This work is licensed under the Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.
Borowik, M., Maśniak, L., Kroplewski, R., Romaniec, H., 2018. Przemysł +. Gospodarka oparta o dane (Industry +. Data-driven Economy). Warszawa (Poland): Ministerstwo Cyfryzacji.BorowikM.MaśniakL.KroplewskiR.RomaniecH.2018Przemysł +. Gospodarka oparta o dane (Industry +. Data-driven Economy)Warszawa (Poland)Ministerstwo CyfryzacjiSearch in Google Scholar
Borysiewicz, M.J., Michalik, J.S., 2007. Cyberbezpieczeństwo przemysłowych systemów sterowania. Bezpieczeństwo Pracy (Cybersecurity of Industrial Control Systems. Work Safety), 10, pp.8–11.BorysiewiczM.J.MichalikJ.S.2007Cyberbezpieczeństwo przemysłowych systemów sterowaniaBezpieczeństwo Pracy (Cybersecurity of Industrial Control Systems. Work Safety)10811Search in Google Scholar
Busch, C., Dannemann, G., Schulte-Nölke, H., Wiewiórkowska-Domagalska, A., Zoll, F., 2016. Research Group on the Law of Digital Services, Discussion Draft of a Directive on Online Intermediary Platforms. Journal of European Consumer and Market Law, 5, pp.164–169.BuschC.DannemannG.Schulte-NölkeH.Wiewiórkowska-DomagalskaA.ZollF.2016Research Group on the Law of Digital Services, Discussion Draft of a Directive on Online Intermediary PlatformsJournal of European Consumer and Market Law5164169Search in Google Scholar
Constantinides, P., Henfridsson, O., Parker, G., 2018. Platforms and Infrastructures in the Digital Age. Information Systems Research, 2, pp.1–20.ConstantinidesP.HenfridssonO.ParkerG.2018Platforms and Infrastructures in the Digital AgeInformation Systems Research212010.1287/isre.2018.0794Search in Google Scholar
Corin Stig, D., 2015. Technology Platforms. Organizing and Assessing Technological Knowledge to Support its Reuse in New Applications. Gothenburg (Sweden): Department of Product and Production Development Chalmers University of Technology.Corin StigD.2015Technology Platforms. Organizing and Assessing Technological Knowledge to Support its Reuse in New ApplicationsGothenburg (Sweden)Department of Product and Production Development Chalmers University of TechnologySearch in Google Scholar
Deloitte, 2017. Industry 4.0 and Cybersecurity. Managing Risk in Age of Connected Production. London (UK): Deloitte University Press.Deloitte2017Industry 4.0 and Cybersecurity. Managing Risk in Age of Connected ProductionLondon (UK)Deloitte University PressSearch in Google Scholar
De Marco, C.E., Di Minin, A., Marullo, C., Nepelski, D., 2019. Digital Platform Innovation in European SMEs. An analysis of SME Instrument Business Proposals and Case Studies. Luxembourg (Luxembourg): Publications Office of the European Union.De MarcoC.E.Di MininA.MarulloC.NepelskiD.2019Digital Platform Innovation in European SMEs. An analysis of SME Instrument Business Proposals and Case StudiesLuxembourg (Luxembourg)Publications Office of the European UnionSearch in Google Scholar
De Reuver, M., Sørensen, C., Basole, R.C., 2015. The Digital Platforms: A Research Agenda. Journal of Information Technology, 4, pp.124–135.De ReuverM.SørensenC.BasoleR.C.2015The Digital Platforms: A Research AgendaJournal of Information Technology412413510.1057/s41265-016-0033-3Search in Google Scholar
Diego G.S. Pivoto, Luiz F.F. de Almeida, Rodrigo da Rosa Righi, Joel J.P.C. Rodrigues, Alexandre Baratella Lugli, Antonio M. Alberti, 2021. Cyber-physical Systems Architectures for Industrial Internet of Things Applications in Industry 4.0: A literature review. Journal of Manufacturing Systems, Volume 58, Part A, pp.176–192, ISSN 0278-6125, https://doi.org/10.1016/j.jmsy.2020.11.017.PivotoDiego G.S.de AlmeidaLuiz F.F.da Rosa RighiRodrigoRodriguesJoel J.P.C.LugliAlexandre BaratellaAlbertiAntonio M.2021Cyber-physical Systems Architectures for Industrial Internet of Things Applications in Industry 4.0: A literature reviewJournal of Manufacturing Systems58Part A,176192ISSN 0278-6125, https://doi.org/10.1016/j.jmsy.2020.11.017.10.1016/j.jmsy.2020.11.017Search in Google Scholar
Ervural, B.C., Ervural, B., 2017. Overview of Cyber Security in the Industry 4.0 Era. In: A. Ustundag, E. Cevikcan (Eds.), Industry 4.0: Managing The Digital Transformation, pp.267–284). Cham (Switzerland): Springer.ErvuralB.C.ErvuralB.2017Overview of Cyber Security in the Industry 4.0 EraIn:UstundagA.CevikcanE.(Eds.),Industry 4.0: Managing The Digital Transformation267284Cham (Switzerland)Springer10.1007/978-3-319-57870-5_16Search in Google Scholar
Frühwirth, C., Männistö, T., 2009. Improving CVSS-based Vulnerability Prioritization and Response with Context Information. In: 2009 3rd International Symposium on Empirical Software Engineering and Measurement, pp.535–544. Massachusetts (DC): ILEE Computer Society.FrühwirthC.MännistöT.2009Improving CVSS-based Vulnerability Prioritization and Response with Context InformationIn:2009 3rd International Symposium on Empirical Software Engineering and Measurement535544Massachusetts (DC)ILEE Computer Society10.1109/ESEM.2009.5314230Search in Google Scholar
Gerrikagoitia, J.K., Unamuno, G., Urkia, E., Serna, A., 2019. Digital Manufacturing Platforms in the Industry 4.0 from Private and Public Perspectives. Applied Sciences, 9, pp.2934–2946.GerrikagoitiaJ.K.UnamunoG.UrkiaE.SernaA.2019Digital Manufacturing Platforms in the Industry 4.0 from Private and Public PerspectivesApplied Sciences92934294610.3390/app9142934Search in Google Scholar
Gerring, J., 2001. Social Science Methodology: A Criterial Framework. New York (NY): Cambridge University Press.GerringJ.2001Social Science Methodology: A Criterial FrameworkNew York (NY)Cambridge University Press10.1017/CBO9780511815492Search in Google Scholar
Hretcanu, C.I., 2015. Current Trends in the Knowledge Economy. Ecoforum, 2, pp.170–175.HretcanuC.I.2015Current Trends in the Knowledge EconomyEcoforum2170175Search in Google Scholar
Kaplan, J., Richter, W., Ware, D., 2019. Cybersecurity: Linchpin of the Digital Enterprise. As Companies Digitize Businesses and Automate Operations, Cyberrisks Proliferate; Here Is How. New York (NY): McKinsey & Company.KaplanJ.RichterW.WareD.2019Cybersecurity: Linchpin of the Digital Enterprise. As Companies Digitize Businesses and Automate Operations, Cyberrisks Proliferate; Here Is HowNew York (NY)McKinsey & CompanySearch in Google Scholar
Kenney, M., Rouvinen, P., Seppälä, T., Zysman, J., 2019. Platforms and Industrial Change. Industry and Innovation, 8, pp.871–879.KenneyM.RouvinenP.SeppäläT.ZysmanJ.2019Platforms and Industrial ChangeIndustry and Innovation887187910.1080/13662716.2019.1602514Search in Google Scholar
Kozak, A., Kościelny, M., Pacyna, P., Gołębiewski, D., Paturej, K., Świątkowska, J., 2016. Cyberbezpieczeństwo instalacji przemysłowych – fundament projektu „Industry 4.0” i szansa dla Polski (Cybersecurity of Industrial Installations - the Foundation of the “Industry 4.0” Project and an Opportunity for Poland). Kraków (Poland): Instytut Kościuszki.KozakA.KościelnyM.PacynaP.GołębiewskiD.PaturejK.ŚwiątkowskaJ.2016Cyberbezpieczeństwo instalacji przemysłowych – fundament projektu „Industry 4.0” i szansa dla Polski (Cybersecurity of Industrial Installations - the Foundation of the “Industry 4.0” Project and an Opportunity for Poland)Kraków (Poland)Instytut KościuszkiSearch in Google Scholar
Kozłowski, A., 2017. Cyberbezpieczeństwo kluczem do sukcesu przemysłu 4.0 (Cybersecurity Is the Key to the Success of Industry 4.0). Retrieved from https://fibis.pl/zagadnienia/czynniki/.KozłowskiA.2017Cyberbezpieczeństwo kluczem do sukcesu przemysłu 4.0 (Cybersecurity Is the Key to the Success of Industry 4.0)Retrieved from https://fibis.pl/zagadnienia/czynniki/.Search in Google Scholar
Krajowy Punkt Kontaktowy (2003). Polskie Platformy Technologiczne (Polish Technology Platforms). Retrieved from https://www.kpk.gov.pl/innowacje/polskie-platformy-technologiczne.Krajowy Punkt Kontaktowy2003Polskie Platformy Technologiczne (Polish Technology Platforms)Retrieved from https://www.kpk.gov.pl/innowacje/polskie-platformy-technologiczne.Search in Google Scholar
Kukuła, A.J., 2013. Knowledge-based Economy as an Economic Development Strategy for the Twenty-first Century. In: M. Chorośnicki, J. Węc, A. Czubik, A. Głogowski, I. Krzyżanowska-Skowronek, A. Nitszke, E. Szczepankiewicz-Rudzka, M. Tarnawski (Eds.), New Strategies for the New Century. The limits and possibilities of regional and global integration, pp.563–574. Kraków (Poland): Kontekst Press.KukułaA.J.2013Knowledge-based Economy as an Economic Development Strategy for the Twenty-first CenturyIn:ChorośnickiM.WęcJ.CzubikA.GłogowskiA.Krzyżanowska-SkowronekI.NitszkeA.Szczepankiewicz-RudzkaE.TarnawskiM.(Eds.),New Strategies for the New Century. The limits and possibilities of regional and global integration563574Kraków (Poland)Kontekst PressSearch in Google Scholar
Leszczyna, R., 2019. Cybersecurity in the Electricity Sector: Managing Critical Infrastructure. Cham (Switzerland): Springer.LeszczynaR.2019Cybersecurity in the Electricity Sector: Managing Critical InfrastructureCham (Switzerland)Springer10.1007/978-3-030-19538-0Search in Google Scholar
Maass, M., Sales, A., Chung, B., Sunshine, J., 2016. A Systematic Analysis of the Science of Sandboxing. PeerJ Computer Science, 2, pp.1–36.MaassM.SalesA.ChungB.SunshineJ.2016A Systematic Analysis of the Science of SandboxingPeerJ Computer Science213610.7717/peerj-cs.43Search in Google Scholar
Malladi, SS, Subramanian, HC., 2020. Bug Bounty Programs for Cyber Security: Practices, Issues and Recommendations. IEEE Software, 1, pp.31–39.MalladiSSSubramanianHC.2020Bug Bounty Programs for Cyber Security: Practices, Issues and RecommendationsIEEE Software1313910.1109/MS.2018.2880508Search in Google Scholar
Mell, P.M., Scarfone, K.A., Romanosky, S., 2007. A Complete Guide to the Common Vulnerability Scoring System Version 2.0. Gaithersburg (MD): National Institute of Standards and Technology.MellP.M.ScarfoneK.A.RomanoskyS.2007A Complete Guide to the Common Vulnerability Scoring System Version 2.0.Gaithersburg (MD)National Institute of Standards and TechnologySearch in Google Scholar
Michalik, J.S., Borysiewicz, M.J., 2009. Poważne awarie i zagrożenia terrorystyczne instalacji chemicznych – metody oceny podatności na zagrożenia (Serious Failures and Terrorist Threats of Chemical Installations - Methods of Vulnerability Assessment). Bezpieczeństwo Pracy, 1, pp.2–5.MichalikJ.S.BorysiewiczM.J.2009Poważne awarie i zagrożenia terrorystyczne instalacji chemicznych – metody oceny podatności na zagrożenia (Serious Failures and Terrorist Threats of Chemical Installations - Methods of Vulnerability Assessment)Bezpieczeństwo Pracy125Search in Google Scholar
Mider, D., 2017. Polacy wobec przemocy politycznej (Poles Against Political Violence). Warszawa (Poland): Dom Wydawniczy „Elipsa”.MiderD.2017Polacy wobec przemocy politycznej (Poles Against Political Violence)Warszawa (Poland)Dom Wydawniczy „Elipsa”Search in Google Scholar
Morgan, L., Hintermann, F., Vazirani, M., 2016. Five Ways to Win with Digital Platforms. Dublin (Ireland): Accenture.MorganL.HintermannF.VaziraniM.2016Five Ways to Win with Digital PlatformsDublin (Ireland)AccentureSearch in Google Scholar
Neittaanmäki, P., Galeieva, E., Ogbechie, A., 2016. Platform Economy & Digital Platforms. Jyväskylä (Finland): Jyväskylän yliopisto.NeittaanmäkiP.GaleievaE.OgbechieA.2016Platform Economy & Digital PlatformsJyväskylä (Finland)Jyväskylän yliopistoSearch in Google Scholar
Oxera Consulting, 2015. Benefits of online platforms. Retrieved from https://www.oxera.com/getmedia/84df70f3-8fe0-4ad1-b4ba-d235ee50cb30/The-benefits-of-online-platforms-main-findings-(October-2015).pdf.aspx?ext=.pdf.Oxera Consulting2015Benefits of online platformsRetrieved from https://www.oxera.com/getmedia/84df70f3-8fe0-4ad1-b4ba-d235ee50cb30/The-benefits-of-online-platforms-main-findings-(October-2015).pdf.aspx?ext=.pdf.Search in Google Scholar
PwC, 2016. W obronie cyfrowych granic, czyli 5 rad, aby realnie wzmocnić ochronę firmy przed cyber atakiem (In Defense of Digital Borders, or 5 Tips to Really Strengthen Your Company's Protection against Cyber Attacks). Warszawa (Poland): PwC.PwC2016W obronie cyfrowych granic, czyli 5 rad, aby realnie wzmocnić ochronę firmy przed cyber atakiem (In Defense of Digital Borders, or 5 Tips to Really Strengthen Your Company's Protection against Cyber Attacks)Warszawa (Poland)PwCSearch in Google Scholar
Scarfone, K., Mell, P., 2009. An Analysis of CVSS Version 2 Vulnerability Scoring. In: 3rd International Symposium on Empirical Software Engineering and Measurement, pp.516–525. Massachusetts (DC): ILEE Computer Society.ScarfoneK.MellP.2009An Analysis of CVSS Version 2 Vulnerability ScoringIn:3rd International Symposium on Empirical Software Engineering and Measurement516525Massachusetts (DC)ILEE Computer Society10.1109/ESEM.2009.5314220Search in Google Scholar
Sibalija, T., 2011. European Technology Platforms as a generator of new technologies and innovation. Retrieved from https://www.researchgate.net/publication/259485228_European_Technology_Platforms_as_a_generator_of_new_technologies_and_innovation.SibalijaT.2011European Technology Platforms as a generator of new technologies and innovationRetrieved from https://www.researchgate.net/publication/259485228_European_Technology_Platforms_as_a_generator_of_new_technologies_and_innovation.Search in Google Scholar
Siemaszko, A., Snarska-Świderska, M., 2012. Polskie Platformy Technologiczne. In: A. Bąkowski, M. Mażewska (Eds.), Ośrodki innowacji i przedsiębiorczości w Polsce. Raport (Innovation and Entrepreneurship Centers in Poland. Report) 2012, pp.169–172. Warszawa (Poland): Polska Agencja Rozwoju Przedsiębiorczości.SiemaszkoA.Snarska-ŚwiderskaM.2012Polskie Platformy TechnologiczneIn:BąkowskiA.MażewskaM.(Eds.),Ośrodki innowacji i przedsiębiorczości w Polsce. Raport (Innovation and Entrepreneurship Centers in Poland. Report)2012169172Warszawa (Poland)Polska Agencja Rozwoju PrzedsiębiorczościSearch in Google Scholar
Statista, 2017. Industries Impacted by Cyber Attacks Worldwide. Retrieved from https://www.statista.com/statistics/784590/cyber-attacks-on-industries-worldwide-2017/.Statista2017Industries Impacted by Cyber Attacks WorldwideRetrieved from https://www.statista.com/statistics/784590/cyber-attacks-on-industries-worldwide-2017/.Search in Google Scholar
Stouffer, K.A., 2004. System Protection Profile - Industrial Control Systems Version 1.0. Gaithersburg (MD): National Institute of Standards and Technology.StoufferK.A.2004System Protection Profile - Industrial Control Systems Version 1.0.Gaithersburg (MD)National Institute of Standards and TechnologySearch in Google Scholar
Sun, R., Keating, B., Gregor, S., 2015. Information Technology Platforms: Definition and Research Directions. In: F. Burstein, H. Scheepers, G. Deegan (Eds.), Proceedings of the 26th Australasian Conference on Information Systems (ACIS), 2015, pp.1–17. Auckland (New Zealand): University of Technology Sydney.SunR.KeatingB.GregorS.2015Information Technology Platforms: Definition and Research DirectionsIn:BursteinF.ScheepersH.DeeganG.(Eds.),Proceedings of the 26th Australasian Conference on Information Systems (ACIS)2015117Auckland (New Zealand)University of Technology SydneySearch in Google Scholar
Śliwa, M., Patalas-Maliszewska, J., 2016. A Strategic Knowledge Map for the Research and Development Department in a Manufacturing Company. Foundations of Management, Vol. 8, Issue 1, pp.151–166. https://doi.org/10.1515/fman-2016-0012.ŚliwaM.Patalas-MaliszewskaJ.2016A Strategic Knowledge Map for the Research and Development Department in a Manufacturing CompanyFoundations of Management81151166https://doi.org/10.1515/fman-2016-0012.10.1515/fman-2016-0012Search in Google Scholar
Wintermeyer, L., Markowa, D., 2017. A Development in Open Innovation. Industry Sandbox Consultation Report. London (UK): Industry Sandbox.WintermeyerL.MarkowaD.2017A Development in Open Innovation. Industry Sandbox Consultation ReportLondon (UK)Industry SandboxSearch in Google Scholar