Proceedings of the Creative Construction Conference 2019 2019
DOI: 10.3311/ccc2019-005
|View full text |Cite
|
Sign up to set email alerts
|

Cyber security challenges and vulnerability assessment in the construction industry

Abstract: The construction industry is making a shift towards digitization and automation (known as Construction 4.0) due to the rapid growth of information and communication technologies as well as 3D printing, mechatronics, machine learning, big data, and the Internet of Things (IoT). These technologies will transform the design, planning, construction, operation and maintenance of the civil infrastructure systems, with a positive impact on the overall project time, cost, quality, and productivity. These new technolog… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
33
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 49 publications
(33 citation statements)
references
References 12 publications
0
33
0
Order By: Relevance
“…Data protection and cybersecurity is a major concern for the construction companies. Mantha and de Soto (2019) implied that the Architecture-Engineering-Construction (AEC) industry has already been experiencing cyberattacks such as stealing private information, accessing unauthrozied files, and remove records. The expansion of digital platforms on…”
Section: Literature Reviewmentioning
confidence: 99%
See 1 more Smart Citation
“…Data protection and cybersecurity is a major concern for the construction companies. Mantha and de Soto (2019) implied that the Architecture-Engineering-Construction (AEC) industry has already been experiencing cyberattacks such as stealing private information, accessing unauthrozied files, and remove records. The expansion of digital platforms on…”
Section: Literature Reviewmentioning
confidence: 99%
“…Therefore, the construction companies must work towards developing their infrastructure and organizational structure in terms of handling the cybersecurity risks.. However, there is not yet an avaiable standard to develop a procedure for identifying such risks in the construction industry (Mantha and de Soto, 2019). Hence, data protection and cybersecurity is listed as an essential challenge for the I4.0 implementation in the construction industry due to the fact that the construction companies do not still have a definite plan or procedure to follow for protecting digital assets.…”
Section: Literature Reviewmentioning
confidence: 99%
“…With a few exceptions, the publications related to understanding cybersecurity aspects in the construction sector are limited. For example, Mantha and García de Soto (2019) investigated the spread of vulnerability in construction networks using an agent-based modeling approach. They considered two construction networks, one resembling a traditional delivery system in which construction participants are more segregated (e.g., Design-Bid-Build or DBB) and another with higher integration and combination among the different stakeholders (e.g., Integrated Project Delivery or IPD).…”
Section: Cybersecurity Research In the Aec Industrymentioning
confidence: 99%
“…With increasing interest and implementation of digital models and automation, this will be of great concern to the AEC industry. Although (Mantha and García de Soto, 2019) enumerated and taxonomized some of these data elements for a particular delivery method and specific construction stakeholders during the construction phase in the context of cybersecurity, a comprehensive investigation of the information and communication technologies (ICT) across different life cycle phases of the project is still missing. In addition, Parn and Edwards (2019) suggested some measures to secure the stored and managed information through the CDE.…”
Section: Research Area 1 -Information and Data Privacymentioning
confidence: 99%
“…Due to the inherent nature of construction, almost all the entities are interrelated and hence can compromise and impact each other with very few exceptions. For example, [15] showed how the vulnerability of an individual entity impacts the whole construction network due to the existing information and communication exchange channels. An example of an exception can be when a potential vendor who is not part of the construction project yet, might not have any communication or association with the existing entities (e.g., contractor), and hence the vulnerability of such a potential entity might not have any impact.…”
Section: Scope (S)mentioning
confidence: 99%