A Scoping Review for Cybersecurity in the Construction Industry

被引:8
作者
Pargoo, Navid Salami [1 ]
Ilbeigi, Mohammad [1 ]
机构
[1] Stevens Inst Technol, Dept Civil Environm & Ocean Engn, Hoboken, NJ 07030 USA
关键词
Cybersecurity; Construction; Scoping review; Preferred reporting items for systematic reviews and meta-analysis extension for scoping review (PRISMA-ScR); INTRUSION DETECTION; CYBER SECURITY; AUTOMATION; BLOCKCHAIN; CONTEXT; SYSTEM;
D O I
10.1061/JMENEA.MEENG-5034
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
The 4th industrial revolution and its inherent digitalization are changing every aspect of the construction industry. However, these technological transformations bring new challenges, including cybersecurity. Although a number of studies in recent years have aimed to analyze cybersecurity issues in the construction sector, further research investment in this area is vital. The first step towards identifying needed and promising research directions in this domain is to systematically analyze the existing body of knowledge and detect knowledge gaps. This study addresses this need through a systematic scoping review designed based on the Preferred Reporting Items for Systematic Reviews and Meta-Analysis extension for Scoping Review (PRISMA-ScR). To synthesize the existing knowledge, the extracted information is mapped with multiple benchmarks, including the National Institute of Standards and Technology (NIST) framework for cybersecurity management. The outcomes of the scoping review indicated that, from the construction perspective, the existing literature mainly focuses on a few areas, including Building Information Modeling (BIM), while other digital systems such as construction robots and prefabrication platforms need to be considered in future works. In terms of cybersecurity management, most of the existing studies focus on identifying risks and protecting assets. Other aspects of cybersecurity management, including detecting intrusions, responding to threats, and recovering from cyber-attacks need to be addressed in future studies. Regarding the technology-mediated countermeasures, the existing studies have explored only a limited number of potential solutions with a considerable focus on Blockchain-based systems, while the application of other countermeasures such as network virtualization can be a basis for future studies. Finally, the existing studies focused on procedural guidelines lack systematic solutions for areas including integrated cyber risk management and organizational change.
引用
收藏
页数:13
相关论文
共 50 条
  • [41] Machine Learning and Deep Learning Approaches for CyberSecurity: A Review
    Halbouni, Asmaa
    Gunawan, Teddy Surya
    Habaebi, Mohamed Hadi
    Halbouni, Murad
    Kartiwi, Mira
    Ahmad, Robiah
    IEEE ACCESS, 2022, 10 : 19572 - 19585
  • [42] Cybersecurity in the food and beverage industry: A reference framework
    Latino, Maria Elena
    Menegoli, Marta
    COMPUTERS IN INDUSTRY, 2022, 141
  • [43] Cybersecurity knowledge graphs construction and quality assessment
    Hongyi Li
    Ze Shi
    Chengwei Pan
    Di Zhao
    Nan Sun
    Complex & Intelligent Systems, 2024, 10 : 1201 - 1217
  • [44] AI in IIoT Management of Cybersecurity for Industry 4.0 and Industry 5.0 Purposes
    Czeczot, Grzegorz
    Rojek, Izabela
    Mikolajewski, Dariusz
    Sangho, Belco
    ELECTRONICS, 2023, 12 (18)
  • [45] Cybersecurity knowledge graphs construction and quality assessment
    Li, Hongyi
    Shi, Ze
    Pan, Chengwei
    Zhao, Di
    Sun, Nan
    COMPLEX & INTELLIGENT SYSTEMS, 2024, 10 (01) : 1201 - 1217
  • [46] Cybersecurity in Aviation : An Intrinsic Review
    Kagalwalla, Navid
    Churi, Prathamesh P.
    2019 5TH INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION, CONTROL AND AUTOMATION (ICCUBEA), 2019,
  • [47] A Review on Cybersecurity Law and Management
    Gaur, Kuntal
    Chakraborty, Roshmeet
    Khemani, Gulshan
    Sharma, Khushi
    Jangid, Mohit
    FOURTH CONGRESS ON INTELLIGENT SYSTEMS, VOL 3, CIS 2023, 2024, 865 : 341 - 353
  • [48] Information Sharing in Cybersecurity: A Review
    Pala, Ali
    Zhuang, Jun
    DECISION ANALYSIS, 2019, 16 (03) : 172 - 196
  • [49] Solutions for Mitigating Cybersecurity Risks Caused by Legacy Software in Medical Devices: A Scoping Review
    Tervoort, Tom
    De Oliveira, Marcela Tuler
    Pieters, Wolter
    Van Gelder, Pieter
    Olabarriaga, Silvia Delgado
    Marquering, Henk
    IEEE ACCESS, 2020, 8 : 84352 - 84361
  • [50] Use Case Based Blended Teaching of IIoT Cybersecurity in the Industry 4.0 Era
    Fernandez-Carames, Tiago M.
    Fraga-Lamas, Paula
    APPLIED SCIENCES-BASEL, 2020, 10 (16):