{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,28]],"date-time":"2025-09-28T20:35:10Z","timestamp":1759091710085,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":37,"publisher":"Springer Singapore","isbn-type":[{"type":"print","value":"9789811680588"},{"type":"electronic","value":"9789811680595"}],"license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-981-16-8059-5_12","type":"book-chapter","created":{"date-parts":[[2021,12,2]],"date-time":"2021-12-02T13:03:12Z","timestamp":1638450192000},"page":"198-210","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Novel Maturity Model for Cybersecurity Evaluation in Industry 4.0"],"prefix":"10.1007","author":[{"given":"Alexander","family":"Kreppein","sequence":"first","affiliation":[]},{"given":"Alexander","family":"Kies","sequence":"additional","affiliation":[]},{"given":"Robert H.","family":"Schmitt","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,1,1]]},"reference":[{"key":"12_CR1","doi-asserted-by":"publisher","unstructured":"Flatt, H., Schriegel, S., Jasperneite, J., Trsek, H., Adamczyk, H.: Analysis of the cyber-security of industry 4.0 technologies based on RAMI 4.0 and identification of requirements. In: 2016 IEEE 21st International Conference on Emerging Technologies and Factory Automation (ETFA). 2016 IEEE 21st International Conference on Emerging Technologies and Factory Automation (ETFA), Berlin, Germany, 06\u201309 September 2016, pp. 1\u20134. IEEE (2016). https:\/\/doi.org\/10.1109\/ETFA.2016.7733634","DOI":"10.1109\/ETFA.2016.7733634"},{"key":"12_CR2","unstructured":"Gatzke, M., Stark, J., Weigelin, L.: K\u00fcnstliche Intelligenz, Blockchain, 5G und Cyber Physical Security, Wuppertal (2018)"},{"key":"12_CR3","doi-asserted-by":"crossref","unstructured":"Heinrich, B., Linke, P., Gl\u00f6ckler, M.: Grundlagen Automatisierung. Sensorik, Regelung, Steuerung, 2nd edn. Lehrbuch. Springer Vieweg, Wiesbaden (2017)","DOI":"10.1007\/978-3-658-17582-5"},{"key":"12_CR4","unstructured":"Lichtblau, K., et al.: Industrie 4.0-readiness. Aachen, K\u00f6ln (2015)"},{"key":"12_CR5","unstructured":"Mohr, N., Morawiak, D., K\u00f6ster, N., Sa\u00df, B.: Die Digitalisierung des deutschen Mittelstands (2017)"},{"key":"12_CR6","unstructured":"Bischoff, J., et al.: Erschlie\u00dfen der Potenziale der Anwendung von \u2018Industrie 4.0\u2019 im Mittelstand, M\u00fchlheim an der Ruhr (2015)"},{"key":"12_CR7","unstructured":"Meyer, L., Seiz, M.: Industrie 4.0 im Mittelstand, M\u00fcnchen (2019)"},{"key":"12_CR8","unstructured":"Barth, M., et al.: Spionage, Sabotage, Datendiebstahl \u2013 Wirtschaftsschutz in der vernetzten Welt, Berlin (2020)"},{"key":"12_CR9","series-title":"Advances in Information Security","doi-asserted-by":"publisher","first-page":"51","DOI":"10.1007\/978-3-319-32125-7_4","volume-title":"Cyber-security of SCADA and Other Industrial Control Systems","author":"A Hahn","year":"2016","unstructured":"Hahn, A.: Operational technology and information technology in industrial control systems. In: Colbert, E.J.M., Kott, A. (eds.) Cyber-security of SCADA and Other Industrial Control Systems. AIS, vol. 66, pp. 51\u201368. Springer, Cham (2016). https:\/\/doi.org\/10.1007\/978-3-319-32125-7_4"},{"key":"12_CR10","unstructured":"Forschung und Innovation f\u00fcr die Menschen \u2013 Die Hightech-Strategie 2025 (2018). https:\/\/www.bmbf.de\/upload_filestore\/pub\/Forschung_und_Innovation_fuer_die_Menschen.pdf. Accessed 17 Mar 2021"},{"key":"12_CR11","unstructured":"Datenstrategie der Bundesregierung. Eine Innovationsstrategie f\u00fcr gesellschaftlichen Fortschritt und nachhaltiges Wachstum, Berlin (2021). https:\/\/www.bundesregierung.de\/resource\/blob\/992814\/1845634\/5bae389896531854c579069f9a699a8f\/datenstrategie-der-bundesregie-rung-download-bpa-data.pdf. Accessed 17 Mar 2021"},{"key":"12_CR12","unstructured":"Schneider, F.: IT-Sicherheit 2018: Pflichten f\u00fcr Unternehmen (2018). https:\/\/www.cmshs-bloggt.de\/tmc\/it-recht\/it-sicherheit-2018-sicherheit-fuer-unternehmen\/. Accessed 17 Mar 2021"},{"key":"12_CR13","unstructured":"IT-Sicherheitsgesetz und Datenschutz-Grundverordnung: Handreichung zum \u201cStand der Technik\u201c technischer und organisatorischer Ma\u00dfnahmen. Revidierte und erweiterte Ausgabe 2018 (2018). https:\/\/www.teletrust.de\/fileadmin\/docs\/fachgruppen\/ag-stand-der-technik\/TeleTrusT-Handreichung_Stand_der_Technik_-_Ausgabe_2018.pdf. Accessed 17 Mar 2021"},{"key":"12_CR14","unstructured":"Schutz Kritischer Infrastrukturen durch IT-Sicherheitsgesetz und UP KRITIS (2017). https:\/\/www.bsi.bund.de\/SharedDocs\/Downloads\/DE\/BSI\/Publikationen\/Broschueren\/Schutz-Kritischer-Infrastrukturen-ITSig-u-UP-KRITIS.pdf?__blob=publicationFile&v=7. Accessed 17 Mar 2021"},{"key":"12_CR15","unstructured":"IT-Sicherheit f\u00fcr die Industrie 4.0. Produktion, Produkte, Dienste von morgen im Zeichen globalisierter Wertsch\u00f6pfungsketten. Studie im Auftrag des Bundesministeriums f\u00fcr Wirtschaft und Energie. Abschlussbericht (2016). https:\/\/www.bmwi.de\/Redaktion\/DE\/Publikationen\/Studien\/it-sicherheit-fuer-industrie-4-0.pdf?__blob=publicationFile&v=4. Accessed 17 Mar 2021"},{"key":"12_CR16","doi-asserted-by":"crossref","unstructured":"Niemann, K.-H., Hoh, M.: Anforderungen an die IT-Sicherheit von Feldger\u00e4ten. Schutzl\u00f6sungen f\u00fcr hoch vernetzte Produktionsanlagen. atp edition 59. Jg., 42\u201353 (2017)","DOI":"10.17560\/atp.v59i12.1906"},{"key":"12_CR17","unstructured":"Live Security Studie 2017\/2018. Eine repr\u00e4sentative Untersuchung von Bitkom Research im Auftrag von F-Secure, Berlin (2018)"},{"key":"12_CR18","unstructured":"Digitalisierung und IT-Sicherheit in deutschen Unternehmen. Eine repr\u00e4sentative Untersuchung, erstellt von der Bundesdruckerei GmbH in Zusammenarbeit mit KANTAR EMNID, Berlin (2017)"},{"key":"12_CR19","unstructured":"The State of Industrial Cybersecurity 2018 (2018)"},{"key":"12_CR20","unstructured":"VDMA Studie Status Quo der Security in Produktion und Automation, Frankfurt am Main (2013). https:\/\/industrialsecurity.vdma.org\/viewer\/-\/v2article\/render\/26700821. Accessed 17 Mar 2021"},{"key":"12_CR21","unstructured":"Protecting Industrial Control Systems, Heraklion (2011)"},{"key":"12_CR22","unstructured":"DIN EN ISO\/IEC 27001:2017-06, Informationstechnik_- Sicherheitsverfahren_- Informationssicherheitsmanagementsysteme_- Anforderungen. Beuth Verlag GmbH, Berlin"},{"key":"12_CR23","unstructured":"BSI-Standard 200-1. Information Security Management Systems (ISMS), Bonn (2017). https:\/\/www.bsi.bund.de\/EN\/Topics\/ITGrundschutz\/itgrundschutz_node.html. Accessed 6 Aug 2021"},{"key":"12_CR24","unstructured":"BSI-Standard 200-2. IT-Grundschutz-Methodik, Bonn (2017). https:\/\/www.bsi.bund.de\/SharedDocs\/Downloads\/DE\/BSI\/Grundschutz\/BSI_Standards\/standard_200_2.pdf?__blob=publicationFile&v=2"},{"key":"12_CR25","unstructured":"Cybersecurity Capability Maturity Model (C2M2) (2014). https:\/\/www.energy.gov\/sites\/prod\/files\/2014\/03\/f13\/C2M2-v1-1_cor.pdf. Accessed 6 Aug 2021"},{"key":"12_CR26","doi-asserted-by":"crossref","unstructured":"Le, N.T., Hoang, D.B.: Can maturity models support cyber security? In: 2016 IEEE 35th International Performance Computing and Communications Conference (IPCCC), pp. 1\u20137 (2016)","DOI":"10.1109\/PCCC.2016.7820663"},{"key":"12_CR27","unstructured":"National Institute of Standards and Technology: Cybersecurity Framework (CSF) (2018). https:\/\/www.nist.gov\/cyberframework. Accessed 6 Aug 2021"},{"key":"12_CR28","doi-asserted-by":"crossref","unstructured":"Almuhammadi, S., Alsaleh, M.: Information security maturity model for nist cyber security framework. In: CS & IT-CSCP 2017, pp. 51\u201362 (2017)","DOI":"10.5121\/csit.2017.70305"},{"key":"12_CR29","unstructured":"Kosutic, D.: Which one to go with \u2013 Cybersecurity Framework or ISO 27001? (2014). https:\/\/advisera.com\/27001academy\/blog\/2014\/02\/24\/which-one-to-go-with-cybersecurity-framework-or-iso-27001\/. Accessed 6 Aug 2021"},{"key":"12_CR30","unstructured":"Kiesel, R., Heutmann, T., Dering, J., Kies, A., Vollmer, T., Schmitt, R.H.: Cybersecurity in der vernetzten Produktion. Fraunhofer-Institut f\u00fcr Produktionstechnologie IPT, Aachen (2020)"},{"key":"12_CR31","doi-asserted-by":"crossref","unstructured":"Kiesel, R., Kies, A., Kreppein, A., Schmitt, R.H.: IT-Sicherheit in der vernetzten Produktion. Unzureichende Sicherheitsma\u00dfnahmen gef\u00e4hrden den digitalen Wandel. ZWF Zeitschrift f\u00fcr wirtschaftlichen Fabrikbetrieb (2021)","DOI":"10.1515\/zwf-2021-0059"},{"key":"12_CR32","unstructured":"Schwab, W., Poujol, M.: The State of Industrial Cybersecurity 2018 (2018)"},{"key":"12_CR33","unstructured":"DIN Deutsches Institut f\u00fcr Normung e. V.: DIN EN IEC 62443. IT-Sicherheit f\u00fcr industrielle Automatisierungssysteme. Beuth Verlag GmbH, Berlin. Accessed 2020"},{"key":"12_CR34","unstructured":"Leszczyna, R., Egozcue, E., Tarrafeta, L., Fidalgo Villar, V., Estremera, R., Alonso, J.: Protecting Industrial Control Systems, Heraklion (2011)"},{"key":"12_CR35","unstructured":"Lichtblau, K., Schleiermacher, T., Goecke, H., Sch\u00fctzdeller, P.: Digitalisierung der KMU in Deutschland, K\u00f6ln (2018)"},{"key":"12_CR36","unstructured":"Icks, A., Schr\u00f6der, C., Brink, S., Dienes, C., Schneck, S.: Digitalisierungsprozesse von KMU im Verarbeitenden Gewerbe, Bonn (2017)"},{"key":"12_CR37","unstructured":"Security on the Industrial Internet of Things. How companiescan defend themselves against cyber attacks, Bonn (2016)"}],"container-title":["Communications in Computer and Information Science","Advances in Cyber Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-16-8059-5_12","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,12,2]],"date-time":"2021-12-02T13:14:07Z","timestamp":1638450847000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-16-8059-5_12"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"ISBN":["9789811680588","9789811680595"],"references-count":37,"URL":"https:\/\/doi.org\/10.1007\/978-981-16-8059-5_12","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2021]]},"assertion":[{"value":"1 January 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ACeS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Advances in Cyber Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Penang","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Malaysia","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2021","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"24 August 2021","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"25 August 2021","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"3","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"aces2021","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/www.aces.usm.my\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"92","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"36","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"39% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}