Depending on the amount of data to process, file generation may take longer.

If it takes too long to generate, you can limit the data by, for example, reducing the range of years.

Article

Download file Download BibTeX

Title

Managerial Recommendations Concerning the Cybersecurity of Information and Knowledge Resources in Production Enterprises Implementing the Industry 4.0 Concept

Authors

[ 1 ] Instytut Logistyki, Wydział Inżynierii Zarządzania, Politechnika Poznańska | [ P ] employee

Scientific discipline (Law 2.0)

[6.6] Management and quality studies

Year of publication

2022

Published in

Management and Production Engineering Review

Journal year: 2022 | Journal volume: vol. 13 | Journal number: no. 3

Article type

scientific article

Publication language

english

Keywords
EN
  • Management
  • Cybersecurity
  • Information and knowledge resources
  • Industry 4.0.
Abstract

EN The paper addresses a managerial problem related to ensuring cybersecurity of information and knowledge resources in production enterprises interested in the implementation of INDUSTRY 4.0 technologies. The material presented shows the results of experimental research of a qualitative nature, using two expert inventive methods: brain-netting and a fuzzy formula of inference. The experts’ competences included the following three variants of the industrial application of the INDUSTRY 4.0 concept: (1) high production volumes achieved using a dedicated and fully robotic production line (2) the manufacture of short, personalized series of products through universal production cells, and (3) the manufacture of specialized unit products for individual customers. The Google Forms software was used to collect these expert opinions. The conclusions of the research carried out using the brain-netting method point to nine variants of the cybersecurity strategy of IT networks and knowledge base resources in manufacturing enterprises represented by the experts. The results of the research using the fuzzy formula of inference are numerically and situationally defined relations linking the above-mentioned nine strategies with five types of cyber-attacks. The summary record of these relations as the basis for managerial cybersecurity recommendations has a matrix form.

Pages (from - to)

30 - 38

DOI

10.24425/mper.2022.142380

License type

CC BY (attribution alone)

Open Access Mode

open journal

Open Access Text Version

final published version

Date of Open Access to the publication

at the time of publication

Full text of article

Download file

Access level to full text

public

Ministry points / journal

70

Impact Factor

1,4

This website uses cookies to remember the authenticated session of the user. For more information, read about Cookies and Privacy Policy.