Safety

Leveraging Data Treasures, Protecting Data Privacy

Leveraging Data Treasures, Protecting Data Privacy

Adding value with secure AI solutions
Detlef Houdeau
Artificial Intelligence (AI) can make a major contribution to the future viability of our economy and society—whether by improving existing processes or new products and services that promise greater efficiency, more robust structures and more climate protection. At present, however, SMEs in particular are still reluctant to use AI systems. The frequently cited reason is that data protection hurdles appear to be too high. This article discusses the opportunities of data-based value creation. The central question is how AI applications in industry can generate economic added value from data while maintaining data protection and security.
Industrie 4.0 Management | Volume 39 | 2023 | Edition 3 | Pages 24-27
Optimization Effects of IT Security Certifications

Optimization Effects of IT Security Certifications

Balancing the costs and benefits of optimization strategies in current IT audit schemes
Brian Niehöfer, Alexander Lawall ORCID Icon
The number of successful cyber attacks on industrial manufacturing is constantly increasing due to the growth of digitalization and networking. IT security certifications are an effective means against these attacks and at the same time create confidence in and comparability of IT security about production and IT products. This article compares certification standards such as ISO/IEC 15408 - Common Criteria (CC) and specific standards for mobile communications (including NESAS CCS-GI), of GSM Association (GSMA) and 3rd Generation Partnership Project (3GPP), for testing depth and efficiency. (Only in German)
Industrie 4.0 Management | Volume 39 | 2023 | Edition 3 | Pages 6-9
Privacy and Surveillance in the Digitalized Society

Privacy and Surveillance in the Digitalized Society

A (cyber-)ethical challenge
Matthias Schmidt
The concepts of public and private play a special role in connection with the digitalized society and thus with the ethical requirements that such a society places on cybersecurity. This is because the digitalization of society is shifting the boundaries between what can be described as public and private. Consequently, the relationship between freedom and surveillance is being put to the test. It is a question of (cyber-)ethics how far privacy should be restricted in favor of surveillance and security. (Only in German)
Industrie 4.0 Management | Volume 39 | 2023 | Edition 3 | Pages 10-13
“Every Company is Vulnerable and Needs to Protect Itself Appropriately”

"Every Company is Vulnerable and Needs to Protect Itself Appropriately"

Interview with Hans-Peter Bauer, BlackBerry
Manufacturing companies of all sizes have been a popular target for hackers and cyber criminals for years - and the trend is rising. In addition to security gaps in the IT systems, OT systems, i.e. operational technology, are increasingly being targeted by attackers in the course of digitalisation and networking. The consequence: companies should secure themselves as quickly as possible. Hans-Peter Bauer, Senior Vice President Cyber EMEA at BlackBerry, explains how this is possible. (Only in German)
Industrie 4.0 Management | Volume 39 | 2023 | Edition 3 | Pages 52-54
Crowd Management Considering Pandemic Security

Crowd Management Considering Pandemic Security

Rahmenkonzept für einen sicheren Messebetrieb unter Berücksichtigung von geeigneten Abständen und Routenplanung
Ann-Kathrin Rohde, Birte Pupkes, Michael Lütjen ORCID Icon, Rafael Mortensen Ernits, Dennis Keiser, Michael Freitag ORCID Icon
The COVID-19 pandemic has highlighted the additional challenges that events face in terms of appropriate crowd management. This paper is dedicated analyzing these challenges and existing approaches for the safe operation of events during pandemics. Based on this, an innovative framework is presented that uses intelligent crowd analysis and is applicable to an environment with volatile groups. In addition, the specifiv use case of trade fair events is considered in this framework.
Industrie 4.0 Management | Volume 38 | 2022 | Edition 4 | Pages 48-52
IT Security in Enterprises

IT Security in Enterprises

A methodology for classification using a maturity grade model
Gerrit Sames
There is hardly any day without publishing news on digitization and industry 4.0 and their respective necessity. Risks and shortcomings of IT-security are as well current topics. The striking question on management level is, where is my company regarding IT-security? How can we get a guiding light into the complexity of all related terms? This article is an outcome of research activities at the University of Applied Sciences Middlehesse. It is meant to support management to identify the actual status of IT-security and identify possible shortfalls. Based on a maturity grade model IT-security is described by six aspects with five levels each. This will help to point out room for improvements
Industrie 4.0 Management | Volume 37 | 2021 | Edition 5 | Pages 61-63
SecurPharm – Securing of the Pharmaceutical Supply Chain

SecurPharm - Securing of the Pharmaceutical Supply Chain

Chantal Mause, Rahel Kröhnert, Dieter Uckelmann ORCID Icon
In developing countries approx. 10 % of all medicines are falsified. The securPharm system in Germany prevents this high level of counterfeiting. It allows to identify and stop counterfeit drugs along the supply chain. The identification works via a data storage and polling system on supranational level. Based on system difficulties, pharmacies do not accept the system fully. Besides online pharmacies are an issue because they are not as much secured as the stationary distributors. Subsequently a comparison of the European and the US system shows their equality in most of the elements.
Industrie 4.0 Management | Volume 37 | 2021 | Edition 2 | Pages 44-47 | DOI 10.30844/I40M_21-2_S44-47
Influence of Industry 4.0 on Competence and Role Profiles

Influence of Industry 4.0 on Competence and Role Profiles

Disruption of Job Descriptions Due to the Increased Need for IT Skills in the Manufacturing Sector
Christin Schumacher, Hendrik Lager, Philipp Regelmann, Jan Winkels, Julian Graefenstein
In a previous approach of Lager et al. [1], the development of knowledge, competence and role profiles of employee groups in the course of industry 4.0 was studied. Based on that, the role of the overlapping focus IT is to be examined more closely and the analysis is extended to the tactical level using the example of production planning. In addition, the effects of the need for increased IT competence in all areas of the manufacturing industry on the erosion of current role profile boundaries are presented.
Industrie 4.0 Management | Volume 35 | 2019 | Edition 2 | Pages 31-34
Security in the Industrial Internet of Things (IIoT): Challenges and Concepts

Security in the Industrial Internet of Things (IIoT): Challenges and Concepts

Herausforderungen und Konzepte
Uwe Laufs, Sven Wagner
The Industrial Internet of Things (IIoT) offers a multitude of opportunities in a wide variety of applications. Similar to the IoT, the high degree of distribution, the heterogeneity, size and dynamics of the network pose new challenges to the security of such systems. A pivot for security in IIoT is trusted identities of the participating subsystems. Common IT security approaches are often too costly and inflexible. Furthermore, mechanisms to disseminate trusted information and to ensure the authenticity of data and transactions are often required. The article describes concepts for dealing with these challenges and outlines suitable solutions as well as approaches from current research for the special features in the IIoT.
Industrie 4.0 Management | Volume 34 | 2018 | Edition 3 | Pages 51-54
Securing IT-Risks in a Production Environment

Securing IT-Risks in a Production Environment

an Integrated Approach for Information and Operational Technology
Christof Thim
The IT-risks which factory infrastructures are exposed to, require a common view of IT-security and operational technology (OT) protection. In this context, the measures from office IT can only be transferred to the production area and production control to a limited extent. The requirements and protection goals for the equipment used and the networking between these components are too different. An integrated approach and continuous management of IT security helps to identify and implement targeted measures in a concerted manner.
Industrie 4.0 Management | Volume 34 | 2018 | Edition 1 | Pages 11-14
1 2 3