This work is licensed under the Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.
Borowik, M., Maśniak, L., Kroplewski, R., Romaniec, H., 2018. Przemysł +. Gospodarka oparta o dane (Industry +. Data-driven Economy). Warszawa (Poland): Ministerstwo Cyfryzacji.BorowikM.MaśniakL.KroplewskiR.RomaniecH.2018Warszawa (Poland)Ministerstwo CyfryzacjiSearch in Google Scholar
Borysiewicz, M.J., Michalik, J.S., 2007. Cyberbezpieczeństwo przemysłowych systemów sterowania. Bezpieczeństwo Pracy (Cybersecurity of Industrial Control Systems. Work Safety), 10, pp.8–11.BorysiewiczM.J.MichalikJ.S.2007Cyberbezpieczeństwo przemysłowych systemów sterowania10811Search in Google Scholar
Busch, C., Dannemann, G., Schulte-Nölke, H., Wiewiórkowska-Domagalska, A., Zoll, F., 2016. Research Group on the Law of Digital Services, Discussion Draft of a Directive on Online Intermediary Platforms. Journal of European Consumer and Market Law, 5, pp.164–169.BuschC.DannemannG.Schulte-NölkeH.Wiewiórkowska-DomagalskaA.ZollF.2016Research Group on the Law of Digital Services, Discussion Draft of a Directive on Online Intermediary Platforms5164169Search in Google Scholar
Constantinides, P., Henfridsson, O., Parker, G., 2018. Platforms and Infrastructures in the Digital Age. Information Systems Research, 2, pp.1–20.ConstantinidesP.HenfridssonO.ParkerG.2018Platforms and Infrastructures in the Digital Age212010.1287/isre.2018.0794Search in Google Scholar
Corin Stig, D., 2015. Technology Platforms. Organizing and Assessing Technological Knowledge to Support its Reuse in New Applications. Gothenburg (Sweden): Department of Product and Production Development Chalmers University of Technology.Corin StigD.2015Gothenburg (Sweden)Department of Product and Production Development Chalmers University of TechnologySearch in Google Scholar
Deloitte, 2017. Industry 4.0 and Cybersecurity. Managing Risk in Age of Connected Production. London (UK): Deloitte University Press.Deloitte2017London (UK)Deloitte University PressSearch in Google Scholar
De Marco, C.E., Di Minin, A., Marullo, C., Nepelski, D., 2019. Digital Platform Innovation in European SMEs. An analysis of SME Instrument Business Proposals and Case Studies. Luxembourg (Luxembourg): Publications Office of the European Union.De MarcoC.E.Di MininA.MarulloC.NepelskiD.2019Luxembourg (Luxembourg)Publications Office of the European UnionSearch in Google Scholar
De Reuver, M., Sørensen, C., Basole, R.C., 2015. The Digital Platforms: A Research Agenda. Journal of Information Technology, 4, pp.124–135.De ReuverM.SørensenC.BasoleR.C.2015The Digital Platforms: A Research Agenda412413510.1057/s41265-016-0033-3Search in Google Scholar
Diego G.S. Pivoto, Luiz F.F. de Almeida, Rodrigo da Rosa Righi, Joel J.P.C. Rodrigues, Alexandre Baratella Lugli, Antonio M. Alberti, 2021. Cyber-physical Systems Architectures for Industrial Internet of Things Applications in Industry 4.0: A literature review. Journal of Manufacturing Systems, Volume 58, Part A, pp.176–192, ISSN 0278-6125, https://doi.org/10.1016/j.jmsy.2020.11.017.PivotoDiego G.S.de AlmeidaLuiz F.F.da Rosa RighiRodrigoRodriguesJoel J.P.C.LugliAlexandre BaratellaAlbertiAntonio M.2021Cyber-physical Systems Architectures for Industrial Internet of Things Applications in Industry 4.0: A literature review58Part A,176192ISSN 0278-6125, https://doi.org/10.1016/j.jmsy.2020.11.017.10.1016/j.jmsy.2020.11.017Search in Google Scholar
Ervural, B.C., Ervural, B., 2017. Overview of Cyber Security in the Industry 4.0 Era. In: A. Ustundag, E. Cevikcan (Eds.), Industry 4.0: Managing The Digital Transformation, pp.267–284). Cham (Switzerland): Springer.ErvuralB.C.ErvuralB.2017Overview of Cyber Security in the Industry 4.0 EraIn:UstundagA.CevikcanE.(Eds.),267284Cham (Switzerland)Springer10.1007/978-3-319-57870-5_16Search in Google Scholar
Frühwirth, C., Männistö, T., 2009. Improving CVSS-based Vulnerability Prioritization and Response with Context Information. In: 2009 3rd International Symposium on Empirical Software Engineering and Measurement, pp.535–544. Massachusetts (DC): ILEE Computer Society.FrühwirthC.MännistöT.2009Improving CVSS-based Vulnerability Prioritization and Response with Context InformationIn:535544Massachusetts (DC)ILEE Computer Society10.1109/ESEM.2009.5314230Search in Google Scholar
Gerrikagoitia, J.K., Unamuno, G., Urkia, E., Serna, A., 2019. Digital Manufacturing Platforms in the Industry 4.0 from Private and Public Perspectives. Applied Sciences, 9, pp.2934–2946.GerrikagoitiaJ.K.UnamunoG.UrkiaE.SernaA.2019Digital Manufacturing Platforms in the Industry 4.0 from Private and Public Perspectives92934294610.3390/app9142934Search in Google Scholar
Gerring, J., 2001. Social Science Methodology: A Criterial Framework. New York (NY): Cambridge University Press.GerringJ.2001New York (NY)Cambridge University Press10.1017/CBO9780511815492Search in Google Scholar
Hretcanu, C.I., 2015. Current Trends in the Knowledge Economy. Ecoforum, 2, pp.170–175.HretcanuC.I.2015Current Trends in the Knowledge Economy2170175Search in Google Scholar
Kaplan, J., Richter, W., Ware, D., 2019. Cybersecurity: Linchpin of the Digital Enterprise. As Companies Digitize Businesses and Automate Operations, Cyberrisks Proliferate; Here Is How. New York (NY): McKinsey & Company.KaplanJ.RichterW.WareD.2019New York (NY)McKinsey & CompanySearch in Google Scholar
Kenney, M., Rouvinen, P., Seppälä, T., Zysman, J., 2019. Platforms and Industrial Change. Industry and Innovation, 8, pp.871–879.KenneyM.RouvinenP.SeppäläT.ZysmanJ.2019Platforms and Industrial Change887187910.1080/13662716.2019.1602514Search in Google Scholar
Kozak, A., Kościelny, M., Pacyna, P., Gołębiewski, D., Paturej, K., Świątkowska, J., 2016. Cyberbezpieczeństwo instalacji przemysłowych – fundament projektu „Industry 4.0” i szansa dla Polski (Cybersecurity of Industrial Installations - the Foundation of the “Industry 4.0” Project and an Opportunity for Poland). Kraków (Poland): Instytut Kościuszki.KozakA.KościelnyM.PacynaP.GołębiewskiD.PaturejK.ŚwiątkowskaJ.2016Kraków (Poland)Instytut KościuszkiSearch in Google Scholar
Kozłowski, A., 2017. Cyberbezpieczeństwo kluczem do sukcesu przemysłu 4.0 (Cybersecurity Is the Key to the Success of Industry 4.0). Retrieved from https://fibis.pl/zagadnienia/czynniki/.KozłowskiA.2017Retrieved from https://fibis.pl/zagadnienia/czynniki/.Search in Google Scholar
Krajowy Punkt Kontaktowy (2003). Polskie Platformy Technologiczne (Polish Technology Platforms). Retrieved from https://www.kpk.gov.pl/innowacje/polskie-platformy-technologiczne.Krajowy Punkt Kontaktowy2003Retrieved from https://www.kpk.gov.pl/innowacje/polskie-platformy-technologiczne.Search in Google Scholar
Kukuła, A.J., 2013. Knowledge-based Economy as an Economic Development Strategy for the Twenty-first Century. In: M. Chorośnicki, J. Węc, A. Czubik, A. Głogowski, I. Krzyżanowska-Skowronek, A. Nitszke, E. Szczepankiewicz-Rudzka, M. Tarnawski (Eds.), New Strategies for the New Century. The limits and possibilities of regional and global integration, pp.563–574. Kraków (Poland): Kontekst Press.KukułaA.J.2013Knowledge-based Economy as an Economic Development Strategy for the Twenty-first CenturyIn:ChorośnickiM.WęcJ.CzubikA.GłogowskiA.Krzyżanowska-SkowronekI.NitszkeA.Szczepankiewicz-RudzkaE.TarnawskiM.(Eds.),563574Kraków (Poland)Kontekst PressSearch in Google Scholar
Leszczyna, R., 2019. Cybersecurity in the Electricity Sector: Managing Critical Infrastructure. Cham (Switzerland): Springer.LeszczynaR.2019Cham (Switzerland)Springer10.1007/978-3-030-19538-0Search in Google Scholar
Maass, M., Sales, A., Chung, B., Sunshine, J., 2016. A Systematic Analysis of the Science of Sandboxing. PeerJ Computer Science, 2, pp.1–36.MaassM.SalesA.ChungB.SunshineJ.2016A Systematic Analysis of the Science of Sandboxing213610.7717/peerj-cs.43Search in Google Scholar
Malladi, SS, Subramanian, HC., 2020. Bug Bounty Programs for Cyber Security: Practices, Issues and Recommendations. IEEE Software, 1, pp.31–39.MalladiSSSubramanianHC.2020Bug Bounty Programs for Cyber Security: Practices, Issues and Recommendations1313910.1109/MS.2018.2880508Search in Google Scholar
Mell, P.M., Scarfone, K.A., Romanosky, S., 2007. A Complete Guide to the Common Vulnerability Scoring System Version 2.0. Gaithersburg (MD): National Institute of Standards and Technology.MellP.M.ScarfoneK.A.RomanoskyS.2007Gaithersburg (MD)National Institute of Standards and TechnologySearch in Google Scholar
Michalik, J.S., Borysiewicz, M.J., 2009. Poważne awarie i zagrożenia terrorystyczne instalacji chemicznych – metody oceny podatności na zagrożenia (Serious Failures and Terrorist Threats of Chemical Installations - Methods of Vulnerability Assessment). Bezpieczeństwo Pracy, 1, pp.2–5.MichalikJ.S.BorysiewiczM.J.2009Poważne awarie i zagrożenia terrorystyczne instalacji chemicznych – metody oceny podatności na zagrożenia (Serious Failures and Terrorist Threats of Chemical Installations - Methods of Vulnerability Assessment)125Search in Google Scholar
Mider, D., 2017. Polacy wobec przemocy politycznej (Poles Against Political Violence). Warszawa (Poland): Dom Wydawniczy „Elipsa”.MiderD.2017Warszawa (Poland)Dom Wydawniczy „Elipsa”Search in Google Scholar
Morgan, L., Hintermann, F., Vazirani, M., 2016. Five Ways to Win with Digital Platforms. Dublin (Ireland): Accenture.MorganL.HintermannF.VaziraniM.2016Dublin (Ireland)AccentureSearch in Google Scholar
Neittaanmäki, P., Galeieva, E., Ogbechie, A., 2016. Platform Economy & Digital Platforms. Jyväskylä (Finland): Jyväskylän yliopisto.NeittaanmäkiP.GaleievaE.OgbechieA.2016Jyväskylä (Finland)Jyväskylän yliopistoSearch in Google Scholar
Oxera Consulting, 2015. Benefits of online platforms. Retrieved from https://www.oxera.com/getmedia/84df70f3-8fe0-4ad1-b4ba-d235ee50cb30/The-benefits-of-online-platforms-main-findings-(October-2015).pdf.aspx?ext=.pdf.Oxera Consulting2015Retrieved from https://www.oxera.com/getmedia/84df70f3-8fe0-4ad1-b4ba-d235ee50cb30/The-benefits-of-online-platforms-main-findings-(October-2015).pdf.aspx?ext=.pdf.Search in Google Scholar
PwC, 2016. W obronie cyfrowych granic, czyli 5 rad, aby realnie wzmocnić ochronę firmy przed cyber atakiem (In Defense of Digital Borders, or 5 Tips to Really Strengthen Your Company's Protection against Cyber Attacks). Warszawa (Poland): PwC.PwC2016Warszawa (Poland)PwCSearch in Google Scholar
Scarfone, K., Mell, P., 2009. An Analysis of CVSS Version 2 Vulnerability Scoring. In: 3rd International Symposium on Empirical Software Engineering and Measurement, pp.516–525. Massachusetts (DC): ILEE Computer Society.ScarfoneK.MellP.2009An Analysis of CVSS Version 2 Vulnerability ScoringIn:516525Massachusetts (DC)ILEE Computer Society10.1109/ESEM.2009.5314220Search in Google Scholar
Sibalija, T., 2011. European Technology Platforms as a generator of new technologies and innovation. Retrieved from https://www.researchgate.net/publication/259485228_European_Technology_Platforms_as_a_generator_of_new_technologies_and_innovation.SibalijaT.2011Retrieved from https://www.researchgate.net/publication/259485228_European_Technology_Platforms_as_a_generator_of_new_technologies_and_innovation.Search in Google Scholar
Siemaszko, A., Snarska-Świderska, M., 2012. Polskie Platformy Technologiczne. In: A. Bąkowski, M. Mażewska (Eds.), Ośrodki innowacji i przedsiębiorczości w Polsce. Raport (Innovation and Entrepreneurship Centers in Poland. Report) 2012, pp.169–172. Warszawa (Poland): Polska Agencja Rozwoju Przedsiębiorczości.SiemaszkoA.Snarska-ŚwiderskaM.2012Polskie Platformy TechnologiczneIn:BąkowskiA.MażewskaM.(Eds.),2012169172Warszawa (Poland)Polska Agencja Rozwoju PrzedsiębiorczościSearch in Google Scholar
Statista, 2017. Industries Impacted by Cyber Attacks Worldwide. Retrieved from https://www.statista.com/statistics/784590/cyber-attacks-on-industries-worldwide-2017/.Statista2017Retrieved from https://www.statista.com/statistics/784590/cyber-attacks-on-industries-worldwide-2017/.Search in Google Scholar
Stouffer, K.A., 2004. System Protection Profile - Industrial Control Systems Version 1.0. Gaithersburg (MD): National Institute of Standards and Technology.StoufferK.A.2004Gaithersburg (MD)National Institute of Standards and TechnologySearch in Google Scholar
Sun, R., Keating, B., Gregor, S., 2015. Information Technology Platforms: Definition and Research Directions. In: F. Burstein, H. Scheepers, G. Deegan (Eds.), Proceedings of the 26th Australasian Conference on Information Systems (ACIS), 2015, pp.1–17. Auckland (New Zealand): University of Technology Sydney.SunR.KeatingB.GregorS.2015Information Technology Platforms: Definition and Research DirectionsIn:BursteinF.ScheepersH.DeeganG.(Eds.),2015117Auckland (New Zealand)University of Technology SydneySearch in Google Scholar
Śliwa, M., Patalas-Maliszewska, J., 2016. A Strategic Knowledge Map for the Research and Development Department in a Manufacturing Company. Foundations of Management, Vol. 8, Issue 1, pp.151–166. https://doi.org/10.1515/fman-2016-0012.ŚliwaM.Patalas-MaliszewskaJ.2016A Strategic Knowledge Map for the Research and Development Department in a Manufacturing Company81151166https://doi.org/10.1515/fman-2016-0012.10.1515/fman-2016-0012Search in Google Scholar
Wintermeyer, L., Markowa, D., 2017. A Development in Open Innovation. Industry Sandbox Consultation Report. London (UK): Industry Sandbox.WintermeyerL.MarkowaD.2017London (UK)Industry SandboxSearch in Google Scholar