-iot.org/project/impact-of-cyber-risk-at-the-edge-cyber-risk-analytics-and-artificial-intelligence-crate/ Petrolo R, Loscri V, Mitton N (2016) Cyber-physical objects as key elements for a smart Cyber-City. https://doi.org/10.1007/978-3-319-26869-9_2 Posada J, Toro C, Barandiaran I, Oyarzun D, Stricker D, de Amicis R et al (2015) Visual computing as a key enabling Technology for Industrie 4.0 and industrial internet. IEEE Comput Graph Appl 35(2):26–40. https://doi.org/10.1109/MCG.2015.45 Prajogo D, Olhager J (2012) Supply chain integration and performance: the effects of long-term relationships, information technology and sharing, and logistics integration. Int J Prod Econ 135(1):514–522 Pramatari K, Evgeniou T, Doukidis G (2009) Implementation of collaborative e-supply-chain initiatives: an initial challenging and final success case from grocery retailing. J Inf Technol 24(3):269–281. https://doi.org/10.1057/jit.2008.11 Qu T, Huang GQ, Cung V-D, Mangione F (2010) Optimal configuration of assembly supply chains using analytical target cascading. Int J Prod Res 48(23):6883–6907. https://doi.org/10.1080/00207540903307631 Radanliev P, De Roure D, Nicolescu R, Huth M (2019a) A reference architecture for integrating the Industrial Internet of Things in the Industry 4.0. In: University of Oxford combined working papers and project reports prepared for the PETRAS National Centre of Excellence and the Cisco Research Centre. https://doi.org/10.13140/RG.2.2.26854.47686 Radanliev P, Nicolescu R, De Roure D, Huth M (2019b) Harnessing economic value from the internet of things, London Radanliev P, Roure D, De Nurse J, Nicolescu R (2019c) Cyber risk impact assessment–discussion on assessing the risk from the IoT to the digital economy. University of Oxford Combined Working Papers and Project Reports Prepared for the PETRAS National Centre of Excellence and the Cisco Research Centre Radanliev P (2014) A conceptual framework for supply chain systems architecture and integration design based on practice and theory in the North Wales slate mining industry. British Library, Cardiff. https://doi.org/ISNI:0000 0004 5352 6866 Radanliev P (2015a) Architectures for green-field supply chain integration. J Supply Chain Oper Manage 13(2). https://doi.org/10.20944/preprints201904.0144.v1 Radanliev P (2015b) Engineering design methodology for green-field supply chain architectures taxonomic scheme. J Oper Supply Chain Manage 8(2):52–66. https://doi.org/10.12660/joscmv8n2p52-66 Radanliev P (2015c) Green-field architecture for sustainable supply chain strategy formulation. Int J Supply Chain Manage 4(2):62–67. https://doi.org/10.20944/preprints201904.0116.v1 Radanliev P (2016) Supply chain systems architecture and engineering design: green-field supply chain integration. Oper Supply Chain Manage 9(1). https://doi.org/10.20944/preprints201904.0122.v1 Radanliev P (2019a) Cyber risk impact assessment. In: University of Oxford combined working papers and project reports prepared for the PETRAS National Centre of Excellence and the Cisco Research Centre. University of Oxford combined working papers and project reports prepared for the PETRAS National Centre of Excellence and the Cisco Research Centre, Oxford Radanliev P (2019b) Cyber risk Management for the Internet of things. In: University of Oxford combined working papers and project reports prepared for the PETRAS National Centre of Excellence and the Cisco Research Centre. https://doi.org/10.13140/RG.2.2.34482.86722 Radanliev P (2019c) Digital supply chains for industry 4.0 taxonomy of approaches, University of Oxford Combined Working Papers and P, (April). https://doi.org/10.20944/preprints201904.0160.v1 Radanliev P, Charles De Roure D, Nurse JRC, Burnap P, Montalvo RM (2019d) Methodology for designing decision support supply chain systems for visualising and mitigating cyber risk from IoT technologies. In: University of Oxford combined working papers and project reports prepared for the PETRAS National Centre of Excellence and the Cisco Research Centre. https://doi.org/10.13140/RG.2.2.32975.53921 Radanliev, Petar, De Roure, D., Cannady, S., Mantilla Montalvo, R., Nicolescu, R., & Huth, M. (2018a). Economic impact of IoT cyber risk - analysing past and present to predict the future developments in IoT risk analysis and IoT cyber insurance. Living in the Internet of Things: Cybersecurity of the IoT - 2018, (CP740), 3 (9 pp.). doi: https://doi.org/10.1049/cp.2018.0003 Radanliev P, De Roure D, Cannady S, Montalvo RM, Nicolescu R, Huth M (2019f) Analysing IoT cyber risk for estimating IoT cyber insurance, University of Oxford Combined Working Papers and Project Reports Prepared for the PETRAS National Centre of Excellence and the Cisco Research Centre. https://doi.org/10.13140/RG.2.2.25006.36167 Radanliev P, De Roure D, Maple C, Nurse JR, Nicolescu R, Ani U (2019g) Cyber Risk in IoT Systems. In: University of Oxford combined working papers and project reports prepared for the PETRAS National Centre of Excellence and the Cisco Research Centre. https://doi.org/10.13140/RG.2.2.29652.86404 Radanliev P, De Roure D, Nicolescu R, Huth M, Montalvo RM, Cannady S, Burnap P (2018b) Future developments in cyber risk assessment for the internet of things. Comput Ind 102:14–22. https://doi.org/10.1016/J.COMPIND.2018.08.002 Radanliev P, De Roure D, Nurse JR, Burnap P, Anthi E, Ani U et al (2019l) Cyber risk from IoT technologies in the supply chain-discussion on supply chains decision support system for the digital economy. In: University of Oxford combined working papers and project reports prepared for the PETRAS National Centre of Excellence and the Cisco Research Centre. https://doi.org/10.13140/RG.2.2.17286.22080 Radanliev P, De Roure D, Nurse JR, Nicolescu R, Huth M, Cannady S, Mantilla Montalvo R (2018c) Integration of Cyber Security Frameworks, Models and Approaches for Building Design Principles for the Internet-of-things in Industry 4.0. Living Internet Things 41:6. https://doi.org/10.1049/cp.2018.0041 Radanliev P, De Roure D, Nurse JR, Nicolescu R, Huth M, Cannady S, Mantilla Montalvo R (2019k) New developments in Cyber Physical Systems, the Internet of Things and the Digital Economy – future developments in the Industrial Internet of Things and Industry 4.0. In: University of Oxford combined working papers and project reports prepared for the PETRAS National Centre of Excellence and the Cisco Research Centre. https://doi.org/10.13140/RG.2.2.14133.93921 Radanliev P, De Roure D, Nurse JRC, Montalvo RM, Burnap P (2019m) Standardisation of cyber risk impact assessment for the internet of things (IoT). In: University of Oxford combined working papers and project reports prepared for the PETRAS National Centre of Excellence and the Cisco Research Centre. https://doi.org/10.13140/RG.2.2.27903.05280 Radanliev P, De Roure D, Nurse JRC, Nicolescu R, Huth M, Cannady S, Montalvo RM (2019n) Cyber Security Framework for the Internet-of-Things in Industry 4.0. In: University of Oxford combined working papers and project reports prepared for the PETRAS National Centre of Excellence and the Cisco Research Centre. https://doi.org/10.13140/RG.2.2.32955.87845 Radanliev P, De Roure D, Nurse JRCC, Nicolescu R, Huth M, Cannady S et al (2019i) Cyber risk impact assessment - assessing the risk from the IoT to the digital economy. In: University of Oxford combined working papers and project reports prepared for the PETRAS National Centre of Excellence and the Cisco Research Centre. https://doi.org/10.13140/RG.2.2.11145.49768 Radanliev P, De Roure DC, Nurse JRC, Montalvo RM, Burnap P (2019j) The Industrial Internet-of-Things in the Industry 4.0 supply chains of small and medium sized enterprises. In: University of Oxford combined working papers and project reports prepared for the PETRAS National Centre of Excellence and the Cisco Research Centre. https://doi.org/10.13140/RG.2.2.14140.49283 Radanliev P, De Roure DC, Nurse JRC, Montalvo RM, Burnap P, De Roure DC et al (2019e) Design principles for cyber risk impact assessment from internet of things (IoT). In: University of Oxford combined working papers and project reports prepared for the PETRAS National Centre of Excellence and the Cisco Research Centre. https://doi.org/10.13140/RG.2.2.33014.86083 Radanliev, Petar, Roure, D. C. De, R.C. Nurse, J., Montalvo, R. M., Cannady, S., Santos, O., Maple, C. (2020). Future developments in standardisation of cyber risk in the internet of things (IoT). SN Appl Sci, (2: 169), 1–16. doi: https://doi.org/10.1007/s42452-019-1931-0 Radanliev P, DeRoure D, Nurse JRC, Burnap P, Anthi E, Ani U et al (2019h) Definition of cyber strategy transformation roadmap for standardisation of IoT risk impact assessment with a goal-oriented approach and the internet of things micro Mart. In: University of Oxford combined working papers and project reports prepared for the PETRAS National Centre of Excellence and the Cisco Research Centre. https://doi.org/10.13140/RG.2.2.12462.77124 Rajkumar R, Lee I, Sha L, Stankovic J (2010) Cyber-physical systems: the next computing revolution, Proceedings of the 47th Design Automation Conference on - DAC ‘10, p 731. https://doi.org/10.1145/1837274.1837461 Ribeiro L, Barata J, Ferreira J (2010) An agent-based interaction-oriented shop floor to support emergent diagnosis, 2010 8th IEEE international conference on industrial informatics, pp 189–194. https://doi.org/10.1109/INDIN.2010.5549436 Ringert, J. O., Rumpe, B., & Wortmann, A. (2015). Architecture and Behavior Modeling of Cyber-Physical Systems with MontiArcAutomaton. Retrieved from http://arxiv.org/abs/1509.04505 Rodewald G, Gus (2005) Aligning information security investments with a firm’s risk tolerance, Proceedings of the 2nd Annual Conference on Information Security Curriculum Development - InfoSecCD ‘05, p 139. https://doi.org/10.1145/1107622.1107654 Rosenzweig ED, Roth AV, Dean JW (2003) The influence of an integration strategy on competitive capabilities and business performance: an exploratory study of consumer products manufacturers. J Oper Manag 21(4):437–456 Roumani MA, Fung CC, Rai S, Xie H (2016) Value analysis of cyber security based on attack types. ITMSOC Trans Innov Bus Eng 01:34–39 Retrieved from http://www.itmsoc.org Ruan K (2017) Introducing cybernomics: A unifying economic framework for measuring cyber risk. Comput Secur 65:77–89. https://doi.org/10.1016/j.cose.2016.10.009 FTSE Russell. (2018). Industry classification benchmark (ICB) | FTSE Russell. Retrieved February 23, 2018, from FTSE international limited and frank Russell company website: http://www.ftserussell.com/financial-data/industry-classification-benchmark-icb Rutter T (2015) The rise of nudge – the unit helping politicians to fathom human behavior. Guardian 7(23):2015 Retrieved from https://www.theguardian.com/public-leaders-network/2015/jul/23/rise-nudge-unit-politicians-human-behaviour Safa NS, Maple C, Watson T, Von Solms R (2018) Motivation and opportunity based model to reduce information security insider threats in organisations. J Inform Secur Appl 40:247–257. https://doi.org/10.1016/J.JISA.2017.11.001 Sakka O, Millet P-A, Botta-Genoulaz V (2011) An ontological approach for strategic alignment: a supply chain operations reference case study. Int J Comput Integr Manuf 24(11):1022–1037 Sangiovanni-Vincentelli A, Damm W, Passerone R (2012) Taming Dr. Frankenstein: contract-based Design for Cyber-Physical Systems * g. Eur J Control 18:217–238. https://doi.org/10.3166/EJC.18.217-238 Schnetzler MJ, Sennheiser A, Schönsleben P (2007) A decomposition-based approach for the development of a supply chain strategy. Int J Prod Econ 105(1):21–42. https://doi.org/10.1016/j.ijpe.2006.02.004 SCPRC. (2017). Made in China 2025; the state council People Republic of China. Retrieved may 10, 2017, from www.english.gov.cn website: http://english.gov.cn/2016special/madeinchina2025/ Shackelford SJ (2016) Protecting intellectual property and privacy in the digital age: the use of National Cybersecurity Strategies to mitigate cyber risk. Chapman Law Rev 19:412–445 Retrieved from http://heinonline.org/HOL/Page?handle=hein.journals/chlr19&id=469&div=26&collection=journals Shadbolt N, O’Hara K, De Roure D, Hall W (2019) The theory and practice of social machines. In: Lecture Notes in Social Networks. https://doi.org/10.1007/978-3-030-10889-2 Shafiq SI, Sanin C, Szczerbicki E, Toro C (2015) Virtual engineering object / virtual engineering process: A specialized form of cyber physical system for Industrie 4.0. Procedia Comp Sci 60:1146–1155. https://doi.org/10.1016/j.procs.2015.08.166 Shaw DR, Snowdon B, Holland CP, Kawalek P, Warboys B (2004) The viable systems model applied to a smart network: the case of the UK electricity market. J Inf Technol 19(4):270–280. https://doi.org/10.1057/palgrave.jit.2000028 Shi J, Wan J, Yan H, Suo H (2011) A survey of cyber-physical systems, 2011 international conference on wireless communications and signal processing (WCSP), pp 1–6. https://doi.org/10.1109/WCSP.2011.6096958 Siemens. (2017). Made Smarter review 2017. Retrieved from https://assets.publishing.service.gov.uk/government/uploads/system/uploads/attachment_data/file/655570/20171027_MadeSmarter_FINAL_DIGITAL.pdf Sirris and Agoria. (2017). Made Different: Factory of the Future 4.0. Retrieved May 9, 2017, from http://www.madedifferent.be/en/what-factory-future-40 Sokolov B, Ivanov D (2015) Integrated scheduling of material flows and information services in industry 4.0 supply networks. IFAC-PapersOnLine 48(3):1533–1538. https://doi.org/10.1016/j.ifacol.2015.06.304 Stock T, Seliger G (2016) Opportunities of sustainable manufacturing in industry 4.0. Procedia CIRP 40:536–541. https://doi.org/10.1016/j.procir.2016.01.129 Stojmenovic I (2014) Machine-to-machine communications with in-network data aggregation, processing, and actuation for large-scale cyber-physical systems. IEEE Internet Things J 1(2):122–128. https://doi.org/10.1109/JIOT.2014.2311693 Strader TJ, Lin F-R, Shaw MJ (1999) Business-to-business electronic commerce and convergent assembly supply chain management. J Inf Technol 14(4):361–373. https://doi.org/10.1080/026839699344476 Sukati I, Hamid AB, Baharun R, Yusoff RM (2012) The study of supply chain management strategy and practices on supply chain performance. Procedia Soc Behav Sci 40:225–233 Tan, Y., Goddard, S., & Pérez, L. C. (2008). A prototype architecture for cyber-physical systems. ACM SIGBED Review - Special Issue on the RTSS Forum on Deeply Embedded Real-Time Computing, 5(1). Retrieved from http://delivery.acm.org/10.1145/1370000/1366309/p26-tan.pdf?ip=129.67.116.155&id=1366309&acc=ACTIVE SERVICE&key=BF07A2EE685417C5.F2FAECDC86A918EB.4D4702B0C3E38B35.4D4702B0C3E38B35&CFID=922793771&CFTOKEN=47199625&__acm__=1492383641_ca27b2c456d59140 Tanczer LM, Steenmans I, Elsden M, Blackstock J, Carr M (2018) Emerging risks in the IoT ecosystem: Who’s afraid of the big bad smart fridge? Living Internet Things 33:9. https://doi.org/10.1049/cp.2018.0033 Taylor P, Allpress S, Carr M, Lupu E, Norton J, Smith L, Blackstock J, Boyes H, Hudson-Smith A, Brass I, Chizari H, Cooper R, Coulton P, Craggs B, Davies N, De Roure D, Elsden M, Huth M, Lindley J, Maple C, Mittelstadt B, Nicolescu R, Nurse J, Procter R, Radanliev P, Rashid A, Sgandurra D, Skatova A, Taddeo M, Tanczer L, Vieira-Steiner R et al (2018) Internet of things realising the potential of a trusted smart world. Royal Academy of Engineering, London Thramboulidis K (2015) A cyber–physical system-based approach for industrial automation systems. Comput Ind 72:92–102. https://doi.org/10.1016/j.compind.2015.04.006 Toro C, Barandiaran I, Posada J (2015) A perspective on knowledge based and intelligent systems implementation in Industrie 4.0. Procedia Comput Sci 60:362–370. https://doi.org/10.1016/j.procs.2015.08.143 Van der Vaart T, van Donk DP (2008) A critical review of survey-based research in supply chain integration. Int J Prod Econ 111(1):42–55 Van Kleek M, Binns R, Zhao J, Slack A, Lee S, Ottewell D, Shadbolt N (2018) X-ray refine, Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems - CHI ‘18, pp 1–13. https://doi.org/10.1145/3173574.3173967 Vickery SK, Jayaram J, Droge C, Calantone R (2003) The effects of an integrative supply chain strategy on customer service and financial performance: an analysis of direct versus indirect relationships. J Oper Manag 21(5):523–539 Wahlster, W., Helbig, J., Hellinger, A., Stumpf, M. A. V., Blasco, J., Galloway, H., & Gestaltung, H. (2013). Recommendations for implementing the strategic initiative INDUSTRIE 4.0. Retrieved from http://www.acatech.de/fileadmin/user_upload/Baumstruktur_nach_Website/Acatech/root/de/Material_fuer_Sonderseiten/Industrie_4.0/Final_report__Industrie_4.0_accessible.pdf Wan J, Cai H, Zhou K (2015) Industrie 4.0: enabling technologies, Proceedings of 2015 international conference on intelligent computing and internet of things, pp 135–140. https://doi.org/10.1109/ICAIOT.2015.7111555 Wan, J., Chen, M., Xia, F., Di, L., & Zhou, K. (2013). From machine-to-machine communications towards cyber-physical systems. Computer Science and Information Systems, 10(3), 1105–1128. https://doi.org/10.2298/CSIS120326018W. Wang L (2013) Machine availability monitoring and machining process planning towards cloud manufacturing. CIRP J Manuf Sci Technol 6(4):263–273. https://doi.org/10.1016/j.cirpj.2013.07.001 Wang L, Törngren M, Onori M (2015) Current status and advancement of cyber-physical systems in manufacturing. J Manuf Syst 37:517–527. https://doi.org/10.1016/j.jmsy.2015.04.008 Wang L, Wang XV, Gao L, Váncza J (2014) A cloud-based approach for WEEE remanufacturing. CIRP Ann Manuf Technol 63(1):409–412. https://doi.org/10.1016/j.cirp.2014.03.114 Wang S, Wan J, Li D, Zhang C (2016) Implementing smart factory of Industrie 4.0: an outlook. Int J Distributed Sensor Netw 12(1):1–10. https://doi.org/10.1155/2016/3159805 Wang Y, Wu W, Zhang C, Xing X, Gong X, Zou W (2019) From proof-of-concept to exploitable. Cybersecurity 2(1):1–25. https://doi.org/10.1186/s42400-019-0028-9 Wark T, Corke P, Sikka P, Klingbeil L, Guo Y, Crossman C et al (2007) Transforming agriculture through pervasive wireless sensor networks. IEEE Pervasive Comput 6(2):50–57. https://doi.org/10.1109/MPRV.2007.47 Weyer S, Schmitt M, Ohmer M, Gorecky D (2015) Towards industry 4.0 - standardization as the crucial challenge for highly modular, multi-vendor production systems. IFAC-PapersOnLine 48(3):579–584. https://doi.org/10.1016/j.ifacol.2015.06.143 World Economic Forum. (2015). Partnering for Cyber Resilience Towards the Quantification of Cyber Threats. Retrieved from http://www3.weforum.org/docs/WEFUSA_QuantificationofCyberThreats_Report2015.pdf Yen B, Farhoomand A, Ng P (2004) Constructing an e-supply chain at Eastman chemical company. J Inf Technol 19(2):93–107. https://doi.org/10.1057/palgrave.jit.2000011 Zhang Q, Jia S, Chang B, Chen B (2018) Ensuring data confidentiality via plausibly deniable encryption and secure deletion – a survey. Cybersecurity 1(1):1–20. https://doi.org/10.1186/s42400-018-0005-8 Zhu Q, Rieger C, Basar T (2011) A hierarchical security architecture for cyber-physical systems, 2011 4th International Symposium on Resilient Control Systems, pp 15–20. https://doi.org/10.1109/ISRCS.2011.6016081