Overview of Development of a Digital Platform for Building Critical Infrastructure Protection Systems in Smart Industries
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 32919
Overview of Development of a Digital Platform for Building Critical Infrastructure Protection Systems in Smart Industries

Authors: Bruno Vilić Belina, Ivan Župan


Smart industry concepts and digital transformation are very popular in many industries. They develop their own digital platforms, which have an important role in innovations and transactions. The main idea of smart industry digital platforms is central data collection, industrial data integration and data usage for smart applications and services. This paper presents the development of a digital platform for building critical infrastructure protection systems in smart industries. Different service contraction modalities in Service Level Agreements (SLAs), Customer Relationship Management (CRM) relations, trends and changes in business architectures (especially process business architecture) for the purpose of developing infrastructural production and distribution networks, information infrastructure meta-models and generic processes by critical infrastructure owner demanded by critical infrastructure law, satisfying cybersecurity requirements and taking into account hybrid threats are researched.

Keywords: Cybersecurity, critical infrastructure, smart industries, digital platform.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 185


[1] M. Cusumano, D. Yoffie, and A. Gawer. The future of platforms. MIT Sloan Management Review, 2020.
[2] A. Gawer. "Bridging differing perspectives on technological platforms: Toward an integrative framework." Research policy 43.7 (2014): 1239-1249.
[3] M. Schreieck, M. Wiesche, and H. Krcmar. "Design and governance of platform ecosystems–key concepts and issues for future research." (2016).
[4] C. Y. Baldwin, and C. J. Woodard. "The architecture of platforms: A unified view." Platforms, markets and innovation 32 (2009): 19-44.
[5] A. Ghazawneh, and O. Henfridsson. "Balancing platform control and external contribution in third‐party development: the boundary resources model." Information systems journal 23.2 (2013): 173-192.
[6] G. G. Parker, M.W. Van Alstyne, and S. P. Choudary. Platform revolution: How networked markets are transforming the economy and how to make them work for you. WW Norton & Company, 2016.
[7] D. Beverungen, et al. "Conceptualizing smart service systems." Electronic Markets 29.1 (2019): 7-18.
[8] L. Schermuly, et al. "Developing an industrial IoT platform–Trade-off between horizontal and vertical approaches." (2019).
[9] YOY. Henfridsson, and K. Lyytinen. "The New Organizing Logic of Digital Innovation: An Agenda for Information Systems Research." Information Systems Research 21.4 (2010): 724-735.
[10] E. Sisinni, et al. "Industrial internet of things: Challenges, opportunities, and directions." IEEE transactions on industrial informatics 14.11 (2018): 4724-4734.
[11] J. Guth, et al. "Comparison of IoT platform architectures: A field study based on a reference architecture." 2016 Cloudification of the Internet of Things (CIoT). IEEE, 2016.
[12] D. Hodapp, et al. "Business models for internet of things platforms: empirical development of a taxonomy and archetypes." (2019).
[13] T. Pauli, E. Fielt, and M. Matzner. "Digital industrial platforms." Business & Information Systems Engineering 63.2 (2021): 181-190.
[14] S. Noureddine and B. Meriem, "ML-SLA-IoT: an SLA Specification and Monitoring Framework for IoT applications," 2021 International Conference on Information Systems and Advanced Technologies (ICISAT), 2021, pp. 1-12
[15] I.U. Haq, A. A. Huqqani, and E. Schikuta. "Hierarchical aggregation of service level agreements." Data & knowledge engineering 70.5 (2011): 435-447.
[16] B. Lee and G. Lee, "Service Oriented Architecture for SLA Management System," The 9th International Conference on Advanced Communication Technology, 2007, pp. 1415-1418
[17] L. Wu, and R. Buyya. "Service level agreement (SLA) in utility computing systems." Performance and dependability in service computing: Concepts, techniques and research directions. IGI Global, 2012. 1-25.
[18] M. K. Halili, and B. Çiço. "Towards custom tailored SLA in IaaS environment through negotiation model: An overview." 2018 7th Mediterranean Conference on Embedded Computing (MECO). IEEE, 2018.
[19] Jun Wu, "Customer relationship management in practice: A case study of hi-tech company from China," 2008 International Conference on Service Systems and Service Management, 2008, pp. 1-6
[20] A. Mishra, and D. Mishra. "Customer Relationship Management: implementation process perspective." Acta Polytechnica Hungarica 6.4 (2009): 83-99.
[21] J. Hahnke, (2001), The Critical phase of the CRM lifecycle. Without CRM analytics, your customer won't even know you're there, www.hyperion.com
[22] J. Galimi, "Strategic analysis report: CRM IT requirements and strategies for Payer Organizations." Gartner Group (2000).
[23] J.K. William, T.C.T. James, "Business Process Change: A Study of Methodologies, Techniques, and Tools", MIS Quarterly, 1997, 21(1): 55-80
[24] G.L. Li, "Win by Process-Optimization and Reengineering of Business Process", Development Press of China, Beijing, 2005
[25] T. Erl, "SOA Conception, Technology and Design", China Machine Press, Beijing, 2007S. P. Bingulac, “On the compatibility of adaptive controllers (Published Conference Proceedings style),” in Proc. 4th Annu. Allerton Conf. Circuits and Systems Theory, New York, 1994, pp. 8–16.
[26] L. Aversano, T. Bodhuin, M. Tortorella, "Assessment and Impact Analysis for Aligning Business Processes and Software Systems", SAC 2005: 1338-1343
[27] W.M.P. van der Aalst, A.H.M. ter Hofstede, et al," Business Process Management: A survey", Business Process Management Proceedings, Springer-Verlag Berlin, 2003, pp:1-12.
[28] Object Management Group, "Enterprise Collaboration Architecture (ECA) Specification", 2004
[29] K. Raman, P. Marco, R. Marco, "A Framework for Integrating Business Processes and Business Requirements", EDOC 2004, pp: 9-20
[30] P. Johannesson, B. Wangler, et al, "Application and Process Integration Concepts, Issues, and Research Directions". Systems Engineering Symposium CAiSE 2000, Springer Verlag, 2000.
[31] C.F. Strnadl, "Aligning Business and IT: The Process-Driven Architecture Model", Computer as a Tool, 2005. Volume: 2, pp: 1048-1051
[32] Q. Yao, J. Zhang and H. Wang, "Business Process-Oriented Software Architecture for Supporting Business Process Change," 2008 International Symposium on Electronic Commerce and Security, 2008, pp. 690-694
[33] P. Jittrapirom, V. Caiati, A. M. Feneri, M. J. Alonso-González, S.Ebrahimigharehbaghi, and J. Narayan, “Mobility as a Service : a critical review of definitions, assessments of schemes, and key challenges,” Urban Plan., vol. 2, no. 2, 2017.
[34] J. Sochor, I. C. M. Karlsson, and H. Strömberg, “Trying Out Mobility as a Service: Experiences from a Field Trial and Implications for Understanding Demand,” in 95th Annual Meeting of the Transportation Research Board, Washington, D.C., January 10-14, 2016., 2016.
[35] S. Ebrahimi, F. Sharmeen, and H. Meurs. "Innovative business architectures (BAs) for Mobility as a Service (MaaS)-exploration, assessment, and categorization using operational MaaS Cases." 97th annual meeting of transportation research board. Washington DC. 2018
[36] G. Versteeg and H. Bouwman, “Business architecture: A new paradigm to relate business strategy to ICT,” Inf. Syst. Front., vol. 8, no. 2, pp. 91–102, 2006.
[37] D. Beimborn, and M. Palitza. "Enterprise app stores for mobile applications-development of a benefits framework." (2013).
[38] K. Ortbach, T. Brockmann, and Stefan Stieglitz. "Drivers for the adoption of mobile device management in organizations." (2014).
[39] P. Redman, J. Girard, and L.O. Wallin. "Magic quadrant for mobile device management software." Gartner G00211101.–2011 (2011).
[40] T. Xu, J. B. Wendt, and M. Potkonjak. "Security of IoT systems: Design challenges and opportunities." 2014 IEEE/ACM International Conference on Computer-Aided Design (ICCAD). IEEE, 2014.
[41] Z. K. Zhang, M. C. Y. Cho, and S. Shieh. "Emerging security threats and countermeasures in IoT." Proceedings of the 10th ACM symposium on information, computer and communications security. 2015.
[42] T. Takalo. "Should IoT Device Management be automated? Accessed on: 25 August, 2017." (2016).
[43] J. F. Gomes, et al. "Cybersecurity Business Models for IoT-Mobile Device Management Services in Futures Digital Hospitals." Journal of ICT Standardization 5.1 (2017): 107-128.
[44] A. Singh, P. Gupta, and M. Asjad. "Reconfigurable manufacturing system (rms): Accelerate towards industries 4.0." Proceedings of International Conference on Sustainable Computing in Science, Technology and Management (SUSCOM), Amity University Rajasthan, Jaipur-India. 2019.
[45] O. Morozova, et al. "Methods and technologies for ensuring cybersecurity of industrial and web-oriented systems and networks." Radioelectronic and computer systems 4 (2021): 145-156.
[46] A. Strielkina, et al. "Modeling and availability assessment of mobile healthcare IoT using tree analysis and queueing theory." Dependable IoT for human and industry modeling, architecting, implementation (2018): 105-126.
[47] M. Khanna, et al. "A Multi-Objective Approach for Test Suite Reduction During Testing of Web Applications: A Search-Based Approach." International Journal of Applied Metaheuristic Computing (IJAMC) 12.3 (2021): 81-122.
[48] M. G. Jaatun, M. E. Gaup Moe and P. E. Nordbø, "Cyber Security Considerations for Self-healing Smart Grid Networks," 2018 International Conference on Cyber Security and Protection of Digital Services (Cyber Security), 2018, pp. 1-7, 1982, p. 301
[49] https://carina.gov.hr/istaknute-teme/eu-fondovi/financijski-okvir-2014-2020/instrument-za-povezivanje-europe-connecting-europe-facility-cef/6775 - accessed 22nd July 2022.