Szczegóły publikacji
Opis bibliograficzny
Exploring information security in Industry 4.0 challenges, strategies and best practices: a literature review / Olga OKRZESIK // W: Proceedings of the 45th International Business Information Management Association Conference (IBIMA) [Dokument elektroniczny] : strategies, innovation, and human-centric practices in the modern organizations : 25-26 June 2025, Cordoba, Spain / ed. Khalid S. Soliman. — Wersja do Windows. — Dane tekstowe. — [USA] : International Business Information Management Association (IBIMA), cop. 2025. — (Proceedings of the... International Business Information Management Association Conference ; ISSN 2767-9640). — e-ISBN: 979-8-9867719-6-0. — S. 2205–2214. — Wymagania systemowe: Adobe Reader. — Tryb dostępu: https://s.agh.edu.pl/K9hpS [2025-08-26]. — Bibliogr. s. 2213–2214, Abstr. — Dostęp po zalogowaniu
Autor
Słowa kluczowe
Dane bibliometryczne
| ID BaDAP | 161705 |
|---|---|
| Data dodania do BaDAP | 2025-08-28 |
| Rok publikacji | 2025 |
| Typ publikacji | materiały konferencyjne (aut.) |
| Otwarty dostęp | |
| Konferencja | International Business Information Management 2025 |
| Czasopismo/seria | Proceedings of the... International Business Information Management Association Conference |
Abstract
The aim of the article is to analyze information security management in the context of Industry 4.0. Based on a literature review, theoretical models and case studies, key challenges related to the convergence of OT IT systems, the vulnerability of critical infrastructure and the role of SMEs are discussed. Threats were identified, allowing the development of effective protection strategies including Zero Trust policies, microsegmentation, SIEM systems, encryption, IAM, risk analysis procedures and training. Based on this, recommendations were made: for executives and regulators (support of SMEs, standards and mandatory incident reporting), while for practitioners (implementation of integrative approaches to security and an organizational culture based on continuous improvement). The article also identifies research gaps around OT Zero Trust - in the context of operational technologies, AI threat detection and training effectiveness.