Article

Endüstri 5.0'a Geçişte Siber Güvenlik: Yeni Sanayileşen Ülkeler Üzerine Bir İnceleme

Authors:
To read the full-text of this research, you can request a copy directly from the author.

Abstract

Bu çalışmanın amacı, yeni sanayileşen ülkelerin siber güvenlik düzeylerini derinlemesine değerlendirerek, bu ülkelerin Endüstri 5.0'a geçişlerini güvenli bir biçimde gerçekleştirmelerine yönelik içgörüler sunmaktır. Endüstri 5.0, kişiselleştirilmiş ürün ve hizmetlerin sürdürülebilir bir biçimde sunulmasını sağlayarak dijital dönüşümde yeni bir aşamayı temsil etmekte, ancak bu süreçte ortaya çıkan siber güvenlik riskleri işletmeler için önemli tehditler oluşturmaktadır. İşletmeler bu risklere karşı gerekli önlemleri alsalar da siber güvenliğin etkin bir şekilde sağlanabilmesi ülkelerin benimsediği politikalarla yakından ilişkilidir. Bu nedene ülkelerin siber güvenliğe ilişkin yaklaşımları, Endüstri 5.0’a geçiş sürecini önemli ölçüde şekillendirmektedir. Bu bağlamda, Entropi tabanlı MABAC yöntemiyle yapılan değerlendirme, organizasyonel önlemlerin yeni sanayileşen ülkeler için en kritik siber güvenlik göstergesi olduğunu ve Malezya'nın bu ülkeler arasında siber güvenlik düzeyi bakımından lider konumda olduğunu ortaya koymuştur.

No full-text available

Request Full-text Paper PDF

To read the full-text of this research,
you can request a copy directly from the author.

... Gig ekonomisi, bireysel müşterilere yönelik kısa süreli ve kişiselleştirilmiş hizmetlerin önem kazandığı bir iş modeli olarak, endüstriyel dönüşümle paralel şekilde dönüşüm geçirmektedir. Endüstriyel dönüşümün esnek ve otonom sistemler aracılığıyla bireysel deneyimleri iyileştirme kapasitesi (Duran, 2024), gig ekonomisinin dijital platformlar üzerindeki yapısal gelişimini hızlandırmıştır. Aynı zamanda insan ve makine iş birliğine dayalı üretim modelleri, gig ekonomisinde çalışanların rollerini yeniden tanımlamakta ve bu çalışanların platformlar aracılığıyla esnek bir şekilde iş süreçlerine katılımını teşvik etmektedir. ...
Chapter
Full-text available
2009 yılından önce “Uber” kelimesi, yalnızca Almanca'da “üstünde” veya “süper” anlamına gelen bir sözcük olarak hatırlanıyor ve daha çok Friedrich Nietzsche’nin insan anlayışıyla ilgili yazılarıyla ilişkilendiriliyordu. Nietzsche’nin “Ubermensch” (üstinsan) kavramı, bireylerin kendi değerlerini yaratarak toplumsal normlardan ve geleneklerden bağımsızlaşan, güçlü ve özgür bir yaşam sürdürmelerini ifade etmek için kullandığı önemli bir terimdi. Ancak bugün “Uber,” yalnızca bir kelime olmanın ötesine geçerek 2009 yılında faaliyete başlayan ve dünya çapında bir iş modeli haline gelen bir sistemi temsil etmektedir. İnsanlar Uber’i, kendi araçlarıyla çalışarak bağımsız bir gelir elde etme fırsatı olarak görseler de, bu yeni iş modelinin Nietzsche’nin insan tipleri bağlamında gerçekten bağımsızlık vadedip etmediği bu çalışmanın temel sorusunu oluşturmaktadır.
... Ancak, Endüstri 5.0'ın getirdiği siber güvenlik riskleri de dikkate değerdir. Yeni sanayileşmiş ülkelerin siber güvenlik düzeyleri derinlemesine incelenmiş ve ülkelerin siber güvenliğe yönelik yaklaşımlarının bu geçiş sürecindeki kritik rolü ortaya konulmuştur (Duran, 2024). ...
Article
Siber fiziksel sistemler (SFS), fiziksel dünyadaki süreçlerin ve bilgisayar tabanlı kontrol mekanizmalarının entegrasyonunu sağlayan sistemlerdir. Bu sistemler, endüstriyel otomasyondan sağlık hizmetlerine kadar geniş bir yelpazede uygulama alanına sahiptir. Bu çalışmanın amacı, Türkiye'de SFS üzerine yapılan lisansüstü tezlerin bibliyometrik analizini yaparak, bu alandaki araştırma eğilimlerini ve mevcut durumu anlamaktır. Çalışma kapsamında, Türkiye'de yayınlanmış 80 lisansüstü tez incelenmiştir. Yapılan analizler, Türkiye'de SFS alanına olan ilginin son yıllarda arttığını göstermiştir. Bu analizler en fazla tezin 2019 yılında yayınlandığını göstermektedir, tezlerin %85’i yüksek lisans, %15’i doktora tezidir, tezlerin %95'i devlet üniversitelerinde, en fazla ise İstanbul Teknik Üniversitesi'nde yapılmıştır. Sosyal Bilimler Enstitüsü en fazla tez yayınlanan enstitü olmuştur. Ana bilim dalları arasında İşletme ve Endüstri Mühendisliği öne çıkmaktadır. Tezler genellikle nicel yöntemler kullanılarak hazırlanmıştır. Anahtar kelime analizleri, SFS çalışmalarının "endüstri 4.0", "akıllı sistemler" ve "siber güvenlik" gibi temalarda yoğunlaştığını ortaya koymuştur. Elde edilen bulgular, Türkiye'deki SFS araştırmalarının genel durumu hakkında kapsamlı bir bilgi sunmakta ve gelecekte yapılacak çalışmalar için yol gösterici öneriler sunmaktadır. Çalışmanın sonuçları, Türkiye'de SFS alanındaki araştırmaların daha da gelişmesi için disiplinler arası iş birliklerinin artırılması, siber güvenlik ve etik konularının derinlemesine incelenmesi ve uluslararası iş birliklerinin güçlendirilmesi gerektiğini önermektedir.
Article
Full-text available
Teknolojilerin ve yapay zekâ tabanlı çözümlerin hızla gelişmesi endüstrilerin hizmetlerini ve rekabetlerini etkilemektedir. Zira küresel anlamda meydana gelen tüm değişimler ve yenilikler imalat endüstrilerini daima etkisi altına almış ve onlar etrafında gerçekleşmiştir. Diğer endüstriyel devrimlerde olduğu gibi teknolojik dünya, gelişmiş ve farklılaşmış üretim teknikleri ile hızlı bir dönüşüm yaşamaktadır. Makinelerin insana özgü yetilere yönelik yapılan, yapay zeka ve arayüz çalışmaları sayesinde gelişen robotların artık insan zihinlerine eşleşmeleri onları daha önemli kılmıştır. Robotların insanların yerini alacağı algısının yanı sıra insanlar ile iş birliği içerisinde olacağı yeni bir üretim dönemine geçilmektedir. Endüstri 4.0’dan farklı olarak insan odaklı, sürdürülebilir ve esnekliğin hâkim olacağı Endüstri 5.0 kavramı tanıtılmaktadır. Tartışılanın aksine insansız üretim fikrinden ve diğer endüstriyel devrimlerinden ayrışarak daha insan ve çevre merkezli ortaya çıkan Endüstriyel 5.0 ilgililer için bir merak konusudur. Bu makale Endüstri 5.0 kavramına yayımlanan raporlar, çalışmalar ve araştırmalar sayesinde açıklık getirmektedir. Bunun yanında endüstrilerin kavrama ilişkin sahip olabileceği bazı özellikleri ve potansiyel endişeleri tartışmaktadır. Endüstri 5.0’ın temel bileşenleri olabilecek, İnsan-Siber Fiziksel Sistemler, Yeşil Zeka Üretimi ve İnsan-Robot İş Birliği çerçevesinde gerçekleşecek teknolojik yaklaşımlar öne sürülmektedir. Son olarak, Endüstri 5.0 kavramına ilişkin araştırmacılar tarafından ortaya koyulan bazı gelişmeleri sunmaktadır.
Article
Full-text available
If we look at the chronology of transitions between successive stages of industrialization, it is impossible not to notice a significant acceleration. There were 100 years between the industrial revolutions from 2.0 to 3.0, and only half a century passed from the conventional 3.0 to 4.0. Assuming that progress will inevitably continue to accelerate, and given that 2011 is the set date for the start of the fourth industrial revolution, we can expect Industry 5.0 by 2035. In recent years, Industrial Internet of Things (IIoT) applications proliferated, which include multiple network elements connected by wired and wireless communication technologies, as well as sensors and actuators placed in strategic locations. The significant pace of development of the industry of advantages in predicting threats to infrastructure will be related to the speed of analyzing the huge amount of data on threats collected not locally, but globally. This article sheds light on the potential role of artificial intelligence (AI) techniques, including machine learning (ML) and deep learning (DL), to significantly impact IIoT cyber threat prediction in Industry 5.0.
Article
Full-text available
Industry 5.0 (I5.0) represents a shift towards a human-centered industry and emphasizes the integration of human and machine capabilities. A highly compatible concept for enabling the I5.0 implementation is intelligent spaces (ISs), i.e., physical spaces equipped with a network of sensors, which obtains information about the place it observes, and a network of actuators, which enables changes in the environment through computing services. These spaces can sense, interpret, recognize user behavior, adapt to preferences, and provide natural interactions between humans and intelligent systems, using the IoT, AI, computer vision, data analytics, etc., to create dynamic and adaptive environments in real time. The integration of ISs and I5.0 has paved the way for the development of cognitive factories, which transform industrial environments into ISs. In this context, this article explores the convergence of IS and I5.0 concepts and aims to provide insights into the technical implementation challenges of cognitive factories. It discusses the development and implementation of a laboratory replica of a cognitive cell as an example of a segment of a cognitive factory. By analyzing the key points and challenges associated with cognitive cell implementation, this article contributes to the knowledge base surrounding the advanced manufacturing paradigm of I5.0.
Preprint
Full-text available
This study compares the National Cybersecurity Strategies (NCSSs) of publicly available documents of ten nations across Europe (United Kingdom, France, Lithuania, Estonia, Spain, and Norway), Asia-Pacific (Singapore and Australia), and the American region (the United States of America and Canada). The study observed that there is not a unified understanding of the term "Cybersecurity"; however, a common trajectory of the NCSSs shows that the fight against cybercrime is a joint effort among various stakeholders, hence the need for strong international cooperation. Using a comparative structure and an NCSS framework, the research finds similarities in protecting critical assets, commitment to research and development, and improved national and international collaboration. The study finds that the lack of a unified underlying cybersecurity framework leads to a disparity in the structure and contents of the strategies. The strengths and weaknesses of the NCSSs from the research can benefit countries planning to develop or update their cybersecurity strategies. The study gives recommendations that strategy developers can consider when developing an NCSS.
Article
Full-text available
The Industrial Revolution can be termed as the transformation of traditional industrial practices into new techniques dominated by the technologies available at that time. The first three industrial revolutions were driven respectively by mechanization, electrification, and automation which had gradually transformed the agrarian economy into a manufacturing-based economy. It helped in enhancing the lifestyle of the factory workers and the healthcare system, which improved the overall quality of living. The industries that adapted to the change witnessed a tremendous increase in the production of goods, competitive advantage, and cross-border business opportunities. While we are currently living to see the fourth industrial revolution (also known as Industry 4.0) unfolding around us, the world is poised for the next big leap, the fifth industrial revolution or Industry 5.0. Hence, the first half of the paper outlines the enabling technologies of Industry 4.0 and conceptualizes how they would act as the foundation for the fifth industrial revolution. The socio-economic challenges of the technologies and the need for Industry 5.0 technologies are also discussed. The second half of the paper outlines the prospective technologies of Industry 5.0, their potential applications from the perspective of industry leaders and scholars and conceptualizes how they can overcome the challenges of Industry 4.0. The definition of “sustainability trilemma” a new term coined by the authors, and the reasoning for calling the next industrial revolution “Industry 4.0S” (another new term) rather than Industry 5.0 are also presented.
Article
Full-text available
There are several indicators at the international level that assess the state of cyber security and digital development for a region, a country or a continent. The most important cyber security and digital development indicators calculated, at the country level, by international bodies are the Global Cybersecurity Index (GCI), the National Cyber Security Index (NCSI), the ICT Development Index (IDI) and the Network Readiness Index (NRI). Each of the cyber security indicators is closely linked to the digital development indicators. This article proposes a multi-criteria approach to calculate a complex indicator, called SECDIG, a combination of four internationally indicators. Two of these indicators are for cybersecurity (GCI and NCSI) and the other two indicators are for digital development (IDI and NRI). SECDIG encompasses the benefits of the four indicators considered together and will be able to serve decision-makers in making informed decisions. The proposed multi-criteria approach is based on the COmplex PRoportional ASsessment (COPRAS) method, a relatively recent method, that has proven effective in many applications. The multi-criteria method is applied to the calculation of the SECDIG composite indicator for 11 Eastern European countries.
Article
Full-text available
Recent technological advances encompassed by the smart factory concept have fundamentally changed industrial control systems in the way they are structured and how they operate. Majority of these changes affect Supervisory Control And Data Acquisition (SCADA) systems, shifting them to a higher level of interoperability, heterogeneous networks, big data and toward internet technologies and services in general. However, this transformation does not affect all SCADA systems equally. The immediate industrial environment and controlled processes have a significant impact as well. This paper presents a holistic approach to SCADA systems implemented in continuous flow production control within the steel industry production environment. We outline the multi-layer architecture of the SCADA control framework and the aspects of interoperability and interconnection within the architecture reference models, together with the research challenges and opportunities arising from the recent rapid increasement of the industrial control systems complexity and digital transformation under the Industry 4.0 paradigm, resulting in disrupting levels of the traditional automation pyramid based on Purdue model toward a higher level of integration and interoperability enabling cross-level data exchange empowered by the Industrial Internet of Things. Furthermore, the paper addresses the problem of proprietary SCADA systems and elaborates the causal correlation between SCADA quality requirements and adoption of new technology in relation to the specific industrial environment of the steel manufacturing process.
Article
Full-text available
Industry 5.0 is regarded as the next industrial evolution, its objective is to leverage the creativity of human experts in collaboration with efficient, intelligent and accurate machines, in order to obtain resource-efficient and user-preferred manufacturing solutions compared to Industry 4.0. Numerous promising technologies and applications are expected to assist Industry 5.0 in order to increase production and deliver customized products in a spontaneous manner. To provide a very first discussion of Industry 5.0, in this paper, we aim to provide a survey-based tutorial on potential applications and supporting technologies of Industry 5.0. We first introduce several new concepts and definitions of Industry 5.0 from the perspective of different industry practitioners and researchers. We then elaborately discuss the potential applications of Industry 5.0, such as intelligent healthcare, cloud manufacturing, supply chain management and manufacturing production. Subsequently, we discuss about some supporting technologies for Industry 5.0, such as edge computing, digital twins, collaborative robots, Internet of every things, blockchain, and 6G and beyond networks. Finally, we highlight several research challenges and open issues that should be further developed to realize Industry 5.0.
Article
Full-text available
The rapid development of the fourth industrial revolution contributed to the growth of computerization and digitalization of many spheres of society, which eventually led to the emergence of cybercrime. As a result, it is necessary to develop a cybersecurity strategy at the country level, which involves the development of effective measures to protect information. The purpose of this article is to determine the strategy for ranking countries by their level of cybersecurity. For its implementation, 12 indicators were selected that characterize various aspects of cybersecurity of countries: Cyber Security Policy Development, Cyber Threat Analysis and Information, Education and Professional Development, Contribution to global cyber security, Protection of digital services, Protection of essential services, E-identification and trust services, Protection of personal data, Cyber incidents response, Cyber crisis management, Fight against cybercrime, Military cyber operations. Their actual values were taken for 160 countries in 2018. The article proved that the existing method of determining the actual ranking of countries has a number of shortcomings, which are the lack of solutions to problems related to the dimensionality of data, determining the weights of the analyzed indicators, taking into account the diversity of indicators and their fundamental differences. To avoid these shortcomings, it is proposed to use multi-attribute decision-making methods, which are used in the decision-making process, but their capabilities allow the evaluation of ratings. The methods of TOPSIS, VIKOR and MAAM were used in the article. As a result, it was found that the rating by the MAAM method has about 25% similarity with the values of the ranking. Also, this method has most of the disadvantages inherent in the actual. The TOPSIS and VIKOR methods showed better results, which were less similar to the real values. It was found that VIKOR (v = 0.5) shows more balanced estimates than VIKOR (v = 1.0) in relation to the ranking of countries in terms of cybersecurity. VIKOR (v = 1.0) is more suitable for solving the problem of choosing alternatives than for rating. The TOPSIS method proved to be the most effective for ranking countries, which eliminates the shortcomings of the real assessment method and allows to determine the best and worst alternative, which facilitates the analysis separately for the indicators. Checking the effectiveness of the obtained ratings, using Spearman’s rank correlation coefficient, proved their effectiveness. Keywords: country, cybersecurity, MAAM, National Cybersecurity Index, rank, strategy, TOPSIS, VIKOR.
Chapter
Full-text available
The aim of this study has been to establish a Cybersecurity and Cyber defense model in Ecuador, based on the comparison of the worldwide situation status. Therefore, we performed a descriptive research, which has been related to the metrics and indicators of the countries with greater relevance in such areas, which have been considered as important by the International Telecommunications Union (ITU). Subsequently, we applied an incremental methodology in order to perform the comparative analysis. The main findings demonstrate that G8 countries appear or be the most prepared and mature in Cybersecurity/Cyber defense and Cyberwar. This has been also evidenced about countries with high technological level and which historically have maintained warlike conflicts. The final exposed results according to the Cybersecurity pillars of the ITU, yielded details of the relevant points and evidenced that on a global scale the United States and France are the most outstanding countries, which has led to propose a model to follow for Ecuador, which represents a country that still allows great opportunities for growth and improvement in this topic.
Article
Full-text available
Featured Application This work can be used to drive the design and development of Industry 4.0 technological solutions and the Factories of the Future in a human-centric, value-oriented and ethical direction. Abstract Although manufacturing companies are currently situated at a transition point in what has been called Industry 4.0, a new revolutionary wave—Industry 5.0—is emerging as an ‘Age of Augmentation’ when the human and machine reconcile and work in perfect symbiosis with one another. Recent years have indeed assisted in drawing attention to the human-centric design of Cyber-Physical Production Systems (CPPS) and to the genesis of the ‘Operator 4.0’, two novel concepts that raise significant ethical questions regarding the impact of technology on workers and society at large. This paper argues that a value-oriented and ethical technology engineering in Industry 5.0 is an urgent and sensitive topic as demonstrated by a survey administered to industry leaders from different companies. The Value Sensitive Design (VSD) approach is proposed as a principled framework to illustrate how technologies enabling human–machine symbiosis in the Factory of the Future can be designed to embody elicited human values and to illustrate actionable steps that engineers and designers can take in their design projects. Use cases based on real solutions and prototypes discuss how a design-for-values approach aids in the investigation and mitigation of ethical issues emerging from the implementation of technological solutions and, hence, support the migration to a symbiotic Factory of the Future.
Article
Full-text available
This paper proposes the Cyber Resilience Preparedness Index for monitoring and comparing the cyber resilience of Africa’s top-12 emerging economies. The index covers five critical areas that incorporate a total of 24 indicators derived or adapted from the International Telecommunication Union’s 2014 Cyber Wellness Profiles, a Depository Trust and Clearing Corporation white paper on global cyber risk and the well-known Cyber Readiness Index. The final Cyber Resilience Preparedness Index is a simple average of the five area (sub-index) scores; the score for each sub-index is also the simple average of the scores of the composing indicators. This computation assumes that all the sub-indices contribute equally to national cyber resilience preparedness. The results indicate that six countries, namely Sudan, Ghana, Libya, Zimbabwe, Algeria and Angola, are at risk to compromises of their critical systems. In contrast, Egypt tops the chart of six countries, Egypt, Kenya, Nigeria, Tunisia, Morocco and South Africa, that demonstrate preparedness against compromises to their critical systems, industries and classified documents, as well as against industrial espionage. This study also argues that assessments of the progress of Africa’s fastest-growing economies should be conducted periodically using evolving evaluation criteria.
Article
Full-text available
This paper presents the application of the new DEMATEL-MABAC model in the process of making investment decisions on the acquisition of manipulative transport (Forklifts) in logistics centers. The DEMATEL method was used to obtain the weight coefficients of criteria, on the basis of which the alternatives were evaluated. The selection of criteria for evaluating Forklifts was based on an analysis of available literature. The evaluation and selection of Forklifts was carried out using a new multi-criteria method - the MABAC (Multi-Attributive Border Approximation area Comparison) method. This paper presents a practical application and a sensitivity analysis of the MABAC method. The sensitivity analysis was conducted in three stages. In the first stage, a stability analysis was carried out on the solution reached by the MABAC method, depending on changes made to the weights of the criteria. In the second and third stages, a consistency analysis of the results from the MABAC method was carried out depending on both the changes in the measurement units in which the values of individual criteria are presented and on the formulation of the criteria. The SAW, COPRAS, TOPSIS, MOORA and VIKOR methods were tested under the same conditions. Based on the results obtained, it was shown that the SAW, COPRAS, TOPSIS, MOORA and VIKOR methods do not meet one or more of the conditions set, while the MABAC method showed stability (consistency) in its solutions. Through the research presented in this paper, it is shown that the new MABAC method of multi-criteria decision-making is a useful and reliable tool for rational decision-making.
Article
Full-text available
In this paper, evaluation index system of coal mine safety is established on the basis of the SMART principles. Weights of indexes are determined by means of entropy weight method. Safety conditions in four coal mines are applied by used of TOPSIS and the method is compared with other evaluation methods. The case study shows that the method is simple and clear, the evaluation results are reliable which are more coincident with the reality. So the method should be promoted widely in safety evaluation of coal mines.
Article
Full-text available
Finding the appropriate weight for each criterion is one of the main points in Multi Attribute Decision Making (MADM) problems. Shannon’s entropy method is one of the various methods for finding weights discussed in the literature. However, in many real life problems, the data for the decision making processes cannot be measured precisely and there may be some other types of data, for instance, interval data and fuzzy data. The goal of this paper is the extension of the Shannon entropy method for the imprecise data, especially interval and fuzzy data cases.
Chapter
Cybersecurity is the act of protecting networks, programs, and systems against various hostile and digital assaults. Subset of a security program, it defends cyberspace from escalating assaults and dangers that result in significant damage to resources like finances, information, and applications. Hackers are increasingly targeting firms in the financial and industrial sectors, particularly for the purpose of stealing sensitive data. As a result, many business leaders are turning to cybersecurity to meet their company's security demands and prevent its precious assets from falling into the wrong hands. When it comes to safeguarding software and hardware against unauthorized access and intrusion, cyber assaults play a critical role. The security measure makes use of several security approaches, such as cybersecurity software, access control systems, antivirus and malware security programs, firewalls, and program upgrades, among all system users.
Article
Industry 5.0 blows the whistle on global industrial transformation. It aims to place humans' well-being at the center of manufacturing systems, thereby achieving social goals beyond employment and growth to provide prosperity robustly for the sustainable development of all humanity. However, the current exploration of Industry 5.0 is still in its infancy where research findings are relatively scarce and little systematic. This paper first reviews the evolutionary vein of Industry 5.0 and three leading characteristics of Industry 5.0: human-centricity, sustainability, and resiliency. The connotation system of Industry 5.0 is discussed, and its diversified essence is analyzed. Then, this paper constructs a tri-dimension system architecture for implementing Industry 5.0, namely, the technical dimension, reality dimension, and application dimension. The paper further discusses key enablers, the future implementation path, potential applications, and challenges of realistic scenarios of Industry 5.0. Finally, the limitations of the current research are discussed with potential future research directions highlighted. It is expected that this review work will arouse lively discussions and debates, and bring together the strengths of all beings for building a comprehensive system of Industry 5.0.
Article
The new age economy is primarily driven by Industry 4.0 and Industry 5.0, which facilitate smartification of organizations by helping them integrate and automate decision making. Recent advances in information and communication technologies, such as the cloud, big data, internet of things, and artificial intelligence and nanotechnology, have accelerated the adoption of Industry 4.0 and Industry 5.0. Because of these advancements, organizations are now facing new challenges in the form of cybersecurity risks that are partly caused by these technologies. In recent years, there has been a spike in the number of cyberattacks, and organizations are taking steps to minimize the impacts of these attacks. To address this critical issue, in this article, we discuss possible future research directions that production and operations management researchers can undertake to help organizations, supply chains, and governments develop robust strategies for reducing the number of attacks and their repercussions. In particular, we identify several avenues for future research in the following domains of production and operations management: (1) global operations strategy, (2) healthcare operations management, (3) public policy, (4) management of technology, (5) supply chain management, and (6) disruptive technologies. Research on the topic of cybersecurity is not only an opportunity for operations management researchers but also critical for industry and society to overcome the challenges of cybersecurity risks. This article is protected by copyright. All rights reserved
Article
The introduction of collaborative robots aims to make production more flexible, promoting a greater interaction between humans and robots also from physical point of view. However, working closely with a robot may lead to the creation of stressful situations for the operator, which can negatively affect task performance. In Human-Robot Interaction (HRI), robots are expected to be socially intelligent, that is, capable of understanding and reacting accordingly to human social and affective clues. This ability can be exploited implementing affective computing, which concerns the development of systems able to recognize, interpret, process, and simulate human affects. Social intelligence is essential for robots to establish a natural interaction with people in several contexts, including the manufacturing sector with the emergence of Industry 5.0. In order to take full advantage of the human-robot collaboration, the robotic system should be able to perceive the psycho-emotional and mental state of the operator through different sensing modalities (e.g. facial expressions, body language, voice, or physiological signals) and to adapt its behavior accordingly. The development of socially intelligent collaborative robots in the manufacturing sector can lead to a symbiotic human-robot collaboration, arising several research challenges that still need to be addressed. The goals of this paper are the following: (i) providing an overview of affective computing implementation in HRI; (ii) analyzing the state-of-art on this topic in different application contexts (e.g. healthcare, service applications, and manufacturing); (iii) highlighting research challenges for the manufacturing sector.
Article
Cybersecurity is one of the main challenges faced by companies in the context of the Industrial Internet of Things (IIoT), in which a number of smart devices associated with machines, computers and people are networked and communicate with each other. In this connected industrial scenario, personnel need to be aware of cybersecurity issues in order to prevent or minimise the occurrence of cybersecurity incidents and corporate data breaches, and thus to make companies resilient to cyber-attacks. In addition, the recent increase in smart working due to the COVID-19 pandemic means that the need for cybersecurity awareness is more relevant than ever. In this study, we carry out a systematic literature review in order to analyse how the existing state of the art deals with cybersecurity awareness in the context of IIoT, and to provide a comprehensive overview of this topic. Four areas of analysis are considered: (i) definitions of the concepts of cybersecurity awareness and information security awareness, with keyword extrapolation (e.g. cybersecurity control level, information and responsibility); (ii) the industrial context of the analysed studies (e.g. manufacturing, critical infrastructure); (iii) the techniques adopted to raise company awareness of cybersecurity (e.g. serious games, online questionnaires); and (iv) the main benefits of a large-scale campaign of cybersecurity awareness (e.g. the effectiveness of employees in terms of managing cybersecurity issues, identification of cyber-attacks). Practitioners and researchers can benefit from our analysis of the features of each area in their future research and applications.
Article
Technique for Order Preference by Similarity to Ideal Solution (TOPSIS) was proposed by Hwang and Yoon as a multiple criteria decision making (MCDM) method, which identifies solutions from a finite set of alternatives. TOPSIS is based on the concept that the chosen alternative should have the shortest distance from the positive ideal solution (PIS) and the farthest distance from the negative ideal solution (NIS). In this study, the method was applied to evaluate the tourism destination competitiveness (TDC) of the Yangtze River Delta in China. This empirical study was based on a two-step procedure. The first procedure consisted of three hierarchies, four aspects and 35 evaluation indices, which were weighted by the information entropy weight (IEW). Secondly, the TOPSIS method was applied to the ranking analysis. This gave the most important index for each aspect by IEW. It also provided the ranking for 16 cities in the Yangtze River Delta based on four aspects, as well as the final overall ranking among them. Finally, the tactics and means for the cities to improve their tourism competitiveness were discussed. The results showed that TOPSIS & IEW can be implemented as an effective method in TDC evaluation.
Article
This paper firstly reviews the cross efficiency evaluation method which is an extension tool of data envelopment analysis (DEA), then we describe the main shortcomings when the ultimate average cross efficiency scores are used to evaluate and rank the decision making units (DMUs). In this paper, we eliminate the assumption of average and utilize the Shannon entropy to determine the weights for ultimate cross efficiency scores, and the procedures are introduced in detail. In the end, an empirical example is illustrated to examine the validity of the proposed method. Some future research directions are also pointed out.
G7 ülkelerinin siber güvenlik performanslarının analizi: Entropi tabanlı MABAC yöntemi ile bir uygulama
  • F F Altıntaş
Altıntaş, F. F. (2022). G7 ülkelerinin siber güvenlik performanslarının analizi: Entropi tabanlı MABAC yöntemi ile bir uygulama. Güvenlik Bilimleri Dergisi, 11(1), 263-286.
Global cybersecurity index
International Telecommunication Union. (2020). Global cybersecurity index.