Loading…
A decision support model for assessing and prioritization of industry 5.0 cybersecurity challenges
•Identify the primary challenges related to Industry 5.0 cybersecurity.•Determine the ranking among the challenges using GTMA.•Provide recommendations regarding critical aspects of Industry 5.0 cybersecurity.•Display the efficacy of the GTMA approach in the Context of Industry 5.0 related challenges...
Saved in:
Published in: | Sustainable Manufacturing and Service Economics 2024, Vol.3, p.100018, Article 100018 |
---|---|
Main Authors: | , , , , |
Format: | Article |
Language: | English |
Subjects: | |
Citations: | Items that this one cites |
Online Access: | Get full text |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Summary: | •Identify the primary challenges related to Industry 5.0 cybersecurity.•Determine the ranking among the challenges using GTMA.•Provide recommendations regarding critical aspects of Industry 5.0 cybersecurity.•Display the efficacy of the GTMA approach in the Context of Industry 5.0 related challenges.
The world is adopting the Industry 5.0 paradigm to increase human centricity, sustainability, and resilience in efficient, optimized, and profitable manufacturing systems. With benefits, however, come increased risks of economic and physical loss, driving the need for continuous improvement of Industry 5.0 cybersecurity. Implementation and advancement of adequate cybersecurity have created challenges that have been identified in the literature. In this study, key Industry 5.0 cybersecurity challenges and related sub-challenges are highlighted based on a literature review. Graph Theory and Matrix Approach (GTMA) is employed to analyze the challenges and determine relative importance based on permanent values of the variable permanent matrix (VPM). The results identify the most important Industry 5.0 cybersecurity challenges and reveal Industry 5.0 firms should primarily concentrate on supply chain vulnerabilities to decrease data loss and hacking in the organization's supply chain network. This study also recommends that executives and lawmakers acquire knowledge regarding cybersecurity challenges and prepare to deal with them. Addressing these and other subsequently prioritized challenges—the top five rounded out with emergent cybersecurity trends, non-availability of cybersecurity curriculum in education, embedded technical constraints, and absence of skilled employees and training—will lead the methodical development of holistic, robust cybersecurity programs. Firms accepting of this reality may implement such programs to mitigate evolving cyber-risk towards harnessing and sustaining the benefits of novel Industry 5.0 technologies. |
---|---|
ISSN: | 2667-3444 2667-3444 |
DOI: | 10.1016/j.smse.2024.100018 |