1. Introduction
The implementation of IT technologies related to Industry 4.0 in companies also facilitates the implementation of the framework for sustainable manufacturing. However, Industry 4.0 covers not only production companies, but also connects cooperating companies that process order, production, distribution, sales, service and recycling sequentially. In this context, the possibility to integrate the processes, products and IT systems of the sustainable manufacturing process participants is additionally essential for modern production. In the era of developing strategies of sustainable manufacturing and Industry 4.0 manufacturing companies strive to digitize business processes in no time. As a result, the amount of information processed both in the internal IT systems of manufacturing companies and sent to external business to business solutions between cooperating companies is growing rapidly. This process, however, causes concerns of the management of production companies regarding the security of their databases, e.g., information on contractors, orders, know-how and production recipes.
At the same time, literature studies show that among all the characteristics of digital production, relatively little research is dedicated to security, and it is the least recognized area of Industry 4.0 and sustainable manufacturing. Therefore, the problem concerning the lack of a proper definition of methods and ways of implementing cybersecurity measures is a significant barrier slowing down the introduction of sustainable development principles in companies and production processes. Simultaneously, many researchers are now calling for a direct link and mutual penetration of digital technologies emanating from Industry 4.0 with the principles of sustainable manufacturing. Such integration makes production systems increasingly environmentally friendly, as well as more socially and economically beneficial. Jamval at al. [
1] state that Industry 4.0 facilitates the implementation of sustainable manufacturing both directly and indirectly and claim that non-optimized supply chains are the main barriers to the introduction of sustainable development in the latest production technologies related to Industry 4.0. Sustainable manufacturing introduces the possibility of producing economically effective short series of non-standard products in factories closest to the order recipients. This, in turn, reduces the need for storage space, transport distances, greenhouse gas emissions and pollution [
2,
3,
4,
5]. Industry 4.0 technologies can increase the environmental efficiency of circular economy processes in the field of recycling, reusing, redesigning and regeneration by providing the necessary information about the condition of the product and error detection [
6]. Moreover, they reduce production waste generating, which is an integral part of sustainable production. Thus, the development of technology in the field of Industry 4.0 has a direct impact on sustainable manufacturing [
7]. Kaivo-oja at al. [
8] notice that sustainable Industry 4.0 and sustainable manufacturing should be built concurrently.
Sustainable manufacturing is linked to Industry 4.0, which includes a vast number of technologies. Attempts to define them were presented by Rüßmann [
9] and Wee [
10]. They identified the same set of technologies. In their view, the components of the fourth industrial revolution cover nine areas: Industrial Internet of Things [
11,
12,
13], Cybersecurity [
14,
15,
16], Autonomous robots [
17], Additive Manufacturing [
18,
19], Optimization & Simulation [
20,
21], Horizontal and Vertical System Integration [
22,
23], Cloud Computing [
24,
25], Big Data Analysis [
26,
27] and Augmented Reality [
28,
29]. Each of the above nine Industry 4.0 areas can contribute to sustainable manufacturing. For example, failure to take into account the principles of cybersecurity in manufacturing companies may result in cybercriminals taking control of the production IT systems and maintenance systems along with critical infrastructure. As a result, there may be an uncontrolled emission of pollutants into the air, leakages and discharges of waste into water reservoirs as well as damage to the health of employees. Falsification of the data transmitted between the participants of the Industry 4.0 process, e.g., between an ordering party and a manufacturer, may cause disruptions in supplies, starting the production of unsolicited products, increasing the amount of waste and energy consumption, and redundant transport.
Industry 4.0 is currently facing a number of new challenges [
30] including remote work of employees [
31]. Until now, it has usually covered back-office employees. Currently, it is a feasible mode of work also available for production workers. This enables progressive robotization, numerical prototyping, remote quality control capabilities, reducing the necessary human staff, as well as the dissemination of cloud programming. At the same time, it is another impetus to increase the amount of processed and stored data [
32]. Recruiting technically skilled workers in increasingly digitized companies poses another challenge [
33]. People from the next, younger and younger age groups are entering the labour market, whose needs and expectations should be taken into account by any company in order to effectively implement the new Industry 4.0 technologies and maintain the continuity of production. Another challenge is the lack of interoperability [
34] of components, products and systems. Industry 4.0 naturally introduces agile methods of operation, however, the lack of interoperability makes it difficult for companies to implement innovations and even change suppliers.
As the COVID-19 virus has spread around the world, sustainable manufacturing, Industry 4.0, and technologies related to them can be an essential tool for an economic recovery, driving the shift to sustainable production. However, the measurement of Industry 4.0 is difficult due to the lack of a unified definition of this term and data, and methods for its measurement [
35]. Despite this, companies at different levels of maturity and readiness for sustainable manufacturing should implement modern technologies referring to it, now and in the after COVID-19 period, along with the growing interest in sustainable development.
Enyoghasi et al. [
36] point out that among the above nine features there is a research gap in the area of cybersecurity for modern and sustainable manufacturing. Corallo et al. [
37], based on a review of the latest literature, also indicate the lack of positions indicating to companies the specific and necessary solutions in the field of cybersecurity and notice the existence of gaps in the methods of assessing the impact of cybersecurity on the development of Industry 4.0.
Esmaeilian at al. [
38] summarize that there is a lack of scientific research on the topic of sustainable manufacturing, Industry 4.0 and cybersecurity methods. Additionally, compared to other areas, there is a limited number of articles devoted to cybersecurity in sustainable manufacturing and Industry 4.0 issues [
39]. It is the least recognized area of sustainable development. Therefore, there is a need for detailed research to explore the possibilities of developing a sustainable production strategy by increasing the level of cybersecurity. Often these concepts are treated separately in the literature. Yadev et al. [
40] stated that one of the Industry 4.0 technologies that contributes to sustainable development in the context of production is cybersecurity management. The same postulates are made by Gmelin et al. [
41] and Xu et al. [
42]. Blockchain digital security technology is utilized by sustainable manufacturing to increase data cybersecurity in supply chains and the manufacturing process. The same mechanism can be used to analyse indicators related to sustainability, including the use of illegal production resources in the production process and illegal work by stakeholders [
38]. Moreover, the blockchain security technology used in the industry may contribute to the popularization of green behaviour among the Industry 4.0 participants and reduce operating costs by minimizing the use of paper.
Standards, recommendations, and catalogues of good practice published by international organizations, government agencies or recognized associations can directly support companies in implementing cybersecurity solutions. However, they are often solutions dedicated to selected industries, with the preference for critical infrastructure protection. Cybersecurity of networks and information in the European Union is the subject of the NIS EU Directive 2016/1148 [
43]. The implementation of these solutions in the Member States should increase national and Community capabilities to protect basic digital services. The European Network and Information Security Agency (ENISA) and the European Cyber Security Organization (ESCO) have successively published further standards in the field of industrial cybersecurity [
44,
45]. More well-known cybersecurity guides published by local regulators include the ANNSI publication set [
46,
47,
48] by the French Network and Information Security Agency (ANNSI) and the Industrial Control System Security Compendium [
49] by the German Federal Office for Information Security (BSI). The ANNSI and ICS guides are intended for the management of industrial companies and contain sets of good cybersecurity practices and define the necessary hardware, organizational and personnel resources, as well as audit methods for the implemented cybersecurity solutions. The US federal agency, the National Institute of Standards and Technology (NIST) has issued a group of guides NIST 800-53 [
50]. Similar to them, the ISO/IEC 27000:2018 [
51] standards were published by a non-governmental organization, the International Organization for Standardization (ISO). These both globally recognized groups of regulations introduce over a dozen sets of cybersecurity structures, the implementation of which in the company ensures that a good number of important requirements in the field of security management are covered. Increasing cybersecurity in industrial control and automation systems can be achieved by applying the ISA/IEC 62443 [
52] series of standards published by the International Society of Automation (ISA) and the International Electrotechnical Commission (IEC). In addition to the regulatory solutions presented above, companies can use other approaches and methods as guides to facilitate the implementation of cybersecurity solutions. One of them is risk assessment.
Cybersecurity effectiveness assessment can be conducted parallelly with risk assessment in industrial systems [
53]. Although both analyses have different goals, risk assessment helps to locate and assess cybersecurity threats [
54]. An additional advantage of such a combined analysis is the ability to focus security operations on potential sources of security threats highlighted in the risk analysis [
55].
Another way to implement the cybersecurity solutions and assess the current security status of industrial companies is the DevOps methodology [
56] and the related agile methodology [
57] taken from software production. Both approaches can be used in the implementation and subsequent maintenance of security mechanisms. The methodologies are based on the phases: development planning, testing new solutions, ongoing service, flexible implementation of new versions and constant monitoring of correctness and performance.
To choose the best cybersecurity solutions that fit the nature of activities of companies, methods for evaluating these solutions are helpful. In the work of Leszczyna [
58], based on an extensive review of the literature, it was found that although cybersecurity issues have been known for decades and there are many methods of their assessment, there are only a small number of articles that systematically review these methods of assessment. Particular attention was paid to the possibility of the practical application of the analysed methods. The vast majority of published works reviewing cybersecurity assessment methods are not of practical use. They include only preliminary, pilot or hypothetical solutions in the field of cybersecurity. Often, there are also no in-depth descriptions of the methods used or their application requires unique support tools. It is also worth paying attention to the possibility of testing IT solutions in the field of cybersecurity based on uniform criteria. The review of available solutions indicates over 70 tools to support testing [
59].
Most of the items in the literature are based on theoretical research. Lots of research studies on sustainability and Industry 4.0 are conducted in a general manner, without examining the mutual influence of the most important elements: a product, systems, production processes and cybersecurity on improving the sustainable production process. As aforementioned, with the growing popularity of sustainable manufacturing and Industry 4.0 processes, the amount of information sent between participants in these processes is increasing, which, equally, makes companies increase concerns about the cybersecurity of important databases and the final slowdown in the pace of implementing the principles of sustainable development in manufacturing companies. Therefore, to counteract this phenomenon, it is necessary to develop a set of cybersecurity measures and criteria, the introduction of which will halt this unfavourable trend and become a driving force for the further development of sustainable manufacturing.
It is difficult for the participants of sustainable Industry 4.0 processes to determine the best way to ensure the company’s cybersecurity, supported processes and data exchange, as well as the best implementation strategy for individual cybersecurity groups. As a result, a bad decision may be made and resources may be misallocated. The introduction of new solutions in companies usually means various organizational changes and new ways of handling processes, additionally, the emergence of new technologies. The implementation of cybersecurity solutions entails the occurrence of similar changes as mentioned above.
In this paper, three groups of measures have been proposed to describe the cybersecurity sphere: operational, technological, and organizational. In this context, the research questions raised in this article arise: what should the order of implementation of these groups be? Which of them is in fact the most significant? The article also proposes seven cybersecurity areas containing twenty criteria. They should be taken into account when implementing a security mechanism. Another research question is which of these parameters and areas are the most vital? In view of the above questions, a hypothesis to be verified can be put forward: the sphere of technological solutions is the most essential group of cybersecurity measures in the scope of processes in Industry 4.0. Research questions were addressed in
Section 3. Cybersecurity, a Sustainable Manufacturing Driving Force’ and 5. Results and Discussion’. The hypothesis was verified in
Section 5.
The implementation of security solutions is costly and time-consuming in technology. Finding answers to the questions posed and verification of the hypothesis may allow modern manufacturing companies to correctly allocate human and technical resources and reduce the risk of making a mistake when implementing cybersecurity solutions for the needs of Industry 4.0 processes.
Despite the fact that the scientific articles contain examples of the use of hybrid multi-criteria decision methods in the area of Industry 4.0, the gap in this respect is indisputable. In principle, there are no articles on the subject of the sustainable Industry 4.0 production proposing a three-tier cybersecurity scheme covering groups of measures, dimensions and security criteria, as well as developing an evaluation of the elements of this scheme using the DANP-PROMETHEE II method. This article fills this gap.
This work contributes to the literature by providing: (i) a proposal for a cybersecurity structure divided into three groups of measures, seven dimensions and twenty criteria necessary to be implemented to achieve sustainable manufacturing under Industry 4.0, and (ii) a ranking of individual elements of this cybersecurity structure obtained by using the hybrid methodology of the combined DANP (DEMATEL and ANP) and PROMETHEE II methods.
The remainder of the article is organized as follows:
Section 2 describes the Industry 4.0 digital support for sustainable production with an example of its use.
Section 3 presents cybersecurity as a driving force for sustainable manufacturing with the structure of the proposed division of cybersecurity elements and their impact on sustainable development.
Section 4 describes the connected DANP and PROMETHEE II methodologies used to evaluate the proposed safety parameters.
Section 5 presents the evaluation of the criteria, dimensions, and groups of cybersecurity measures using both methodologies. The last section presents concluding remarks and an industry recommendation.
2. Sustainable Manufacturing Support by Digital Technologies of Industry 4.0
The example of digital data exchange between the participants of the Industry 4.0 processes presented in this section was based on the Polish company Nowy Styl. It is the largest manufacturer of office chairs in Central and Eastern Europe and one of the largest in Europe and, at the same time, one of the largest manufacturers of chairs installed in stadiums around the world. An example of the company’s potential is a prestigious contract for the supply of seats for the new stadiums built for the 2022 FIFA World Cup in Qatar. The company has production plants in several countries, including fully automated ones, and intensively implements the Industry 4.0 solutions so that items are produced in an environmentally friendly and effective manner, as well as tailored to the preferences of customers.
Figure 1 shows the processes of digital data exchange between process participants within Industry 4.0. Six of these data exchange steps are marked as (I)–(VI). It is worth noting that in the absence of the implementation of one of the stages (I)–(VI), the company may run the original classic production and service processes. On the other hand, such an evolutionary approach enables companies to gradually reach the full implementation of Industry 4.0 solutions. At Nowy Styl, the Industry 4.0 solutions were implemented in stages (II)–(VI). The missing stage (I), however, is crucial to fully exploit the possibilities of modern production. Remote order placement by the contractor, combined with data exchange (I) between the ordering party and the manufacturer, in the era of Industry 4.0 enables, in theory, direct and remote start of the production process. However, in practice, the main obstacles are: the lack of integration of IT solutions owned by individual parties to the process, the lack of support by ERP/MRP systems of the Industry 4.0 solutions, the operation of ERP/MRP applications owned by the parties in various operating systems (e.g., Microsoft Windows IoT, Linux, macOS and Android), as well as the lack of a coherent cybersecurity mechanism accepted by the parties that guarantees the integrity and non-repudiation of the origin of the data. Below, partly based on the business processes occurring in the described company, a generalized sustainable production process is presented, which can be an example for companies that would like to take advantage of the opportunities offered by the Industry 4.0 solutions.
A generalized chain of activities: pre-production, proper production and post-production is presented in
Figure 1. The introduction of sustainable production processes requires a comprehensive use of Industry 4.0 technologies. The mass data transfer occurring at each stage (a)–(i) is characteristic and the communication between the IT systems of the process participants: the ordering party, component supplier, producer, distributor, recipient and service, and the need for cybersecurity these transmissions. The symbol of wireless transmission in
Figure 1 means encrypted and protected data transfer over the Internet.
In the first stage (a) presented in
Figure 1, companies conduct market needs research and on this basis, new products are designed (b). Subsequently, as a result of sales activities (c), an order for a product from a contractor or customer is placed via the business-to-business cloud platform. In the era of Industry 4.0, production orders can also be generated directly by cyber-physical systems. Physical shortages of goods in a warehouse or store, registered with the use of cyber-physical systems (e.g., a photocell recording the achievement of a defined minimum state) may result in the automatic creation of a digital (cyber) production order. Based on this real-time data and big data analysis of rotation and order history, the production volume is defined in such a way as to avoid unnecessary waste and wastage of components, and thus increased use of resources. In line with the principles of carbon neutrality and sustainable energy consumption, the production schedule is adjusted to maximize the use of renewable energy obtained from energy exchanges. Based on the big data analysis of aggregated orders, the production plant to which the order is directed is determined. The plant that is geographically closest to the majority of recipients is selected. Thus, production plants produce for the needs of local societies, the support of which is at the heart of the idea of sustainable development. Local production also means optimizing the location of warehouses close to major logistics hubs, while reducing warehouse space and thus minimizing energy consumption, which lowers the carbon footprint of companies. In the ERP/MRP system, a flexible production process is prepared (d) with automatic reservation of devices, materials and manpower and the adjustment of the production technique, which is energy and material-efficient and aims to minimize water consumption. At the same time, thanks to the cloud-based integration of the ERP systems and B2B portals, orders for components that are missing for production are automatically placed at the geographically closest suppliers (e). Production procedures, quantity and types of products are established. On this basis, electronic job cards with information about individual operations to be performed are generated for individual employees. In the case of people with a similar level of qualifications, the ERP system, based on a defined competency matrix, evenly distributes tasks between individual employees, so that there are no clear disproportions in the workload. It is an element of sustainable work that supports a good lifestyle and fairness among people. The possibility of a holistic approach to effective production management is a significant advantage of Industry 4.0 in the context of sustainable production. The warehouse system uses automatic locking mechanisms for components intended for production. As a result, at the commencement of production (f), there is no shortage of materials, of which the surplus of deliveries increases road traffic and environmental pollution. The manufactured goods are stored in the finished goods warehouse and blocked according to orders for individual recipients.
Augmented reality technology supports employees in accepting and issuing goods from the warehouse and loading goods onto means of transport according to the FIFO/LIFO method. The ERP system of a production company is integrated with smart house solutions in the warehouse. The warehouses are equipped with systems to reduce energy consumption for lighting, with motion sensors and maximizing the use of natural daylight owing to the adapted building architecture. Heating uses renewable energy sources, and electricity comes from photovoltaic panels, making the location of the warehouse independent of the local technical infrastructure. The data, which flows through cyber-physical systems to the ERP system, about the situation in dispersed warehouses is assessed using big data analysis to determine the most energy-efficient so-called warehouse operation scenes. The constant exchange of data on stock levels between the IT systems of the manufacturer and the ordering company enables effective distribution planning (g). In such a case, direct distribution of goods from the producer’s finished goods warehouse to the recipient’s warehouse is often used, omitting the intermediaries, which is consistent with the sustainability assumptions and applied in the case of additive manufacturing. It is important to introduce an effective return process to the packaging manufacturer in accordance with reverse logistics with the constant cooperation of contractors. On the manufacturer’s premises, autonomous vehicles powered by renewable energy are often used for internal transport. External transport is carried out using multimodal transport, along with intelligent route planning and integration with the ITS systems to help minimize the journeys of heavy vehicles through highly urbanized areas. Intelligent management of vans also includes forecasting and monitoring pollutant emissions and guiding drivers to maintain an eco-friendly driving style with the reduction of CO
2 emissions and fuel consumption, also through the integration with intelligent parking lots. When the products reach end-users, their technical condition is monitored thanks to the cyber-physical systems and IoT (h). As a result, the products are sent to inspections at the right time, preventing premature wear and replacement. In the event of a failure, service and complaint processes are carried out. Modern solutions in this area, in line with the idea of sustainable development, introduce remote handling of these events through online portals. The information architecture in such web solutions is focused on the good of the client, minimizing their effort to report the event and obtain a high level of satisfaction. In turn, the manufacturer increases work efficiency by automating online applications. The coupling of the recipient’s and manufacturer’s IT systems, including online service portals, enables remote diagnosis of the technical condition and a remote decision to replace the product with a new one without the need for additional transport with the shipment of the advertised product, which reduces the manufacturer’s carbon footprint. Based on the information obtained by the manufacturer from product users or product parameters read directly by the cyber-physical systems, companies can determine the causes of dominant failures and redesign manufactured products to increase the level of recycling, reusing, and redesigning (i) in accordance with the principles of reuse and circular economy. It should be emphasized that the above example illustrates the strong relationship of Industry 4.0 digital technologies with the principles of sustainable development in the area of proper production and the related to it pre-production and post-production stages, concerning intensive data exchange via the Internet. At each stage, companies participating in the described process are exposed to cybercrimes, which, especially in the case of production companies, are a significant threat to the natural environment. It may not only cause the possibility of losing control of production systems, discontinuation production increasing material losses, energy consumption and pollution generation, but it also may lead to uncontrolled discharge of pollutants into water or air. In addition to environmental threats, manufacturing companies in the era of connecting the IT solutions to the Internet are exposed to leakage of contractor data and sensitive information from employee files, which may affect the quality and comfort of the life of the local community from which employees are recruited. Additionally, companies may lose production recipes, know-how and solutions protected by patents. Serious threats to cybersecurity-related to the digitization of production processes were presented by Lezzi et al. [
39]. In the face of such threats and the absence of a uniform cybersecurity assessment standard, the management staff are relatively reluctant to implement the Industry 4.0 solutions, which, as indicated in the example above, also directly restricts or even inhibits the development of the sustainable manufacturing strategy. Moreover, in the absence of a uniform method ensuring cybersecurity under Industry 4.0, it occurs that production companies paradoxically introduce redundant solutions that contradict the philosophy of sustainability. This happens since to connect their own IT environments with the solutions of contractors, companies often unnecessarily install the IT production systems on redundant servers, separated from the internal IT architecture. As a result, cooperating contractors connect through external portals based on additional servers, which require additional employee service and increase energy consumption. It is worth noting that the introduction of a new server means, for cybersecurity reasons, the necessity to introduce another server to which data is replicated as a backup copy.
4. Solution Methodology
4.1. Multiple-Criteria Decision-Methods (MCDM)
The MCDM methods are used to evaluate a variety of, also interacting, criteria based on expert estimates, and to rank the importance of the proposed alternative solutions [
105,
106,
107,
108]. The criteria to be assessed can be qualitative or quantitative. Criteria based on qualitative variables are assumed to depend on experts and may be subjective, while quantitative criteria are independent of experts. Several different approaches can be used to transform qualitative to quantitative variables that are consistent with the MCDM methods, including ranking and scoring systems. In this approach, in the decision-making process, qualitative criteria are transformed quantitatively owing to the sets of indicators designed by groups of experts [
109]. There are a big number of different methods of solving problems with the use of MCDM known in the literature, also as a part of security issues within critical industrial infrastructure [
110,
111,
112,
113].
The advantage of using an expert opinion is their knowledge in their areas of expertise acquired over a long time. Nevertheless, conventional methods of priority analysis do not take into account the roles of experts or the opinions of many experts as input. Meanwhile, a wide number of studies use the expertise of a single expert, or the analysis of multiple experts, taking mean values, which leads to unreliable results. It is worth highlighting an important problem with the expert judgment since his opinion may be driven by personal experiences. Ambiguous methods of assigning importance to criteria may create uncertainty in the results. Thus, the subjectivity of the input parameters automatically influences the quality of decision analysis results.
It is also worth noting that errors related to an expert group decision making can occur when experts use a similar method to evaluate alternatives. When making decisions, it is difficult to determine which problem needs to be addressed and what decision needs to be made. Expert judgments including criteria for alternative solutions have a large impact on the final result of the analysis, and this, in turn, has an impact on the decisions made. Hence, the use of an advanced analytical method removing bias in the opinions of experts and the input data is crucial. An appropriate scientific method that could enable experts to evaluate the various parameters of IT security cannot be readily adopted, especially, when the field of expertise overlaps with different areas of knowledge and experts come from different parts of the industry.
Considering the complexity of cybersecurity, it is necessary to research the development of innovative methods of analysing the interdependence and importance of individual elements. Therefore, it is vital to apply a method that goes beyond traditional decision-making methods involving different experts. The adopted method should capture relevant data as well as enable the interpretation of complex issues understandably.
Based on the literature review, it can be noticed that no previous papers discuss the concepts of cybersecurity in the sustainable Industry 4.0 using MCDM methods. Since some studies deal with IT security in general, they are usually limited and do not allow the best method of data security to be selected from the available alternatives. By taking into account the gaps in knowledge in the previous articles, this paper proposes a hybrid method of decision-making. The proposed decision-making method is the combination of DANP and PROMETHEE II. It allows the assessment of interdependencies and the importance of cybersecurity parameters and their prioritization. The article proposes a two-stage methodology. DANP is used to analyse, evaluate and rank cybersecurity criteria and dimensions in Stage 1. On this basis, the ranking of the best groups of cybersecurity measures is built using PROMETHEE II in Stage 2.
4.2. DANP
DANP is a combination of the MCDM methods [
114]. The DANP method assumes that the considered sets of criteria may show close interdependencies with each other, which may serve as a basis for determining the global weight of each criterion. Included in the DANP framework, the DEMATEL method enables the evaluation of complex structures and the analysis of structural models that take into account cause-effect interrelationships [
115]. In turn, the ANP method enables an even more extensive and comprehensive assessment of priorities in the decision-making process and the construction of their ranking [
116]. The DANP has been used in a variety of research areas, such as the assessment of the competitiveness of the service industry [
117], measurement of corporate sustainability indicators [
118] or evaluating supply chain performance [
119].
4.3. PROMETHEE II
The PROMETHEE methodology was developed as part of the MCDM methods [
120]. The PROMETHEE method uses the mechanism of subjective evaluations and enables the determination of rankings and preferences in the decision-making process [
121]. It is especially useful and widely used in a variety of decision-making scenarios within IT and business. The method has undergone many modifications and improvements from the PROMETHEE I to PROMETHEE VI method [
122]. PROMETHEE algorithm is flexible and allows it to be adapted to meet specific, individual requirements in the evaluation process using integrated methods. Typically this methodology is used when evaluating relatively simple decisions. It is most useful in combination with other MCDM methods, especially the combination of ANP and PROMETHEE [
123]. PROMETHEE II allows you to build a vector ranking of alternatives. This makes it the most frequently used variant in the PROMETHEE family of methods [
124]. The assumption of the PROMETHEE II method is based on the comparison of pairs of alternative solutions for each adopted criterion which enables the alternatives to be prioritized. The PROMETHEE II method also fulfils its role in assessing decision criteria with different dimensions. As a result, it allows the construction of decision matrices to ensure effective decision-making.
4.4. Individual Steps in the Method of the Integrated DANP and PROMETHEE II
This section presents how the DANP and PROMETHEE II methods are integrated to solve the cybersecurity issue in the information flow process within companies participating in the modern production process in the Sustainable Manufacturing era.
The next stages of the hybrid MCDM method, presented in the article, combining three methods in practice (DEMATEL, ANP and PROMETHEE II), are shown below.
- Step 1.
The list of dimensions and criteria for cybersecurity
In the beginning, the group of n experts is formed. They establish a list of dimensions, k criteria and measures for cybersecurity that are to be analysed.
- Step 2.
The first survey questionnaire
Each expert completes two questionnaires (for DANP and PROMETHEE II) consisting of the assessed sets of criteria and proposed groups of measures. The experts have appropriate knowledge and experience in the field they evaluate. The first survey questionnaire is in the DANP method where the ratings are 0 to 4, ‘0′ means no impact, ‘1′ is a very low impact, ‘2′ is a low impact, ‘3′ is a high impact and ‘4′ is a very high impact. Then the values of mutual interactions within pairs of all the criteria are determined. It is assumed that each of the
k criteria may influence another criterion, but it cannot influence itself. Finally,
n partitive initial direct influence matrices
were created by each
m-th expert:
where
is the assessment provided by the
m-th expert regarding the degree to which criterion
i affects a criterion
j. A group of partial matrices is made.
- Step 3.
Direct influence matrix Z
Matrix aggregation results in a direct influence matrix
given by:
- Step 4.
Normalized direct influence matrix X
Normalized direct influence matrix
X is obtained by using Equation (3):
while
s can be calculated through Equation (4):
- Step 5.
Total relations matrix T
Total relations matrix
is obtained by:
while:
and the sum of the items of at least one row or column equals one. It guarantees
.
- Step 6.
The vectors R and C
The vectors
R and
C representing the sum of the rows and the sum of the columns from the matrix
T are obtained by (7) and (8):
and:
where
is the
i-th row sum in the matrix
T. It presents the sum of direct and indirect effects dispatching from parameter
i to the other ones. Similarly,
is the
j-th column sum in the matrix
T. It presents the effects that parameter
j is receiving from all the other ones. Let
and
. The relation indicator
is obtained. It reflects a net influence. Similarly, the relation vector
illustrates the net effect that the factor contributes to the analysed system.
The position indicator is calculated. The position vector reflects the total effect of each factor on the system and illustrates the importance of the criteria in the analysed system. As for , the value of stands for that criterion i influences other criteria as well as the system. Likewise, the value indicates that other criteria influence criterion i.
- Step 7.
Plotting the data set of
Based on matrix, the influential network map can be plotted in layout.
- Step 8.
The results analysis
The level of correlations among criteria should be determined. The position of each criterion in the diagram provides information about its significance or level of dependency with other criteria.
- Step 9.
Normalized total relations matrix
Normalized total relations matrix
is obtained by:
where:
A threshold value (e.g., the arithmetic mean of ) must be established. Its exceeding by elements of the matrix helps to determine those of them which have the strongest influence on the others. This enables to establish significant relationships among criteria while ignoring less important ones.
- Step 10.
Final DANP matrix
The final DANP matrix is obtained by raising
to a large power
. In this way, it achieves convergence. As a result, a total priority vector is obtained including the weights
for each criterion.
- Step 11.
Aggregation of the second survey questionnaire
The second survey questionnaire is in the PROMETHEE II method. It is used to evaluate each alternative measure concerning the criteria selected in Step 1 of this process. Ratings from 1 to 5 are used, where ‘1′ is the worst alternative, ‘2′ a bad alternative, ‘3′ a fair alternative, ‘4′ a good alternative, and ‘5′ the best alternative.
Then, the results of this survey questionnaire are aggregated using (2) from Step 3.
- Step 12.
Deviation function in PROMETHEE II
The deviations
are obtained from pairwise comparisons and using Equation (12). A difference in the assessment of experts
concerning a criterion
j is obtained:
- Step 13.
Preference function for criteria
According to [
119] the preference function of each criterion is determined. Six types of preference function are suggested. Type 1: Usual Criterion. It is a type without any threshold value. Type 2: Quasi-Criterion. It is used for qualitative criteria with a single indifference threshold. Type 3: Criterion with Linear Preference. It is used for quantitative criteria with linear preference up to a preference threshold. Type 4: Level Criterion. It is used for qualitative criteria with two parameters: an indifference threshold and a preference threshold. Type 5: Criterion with Linear Preference and Indifference Area. It is used for quantitative criteria with two parameters: an indifference threshold and a preference threshold. Type 6: Gaussian Criterion, the preference is obtained with the normal distribution in statistics.
Based on the characteristics of criteria from Step 1, the preference functions and measures (from
Table 2) in
Table 3 are assigned.
- Step 14.
Parameter values for criteria
For all preference functions and criteria, the parameter value is assigned. For Type 1: Usual Criterion no parameter value is expected. For Type 2: Quasi-Criterion, a parameter value of 0–2 is assumed. The value of 0 specifies neutrality on the less likely use of alternatives for such a criterion. The value of 2 specifies neutrality on the likelihood of alternatives to be used for such a criterion. For Type 3: Criterion with Linear Preference, the parameter value of 0–2 is also assumed.
The value of 0 specifies preference on alternatives concerning such a criterion. The value of 2 specifies preference on the likelihood of alternatives to be used for such a criterion. The most frequently selected parameter value for each type of a criterion was adopted for the analysis.
- Step 15.
Aggregation of the preference function
Aggregation of the preference function is determined by:
where
is the preference function,
the weight of relative importance of the
-th criterion determined in Step 10 and
is the number of criteria assumed in Step 1.
- Step 16.
Outranking flows for alternatives
In PROMETHEE II
alternatives produce a positive or negative outranking flow. The entering flow shows the weakness of the measures and can be obtained by:
The leaving flow shows the strength of the measures. It is obtained through:
The net outranking flow
for each measure is shown in Equation (16):
- Step 17.
Final ranking of measures
Based on net outranking flow, the final ranking of measures is assumed. The higher net outranking flow means preferred measure.
5. Results and Discussion
This unit presents the results based on the integrated DANP and PROMETHEE II method in the assessment of cybersecurity in the sustainable Industry 4.0 sphere. To appoint the cybersecurity dimensions and criteria shown in
Table 2, twenty-one expert interviews are executed. Twelve of the experts have deep knowledge in the technological sphere of cybersecurity, the next six are experts in the field of Industry 4.0. The last three are experts in both sustainable manufacturing and cybersecurity. Seven cybersecurity dimensions and twenty criteria presented in
Table 2 were established for further analysis. These dimensions and criteria can be used as a guide in assessing cybersecurity in sustainable manufacturing and Industry 4.0.
5.1. DANP Stage
The experts assess interactions between pairs of all criteria by using a 5-grade scale (from 0 to 4). The example of a filled questionnaire is presented in
Table A1 in
Appendix A. In this method, zero elements on the diagonal of the matrix mean that the assessed criteria do not affect themselves. The remaining elements are non-zero values. The higher the value, the greater the influence of one criterion on the other. Based on Equation (1), twenty-one partitive initial direct influence matrices
are received. Matrix aggregation (2) results in a direct influence matrix
Z (
Table A2 in
Appendix A). Next, based on Equation (3), normalized direct influence matrix
X (
Table A3 in
Appendix A) is obtained. Depending on Equation (5), total relations matrix
T (
Table A4 in
Appendix A) is formulated. The matrix
T can be viewed as a set of two submatrices. The first one is a submatrix
based on the seven cybersecurity dimensions, the second one is a submatrix
based on twenty criteria.
Table 4 presents the two indicators
and
determined based on Equations (7) and (8) as well as the relation and position indicators.
The relation diagram of
can be plotted (
Figure 2) for the seven dimensions from
Table 5. The position indicator
identifies the importance of each criterion. The respective relation indicator
is used to classify cause-effect criteria.
The positive value of this indicator proves that the given cause criterion influences the other criteria. A negative value means that the effect criterion is influenced by the others.
In
Figure 2, the dimension D3 (Network security) has the highest value of the position indicator
. It reflects the dimension priority among the others marked bold in
Table 4. This dimension is the most strongly interconnected with the other dimensions as well as the most important out of the presented seven ones. The dimension D4 (Application security) shows the lowest level of this rate. All dimensions ranked in order of descending importance: D3 (Network security), D1 (Trust services), D2 (Encryption), D7 (Cyberattacks), D6 (Access control), D5 (Endpoint security), and D4 (Application security) are presented. The relation indicator
reflects the influence of the analysed dimension on the other dimensions.
In
Figure 2, the dimension D2 (Encryption) shows the highest positive value of the relation indicator
. It means that this dimension has the most causative impact on other ones.
The dimension D6 (Access control) shows the lowest negative value of this rating. This dimension is the greatest recipient of the influence of the others. Based on the assessments of the experts, D2 (Encryption), D3 (Network security), D7 (Cyberattacks), and D5 (Endpoint security) are classified as causal dimensions. As regards, D1 (Trust services), D4 (Application security), and D6 (Access control) are effect dimensions. Thus, the relation diagram of
can be plotted (
Figure 3) for the twenty criteria from
Table 4. In
Figure 3, the highest value of the position indicator
has the criterion C31 (Adequate technical security of a company network), from the dimension D3 (Network security). It holds a privileged important position in comparison with the others and it is the most crucial criterion in the cybersecurity sphere. On the other hand, the criterion C52 (Antivirus and antimalware), from the dimension D5 (Endpoint security), has the lowest value of this indicator.
The analysis shows the following order of importance of the criteria: C31 (Adequate technical security of a company network), C12 (Validation and maintaining electronic signatures and seals), C11 (Electronic signature, Electronic seal, and Electronic time stamp), C51 (Appropriate techniques for securing workstations and mobile devices), C22 (Blockchain technology), C61 (Establishing a VPN secure remote connection with the corporate server), C21 (Authentication of online B2B portals; X.509/TLS/SSL protocols), C33 (Monitoring and analysis of security incidents), C71 (Intrusion Prevention System and Intrusion Detection System with algorithms to real-time detect the malicious attacks), C44 (Software updates), C41 (Database security), C63 (Creating rules for managing access to corporate data; User authentication), C72 (Firewall, Gateway, and Proxy), C32 (Optimal network and server architecture), and C13 (Recorded Electronic Delivery). The above criteria with the highest value of the position indicator must be taken into account when determining the methods of cybersecurity protection in manufacturing companies. Experts found the remaining criteria: C53 (Penetration testing to find vulnerabilities), C43 (Vulnerability scan; Source code analysis to look for software weaknesses), C62 (Regular training of employees in the field of cybersecurity), C42 (Establishment of an efficient backup system), and C52 (Antivirus and antimalware) less important than those mentioned above. Regarding the relation indicator
, the criterion C31 (Adequate technical security of a company network), from the dimension D3 (Network security), with the highest positive value of this criterion, has the strongest impact on the other criteria. Concurrently, the criterion C63 (Creating rules for managing access to corporate data; User authentication), from the dimension D6 (Access control), with the highest negative value of the relation indicator, is the biggest receiver of the impact of the others. Based on the positive value of relation indicator, C31 (Adequate technical security of a company network), C32 (Optimal network and server architecture), C72 (Firewall, Gateway, and Proxy), C22 (Blockchain technology), C11 (Electronic signature, Electronic seal, and Electronic time stamp), C42 (Establishment of an efficient backup system), C52 (Antivirus and antimalware), C53 (Penetration testing to find vulnerabilities), C21 (Authentication of online B2B portals; X.509/TLS/SSL protocols), and C71 (Intrusion Prevention System and Intrusion Detection System with algorithms to real-time detect the malicious attacks) are classified as causal criteria. As for C43 (Vulnerability scan; Source code analysis to look for software weaknesses), C61 (Establishing a VPN secure remote connection with the corporate server), C12 (Validation and maintaining electronic signatures and seals), C33 (Monitoring and analysis of security incidents), C51 (Appropriate techniques for securing workstations and mobile devices), C13 (Recorded Electronic Delivery), C41 (Database security), C44 (Software updates), C62 (Regular training of employees in the field of cybersecurity), and C63 (Creating rules for managing access to corporate data; User authentication) are classified as effect criteria. The next step of the DANP methodology is the determination of the normalized total relations matrix
based on (9). This is presented in
Table A5 in
Appendix A. The individual elements of the
matrix express the exerted and received the influence of the criteria on each other. The higher the value of an element in a matrix, the greater the influence it has on the other elements. For example, the value of the C42 element influence on C11 is 0.0492, and the C43 element influence on C11 is 0.0570. In practice, this means that C43 has a greater influence on C11 than C42. The threshold value of 0.05 was used in the analysis. Items with a value greater than the threshold are marked bold in
Table A5 in
Appendix A. The C13 (Recorded Electronic Delivery) on C12 (Validation and maintaining electronic signatures and seals) has the greatest influence with the value of 0.0701. Then, matrix
is raised to a high power until it converges and becomes a stable DANP matrix which determines the importance of each criterion. Based on (11), the priority vector in
Table 5 shows the final weights of cybersecurity criteria.
The crucial criteria, with the greatest value of criteria weight are: C12 (Validation and maintaining electronic signatures and seals) and C31 (Adequate technical security of a company network) which are marked bold in
Table 5.
In the next step, this vector is used in the PROMETHEE II method to rank measures for cybersecurity issues.
5.2. PROMETHEE II Stage
In the PROMETHEE II stage, the second survey questionnaire is completed by the same group of experts to achieve the ranking of measures in cybersecurity (ratings from 1 to 5).
Table 6 shows the aggregated rating of the second questionnaire.
These expert assessments indicate to what extent particular criteria affect the proposed alternative cybersecurity measures. For example, countermeasure C11 (Electronic signature, Electronic seal, and Electronic time stamp), out of the three A1–A3 measures, has the greatest impact on the alternative A2 (Technological measure), which then has the evaluation value of 4.1905.
Next, based on Equation (12) and using the threshold, the deviation of measures is obtained and presented in
Table 7. The table column difference results are used to determine how one measure is more favourable than another for a given criterion. A positive value of the difference means that the first measure is more favourable than the second one in the difference. For example, when comparing in
Table 7 for the C11 criterion, the difference between A2 and A1 can be found with a positive deviation of 1.0476. Also, for C12, the difference between A2 and A1 is positive and amounts to 1.9524. Therefore, for both criteria, the alternative A2 is more preferable to A1. In addition, the alternative A2 compared to A1 is preferred to C12 to a greater extent than to C11.
Thus, based on the preference function for each criterion (
Table 3), the relationship between the parameter value and the deviations of the pair of alternatives for measures (
Table 7) are obtained after establishing a collective expert judgment based on the parameter value for each criterion.
The value of a parameter depends on the type of a criterion (either qualitative or quantitative) and the parameter under consideration.
Determining the parameter value for each type of preference function was performed in accordance with the definition of the individual preference function.
Table 3 shows the preference functions for each criterion. No parameter value is required for the criteria that are classified as Usual Criteria (Type 1). The values 0–2 is required for Quasi-Criterion (Type 2). The value of 0 specifies neutrality on the less likely use of measures for such a criterion. The value of 2 specifies neutrality on the likelihood of measures to be used for such a criterion. Considering Type 3—Criterion with Linear Preference, also the parameter value 0–2 is required. The value of 0 specifies the preference of measures concerning such a criterion. The value of 2 specifies the preference of the likelihood of measures to be used for such a criterion.
Determining the parameter value is created by an expert group and specified in
Table 8. Finally, in
Table 8 for each criterion, the parameter values for chosen preference functions are related to the deviation of each pair of measures.
Thus, based on the three: (13), the weights from the DANP matrix (
Table 5) showing the importance of cybersecurity criteria, and the preference functions for each pair of measures from
Table 8, the aggregated preference functions are obtained and specified in
Table 9. The results are used for the assessment of measures.
The next step involves the calculation of the entering, leaving and net flows. The final rank of measures in
Table 10 is presented. The net flow score for a given measure reflects its importance among other measures. The strength of measures is obtained by the leaving flow while the weakness of measures is shown by the entering flow. A higher net flow of a measure is preferred. Based on the PROMETHEE II method, the final order of validity of the measures was obtained in the form of A2 (Technological measures), A3 (Organizational measures) and A1 (Operational measures) to ensure cybersecurity among the participants of the information flow under Sustainable Manufacturing and Industry 4.0. The above analysis shows that the sphere of technological solutions (A2) is the most significant. The hypothesis formulated in section ‘1. Introduction’ and subjected to verification has been confirmed.
The staff of the IT departments ensure that the IT equipment, also in the field of cybersecurity issues, is always in the best condition and includes the latest solutions.
It should be noted that the first three of the most important criteria connected with the A2 sphere hold, respectively, the 1st (C12), 3rd (C51), 5th (C11) positions in the criteria list with the highest influential weights in
Table 5. That is C12 (Validation and maintaining electronic signatures and seals), C51 (Appropriate techniques for securing workstations and mobile devices), and C11 (Electronic signature, Electronic seal, and Electronic time stamp).
As a result of the analysis, it was determined that the C12 parameter is the most important factor influencing the IT security and information flow in companies participating in the sustainable Industry 4.0 cycle.
Let us recall, the validation of electronic signature guarantees that it has been done correctly. The use of validation is essential and ensures the cybersecurity of the entities in the process flow of Industry 4.0.
As for maintaining the electronic signature, it extends the reliability of an electronic signature beyond the technical validity period.
The maintaining service may, in particular, be used in accepting manufacturing statements and commitments with a higher risk and long-term or valuable liabilities.
Another preferred alternative is the organizational sphere (A3). This alternative is difficult to implement as it requires the IT staff to constantly follow and improve well-defined procedures.
The first three of the most important criteria connected with the A3 sphere hold the 2nd (C31), 4th (C63), 6th (C44) positions in the criteria list with the highest influential weights in
Table 5, where C31 is Adequate technical security of a company network, C63 means Creating rules for managing access to corporate data; User authentication, and C44 is Software updates.
The least preferred alternative is the sphere of operational activities (A1). This means, predominantly, constant monitoring of the right operation and stability of the applied solutions.
As regards the first three of the most important criteria connected with the A1 sphere, they hold the 8ht (C33), 12th (C71), 15th (C43) positions in the criteria list with the highest influential weights in
Table 5, where C33 means Monitoring and analysis of security incidents, C71 is Intrusion Prevention System and Intrusion Detection System with algorithms to real-time detect the malicious attacks and finally C43 is Vulnerability scan; Source code analysis to look for software weaknesses.
It is worth noticing that the A3 area covering current operational activities is only the third in the ranking. This should be confirmed during the implementation of security issues within companies participating in manufacturing flow.
The sequence of implementing individual security issues in companies, resulting from the analysis, should be followed. Firstly, it is necessary to determine the type and scope of technological solutions to be applied that will comprehensively cover all IT areas and ensure their security. Then, depending on the selected solutions, procedures and regulations for employees should be developed. These ought to include routine work, training systems, and emergency procedures. Only on this basis should the daily operational work of system users and administrators involved in ensuring IT security be implemented.
6. Conclusions
The combination of the idea of sustainable development, digital transformation of Industry 4.0 and cybersecurity has a positive impact on sustainable manufacturing. Along with the growing popularity of sustainable production and Industry 4.0 processes, the amount of information sent throughout the lifecycle of manufactured products between companies participating in these processes increases.
This enhances concerns of manufacturing companies’ management boards about the cybersecurity of important databases. As a result, the pace of implementing the principles of sustainable development in manufacturing companies is slowing down. To counteract this phenomenon, it is necessary to develop cybersecurity principles covering both the processed information and the IT environments used, the introduction of which will become the driving force for the further development of sustainable manufacturing.
The example of digital data exchange between the participants in the production process presented in
Section 2 indicates that the absence of a coherent cybersecurity mechanism accepted by the parties guaranteeing the integrity and undeniability of the origin of received and sent data is a direct limitation of the dissemination of the modern Industry 4.0 technologies.
On the other hand, this is counteracted by the specific guide-template of a set of criteria, areas and groups of cybersecurity measures proposed in the article, which, together with their ranking and the indicated order of implementation, as well as the hybrid MCDM method of assessing the security scheme, can be directly applied in any manufacturing company.
Implementing security solutions is always costly and usually time-consuming. The article allows the management of a manufacturing company to properly allocate funds and reduce the risk of making a mistake when implementing cybersecurity solutions within Industry 4.0.
The article proposes a cybersecurity structure divided into seven dimensions, twenty criteria and three groups of measures in the field of cybersecurity in areas used by companies for the purposes of sustainable manufacturing and sustainable Industry 4.0. Another research value and novelty of the article is the simultaneous utilization of the hybrid method supporting decision-making processes based on the DEMATEL-based ANP (DANP) and PROMETHEE II methods for the assessment of the proposed cybersecurity structure in sustainable manufacturing and Industry 4.0 and to create a ranking of its elements.
Based on DANP, the relationship and position indicators for each of the seven dimensions and twenty criteria of cybersecurity were obtained, along with the ranking of the importance of criteria. Subsequently, the results obtained from DANP were used in PROMETHEE II to determine the ranking of measures.
The analysis reveals that the most important security assessment criteria are: C12 (Validation and maintaining electronic signatures and seals) and C31 (Adequate technical security of a company network). In turn, the most crucial dimension of cybersecurity is D3 (Network security), while the most significant group of measures in this regard is A2 (Technological measures). It means that the hypothesis posed in section ‘1. Introduction’ and subject to verification has been confirmed.
The influence of the A2 technological group of measures on sustainable development in terms of production consists in the possibility of reducing a company’s carbon footprint, energy consumption and improving energy efficiency by ensuring that cybersecurity software and hardware are always in the best condition and contain the latest solutions. As a result, the implementation of measures from the A2 group is a process towards achieving Sustainable Development Goal 7—affordable, reliable, sustainable and modern energy.
In turn, the area of D3 (Network security) recommends a constant development of software improvements to the algorithms that capture cyber threats. This extends the time of using older machinery in manufacturing companies and introduces the philosophy of reuse from the circular economy in the area of IT equipment and production machinery as well as redesigning in the area of software. Another recommendation in this area is the widest possible automation of the cybersecurity data analysis, previously aggregated with the use of big data, by analysts and corporate security departments, which increases the efficiency of the work of the people involved.
The criterion C12 (Validation and maintaining electronic signatures and seals) introduces the philosophy of reuse from the circular economy to the digital sphere of cybersecurity. Losing the validity of electronic signatures functioning in the digital production control process may lead to the immobilization of the company’s production activity, and thus cause a decrease in work efficiency and an increase in resource consumption.
On the other hand, failure to implement the C31 criterion (Adequate technical security of a company network) may lead to downtime in production companies, which in turn leads to a reduction in work efficiency, forces over-planned retooling of stopped machines, increases a company’s carbon footprint by excessive energy consumption during restarting and an increased number of material losses and defective products resulting from an emergency stop of the production line.
The presented methodology is relatively easy to apply in practice. The rankings of cybersecurity criteria and groups of measures can be treated by manufacturing companies as guidelines during the process of implementing cybersecurity solutions. The integration of the two methods has proved to be valuable in assessing cybersecurity. This is possible by establishing the importance of the various criteria. Besides, owing to this, it is plausible to support the decision-making process regarding the choice of measures to ensure high cybersecurity in the IT within manufacturing companies. This could pave the way for future work to do research involving the use of other methods for ranking cybersecurity measures. Extending the framework of this methodology for assessing available dimensions, criteria and group of measures may also be useful for other issues.