{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:16:00Z","timestamp":1750220160068,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":59,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,9,22]],"date-time":"2022-09-22T00:00:00Z","timestamp":1663804800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/100009567","name":"Budapesti M\u0171szaki \u00e9s Gazdas\u00e1gtudom\u00e1nyi Egyetem","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100009567","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,9,22]]},"DOI":"10.1145\/3551504.3551546","type":"proceedings-article","created":{"date-parts":[[2022,10,25]],"date-time":"2022-10-25T16:08:31Z","timestamp":1666714111000},"page":"93-99","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Industry 4.0-based critical infrastructure and the NIS Directive"],"prefix":"10.1145","author":[{"given":"Zsolt","family":"Bederna","sequence":"first","affiliation":[{"name":"Department of Management and Business Economics, Budapest University of Technology and Economics, Hungary"}]},{"given":"Tamas","family":"Szadeczky","sequence":"additional","affiliation":[{"name":"Department of Management and Business Economics, Budapest University of Technology and Economics, Hungary"}]}],"member":"320","published-online":{"date-parts":[[2022,10,25]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1080\/01972243.1994.9960154"},{"key":"e_1_3_2_1_2_1","volume-title":"Information society","author":"Union European","year":"2020","unstructured":"European Union, \u201cInformation society.\u201d https:\/\/eur-lex.europa.eu\/summary\/glossary\/information_society.html (accessed Dec. 09, 2020)."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.2307\/j.ctt1djmhj1.7"},{"key":"e_1_3_2_1_4_1","first-page":"59","article-title":"The role of ICT components in the functioning of critical infrastructure","author":"Ryba M.","year":"2014","unstructured":"M. Ryba, \u201cThe role of ICT components in the functioning of critical infrastructure,\u201d in Critical Infrastructure Security - the ICT Dimension, J. \u015awi\u0105tkowska, Ed. Krak\u00f3w: The Kosciuszko Institute, 2014, pp. 59\u201362.","journal-title":"Critical Infrastructure Security - the ICT Dimension, J. \u015awi\u0105tkowska, Ed. Krak\u00f3w: The Kosciuszko Institute"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijinfomgt.2020.102092"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1177\/2158244016653987"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.20965\/ijat.2013.p0006"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.20965\/ijat.2017.p0004"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cirp.2016.06.005"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.5555\/3181275"},{"key":"e_1_3_2_1_11_1","unstructured":"Directive (EU) 2016\/1148 of the European Parliament and of the Council of 6 July 2016 concerning measures for a high common level of security of network and information systems across the Union. 2016 p. 1. [Online]. Available: http:\/\/data.europa.eu\/eli\/dir\/2016\/1148\/oj"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jestch.2019.01.006"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jii.2017.04.005"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-57870-5"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-58409-6_38"},{"key":"e_1_3_2_1_16_1","volume-title":"Risks of industrie 4.0 - An information technology perspective","author":"Usl\u00e4nder T.","year":"2016","unstructured":"T. Usl\u00e4nder and C. Thomalla, \u201cRisks of industrie 4.0 - An information technology perspective,\u201d 2016."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jii.2017.04.005"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1016\/B978-1-59749-645-2.00024-0"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1016\/C2016-0-02116-2"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.compind.2018.04.015"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.14743\/apem2019.2.318"},{"volume-title":"InTech","author":"Lydon B.","key":"e_1_3_2_1_22_1","unstructured":"B. Lydon, \u201cRAMI 4.0 reference architectural model for Industrie 4.0,\u201d InTech, vol. 66, no. 2, 2019."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijcip.2016.10.001"},{"key":"e_1_3_2_1_24_1","unstructured":"Council Directive 2008\/114\/EC of 8 December 2008 on the identification and designation of European critical infrastructures and the assessment of the need to improve their protection. 2008 p. 75. [Online]. Available: http:\/\/data.europa.eu\/eli\/dir\/2008\/114\/oj"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.35940\/ijrte.B1523.0982S1119"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jclepro.2021.126427"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/IEEM44572.2019.8978859"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.promfg.2017.09.045"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.7251\/joce1901006m"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3038858"},{"key":"e_1_3_2_1_31_1","volume-title":"Analogue to Digital with Exchange 4.0","author":"Misra H.","year":"2022","unstructured":"H. Misra, \u201cAnalogue to Digital with Exchange 4.0.\u201d https:\/\/www.hedgethink.com\/analogue-digital-exchange-4-0\/ (accessed Mar. 12, 2022)."},{"key":"e_1_3_2_1_32_1","unstructured":"Regulation (EU) No 910\/2014 of the European Parliament and the Council of 23 July 2014 on electronic identification and trust services for electronic transactions in the internal market and repealing Directive 1999\/93\/EC. 2014 p. 73. [Online]. Available: http:\/\/data.europa.eu\/eli\/reg\/2014\/910\/oj"},{"key":"e_1_3_2_1_33_1","unstructured":"Directive (EU) 2015\/2366. 2015 p. 35. [Online]. Available: http:\/\/data.europa.eu\/eli\/dir\/2015\/2366\/oj"},{"key":"e_1_3_2_1_34_1","unstructured":"Regulation (EU) 2016\/679. 2016 p. 1. [Online]. Available: http:\/\/data.europa.eu\/eli\/reg\/2016\/679\/oj"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1365\/s43439-022-00048-9"},{"key":"e_1_3_2_1_36_1","volume-title":"Industry 4.0 cybersecurity: Challanges & Recommendations","author":"ENISA","year":"2019","unstructured":"ENISA, \u201cIndustry 4.0 cybersecurity: Challanges & Recommendations,\u201d 2019."},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1365\/s43439-020-00008-1"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.5772\/intechopen.70446"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1109\/37.969131"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-8348-9363-5_4"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijinfomgt.2020.102242"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1108\/09574090910954873"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1057\/s41284-019-00194-6"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.35467\/sdq"},{"key":"e_1_3_2_1_45_1","volume-title":"X-Force Threat Intelligence Index 2022","author":"IBM","year":"2022","unstructured":"IBM, \u201cX-Force Threat Intelligence Index 2022,\u201d Feb. 2022. https:\/\/www.ibm.com\/downloads\/cas\/ADLMYLAZ (accessed Mar. 12, 2022)."},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1109\/CANDO-EPE51100.2020.9337751"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1016\/B978-0-12-802122-4.00006-7"},{"key":"e_1_3_2_1_48_1","volume-title":"Feb. 26, 2013. https:\/\/docs.broadcom.com\/doc\/stuxnet-missing-link-13-en (accessed","author":"McDonald G.","year":"2022","unstructured":"G. McDonald, L. O. Murchu, S. Doherty, and E. Chien, \u201cStuxnet 0.5: The Missing Link,\u201d Feb. 26, 2013. https:\/\/docs.broadcom.com\/doc\/stuxnet-missing-link-13-en (accessed Mar. 13, 2022)."},{"key":"e_1_3_2_1_49_1","volume-title":"Global Energy Cyberattacks: \u2018Night Dragon,\u2019","author":"Services M. F. P.","year":"2011","unstructured":"M. F. P. Services and M. Labs, \u201cGlobal Energy Cyberattacks: \u2018Night Dragon,\u2019\u201d 2011. https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2011\/02\/McAfee_NightDragon_wp_draft_to_customersv1-1.pdf (accessed Oct. 02, 2019)."},{"key":"e_1_3_2_1_50_1","volume-title":"ComputerWeekly.com","author":"Ashford W.","year":"2011","unstructured":"W. Ashford, \u201cExxon, Shell, BP hacked in Night Dragon attacks,\u201d ComputerWeekly.com, 2011."},{"key":"e_1_3_2_1_51_1","volume-title":"Emerging Threat: Dragonfly \/ Energetic Bear \u2013 APT Group","author":"Symantec","year":"2013","unstructured":"Symantec, \u201cEmerging Threat: Dragonfly \/ Energetic Bear \u2013 APT Group,\u201d 2013. https:\/\/www.symantec.com\/connect\/blogs\/emerging-threat-dragonfly-energetic-bear-apt-group (accessed Oct. 03, 2019)."},{"volume-title":"Analysis of the Cyber Attack on the Ukrainian Power Grid","year":"2016","key":"e_1_3_2_1_52_1","unstructured":"E-ISAC, \u201cAnalysis of the Cyber Attack on the Ukrainian Power Grid,\u201d 2016."},{"key":"e_1_3_2_1_53_1","article-title":"Cyber Security of Nuclear Power Plants: US and Global Perspectives","author":"Pickering S. Y.","year":"2021","unstructured":"S. Y. Pickering and P. B. Davies, \u201cCyber Security of Nuclear Power Plants: US and Global Perspectives,\u201d Georgetown Journal of International Affairs, Jan. 22, 2021. https:\/\/gjia.georgetown.edu\/2021\/01\/22\/cyber-security-of-nuclear-power-plants-us-and-global-perspectives\/ (accessed Jun. 01, 2022).","journal-title":"Georgetown Journal of International Affairs"},{"key":"e_1_3_2_1_54_1","volume-title":"E&T.","author":"Newman N.","year":"2019","unstructured":"N. Newman, \u201cCyber pirates terrorising the high seas,\u201d E&T., Apr. 18, 2019."},{"key":"e_1_3_2_1_55_1","volume-title":"WannaCry Ransomware Outburst","author":"ENISA","year":"2017","unstructured":"ENISA, \u201cWannaCry Ransomware Outburst,\u201d 2017. https:\/\/www.enisa.europa.eu\/publications\/info-notes\/wannacry-ransomware-outburst (accessed Oct. 03, 2019)."},{"key":"e_1_3_2_1_56_1","volume-title":"Investigation: WannaCry cyber attack and the NHS","author":"Office N. A.","year":"2017","unstructured":"N. A. Office, \u201cInvestigation: WannaCry cyber attack and the NHS,\u201d 2017. https:\/\/www.nao.org.uk\/wp-content\/uploads\/2017\/10\/Investigation-WannaCry-cyber-attack-and-the-NHS.pdf (accessed Mar. 15, 2019)."},{"volume-title":"First death reported following a ransomware attack on a German hospital","year":"2020","key":"e_1_3_2_1_57_1","unstructured":"ZDNet, \u201cFirst death reported following a ransomware attack on a German hospital,\u201d Sep. 17, 2020."},{"key":"e_1_3_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.religion.2008.12.001"},{"key":"e_1_3_2_1_59_1","first-page":"2019","volume-title":"Accessed July","volume":"29","author":"Waldrappteam","year":"2018","unstructured":"Waldrappteam, \u201cIMPEL Water Crimes Workshop,\u201d Accessed July, vol. 29, p. 2019, 2018, [Online]. Available: http:\/\/waldrapp.eu\/science\/conference-crete-2018\/wp-content\/uploads\/2018\/11\/2018-Water-Crimes-Workshop-Report.pdf"}],"event":{"name":"CEEeGov '22: Central and Eastern European eDem and eGov Days","acronym":"CEEeGov '22","location":"Budapest Hungary"},"container-title":["Proceedings of the Central and Eastern European eDem and eGov Days"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3551504.3551546","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3551504.3551546","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T19:00:25Z","timestamp":1750186825000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3551504.3551546"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,9,22]]},"references-count":59,"alternative-id":["10.1145\/3551504.3551546","10.1145\/3551504"],"URL":"https:\/\/doi.org\/10.1145\/3551504.3551546","relation":{},"subject":[],"published":{"date-parts":[[2022,9,22]]},"assertion":[{"value":"2022-10-25","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}