{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,20]],"date-time":"2026-03-20T03:00:25Z","timestamp":1773975625403,"version":"3.50.1"},"publisher-location":"Singapore","reference-count":35,"publisher":"Springer Nature Singapore","isbn-type":[{"value":"9789811964138","type":"print"},{"value":"9789811964145","type":"electronic"}],"license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023]]},"DOI":"10.1007\/978-981-19-6414-5_20","type":"book-chapter","created":{"date-parts":[[2023,3,7]],"date-time":"2023-03-07T19:03:58Z","timestamp":1678215838000},"page":"355-374","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Assessing Cyber-Security Readiness of Nigeria to Industry 4.0"],"prefix":"10.1007","author":[{"given":"Elochukwu","family":"Ukwandu","sequence":"first","affiliation":[]},{"given":"Ephraim N. C.","family":"Okafor","sequence":"additional","affiliation":[]},{"given":"Charles","family":"Ikerionwu","sequence":"additional","affiliation":[]},{"given":"Comfort","family":"Olebara","sequence":"additional","affiliation":[]},{"given":"Celestine","family":"Ugwu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,3,8]]},"reference":[{"key":"20_CR1","unstructured":"Schwab, K.: The fourth industrial revolution. Currency (2017)"},{"issue":"2","key":"20_CR2","doi-asserted-by":"publisher","first-page":"90","DOI":"10.5430\/ijfr.v9n2p90","volume":"9","author":"M Xu","year":"2018","unstructured":"Xu, M., David, J.M., Kim, S.H., et al.: The fourth industrial revolution: opportunities and challenges. Int. J. Financ. Res. 9(2), 90\u201395 (2018)","journal-title":"Int. J. Financ. Res."},{"issue":"12","key":"20_CR3","doi-asserted-by":"publisher","first-page":"1005","DOI":"10.1038\/nnano.2015.286","volume":"10","author":"D Maynard","year":"2015","unstructured":"Maynard, D.: Navigating the fourth industrial revolution. Nat. Nanotechnol. 10(12), 1005\u20131006 (2015)","journal-title":"Nat. Nanotechnol."},{"key":"20_CR4","first-page":"11","volume":"8","author":"J Bloem","year":"2014","unstructured":"Bloem, J., Van Doorn, M., Duivestein, S., Excoffier, D., Maas, R., Van Ommeren, E.: The fourth industrial revolution. Things Tighten 8, 11\u201315 (2014)","journal-title":"Things Tighten"},{"issue":"1","key":"20_CR5","first-page":"17","volume":"72","author":"T Philbeck","year":"2018","unstructured":"Philbeck, T., Davis, N.: The fourth industrial revolution. J. Int. Aff. 72(1), 17\u201322 (2018)","journal-title":"J. Int. Aff."},{"issue":"4","key":"20_CR6","doi-asserted-by":"publisher","first-page":"626","DOI":"10.1007\/s11769-017-0890-x","volume":"27","author":"G Li","year":"2017","unstructured":"Li, G., Hou, Y., Wu, A.: Fourth industrial revolution: technological drivers, impacts and coping methods. Chin. Geogr. Sci. 27(4), 626\u2013637 (2017)","journal-title":"Chin. Geogr. Sci."},{"issue":"24","key":"20_CR7","doi-asserted-by":"publisher","first-page":"7148","DOI":"10.3390\/s20247148","volume":"20","author":"E Ukwandu","year":"2020","unstructured":"Ukwandu, E., Farah, M.A.B., Hindy, H., Brosset, D., Kavallieros, D., Atkinson, R., Tachtatzis, C., Bures, M., Andonovic, I., Bellekens, X.: A review of cyber-ranges and test-beds: current and future trends. Sensors 20(24), 7148 (2020)","journal-title":"Sensors"},{"key":"20_CR8","first-page":"978","volume":"10","author":"BE Penprase","year":"2018","unstructured":"Penprase, B.E.: The fourth industrial revolution and higher education. Higher education in the era of the fourth industrial revolution 10, 978\u2013981 (2018)","journal-title":"Higher education in the era of the fourth industrial revolution"},{"issue":"5\u20136","key":"20_CR9","first-page":"1","volume":"114","author":"J Butler-Adam","year":"2018","unstructured":"Butler-Adam, J.: The fourth industrial revolution and education. S. Afr. J. Sci. 114(5\u20136), 1\u20131 (2018)","journal-title":"S. Afr. J. Sci."},{"key":"20_CR10","unstructured":"Bailey, R.: The secrets of intangible wealth. Wall Str. J. A9 (2007)"},{"key":"20_CR11","doi-asserted-by":"publisher","first-page":"99","DOI":"10.1016\/j.procs.2019.09.032","volume":"158","author":"C Catal","year":"2019","unstructured":"Catal, C., Tekinerdogan, B.: Aligning education for the life sciences domain to support digitalization and industry 4.0. Proc. Comput. Sci. 158, 99\u2013106 (2019)","journal-title":"Proc. Comput. Sci."},{"key":"20_CR12","unstructured":"Fitsilis, P., Tsoutsa, P., Gerogiannis, V.: Industry 4.0: required personnel competences. Industry 4.0 3(3), 130\u2013133 (2018)"},{"key":"20_CR13","doi-asserted-by":"crossref","unstructured":"Karampidis, K., Panagiotakis, S., Vasilakis, M., Markakis, E.K., Papadourakis, G.: Industrial cybersecurity 4.0: Preparing the operational technicians for industry 4.0. In: 2019 IEEE 24th International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD), pp. 1\u20136. IEEE (2019)","DOI":"10.1109\/CAMAD.2019.8858454"},{"key":"20_CR14","doi-asserted-by":"crossref","unstructured":"Onar, S.C., Ustundag, A., Kadaifci, \u00c7., Oztaysi, B.: The changing role of engineering education in industry 4.0 era. In: Industry 4.0: managing the digital transformation, pp. 137\u2013151. Springer (2018)","DOI":"10.1007\/978-3-319-57870-5_8"},{"key":"20_CR15","doi-asserted-by":"crossref","unstructured":"Mian, S.H., Salah, B., Ameen, W., Moiduddin, K., Alkhalefah, H.: Adapting universities for sustainability education in industry 4.0: Channel of challenges and opportunities. Sustainability 12(15), 6100 (2020)","DOI":"10.3390\/su12156100"},{"key":"20_CR16","doi-asserted-by":"crossref","unstructured":"Corallo, Lazoi, M., Lezzi, M.: Cybersecurity in the context of industry 4.0: a structured classification of critical assets and business impacts. Comput. Industry. 114, 103165 (2020)","DOI":"10.1016\/j.compind.2019.103165"},{"key":"20_CR17","doi-asserted-by":"crossref","unstructured":"James, Y., Szymanezyk, O.: The challenges of integrating industry 4.0 in cyber security\u2014a perspective. Int. J Inf. Educ. Technol. 11(5) (2021)","DOI":"10.18178\/ijiet.2021.11.5.1518"},{"issue":"1","key":"20_CR18","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3372823","volume":"53","author":"N Kaloudi","year":"2020","unstructured":"Kaloudi, N., Li, J.: The ai-based cyber threat landscape: a survey. ACM Comput. Surv. (CSUR) 53(1), 1\u201334 (2020)","journal-title":"ACM Comput. Surv. (CSUR)"},{"key":"20_CR19","unstructured":"Brundage, M., Avin, S., Clark, J., Toner, H., Eckersley, P., Garfinkel, B., Dafoe, A., Scharre, P., Zeitzoff, T., Filar, B., et al.: The malicious use of artificial intelligence: Forecasting, prevention, and mitigation (2018). arXiv preprint arXiv:1802.07228"},{"key":"20_CR20","first-page":"102722","volume":"57","author":"MM Yamin","year":"2021","unstructured":"Yamin, M.M., Ullah, M., Ullah, H., Katt, B.: Weaponized ai for cyber-attacks. J. Inf. Secur. Appl. 57, 102722 (2021)","journal-title":"J. Inf. Secur. Appl."},{"issue":"3","key":"20_CR21","doi-asserted-by":"publisher","first-page":"49","DOI":"10.1109\/MSP.2011.67","volume":"9","author":"R Langner","year":"2011","unstructured":"Langner, R.: Stuxnet: dissecting a cyberwarfare weapon. IEEE Secur. Priv. 9(3), 49\u201351 (2011)","journal-title":"IEEE Secur. Priv."},{"issue":"1","key":"20_CR22","doi-asserted-by":"publisher","first-page":"23","DOI":"10.1080\/00396338.2011.555586","volume":"53","author":"JP Farwell","year":"2011","unstructured":"Farwell, J.P., Rohozinski, R.: Stuxnet and the future of cyber war. Survival 53(1), 23\u201340 (2011)","journal-title":"Survival"},{"issue":"4","key":"20_CR23","doi-asserted-by":"publisher","first-page":"91","DOI":"10.1109\/MC.2011.115","volume":"44","author":"TM Chen","year":"2011","unstructured":"Chen, T.M., Abu-, S.: Lessons from stuxnet. Computer 44(4), 91\u201393 (2011)","journal-title":"Computer"},{"issue":"3","key":"20_CR24","doi-asserted-by":"publisher","first-page":"365","DOI":"10.1080\/09636412.2013.816122","volume":"22","author":"JR Lindsay","year":"2013","unstructured":"Lindsay, J.R.: Stuxnet and the limits of cyber warfare. Secur. Stud. 22(3), 365\u2013404 (2013)","journal-title":"Secur. Stud."},{"issue":"6","key":"20_CR25","doi-asserted-by":"publisher","first-page":"75","DOI":"10.1109\/MCOM.2016.7497770","volume":"54","author":"P-Y Chen","year":"2016","unstructured":"Chen, P.-Y., Lin, C.-C., Cheng, S.-M., Hsiao, H.-C., Huang, C.-Y.: Decapitation via digital epidemics: a bio-inspired transmissive attack. IEEE Commun. Mag. 54(6), 75\u201381 (2016)","journal-title":"IEEE Commun. Mag."},{"key":"20_CR26","unstructured":"de Sa, O., da Costa Carmo, L.F.R., Machado, R.C.S.: Bioinspired active attack for identification of networked control systems. In: 10th EAI International Conference on Bio-Inspired Information and Communications Technologies, p. 88. European Alliance for Innovation (EAI) (2017)"},{"key":"20_CR27","doi-asserted-by":"crossref","unstructured":"Farah, M.B., Farah, A., Farah, T.: An image encryption scheme based on a new hybrid chaotic map and optimized substitution box. Nonlinear Dyn. 1\u201324 (2019)","DOI":"10.1007\/s11071-019-05413-8"},{"key":"20_CR28","doi-asserted-by":"crossref","unstructured":"de S\u00e1, O., Carmo, L.F.d.C., Machado, R.C.: Bio-inspired active system identification: a cyber-physical intelligence attack in networked control systems. Mobile Netw. Appl. 25(5), 1944\u20131957 (2020)","DOI":"10.1007\/s11036-017-0943-5"},{"key":"20_CR29","doi-asserted-by":"crossref","unstructured":"Ferreira, S., Hamilton, K.: Comprehensive wealth, intangible capital, and development. Intangible Capital, and Development (October 1, 2010). World Bank Policy Research Working Paper, No. 5452 (2010)","DOI":"10.1596\/1813-9450-5452"},{"key":"20_CR30","unstructured":"Cobb, S.M.: Quantifying the wealth of nations: the impact of intangible capital and implications for policy formulation, p. 4. Amazon News. https:\/\/tinyurl.com\/sc5n94cx (2008)"},{"key":"20_CR31","doi-asserted-by":"crossref","unstructured":"Ilori, M.O., Ajagunna, I.: Re-imagining the future of education in the era of the fourth industrial revolution. Worldw. Hosp. Tour. Themes (2020)","DOI":"10.1108\/WHATT-10-2019-0066"},{"issue":"1","key":"20_CR32","doi-asserted-by":"publisher","first-page":"93","DOI":"10.1146\/annurev.economics.050708.143333","volume":"1","author":"G Gancia","year":"2009","unstructured":"Gancia, G., Zilibotti, F.: Technological change and the wealth of nations. Annu. Rev. Econ. 1(1), 93\u2013120 (2009)","journal-title":"Annu. Rev. Econ."},{"issue":"3","key":"20_CR33","doi-asserted-by":"publisher","first-page":"109","DOI":"10.1016\/j.infoecopol.2012.12.002","volume":"25","author":"M Cardona","year":"2013","unstructured":"Cardona, M., Kretschmer, T., Strobel, T.: ICT and productivity: conclusions from the empirical literature. Inf. Econ. Policy 25(3), 109\u2013125 (2013)","journal-title":"Inf. Econ. Policy"},{"key":"20_CR34","unstructured":"Kretschmer, T.: Information and communication technologies and productivity growth: a survey of the literature. OECD iLibrary (2012)"},{"key":"20_CR35","unstructured":"Goode, L.: Everything is connected, and there\u2019s no going back. The Verge (2018)"}],"container-title":["Springer Proceedings in Complexity","Proceedings of the International Conference on Cybersecurity, Situational Awareness and Social Media"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-19-6414-5_20","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,3,7]],"date-time":"2023-03-07T19:10:51Z","timestamp":1678216251000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-19-6414-5_20"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"ISBN":["9789811964138","9789811964145"],"references-count":35,"URL":"https:\/\/doi.org\/10.1007\/978-981-19-6414-5_20","relation":{},"ISSN":["2213-8684","2213-8692"],"issn-type":[{"value":"2213-8684","type":"print"},{"value":"2213-8692","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023]]},"assertion":[{"value":"8 March 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}