Skip to main content

Cybersecurity in Digital Transformation

  • Chapter
  • First Online:
Guide to Cybersecurity in Digital Transformation

Part of the book series: Advances in Information Security ((ADIS,volume 103 ))

Abstract

Digital transformation is a global phenomenon, capturing the attention in every industry and spurring major investment. However, digital transformation is not a single objective; it is a multifaceted approach depending on the goals of the respective industry and digital maturity. Thus, digital transformation is the way of change from a monolithic business approach to fully digitized business concepts. Therefore, Chap. 1 introduces us to relevant definitions on digital transformation and their main technological background. One major concern in digital transformation is the confluence of emerging technologies such as Artificial Intelligence, Big Data and Analytics, Blockchain, Cloud Computing and Services, Internet of Things and Industrial Internet of Things, and others. In this regard, Cloud Computing and Services achieve a new generation of Artificial Intelligence, applied in an increasing number of industrial applications with unprecedented results. Besides this, the Internet of Things connects industrial devices and entities within industrial value chains and infrastructure, however, generating terabytes of data every day, which requires Big Data and Analytics to deal with them. Therefore, the digital transformation has a huge impact on industrial control systems and processes, as well as on the Key Performance Indicator (KPI). Moreover, emerging technologies also will have a huge impact on the realization of circular economy in the industrial sectors, a paradigm in today’s digital transformation in industrial, public, and private discussion to reduce the greenhouse effect. Against this background, digital transformation has received a great attention in all industrial, public, and private organizations, which will be fundamentally changing operational business approaches in all sectors. Hence, the transformation of organizations through digitization and emerging technologies can be referred to as a technological wave, such as the third and now the fourth industrial transformation. In this context, the fourth industrial transformation optimizes computerization of the third through digitization, wireless infrastructure networks, intelligent algorithms, and others, which today is known as digital transformation paradigm. Thus, digitization and technologies in digital transformation create, and consequently change, market offerings, business processes, or business models, which result from the use of both. However, the intrinsic complexity of digital transformation also makes cybersecurity awareness a sine qua non. Cybersecurity deals with the presence of cyber attackers with their cybercriminal attack repertoire. Cybercrime causes $ 100 billion and more in damage annually, which means cybercriminal attack prevention has a clear need to address it. However, cybersecurity spans many areas, including, but not limited to, data security, information security, operational security, and others. Moreover, cybersecurity is fundamental to both protecting secret data and information and enabling their defense. Therefore, cybersecurity is understood as a body of knowledge with regard to technologies, processes, and practices designed to protect computer systems, networks, infrastructure resources, and others, from cyber-criminal attacks, damage, manipulation, or unauthorized access. In this context, Chap. 1 introduce in Sect. 1.1 into the manifold aspects of digital transformation with their great impact on industrial, public, and private organizations development, enhancing their business success. Section 1.2 focusses on emerging technologies required and used in digital transformation, presented in twenty Subsections. Against this background, Section 1.3 discusses the challenges of digital transformation in industrial businesses, while Sect. 1.4 introduces applications in digital transformation. Section 1.5 answers the question how to become a leader in digital transformation. Section 1.6 introduces the topic cybersecurity, taking into account knowledge about the interaction of digitization and emerging technologies to gain knowledge about cybersecurity risks through threat event attacks. In this sense, Section 1.6 also focusses on the CIA Triad and the actionable knowledge in cybersecurity that is still paramount. Finally, Section 1.7 describes the challenges of digital transformation to build up a circular economy. Section 1.8 contains comprehensive questions from the topics digital transformation, cybersecurity, and circular economy, followed by references for further reading section.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

eBook
USD 16.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 64.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 89.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Hess, T., Benlian, C., Wiesbck, F.: Options for Formulating a Digital Transformation Strategy. In: MIS Q. Exec., Vol. 15, No. 2, pp. 123139, 2016

    Google Scholar 

  2. Nadkarni, S. Prügl, R.: Digital Transformation: A Review, Synthesis and Opportunities for future Research. In: Management Review Quarterly, Vol. 71, pp. 233–341, 2021

    Google Scholar 

  3. Verhof, P.C., Broekhuizena, T., Barth, Y., Battachayaa, A., Donga, J.Q., Fabiana, N., Haenleine, M.: Digital Transformation: A Multidisciplinary Reflection and Research Agenda. In: Journal of Business Research, Vol. 122, pp. 889–901. 2021

    Google Scholar 

  4. Möller, D.P.F.: Cybersecurity in Digital Transformation: Scope and Applications. Springer Nature 2020

    Google Scholar 

  5. Vial, G.: Understanding Digital Transformation: A Review and Research Agenda. In: The Journal of Strategic Information Systems, Vol. 28, No 2, pp. 118–144. 2019

    Google Scholar 

  6. Matt, C., Hess, T., Benlian, A.: Digital Transformation Strategies. In: Bus. Inf. Syst. Eng. Vol. 57, pp. 339–349, 2015

    Google Scholar 

  7. Yoo, Y., Boland, R.J., Lyytinen, K., Maichrzak, A.: Organizing for Innovation in the Digitized World. In: Organization Sciencs, Vol. 23, No 5, pp. 1398–1408, 2012

    Google Scholar 

  8. Lasi, H., Fettke, P., Kemper, H.-G., Feld, T., Hoffmann,, M.: Industry 4.0. In: Business and Information Systems Engineering, Vol. 6, No. 4, pp. 239–242. 2014

    Google Scholar 

  9. Möller, D.P.F.: Guide to Computing Fundamentals in Cyber-Physical Systems: Concepts, Design Methods, and Applications. Springer International Publisher, 2016

    Book  Google Scholar 

  10. Hund, A., Wagner, H.-T., Beimborn, D., Weitzel, T.: Digital Innovation: Review and Novel Perspective. In: Journal of Strategic Information Systems. Vol. 30, No. 4, 101695, 2021

    Google Scholar 

  11. Nambisan, S., Wright, M., Feldman, M.: The Digital Transformation of Innovation and Entrepreneurship: Progress, Challenges and Key Themes. In: MIS Quarterly, Vol. 41, No.1, pp. 223–238, 2017

    Google Scholar 

  12. Fichman, R.G., Santos, B.I., Zheng, Z.E.: Digital Innovations as a Fundamental and Powerful Concept in the Interformation System Curriculum. MIS Quaterly, Vol. 38, No 2, pp. 329–343, 2014

    Google Scholar 

  13. Li, L., Su, F., Wei, H., Zheng, W., Mao, J.Y.: Digital Transformation by SME Entrepreneurs: A Capability Perspective. In: Special Issue Paper, Wiley and Sons Publ., 2017

    Google Scholar 

  14. Lazzazzara, A., Ricardi, F., Za, S.: Exploiting Digital Ecosystems: Organizational and Human Challenges, Springer Nature, 2020

    Book  Google Scholar 

  15. Chanias, S., Hess, T.: Understanding Digital Transformation Strategy: Insights from Europe’s Automotive Industry. In: PACIS Proceedings, 2016. https://aisel.aisnet.org/pacs2016/29 (Accessed 12.2022)

  16. Bharadwaj, N., Noble, C.: Finding Innovations in Data Ricj Environments. In: Journal in Production Innovation Management, Vol. 34, No.5, pp. 560–564, 2017

    Google Scholar 

  17. Grassmann, O., Sutter, P.: Digital Transformation (in German). Hanser Publ. 2013

    Google Scholar 

  18. Remane, G., Hildebrandt, B., Hanelt, A., Kolbe, L.M.: Discovering New Digital Business Model Types: A Study of Technology Start Ups from the Mobility Sector. In: PACIS 2016. Proceedings provides by AIS Electronic Library 2016

    Google Scholar 

  19. Möller, D.P.F., Haas, R.E.: Guide to Automotive Connectivity and Cybersecurity – Trends, Technologies, Innovations, Applications. Springer Nature, 2019

    Book  Google Scholar 

  20. https://en.wikipedia.org/wiki/Enabling_technology. (Accessed 12.2022)

  21. Grabovia, M., Peezer, D., Popic, S., Knezevic, V.: Providing Security Measures of Enabling Technologies in Industrial Internet of Things – A Survey. In: ZINC Proceed., pp. 28–31, 2016

    Google Scholar 

  22. Lou, D.: AI made from a sheet of Glas can recognize numbers just by looking. In: New Sientist Techology, July, 8. 2019

    Google Scholar 

  23. Cartwright, J.: Glass that will store your info forever. In: New Scientist Technology, October, 8. 2014

    Google Scholar 

  24. Adee, S.: Heat scavengers promise heat bonanza. In: New Scientist Technology, October,8, 2014

    Google Scholar 

  25. Manyika, J., Chui, M., Bisson, P., Woetzel, J., Dobbs, R., Bughin, J., Aharon D.: The Internet of Things: Mapping the Values beyond the Hype.IcKinsey Global Institute Report, 2015

    Google Scholar 

  26. Paschek, D., Fraghici, C.T., Draghici, A.: Automated Business Process Management: In Time of Digital Transformation using Machine Learning or Artificial Intelligence. In: MATEC Web of Conferences, 121, 04007, 2017. https://doi.org/10.1051/mateconf/20171210. (Accessed 12.2022)

  27. https://bulitin.com/artificial-intelligence,2020. (Accessed 12.2022)

  28. Haleem, A., Javaid, M.: Additive Manufacturing Applications in Industry 4.0: A review. In: Journal of Industrial Integration and Management, Vol.4, No.4, World Scientific Computing, 2019

    Google Scholar 

  29. Beyca, O.F., Hancerliogullari, G., Yazicio, I.: Additive Manufacturing and Applications. In: Ustundag, A., Cevikcan, E. (Eds.): Industry 4.0: Managing the Digital Transformation, pp. 216–234, 2018

    Google Scholar 

  30. Esengün, M., Ince, G.: The Role aof Augmented Reality in the Age of Industry 4.0. In: Ustundag, A., Cevikcan, E. (Eds.): Industry 4.0: Managing the Digital Transformation, pp. 210–215, 2018

    Google Scholar 

  31. Salkin, C., Oner, M., Ustundag, A., Cevekcan, E.: A conceptual Framework for Industry 4.0. In: Ustundag, A., Cevikcan, E. (Eds.): Industry 4.0: Managing the Digital Transformation, pp. 3–23, 2018

    Google Scholar 

  32. Wang, S., Wan, J., Zhang, D., Li, D., Zhang, C.: Towards Smart Factory for Industry 4.0: A Self-Organized Multi-Agent System with Big Data based Feedback and Coordination. In: Computer Networks, pp. 1–11, 2016

    Google Scholar 

  33. https://aethon.com/mobile-robots-and-industry4-0. (Accessed 12.2022)

  34. Fitzgerald, J., Quasney, E.: Using Autonomous Robots in Drive Supply Chain Innovation: Future Trends in Supply Chain. Deloitte Research Report, 2021

    Google Scholar 

  35. Möller, D.P.F., Vakilzadian, H., Haas, R.E.: From Industry 4.0 Towards Industry 5.0. In: Proceedings IEEE-EIT International Conference on Electro-Information Technology (EIT), pp. 61–68, 2022

    Google Scholar 

  36. Carayannis, E.G., Dezi, L., Gregort, G., Calo, E.: Smart Environment and Techno-Centric and Human Centric Innovation for Industry and Society 5.0: A Quintuple Helix Innovation System View Towards Smart Sustainable and Inclusive Solutions. In: Journal of the Knowledge Economy, Vol. 13, No. 2, pp. 926–955, 2022

    Google Scholar 

  37. Loshin, D.: Big Data Analytics: From Strategic Planning to Enterprise Integration with Tools, Techniques, NoSQL and Graph. Morgan Kaufman Publ. 2013

    Google Scholar 

  38. Househ, M.S., Kushnirak, A.D., Borycki, E.M. (Eds.): Big Dat, Big Challenges: A Healthcare Perspective. Springer International Publ. 2019

    Google Scholar 

  39. Morabito, A.: Big Data and Analytics: Strategic and Organizational Impact. Springer International Publ. 2016

    Google Scholar 

  40. D’Onofrio, S., Meier, A. (Eds.): Big Data Analytics: Basics, Case Studies and Potential Uses. Springer International Publ. 2021

    Google Scholar 

  41. Raj, P., Raman, A., Nagaraj, D., Duggirata, S.: High-Performance Big Data Analytics. Springer International Publ. 2015

    Google Scholar 

  42. Sedkaoui, S.: Data Analytics and Big Data Analytics: Information systems, Web and Pervasive Computing. Wiley & Sons Publ. 2018

    Book  Google Scholar 

  43. Lee, J., Kao, H.-A., Yang, S.: Service Innovation and Smart Analytics for Industry 4.0 and Big Data Environment. In: Proceedings 6th CIRP Conference on Industrial Product Service Systems, pp. 3–8. 2014

    Google Scholar 

  44. Jain, K.H.: Big Data andH adoop. Khanna Book Publ. 2017

    Google Scholar 

  45. https://gist.github.com/alexalemi/2151722 (Accessed 12.2022)

  46. Hair, J.F., Hult, G.T.M., Ringle, C.M., Sarstedt, M.A.: A Primer on Partial Least Squares Structural Equations Modeling, 2nd Edition. Sage Publ. 2017

    Google Scholar 

  47. Al-Jacobi, J., Mohamed N.: Industrial Applications of Blockchain. In: 9th IEEE Annual Computing and Communication Workshop and Conference (CCWC), pp. 550–555, 2019

    Google Scholar 

  48. Khanaghal, S., Ansari, S., Paaroutis, S., Oviedo, L.: Mutualism and the Dynamics of New Platform Creation: A Study of Cisco and Fog Computing. In: Strategic Management Journal, Vol. 43, pp. 476–506, 2021

    Google Scholar 

  49. Shi, W., Cao, J., Zhang, Q., Li, Y., Xu, L.: Edge Computing: Vision and Challenges. In: IEEE Internet of Things Journal, Vol. 3, No. 5, pp. 637–646, 2016

    Google Scholar 

  50. Shi, W., Dustdar, S.: The Promise of Edge Computing. In: Computer Vol. 49, No.5, pp. 78–81, 2016

    Google Scholar 

  51. Chaouki, H. (Ed.): The internet of Things: Connecting Objects to the Web.

    Google Scholar 

  52. Geng, H.: Internet of Things and Data Analytics Handbook. Wiley & Sons Publ. 2016

    Google Scholar 

  53. Jeschke, S., Breecher, C., Song, H., Rawat, D.B. (Eds.): Industrial Internat of Things: Cybermanufacturing Systems. Springer International Publ. 2017

    Google Scholar 

  54. Murphy, K.P.: Machine Learning: A Probabilistic Perspective, MIT Press, 2012

    MATH  Google Scholar 

  55. Manoj, K.S.: Industrial Automation with SCADA: Concepts, Communication and Security. Notion Press, 2019

    Google Scholar 

  56. https://www.verveindustrial.com/resources/ot-systems-management-whitepaper-thank-you-page/?submissionGuid=8cf40fb0-d10f-4d70-be9b-f191a5525826 (Accessed 12.2022)

  57. Rouskas, G.N.: Network Virtualization: A Tutorial. North Carolina State University, 2012

    Google Scholar 

  58. Han, B., Gopalkrishnan, V., Ji, L., Lee, S.: Network Function Virtualization: Challenges and Opportunities for Innovations. In: IEEE Coomunication Magazine, pp. 90–97, 2015

    Google Scholar 

  59. Moeller, D.P.F.: Mathematical and Computational Modeling and Simulation: Fundamentals and Case Studies. Springer Publ., 2004

    Book  MATH  Google Scholar 

  60. Grieves, M., Vickers, J.: Digital Twin: Mitigating Unpredictable, Undesirable Emergent Behavior in Complex Systems. 2015. https://research.fit.edu/media/sitespecific/researchfitedu/camid/documents/Origin-and-Types-of-the-Digital-Twin.pdf (Accessed 12.2022)

  61. Tao, F., Cheng, J., Qi, Q., Zhang, M., Zhang, H., Sui, F. : Digital twin-driven product design, manufacturing and service with big data. In: Int. J. Adv. Manuf. Technol. Spinger Publ. 2017

    Google Scholar 

  62. Parrot, A., Warshaw, L.: Industry 4.0 and the Digital Twin – Manufacturing meets its Match. In: Deloitte University Press 2017. https://www2.deloitte.com/insights/us/en/focus/industry-4-0/digital-twin-technology-smart-factory.html (Accessed 12.2022)

  63. Aziz, N.A., Mantora, T., Khaiduran, M.A., Mrushid, A.F.: Software Defined Network (SDN) and its Security Issues. In: Proceedings IEEE International Conference on Computing Engineering and design, pp. 40–45, 2018

    Google Scholar 

  64. Dargie, W., Poellabauer, C.: Fundamentals of Wireless Sensor Networks: Theory and Prctice. Wiley & Sons, 2010

    Book  Google Scholar 

  65. Wiczanowski, M., Boche, H., Stanczak, S.: Fubndamentals of Resouce Allocation in Wireless Networks: Theory and Algorithm. Springer International Publ. 2009

    Google Scholar 

  66. https://www.twéchtarget.com/searchnetworking/definition/6G (Accessed 12.2022)

    Google Scholar 

  67. Steiner, F., Grzymek, V.: Digital Souvereignty in the EI. In. Vision Europe. Bertelsmann Foundation, 2020

    Google Scholar 

  68. https://ec.europe.eu/info/sites/default/files/proposal-regulation-single-market-digital-sercice-digital-services-act_en.pdf (Accessed 12.2022)

  69. https://www.bmwi.de/Redaktion/DE/Publikationen/Digitale-Welt/das-project-gaia-x.html

  70. https://www.bcg.com/capabilities/digital-technology-data/digital-transformation/overview?utm_source=search&utm_medium=cpc&utm_campaign=digital&utm_description=none&utm_topic=digital_transformation&utm_geo=global&utm_content=digital_transformation_consulting&gclid=CjwKCAjwyaWZBhBGEiwACslQo05Hr3pj0crkCMN2t8vw-zX86js_q6s_KcW-aM8VYlC7E3lsDNWtdxoC6v8QAvD_BwE (Accessed 12.2022)

  71. Kumar, V., Rezaei, J., Akhberdina, V., Kuzmin, E. (Eds.): Digital Transformation in Industry –Trends, Management, Strategies.Springer Internat. Publ. 2021

    Google Scholar 

  72. https://static.sw.cdn.siemens.com/siemens-disw-assets/public/cTs1Jfi7pjGr2y2E53ge2/en-US/LifecycleInsights_Report-ROIofDigitalTransformation.pdf (Accessed 12.2022)

  73. https://terakeet.com/blog/digital-transformation-examples/ (Accessed 12.2022)

  74. Dahlström, P., Desmet, D., Singer, M.: The Seven Decisons that Matter in a Digital Transformation: A CEO Guide to RE-Invention. In: Digital McKinsey Report, 2017

    Google Scholar 

  75. Holten, A.L., Brenner, S.O.: Leadership Style and the Process of Organizational Change. In Journal of Leadership and Organization Development, Vol. 36, No. 1, pp. 2–16, 2015

    Google Scholar 

  76. Schellinger, J., Tokarski, K.O., Kissling-Näf, I.: In: From Digital Transformation to Digital Corporate Managemen (Iín German). In: Digital Transformation and Corporate Management, Schellinger J., Tokarski, K.O., Kissling-Näf, I. (Eds.), pp. 1–10, Springer-Gabler Publ. 2020

    Google Scholar 

  77. Sow, M., Aborbie, S.: Impact of Leadership on Digital Transformation. In. Business and Economic Research, Vol. 8, No. 3, pp. 139–148, 2018

    Google Scholar 

  78. https://www.fortinet.com/resources/cyberglossary/operational-security (Accessed 12.2022)

  79. https://securityscorecard.com/blog/how-ti-write-rthird-party-risk-management-policies-tprm-and-procedures (Accessed 12.2022)

  80. Negreiro, M.: ENISA and a new cybersecurity act, ERPS, European Parliament, 2019

    Google Scholar 

  81. Negreiro, M. The NIS2 Directive – A high common level of cybersecurity in the EU. Briefing EU Legislation in Progress, 2022

    Google Scholar 

  82. https://translate.google.com/?hl=de&sl=de&tl=en&text=Dies%20%20ist%20ein%20bedenklicher%20Zustand%20vor%20dem%20Hintergrund%20der%20verf%C3%BCgbarekeit%20immer%20ausgekl%C3%BCgelter%20Spionage%20softwrae&op=translate (Accessed 12.2022)

  83. Marczak, B., Scott-Railton, J., Razzak, B.A., Al-Jizawi, N., Anstis, S., Berdan, K., Deibert, R.: Pegasus vs. Predator: Dissident’s Doubly-Infected iPohnes Reveals Cytrox Mercenary Spyware. Citizen Lab Research Report No. 147, University of Toronto, December 2021.

    Google Scholar 

  84. Scott-Railton, J., Marczak, B., Razzak, B.A., Anstis, S., Herrero, P.N.-, Deibert, R.: New Pegasus Spyware Abuses Identified in Mexico. Citizen Lab Report No. 159, University of Toronto, October 2022.

    Google Scholar 

  85. Parsons, C.: Cybersecurity Will Not Thrive in Darkness: A Critical Analysis of Proposed Amendments in Bill C-26 to the Telecommunications Act, Citizen Lab Report No. 160, University of Toronto, October 2022

    Google Scholar 

  86. https://gizmodo.com/thanasis-koukakis-sues-intellexa-over-predator-spyware-1849625793 (Accessed 12.2022)

  87. https://www.nytimes.com/interactive/2022/12/08/us/politics/intellexa-commercial-proposal.html (Accessed 12.2022)

  88. Federal Cybersecurity Research and Development Strategic Plan. Executive Office of the President of the United States, 2019

    Google Scholar 

  89. Federal Cybersecurity Research and Development Strategic Plan. Executive Office of the President of the United States, 2016

    Google Scholar 

  90. Federal Cybersecurity R&D Strategic Plan Implementation Roadmap. Executive Office of the President of the United States, 2020

    Google Scholar 

  91. Baumgart, M., McDonough, W., Bollinger, A.: Cradle-to-Cradle Design: Creating Healthy Emissions: A Strategy for Eco-effective Product and System Design. Journal Clean Production, Vol. 15, pp. 1337–1348, 2007

    Article  Google Scholar 

  92. Bressanelli, G., Perona, M., Saccani, N.: Reshaping the Washing Machine Industry through Circular Economy and Product Service Business Models. In: Procedia CIRP, Vol. 64, pp. 43–48, 2017

    Google Scholar 

  93. Möller, D.P.F.: Design for Manufacturability. Lecture at HUAWEI International Expert Conference, Shenzhen, China, 2019

    Google Scholar 

  94. Stoll, H.W.: Design for Manufacturability. In: Simultaneous Engineering. Allen C.W. (Ed.), pp. 23–29, SME Press 1990

    Google Scholar 

  95. Möller, D.P.F.: Enhancement in Intelligent Manufacturing through Circular Economy. In. Proceedings IEEE International Conference on Electro-Information Technology (EIT), pp. 87–92, 2020

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

Copyright information

© 2023 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Möller, D.P.F. (2023). Cybersecurity in Digital Transformation. In: Guide to Cybersecurity in Digital Transformation. Advances in Information Security, vol 103 . Springer, Cham. https://doi.org/10.1007/978-3-031-26845-8_1

Download citation

  • DOI: https://doi.org/10.1007/978-3-031-26845-8_1

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-031-26844-1

  • Online ISBN: 978-3-031-26845-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics