{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,20]],"date-time":"2026-02-20T08:05:26Z","timestamp":1771574726466,"version":"3.50.1"},"reference-count":108,"publisher":"Springer Science and Business Media LLC","issue":"5","license":[{"start":{"date-parts":[[2022,1,31]],"date-time":"2022-01-31T00:00:00Z","timestamp":1643587200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2022,1,31]],"date-time":"2022-01-31T00:00:00Z","timestamp":1643587200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Inf Syst Front"],"published-print":{"date-parts":[[2024,10]]},"DOI":"10.1007\/s10796-022-10243-y","type":"journal-article","created":{"date-parts":[[2022,1,31]],"date-time":"2022-01-31T08:03:55Z","timestamp":1643616235000},"page":"1633-1652","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":11,"title":["IT Availability Risks in Smart Factory Networks \u2013 Analyzing the Effects of IT Threats on Production Processes Using Petri Nets"],"prefix":"10.1007","volume":"26","author":[{"given":"Stephan","family":"Berger","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4317-8592","authenticated-orcid":false,"given":"Christopher","family":"van Dun","sequence":"additional","affiliation":[]},{"given":"Bj\u00f6rn","family":"H\u00e4ckel","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,1,31]]},"reference":[{"key":"10243_CR1","doi-asserted-by":"crossref","unstructured":"van der Aalst, W.M.P. (1993): Interval timed coloured petri nets and their analysis. In: 1993 Intl Conf on Application and Theory of Petri Nets, S. 453\u2013472.","DOI":"10.1007\/3-540-56863-8_61"},{"key":"10243_CR2","doi-asserted-by":"publisher","unstructured":"van der Aalst, W. M. P. (2006). Matching observed behavior and modeled behavior: An approach based on Petri nets and integer programming. Decision Support Systems, 42(3), 1843\u20131859. https:\/\/doi.org\/10.1016\/j.dss.2006.03.013","DOI":"10.1016\/j.dss.2006.03.013"},{"key":"10243_CR3","unstructured":"Acatech (2013). Recommendations for implementing the strategic initiative INDUSTRIE 4.0. Final report of the Industrie 4.0 Working Group. Accessible under: https:\/\/www.acatech.de\/publikation\/umsetzungsempfehlungen-fuer-das-zukunftsprojekt-industrie-4-0-abschlussbericht-des-arbeitskreises-industrie-4-0\/. Accessed 28 Jan\u00a02022."},{"key":"10243_CR4","doi-asserted-by":"publisher","unstructured":"Albert, R., Jeong, H., & Barabasi, A.-L. (2000). Error and attack tolerance of complex networks. Nature, 406(6794), 378\u2013382. https:\/\/doi.org\/10.1038\/35019019","DOI":"10.1038\/35019019"},{"key":"10243_CR5","doi-asserted-by":"publisher","unstructured":"Amin, S., Schwartz, G. A., & Hussain, A. (2013). In quest of benchmarking security risks to cyber-physical systems. IEEE Network, 27(1), 19\u201324. https:\/\/doi.org\/10.1109\/MNET.2013.6423187","DOI":"10.1109\/MNET.2013.6423187"},{"key":"10243_CR6","unstructured":"Amiri, Amin., Cavusoglu, Hasan., Benbasat, Izak. (2014). When is IT Unavailability a Strategic Risk?: A Study in the Context of Cloud Computing. In: ICIS."},{"key":"10243_CR7","doi-asserted-by":"publisher","unstructured":"Arns, M., Fischer, M., Kemper, P., & Tepper, C. (2002). Supply chain modelling and its analytical evaluation. Journal of the Operational Research Society, 53(8), 885\u2013894. https:\/\/doi.org\/10.1057\/palgrave.jors.2601381","DOI":"10.1057\/palgrave.jors.2601381"},{"key":"10243_CR8","doi-asserted-by":"publisher","unstructured":"Arshad, N., Heimbigner, D., & Wolf, A. L. (2005). Dealing with failures during failure recovery of distributed systems. ACM SIGSOFT Notes, 30(4), 1. https:\/\/doi.org\/10.1145\/1082983.1083067","DOI":"10.1145\/1082983.1083067"},{"key":"10243_CR9","doi-asserted-by":"publisher","unstructured":"Ash, J., & Newth, D. (2007). Optimizing complex networks for resilience against cascading failure. Physica A: Statistical Mechanics and its Applications, 380, 673\u2013683. https:\/\/doi.org\/10.1016\/j.physa.2006.12.058","DOI":"10.1016\/j.physa.2006.12.058"},{"key":"10243_CR10","unstructured":"Ashelm, M., Jansen, J., Smolka, K.M. (2018). Cyberkriminelle erpressen Krauss Maffei. Frankfurter Allgemeine Zeitung. Frankfurt a. M. Accessible under:  https:\/\/www.faz.net\/aktuell\/wirtschaft\/diginomics\/cyberkriminelle-erpressen-krauss-maffei-f-a-z-exklusiv-15928434.html. Accessed 28 Jan\u00a02022."},{"key":"10243_CR11","doi-asserted-by":"crossref","unstructured":"Atamli, A. W., Martin, A., (2014) Threat-Based Security Analysis for the Internet of Things. In: 2014 Intl Workshop on Secure IoT, S. 35\u201343.","DOI":"10.1109\/SIoT.2014.10"},{"key":"10243_CR12","doi-asserted-by":"publisher","unstructured":"Barber, K. D., Dewhurst, F. W., Burns, R. L. D. H., & Rogers, J. B. B. (2003). Business-process modelling and simulation for manufacturing management. Business Process Management Journal, 9(4), 527\u2013542. https:\/\/doi.org\/10.1108\/14637150310484544","DOI":"10.1108\/14637150310484544"},{"key":"10243_CR13","doi-asserted-by":"publisher","unstructured":"Beese, J., Haki, M. K., Aier, S., & Winter, R. (2019). Simulation-based research in information systems. Business and Information Systems Engineering, 61(4), 503\u2013521. https:\/\/doi.org\/10.1007\/s12599-018-0529-1","DOI":"10.1007\/s12599-018-0529-1"},{"key":"10243_CR14","doi-asserted-by":"publisher","unstructured":"Berger, S., H\u00e4ckel, B., & H\u00e4fner, L. (2021). Organizing self-organizing systems: A terminology, taxonomy, and reference model for entities in cyber-physical production systems. Information Systems Frontiers, 23(2), 391\u2013414. https:\/\/doi.org\/10.1007\/s10796-019-09952-8","DOI":"10.1007\/s10796-019-09952-8"},{"key":"10243_CR15","unstructured":"Billington, J. (1988). Extending coloured petri nets (University of Cambridge, computer laboratory, UCAM-CL-TR-148). Accessible under:\u00a0 https:\/\/www.cl.cam.ac.uk\/techreports\/UCAM-CL-TR-148.pdf. Accessed 28 Jan\u00a02022."},{"key":"10243_CR16","doi-asserted-by":"publisher","unstructured":"Boucher, T. O., Jafari, M. A., & Meredith, G. A. (1989). Petri net control of an automated manufacturing cell. Computers & Industrial Engineering, 17(1\u20134), 459\u2013463. https:\/\/doi.org\/10.1016\/0360-8352(89)90105-8","DOI":"10.1016\/0360-8352(89)90105-8"},{"key":"10243_CR17","doi-asserted-by":"publisher","unstructured":"Brettel, M., Friederichsen, N., Keller, M., & Rosenberg, M. (2014). How virtualization, decentralization and network building change the manufacturing landscape: An industry 4.0 perspective. Intl Journal of Information & Communication Engineering, 8(1), 1\u20138. https:\/\/doi.org\/10.5281\/zenodo.1336426","DOI":"10.5281\/zenodo.1336426"},{"key":"10243_CR18","doi-asserted-by":"crossref","unstructured":"Broy, M.; Cengarle, M. V.; Geisberger, E. (2012): Cyber-Physical Systems: Imminent Challenges. In: Radu Calinescu and David Garlan (Hg.): Large-scale complex IT systems. Development, operation and management, Bd. 7539. Springer, S. 1\u201328.","DOI":"10.1007\/978-3-642-34059-8_1"},{"key":"10243_CR19","doi-asserted-by":"publisher","unstructured":"van Brussel, H., Peng, Y., & Valckenaers, P. (1993). Modelling flexible manufacturing systems based on Petri nets. CIRP Annals, 42(1), 479\u2013484. https:\/\/doi.org\/10.1016\/S0007-8506(07)62490-1","DOI":"10.1016\/S0007-8506(07)62490-1"},{"key":"10243_CR20","doi-asserted-by":"publisher","unstructured":"Buldyrev, S. V., Parshani, R., Paul, G., Stanley, H. E., & Havlin, S. (2010). Catastrophic cascade of failures in interdependent networks. Nature, 464(7291), 1025\u20131028. https:\/\/doi.org\/10.1038\/nature08932","DOI":"10.1038\/nature08932"},{"key":"10243_CR21","doi-asserted-by":"crossref","unstructured":"Cardenas, A. A.; Amin, S.; Sastry, S. (2008): Secure Control: Towards Survivable Cyber-Physical Systems. In: 2008 Intl Conference on Distributed Computing Systems, S. 495\u2013500.","DOI":"10.1109\/ICDCS.Workshops.2008.40"},{"key":"10243_CR22","unstructured":"Cardenas, A. A.; Amin, S..; Sinopoli, B..; Giani, A.; Perrig, A.; Sastry, S. (2009): Challenges for Securing Cyber Physical Systems. In: Workshop on Future Directions in Cyber-Physical Systems Securiy, S. 1\u20134."},{"key":"10243_CR23","volume-title":"Application and theory of Petri","author":"S Christensen","year":"1993","unstructured":"Christensen, S., & Hansen, N. D. (1993). Coloured Petri nets extended with place capacities, test arcs and inhibitor arcs. In M. A. Marsan (Ed.), Application and theory of Petri. Springer."},{"key":"10243_CR24","doi-asserted-by":"publisher","unstructured":"Culot, G., Nassimbeni, G., Orzes, G., & Sartor, M. (2020). Behind the definition of industry 4.0: Analysis and open questions. International Journal of Production Economics, 226, 107617. https:\/\/doi.org\/10.1016\/j.ijpe.2020.107617","DOI":"10.1016\/j.ijpe.2020.107617"},{"key":"10243_CR25","doi-asserted-by":"publisher","first-page":"79","DOI":"10.1007\/978-3-319-23947-7_5","volume-title":"Interconnected networks","author":"M Danziger","year":"2016","unstructured":"Danziger, M., Shekhtman, L., Bashan, A., Berezin, Y., & Havlin, S. (2016). Vulnerability of interdependent networks and networks of networks. In Garas (Ed.), Interconnected networks (pp. 79\u201399). Springer."},{"key":"10243_CR26","doi-asserted-by":"crossref","unstructured":"Dempsey, K.; Chawla, N. S.; Johnson, A.; Johnston, R.; Jones, A. C.; Orebaugh, A. et al. (2011): Information Security Continuous Monitoring for Federal information Systems and Organizations. National Institute of Standards and Technology. U.S. Department of Commerce.","DOI":"10.6028\/NIST.SP.800-137"},{"key":"10243_CR27","doi-asserted-by":"crossref","unstructured":"Desel, J., Esparza, J. (1995). Free choice Petri nets. In: Cambridge tracts in theoretical computer science.","DOI":"10.1017\/CBO9780511526558"},{"key":"10243_CR28","doi-asserted-by":"publisher","unstructured":"van Do, L., Fillatre, L., Nikiforov, I., & Willett, P. (2017). Security of SCADA systems against cyber\u2013physical attacks. IEEE Aerospace and Electronic Systems Magazine, 32(5), 28\u201345. https:\/\/doi.org\/10.1109\/MAES.2017.160047","DOI":"10.1109\/MAES.2017.160047"},{"key":"10243_CR29","doi-asserted-by":"crossref","unstructured":"Dotoli, M.; Fanti, M. P. (2005) A Generalized Stochastic Petri Net Model for Management of Distributed Manufacturing Systems. In: 2005 44th IEEE Conf on Decision & Control, S. 2125\u20132130.","DOI":"10.1109\/CDC.2005.1582475"},{"key":"10243_CR30","doi-asserted-by":"publisher","unstructured":"D'Souza, K. A., & Khator, S. K. (1994). A survey of Petri net applications in modeling controls for automated manufacturing systems. Computers in Industry, 24(1), 5\u201316. https:\/\/doi.org\/10.1016\/0166-3615(94)90004-3","DOI":"10.1016\/0166-3615(94)90004-3"},{"key":"10243_CR31","doi-asserted-by":"publisher","first-page":"103","DOI":"10.1007\/BFb0055044","volume-title":"Automata, languages and programming","author":"C Dufourd","year":"1998","unstructured":"Dufourd, C., Finkel, A., & Schnoebelen, P. (1998). Reset nets between decidability and undecidability. In K. G. Larsen, S. Skyum, & G. Winskel (Eds.), Automata, languages and programming (pp. 103\u2013115). Springer."},{"key":"10243_CR32","doi-asserted-by":"publisher","unstructured":"Dzung, D., Naedele, M., von Hoff, T. P., & Crevatin, M. (2005). Security for industrial communication systems. Proceedings of the IEEE, 93(6), 1152\u20131177. https:\/\/doi.org\/10.1109\/JPROC.2005.849714","DOI":"10.1109\/JPROC.2005.849714"},{"issue":"1","key":"10243_CR33","first-page":"17","volume":"5","author":"P Erd\u0151s","year":"1960","unstructured":"Erd\u0151s, P., & R\u00e9nyi, A. (1960). On the evolution of random graphs. Publication of the Mathematical Institute of the Hungarian Academy of Sciences, 5(1), 17\u201360.","journal-title":"Publication of the Mathematical Institute of the Hungarian Academy of Sciences"},{"key":"10243_CR34","doi-asserted-by":"publisher","unstructured":"Fridgen, G., Stepanek, C., & Wolf, T. (2015). Investigation of exogenous shocks in complex supply networks \u2013 A modular Petri net approach. Intl Journal of Production Research, 53(5), 1387\u20131408. https:\/\/doi.org\/10.1080\/00207543.2014.942009","DOI":"10.1080\/00207543.2014.942009"},{"key":"10243_CR35","doi-asserted-by":"publisher","unstructured":"Frustaci, M., Pace, P., Aloi, G., & Fortino, G. (2018). Evaluating critical security issues of the IoT world: Present and future challenges. IEEE Internet of Things Journal, 5(4), 2483\u20132495. https:\/\/doi.org\/10.1109\/JIOT.2017.2767291","DOI":"10.1109\/JIOT.2017.2767291"},{"key":"10243_CR36","doi-asserted-by":"publisher","unstructured":"Galloway, B., & Hancke, G. P. (2013). Introduction to industrial control networks. IEEE Communication Surveys and Tutorials, 15(2), 860\u2013880. https:\/\/doi.org\/10.1109\/SURV.2012.071812.00124","DOI":"10.1109\/SURV.2012.071812.00124"},{"key":"10243_CR37","doi-asserted-by":"publisher","unstructured":"Gao, J., Buldyrev, S. V., Stanley, H. E., & Havlin, S. (2012). Networks formed from interdependent networks. Nature Physics, 8(1), 40\u201348. https:\/\/doi.org\/10.1038\/NPHYS2180","DOI":"10.1038\/NPHYS2180"},{"key":"10243_CR38","doi-asserted-by":"publisher","unstructured":"Genge, B., Kiss, I., & Haller, P. (2015). A system dynamics approach for assessing the impact of cyber attacks on critical infrastructures. Intl Journal of Critical Infrastructure Protection, 10, 3\u201317. https:\/\/doi.org\/10.1016\/j.ijcip.2015.04.001","DOI":"10.1016\/j.ijcip.2015.04.001"},{"key":"10243_CR39","doi-asserted-by":"publisher","unstructured":"Ha, S., & Suh, H.-W. (2008). A timed colored Petri nets modeling for dynamic workflow in product development process. Computers in Industry, 59(2\u20133), 193\u2013209. https:\/\/doi.org\/10.1016\/j.compind.2007.06.016","DOI":"10.1016\/j.compind.2007.06.016"},{"key":"10243_CR40","doi-asserted-by":"publisher","unstructured":"H\u00e4ckel, B., H\u00e4nsch, F., Hertel, M., & \u00dcbelh\u00f6r, J. (2018). Assessing IT availability risks in smart factory networks. Business Research. https:\/\/doi.org\/10.1007\/s40685-018-0071-5","DOI":"10.1007\/s40685-018-0071-5"},{"key":"10243_CR41","unstructured":"H\u00e4ckel, B.; \u00dcbelh\u00f6r, J. (2017): Development of Dynamic Key Figures for the Identification of Critical Components in Smart Factory Information Networks. In: ECIS 2017 25, S. 2767\u20132776."},{"key":"10243_CR42","doi-asserted-by":"publisher","unstructured":"Hallikas, J., Karvonen, I., Pulkkinen, U., Virolainen, V.-M., & Tuominen, M. (2004). Risk management processes in supplier networks. International Journal of Production Economics, 90(1), 47\u201358. https:\/\/doi.org\/10.1016\/j.ijpe.2004.02.007","DOI":"10.1016\/j.ijpe.2004.02.007"},{"key":"10243_CR43","doi-asserted-by":"crossref","unstructured":"Hermann, M.; Pentek, T.; Otto, B. (2016): Design Principles for Industrie 4.0 Scenarios. In: 49th Hawaii International Conference on System Sciences, S. 3928\u20133937.","DOI":"10.1109\/HICSS.2016.488"},{"issue":"2","key":"10243_CR44","first-page":"87","volume":"19","author":"AR Hevner","year":"2007","unstructured":"Hevner, A. R. (2007). A three-cycle view of design science research. Scandinavian Journal of Information Systems, 19(2), 87\u201392.","journal-title":"Scandinavian Journal of Information Systems"},{"key":"10243_CR45","doi-asserted-by":"publisher","unstructured":"Hevner, A. R., March, S. T., Park, J., & Ram, S. (2004). Design science in information systems research. MIS Quarterly, 28(1), 75\u2013105. https:\/\/doi.org\/10.2307\/25148625","DOI":"10.2307\/25148625"},{"issue":"2","key":"10243_CR46","first-page":"39","volume":"19","author":"J Iivari","year":"2007","unstructured":"Iivari, J. (2007). A paradigmatic analysis of information systems as a design science. Scandinavian Journal of Information Systems, 19(2), 39\u201364.","journal-title":"Scandinavian Journal of Information Systems"},{"key":"10243_CR47","doi-asserted-by":"publisher","unstructured":"Ivanov, D., Dolgui, A., Sokolov, B., Werner, F., & Ivanova, M. (2016). A dynamic model and an algorithm for short-term supply chain scheduling in the smart factory industry 4.0. International Journal of Production Research, 54(2), 386\u2013402. https:\/\/doi.org\/10.1080\/00207543.2014.999958","DOI":"10.1080\/00207543.2014.999958"},{"key":"10243_CR48","doi-asserted-by":"publisher","unstructured":"Janicki, R., & Koutny, M. (1995). Semantics of inhibitor nets. Information and Computation, 123, 1\u201316. https:\/\/doi.org\/10.1006\/inco.1995.1153","DOI":"10.1006\/inco.1995.1153"},{"key":"10243_CR49","first-page":"248","volume-title":"Advances in Petri nets","author":"K Jensen","year":"1987","unstructured":"Jensen, K. (1987). Coloured Petri nets. In G. Rozenberg (Ed.), Advances in Petri nets (254th ed., pp. 248\u2013299). Springer (Lecture Notes in Computer Science).","edition":"254"},{"key":"10243_CR50","doi-asserted-by":"crossref","unstructured":"Jensen, K. (1991): Coloured Petri Nets: A High Level Language for System Design and Analysis. In: Jensen (Hg.): High-level Petri nets, S. 44\u2013119.","DOI":"10.1007\/978-3-642-84524-6_2"},{"issue":"9","key":"10243_CR51","first-page":"689","volume":"8","author":"S K\u00e4mper","year":"1991","unstructured":"K\u00e4mper, S. (1991). On the appropriateness of Petri nets in model building and simulation. Systems Analysis Modelling Simulation, 8(9), 689\u2013714.","journal-title":"Systems Analysis Modelling Simulation"},{"key":"10243_CR52","doi-asserted-by":"publisher","unstructured":"Kang, C. M., Hong, Y. S., Huh, W. T., & Kang, W. (2015). Risk propagation through a platform: The failure risk perspective on platform sharing. IEEE Transactions on Engineering Management, 62(3), 372\u2013383. https:\/\/doi.org\/10.1109\/TEM.2015.2427844","DOI":"10.1109\/TEM.2015.2427844"},{"key":"10243_CR53","volume-title":"Focus groups. A practical guide for applied research","author":"RA Krueger","year":"2014","unstructured":"Krueger, R. A., & Casey, M. A. (2014). Focus groups. A practical guide for applied research (5th ed.). SAGE.","edition":"5"},{"key":"10243_CR54","unstructured":"Kupreev, O., Badovskaya, E., Gutnikov, A. (2019). DDoS Reports. DDoS Attacks in Q3 2019. Kaspersky Labs. Accessible under: https:\/\/securelist.com\/ddos-report-q3-2019\/94958\/. Accessed 28 Jan\u00a02022."},{"key":"10243_CR55","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-53321-6","volume-title":"Robust modelling and simulation","author":"de La Mota","year":"2017","unstructured":"de La Mota, Flores, I., Guasch, A., Piera, A. M., & Mujica, M. M. (2017). Robust modelling and simulation. Springer International Publishing."},{"key":"10243_CR56","doi-asserted-by":"publisher","unstructured":"Lasi, H., Fettke, P., Kemper, H.-G., Feld, T., & Hoffmann, M. (2014). Industry 4.0. Business & Information Systems Engineering, 6(4), 239\u2013242. https:\/\/doi.org\/10.1007\/s12599-014-0334-4","DOI":"10.1007\/s12599-014-0334-4"},{"key":"10243_CR57","doi-asserted-by":"crossref","unstructured":"Lee, E. A., (2008) Cyber Physical Systems: Design Challenges. In: IEEE Intl Symposium on Object Oriented Real-Time Distributed Computing, 363\u2013369.","DOI":"10.1109\/ISORC.2008.25"},{"key":"10243_CR58","doi-asserted-by":"publisher","unstructured":"Lee, J., Bagheri, B., & Kao, H.-A. (2015). A cyber-physical systems architecture for industry 4.0-based manufacturing systems. Manufacturing Letters, 3, 18\u201323. https:\/\/doi.org\/10.1016\/j.mfglet.2014.12.001","DOI":"10.1016\/j.mfglet.2014.12.001"},{"key":"10243_CR59","doi-asserted-by":"publisher","unstructured":"Li, L. (2018). China's manufacturing locus in 2025: With a comparison of \u201cmade-in-China 2025\u201d and \u201cindustry 4.0\u201d. Technological Forecasting and Social Change, 135, 66\u201374. https:\/\/doi.org\/10.1016\/j.techfore.2017.05.028","DOI":"10.1016\/j.techfore.2017.05.028"},{"key":"10243_CR60","doi-asserted-by":"publisher","unstructured":"Long, F., Zeiler, P., & Bertsche, B. (2016). Modelling the production systems in industry 4.0 and their availability with high-level Petri nets. IFAC-PapersOnLine, 49(12), 145\u2013150. https:\/\/doi.org\/10.1016\/j.ifacol.2016.07.565","DOI":"10.1016\/j.ifacol.2016.07.565"},{"key":"10243_CR61","doi-asserted-by":"publisher","first-page":"115","DOI":"10.1007\/978-1-84800-267-8_23","volume-title":"Manufacturing systems and Technologies for the new Frontier","author":"D Lucke","year":"2008","unstructured":"Lucke, D., Constantinescu, C., & Westk\u00e4mper, E. (2008). Smart factory - a step towards the next generation of manufacturing. In M. Mitsuishi (Ed.), Manufacturing systems and Technologies for the new Frontier (pp. 115\u2013118). Springer."},{"key":"10243_CR62","doi-asserted-by":"publisher","unstructured":"March, S. T., & Smith, G. F. (1995). Design and natural science research on information technology. Decision Support Systems, 15(4), 251\u2013266. https:\/\/doi.org\/10.1016\/0167-9236(94)00041-2","DOI":"10.1016\/0167-9236(94)00041-2"},{"issue":"4","key":"10243_CR63","doi-asserted-by":"publisher","first-page":"725","DOI":"10.2307\/25148869","volume":"32","author":"ST March","year":"2008","unstructured":"March, S. T., & Storey, V. C. (2008). Design science in the information systems discipline. An introduction to the special issue on design science research. MIS Quarterly, 32(4), 725\u2013730.","journal-title":"MIS Quarterly"},{"key":"10243_CR64","doi-asserted-by":"crossref","unstructured":"Miehle, D.; H\u00e4ckel, B.; Pfosser, S.; \u00dcbelh\u00f6r, J. (2019): Modeling IT Availability Risks in Smart Factories: a Stochastic Petri Nets Approach. In: Business & Information Systems Engineering.","DOI":"10.1007\/s12599-019-00610-6"},{"key":"10243_CR65","doi-asserted-by":"publisher","unstructured":"Monostori, L., K\u00e1d\u00e1r, B., Bauernhansl, T., Kondoh, S., Kumara, S., Reinhart, G., et al. (2016). Cyber-physical systems in manufacturing. CIRP Annals, 65(2), 621\u2013641. https:\/\/doi.org\/10.1016\/j.cirp.2016.06.005","DOI":"10.1016\/j.cirp.2016.06.005"},{"key":"10243_CR66","doi-asserted-by":"publisher","unstructured":"Murata, T. (1989). Petri nets: Properties, analysis and applications. Proceedings of the IEEE, 77(4), 541\u2013580. https:\/\/doi.org\/10.1109\/5.24143","DOI":"10.1109\/5.24143"},{"key":"10243_CR67","doi-asserted-by":"crossref","unstructured":"Nawir, M.Amir, A.; Yaakob, N.; Lynn, O. B. (2016): Internet of Things (IoT): Taxonomy of security attacks. In: 2016 3rd Intl Conference on Electronic Design, S. 321\u2013326.","DOI":"10.1109\/ICED.2016.7804660"},{"key":"10243_CR68","unstructured":"Olenick, D. (2019). Spirit AeroSystems confirms ASCO Industries cyberattack. SC Magazine. London. Accessible under: https:\/\/www.scmagazine.com\/home\/security-news\/ransomware\/asco-industries-silent-on-ransomware-attack\/. Accessed 28 Jan\u00a02022."},{"key":"10243_CR69","doi-asserted-by":"publisher","unstructured":"Osterrieder, P., Budde, L., & Friedli, T. (2020). The smart factory as a key construct of industry 4.0: A systematic literature review. International Journal of Production Economics, 221, S. 107476. https:\/\/doi.org\/10.1016\/j.ijpe.2019.08.011","DOI":"10.1016\/j.ijpe.2019.08.011"},{"key":"10243_CR70","doi-asserted-by":"publisher","unstructured":"Pasqualetti, F., Dorfler, F., & Bullo, F. (2013). Attack detection and identification in cyber-physical systems. IEEE Transactions on Automatic Control, 58(11), 2715\u20132729. https:\/\/doi.org\/10.1109\/TAC.2013.2266831","DOI":"10.1109\/TAC.2013.2266831"},{"key":"10243_CR71","doi-asserted-by":"publisher","unstructured":"Peffers, K., Tuunanen, T., Rothenberger, M. A., & Chatterjee, S. (2007). A design science research methodology for information systems research. Journal of Management Information Systems, 24(3), 45\u201377. https:\/\/doi.org\/10.2753\/MIS0742-1222240302","DOI":"10.2753\/MIS0742-1222240302"},{"key":"10243_CR72","doi-asserted-by":"publisher","unstructured":"Peterson, J. L. (1977). Petri Nets. ACM Computing Surveys, 9(3), 223\u2013252. https:\/\/doi.org\/10.1145\/356698.356702","DOI":"10.1145\/356698.356702"},{"key":"10243_CR73","volume-title":"Communication with automata. Diploma thesis","author":"CA Petri","year":"1966","unstructured":"Petri, C. A. (1966). Communication with automata. Diploma thesis. Technical University of Darmstadt."},{"key":"10243_CR74","unstructured":"Pries-Heje, J.; Baskerville, R.; Venable, J. R. (2008): Strategies for Design Science Research Evaluation. In: European Conf on Information Systems, S. 255\u2013266."},{"key":"10243_CR75","doi-asserted-by":"publisher","unstructured":"Radziwon, A., Bilberg, A., Bogers, M., & Madsen, E. S. (2014). The smart factory: Exploring adaptive and flexible manufacturing solutions. Procedia Engineering, 69, 1184\u20131190. https:\/\/doi.org\/10.1016\/j.proeng.2014.03.108","DOI":"10.1016\/j.proeng.2014.03.108"},{"key":"10243_CR76","unstructured":"Ramchandani, C. (1973): Analysis of Asynchronos Concurrent Systems by Timed Petri Nets. Diss. Massachusetts Institute of Technology."},{"key":"10243_CR77","doi-asserted-by":"publisher","unstructured":"Razzaq, M., & Ahmad, J. (2015). Petri net and probabilistic model checking based approach for the modelling, simulation and verification of internet worm propagation. PLoS One, 10(12). https:\/\/doi.org\/10.1371\/journal.pone.0145690","DOI":"10.1371\/journal.pone.0145690"},{"key":"10243_CR78","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-33278-4","volume-title":"Understanding Petri Nets","author":"W Reisig","year":"2013","unstructured":"Reisig, W. (2013). Understanding Petri Nets. Springer."},{"key":"10243_CR79","doi-asserted-by":"publisher","unstructured":"Rowley, J. (2012). Conducting research interviews. Management Research Review, 35(3\/4), 260\u2013271. https:\/\/doi.org\/10.1108\/01409171211210154","DOI":"10.1108\/01409171211210154"},{"key":"10243_CR80","doi-asserted-by":"publisher","unstructured":"Ryan, J., & Heavey, C. (2006). Process modeling for simulation. Computers in Industry, 57(5), 437\u2013450. https:\/\/doi.org\/10.1016\/j.compind.2006.02.002","DOI":"10.1016\/j.compind.2006.02.002"},{"key":"10243_CR81","doi-asserted-by":"crossref","unstructured":"Sadeghi, A-R.; Wachsmann, C.; Waidner, M. (2015): Security and privacy challenges in industrial internet of things. In: 52nd ACM\/EDAC\/IEEE Design Automation Conference, S. 1\u20136.","DOI":"10.1145\/2744769.2747942"},{"key":"10243_CR82","doi-asserted-by":"crossref","unstructured":"Salfner, F.; Wolter, K. (2009): A Petri net model for service availability in redundant computing systems. In: Manuel D. Rossetti (Hg.): Proceedings of the 2009 Winter Simulation Conference. 2009 Winter Simulation Conference. Austin. IEEE, S. 819\u2013826.","DOI":"10.1109\/WSC.2009.5429681"},{"key":"10243_CR83","doi-asserted-by":"publisher","unstructured":"Sargent, R. G. (2013). Verification and validation of simulation models. Journal of Simulation, 7(1), 12\u201324. https:\/\/doi.org\/10.1057\/jos.2012.20","DOI":"10.1057\/jos.2012.20"},{"key":"10243_CR84","doi-asserted-by":"publisher","unstructured":"Schuh, G., Potente, T., Varandani, R., Hausberg, C., & Fr\u00e4nken, B. (2014). Collaboration moves productivity to the next level. Procedia CIRP, 17, 3\u20138. https:\/\/doi.org\/10.1016\/j.procir.2014.02.037","DOI":"10.1016\/j.procir.2014.02.037"},{"key":"10243_CR85","volume-title":"Modeling and analysis of real-time and embedded systems with UML and MARTE. Developing cyber-physical systems","author":"B Selic","year":"2013","unstructured":"Selic, B., & G\u00e9rard, S. (2013). Modeling and analysis of real-time and embedded systems with UML and MARTE. Developing cyber-physical systems. Elsevier Science (The MK \/ OMG Press)."},{"key":"10243_CR86","doi-asserted-by":"publisher","unstructured":"Shameli-Sendi, A., Aghababaei-Barzegar, R., & Cheriet, M. (2016). Taxonomy of information security risk assessment (ISRA). Computers & Security, 57, 14\u201330. https:\/\/doi.org\/10.1016\/j.cose.2015.11.001","DOI":"10.1016\/j.cose.2015.11.001"},{"key":"10243_CR87","doi-asserted-by":"publisher","unstructured":"Smith, G. E., Watson, K. J., Baker, W. H., & Pokorski II, J. A. (2007). A critical balance: Collaboration and security in the IT-enabled supply chain. Intl Journal of Production Research, 45(11), 2595\u20132613. https:\/\/doi.org\/10.1080\/00207540601020544","DOI":"10.1080\/00207540601020544"},{"key":"10243_CR88","doi-asserted-by":"crossref","unstructured":"Sonnenberg, C.; Vom Brocke, J. (2012): Evaluations in the Science of the Artificial \u2013 Reconsidering the Build-Evaluate Pattern in Design Science Research. In: 7th DESRIST Conference, S. 381\u2013397.","DOI":"10.1007\/978-3-642-29863-9_28"},{"key":"10243_CR89","doi-asserted-by":"publisher","unstructured":"Sun, Y., Li, L., Shi, H., & Chong, D. (2020). The transformation and upgrade of China's manufacturing industry in industry 4.0 era. Systems Research and Behavioral Science, 37(4), 734\u2013740. https:\/\/doi.org\/10.1002\/sres.2714","DOI":"10.1002\/sres.2714"},{"key":"10243_CR90","doi-asserted-by":"publisher","unstructured":"Szpyrka, M., & Jasiul, B. (2017). Evaluation of cyber security and modelling of risk propagation with Petri nets. Symmetry, 9(3), 1\u201332. https:\/\/doi.org\/10.3390\/sym9030032","DOI":"10.3390\/sym9030032"},{"key":"10243_CR91","doi-asserted-by":"crossref","unstructured":"Tsinarakis, G. J.; Valavanis, K. P.; Tsourveloudis, N. C.: (2003) Modular Petri net based modeling, analysis and synthesis of dedicated production systems. In: Intl Conference on Robotics S. 3559\u20133564.","DOI":"10.1109\/ROBOT.2003.1242141"},{"key":"10243_CR92","doi-asserted-by":"publisher","unstructured":"Tupa, J., Simota, J., & Steiner, F. (2017). Aspects of risk management implementation for industry 4.0. Procedia Manufacturing, 11, 1223\u20131230. https:\/\/doi.org\/10.1016\/j.promfg.2017.07.248","DOI":"10.1016\/j.promfg.2017.07.248"},{"key":"10243_CR93","doi-asserted-by":"crossref","unstructured":"Valk, R\u00fcdiger (1981): Generalizations of Petri nets. In: Gruska, Chytil (Hg.) Mathematical foundations of computer science, Bd. 118, S. 140\u2013155.","DOI":"10.1007\/3-540-10856-4_80"},{"key":"10243_CR94","doi-asserted-by":"crossref","unstructured":"Vavra, Jan; Hromada, Martin (2015): An evaluation of cyber threats to industrial control systems. In: 2015 Intl Conference on Model Transformation, S. 1\u20135.","DOI":"10.1109\/MILTECHS.2015.7153700"},{"key":"10243_CR95","doi-asserted-by":"crossref","unstructured":"Venable, J., Pries-Heje, J., & Baskerville, R (2012).  A comprehensive framework for evaluation in design science research. Design Science Research in Information Systems, 7286, 423\u2013438.","DOI":"10.1007\/978-3-642-29863-9_31"},{"key":"10243_CR96","doi-asserted-by":"publisher","unstructured":"Verbeek, H. M. W., Wynn, M. T., van der Aalst, W. M. P., & ter Hofstede, A. H. M. (2010). Reduction rules for reset\/inhibitor nets. Journal of Computer and System Sciences, 76(2), 125\u2013143. https:\/\/doi.org\/10.1016\/j.jcss.2009.06.003","DOI":"10.1016\/j.jcss.2009.06.003"},{"key":"10243_CR97","doi-asserted-by":"publisher","unstructured":"Wagner, S. M., & Neshat, N. (2010). Assessing the vulnerability of supply chains using graph theory. International Journal of Production Economics, 126(1), 121\u2013129. https:\/\/doi.org\/10.1016\/j.ijpe.2009.10.007","DOI":"10.1016\/j.ijpe.2009.10.007"},{"key":"10243_CR98","doi-asserted-by":"publisher","unstructured":"Wang, S., Wan, J., Li, D., & Zhang, C. (2016). Implementing smart factory of Industrie 4.0: An outlook. International Journal of Distributed Sensor Networks, 12(1), 3159805. https:\/\/doi.org\/10.1155\/2016\/3159805","DOI":"10.1155\/2016\/3159805"},{"key":"10243_CR99","doi-asserted-by":"publisher","unstructured":"Wu, T., Blackhurst, J., & O\u2019grady, P. (2007). Methodology for supply chain disruption analysis. International Journal of Production Research, 45(7), 1665\u20131682. https:\/\/doi.org\/10.1080\/00207540500362138","DOI":"10.1080\/00207540500362138"},{"key":"10243_CR100","doi-asserted-by":"publisher","unstructured":"Xu, L. D., Xu, E. L., & Li, L. (2018). Industry 4.0: State of the art and future trends. International Journal of Production Research, 56(8), 2941\u20132962. https:\/\/doi.org\/10.1080\/00207543.2018.1444806","DOI":"10.1080\/00207543.2018.1444806"},{"key":"10243_CR101","doi-asserted-by":"publisher","unstructured":"Yadav, S. B., & Dong, T. (2014). A comprehensive method to assess work system security risk. Communications of the Association for Information Systems, 34, 8. https:\/\/doi.org\/10.17705\/1CAIS.03408","DOI":"10.17705\/1CAIS.03408"},{"key":"10243_CR102","doi-asserted-by":"publisher","unstructured":"Yoon, J.-S., Shin, S.-J., & Suh, S.-H. (2012). A conceptual framework for the ubiquitous factory. International Journal of Production Research, 50(8), 2174\u20132189. https:\/\/doi.org\/10.1080\/00207543.2011.562563","DOI":"10.1080\/00207543.2011.562563"},{"key":"10243_CR103","doi-asserted-by":"publisher","unstructured":"Zambon, E., Etalle, S., Wieringa, R. J., & Hartel, P. (2011). Model-based qualitative risk assessment for availability of IT infrastructures. Software and Systems Modeling, 10(4), 553\u2013580. https:\/\/doi.org\/10.1007\/s10270-010-0166-8","DOI":"10.1007\/s10270-010-0166-8"},{"key":"10243_CR104","doi-asserted-by":"crossref","unstructured":"van der Zee, Durk-Jouke (2009): Building Insightful Simulation Models Using Formal Approaches. A Case Study On Petri Nets. In: Manuel D. Rossetti (eds.): Proceedings of the 2009 Winter Simulation Conference. 2009 Winter Simulation Conference. Austin. IEEE, S. 886\u2013898.","DOI":"10.1109\/WSC.2009.5429717"},{"key":"10243_CR105","doi-asserted-by":"publisher","unstructured":"van der Zee, D.-J. (2011). Building insightful simulation models using Petri nets \u2014 A structured approach. Decision Support Systems, 51(1), 53\u201364. https:\/\/doi.org\/10.1016\/j.dss.2010.11.028","DOI":"10.1016\/j.dss.2010.11.028"},{"key":"10243_CR106","doi-asserted-by":"publisher","unstructured":"Zhang, C., Wang, S., Wan, J., Zhang, D., Li, D., & Zhang, C. (2016). Towards smart factory for industry 4.0: A self-organized multi-agent system with big data based feedback and coordination. Computer Networks, 101, 158\u2013168. https:\/\/doi.org\/10.1016\/j.comnet.2015.12.017","DOI":"10.1016\/j.comnet.2015.12.017"},{"key":"10243_CR107","first-page":"6","volume-title":"A petri net approach","author":"M Zhou","year":"2000","unstructured":"Zhou, M., & Venkatesh, K. (2000). Modeling, simulation and control of flexible manufacturing systems. In  A petri net approach (p. 6). World Scientific (Series in intelligent control and intelligent automation)."},{"key":"10243_CR108","doi-asserted-by":"publisher","unstructured":"Zuehlke, D. (2010). SmartFactory\u2014Towards a factory-of-things. Annual Reviews in Control, 34(1), 129\u2013138. https:\/\/doi.org\/10.1016\/j.arcontrol.2010.02.008","DOI":"10.1016\/j.arcontrol.2010.02.008"}],"container-title":["Information Systems Frontiers"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10796-022-10243-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10796-022-10243-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10796-022-10243-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,11,27]],"date-time":"2024-11-27T07:13:56Z","timestamp":1732691636000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10796-022-10243-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,1,31]]},"references-count":108,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2024,10]]}},"alternative-id":["10243"],"URL":"https:\/\/doi.org\/10.1007\/s10796-022-10243-y","relation":{},"ISSN":["1387-3326","1572-9419"],"issn-type":[{"value":"1387-3326","type":"print"},{"value":"1572-9419","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,1,31]]},"assertion":[{"value":"8 January 2022","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"31 January 2022","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors have no relevant financial or non-financial interests to disclose.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing Interests"}}]}}