{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,16]],"date-time":"2026-04-16T18:24:33Z","timestamp":1776363873234,"version":"3.51.2"},"reference-count":82,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2020,8,27]],"date-time":"2020-08-27T00:00:00Z","timestamp":1598486400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2020,8,27]],"date-time":"2020-08-27T00:00:00Z","timestamp":1598486400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["AI &amp; Soc"],"published-print":{"date-parts":[[2021,9]]},"abstract":"<jats:title>Abstract<\/jats:title>\n                  <jats:p>\n                    This article conducts a literature review of current and future challenges in the use of artificial intelligence (AI) in cyber physical systems. The literature review is focused on identifying a conceptual framework for increasing resilience with AI through automation supporting both, a technical and human level. The methodology applied resembled a literature review and taxonomic analysis of complex internet of things (IoT) interconnected and coupled cyber physical systems. There is an increased attention on propositions on models, infrastructures and frameworks of IoT in both academic and technical papers. These reports and publications frequently represent a juxtaposition of other related systems and technologies (e.g. Industrial Internet of Things, Cyber Physical Systems, Industry 4.0 etc.). We review academic and industry papers published between 2010 and 2020. The results determine a new hierarchical cascading conceptual framework for analysing the evolution of AI decision-making in cyber physical systems. We argue that such evolution is\n                    <jats:italic>inevitable and autonomous<\/jats:italic>\n                    because of the increased integration of connected devices (IoT) in cyber physical systems. To support this argument, taxonomic methodology is adapted and applied for transparency and justifications of concepts selection decisions through building summary maps that are applied for designing the hierarchical cascading conceptual framework.\n                  <\/jats:p>","DOI":"10.1007\/s00146-020-01049-0","type":"journal-article","created":{"date-parts":[[2020,8,27]],"date-time":"2020-08-27T15:03:51Z","timestamp":1598540631000},"page":"783-796","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":122,"title":["Artificial intelligence in cyber physical systems"],"prefix":"10.1007","volume":"36","author":[{"given":"Petar","family":"Radanliev","sequence":"first","affiliation":[]},{"given":"David","family":"De Roure","sequence":"additional","affiliation":[]},{"given":"Max","family":"Van Kleek","sequence":"additional","affiliation":[]},{"given":"Omar","family":"Santos","sequence":"additional","affiliation":[]},{"given":"Uchenna","family":"Ani","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,8,27]]},"reference":[{"issue":"1","key":"1049_CR1","first-page":"1","volume":"4","author":"E Agyepong","year":"2019","unstructured":"Agyepong E, Cherdantseva Y, Reinecke P, Burnap P (2019) Challenges and performance metrics for security operations center analysts: a systematic review. J Cyber Secur Technol 4(1):1\u201328","journal-title":"J Cyber Secur Technol"},{"key":"1049_CR2","volume-title":"Cyber Power Index: findings and methodology","author":"Allen","year":"2014","unstructured":"Allen, Hamilton (2014) Cyber Power Index: findings and methodology. McLean, Virginia"},{"key":"1049_CR3","doi-asserted-by":"crossref","unstructured":"Anderson G (2016) The economic impact of technology infrastructure for smart manufacturing. US Department of Commerce, National Institute of Standards and Technology","DOI":"10.6028\/NIST.EAB.4"},{"issue":"5799","key":"1049_CR4","first-page":"610","volume":"314","author":"R Anderson","year":"2006","unstructured":"Anderson R, Moore T (2006) The economics of information security. Sci AAAS 314(5799):610\u2013613","journal-title":"Sci AAAS"},{"issue":"5","key":"1049_CR5","doi-asserted-by":"publisher","first-page":"9042","DOI":"10.1109\/JIOT.2019.2926365","volume":"6","author":"E Anthi","year":"2019","unstructured":"Anthi E, Williams L, Slowinska M, Theodorakopoulos G, Burnap P (2019) A supervised intrusion detection system for smart home IoT devices. IEEE Internet Things J 6(5):9042\u20139053","journal-title":"IEEE Internet Things J"},{"key":"1049_CR6","doi-asserted-by":"crossref","unstructured":"Anthonysamy P, Rashid A, Chitchyan R (2017) Privacy requirements: present & future. In: 2017 IEEE\/ACM 39th International conference on software engineering: software engineering in society track (ICSE-SEIS), pp 13\u201322","DOI":"10.1109\/ICSE-SEIS.2017.3"},{"key":"1049_CR7","doi-asserted-by":"crossref","unstructured":"Balaji B, Al Faruque MA, Dutt N, Gupta R, Agarwal Y (2015) Models, abstractions, and architectures. In: Proceedings of the 52nd annual design automation conference on\u2014DAC\u201915, pp 1\u20136","DOI":"10.1145\/2744769.2747936"},{"key":"1049_CR8","doi-asserted-by":"publisher","first-page":"363","DOI":"10.1016\/j.chb.2018.08.028","volume":"90","author":"J Banks","year":"2019","unstructured":"Banks J (2019) A perceived moral agency scale: development and validation of a metric for humans and social machines. Comput Human Behav 90:363\u2013371","journal-title":"Comput Human Behav"},{"key":"1049_CR9","unstructured":"Barrett M, Marron J, Yan Pillitteri V, Boyens J, Witte G, Feldman L (2017) Draft NISTIR 8170, the cybersecurity framework: implementation guidance for federal agencies, Maryland"},{"key":"1049_CR10","first-page":"1","volume-title":"Insurability of cyber risk 1","author":"C Biener","year":"2014","unstructured":"Biener C, Eling M, Wirfs JH (2014) Insurability of cyber risk 1. The Geneva Association, Geneva, pp 1\u20134"},{"key":"1049_CR11","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.compind.2018.04.015","volume":"101","author":"H Boyes","year":"2018","unstructured":"Boyes H, Hallaq B, Cunningham J, Watson T (2018) The industrial internet of things (IIoT): an analysis framework. Comput Ind 101:1\u201312","journal-title":"Comput Ind"},{"key":"1049_CR12","doi-asserted-by":"publisher","first-page":"93","DOI":"10.1016\/j.procir.2015.12.065","volume":"41","author":"M Brettel","year":"2016","unstructured":"Brettel M, Fischer FG, Bendig D, Weber AR, Wolff B (2016) Enablers for self-optimizing production systems in the context of industrie 4.0. Procedia CIRP 41:93\u201398","journal-title":"Procedia CIRP"},{"key":"1049_CR13","unstructured":"Carruthers K (2016) Internet of things and beyond: cyber-physical systems\u2014IEEE internet of things. IEEE Internet of Things, Newsletter, 2014"},{"key":"1049_CR14","doi-asserted-by":"crossref","unstructured":"Craggs B, Rashid A (2017) Smart cyber-physical systems: beyond usable security to security ergonomics by design. In: 2017 IEEE\/ACM 3rd international workshop on software engineering for smart cyber-physical systems (SEsCPS), pp 22\u201325","DOI":"10.1109\/SEsCPS.2017.5"},{"key":"1049_CR15","doi-asserted-by":"crossref","unstructured":"de Fine Licht K, de Fine Licht J (2020) Artificial intelligence, transparency, and public decision-making. AI Soc 1\u201310\u00a0(forthcoming)","DOI":"10.1007\/s00146-020-00960-w"},{"key":"1049_CR16","doi-asserted-by":"crossref","unstructured":"De Roure D, Hooper C, Page K, Tarte S, Willcox P (2015) Observing social machines part 2: how to observe? In: Proceedings of the 2015 ACM web science conference, pp 1\u20135","DOI":"10.1145\/2786451.2786475"},{"key":"1049_CR17","doi-asserted-by":"crossref","unstructured":"De Roure D, Page KR, Radanliev P, Van Kleek M (2019) Complex coupling in cyber-physical systems and the threats of fake data. In: Living in the internet of things (IoT 2019) 2019 page, p 11 (6 pp)","DOI":"10.1049\/cp.2019.0136"},{"issue":"9","key":"1049_CR18","doi-asserted-by":"publisher","first-page":"905","DOI":"10.1002\/cpe.1629","volume":"23","author":"TS Dillon","year":"2011","unstructured":"Dillon TS, Zhuge H, Wu C, Singh J, Chang E (2011) Web-of-things framework for cyber-physical systems. Concurr Comput Pract Exp 23(9):905\u2013923","journal-title":"Concurr Comput Pract Exp"},{"issue":"2","key":"1049_CR19","doi-asserted-by":"publisher","first-page":"291","DOI":"10.1007\/s10669-015-9540-y","volume":"35","author":"D DiMase","year":"2015","unstructured":"DiMase D, Collier ZA, Heffner K, Linkov I (2015) Systems engineering framework for cyber physical security and resilience. Environ Syst Decis 35(2):291\u2013300","journal-title":"Environ Syst Decis"},{"key":"1049_CR20","doi-asserted-by":"publisher","first-page":"100","DOI":"10.1016\/j.procir.2014.01.077","volume":"17","author":"U Dombrowski","year":"2014","unstructured":"Dombrowski U, Wagner T (2014) Mental strain as field of action in the 4th industrial revolution. Procedia CIRP 17:100\u2013105","journal-title":"Procedia CIRP"},{"issue":"2","key":"1049_CR21","doi-asserted-by":"publisher","first-page":"56","DOI":"10.1109\/MIE.2014.2312079","volume":"8","author":"R Drath","year":"2014","unstructured":"Drath R, Horch A (2014) Industrie 4.0: hit or hype? [Industry Forum]. IEEE Ind Electron Mag 8(2):56\u201358","journal-title":"IEEE Ind Electron Mag"},{"issue":"4","key":"1049_CR22","doi-asserted-by":"publisher","first-page":"813","DOI":"10.1007\/s00146-018-0821-0","volume":"34","author":"M Fazi","year":"2019","unstructured":"Fazi M (2019) Beatrice, \u201cCan a machine think (anything new)? Automation beyond simulation\u201d. AI Soc 34(4):813\u2013824","journal-title":"AI Soc"},{"key":"1049_CR23","first-page":"115","volume-title":"A smart platform for large-scale cyber-physical systems","author":"A Giordano","year":"2016","unstructured":"Giordano A, Spezzano G, Vinci A (2016) A smart platform for large-scale cyber-physical systems. Springer International Publishing, Cham, pp 115\u2013134"},{"key":"1049_CR24","volume-title":"The discovery of grounded theory: strategies for qualitative research","author":"BG Glaser","year":"1967","unstructured":"Glaser BG, Strauss AL (1967) The discovery of grounded theory: strategies for qualitative research. Routledge, Abingdon"},{"issue":"4","key":"1049_CR25","doi-asserted-by":"publisher","first-page":"438","DOI":"10.1145\/581271.581274","volume":"5","author":"LA Gordon","year":"2002","unstructured":"Gordon LA, Loeb MP (2002) The economics of information security investment. ACM Trans Inf Syst Secur 5(4):438\u2013457","journal-title":"ACM Trans Inf Syst Secur"},{"key":"1049_CR26","doi-asserted-by":"crossref","unstructured":"Hermann M, Pentek T, Otto B (2016) Design principles for industrie 4.0 scenarios. In: 2016 49th Hawaii international conference on system sciences (HICSS), pp 3928\u20133937","DOI":"10.1109\/HICSS.2016.488"},{"key":"1049_CR27","unstructured":"Hussain F (2017)\u00a0Internet of things: Building blocks and business models,\u00a0(No. 978-3, pp 319-55404) Springer International Publishing"},{"key":"1049_CR28","doi-asserted-by":"crossref","unstructured":"Jensen JC, Chang DH, Lee EA (2011) A model-based design methodology for cyber-physical systems. In: 2011 7th international wireless communications and mobile computing conference, pp 1666\u20131671","DOI":"10.1109\/IWCMC.2011.5982785"},{"key":"1049_CR29","doi-asserted-by":"publisher","first-page":"2561","DOI":"10.1016\/j.jpdc.2014.01.003","volume":"74","author":"K Kambatla","year":"2014","unstructured":"Kambatla K, Kollias G, Kumar V, Grama A (2014) Trends in big data analytics. J Parallel Distrib Comput 74:2561\u20132573","journal-title":"J Parallel Distrib Comput"},{"key":"1049_CR30","unstructured":"Kammerer F (2020) Self-building technologies AI Soc 1\u201315\u00a0(forthcoming)"},{"issue":"2","key":"1049_CR31","doi-asserted-by":"publisher","first-page":"393","DOI":"10.1109\/TII.2012.2183878","volume":"8","author":"W Kang","year":"2012","unstructured":"Kang W, Kapitanova K, Son SH (2012) RDDS: a real-time data distribution service for cyber-physical systems. IEEE Trans Ind Informatics 8(2):393\u2013405","journal-title":"IEEE Trans Ind Informatics"},{"issue":"9","key":"1049_CR32","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1145\/2500468.2500473","volume":"56","author":"K Kirkpatrick","year":"2013","unstructured":"Kirkpatrick K (2013) Software-defined networking. Commun ACM 56(9):16","journal-title":"Commun ACM"},{"key":"1049_CR33","unstructured":"Koch R, Rodosek G (2016) In: Proceedings of the 15th European conference on cyber warfare and security: ECCWS 2016: hosted by Universit\u00e4t der Bundeswehr, Munich, 7\u20138 July 2016"},{"key":"1049_CR34","doi-asserted-by":"crossref","unstructured":"La HJ, Kim SD (2010) A service-based approach to designing cyber physical systems. In: 2010 IEEE\/ACIS 9th international conference on computer and information science, pp 895\u2013900","DOI":"10.1109\/ICIS.2010.73"},{"key":"1049_CR35","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1016\/j.procir.2014.02.001","volume":"16","author":"J Lee","year":"2014","unstructured":"Lee J, Kao HA, Yang S (2014) Service innovation and smart analytics for industry 4.0 and big data environment. Procedia CIRP 16:3\u20138","journal-title":"Procedia CIRP"},{"key":"1049_CR36","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1016\/j.mfglet.2014.12.001","volume":"3","author":"J Lee","year":"2015","unstructured":"Lee J, Bagheri B, Kao HA (2015) A cyber-physical systems architecture for industry 4.0-based manufacturing systems. Manufacturing Lett 3:18\u201323","journal-title":"Manufacturing letters"},{"key":"1049_CR37","unstructured":"Lee B, Cooper R, Hands D, Coulton P (2019) Value creation for IoT: challenges and opportunities within the design and development process. In: Living in the internet of things (IoT 2019). IET, living in the internet of things 2019, London, pp 1\u20138"},{"key":"1049_CR38","unstructured":"Lee B, Cooper R, Hands D, Coulton P (2019) Design drivers: a critical enabler to meditate value over the NPD process within Internet of Things. In: 4d conference proceedings: meanings of design in the next era. DML (Design Management Lab), Ritsumeikan University, Osaka, pp 96\u2013107"},{"key":"1049_CR39","doi-asserted-by":"publisher","first-page":"11","DOI":"10.1016\/j.compind.2015.08.004","volume":"81","author":"P Leit\u00e3o","year":"2016","unstructured":"Leit\u00e3o P, Colombo AW, Karnouskos S (2016) Industrial automation based on cyber-physical systems technologies: prototype implementations and challenges. Comput Ind 81:11\u201325","journal-title":"Comput Ind"},{"issue":"3","key":"1049_CR40","first-page":"36","volume":"5","author":"D Lewis","year":"2004","unstructured":"Lewis D, Brigder D (2004) Market researchers make increasing use of brain imaging. Adv Clin Neurosci Rehabil 5(3):36\u201337","journal-title":"Adv Clin Neurosci Rehabil"},{"issue":"1","key":"1049_CR41","doi-asserted-by":"publisher","first-page":"39","DOI":"10.1007\/s00146-018-0840-x","volume":"35","author":"N Liberati","year":"2020","unstructured":"Liberati N (2020) The Borg\u2013eye and the We\u2013I. The production of a collective living body through wearable computers. AI Soc 35(1):39\u201349","journal-title":"AI Soc"},{"key":"1049_CR42","first-page":"1","volume-title":"Cyber-physical systems: opportunities, challenges and (some) solutions","author":"P Marwedel","year":"2016","unstructured":"Marwedel P, Engel M (2016) Cyber-physical systems: opportunities, challenges and (some) solutions. Springer International Publishing, Cham, pp 1\u201330"},{"issue":"1","key":"1049_CR43","doi-asserted-by":"publisher","first-page":"225","DOI":"10.1007\/s00146-019-00880-4","volume":"35","author":"G Meissner","year":"2020","unstructured":"Meissner G (2020) Artificial intelligence: consciousness and conscience. AI Soc 35(1):225\u2013235","journal-title":"AI Soc"},{"key":"1049_CR44","doi-asserted-by":"crossref","unstructured":"Milano S, Taddeo M, Floridi L (2020) Recommender systems and their ethical challenges. AI Soc 1\u201311\u00a0(forthcoming)","DOI":"10.2139\/ssrn.3378581"},{"issue":"4","key":"1049_CR45","doi-asserted-by":"publisher","first-page":"345","DOI":"10.1057\/s41265-018-0054-1","volume":"33","author":"R Nicolescu","year":"2018","unstructured":"Nicolescu R, Huth M, Radanliev P, De Roure D (2018) Mapping the values of IoT. J Inf Technol 33(4):345\u2013360","journal-title":"J Inf Technol"},{"key":"1049_CR46","unstructured":"Niggemann O, Biswas G, Kinnebrew JS, Khorasgani H, Volgmann S, Bunte A (2015) Data-driven monitoring of cyber-physical systems leveraging on big data and the internet-of-things for diagnosis and control. In: International workshop on the principles of diagnosis (DX), pp 185\u2013192"},{"key":"1049_CR47","unstructured":"NIST (2018) NIST Version 1.1, National Institute of Standards and Technology, U.S. Department of Commerce. [Online]. https:\/\/www.nist.gov\/news-events\/news\/2018\/04\/nist-releases-version-11-its-popular-cybersecurity-framework"},{"issue":"1","key":"1049_CR48","doi-asserted-by":"publisher","first-page":"197","DOI":"10.1007\/s00146-018-0843-7","volume":"35","author":"K O\u2019Hara","year":"2020","unstructured":"O\u2019Hara K (2020) The contradictions of digital modernity. AI Soc 35(1):197\u2013208","journal-title":"AI Soc"},{"key":"1049_CR49","doi-asserted-by":"crossref","unstructured":"Ouyang J, Lin S, Jiang S, Hou Z, Wang Y, Wang Y, Ouyang J, Hou Z, Wang Y, Wang Y (2014) SDF: software-defined flash for web-scale internet storage systems. In Proceedings of the 19th international conference on Architectural support for programming languages and operating systems\u2014ASPLOS \u201914, vol 42, no. 1, pp 471\u2013484","DOI":"10.1145\/2654822.2541959"},{"key":"1049_CR50","doi-asserted-by":"publisher","first-page":"1536","DOI":"10.1016\/j.egypro.2015.07.313","volume":"75","author":"M Pan","year":"2015","unstructured":"Pan M, Sikorski J, Kastner CA, Akroyd J, Mosbach S, Lau R, Kraft M (2015) Applying industry 4.0 to the Jurong Island Eco-industrial Park. Energy Procedia 75:1536\u20131541","journal-title":"Energy Procedia"},{"issue":"2","key":"1049_CR51","doi-asserted-by":"publisher","first-page":"26","DOI":"10.1109\/MCG.2015.45","volume":"35","author":"J Posada","year":"2015","unstructured":"Posada J, Toro C, Barandiaran I, Oyarzun D, Stricker D, de Amicis R, Pinto EB, Vallarino I (2015) Visual computing as a key enabling technology for industrie 4.0 and industrial internet. IEEE Comput Graph Appl 35(2):26\u201340","journal-title":"IEEE Comput Graph Appl"},{"key":"1049_CR52","unstructured":"Radanliev P (2014) A conceptual framework for supply chain systems architecture and integration design based on practice and theory in the North Wales slate mining industry. British Library"},{"key":"1049_CR53","doi-asserted-by":"publisher","first-page":"14","DOI":"10.1016\/j.compind.2018.08.002","volume":"102","author":"P Radanliev","year":"2018","unstructured":"Radanliev P, De Roure D, Nicolescu R, Huth M, Montalvo RM, Cannady S, Burnap P (2018) Future developments in cyber risk assessment for the internet of things. Comput Ind 102:14\u201322","journal-title":"Comput Ind"},{"issue":"13","key":"1049_CR54","first-page":"1","volume":"3","author":"P Radanliev","year":"2020","unstructured":"Radanliev P, De Roure D, Page K, Nurse JR, Montalvo Mantilla R, Santos O, Maddox LT, Burnap P (2020) Cyber risk at the edge: current and future trends on cyber risk analytics and artificial intelligence in the industrial internet of things and industry 4.0 supply chains. Cybersecurity 3(13):1\u201321","journal-title":"Cybersecurity"},{"issue":"2","key":"1049_CR55","first-page":"1","volume":"169","author":"P Radanliev","year":"2020","unstructured":"Radanliev P, De Roure DC, Nurse JR, Montalvo RM, Cannady S, Santos O, Madox LT, Maple C (2020) Future developments in standardisation of cyber risk in the Internet of Things (IoT). SN Appl Sci 169(2):1\u201316","journal-title":"SN Appl Sci"},{"key":"1049_CR56","doi-asserted-by":"crossref","unstructured":"Rajkumar R, Lee I, Sha L, Stankovic J (2010) Cyber-physical systems: the next computing revolution. In: Proceedings of the 47th design automation conference on\u2014DAC\u201910, p 731","DOI":"10.1145\/1837274.1837461"},{"key":"1049_CR57","doi-asserted-by":"crossref","unstructured":"Ribeiro L, Barata J, Ferreira J (2010) An agent-based interaction-oriented shop floor to support emergent diagnosis. In: 2010 8th IEEE international conference on industrial informatics, pp 189\u2013194","DOI":"10.1109\/INDIN.2010.5549436"},{"key":"1049_CR58","unstructured":"Ringert JO, Rumpe B, Wortmann A (2015) Architecture and behavior modeling of cyber-physical systems with MontiArcAutomaton.\u00a0arXiv preprint arXiv:1509.04505"},{"key":"1049_CR59","doi-asserted-by":"crossref","unstructured":"Rodewald G, Gus (2005) Aligning information security investments with a firm\u2019s risk tolerance. In: Proceedings of the 2nd annual conference on information security curriculum development\u2014InfoSecCD \u201905, p 139","DOI":"10.1145\/1107622.1107654"},{"key":"1049_CR60","first-page":"34","volume":"1","author":"MA Roumani","year":"2016","unstructured":"Roumani MA, Fung CC, Rai S, Xie H (2016) Value analysis of cyber security based on attack types. ITMSOC Trans Innov Bus Eng 1:34\u201339","journal-title":"ITMSOC Trans Innov Bus Eng"},{"key":"1049_CR61","doi-asserted-by":"publisher","first-page":"77","DOI":"10.1016\/j.cose.2016.10.009","volume":"65","author":"K Ruan","year":"2017","unstructured":"Ruan K (2017) Introducing cybernomics: a unifying economic framework for measuring cyber risk. Comput Secur 65:77\u201389","journal-title":"Comput Secur"},{"key":"1049_CR62","unstructured":"Ruffle SJ, Bowman G, Caccioli F, Coburn AW, Kelly S, Leslie B, Ralph D (2014) Stress test scenario: sybil logic bomb cyber catastrophe. Cambridge Risk Framew Ser Cent Risk Stud Univ Cambridge"},{"issue":"23","key":"1049_CR63","first-page":"2015","volume":"7","author":"T Rutter","year":"2015","unstructured":"Rutter T (2015) The rise of nudge\u2014the unit helping politicians to fathom human behavior. Guard 7(23):2015","journal-title":"Guard"},{"key":"1049_CR64","first-page":"412","volume":"19","author":"SJ Shackelford","year":"2016","unstructured":"Shackelford SJ (2016) Protecting intellectual property and privacy in the digital age: the use of national cybersecurity strategies to mitigate cyber risk. Chapman Law Rev 19:412\u2013445","journal-title":"Chapman Law Rev"},{"key":"1049_CR65","doi-asserted-by":"publisher","first-page":"1146","DOI":"10.1016\/j.procs.2015.08.166","volume":"60","author":"SI Shafiq","year":"2015","unstructured":"Shafiq SI, Sanin C, Szczerbicki E, Toro C (2015) Virtual engineering object\/virtual engineering process: a specialized form of cyber physical system for industrie 4.0. Procedia Comput Sci 60:1146\u20131155","journal-title":"Procedia Comput Sci"},{"key":"1049_CR66","doi-asserted-by":"crossref","unstructured":"Shi J, Wan J, Yan H, Suo H (2011) A survey of cyber-physical systems. In: 2011 International conference on wireless communications and signal processing (WCSP), pp 1\u20136","DOI":"10.1109\/WCSP.2011.6096958"},{"key":"1049_CR67","doi-asserted-by":"publisher","first-page":"536","DOI":"10.1016\/j.procir.2016.01.129","volume":"40","author":"T Stock","year":"2016","unstructured":"Stock T, Seliger G (2016) Opportunities of sustainable manufacturing in industry 4.0. Procedia CIRP 40:536\u2013541","journal-title":"Procedia CIRP"},{"issue":"2","key":"1049_CR68","doi-asserted-by":"publisher","first-page":"122","DOI":"10.1109\/JIOT.2014.2311693","volume":"1","author":"I Stojmenovic","year":"2014","unstructured":"Stojmenovic I (2014) Machine-to-machine communications with in-network data aggregation, processing, and actuation for large-scale cyber-physical systems. IEEE Internet Things J 1(2):122\u2013128","journal-title":"IEEE Internet Things J"},{"issue":"1","key":"1049_CR69","doi-asserted-by":"publisher","first-page":"17","DOI":"10.1007\/s00146-017-0775-7","volume":"35","author":"R Sun","year":"2020","unstructured":"Sun R (2020) Potential of full human\u2013machine symbiosis through truly intelligent cognitive systems. AI Soc 35(1):17\u201328","journal-title":"AI Soc"},{"issue":"1","key":"1049_CR70","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/1366283.1366309","volume":"5","author":"Y Tan","year":"2008","unstructured":"Tan Y, Goddard S, P\u00e9rez LC (2008) A prototype architecture for cyber-physical systems. ACM Sigbed Review 5(1):1\u20132","journal-title":"ACM Sigbed Review"},{"key":"1049_CR71","doi-asserted-by":"crossref","unstructured":"Tanczer LM, Steenmans I, Elsden M, Blackstock J, Carr M (2018) Emerging risks in the IoT ecosystem: Who\u2019s afraid of the big bad smart fridge? In: Living in the internet of things: cybersecurity of the IoT, p 33 (9 pp)","DOI":"10.1049\/cp.2018.0033"},{"key":"1049_CR72","doi-asserted-by":"publisher","first-page":"92","DOI":"10.1016\/j.compind.2015.04.006","volume":"72","author":"K Thramboulidis","year":"2015","unstructured":"Thramboulidis K (2015) A cyber\u2013physical system-based approach for industrial automation systems. Comput Ind 72:92\u2013102","journal-title":"Comput Ind"},{"key":"1049_CR73","unstructured":"Wahlster W, Helbig J, Hellinger A, Stumpf MAV, Blasco J, Galloway H, Gestaltung H (2013) Recommendations for implementing the strategic initiative INDUSTRIE 4.0. Federal Ministry of Educationand Research"},{"issue":"8","key":"1049_CR74","doi-asserted-by":"publisher","first-page":"947","DOI":"10.1093\/comjnl\/bxt043","volume":"56","author":"J Wan","year":"2013","unstructured":"Wan J, Yan H, Li D, Zhou K, Zeng L (2013) Cyber-physical systems for optimal energy management scheme of autonomous electric vehicle. Comput J 56(8):947\u2013956","journal-title":"Comput J"},{"key":"1049_CR75","doi-asserted-by":"crossref","unstructured":"Wan J, Cai H, Zhou K (2015) Industrie 4.0: enabling technologies. In: Proceedings of 2015 international conference on intelligent computing and internet of things, pp 135\u2013140","DOI":"10.1109\/ICAIOT.2015.7111555"},{"issue":"1","key":"1049_CR76","doi-asserted-by":"publisher","first-page":"409","DOI":"10.1016\/j.cirp.2014.03.114","volume":"63","author":"L Wang","year":"2014","unstructured":"Wang L, Wang XV, Gao L, V\u00e1ncza J (2014) A cloud-based approach for WEEE remanufacturing. CIRP Ann Manuf Technol 63(1):409\u2013412","journal-title":"CIRP Ann Manuf Technol"},{"key":"1049_CR77","doi-asserted-by":"publisher","first-page":"517","DOI":"10.1016\/j.jmsy.2015.04.008","volume":"37","author":"L Wang","year":"2015","unstructured":"Wang L, T\u00f6rngren M, Onori M (2015) Current status and advancement of cyber-physical systems in manufacturing. J Manuf Syst 37:517\u2013527","journal-title":"J Manuf Syst"},{"issue":"1","key":"1049_CR78","first-page":"1","volume":"12","author":"S Wang","year":"2016","unstructured":"Wang S, Wan J, Li D, Zhang C (2016) Implementing smart factory of industrie 4.0: an outlook. Int J Distrib Sens Netwk 12(1):1\u201310","journal-title":"Int J Distrib Sens Netwk"},{"key":"1049_CR79","doi-asserted-by":"crossref","unstructured":"Wark T, Corke P, Sikka P, Klingbeil L, Guo Y, Crossman C, Valencia P, Bishop-Hurley G (2007) Transforming agriculture through pervasive wireless sensor networks. IEEE Pervasive Comput 6(2):50\u201357","DOI":"10.1109\/MPRV.2007.47"},{"issue":"3","key":"1049_CR80","doi-asserted-by":"publisher","first-page":"579","DOI":"10.1016\/j.ifacol.2015.06.143","volume":"48","author":"S Weyer","year":"2015","unstructured":"Weyer S, Schmitt M, Ohmer M, Gorecky D (2015) Towards industry 4.0\u2014standardization as the crucial challenge for highly modular, multi-vendor production systems. IFAC-PapersOnLine 48(3):579\u2013584","journal-title":"IFAC-PapersOnLine"},{"key":"1049_CR81","unstructured":"World Economic Forum (2015) Partnering for cyber resilience towards the quantification of cyber threats, Geneva"},{"key":"1049_CR82","doi-asserted-by":"crossref","unstructured":"Zhu Q, Rieger C, Basar T (2011) A hierarchical security architecture for cyber-physical systems. In: 2011 4th international symposium on resilient control systems, pp 15\u201320","DOI":"10.1109\/ISRCS.2011.6016081"}],"container-title":["AI &amp; SOCIETY"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00146-020-01049-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s00146-020-01049-0\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00146-020-01049-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,9,24]],"date-time":"2021-09-24T08:01:40Z","timestamp":1632470500000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s00146-020-01049-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,8,27]]},"references-count":82,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2021,9]]}},"alternative-id":["1049"],"URL":"https:\/\/doi.org\/10.1007\/s00146-020-01049-0","relation":{"has-preprint":[{"id-type":"doi","id":"10.21203\/rs.3.rs-76821\/v1","asserted-by":"object"},{"id-type":"doi","id":"10.20944\/preprints201903.0094.v1","asserted-by":"object"}]},"ISSN":["0951-5666","1435-5655"],"issn-type":[{"value":"0951-5666","type":"print"},{"value":"1435-5655","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,8,27]]},"assertion":[{"value":"19 April 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"10 August 2020","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"27 August 2020","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Compliance with ethical standards"}},{"value":"On behalf of all authors, the corresponding author states that there is no conflict nor competing interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}