Get 20M+ Full-Text Papers For Less Than $1.50/day. Start a 14-Day Trial for You or Your Team.

Learn More →

Digital Technologies’ Risks and Opportunities: Case Study of an RFID System

Digital Technologies’ Risks and Opportunities: Case Study of an RFID System Article Digital Technologies’ Risks and Opportunities: Case Study of an RFID System 1 1 , 2 3 4 Lina Naciri , Maryam Gallab * , Aziz Soulhi , Safae Merzouk and Mario Di Nardo MIS-LISTD Laboratory, Computer Science Department, Mines-Rabat School (ENSMR), Rabat 10000, Morocco; lina.naciry@gmail.com Mines-Rabat School (ENSMR), Rabat 10000, Morocco SMARTILAB Laboratory, EMP Department, Moroccan School of Engineering Sciences (EMSI), Rabat 10000, Morocco Department of Chemical, Materials and Production Engineering, University of Naples “Federico ii”, 80125 Naples, Italy * Correspondence: gallab@enim.ac.ma Abstract: Smart technologies have been the subject of a growing interest for the past few years due to the growing market demand. They are believed to improve human life, existence, and companies’ performance. Considering the recent advances, X.0 concept has proven to be a mindset changing so that companies can now see that they can improve their competitiveness, ensure an innovative, sustainable and resilient environment, and smarten and develop their lean manufacturing tools. Nevertheless, if X.0 adoption is still not at its highest level, it is because of the relevant challenges and difficulties that occur during the implementation process. Within this scope, this paper aims, through a systematic literature review, to identify risks and opportunities of X.0 technologies to constitute a referential to be taken into consideration for a successful implementation. Results are validated by the modelling and simulation of an RFID system applied within the automotive industry, for which we identified risks and opportunities from one side and the system contribution in terms of smart Lean Manufacturing. From one hand, the value added of this paper, on the contrary of previous researches, is mainly regrouping risks and opportunities of most relevant digital technologies to conclude on those of X.0 revolution as a concept as described in following sections. From another hand, we Citation: Gallab, M.; Naciri, L.; were able to prove, through a real case study, that X.0 concept directly contribute in smartening and Soulhi, A.; Merzouk, S.; Di Nardo, M. improving lean manufacturing principles. Digital Technologies’ Risks and Opportunities: Case Study of an Keywords: innovative; sustainable; resilient; modeling; risk and opportunities; simulation; X.0 RFID System. Appl. Syst. Innov. 2023, technologies; lean manufacturing 6, 54. https://doi.org/10.3390/ asi6030054 Academic Editors: Felix J. Garcia Clemente and Christos Douligeris 1. Introduction Received: 23 March 2023 Considering the growing demand and competition pressure, digital technologies were Revised: 7 April 2023 the most suitable solution for the growing industrial world. Each year, more countries show Accepted: 25 April 2023 interest and appear to be involved in adopting the digitalization concept. This paradigm has Published: 4 May 2023 seen the light in Germany during the Hanover fair held in 2011 [1]. Researchers interested in exploring the different sectors that are involved and open to investing in revolutionary technologies showed that the three main active sectors were the automotive, aerospace and the food industry [2]. Copyright: © 2023 by the authors. As stated in Figure 1, digital technologies were discovered in 1940 and merged their Licensee MDPI, Basel, Switzerland. benefits over the years to constitute a whole new revolution: the 4th industrial revolution. This article is an open access article This concept gave birth to what we call Industry 4.0 technologies and kept growing by distributed under the terms and introducing new aspects such as environment, social and economic fields. According to this, conditions of the Creative Commons Industry 4.0 moved to the next level: 5.0 technologies. X.0 is therefore used in this paper to Attribution (CC BY) license (https:// creativecommons.org/licenses/by/ talk about all aspects of these new revolutions. These technologies were the most crucial 4.0/). factor for company development [3]. Studies have shown that the most used ones are Appl. Syst. Innov. 2023, 6, 54. https://doi.org/10.3390/asi6030054 https://www.mdpi.com/journal/asi Appl. Syst. Innov. 2023, 6, x FOR PEER REVIEW 2 of 18 Appl. Syst. Innov. 2023, 6, 54 2 of 18 crucial factor for company development [3]. Studies have shown that the most used ones IoT/IIoT, big data, cloud computing, RFID, 3D printing, simulation, robotics, augmented are IoT/IIoT, big data, cloud computing, RFID, 3D printing, simulation, robotics, aug- reality mented rea and cyber lity a-security nd cyber- [se 4,5 c], urthe ity [last 4,5],being the ladir st b ectly eing rd elated irectly r toeblockchain. lated to blocThe kchawhole in. The constitutes whole conthe stitu 10 tepillar s the 1technologies 0 pillar techn and olog companies’ ies and com leaders panies’to lea an ders innovative, to an inno sustainable vative, sus- and resilient environment and smart Lean Manufacturing. tainable and resilient environment and smart Lean Manufacturing. Figure 1. Industrial revolutions through the years. Figure 1. Industrial revolutions through the years. As mentioned in ISO 31000, “Risk management is an integral part of all organiza- As mentioned in ISO 31000, “Risk management is an integral part of all organizational activities” tional activ [6it ].ieAccor s” [6].ding Accor to dithis, ng to t implementing his, implement smart ing stechnologies mart technolog cannot ies can be not realized be real- without ized wit ahpr ou evious t a prev risk ious r analysis, isk analysi which s, wconstitutes hich constitthe utes t second he secaspect ond asp of ec this t of t rh esear is rech. searIn ch. this In t paper his pa , p the er,risk the r was isk w associated as associa with ted w challenges, ith challen barriers ges, barand riers a difn ficulties, d difficu and lties, they andmay they constitute may const ait risk ute a themselves. risk themselves. Based on the result of an extensive literature review, this paper begins with an overview Based on the result of an extensive literature review, this paper begins with an over- of the most relevant advantages. Then it identifies the risks and barriers that should be view of the most relevant advantages. Then it identifies the risks and barriers that should considered before adopting the digitalization concept. This review is followed by the be considered before adopting the digitalization concept. This review is followed by the modelling and simulation of a case study presenting the RFID system adopted by an modelling and simulation of a case study presenting the RFID system adopted by an au- automotive company to enhance the performance of its feeding process. The choice of this tomotive company to enhance the performance of its feeding process. The choice of this case study goes back to the fact that the RFID system represents a relevant example of case study goes back to the fact that the RFID system represents a relevant example of smart lean manufacturing application. smart lean manufacturing application. 2. Contribution and Research Methodology 2. Contribution and Research Methodology Several research studies have exposed and detailed technologies of the most recent Several research studies have exposed and detailed technologies of the most recent industrial revolution. Many have discussed their opportunities and challenges, focusing industrial revolution. Many have discussed their opportunities and challenges, focusing on how this revolution improved the world [7,8]. Each of these studies was focused on a on how this revolution improved the world [7,8]. Each of these studies was focused on a specific field and, therefore, only interested in the technologies that can be useful in the specific field and, therefore, only interested in the technologies that can be useful in the studied area. No overview of the global risks and opportunities was provided, considering studied area. No overview of the global risks and opportunities was provided, consider- all kinds of possible applications of X.0 technologies. ing all kinds of possible applications of X.0 technologies. The contribution of this paper is to develop these studies to gather all technologies’ The contribution of this paper is to develop these studies to gather all technologies’ opportunities and challenges in the same study, thus enabling the exploration of the opportunities and challenges in the same study, thus enabling the exploration of the dif- different benefits that X.0 technologies can bring to a company. ferent benefits that X.0 technologies can bring to a company. This paper also highlights the importance of establishing a risk analysis strategy, as This paper also highlights the importance of establishing a risk analysis strategy, as many risks and barriers may arise. In this case, preventive actions should be prepared as many risks and barriers may arise. In this case, preventive actions should be prepared as a countermeasure. a countermeasure. Targeted readers are researchers of all expertise levels and from diverse research Targeted readers are researchers of all expertise levels and from diverse research backgrounds. backgrounds. This research was developed following the five phases of a Systematic Literature This research was developed following the five phases of a Systematic Literature Re- Review (SLR), starting by defining the problem and formulating the research questions, view (SLR), starting by defining the problem and formulating the research questions, se- selecting databases, and then defining the inclusion and exclusion criteria along with the lecting databases, and then defining the inclusion and exclusion criteria along with the keywords. The next step was searching for relevant papers investigating digital technolo- keywords. The next step was searching for relevant papers investigating digital technol- gies’ benefits, challenges, or both. Analysis results and synthesis are reported in this paper ogies’ benefits, challenges, or both. Analysis results and synthesis are reported in this pa- along with a discussion, thus being the two last phases of an SLR. Elements of each phase per along with a discussion, thus being the two last phases of an SLR. Elements of each are presented in Figure 2. phase are presented in Figure 2. Appl. Syst. Innov. 2023, 6, x FOR PEER REVIEW 15 of 18 opportunities identified during our research on RFID technology, as well as the im- portance and benefit of using simulation. Indeed, results showed that the RFID system would bring many improvement opportunities by eliminating MUDAs and facilitating communication when simulation supported the decision-making process that was com- pleted by a preventive action plan to overcome detected risks and weaknesses. In terms of perspectives, we aim to reinforce this research with a statistical study based on a survey, from which we can come up with lessons learned from smart factories, but also reflect risk and barriers occurrence during the implementation of revolutionary technologies. In addition to that, since the articles studied didn’t rely on a specific risk analysis system or tool, it is interesting to define which risk assessment strategy/tool is suitable for each technology. Author Contributions: Conceptualization, L.N. and M.G.; methodology, L.N.; software, L.N. and M.G.; validation, M.G., A.S., S.M. and M.D.N.; formal analysis, L.N. and M.G.; investigation, L.N. and M.G.; resources, L.N. and M.G.; data curation, L.N. and M.G.; writing—original draft prepara- tion, L.N.; writing—review and editing, L.N. and M.G.; visualization, M.G., A.S., S.M. and M.D.N.; supervision, M.G. All authors have read and agreed to the published version of the manuscript. Funding: This research received no external funding. Institutional Review Board Statement: Not applicable. Informed Consent Statement: Not applicable. Data Availability Statement: Not applicable. Appl. Syst. Innov. 2023, 6, 54 3 of 18 Conflicts of Interest: The authors declare no conflict of interest. Figure 2. SLR phases. References 1. Marzano, G.; Martinovs, A. Teaching Industry 4.0. Soc. Integr. Educ. Proc. Int. Sci. Conf. 2020, 2, 69–76. The problem of this research was basically concerning risks and opportunities of digital 2. Gallab, M.; Bouloiz, H.; Kébé, A.S.; Tkiouat, M. Opportunities and Challenges of the Industry 4.0 in industrial companies: A technologies and was conducted by gathering papers from the most relevant databases Survey on Moroccan firms. J. Ind. Bus. Econ. 2021, 48, 413–439. 3. Relich, M. The impact of (Elsevier ICT on labor produ , Springer ctivity in the , IEEE, etc.) EU. using Inf. Technol. specific Dev. keywor 2017, 23, 7 ds 06–722. such as the combination of “digital 4. Marina, M.; Abrar Ali, D.; Mukund, J.; Izabela, N. Lean manufacturing and Industry 4.0 combinative application: Practices and technologies” with “Risks”, “Barriers”, “Benefits”, “Opportunities”, etc., and focusing on perceived benefits. IFAC PapersOnLine 2021, 54, 288–293. specific criteria (Scopus indexation, English usage, paper type, etc.). This paper reflects the 5. McKiea, M.G.; Jonesb, R.; Milesc, J.; Jonesd, I.R. Improving Lean Manufacturing Systems and Tools Engagement Through the result of analyzing the 101 selected papers. Utilisation of Industry 4.0. Improved Communication and a People Recognition Methodology in a UK Engine Manufacturing This review was concretized through the analysis of a model describing the solution adopted Centre. Procedia Manuf. 2021, 55, 371–382. 6. ISO 31000.2018; Risk Management—Guidelines. International Organization for Standardization ISO Central Secretariat: Ge- by an automotive company to increase the performance of its feeding process. A simulation was neva, Switzerland, 2018. also performed to detect the changes that occurs after implementing the new system. 7. Sishi, M.; Telukdarie, A. Implementation of Industry 4.0 technologies in the mining industry—A case study. Int. J. Min. Miner. Eng. 2020, 11, 1–22. 3. X.0 Technologies 8. Frank, A.G.; Dalenogare, L.S.; Ayala, N.F. Industry 4.0 technologies: Implementation patterns in Manufacturing companies. Int. Digitalization can be defined as the integration of digital technologies within the J. Prod. Econ. 2019, 210, 15–26. production systems to make tasks more autonomous, flexible, efficient and safe since it limits the physical contact between machines and humans. It is a new way of Manufacturing where manual operations are nearly absent, and resources are used in an efficient way. This opening on digital technologies raises new challenges, mainly regarding cybersecurity. This section develops the advantages and challenges of the 10 pillar smart technologies. 3.1. 3D printing/Additive Manufacturing (AM) Also called additive Manufacturing, printing advanced technologies, being easy to manufacture, are highly used for research matters and to develop new products. Associated with waste reduction, energy efficiency, and decreased resource involvement, it allows more flexibility in product manufacturing and a quick and efficient process [9,10]. AM had a remarkable contribution within the medical field, especially regarding Appl. Syst. Innov. 2023, 6, x FOR PEER REVIEW 4 of 18 prosthetics (bone and cartilage replacements), dental implants, hearing aids, and other products, as shown in Figure 3 [11–14]. Figure 3. AM contribution within the medical field [15]. Figure 3. AM contribution within the medical field [15]. One of the most important advantages of AM is its opportunity to create customized products of multiple forms [16]. Shape complexity, scrap generation, accuracy and preci- sion are no longer an issue. However, depending on the process used (Stereolithography, Fused Deposition Modelling, Powder Bed Fusion, Selective Laser Sintering, Binder Jet- ting, Direct Energy Deposition or Laminated Object Manufacturing), 3D printing presents many risks and complications, such as high cost and slow/Time-consuming process [10]. The first challenge to consider is choosing the right AM process, which includes selecting the suitable material. Indeed, some 3D printers have low dimensional accuracy, low lifespan, poor mechanical properties and powder agglomeration limitation. Therefore, de- pending on the final usage, a limited material choice can exist. Other barriers to consider are the necessity of staff re-education and the lack of guidelines [15]. 3.2. Augmented Reality Augmented reality (AR) is an emergent technology commonly known for its ability to allow interactive digital information in the real world and in real time, combining vir- tual and real environments. Therefore, it is a promising technology supporting knowledge-intensive works [17]. AR strength goes back to its variant application domains such as education [18,19], medicine [20], manual assembly and Manufacturing [21,22] and maintenance [22–24]. However, it is growing in wider fields such as healthcare, military operations, marketing, and others [25]. Other popular applications of AR include training [26], remote support [27] and context-sensitive instructions [28], thus enabling users to improve various task performance metrics such as completion time, accuracy, sources of error identification [29] and human error reduction by relieving mental fatigue, [30]. Moreover, when it comes to prototyping, AR is a perfect tool for cost reduction and can be used as decision support through simulation and without any risk to operator safety [31]. Nevertheless, the main roadblock to AR adoption is usually the expensive equipment required [32] and the need for cognitive skills, which is not yet ensured as there’s still insufficient awareness of AR staff technologies caused by a lack of information on stand- ardized procedures. The complexity of its implementation and the high risk of cyber security issues are also considered major risks that may discourage companies from adopting AR [31]. 3.3. Robotics Recently, whether they are industrial or service-oriented, Robots have seen increas- ing success across the globe. Indeed, the International Federation of Robotics (IFR) men- tions that its annual turnover is $50 billion [33], which is far from surprising considering its various features as shown in Figure 4. Appl. Syst. Innov. 2023, 6, 54 4 of 18 One of the most important advantages of AM is its opportunity to create customized products of multiple forms [16]. Shape complexity, scrap generation, accuracy and precision are no longer an issue. However, depending on the process used (Stereolithography, Fused Deposition Modelling, Powder Bed Fusion, Selective Laser Sintering, Binder Jetting, Direct Energy Deposition or Laminated Object Manufacturing), 3D printing presents many risks and complications, such as high cost and slow/Time-consuming process [10]. The first challenge to consider is choosing the right AM process, which includes selecting the suitable material. Indeed, some 3D printers have low dimensional accuracy, low lifespan, poor mechanical properties and powder agglomeration limitation. Therefore, depending on the final usage, a limited material choice can exist. Other barriers to consider are the necessity of staff re-education and the lack of guidelines [15]. 3.2. Augmented Reality Augmented reality (AR) is an emergent technology commonly known for its ability to allow interactive digital information in the real world and in real time, combining virtual and real environments. Therefore, it is a promising technology supporting knowledge- intensive works [17]. AR strength goes back to its variant application domains such as education [18,19], medicine [20], manual assembly and Manufacturing [21,22] and mainte- nance [22–24]. However, it is growing in wider fields such as healthcare, military operations, marketing, and others [25]. Other popular applications of AR include training [26], remote support [27] and context-sensitive instructions [28], thus enabling users to improve various task performance metrics such as completion time, accuracy, sources of error identifica- tion [29] and human error reduction by relieving mental fatigue, [30]. Moreover, when it comes to prototyping, AR is a perfect tool for cost reduction and can be used as decision support through simulation and without any risk to operator safety [31]. Nevertheless, the main roadblock to AR adoption is usually the expensive equipment required [32] and the need for cognitive skills, which is not yet ensured as there’s still insufficient awareness of AR staff technologies caused by a lack of information on standardized procedures. The complexity of its implementation and the high risk of cyber security issues are also considered major risks that may discourage companies from adopting AR [31]. 3.3. Robotics Recently, whether they are industrial or service-oriented, Robots have seen increasing success across the globe. Indeed, the International Federation of Robotics (IFR) mentions that its annual turnover is $50 billion [33], which is far from surprising considering its Appl. Syst. Innov. 2023, 6, x FOR PEER REVIEW 5 of 18 various features as shown in Figure 4. Figure Figure 4 4. . K Key ey ffeatur eatures es ofof rob robots ots [34[]. 34 ]. Robots’ major asset is that they can be used in many different ways, either for labor- atory experiments [35], manufacturing, agriculture, farming and construction, or as a do- mestic or professional service. They can serve for housekeeping, safety or domestic assis- tance, surveillance, exploration or education. In the medical field, robots greatly enhance surgical operations and diagnostics and can also be used for nursing. By replacing human beings with a robot, either completely or partially (depending on the operation to be performed), companies will be able to eliminate redundant work- flows and human involvement in unsafe, repetitive and intensive tasks, enhance opera- tional efficiency, get quick access to data and information and reduce workload while be- ing able to handle complex tasks [34,36]. Furthermore, exploiting these advantages re- duces assembly time and monotony and improves quality and flexibility [37]. Regardless of the numerous advantages of robots, several threats must be consid- ered, mostly related to security (firmware, communication protocols, data storage, cryp- tography, control systems), cyber-criminality, actuation and movement accuracy and safety since robots can be unpredictable and potentially dangerous [38]. Furthermore, from an ethical point of view, people tend to express a remarkable resistance motivated by the fear of losing their job or impacting human relationships, especially concerning domestic robots or those dedicated to caring for our elderly and children [35,39]. The lack of knowledge can also explain this since robots require technical expertise and training. Sometimes, working alongside the robots can also be psychologically challenging for a human being [40]. 3.4. Cybersecurity Driven by the development of IoT, cloud computing …, data protection became the first concern of companies. Data loss or leakage can highly threaten business, notoriety and trust [41], which results in legal penalties and financial and reputation losses [42] and, in case of identity forgery, may lead to fake data/information and wrong status (sensors) [43]. It is a matter of a few minutes for an attacker to access and take control of the entire system just through one exploitable vulnerability [44]. Accordingly, cyber-security allows the company to protect computers, servers, mobile phones, and electronic systems from malicious attacks, protecting the information on these devices and the identity of people using them [45]. Cyber-security threats are divided into three categories: Cybercrime (Sabotage, Mon- etize), Cyber-attack (Information gathering) and Cyber-terrorism (System destruction) Appl. Syst. Innov. 2023, 6, 54 5 of 18 Robots’ major asset is that they can be used in many different ways, either for lab- oratory experiments [35], manufacturing, agriculture, farming and construction, or as a domestic or professional service. They can serve for housekeeping, safety or domestic assis- tance, surveillance, exploration or education. In the medical field, robots greatly enhance surgical operations and diagnostics and can also be used for nursing. By replacing human beings with a robot, either completely or partially (depending on the operation to be performed), companies will be able to eliminate redundant workflows and human involvement in unsafe, repetitive and intensive tasks, enhance operational efficiency, get quick access to data and information and reduce workload while being able to handle complex tasks [34,36]. Furthermore, exploiting these advantages reduces assembly time and monotony and improves quality and flexibility [37]. Regardless of the numerous advantages of robots, several threats must be considered, mostly related to security (firmware, communication protocols, data storage, cryptography, control systems), cyber-criminality, actuation and movement accuracy and safety since robots can be unpredictable and potentially dangerous [38]. Furthermore, from an ethical point of view, people tend to express a remarkable resistance motivated by the fear of losing their job or impacting human relationships, especially concerning domestic robots or those dedicated to caring for our elderly and children [35,39]. The lack of knowledge can also explain this since robots require technical expertise and training. Sometimes, working alongside the robots can also be psychologically challenging for a human being [40]. 3.4. Cybersecurity Driven by the development of IoT, cloud computing . . . , data protection became the first concern of companies. Data loss or leakage can highly threaten business, notoriety and trust [41], which results in legal penalties and financial and reputation losses [42] and, in case of identity forgery, may lead to fake data/information and wrong status (sensors) [43]. It is a matter of a few minutes for an attacker to access and take control of the entire system just through one exploitable vulnerability [44]. Accordingly, cyber-security allows the company to protect computers, servers, mobile phones, and electronic systems from malicious attacks, protecting the information on these devices and the identity of people using them [45]. Cyber-security threats are divided into three categories: Cybercrime (Sabotage, Mone- tize), Cyber-attack (Information gathering) and Cyber-terrorism (System destruction) [46]. Unfortunately, it is impossible to fully detect and eliminate vulnerabilities against these threats [46]. 3.5. Blockchain Since it was first identified by Chaum in his PhD thesis in 1982 [47], blockchain has increasingly evolved over the years and gained in terms of performance. Moreover, this evolution led to the enlargement of its applications to the whole social level [48,49]. Indeed, blockchain was defined as the fifth breaking innovation within the computing paradigm, preceded by the mainframe, personal computer, internet, mobile and social network [50], and Gartner ’s recently predicted that blockchain technology will contribute $3.1 trillion of new business value by 2030 [51]. Applied in all trustworthy fields with strong certifications, blockchain is the enabler of the digital currency known as Bitcoin [52]. From Blockchain 1.0 (Bitcoin and the like) to Blockchain 2.0 (Ethereum and SCs), to Blockchain 3.0 (IOTA, Cardano, Tezos, etc.), and the ongoing Blockchain 4.0 (use of A.I., Blockchain as a Service, etc.), This technology has many advantages [53,54]: distribution: a resilient and secured system through storage of information on multiple computers; traceability: all transactions are traceable; anonymity: addresses’ owners’ name is only used to prove the ownership of a private key. Transactions can be done anonymously; Appl. Syst. Innov. 2023, 6, 54 6 of 18 decentralization: transactions are managed without a central authority; immutability: once accepted, it is not possible to modify data; cost friendly: open-source software with low maintenance costs; autonomy: data exchange, record, and update are performed in a trustworthy environ- ment using consensus-based specifications and protocols. Therefore, it ensures the au- thenticity of the recorded transaction on the blockchain without human intervention. Despite the promising features of blockchain, the technology is still not highly adopted [55] due to its several drawbacks. Indeed, blockchain still has performance and scalability issues, their energy consumption is high, their cost is not predictable and there is no control of written and read information, especially regarding public blockchains [53]. In addition to that, security is still a huge concern for this technology. On 22 May 2018, hackers attacked the blockchain Verge, stealing nearly 35 million anonymous coins [56]. On 5 January 2019, hackers caused a loss of $1.1 million US dollars by attacking the blockchain Ethereum Classic (ETC) [54,57]. Another constraint to consider is that successful blockchain implementation goes with integrating several technologies, such as big data and cloud computing, making the process much more difficult [57]. Finally, from an organizational aspect, barriers to be expected are a lack of skills, tools (hardware and software) and standards/business models for both implementation and maintenance [55]. 3.6. IoT/IIoT Internet of Things (IoT) is the technology that connects physical objects to each other, making them able to communicate using the internet, actuators and sensing tools that gather data to generate actions using devices [58–60], thus enhancing communication possibilities between virtual and physical worlds [61]. It is commonly used in domestic equipment (Smart home), medical and healthcare field and within societies (Smart city, connected vehicle). However, it is also strongly used in the industrial field such as industrial automation, smart grid, maintenance forecast and transportation. This specific side of this concept gave birth to the Industrial Internet of Things (IIoT). IIoT can promote various industrial applications related to logistics, Manu- facturing, food production and services, enhancing business competence and manufacture, decreasing downtime, and improving product excellence [60]. Nevertheless, resources, battery energy, storage space and processing resources were limited, making IoT very challenging to Implement [62]. Indeed, most IoT nodes are de- signed to be of small volume and weight, not leaving enough space for a larger battery [60]. Moreover, regarding safety and confidentiality risks, IoT nodes usually gather sensitive and confidential data but do not protect them with the necessary processing powers [63,64]. In addition to that, IoT systems, being heterogenous and decentralized, presents poor interoperability [60]. 3.7. Big Data Since its first appearance, big data has been proven to be a life-changing technology both personally and professionally from different aspects [65]. Nowadays, it is highly relied on for decision-making (data-driven decisions), especially in a highly dynamic business environment [66,67]. Moreover, thanks to its capacity to store and analyse complex, volumi- nous and heterogenous data [68], the overall goal of big data is to create an understandable structure based on extracted information from a huge data set [69]. It is an enabling technology for cost reduction, faster and better decision making, new products and services created for customers, a very powerful strategy for online businesses and fraud Detection [69]. However, it presents many risks, such as poor data quality, lack of trust in data, lack of sufficient resources, lack of security and privacy and lack of financial support [70]. In addition, it is a time-consuming technology comprising various phases of development, testing, and adoption, which commits the top management a mandatory condition for its implementation and may therefore take one year to one and a half years. In case of failure, the company may face a loss of confidence to recover the investment Appl. Syst. Innov. 2023, 6, x FOR PEER REVIEW 7 of 18 Manufacturing, food production and services, enhancing business competence and man- ufacture, decreasing downtime, and improving product excellence [60]. Nevertheless, resources, battery energy, storage space and processing resources were limited, making IoT very challenging to Implement [62]. Indeed, most IoT nodes are de- signed to be of small volume and weight, not leaving enough space for a larger battery [60]. Moreover, regarding safety and confidentiality risks, IoT nodes usually gather sensi- tive and confidential data but do not protect them with the necessary processing powers [63,64]. In addition to that, IoT systems, being heterogenous and decentralized, presents poor interoperability [60]. 3.7. Big Data Since its first appearance, big data has been proven to be a life-changing technology both personally and professionally from different aspects [65]. Nowadays, it is highly re- lied on for decision-making (data-driven decisions), especially in a highly dynamic busi- ness environment [66,67]. Moreover, thanks to its capacity to store and analyse complex, voluminous and heterogenous data [68], the overall goal of big data is to create an under- standable structure based on extracted information from a huge data set [69]. It is an enabling technology for cost reduction, faster and better decision making, new products and services created for customers, a very powerful strategy for online busi- nesses and fraud Detection [69]. However, it presents many risks, such as poor data qual- ity, lack of trust in data, lack of sufficient resources, lack of security and privacy and lack of financial support [70]. In addition, it is a time-consuming technology comprising vari- ous phases of development, testing, and adoption, which commits the top management a Appl. Syst. Innov. 2023, 6, 54 7 of 18 mandatory condition for its implementation and may therefore take one year to one and a half years. In case of failure, the company may face a loss of confidence to recover the investment made (return on investment (ROI) issues) [71]. Even with its enormous evolu- made tion, la (rc et k o urn f skil on ls, investment experts, a(ROI) nd daissues) ta scala[b 71 ilit ].y a Even re awith lso toits beenormous counted aevolution, s the biggelack st risks of that occur while adopting big data [72]. skills, experts, and data scalability are also to be counted as the biggest risks that occur while adopting big data [72]. 3.8. Cloud Computing 3.8. Cloud Computing The United States Institute of Standards (NIST) defines Cloud computing as “a model The United States Institute of Standards (NIST) defines Cloud computing as “a model for enabling ubiquitous, convenient, on-demand network access to a shared pool of con- for enabling ubiquitous, convenient, on-demand network access to a shared pool of config- figurable computing resources such as networks, servers, storage, applications, and ser- urable computing resources such as networks, servers, storage, applications, and services”. vices”. Cloud computing has five essential characteristics that distinguish it from other Cloud computing has five essential characteristics that distinguish it from other computing computing paradigms and counts four deployment models that are represented in Figure paradigms and counts four deployment models that are represented in Figure 5 [73]. 5 [73]. Figure 5. Cloud computing characteristics and models. Figure 5. Cloud computing characteristics and models. Cloud computing is known for its cost efficiency, scalability, elasticity, almost unlimited Cloud computing is known for its cost efficiency, scalability, elasticity, almost unlim- storage capacity and continuous availability as it offers easy access to information in ited storage capacity and continuous availability as it offers easy access to information in different time zones and geographic locations. Moreover, it is one of the few technologies different time zones and geographic locations. Moreover, it is one of the few technologies that present the advantage of being fast to deploy and easy to integrate, all along with having a robust architecture that ensures its resiliency and redundancy [69]. This innovative concept also delivers services that were not possible before, such as mobile interactive applications (location, humidity, stress sensors, worldwide weather data, etc.), can lower IT barriers to innovation [74], provides data backup services, disaster recovery and automatic software updates [75]. Nevertheless, free access to cloud storage servers is limited and, therefore, not enough to reliably save and maintain data, pushing users to purchase extra cloud storage services. It also presents huge security risks due to vulnerabilities of central auditing servers [76], which require a vast and complex hardware infrastructure and new skill sets. Finally, from a political point of view, it represents several issues related to where the physical data resides, where processing takes place, and where the data is accessed. The full potential of cloud computing is constrained by the availability of high-speed access to all users [74]. 3.9. Radio-Frequency Identification (RFID) Radio Frequency IDentification (RFID) is a wireless communication technology that, using tags (fully or partially passive or active), antennas and a host computer or mid- dleware, captures data and links it to different attributes such as serial number, position, colour, date of purchase and other information about the entity carrying the Tag, through a data collection process based on electromagnetic waves exchange between RFID tags and RFID readers. Communication performances, interaction with other supply chain information sys- tems and level of standardization of this new concept have known an increasing success during the last few years [77–79]. Indeed, it became omnipresent in our daily life routines such as ticketing, payment, passports, car keys, etc. RFID systems vary one from another depending on the involved frequencies: micro-waves, Ultra High Frequencies (UHF), High Frequencies (HF), Low Frequencies (LF), which define the read ranges [80]. In the industrial Appl. Syst. Innov. 2023, 6, 54 8 of 18 field, it offers better visibility and tractability in logistical and Manufacturing processes [77], unitary identification and low-cost tags [80], with real-time data collection and sharing [81]. Furthermore, RFID technology, by redesigning the inter and intraorganizational business processes that, could lead to the emergence of the so-called “smart processes”, which are processes that can initiate business transactions without any human interventions and, therefore, ease the integration of inter- and intraorganizational information systems [78,79]. Regardless of the remarkable evolution of this technology, many risks are still threaten- ing its implementation success, such as data security and privacy that can be easily hacked or captured by hidden readers as data transmission is ensured through air interface [77]. In addition to that, RFID requires extravagant equipment, which ends up with a high cost that may not be covered by some companies [82], especially since it is constraint by a limited channel bandwidth [83] and by material to use since communication cannot be ensured efficiently through metals or liquids [84]. This includes a lack of technical and financial support and a lack of skilled experts [85]. 3.10. Simulation Simulation is the virtual scientific approach designed to experiment on a model representing a real phenomenon or a given system or product. One can study and observe characteristics and behavior under different configurations. It highly serves the decision- making process through real-time testing, considering real production constraints, which allows better control of work results without the cost and time consumed using the old way based on prototypes [86–88]. Nevertheless, without a clear understanding of the process and its parameters, and a proper understanding of the problem, companies risk getting the wrong conception and, therefore, not achieving the expected results [89,90]. This can also be related to the lack of skills and knowledge in terms of simulation and the diversity and complexity of the dedicated software or application with poor access to guidelines [91]. 3.11. Analysis and Discussion Following the performed literature review results, Tables 1 and 2 summarize the most relevant risks and opportunities of digital technologies. The process was to first identify keywords representing risks and opportunities for each technology independently, then identify the common ones to evaluate the criticality and occurrence of each risk and the importance of each opportunity. The tables regroup the most relevant ones but don’t present an exhaustive list, as the target is to understand mostly the roadblocks or the key elements that don’t encourage companies to adopt the digitalization concept and to study the potential motivations behind companies’ interest towards digitalization. The keywords were chosen in a way to be precise and explanative at the same time. For instance, “flexibility” was used to identify the technologies that offer the possibility to improve companies’ processes and make them flexible either when it comes to precision, diversity of products or accuracy of data when interactivity describes the technologies that allow interaction between virtual and real words. When it comes to risks, the keyword Complexity was used to identify the technologies in which implementation is difficult and is mostly linked to a lack of skills and guidelines. Accordingly, we can conclude that most smart technologies present the advantage of bringing effectiveness and flexibility to the processes among companies, making them more performant. Some of them also allow interaction between reality and virtual worlds, such as Augmented reality, IoT/IIoT and RFID systems, while others can be used as decision-making support, such as Augmented reality, big data and simulation. Appl. Syst. Innov. 2023, 6, 54 9 of 18 Table 1. Opportunities for digital technologies. Easy/Quick Decision Data Opportunities Efficiency Flexibility Precision Interactivity Traceability Process Support Protetction 3D printing /Additive [9,10] [9,10] [15] [15] manufacturing (AM) Augmented [29] [17] [29] reality Robotics [34,36] [35,37] Cyber security [45] Blockchain [53,54] [53,54] IoT/IIoT [60] [61] Big data [68] [66,67] [66,67] Cloud [69] [69] [69] computing Radio-Frequency Identification [78,79] [77–79] [77] (RFID) Simulation [86,89] [86,89] [86–88] Table 2. Risks of digital technologies. Expensive Lack of /Time- Poor Limited Data Safety/Cyber Resistance Risks Skills Complexity Consuming Properties Choice Accuracy Security to Change /Guidelines Process 3D printing/Additive [10] [16] [10] [16] manufacturing (AM) Augmented reality [32] [31] [31] [31] Robotics [36] [38] [35,39] Cyber security [46] Blockchain [53] [55] [54,56,57] [57] IoT/IIoT [63,64] [63,64] [60,62] Big data [68] [72] [70] [68] Cloud computing [76] [74] [76] [74] Radio-Frequency [82] [84] [83] [85] [77] [77] Identification (RFID) Simulation [90] [90] By getting closer to X.0 technologies through this review, it is clear that smart practices, flexibility, reliability and responsiveness played an important role in resilience develop- ment. A survey answered by various sectors proved that smart practices ensured by X.0 technologies led to an innovative reconfiguration of Manufacturing processes and products (volume/diversity) [92]. More than that, Industry X.0 highly contributes to industrial inno- vation, sustainability, and efficiency (environmental, social, and economic). For example, Artificial intelligence and Machine learning can be used to identify solutions for environ- mental issues such as waste control, resource optimization, carbon neutrality, etc. [93,94]. The substitution of paperwork by digital electronic devices, smart grids, green energy management, reducing energy consumption through IoT technology, usage of modelling software to optimize buildings, material saving and waste reduction through 3D printing and adoption of a photovoltaic system are some of the numerous sustainable aspects of X.0 technologies [95]. Finally, digitalization made people change their way of thinking and Appl. Syst. Innov. 2023, 6, 54 10 of 18 managing their factories, which brings to light the innovative aspect of Industry X.0. In fact, it provides opportunities to create new and more individualized products [96], new ways of interaction, a better understanding of customers’ needs, smart goods and services, etc. [97]. Nevertheless, digital technologies are subject to several risks, the most critical one being data security. Implementing their means, therefore, implementing a solid cyber- security system. On the other hand, the low digital maturity of companies can be justified by the high investment required and the complexity of the implementation process which itself can’t be supported by companies due to the lack of skills and guidelines. 4. Case study Simulation: Risks and Opportunities of an RFID System To better understand the literature review results, a case study was conducted on an industrial company operating within the automotive field. This company aims to improve its components’ feeding flow and control by implementing an RFID system. The first step was to observe the existing flow and identify the weaknesses of the actual system using check sheets, daily follow-up, time measurement and operations classification. These parameters were then affected to the simulation model presented in Figure 6 as inputs. The “0” reflected in the simulation model are related to fact that at it represents the model in its initial status (Simulation not yet launched), which means that there’s 0 entity at each process. The goal of this simulation is to analyze the behavior of the current system and identify the bottleneck processes and wastes (MUDAs) to be eliminated for a better performance. To define probability lows to be used for each process, we used Appl. Syst. Innov. 2023, 6, x FOR PEER REVIEW 11 of 18 Input analyzer tool within ARENA software. Figure 6. Simulation model of the current system. Figure 6. Simulation model of the current system. Results showed that the actual system is impacted by waiting time, overstock, non- Results showed that the actual system is impacted by waiting time, overstock, non- added value operations, absence of a control system, absence of a work instruction, no added value operations, absence of a control system, absence of a work instruction, no visibility on actual consumption, and no traceability (Consumption vs. available). Once visibility on actual consumption, and no traceability (Consumption vs. available). Once these issues are detected and analyzed, the next step is to identify the most suitable tech- these issues are detected and analyzed, the next step is to identify the most suitable technol- nology. By consulting experts and holding meetings for experience sharing and bench- ogy. By consulting experts and holding meetings for experience sharing and benchmarking, m the arcompany king, the c concluded ompany co that nclu RFID ded th isathe t RFI golden D is thticket e goldto enachieving ticket to athe chie expected ving the e results. xpected result Using s. SAP software, actors of this system will manage to check the needed components Using SAP software, actors of this system will manage to check the needed compo- and set a feeding list that will be validated once feeding trolley capacity is achieved. This n responsibility ents and set ais fegiven eding list to the tha war t wehouse ill be vadistributor lidated onc ,e who feedcan ing t access rolley c pr aeviously pacity is a validated chieved. T lists his r ifesp needed onsibili or ty is giv print them en to t to hemake wareh the ouse feeding distribpr utocess or, wh easier o can. aIn cceaddition, ss previouto sly v avoid ali- useless movements back and forth to the warehouse, an in-line distributor can have access dated lists if needed or print them to make the feeding process easier. In addition, to avoid useless movements back and forth to the warehouse, an in-line distributor can have access to the trolley preparation status so that he only goes to the warehouse once the trolley is completed. Meanwhile, he is responsible for scanning empty boxes by putting them in the RFID structure. These actions are represented by the use case diagram in Figure 7, a diagram that represents the structure of major functionalities needed by each user of a given sys- tem [98]. Figure 7. Use a case diagram of the RFID system. Appl. Syst. Innov. 2023, 6, x FOR PEER REVIEW 11 of 18 Figure 6. Simulation model of the current system. Results showed that the actual system is impacted by waiting time, overstock, non- added value operations, absence of a control system, absence of a work instruction, no visibility on actual consumption, and no traceability (Consumption vs. available). Once these issues are detected and analyzed, the next step is to identify the most suitable tech- nology. By consulting experts and holding meetings for experience sharing and bench- marking, the company concluded that RFID is the golden ticket to achieving the expected results. Using SAP software, actors of this system will manage to check the needed compo- nents and set a feeding list that will be validated once feeding trolley capacity is achieved. This responsibility is given to the warehouse distributor, who can access previously vali- dated lists if needed or print them to make the feeding process easier. In addition, to avoid Appl. Syst. Innov. 2023, 6, 54 11 of 18 useless movements back and forth to the warehouse, an in-line distributor can have access to the trolley preparation status so that he only goes to the warehouse once the trolley is completed. to the trolley preparation status so that he only goes to the warehouse once the trolley Meanwhile, he is responsible for scanning empty boxes by putting them in the RFID is completed. structure. These actions are represented by the use case diagram in Figure 7, a diagram Meanwhile, he is responsible for scanning empty boxes by putting them in the RFID that represents the structure of major functionalities needed by each user of a given sys- structure. These actions are represented by the use case diagram in Figure 7, a diagram that tem [98]. represents the structure of major functionalities needed by each user of a given system [98]. Appl. Syst. Innov. 2023, 6, x FOR PEER REVIEW 12 of 18 Figure 7. Use a case diagram of the RFID system. Figure 7. Use a case diagram of the RFID system. When When i itt c comes omes t to o t the he s sequencing equencing o of f t these hese a actions, ctions, t they hey ar are p e pr resented esented i in n t the he s sequence equence diagram in Figure 8, reflecting the temporal succession of the process and the interaction diagram in Figure 8, reflecting the temporal succession of the process and the interaction between the object of the system [98,99]. between the object of the system [98,99]. Figure 8. Sequence diagram of the RFID system. Figure 8. Sequence diagram of the RFID system. Along with line production, the in-line distributor collects the empty boxes and puts Along with line production, the in-line distributor collects the empty boxes and puts them in the RFID structure in order to be scanned, then takes them to the empty boxes them in the RFID structure in order to be scanned, then takes them to the empty boxes trolley. Once the RFID reader scans the label printed in the box, the respective reference trolley. Once the RFID reader scans the label printed in the box, the respective reference is automatically sent to the SAP system as a signal that the concerned component needs is automatically sent to the SAP system as a signal that the concerned component needs to be refilled. A new picking list is created with details of the component’s information to be refilled. A new picking list is created with details of the component’s information (Concerned production line, component name and type, quantity needed, number of boxes (Concerned production line, component name and type, quantity needed, number of needed, etc.). The warehouse operator grabs the components and puts them in the feeding boxes needed, etc.). The warehouse operator grabs the components and puts them in the trolley, and the SAP system updates the inventory accordingly. This sequence is repeated feeding trolley, and the SAP system updates the inventory accordingly. This sequence is repeated until the feeding trolley is full, then the actual picking list is validated and a new one is created. A signal is then sent to the in-line distributor that moves the empty boxes trolley to the warehouse, grabs the full boxes trolley and starts the feeding process inside production lines. This cycle is then repeated until the end of the shift. It can also be inter- rupted in case of urgent need. To better observe the behavior of the RFID system, the simulation model presented in Figure 9 was performed using different parameters to verify the system’s reaction to different situations and in different conditions. Similarly to the first simulation, we used timings taken after system implementation and listed the new operations performed by the feeding operator to be used as input for the simulation model, and relied on Input analyzer to define probability laws of each process. The “0” reflected in the simulation model are related to fact that at it represents the model in its initial status (Simulation not yet launched), which means that there’s 0 entity at each process. Appl. Syst. Innov. 2023, 6, 54 12 of 18 until the feeding trolley is full, then the actual picking list is validated and a new one is created. A signal is then sent to the in-line distributor that moves the empty boxes trolley to the warehouse, grabs the full boxes trolley and starts the feeding process inside production lines. This cycle is then repeated until the end of the shift. It can also be interrupted in case of urgent need. To better observe the behavior of the RFID system, the simulation model presented in Figure 9 was performed using different parameters to verify the system’s reaction to different situations and in different conditions. Similarly to the first simulation, we used timings taken after system implementation and listed the new operations performed by the feeding operator to be used as input for the simulation model, and relied on Input analyzer to define probability laws of each process. The “0” reflected in the simulation Appl. Syst. Innov. 2023, 6, x FOR PEER REVIEW 13 of 18 model are related to fact that at it represents the model in its initial status (Simulation not yet launched), which means that there’s 0 entity at each process. Figure 9. Simulation model of the RFID system. Figure 9. Simulation model of the RFID system. Results showed that after implementing the RFID system, several MUDAs were elim- Results showed that after implementing the RFID system, several MUDAs were inated such as waiting time as the operator, once he gets to the supermarket, the trolley eliminated such as waiting time as the operator, once he gets to the supermarket, the trolley will be already ready to pick which reduce the waiting time to zero. In addition to that, will be already ready to pick which reduce the waiting time to zero. In addition to that, the the operator no longer needs to keep checking boxes consumption status as empty boxes operator no longer needs to keep checking boxes consumption status as empty boxes will be will b scanned e scanusing ned uthe sing t RFID he R str FIuctur D stru e,cwhich ture, wallows hich allo to w dedicate s to ded other icate o responsibilities ther responsibto ilitthe ies to the feeding operator and also reduce their number. feeding operator and also reduce their number. A A r risk isk a analysis nalysis was was a also lso established establisheto d t identify o identif risks y risks and a rn oadblocks d roadblo that cks may that m bea faced y be during faced dor urafter ing or the afimplementation ter the implemeof nta the tion RFID of tsystem he RFID in sor ys der tem i ton or establish der to e countermeasur stablish coun- es accordingly, thus using the SWOT matrix, a technique commonly used since the 1960s– termeasures accordingly, thus using the SWOT matrix, a technique commonly used since 1970s to identify the internal strengths and weaknesses and the external opportunities and the 1960s–1970s to identify the internal strengths and weaknesses and the external oppor- thr tuneats ities a ofn adsystem threats [100 of a, sys 101]. tem Results [100,10 ar1 e].summarized Results are su inm Figur mariz e 10 ed. in Figure 10. As already stated, Industry X.0 technologies are also used to support the smartening of lean manufacturing tools and principles [14]. They are two complementary concepts: Lean principles eliminate MUDA and ensure standardization for a smooth implementa- tion of X.0 technologies when Industry X.0 allows the smartening and development of lean manufacturing tools without bringing any change to its principles [92]. Indeed, the implementation of the RFID system contributed to waste elimination by replacing paper with digital tools, better control of inventory which eliminated the risk of overstock, and no more waiting time. Figure 10. SWOT analysis of the RFID system. As already stated, Industry X.0 technologies are also used to support the smartening of lean manufacturing tools and principles [14]. They are two complementary concepts: Lean principles eliminate MUDA and ensure standardization for a smooth implementa- tion of X.0 technologies when Industry X.0 allows the smartening and development of lean manufacturing tools without bringing any change to its principles [92]. Indeed, the implementation of the RFID system contributed to waste elimination by replacing paper with digital tools, better control of inventory which eliminated the risk of overstock, and no more waiting time. Appl. Syst. Innov. 2023, 6, x FOR PEER REVIEW 13 of 18 Figure 9. Simulation model of the RFID system. Results showed that after implementing the RFID system, several MUDAs were elim- inated such as waiting time as the operator, once he gets to the supermarket, the trolley will be already ready to pick which reduce the waiting time to zero. In addition to that, the operator no longer needs to keep checking boxes consumption status as empty boxes will be scanned using the RFID structure, which allows to dedicate other responsibilities to the feeding operator and also reduce their number. A risk analysis was also established to identify risks and roadblocks that may be faced during or after the implementation of the RFID system in order to establish coun- termeasures accordingly, thus using the SWOT matrix, a technique commonly used since Appl. Syst. Innov. 2023, 6, 54 13 of 18 the 1960s–1970s to identify the internal strengths and weaknesses and the external oppor- tunities and threats of a system [100,101]. Results are summarized in Figure 10. Appl. Syst. Innov. 2023, 6, x FOR PEER REVIEW 14 of 18 Appl. Syst. Innov. 2023, 6, x FOR PEER REVIEW 14 of 18 Figure 10. SWOT analysis of the RFID system. Figure 10. SWOT analysis of the RFID system. To put SWOT into action, it is a good opportunity to match up the Strengths with A Ts a o put lread SWOT y statedinto , Indu action, stry X.0it tec isha nogood logies a opportunity re also used tto o su match pport tup he sthe mart Str enengths ing with To put SWOT into action, it is a good opportunity to match up the Strengths with o O f le pp aor n m tua ni ntu ie fa sc a tu nd rin tg t heo T ohr ls a ea ntd s p wriin th W ciple ea s [ k14 ne]s. T seh s f ey ol a low re tiw ng o T co O m W pS le a m na en lt yasry is c , a ond ncep the tsr : efore Opportunities and the Threats with Weaknesses following TOWS analysis, and therefore Opportunities and the Threats with Weaknesses following TOWS analysis, and therefore L id ea en p ntifry inc th ip e rel les e altiimi onna shtie p M bet UD wA een and th e e i ns nu tern re sa ta l a nd na d ex rdizta ern tion f al for ac a to srs mo . T ot hh i is a mp nalleyme sisnt aa ll-owed identify the relationship between the internal and external factors. This analysis allowed identify the relationship between the internal and external factors. This analysis allowed tion of X.0 technologies when Industry X.0 allows the smartening and development of us to define strategies and actions by taking advantage of the positive aspects of the RFID us to define strategies and actions by taking advantage of the positive aspects of the RFID us to define strategies and actions by taking advantage of the positive aspects of the RFID lean manufacturing tools without bringing any change to its principles [92]. Indeed, the system. Results are represented in Figure 11. system. Results are represented in Figure 11. system. Results are represented in Figure 11. implementation of the RFID system contributed to waste elimination by replacing paper with digital tools, better control of inventory which eliminated the risk of overstock, and no more waiting time. Figure 11. TOWS analysis of the RFID system. Figure 11. TOWS analysis of the RFID system. Figure 11. TOWS analysis of the RFID system. When it comes to the study, many difficulties and barriers were faced and made the When it comes to the study, many difficulties and barriers were faced and made the When it comes to the study, many difficulties and barriers were faced and made the process more complicated, but at the same time, simulation offered several opportunities process more complicated, but at the same time, simulation offered several opportunities process more complicated, but at the same time, simulation offered several opportunities that supported the decision-making. In other words, the pros and cons of following the that supported the decision-making. In other words, the pros and cons of following the that supported the decision-making. In other words, the pros and cons of following the strategy and using tools are represented in Figure 12. strategy and using tools are represented in Figure 12. strategy and using tools are represented in Figure 12. Figure 12. Pros and cons of the conducted study. Figure 12. Pros and cons of the conducted study. Figure 12. Pros and cons of the conducted study. 5. Conclusions and Perspectives Digitalization is a paradigm that is strongly present in many applications of our eve- 5. Conclusions and Perspectives ryday life and continues to develop and renew itself through the fact that more and more Digitalization is a paradigm that is strongly present in many applications of our eve- companies have become ambitious to ensure not only an innovative, sustainable and re- ryday life and continues to develop and renew itself through the fact that more and more silient environment but also the smartening and development of their lean manufacturing companies have become ambitious to ensure not only an innovative, sustainable and re- tools. A conducted literature review has proven that each one of the smart technologies silient environment but also the smartening and development of their lean manufacturing has many opportunities but presents many risks. These risks and opportunities can be tools. A conducted literature review has proven that each one of the smart technologies either common or related to a specific technology, but either way, the establishment of a has many opportunities but presents many risks. These risks and opportunities can be risk analysis strategy is a mandatory step during the digitalization process. For new com- either common or related to a specific technology, but either way, the establishment of a panies intending to adopt this concept, this paper will provide a referential to what they risk analysis strategy is a mandatory step during the digitalization process. For new com- will encounter. panies in Th te is r nd eise ng t arco h a w da os c pt t on hc is c reto izn ec de b py t t, th he is p mo ad pe elli r w ng a ill n pd r o si vm idu ela at r ioen f eorfe t n hti ea c la to se st wh ua dt th y ofe y wila l e n a ncu ou tont meortiv . e company, based on which we were able to validate the risks and This research was concretized by the modelling and simulation of the case study of an automotive company, based on which we were able to validate the risks and Appl. Syst. Innov. 2023, 6, 54 14 of 18 5. Conclusions and Perspectives Digitalization is a paradigm that is strongly present in many applications of our everyday life and continues to develop and renew itself through the fact that more and more companies have become ambitious to ensure not only an innovative, sustainable and resilient environment but also the smartening and development of their lean manufacturing tools. A conducted literature review has proven that each one of the smart technologies has many opportunities but presents many risks. These risks and opportunities can be either common or related to a specific technology, but either way, the establishment of a risk analysis strategy is a mandatory step during the digitalization process. For new companies intending to adopt this concept, this paper will provide a referential to what they will encounter. This research was concretized by the modelling and simulation of the case study of an automotive company, based on which we were able to validate the risks and opportunities identified during our research on RFID technology, as well as the importance and benefit of using simulation. Indeed, results showed that the RFID system would bring many improvement opportunities by eliminating MUDAs and facilitating communication when simulation supported the decision-making process that was completed by a preventive action plan to overcome detected risks and weaknesses. In terms of perspectives, we aim to reinforce this research with a statistical study based on a survey, from which we can come up with lessons learned from smart factories, but also reflect risk and barriers occurrence during the implementation of revolutionary technologies. In addition to that, since the articles studied didn’t rely on a specific risk analysis system or tool, it is interesting to define which risk assessment strategy/tool is suitable for each technology. Author Contributions: Conceptualization, L.N. and M.G.; methodology, L.N.; software, L.N. and M.G.; validation, M.G., A.S., S.M. and M.D.N.; formal analysis, L.N. and M.G.; investigation, L.N. and M.G.; resources, L.N. and M.G.; data curation, L.N. and M.G.; writing—original draft preparation, L.N.; writing—review and editing, L.N. and M.G.; visualization, M.G., A.S., S.M. and M.D.N.; supervision, M.G. All authors have read and agreed to the published version of the manuscript. Funding: This research received no external funding. Institutional Review Board Statement: Not applicable. Informed Consent Statement: Not applicable. Data Availability Statement: Not applicable. Conflicts of Interest: The authors declare no conflict of interest. References 1. Marzano, G.; Martinovs, A. Teaching Industry 4.0. Soc. Integr. Educ. Proc. Int. Sci. Conf. 2020, 2, 69–76. [CrossRef] 2. Gallab, M.; Bouloiz, H.; Kébé, A.S.; Tkiouat, M. Opportunities and Challenges of the Industry 4.0 in industrial companies: A Survey on Moroccan firms. J. Ind. Bus. Econ. 2021, 48, 413–439. [CrossRef] 3. Relich, M. The impact of ICT on labor productivity in the EU. Inf. Technol. Dev. 2017, 23, 706–722. [CrossRef] 4. Marina, M.; Abrar Ali, D.; Mukund, J.; Izabela, N. Lean manufacturing and Industry 4.0 combinative application: Practices and perceived benefits. IFAC PapersOnLine 2021, 54, 288–293. 5. McKiea, M.G.; Jonesb, R.; Milesc, J.; Jonesd, I.R. Improving Lean Manufacturing Systems and Tools Engagement Through the Utilisation of Industry 4.0. Improved Communication and a People Recognition Methodology in a UK Engine Manufacturing Centre. Procedia Manuf. 2021, 55, 371–382. [CrossRef] 6. ISO 31000.2018; Risk Management—Guidelines. International Organization for Standardization ISO Central Secretariat: Geneva, Switzerland, 2018. 7. Sishi, M.; Telukdarie, A. Implementation of Industry 4.0 technologies in the mining industry—A case study. Int. J. Min. Miner. Eng. 2020, 11, 1–22. [CrossRef] 8. Frank, A.G.; Dalenogare, L.S.; Ayala, N.F. Industry 4.0 technologies: Implementation patterns in Manufacturing companies. Int. J. Prod. Econ. 2019, 210, 15–26. [CrossRef] 9. Xiaoyong, T.; Wu, L.; Gu, D.; Yuan, S.; Zhao, Y.; Li, X.; Ouyang, L.; Song, B.; Gao, T.; He, J.; et al. Roadmap for Additive Manufacturing: Toward Intellectualization and Industrialization. Chin. J. Mech. Eng. Addit. Manuf. Front. 2022, 1, 100014. Appl. Syst. Innov. 2023, 6, 54 15 of 18 10. Jandyal, A.; Chaturvedi, I.; Wazir, I.; Ankush, R.; Haq, M.I.U. 3D printing–A review of processes, materials and applications in industry 4.0. Sustain. Oper. Comput. 2022, 3, 33–42. [CrossRef] 11. Davies, S. 3D Printing is the new face of medicine. Financial Times, 14 November 2013. 12. Petrick, I.J.; Simpson, T.W. 3D Printing disrupts Manufacturing: How economies of one create new rules of competition. Res. -Technol. Manag. 2013, 56, 12–16. [CrossRef] 13. Sandström, C.G. The non-disruptive emergence of an ecosystem for 3D printing–insights from the hearing aid industry’s transition 1989–2008. Technol. Forecast. Soc. Chang. 2016, 102, 160–168. [CrossRef] 14. Wohlers, T. Wohlers Report 2020: 3D Printing and Additive Manufacturing Global State of the Industry; Technical Report; Wohlers Associates: Fort Collins, CO, USA, 2020. 15. Shahrubudin, N.; Koshy, P.; Alipal, J.C.; Kadir, M.H.A.; Lee, T.C. Challenges of 3D printing technology for manufacturing biomedical products: A case study of Malaysian manufacturing firms. Heliyon 2020, 6, e03734. [CrossRef] 16. Li, J.Q.; Yuy, F.R.; Deng, G.; Luo, C.; Ming, Z.; Yan, Q. Industrial Internet: A survey on the enabling technologies, applications, and challenge. IEEE Commun. Surv. Tutor. 2017, 19, 1504–1526. [CrossRef] 17. Deshpande, A.; Kim, I. The effects of augmented reality on improving spatial problem solving for object assembly. Adv. Eng. Inform. 2018, 38, 760–775. [CrossRef] 18. Chytas, D.; Johnson, E.O.; Piagkou, M.; Mazarakis, A.; Babis, G.C.; Chronopoulos, E.; Nikolaou, V.S.; Lazaridis, N.; Natsis, K. The role of augmented reality in anatomical education: An overview. Ann. Anat. Anat. Anz. 2020, 229, 151463. [CrossRef] [PubMed] 19. Ibáñez, M.-B.; Delgado-Kloos, C. Augmented reality for stem learning: A systematic review. Comput. Educ. 2018, 123, 109–123. [CrossRef] 20. Ameri, G.; Rankin, A.; Baxter, J.S.; Moore, J.; Ganapathy, S.; Peters, T.M.; Chen, E.C. Development and evaluation of an augmented reality ultrasound guidance system for spinal anesthesia: Preliminary results. Ultrasound Med. Biol. 2019, 45, 2736–2746. [CrossRef] [PubMed] 21. Nee, A.; Ong, S. Virtual and augmented reality applications in Manufacturing. IFAC Proc. Vol. 2013, 46, 15–26. [CrossRef] 22. Lamberti, F.; Manuri, F.; Sanna, A.; Paravati, G.; Pezzolla, P.; Montuschi, P. Challenges, opportunities, and future trends of emerging techniques for augmented reality-based maintenance. IEEE Trans. Emerg. Top. Comput. 2014, 2, 411–421. [CrossRef] 23. Loizeau, Q.; Danglade, F.; Ababsa, F.; Merienne, F. Evaluating added value of aug-mented reality to assist aeronautical mainte- nance workers—Experimentation on on-field use case. In Virtual Reality and Augmented Reality; Bourdot, P., Interrante, V., Nedel, L., Magnenat-Thalmann, N., Zachmann, G., Eds.; Springer International Publishing: Cham, Switzerland, 2019; pp. 151–169. 24. Setti, A.; Bosetti, P.; Ragni, M. Artool-augmented reality platform for machining setup and maintenance. In Proceedings of SAI Intelligent Systems Conference (IntelliSys); Bi, Y., Kapoor, S., Bhatia, R., Eds.; Springer International Publishing: Cham, Switzerland, 2018; pp. 457–475. 25. Parida, K.; Bark, H.; Lee, P.S. Emerging thermal technology enabled augmented reality. Adv. Funct. Mater. 2021, 31, 2007952. [CrossRef] 26. Segovia, D.; Ramírez, H.; Mendoza, M.; Mendoza, M.; Mendoza, E.; González, E. Machining and dimensional validation training using augmented reality for a lean process. Procedia Comput. Sci. 2015, 75, 195–204. [CrossRef] 27. Mourtzis, D.; Zogopoulos, V.; Vlachou, E. Augmented reality application to support remote maintenance as a service in the robotics industry. Procedia CIRP 2017, 63, 46–51. [CrossRef] 28. Mourtzis, D.; Angelopoulos, J.; Panopoulos, N. A framework for automatic generation of augmented reality maintenance & repair instructions based on convolutional neural networks. Procedia CIRP 2020, 93, 977–982. 29. Jeffri, N.F.S.; Rambli, D.R.A. A review of augmented reality systems and their effects on mental workload and task performance. Heliyon 2021, 7, e06277. [CrossRef] [PubMed] 30. Zhang, P.; Liu, H.; Li, H.; Wang, J.J. The application of navigation system based on augmented reality head-mounted devices in spine surgery. Neurosci. Inform. 2022, 2, 100076. [CrossRef] 31. Balco, P.; Bajzík, P.; Škovierová, K. Virtual and Augmented Reality in Manufacturing Companies in Slovakia. Procedia Comput. Sci. 2022, 1, 313–320. [CrossRef] 32. Carl, B.; Bopp, M.; Saß, B.; Nimsky, C. Microscope-based augmented reality in degenerative spine surgery: Initial experience. World Neurosurg. 2019, 128, e541–e551. [CrossRef] 33. Anon. IFR Press Conference. 2019. Available online: https://ifr.org/downloads/press2018/IFR%20World%20Robotics%20 Presentation%20-%2018%20Sept%202019.pdf (accessed on 25 June 2022). 34. Aditya, U.S.P.S.; Singh, R.; Singh, P.K.; Kalla, A. A Survey on Blockchain in Robotics: Issues, Opportunities, Challenges and Future Directions. J. Netw. Comput. Appl. 2021, 196, 103245. 35. Lin, P.; Abney, K.; Bekey, G. Robot ethics: Mapping the issues for a mechanized world. Artif. Intell. 2011, 175, 942–949. [CrossRef] 36. Flechsig, C.; Anslinger, F.; Lasch, R. Robotic Process Automation in purchasing and supply management: A multiple case study on potentials, barriers, and implementation. J. Purch. Supply Manag. 2022, 28, 100718. [CrossRef] 37. Bauer, W.; Bender, M.; Braun, M.; Rally, P.; Scholtz, O. Lightweight Robots in Manual Assembly—Best to Start Simply! Examining Com- panies’ Initial Experiences with Lightweight Robots; Fraunhofer Institute for Industrial Engineering IAO: Stuttgart, Germany, 2016. 38. Zinn, M.; Roth, B.; Khatib, O.; Salisbury, J.K. A new actuation approach for human friendly robot design. Int. J. Robot. Res. 2004, 23, 379–398. [CrossRef] Appl. Syst. Innov. 2023, 6, 54 16 of 18 39. Riek, L.; Howard, D. A code of ethics for the human-robot interaction profession. Proc. We Robot 2014. Available online: https://ssrn.com/abstract=2757805 (accessed on 25 June 2022). 40. Kopacek, P. Roboethics. IFAC Proc. Vol. 2012, 45, 67–72. [CrossRef] 41. Rao, R.V.; Selvamani, K. Data Security Challenges and Its Solutions in Cloud Computing. Procedia Comput. Sci. 2015, 48, 204–209. [CrossRef] 42. Cao, L.; Li, Y.; Zhang, J.; Jiang, Y.; Han, Y.; Wei, J. Electrical load prediction of healthcare buildings through single and ensemble learning. Energy Rep. 2020, 6, 2751–2767. [CrossRef] 43. Chen, M. Smart city and cyber-security; technologies used, leading challenges and future recommendations. Energy Rep. 2021, 7, 7999–8012. 44. Zheng, Y.; Li, Z.; Xu, X.; Zhao, Q. Dynamic defenses in cyber security: Techniques, methods and challenges. Digit. Commun. Netw. 2020, 8, 422–435. [CrossRef] 45. Uchendu, B.; Nurse, J.R.; Bada, M.; Furnell, S. Developing a cyber security culture: Current practices and future needs. Comput. Secur. 2021, 109, 102387. [CrossRef] 46. Gunes, B.; Kayisoglu, G.; Bolat, P. Cyber security risk assessment for seaports: A case study of a container port. Comput. Secur. 2021, 103, 102196. [CrossRef] 47. Chaum, D. Computer Systems Established, Maintained, and Trusted by Mutually Suspicious Groups. Ph. D Thesis, University of California, Berkeley, CA, USA, 1982. 48. Angelis, J.; da Silva, E.R. Blockchain adoption: A value driver perspective. Bus. Horiz. 2019, 62, 307–314. [CrossRef] 49. Gatteschi, V.; Lamberti, F.; Demartini, C.; Pranteda, C.; Santamaria, V. To blockchain or not to blockchain: That is the question. IT Prof. 2018, 20, 62–74. [CrossRef] 50. Hoy, M.B. An introduction to the blockchain and its implications for libraries and medicine. Med. Ref. Serv. Q 2017, 36, 273–279. [CrossRef] [PubMed] 51. Panetta, K. Gartner the CIO’s Guide to Blockchain. 2019. Available online: https://www.gartner.com/smarterwithgartner/the- cios-guide-to-blockchain/ (accessed on 25 June 2022). 52. Crosby, M.; Pattanayak, P.; Verma, S.; Kalyanaraman, V. BlockChain technology: Beyond Bitcoin. Appl. Innov. Rev. 2016, 2, 71. 53. Marchesi, L.; Marchesi, M.; Tonelli, R.; Lunesu, M.I. A blockchain architecture for industrial applications. Blockchain Res. Appl. 2022, 3, 100088. [CrossRef] 54. Chen, Y.; Chen, H.; Zhang, Y.; Han, M.; Siddula, M.; Cai, Z. A survey on blockchain systems: Attacks, defenses, and privacy preservation. High Confid. Comput. 2022, 2, 100048. [CrossRef] 55. Munim, Z.H.; Balasubramaniyan, S.; Kouhizadeh, M.; Hossain, N.U.I. Using Bayesian Best Worst Method to assess blockchain technology adoption in the Norwegian oil and gas industry. J. Ind. Inf. Integr. 2022, 28, 100346. 56. Fang, L.; Li, Z.; He, Z. Research on the progress in cross-chain technology of blockchains. J. Softw. 2019, 30, 1649–1660. 57. Iqbal, M.; Matulevicius, ˇ R. Exploring sybil and double-spending risks in blockchain systems. IEEE Access 2021, 9, 76153–76177. [CrossRef] 58. Yli-Huumo, J.; Ko, D.; Choi, S.; Park, S.; Smolander, K. Where Is Current Research on Blockchain Technology? A Systematic Review. PLoS ONE 2016, 11, e0163477. [CrossRef] 59. Hassani, H.L.; Bahnasse, A.; Martin, E.; Roland, C.; Bouattane, O.; Diouri, M.E.M. Vulnerability and security risk assessment in a IIoT environment in compliance with standard IEC 62443. Procedia Comput. Sci. 2021, 191, 33–40. [CrossRef] 60. Florea, B.C. Blockchain and internet of things data provider for smart applications. In Proceedings of the 7th Mediterranean Conference on Embedded Computing (MECO), Budva, Montenegro, 10–14 June 2018. [CrossRef] 61. Kumar, R.L.; Khan, F.; Kadry, S.; Rho, S. A Survey on blockchain for industrial Internet of Things. Alex. Eng. J. 2022, 61, 6001–6022. [CrossRef] 62. Mosenia, A.; Jha, N.K. A comprehensive study of the security of Internet-of-Things. IEEE Trans. Emerg. Top. Comput. 2017, 5, 586–602. [CrossRef] 63. Lu, X.; Niyato, D.; Jiang, H.; Kim, D.I.; Xiao, Y.; Han, Z. Ambient Backscatter Assisted Wireless Powered Communications. IEEE Wirel. Commun. 2018, 25, 170–177. [CrossRef] 64. Makhdoom, I.; Abolhasan, M.; Lipman, J.; Liu, R.P.; Ni, W. Anatomy of threats to the Internet of Things. IEEE Commun. Surv. Tutor. 2018, 21, 1636–1675. [CrossRef] 65. Conoscenti, M.; Vetro, A.; De Martin, J.C. Peer to peer for privacy and decentralization in the internet of things. In Proceedings of the IEEE/ACM 39th IEEE International Conference on Software Engineering Companion, Buenos Aires, Argentina, 20–28 May 2017. 66. Fisher, C.K.; Smith, A.M.; Walsh, J.R. Machine learning for comprehensive forecasting of Alzheimer ’s Disease progression. Sci. Rep. 2019, 9, 13622. [CrossRef] 67. Davenport, T.H.; Harris, J.G.; David, W.; Jacobson, A.L. Data to knowledge to results: Building an analytic capability. Calif. Manag. Rev. 2001, 43, 117–138. [CrossRef] 68. Arunachalam, D.; Kumar, N.; Kawalek, J.P. Understanding big data analytics capabilities in supply chain management: Unravel- ling the issues, challenges and implications for practice. Transport. Res. Part E Log. Transport. Rev. 2018, 114, 416–436. [CrossRef] 69. Ward, J.S.; Barker, A. Undefined by Data: A Survey of Big Data Definitions. arXiv 2013, arXiv:1309.5821. Appl. Syst. Innov. 2023, 6, 54 17 of 18 70. Balachandran, B.M.; Prasad, S. Challenges and Benefits of Deploying Big Data Analytics in the Cloud for Business Intelligence. Procedia Comput. Sci. 2017, 112, 1112–1122. [CrossRef] 71. Blackburn, R.; Lurz, K.; Priese, B.; Göb, R.; Darkow, I.L. A predictive analytics approach for demand forecasting in the process industry. Int. Transact. Operat. Res. 2015, 22, 407–428. [CrossRef] 72. Gunasekaran, A.; Papadopoulos, T.; Dubey, R.; Wamba, S.F.; Childe, S.J.; Hazen, B.; Akter, S. Big data and predictive analytics for supply chain and organizational performance. J. Bus. Res. 2017, 70, 308–317. [CrossRef] 73. Richey, R.G., Jr.; Morgan, T.R.; xLindsey-Hall, K.; Adams, F.G. A global exploration of big data in the supply chain. Int. J. Phys. Distribut. Log. Manag. 2016, 46, 710–739. [CrossRef] 74. Mell, P.; Grance, T. The NIST Definition of Cloud Computing; National Institute of Standards and Technology Special Publication: Gaithersburg, MD, USA, 2011. 75. Avram, M.G. Advantages and challenges of adopting cloud computing from an enterprise perspective. Procedia Technol. 2014, 12, 529–534. [CrossRef] 76. Vasiljeva, T.; Shaikhulina, S.; Kreslins, K. Cloud Computing: Business Perspectives, Benefits and Challenges for Small and Medium Enterprises (Case of Latvia). Procedia Eng. 2017, 178, 443–451. [CrossRef] 77. Han, H.; Fei, S.; Yan, Z.; Zhou, X. A survey on blockchain-based integrity auditing for cloud data. Digit. Commun. Netw. 2022, 8, 591–603. [CrossRef] 78. Chetouane, F. An Overview on RFID Technology Instruction and Application. IFAC PapersOnLine 2015, 48, 382–387. [CrossRef] 79. Wamba, S.F.; Lefebvre, L.A.; Bendavid, Y.; Lefebvre, É. Exploring the impact of RFID technology and the EPC network on mobile B2B eCommerce: A case study in the retail industry. Int. J. Prod. Econ. 2008, 112, 614–629. [CrossRef] 80. Wamba, S.F. Achieving Supply Chain Integration using RFID Technology: The Case of Emerging Intelligent B-to-B e-Commerce Processes in a Living Laboratory. Bus. Process Manag. J. 2012, 18, 58–81. [CrossRef] 81. Duroc, Y.; Tedjini, S. RFID: A key technology for Humanity. Comptes Rendus Phys. 2018, 19, 64–71. [CrossRef] 82. Gunasekaran, A.; Ngai, E.W. Build-to-order supply chain management: A literature review and framework for development. J. Oper. Manag. 2005, 23, 423–451. [CrossRef] 83. Abugabah, A.; Nizamuddin, N.; Abuqabbeh, A. A review of challenges and barriers implementing RFID technology in the Healthcare sector. Procedia Comput. Sci. 2020, 170, 1003–1010. [CrossRef] 84. Liu, X.; Yin, J.; Liu, Y.; Zhang, S.; Guo, S.; Wang, K. Vital signs monitoring with RFID: Opportunities and challenges. IEEE Netw. 2019, 33, 126–132. [CrossRef] 85. Gaukler, G.M.; Seifert, R.W. Seifert. Applications of RFID in supply chains. In Trends in Supply Chain Design and Management; Springer: London, UK, 2007; pp. 29–48. 86. Kuo, C.-H.; Chen, H.-G. The critical issues about deploying RFID in the healthcare industry by service perspective. In Proceedings of the 41st Annual Hawaii International Conference on System Sciences (HICSS 2008), Waikoloa, HI, USA, 7–10 January 2008; p. 111. 87. Gallab, M.; Bouloiz, H.; Tkiouat, M. Modeling and simulation of complex industrial systems. In Modeling and Simulation: Of Complex Industrial Systems; LAP LAMBERT Academic Publishing: Saarbrücken, Germany, 2019. 88. Gajsek, B.; Marolt, J.; Rupnik, B.; Lerher, T.; Sternad, M. Using Maturity Model and Discrete-Event. Int. J. Simul. Model. 2019, 18, 488–499. [CrossRef] [PubMed] 89. Lima, F.; de Carvalho, C.N.; Acardi, M.B.; dos Santos, E.G.; de Miranda, G.B.; Maia, R.F.; Massote, A.A. Digital manufacturing tools in the simulation of collaborative robots: Towards Industry 4.0. Braz. J. Oper. Prod. Manag. 2019, 16, 261–280. [CrossRef] 90. Duplakova, D.; Teliskova, M.; Duplak, J.; Torok, J.; Hatala, M.; Steranka, J.; Radchenko, S. Determination of optimal production process using scheduling and simulation software. Int. J. Simul. Model. 2018, 17, 609–622. [CrossRef] [PubMed] 91. Naciri, L.; Mouhib, Z.; Gallab, M.; Nali, M.; Abbou, R.; Kebe, A. Lean and industry 4.0: A leading harmony. Procedia Comput. Sci. 2022, 200, 394–406. [CrossRef] 92. Bianco, D.; Bueno, A.; Godinho Filho, M.; Latan, H.; Ganga, G.M.D.; Frank, A.G.; Jabbour, C.J.C. The role of Industry 4.0 in developing resilience for manufacturing companies during COVID-19. Int. J. Prod. Econ. 2023, 256, 108728. [CrossRef] 93. Tiwari, K.; Khan, M.S. Sustainability accounting and reporting in the industry 4.0. J. Clean. Prod. 2020, 258, 120783. [CrossRef] 94. Javaid, M.; Haleem, A. Industry 4.0 applications in medical field: A brief review. Cur. Med. Res. Pract. 2019, 9, 102–109. [CrossRef] 95. Javaid, M.; Haleem, A.; Singh, R.P.; Suman, R.; Gonzalez, E.S. Understanding the adoption of Industry 4.0 technologies in improving environmental sustainability. Sustain. Oper. Comput. 2022, 3, 203–217. [CrossRef] 96. Arnold, C.; Kiel, D.; Voigt, K.I. How the industrial internet of things changes business models in different manufacturing industries. Int. J. Innov. Manag. 2016, 20, 1640015. [CrossRef] 97. Ibarra, D.; Ganzarain, J.; Igartua, J.I. Business model innovation through Industry 4.0: A review. Procedia Manfacturing 2018, 22, 4–10. [CrossRef] 98. Bylya, O.I.; Ward, M.; Krishnamurty, B.; Tamang, S.; Vasin, R.A. Modelling challenges for incremental bulk processes despite advances in simulation technology: Example issues and approaches. Procedia Eng. 2017, 207, 2358–2363. [CrossRef] 99. Booch, G.; Rumbaugh, J.; Jacobson, I. The Unified Modeling Language User Guide; 6th printing; Addison Wesley: North York, ON, Canada, 2000. [CrossRef] Appl. Syst. Innov. 2023, 6, 54 18 of 18 100. Gallab, M.; Mouhib, Z.; Naciri, L.; Kebe, S.A.; Nali, M.; Abbou, R.; Di Nardo, M. Aeronautics 4.0: Modeling and Simulation of a Smart Tool. In Proceedings of the 2022 The 3rd International Conference on Industrial Engineering and Industrial Management (IEIM 2022), Barcelona, Spain, 12–14 January 2022; ACM: New York, NY, USA, 2022. [CrossRef] 101. Bakhtari, A.R.; Waris, M.M.; Mannan, B.; Sanin, C.; Szczerbicki, E. Assessing Industry 4.0 Features Using SWOT Analysis. In Proceedings of the Intelligent Information and Database Systems: 12th Asian Conference, ACIIDS 2020, Phuket, Thailand, 23–26 March 2020; Springer: Singapore, 2020. Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. http://www.deepdyve.com/assets/images/DeepDyve-Logo-lg.png Applied System Innovation Multidisciplinary Digital Publishing Institute

Digital Technologies’ Risks and Opportunities: Case Study of an RFID System

Loading next page...
 
/lp/multidisciplinary-digital-publishing-institute/digital-technologies-rsquo-risks-and-opportunities-case-study-of-an-lcDc2eg2fk

References (108)

Publisher
Multidisciplinary Digital Publishing Institute
Copyright
© 1996-2023 MDPI (Basel, Switzerland) unless otherwise stated Disclaimer Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. Terms and Conditions Privacy Policy
ISSN
2571-5577
DOI
10.3390/asi6030054
Publisher site
See Article on Publisher Site

Abstract

Article Digital Technologies’ Risks and Opportunities: Case Study of an RFID System 1 1 , 2 3 4 Lina Naciri , Maryam Gallab * , Aziz Soulhi , Safae Merzouk and Mario Di Nardo MIS-LISTD Laboratory, Computer Science Department, Mines-Rabat School (ENSMR), Rabat 10000, Morocco; lina.naciry@gmail.com Mines-Rabat School (ENSMR), Rabat 10000, Morocco SMARTILAB Laboratory, EMP Department, Moroccan School of Engineering Sciences (EMSI), Rabat 10000, Morocco Department of Chemical, Materials and Production Engineering, University of Naples “Federico ii”, 80125 Naples, Italy * Correspondence: gallab@enim.ac.ma Abstract: Smart technologies have been the subject of a growing interest for the past few years due to the growing market demand. They are believed to improve human life, existence, and companies’ performance. Considering the recent advances, X.0 concept has proven to be a mindset changing so that companies can now see that they can improve their competitiveness, ensure an innovative, sustainable and resilient environment, and smarten and develop their lean manufacturing tools. Nevertheless, if X.0 adoption is still not at its highest level, it is because of the relevant challenges and difficulties that occur during the implementation process. Within this scope, this paper aims, through a systematic literature review, to identify risks and opportunities of X.0 technologies to constitute a referential to be taken into consideration for a successful implementation. Results are validated by the modelling and simulation of an RFID system applied within the automotive industry, for which we identified risks and opportunities from one side and the system contribution in terms of smart Lean Manufacturing. From one hand, the value added of this paper, on the contrary of previous researches, is mainly regrouping risks and opportunities of most relevant digital technologies to conclude on those of X.0 revolution as a concept as described in following sections. From another hand, we Citation: Gallab, M.; Naciri, L.; were able to prove, through a real case study, that X.0 concept directly contribute in smartening and Soulhi, A.; Merzouk, S.; Di Nardo, M. improving lean manufacturing principles. Digital Technologies’ Risks and Opportunities: Case Study of an Keywords: innovative; sustainable; resilient; modeling; risk and opportunities; simulation; X.0 RFID System. Appl. Syst. Innov. 2023, technologies; lean manufacturing 6, 54. https://doi.org/10.3390/ asi6030054 Academic Editors: Felix J. Garcia Clemente and Christos Douligeris 1. Introduction Received: 23 March 2023 Considering the growing demand and competition pressure, digital technologies were Revised: 7 April 2023 the most suitable solution for the growing industrial world. Each year, more countries show Accepted: 25 April 2023 interest and appear to be involved in adopting the digitalization concept. This paradigm has Published: 4 May 2023 seen the light in Germany during the Hanover fair held in 2011 [1]. Researchers interested in exploring the different sectors that are involved and open to investing in revolutionary technologies showed that the three main active sectors were the automotive, aerospace and the food industry [2]. Copyright: © 2023 by the authors. As stated in Figure 1, digital technologies were discovered in 1940 and merged their Licensee MDPI, Basel, Switzerland. benefits over the years to constitute a whole new revolution: the 4th industrial revolution. This article is an open access article This concept gave birth to what we call Industry 4.0 technologies and kept growing by distributed under the terms and introducing new aspects such as environment, social and economic fields. According to this, conditions of the Creative Commons Industry 4.0 moved to the next level: 5.0 technologies. X.0 is therefore used in this paper to Attribution (CC BY) license (https:// creativecommons.org/licenses/by/ talk about all aspects of these new revolutions. These technologies were the most crucial 4.0/). factor for company development [3]. Studies have shown that the most used ones are Appl. Syst. Innov. 2023, 6, 54. https://doi.org/10.3390/asi6030054 https://www.mdpi.com/journal/asi Appl. Syst. Innov. 2023, 6, x FOR PEER REVIEW 2 of 18 Appl. Syst. Innov. 2023, 6, 54 2 of 18 crucial factor for company development [3]. Studies have shown that the most used ones IoT/IIoT, big data, cloud computing, RFID, 3D printing, simulation, robotics, augmented are IoT/IIoT, big data, cloud computing, RFID, 3D printing, simulation, robotics, aug- reality mented rea and cyber lity a-security nd cyber- [se 4,5 c], urthe ity [last 4,5],being the ladir st b ectly eing rd elated irectly r toeblockchain. lated to blocThe kchawhole in. The constitutes whole conthe stitu 10 tepillar s the 1technologies 0 pillar techn and olog companies’ ies and com leaders panies’to lea an ders innovative, to an inno sustainable vative, sus- and resilient environment and smart Lean Manufacturing. tainable and resilient environment and smart Lean Manufacturing. Figure 1. Industrial revolutions through the years. Figure 1. Industrial revolutions through the years. As mentioned in ISO 31000, “Risk management is an integral part of all organiza- As mentioned in ISO 31000, “Risk management is an integral part of all organizational activities” tional activ [6it ].ieAccor s” [6].ding Accor to dithis, ng to t implementing his, implement smart ing stechnologies mart technolog cannot ies can be not realized be real- without ized wit ahpr ou evious t a prev risk ious r analysis, isk analysi which s, wconstitutes hich constitthe utes t second he secaspect ond asp of ec this t of t rh esear is rech. searIn ch. this In t paper his pa , p the er,risk the r was isk w associated as associa with ted w challenges, ith challen barriers ges, barand riers a difn ficulties, d difficu and lties, they andmay they constitute may const ait risk ute a themselves. risk themselves. Based on the result of an extensive literature review, this paper begins with an overview Based on the result of an extensive literature review, this paper begins with an over- of the most relevant advantages. Then it identifies the risks and barriers that should be view of the most relevant advantages. Then it identifies the risks and barriers that should considered before adopting the digitalization concept. This review is followed by the be considered before adopting the digitalization concept. This review is followed by the modelling and simulation of a case study presenting the RFID system adopted by an modelling and simulation of a case study presenting the RFID system adopted by an au- automotive company to enhance the performance of its feeding process. The choice of this tomotive company to enhance the performance of its feeding process. The choice of this case study goes back to the fact that the RFID system represents a relevant example of case study goes back to the fact that the RFID system represents a relevant example of smart lean manufacturing application. smart lean manufacturing application. 2. Contribution and Research Methodology 2. Contribution and Research Methodology Several research studies have exposed and detailed technologies of the most recent Several research studies have exposed and detailed technologies of the most recent industrial revolution. Many have discussed their opportunities and challenges, focusing industrial revolution. Many have discussed their opportunities and challenges, focusing on how this revolution improved the world [7,8]. Each of these studies was focused on a on how this revolution improved the world [7,8]. Each of these studies was focused on a specific field and, therefore, only interested in the technologies that can be useful in the specific field and, therefore, only interested in the technologies that can be useful in the studied area. No overview of the global risks and opportunities was provided, considering studied area. No overview of the global risks and opportunities was provided, consider- all kinds of possible applications of X.0 technologies. ing all kinds of possible applications of X.0 technologies. The contribution of this paper is to develop these studies to gather all technologies’ The contribution of this paper is to develop these studies to gather all technologies’ opportunities and challenges in the same study, thus enabling the exploration of the opportunities and challenges in the same study, thus enabling the exploration of the dif- different benefits that X.0 technologies can bring to a company. ferent benefits that X.0 technologies can bring to a company. This paper also highlights the importance of establishing a risk analysis strategy, as This paper also highlights the importance of establishing a risk analysis strategy, as many risks and barriers may arise. In this case, preventive actions should be prepared as many risks and barriers may arise. In this case, preventive actions should be prepared as a countermeasure. a countermeasure. Targeted readers are researchers of all expertise levels and from diverse research Targeted readers are researchers of all expertise levels and from diverse research backgrounds. backgrounds. This research was developed following the five phases of a Systematic Literature This research was developed following the five phases of a Systematic Literature Re- Review (SLR), starting by defining the problem and formulating the research questions, view (SLR), starting by defining the problem and formulating the research questions, se- selecting databases, and then defining the inclusion and exclusion criteria along with the lecting databases, and then defining the inclusion and exclusion criteria along with the keywords. The next step was searching for relevant papers investigating digital technolo- keywords. The next step was searching for relevant papers investigating digital technol- gies’ benefits, challenges, or both. Analysis results and synthesis are reported in this paper ogies’ benefits, challenges, or both. Analysis results and synthesis are reported in this pa- along with a discussion, thus being the two last phases of an SLR. Elements of each phase per along with a discussion, thus being the two last phases of an SLR. Elements of each are presented in Figure 2. phase are presented in Figure 2. Appl. Syst. Innov. 2023, 6, x FOR PEER REVIEW 15 of 18 opportunities identified during our research on RFID technology, as well as the im- portance and benefit of using simulation. Indeed, results showed that the RFID system would bring many improvement opportunities by eliminating MUDAs and facilitating communication when simulation supported the decision-making process that was com- pleted by a preventive action plan to overcome detected risks and weaknesses. In terms of perspectives, we aim to reinforce this research with a statistical study based on a survey, from which we can come up with lessons learned from smart factories, but also reflect risk and barriers occurrence during the implementation of revolutionary technologies. In addition to that, since the articles studied didn’t rely on a specific risk analysis system or tool, it is interesting to define which risk assessment strategy/tool is suitable for each technology. Author Contributions: Conceptualization, L.N. and M.G.; methodology, L.N.; software, L.N. and M.G.; validation, M.G., A.S., S.M. and M.D.N.; formal analysis, L.N. and M.G.; investigation, L.N. and M.G.; resources, L.N. and M.G.; data curation, L.N. and M.G.; writing—original draft prepara- tion, L.N.; writing—review and editing, L.N. and M.G.; visualization, M.G., A.S., S.M. and M.D.N.; supervision, M.G. All authors have read and agreed to the published version of the manuscript. Funding: This research received no external funding. Institutional Review Board Statement: Not applicable. Informed Consent Statement: Not applicable. Data Availability Statement: Not applicable. Appl. Syst. Innov. 2023, 6, 54 3 of 18 Conflicts of Interest: The authors declare no conflict of interest. Figure 2. SLR phases. References 1. Marzano, G.; Martinovs, A. Teaching Industry 4.0. Soc. Integr. Educ. Proc. Int. Sci. Conf. 2020, 2, 69–76. The problem of this research was basically concerning risks and opportunities of digital 2. Gallab, M.; Bouloiz, H.; Kébé, A.S.; Tkiouat, M. Opportunities and Challenges of the Industry 4.0 in industrial companies: A technologies and was conducted by gathering papers from the most relevant databases Survey on Moroccan firms. J. Ind. Bus. Econ. 2021, 48, 413–439. 3. Relich, M. The impact of (Elsevier ICT on labor produ , Springer ctivity in the , IEEE, etc.) EU. using Inf. Technol. specific Dev. keywor 2017, 23, 7 ds 06–722. such as the combination of “digital 4. Marina, M.; Abrar Ali, D.; Mukund, J.; Izabela, N. Lean manufacturing and Industry 4.0 combinative application: Practices and technologies” with “Risks”, “Barriers”, “Benefits”, “Opportunities”, etc., and focusing on perceived benefits. IFAC PapersOnLine 2021, 54, 288–293. specific criteria (Scopus indexation, English usage, paper type, etc.). This paper reflects the 5. McKiea, M.G.; Jonesb, R.; Milesc, J.; Jonesd, I.R. Improving Lean Manufacturing Systems and Tools Engagement Through the result of analyzing the 101 selected papers. Utilisation of Industry 4.0. Improved Communication and a People Recognition Methodology in a UK Engine Manufacturing This review was concretized through the analysis of a model describing the solution adopted Centre. Procedia Manuf. 2021, 55, 371–382. 6. ISO 31000.2018; Risk Management—Guidelines. International Organization for Standardization ISO Central Secretariat: Ge- by an automotive company to increase the performance of its feeding process. A simulation was neva, Switzerland, 2018. also performed to detect the changes that occurs after implementing the new system. 7. Sishi, M.; Telukdarie, A. Implementation of Industry 4.0 technologies in the mining industry—A case study. Int. J. Min. Miner. Eng. 2020, 11, 1–22. 3. X.0 Technologies 8. Frank, A.G.; Dalenogare, L.S.; Ayala, N.F. Industry 4.0 technologies: Implementation patterns in Manufacturing companies. Int. Digitalization can be defined as the integration of digital technologies within the J. Prod. Econ. 2019, 210, 15–26. production systems to make tasks more autonomous, flexible, efficient and safe since it limits the physical contact between machines and humans. It is a new way of Manufacturing where manual operations are nearly absent, and resources are used in an efficient way. This opening on digital technologies raises new challenges, mainly regarding cybersecurity. This section develops the advantages and challenges of the 10 pillar smart technologies. 3.1. 3D printing/Additive Manufacturing (AM) Also called additive Manufacturing, printing advanced technologies, being easy to manufacture, are highly used for research matters and to develop new products. Associated with waste reduction, energy efficiency, and decreased resource involvement, it allows more flexibility in product manufacturing and a quick and efficient process [9,10]. AM had a remarkable contribution within the medical field, especially regarding Appl. Syst. Innov. 2023, 6, x FOR PEER REVIEW 4 of 18 prosthetics (bone and cartilage replacements), dental implants, hearing aids, and other products, as shown in Figure 3 [11–14]. Figure 3. AM contribution within the medical field [15]. Figure 3. AM contribution within the medical field [15]. One of the most important advantages of AM is its opportunity to create customized products of multiple forms [16]. Shape complexity, scrap generation, accuracy and preci- sion are no longer an issue. However, depending on the process used (Stereolithography, Fused Deposition Modelling, Powder Bed Fusion, Selective Laser Sintering, Binder Jet- ting, Direct Energy Deposition or Laminated Object Manufacturing), 3D printing presents many risks and complications, such as high cost and slow/Time-consuming process [10]. The first challenge to consider is choosing the right AM process, which includes selecting the suitable material. Indeed, some 3D printers have low dimensional accuracy, low lifespan, poor mechanical properties and powder agglomeration limitation. Therefore, de- pending on the final usage, a limited material choice can exist. Other barriers to consider are the necessity of staff re-education and the lack of guidelines [15]. 3.2. Augmented Reality Augmented reality (AR) is an emergent technology commonly known for its ability to allow interactive digital information in the real world and in real time, combining vir- tual and real environments. Therefore, it is a promising technology supporting knowledge-intensive works [17]. AR strength goes back to its variant application domains such as education [18,19], medicine [20], manual assembly and Manufacturing [21,22] and maintenance [22–24]. However, it is growing in wider fields such as healthcare, military operations, marketing, and others [25]. Other popular applications of AR include training [26], remote support [27] and context-sensitive instructions [28], thus enabling users to improve various task performance metrics such as completion time, accuracy, sources of error identification [29] and human error reduction by relieving mental fatigue, [30]. Moreover, when it comes to prototyping, AR is a perfect tool for cost reduction and can be used as decision support through simulation and without any risk to operator safety [31]. Nevertheless, the main roadblock to AR adoption is usually the expensive equipment required [32] and the need for cognitive skills, which is not yet ensured as there’s still insufficient awareness of AR staff technologies caused by a lack of information on stand- ardized procedures. The complexity of its implementation and the high risk of cyber security issues are also considered major risks that may discourage companies from adopting AR [31]. 3.3. Robotics Recently, whether they are industrial or service-oriented, Robots have seen increas- ing success across the globe. Indeed, the International Federation of Robotics (IFR) men- tions that its annual turnover is $50 billion [33], which is far from surprising considering its various features as shown in Figure 4. Appl. Syst. Innov. 2023, 6, 54 4 of 18 One of the most important advantages of AM is its opportunity to create customized products of multiple forms [16]. Shape complexity, scrap generation, accuracy and precision are no longer an issue. However, depending on the process used (Stereolithography, Fused Deposition Modelling, Powder Bed Fusion, Selective Laser Sintering, Binder Jetting, Direct Energy Deposition or Laminated Object Manufacturing), 3D printing presents many risks and complications, such as high cost and slow/Time-consuming process [10]. The first challenge to consider is choosing the right AM process, which includes selecting the suitable material. Indeed, some 3D printers have low dimensional accuracy, low lifespan, poor mechanical properties and powder agglomeration limitation. Therefore, depending on the final usage, a limited material choice can exist. Other barriers to consider are the necessity of staff re-education and the lack of guidelines [15]. 3.2. Augmented Reality Augmented reality (AR) is an emergent technology commonly known for its ability to allow interactive digital information in the real world and in real time, combining virtual and real environments. Therefore, it is a promising technology supporting knowledge- intensive works [17]. AR strength goes back to its variant application domains such as education [18,19], medicine [20], manual assembly and Manufacturing [21,22] and mainte- nance [22–24]. However, it is growing in wider fields such as healthcare, military operations, marketing, and others [25]. Other popular applications of AR include training [26], remote support [27] and context-sensitive instructions [28], thus enabling users to improve various task performance metrics such as completion time, accuracy, sources of error identifica- tion [29] and human error reduction by relieving mental fatigue, [30]. Moreover, when it comes to prototyping, AR is a perfect tool for cost reduction and can be used as decision support through simulation and without any risk to operator safety [31]. Nevertheless, the main roadblock to AR adoption is usually the expensive equipment required [32] and the need for cognitive skills, which is not yet ensured as there’s still insufficient awareness of AR staff technologies caused by a lack of information on standardized procedures. The complexity of its implementation and the high risk of cyber security issues are also considered major risks that may discourage companies from adopting AR [31]. 3.3. Robotics Recently, whether they are industrial or service-oriented, Robots have seen increasing success across the globe. Indeed, the International Federation of Robotics (IFR) mentions that its annual turnover is $50 billion [33], which is far from surprising considering its Appl. Syst. Innov. 2023, 6, x FOR PEER REVIEW 5 of 18 various features as shown in Figure 4. Figure Figure 4 4. . K Key ey ffeatur eatures es ofof rob robots ots [34[]. 34 ]. Robots’ major asset is that they can be used in many different ways, either for labor- atory experiments [35], manufacturing, agriculture, farming and construction, or as a do- mestic or professional service. They can serve for housekeeping, safety or domestic assis- tance, surveillance, exploration or education. In the medical field, robots greatly enhance surgical operations and diagnostics and can also be used for nursing. By replacing human beings with a robot, either completely or partially (depending on the operation to be performed), companies will be able to eliminate redundant work- flows and human involvement in unsafe, repetitive and intensive tasks, enhance opera- tional efficiency, get quick access to data and information and reduce workload while be- ing able to handle complex tasks [34,36]. Furthermore, exploiting these advantages re- duces assembly time and monotony and improves quality and flexibility [37]. Regardless of the numerous advantages of robots, several threats must be consid- ered, mostly related to security (firmware, communication protocols, data storage, cryp- tography, control systems), cyber-criminality, actuation and movement accuracy and safety since robots can be unpredictable and potentially dangerous [38]. Furthermore, from an ethical point of view, people tend to express a remarkable resistance motivated by the fear of losing their job or impacting human relationships, especially concerning domestic robots or those dedicated to caring for our elderly and children [35,39]. The lack of knowledge can also explain this since robots require technical expertise and training. Sometimes, working alongside the robots can also be psychologically challenging for a human being [40]. 3.4. Cybersecurity Driven by the development of IoT, cloud computing …, data protection became the first concern of companies. Data loss or leakage can highly threaten business, notoriety and trust [41], which results in legal penalties and financial and reputation losses [42] and, in case of identity forgery, may lead to fake data/information and wrong status (sensors) [43]. It is a matter of a few minutes for an attacker to access and take control of the entire system just through one exploitable vulnerability [44]. Accordingly, cyber-security allows the company to protect computers, servers, mobile phones, and electronic systems from malicious attacks, protecting the information on these devices and the identity of people using them [45]. Cyber-security threats are divided into three categories: Cybercrime (Sabotage, Mon- etize), Cyber-attack (Information gathering) and Cyber-terrorism (System destruction) Appl. Syst. Innov. 2023, 6, 54 5 of 18 Robots’ major asset is that they can be used in many different ways, either for lab- oratory experiments [35], manufacturing, agriculture, farming and construction, or as a domestic or professional service. They can serve for housekeeping, safety or domestic assis- tance, surveillance, exploration or education. In the medical field, robots greatly enhance surgical operations and diagnostics and can also be used for nursing. By replacing human beings with a robot, either completely or partially (depending on the operation to be performed), companies will be able to eliminate redundant workflows and human involvement in unsafe, repetitive and intensive tasks, enhance operational efficiency, get quick access to data and information and reduce workload while being able to handle complex tasks [34,36]. Furthermore, exploiting these advantages reduces assembly time and monotony and improves quality and flexibility [37]. Regardless of the numerous advantages of robots, several threats must be considered, mostly related to security (firmware, communication protocols, data storage, cryptography, control systems), cyber-criminality, actuation and movement accuracy and safety since robots can be unpredictable and potentially dangerous [38]. Furthermore, from an ethical point of view, people tend to express a remarkable resistance motivated by the fear of losing their job or impacting human relationships, especially concerning domestic robots or those dedicated to caring for our elderly and children [35,39]. The lack of knowledge can also explain this since robots require technical expertise and training. Sometimes, working alongside the robots can also be psychologically challenging for a human being [40]. 3.4. Cybersecurity Driven by the development of IoT, cloud computing . . . , data protection became the first concern of companies. Data loss or leakage can highly threaten business, notoriety and trust [41], which results in legal penalties and financial and reputation losses [42] and, in case of identity forgery, may lead to fake data/information and wrong status (sensors) [43]. It is a matter of a few minutes for an attacker to access and take control of the entire system just through one exploitable vulnerability [44]. Accordingly, cyber-security allows the company to protect computers, servers, mobile phones, and electronic systems from malicious attacks, protecting the information on these devices and the identity of people using them [45]. Cyber-security threats are divided into three categories: Cybercrime (Sabotage, Mone- tize), Cyber-attack (Information gathering) and Cyber-terrorism (System destruction) [46]. Unfortunately, it is impossible to fully detect and eliminate vulnerabilities against these threats [46]. 3.5. Blockchain Since it was first identified by Chaum in his PhD thesis in 1982 [47], blockchain has increasingly evolved over the years and gained in terms of performance. Moreover, this evolution led to the enlargement of its applications to the whole social level [48,49]. Indeed, blockchain was defined as the fifth breaking innovation within the computing paradigm, preceded by the mainframe, personal computer, internet, mobile and social network [50], and Gartner ’s recently predicted that blockchain technology will contribute $3.1 trillion of new business value by 2030 [51]. Applied in all trustworthy fields with strong certifications, blockchain is the enabler of the digital currency known as Bitcoin [52]. From Blockchain 1.0 (Bitcoin and the like) to Blockchain 2.0 (Ethereum and SCs), to Blockchain 3.0 (IOTA, Cardano, Tezos, etc.), and the ongoing Blockchain 4.0 (use of A.I., Blockchain as a Service, etc.), This technology has many advantages [53,54]: distribution: a resilient and secured system through storage of information on multiple computers; traceability: all transactions are traceable; anonymity: addresses’ owners’ name is only used to prove the ownership of a private key. Transactions can be done anonymously; Appl. Syst. Innov. 2023, 6, 54 6 of 18 decentralization: transactions are managed without a central authority; immutability: once accepted, it is not possible to modify data; cost friendly: open-source software with low maintenance costs; autonomy: data exchange, record, and update are performed in a trustworthy environ- ment using consensus-based specifications and protocols. Therefore, it ensures the au- thenticity of the recorded transaction on the blockchain without human intervention. Despite the promising features of blockchain, the technology is still not highly adopted [55] due to its several drawbacks. Indeed, blockchain still has performance and scalability issues, their energy consumption is high, their cost is not predictable and there is no control of written and read information, especially regarding public blockchains [53]. In addition to that, security is still a huge concern for this technology. On 22 May 2018, hackers attacked the blockchain Verge, stealing nearly 35 million anonymous coins [56]. On 5 January 2019, hackers caused a loss of $1.1 million US dollars by attacking the blockchain Ethereum Classic (ETC) [54,57]. Another constraint to consider is that successful blockchain implementation goes with integrating several technologies, such as big data and cloud computing, making the process much more difficult [57]. Finally, from an organizational aspect, barriers to be expected are a lack of skills, tools (hardware and software) and standards/business models for both implementation and maintenance [55]. 3.6. IoT/IIoT Internet of Things (IoT) is the technology that connects physical objects to each other, making them able to communicate using the internet, actuators and sensing tools that gather data to generate actions using devices [58–60], thus enhancing communication possibilities between virtual and physical worlds [61]. It is commonly used in domestic equipment (Smart home), medical and healthcare field and within societies (Smart city, connected vehicle). However, it is also strongly used in the industrial field such as industrial automation, smart grid, maintenance forecast and transportation. This specific side of this concept gave birth to the Industrial Internet of Things (IIoT). IIoT can promote various industrial applications related to logistics, Manu- facturing, food production and services, enhancing business competence and manufacture, decreasing downtime, and improving product excellence [60]. Nevertheless, resources, battery energy, storage space and processing resources were limited, making IoT very challenging to Implement [62]. Indeed, most IoT nodes are de- signed to be of small volume and weight, not leaving enough space for a larger battery [60]. Moreover, regarding safety and confidentiality risks, IoT nodes usually gather sensitive and confidential data but do not protect them with the necessary processing powers [63,64]. In addition to that, IoT systems, being heterogenous and decentralized, presents poor interoperability [60]. 3.7. Big Data Since its first appearance, big data has been proven to be a life-changing technology both personally and professionally from different aspects [65]. Nowadays, it is highly relied on for decision-making (data-driven decisions), especially in a highly dynamic business environment [66,67]. Moreover, thanks to its capacity to store and analyse complex, volumi- nous and heterogenous data [68], the overall goal of big data is to create an understandable structure based on extracted information from a huge data set [69]. It is an enabling technology for cost reduction, faster and better decision making, new products and services created for customers, a very powerful strategy for online businesses and fraud Detection [69]. However, it presents many risks, such as poor data quality, lack of trust in data, lack of sufficient resources, lack of security and privacy and lack of financial support [70]. In addition, it is a time-consuming technology comprising various phases of development, testing, and adoption, which commits the top management a mandatory condition for its implementation and may therefore take one year to one and a half years. In case of failure, the company may face a loss of confidence to recover the investment Appl. Syst. Innov. 2023, 6, x FOR PEER REVIEW 7 of 18 Manufacturing, food production and services, enhancing business competence and man- ufacture, decreasing downtime, and improving product excellence [60]. Nevertheless, resources, battery energy, storage space and processing resources were limited, making IoT very challenging to Implement [62]. Indeed, most IoT nodes are de- signed to be of small volume and weight, not leaving enough space for a larger battery [60]. Moreover, regarding safety and confidentiality risks, IoT nodes usually gather sensi- tive and confidential data but do not protect them with the necessary processing powers [63,64]. In addition to that, IoT systems, being heterogenous and decentralized, presents poor interoperability [60]. 3.7. Big Data Since its first appearance, big data has been proven to be a life-changing technology both personally and professionally from different aspects [65]. Nowadays, it is highly re- lied on for decision-making (data-driven decisions), especially in a highly dynamic busi- ness environment [66,67]. Moreover, thanks to its capacity to store and analyse complex, voluminous and heterogenous data [68], the overall goal of big data is to create an under- standable structure based on extracted information from a huge data set [69]. It is an enabling technology for cost reduction, faster and better decision making, new products and services created for customers, a very powerful strategy for online busi- nesses and fraud Detection [69]. However, it presents many risks, such as poor data qual- ity, lack of trust in data, lack of sufficient resources, lack of security and privacy and lack of financial support [70]. In addition, it is a time-consuming technology comprising vari- ous phases of development, testing, and adoption, which commits the top management a Appl. Syst. Innov. 2023, 6, 54 7 of 18 mandatory condition for its implementation and may therefore take one year to one and a half years. In case of failure, the company may face a loss of confidence to recover the investment made (return on investment (ROI) issues) [71]. Even with its enormous evolu- made tion, la (rc et k o urn f skil on ls, investment experts, a(ROI) nd daissues) ta scala[b 71 ilit ].y a Even re awith lso toits beenormous counted aevolution, s the biggelack st risks of that occur while adopting big data [72]. skills, experts, and data scalability are also to be counted as the biggest risks that occur while adopting big data [72]. 3.8. Cloud Computing 3.8. Cloud Computing The United States Institute of Standards (NIST) defines Cloud computing as “a model The United States Institute of Standards (NIST) defines Cloud computing as “a model for enabling ubiquitous, convenient, on-demand network access to a shared pool of con- for enabling ubiquitous, convenient, on-demand network access to a shared pool of config- figurable computing resources such as networks, servers, storage, applications, and ser- urable computing resources such as networks, servers, storage, applications, and services”. vices”. Cloud computing has five essential characteristics that distinguish it from other Cloud computing has five essential characteristics that distinguish it from other computing computing paradigms and counts four deployment models that are represented in Figure paradigms and counts four deployment models that are represented in Figure 5 [73]. 5 [73]. Figure 5. Cloud computing characteristics and models. Figure 5. Cloud computing characteristics and models. Cloud computing is known for its cost efficiency, scalability, elasticity, almost unlimited Cloud computing is known for its cost efficiency, scalability, elasticity, almost unlim- storage capacity and continuous availability as it offers easy access to information in ited storage capacity and continuous availability as it offers easy access to information in different time zones and geographic locations. Moreover, it is one of the few technologies different time zones and geographic locations. Moreover, it is one of the few technologies that present the advantage of being fast to deploy and easy to integrate, all along with having a robust architecture that ensures its resiliency and redundancy [69]. This innovative concept also delivers services that were not possible before, such as mobile interactive applications (location, humidity, stress sensors, worldwide weather data, etc.), can lower IT barriers to innovation [74], provides data backup services, disaster recovery and automatic software updates [75]. Nevertheless, free access to cloud storage servers is limited and, therefore, not enough to reliably save and maintain data, pushing users to purchase extra cloud storage services. It also presents huge security risks due to vulnerabilities of central auditing servers [76], which require a vast and complex hardware infrastructure and new skill sets. Finally, from a political point of view, it represents several issues related to where the physical data resides, where processing takes place, and where the data is accessed. The full potential of cloud computing is constrained by the availability of high-speed access to all users [74]. 3.9. Radio-Frequency Identification (RFID) Radio Frequency IDentification (RFID) is a wireless communication technology that, using tags (fully or partially passive or active), antennas and a host computer or mid- dleware, captures data and links it to different attributes such as serial number, position, colour, date of purchase and other information about the entity carrying the Tag, through a data collection process based on electromagnetic waves exchange between RFID tags and RFID readers. Communication performances, interaction with other supply chain information sys- tems and level of standardization of this new concept have known an increasing success during the last few years [77–79]. Indeed, it became omnipresent in our daily life routines such as ticketing, payment, passports, car keys, etc. RFID systems vary one from another depending on the involved frequencies: micro-waves, Ultra High Frequencies (UHF), High Frequencies (HF), Low Frequencies (LF), which define the read ranges [80]. In the industrial Appl. Syst. Innov. 2023, 6, 54 8 of 18 field, it offers better visibility and tractability in logistical and Manufacturing processes [77], unitary identification and low-cost tags [80], with real-time data collection and sharing [81]. Furthermore, RFID technology, by redesigning the inter and intraorganizational business processes that, could lead to the emergence of the so-called “smart processes”, which are processes that can initiate business transactions without any human interventions and, therefore, ease the integration of inter- and intraorganizational information systems [78,79]. Regardless of the remarkable evolution of this technology, many risks are still threaten- ing its implementation success, such as data security and privacy that can be easily hacked or captured by hidden readers as data transmission is ensured through air interface [77]. In addition to that, RFID requires extravagant equipment, which ends up with a high cost that may not be covered by some companies [82], especially since it is constraint by a limited channel bandwidth [83] and by material to use since communication cannot be ensured efficiently through metals or liquids [84]. This includes a lack of technical and financial support and a lack of skilled experts [85]. 3.10. Simulation Simulation is the virtual scientific approach designed to experiment on a model representing a real phenomenon or a given system or product. One can study and observe characteristics and behavior under different configurations. It highly serves the decision- making process through real-time testing, considering real production constraints, which allows better control of work results without the cost and time consumed using the old way based on prototypes [86–88]. Nevertheless, without a clear understanding of the process and its parameters, and a proper understanding of the problem, companies risk getting the wrong conception and, therefore, not achieving the expected results [89,90]. This can also be related to the lack of skills and knowledge in terms of simulation and the diversity and complexity of the dedicated software or application with poor access to guidelines [91]. 3.11. Analysis and Discussion Following the performed literature review results, Tables 1 and 2 summarize the most relevant risks and opportunities of digital technologies. The process was to first identify keywords representing risks and opportunities for each technology independently, then identify the common ones to evaluate the criticality and occurrence of each risk and the importance of each opportunity. The tables regroup the most relevant ones but don’t present an exhaustive list, as the target is to understand mostly the roadblocks or the key elements that don’t encourage companies to adopt the digitalization concept and to study the potential motivations behind companies’ interest towards digitalization. The keywords were chosen in a way to be precise and explanative at the same time. For instance, “flexibility” was used to identify the technologies that offer the possibility to improve companies’ processes and make them flexible either when it comes to precision, diversity of products or accuracy of data when interactivity describes the technologies that allow interaction between virtual and real words. When it comes to risks, the keyword Complexity was used to identify the technologies in which implementation is difficult and is mostly linked to a lack of skills and guidelines. Accordingly, we can conclude that most smart technologies present the advantage of bringing effectiveness and flexibility to the processes among companies, making them more performant. Some of them also allow interaction between reality and virtual worlds, such as Augmented reality, IoT/IIoT and RFID systems, while others can be used as decision-making support, such as Augmented reality, big data and simulation. Appl. Syst. Innov. 2023, 6, 54 9 of 18 Table 1. Opportunities for digital technologies. Easy/Quick Decision Data Opportunities Efficiency Flexibility Precision Interactivity Traceability Process Support Protetction 3D printing /Additive [9,10] [9,10] [15] [15] manufacturing (AM) Augmented [29] [17] [29] reality Robotics [34,36] [35,37] Cyber security [45] Blockchain [53,54] [53,54] IoT/IIoT [60] [61] Big data [68] [66,67] [66,67] Cloud [69] [69] [69] computing Radio-Frequency Identification [78,79] [77–79] [77] (RFID) Simulation [86,89] [86,89] [86–88] Table 2. Risks of digital technologies. Expensive Lack of /Time- Poor Limited Data Safety/Cyber Resistance Risks Skills Complexity Consuming Properties Choice Accuracy Security to Change /Guidelines Process 3D printing/Additive [10] [16] [10] [16] manufacturing (AM) Augmented reality [32] [31] [31] [31] Robotics [36] [38] [35,39] Cyber security [46] Blockchain [53] [55] [54,56,57] [57] IoT/IIoT [63,64] [63,64] [60,62] Big data [68] [72] [70] [68] Cloud computing [76] [74] [76] [74] Radio-Frequency [82] [84] [83] [85] [77] [77] Identification (RFID) Simulation [90] [90] By getting closer to X.0 technologies through this review, it is clear that smart practices, flexibility, reliability and responsiveness played an important role in resilience develop- ment. A survey answered by various sectors proved that smart practices ensured by X.0 technologies led to an innovative reconfiguration of Manufacturing processes and products (volume/diversity) [92]. More than that, Industry X.0 highly contributes to industrial inno- vation, sustainability, and efficiency (environmental, social, and economic). For example, Artificial intelligence and Machine learning can be used to identify solutions for environ- mental issues such as waste control, resource optimization, carbon neutrality, etc. [93,94]. The substitution of paperwork by digital electronic devices, smart grids, green energy management, reducing energy consumption through IoT technology, usage of modelling software to optimize buildings, material saving and waste reduction through 3D printing and adoption of a photovoltaic system are some of the numerous sustainable aspects of X.0 technologies [95]. Finally, digitalization made people change their way of thinking and Appl. Syst. Innov. 2023, 6, 54 10 of 18 managing their factories, which brings to light the innovative aspect of Industry X.0. In fact, it provides opportunities to create new and more individualized products [96], new ways of interaction, a better understanding of customers’ needs, smart goods and services, etc. [97]. Nevertheless, digital technologies are subject to several risks, the most critical one being data security. Implementing their means, therefore, implementing a solid cyber- security system. On the other hand, the low digital maturity of companies can be justified by the high investment required and the complexity of the implementation process which itself can’t be supported by companies due to the lack of skills and guidelines. 4. Case study Simulation: Risks and Opportunities of an RFID System To better understand the literature review results, a case study was conducted on an industrial company operating within the automotive field. This company aims to improve its components’ feeding flow and control by implementing an RFID system. The first step was to observe the existing flow and identify the weaknesses of the actual system using check sheets, daily follow-up, time measurement and operations classification. These parameters were then affected to the simulation model presented in Figure 6 as inputs. The “0” reflected in the simulation model are related to fact that at it represents the model in its initial status (Simulation not yet launched), which means that there’s 0 entity at each process. The goal of this simulation is to analyze the behavior of the current system and identify the bottleneck processes and wastes (MUDAs) to be eliminated for a better performance. To define probability lows to be used for each process, we used Appl. Syst. Innov. 2023, 6, x FOR PEER REVIEW 11 of 18 Input analyzer tool within ARENA software. Figure 6. Simulation model of the current system. Figure 6. Simulation model of the current system. Results showed that the actual system is impacted by waiting time, overstock, non- Results showed that the actual system is impacted by waiting time, overstock, non- added value operations, absence of a control system, absence of a work instruction, no added value operations, absence of a control system, absence of a work instruction, no visibility on actual consumption, and no traceability (Consumption vs. available). Once visibility on actual consumption, and no traceability (Consumption vs. available). Once these issues are detected and analyzed, the next step is to identify the most suitable tech- these issues are detected and analyzed, the next step is to identify the most suitable technol- nology. By consulting experts and holding meetings for experience sharing and bench- ogy. By consulting experts and holding meetings for experience sharing and benchmarking, m the arcompany king, the c concluded ompany co that nclu RFID ded th isathe t RFI golden D is thticket e goldto enachieving ticket to athe chie expected ving the e results. xpected result Using s. SAP software, actors of this system will manage to check the needed components Using SAP software, actors of this system will manage to check the needed compo- and set a feeding list that will be validated once feeding trolley capacity is achieved. This n responsibility ents and set ais fegiven eding list to the tha war t wehouse ill be vadistributor lidated onc ,e who feedcan ing t access rolley c pr aeviously pacity is a validated chieved. T lists his r ifesp needed onsibili or ty is giv print them en to t to hemake wareh the ouse feeding distribpr utocess or, wh easier o can. aIn cceaddition, ss previouto sly v avoid ali- useless movements back and forth to the warehouse, an in-line distributor can have access dated lists if needed or print them to make the feeding process easier. In addition, to avoid useless movements back and forth to the warehouse, an in-line distributor can have access to the trolley preparation status so that he only goes to the warehouse once the trolley is completed. Meanwhile, he is responsible for scanning empty boxes by putting them in the RFID structure. These actions are represented by the use case diagram in Figure 7, a diagram that represents the structure of major functionalities needed by each user of a given sys- tem [98]. Figure 7. Use a case diagram of the RFID system. Appl. Syst. Innov. 2023, 6, x FOR PEER REVIEW 11 of 18 Figure 6. Simulation model of the current system. Results showed that the actual system is impacted by waiting time, overstock, non- added value operations, absence of a control system, absence of a work instruction, no visibility on actual consumption, and no traceability (Consumption vs. available). Once these issues are detected and analyzed, the next step is to identify the most suitable tech- nology. By consulting experts and holding meetings for experience sharing and bench- marking, the company concluded that RFID is the golden ticket to achieving the expected results. Using SAP software, actors of this system will manage to check the needed compo- nents and set a feeding list that will be validated once feeding trolley capacity is achieved. This responsibility is given to the warehouse distributor, who can access previously vali- dated lists if needed or print them to make the feeding process easier. In addition, to avoid Appl. Syst. Innov. 2023, 6, 54 11 of 18 useless movements back and forth to the warehouse, an in-line distributor can have access to the trolley preparation status so that he only goes to the warehouse once the trolley is completed. to the trolley preparation status so that he only goes to the warehouse once the trolley Meanwhile, he is responsible for scanning empty boxes by putting them in the RFID is completed. structure. These actions are represented by the use case diagram in Figure 7, a diagram Meanwhile, he is responsible for scanning empty boxes by putting them in the RFID that represents the structure of major functionalities needed by each user of a given sys- structure. These actions are represented by the use case diagram in Figure 7, a diagram that tem [98]. represents the structure of major functionalities needed by each user of a given system [98]. Appl. Syst. Innov. 2023, 6, x FOR PEER REVIEW 12 of 18 Figure 7. Use a case diagram of the RFID system. Figure 7. Use a case diagram of the RFID system. When When i itt c comes omes t to o t the he s sequencing equencing o of f t these hese a actions, ctions, t they hey ar are p e pr resented esented i in n t the he s sequence equence diagram in Figure 8, reflecting the temporal succession of the process and the interaction diagram in Figure 8, reflecting the temporal succession of the process and the interaction between the object of the system [98,99]. between the object of the system [98,99]. Figure 8. Sequence diagram of the RFID system. Figure 8. Sequence diagram of the RFID system. Along with line production, the in-line distributor collects the empty boxes and puts Along with line production, the in-line distributor collects the empty boxes and puts them in the RFID structure in order to be scanned, then takes them to the empty boxes them in the RFID structure in order to be scanned, then takes them to the empty boxes trolley. Once the RFID reader scans the label printed in the box, the respective reference trolley. Once the RFID reader scans the label printed in the box, the respective reference is automatically sent to the SAP system as a signal that the concerned component needs is automatically sent to the SAP system as a signal that the concerned component needs to be refilled. A new picking list is created with details of the component’s information to be refilled. A new picking list is created with details of the component’s information (Concerned production line, component name and type, quantity needed, number of boxes (Concerned production line, component name and type, quantity needed, number of needed, etc.). The warehouse operator grabs the components and puts them in the feeding boxes needed, etc.). The warehouse operator grabs the components and puts them in the trolley, and the SAP system updates the inventory accordingly. This sequence is repeated feeding trolley, and the SAP system updates the inventory accordingly. This sequence is repeated until the feeding trolley is full, then the actual picking list is validated and a new one is created. A signal is then sent to the in-line distributor that moves the empty boxes trolley to the warehouse, grabs the full boxes trolley and starts the feeding process inside production lines. This cycle is then repeated until the end of the shift. It can also be inter- rupted in case of urgent need. To better observe the behavior of the RFID system, the simulation model presented in Figure 9 was performed using different parameters to verify the system’s reaction to different situations and in different conditions. Similarly to the first simulation, we used timings taken after system implementation and listed the new operations performed by the feeding operator to be used as input for the simulation model, and relied on Input analyzer to define probability laws of each process. The “0” reflected in the simulation model are related to fact that at it represents the model in its initial status (Simulation not yet launched), which means that there’s 0 entity at each process. Appl. Syst. Innov. 2023, 6, 54 12 of 18 until the feeding trolley is full, then the actual picking list is validated and a new one is created. A signal is then sent to the in-line distributor that moves the empty boxes trolley to the warehouse, grabs the full boxes trolley and starts the feeding process inside production lines. This cycle is then repeated until the end of the shift. It can also be interrupted in case of urgent need. To better observe the behavior of the RFID system, the simulation model presented in Figure 9 was performed using different parameters to verify the system’s reaction to different situations and in different conditions. Similarly to the first simulation, we used timings taken after system implementation and listed the new operations performed by the feeding operator to be used as input for the simulation model, and relied on Input analyzer to define probability laws of each process. The “0” reflected in the simulation Appl. Syst. Innov. 2023, 6, x FOR PEER REVIEW 13 of 18 model are related to fact that at it represents the model in its initial status (Simulation not yet launched), which means that there’s 0 entity at each process. Figure 9. Simulation model of the RFID system. Figure 9. Simulation model of the RFID system. Results showed that after implementing the RFID system, several MUDAs were elim- Results showed that after implementing the RFID system, several MUDAs were inated such as waiting time as the operator, once he gets to the supermarket, the trolley eliminated such as waiting time as the operator, once he gets to the supermarket, the trolley will be already ready to pick which reduce the waiting time to zero. In addition to that, will be already ready to pick which reduce the waiting time to zero. In addition to that, the the operator no longer needs to keep checking boxes consumption status as empty boxes operator no longer needs to keep checking boxes consumption status as empty boxes will be will b scanned e scanusing ned uthe sing t RFID he R str FIuctur D stru e,cwhich ture, wallows hich allo to w dedicate s to ded other icate o responsibilities ther responsibto ilitthe ies to the feeding operator and also reduce their number. feeding operator and also reduce their number. A A r risk isk a analysis nalysis was was a also lso established establisheto d t identify o identif risks y risks and a rn oadblocks d roadblo that cks may that m bea faced y be during faced dor urafter ing or the afimplementation ter the implemeof nta the tion RFID of tsystem he RFID in sor ys der tem i ton or establish der to e countermeasur stablish coun- es accordingly, thus using the SWOT matrix, a technique commonly used since the 1960s– termeasures accordingly, thus using the SWOT matrix, a technique commonly used since 1970s to identify the internal strengths and weaknesses and the external opportunities and the 1960s–1970s to identify the internal strengths and weaknesses and the external oppor- thr tuneats ities a ofn adsystem threats [100 of a, sys 101]. tem Results [100,10 ar1 e].summarized Results are su inm Figur mariz e 10 ed. in Figure 10. As already stated, Industry X.0 technologies are also used to support the smartening of lean manufacturing tools and principles [14]. They are two complementary concepts: Lean principles eliminate MUDA and ensure standardization for a smooth implementa- tion of X.0 technologies when Industry X.0 allows the smartening and development of lean manufacturing tools without bringing any change to its principles [92]. Indeed, the implementation of the RFID system contributed to waste elimination by replacing paper with digital tools, better control of inventory which eliminated the risk of overstock, and no more waiting time. Figure 10. SWOT analysis of the RFID system. As already stated, Industry X.0 technologies are also used to support the smartening of lean manufacturing tools and principles [14]. They are two complementary concepts: Lean principles eliminate MUDA and ensure standardization for a smooth implementa- tion of X.0 technologies when Industry X.0 allows the smartening and development of lean manufacturing tools without bringing any change to its principles [92]. Indeed, the implementation of the RFID system contributed to waste elimination by replacing paper with digital tools, better control of inventory which eliminated the risk of overstock, and no more waiting time. Appl. Syst. Innov. 2023, 6, x FOR PEER REVIEW 13 of 18 Figure 9. Simulation model of the RFID system. Results showed that after implementing the RFID system, several MUDAs were elim- inated such as waiting time as the operator, once he gets to the supermarket, the trolley will be already ready to pick which reduce the waiting time to zero. In addition to that, the operator no longer needs to keep checking boxes consumption status as empty boxes will be scanned using the RFID structure, which allows to dedicate other responsibilities to the feeding operator and also reduce their number. A risk analysis was also established to identify risks and roadblocks that may be faced during or after the implementation of the RFID system in order to establish coun- termeasures accordingly, thus using the SWOT matrix, a technique commonly used since Appl. Syst. Innov. 2023, 6, 54 13 of 18 the 1960s–1970s to identify the internal strengths and weaknesses and the external oppor- tunities and threats of a system [100,101]. Results are summarized in Figure 10. Appl. Syst. Innov. 2023, 6, x FOR PEER REVIEW 14 of 18 Appl. Syst. Innov. 2023, 6, x FOR PEER REVIEW 14 of 18 Figure 10. SWOT analysis of the RFID system. Figure 10. SWOT analysis of the RFID system. To put SWOT into action, it is a good opportunity to match up the Strengths with A Ts a o put lread SWOT y statedinto , Indu action, stry X.0it tec isha nogood logies a opportunity re also used tto o su match pport tup he sthe mart Str enengths ing with To put SWOT into action, it is a good opportunity to match up the Strengths with o O f le pp aor n m tua ni ntu ie fa sc a tu nd rin tg t heo T ohr ls a ea ntd s p wriin th W ciple ea s [ k14 ne]s. T seh s f ey ol a low re tiw ng o T co O m W pS le a m na en lt yasry is c , a ond ncep the tsr : efore Opportunities and the Threats with Weaknesses following TOWS analysis, and therefore Opportunities and the Threats with Weaknesses following TOWS analysis, and therefore L id ea en p ntifry inc th ip e rel les e altiimi onna shtie p M bet UD wA een and th e e i ns nu tern re sa ta l a nd na d ex rdizta ern tion f al for ac a to srs mo . T ot hh i is a mp nalleyme sisnt aa ll-owed identify the relationship between the internal and external factors. This analysis allowed identify the relationship between the internal and external factors. This analysis allowed tion of X.0 technologies when Industry X.0 allows the smartening and development of us to define strategies and actions by taking advantage of the positive aspects of the RFID us to define strategies and actions by taking advantage of the positive aspects of the RFID us to define strategies and actions by taking advantage of the positive aspects of the RFID lean manufacturing tools without bringing any change to its principles [92]. Indeed, the system. Results are represented in Figure 11. system. Results are represented in Figure 11. system. Results are represented in Figure 11. implementation of the RFID system contributed to waste elimination by replacing paper with digital tools, better control of inventory which eliminated the risk of overstock, and no more waiting time. Figure 11. TOWS analysis of the RFID system. Figure 11. TOWS analysis of the RFID system. Figure 11. TOWS analysis of the RFID system. When it comes to the study, many difficulties and barriers were faced and made the When it comes to the study, many difficulties and barriers were faced and made the When it comes to the study, many difficulties and barriers were faced and made the process more complicated, but at the same time, simulation offered several opportunities process more complicated, but at the same time, simulation offered several opportunities process more complicated, but at the same time, simulation offered several opportunities that supported the decision-making. In other words, the pros and cons of following the that supported the decision-making. In other words, the pros and cons of following the that supported the decision-making. In other words, the pros and cons of following the strategy and using tools are represented in Figure 12. strategy and using tools are represented in Figure 12. strategy and using tools are represented in Figure 12. Figure 12. Pros and cons of the conducted study. Figure 12. Pros and cons of the conducted study. Figure 12. Pros and cons of the conducted study. 5. Conclusions and Perspectives Digitalization is a paradigm that is strongly present in many applications of our eve- 5. Conclusions and Perspectives ryday life and continues to develop and renew itself through the fact that more and more Digitalization is a paradigm that is strongly present in many applications of our eve- companies have become ambitious to ensure not only an innovative, sustainable and re- ryday life and continues to develop and renew itself through the fact that more and more silient environment but also the smartening and development of their lean manufacturing companies have become ambitious to ensure not only an innovative, sustainable and re- tools. A conducted literature review has proven that each one of the smart technologies silient environment but also the smartening and development of their lean manufacturing has many opportunities but presents many risks. These risks and opportunities can be tools. A conducted literature review has proven that each one of the smart technologies either common or related to a specific technology, but either way, the establishment of a has many opportunities but presents many risks. These risks and opportunities can be risk analysis strategy is a mandatory step during the digitalization process. For new com- either common or related to a specific technology, but either way, the establishment of a panies intending to adopt this concept, this paper will provide a referential to what they risk analysis strategy is a mandatory step during the digitalization process. For new com- will encounter. panies in Th te is r nd eise ng t arco h a w da os c pt t on hc is c reto izn ec de b py t t, th he is p mo ad pe elli r w ng a ill n pd r o si vm idu ela at r ioen f eorfe t n hti ea c la to se st wh ua dt th y ofe y wila l e n a ncu ou tont meortiv . e company, based on which we were able to validate the risks and This research was concretized by the modelling and simulation of the case study of an automotive company, based on which we were able to validate the risks and Appl. Syst. Innov. 2023, 6, 54 14 of 18 5. Conclusions and Perspectives Digitalization is a paradigm that is strongly present in many applications of our everyday life and continues to develop and renew itself through the fact that more and more companies have become ambitious to ensure not only an innovative, sustainable and resilient environment but also the smartening and development of their lean manufacturing tools. A conducted literature review has proven that each one of the smart technologies has many opportunities but presents many risks. These risks and opportunities can be either common or related to a specific technology, but either way, the establishment of a risk analysis strategy is a mandatory step during the digitalization process. For new companies intending to adopt this concept, this paper will provide a referential to what they will encounter. This research was concretized by the modelling and simulation of the case study of an automotive company, based on which we were able to validate the risks and opportunities identified during our research on RFID technology, as well as the importance and benefit of using simulation. Indeed, results showed that the RFID system would bring many improvement opportunities by eliminating MUDAs and facilitating communication when simulation supported the decision-making process that was completed by a preventive action plan to overcome detected risks and weaknesses. In terms of perspectives, we aim to reinforce this research with a statistical study based on a survey, from which we can come up with lessons learned from smart factories, but also reflect risk and barriers occurrence during the implementation of revolutionary technologies. In addition to that, since the articles studied didn’t rely on a specific risk analysis system or tool, it is interesting to define which risk assessment strategy/tool is suitable for each technology. Author Contributions: Conceptualization, L.N. and M.G.; methodology, L.N.; software, L.N. and M.G.; validation, M.G., A.S., S.M. and M.D.N.; formal analysis, L.N. and M.G.; investigation, L.N. and M.G.; resources, L.N. and M.G.; data curation, L.N. and M.G.; writing—original draft preparation, L.N.; writing—review and editing, L.N. and M.G.; visualization, M.G., A.S., S.M. and M.D.N.; supervision, M.G. All authors have read and agreed to the published version of the manuscript. Funding: This research received no external funding. Institutional Review Board Statement: Not applicable. Informed Consent Statement: Not applicable. Data Availability Statement: Not applicable. Conflicts of Interest: The authors declare no conflict of interest. References 1. Marzano, G.; Martinovs, A. Teaching Industry 4.0. Soc. Integr. Educ. Proc. Int. Sci. Conf. 2020, 2, 69–76. [CrossRef] 2. Gallab, M.; Bouloiz, H.; Kébé, A.S.; Tkiouat, M. Opportunities and Challenges of the Industry 4.0 in industrial companies: A Survey on Moroccan firms. J. Ind. Bus. Econ. 2021, 48, 413–439. [CrossRef] 3. Relich, M. The impact of ICT on labor productivity in the EU. Inf. Technol. Dev. 2017, 23, 706–722. [CrossRef] 4. Marina, M.; Abrar Ali, D.; Mukund, J.; Izabela, N. Lean manufacturing and Industry 4.0 combinative application: Practices and perceived benefits. IFAC PapersOnLine 2021, 54, 288–293. 5. McKiea, M.G.; Jonesb, R.; Milesc, J.; Jonesd, I.R. Improving Lean Manufacturing Systems and Tools Engagement Through the Utilisation of Industry 4.0. Improved Communication and a People Recognition Methodology in a UK Engine Manufacturing Centre. Procedia Manuf. 2021, 55, 371–382. [CrossRef] 6. ISO 31000.2018; Risk Management—Guidelines. International Organization for Standardization ISO Central Secretariat: Geneva, Switzerland, 2018. 7. Sishi, M.; Telukdarie, A. Implementation of Industry 4.0 technologies in the mining industry—A case study. Int. J. Min. Miner. Eng. 2020, 11, 1–22. [CrossRef] 8. Frank, A.G.; Dalenogare, L.S.; Ayala, N.F. Industry 4.0 technologies: Implementation patterns in Manufacturing companies. Int. J. Prod. Econ. 2019, 210, 15–26. [CrossRef] 9. Xiaoyong, T.; Wu, L.; Gu, D.; Yuan, S.; Zhao, Y.; Li, X.; Ouyang, L.; Song, B.; Gao, T.; He, J.; et al. Roadmap for Additive Manufacturing: Toward Intellectualization and Industrialization. Chin. J. Mech. Eng. Addit. Manuf. Front. 2022, 1, 100014. Appl. Syst. Innov. 2023, 6, 54 15 of 18 10. Jandyal, A.; Chaturvedi, I.; Wazir, I.; Ankush, R.; Haq, M.I.U. 3D printing–A review of processes, materials and applications in industry 4.0. Sustain. Oper. Comput. 2022, 3, 33–42. [CrossRef] 11. Davies, S. 3D Printing is the new face of medicine. Financial Times, 14 November 2013. 12. Petrick, I.J.; Simpson, T.W. 3D Printing disrupts Manufacturing: How economies of one create new rules of competition. Res. -Technol. Manag. 2013, 56, 12–16. [CrossRef] 13. Sandström, C.G. The non-disruptive emergence of an ecosystem for 3D printing–insights from the hearing aid industry’s transition 1989–2008. Technol. Forecast. Soc. Chang. 2016, 102, 160–168. [CrossRef] 14. Wohlers, T. Wohlers Report 2020: 3D Printing and Additive Manufacturing Global State of the Industry; Technical Report; Wohlers Associates: Fort Collins, CO, USA, 2020. 15. Shahrubudin, N.; Koshy, P.; Alipal, J.C.; Kadir, M.H.A.; Lee, T.C. Challenges of 3D printing technology for manufacturing biomedical products: A case study of Malaysian manufacturing firms. Heliyon 2020, 6, e03734. [CrossRef] 16. Li, J.Q.; Yuy, F.R.; Deng, G.; Luo, C.; Ming, Z.; Yan, Q. Industrial Internet: A survey on the enabling technologies, applications, and challenge. IEEE Commun. Surv. Tutor. 2017, 19, 1504–1526. [CrossRef] 17. Deshpande, A.; Kim, I. The effects of augmented reality on improving spatial problem solving for object assembly. Adv. Eng. Inform. 2018, 38, 760–775. [CrossRef] 18. Chytas, D.; Johnson, E.O.; Piagkou, M.; Mazarakis, A.; Babis, G.C.; Chronopoulos, E.; Nikolaou, V.S.; Lazaridis, N.; Natsis, K. The role of augmented reality in anatomical education: An overview. Ann. Anat. Anat. Anz. 2020, 229, 151463. [CrossRef] [PubMed] 19. Ibáñez, M.-B.; Delgado-Kloos, C. Augmented reality for stem learning: A systematic review. Comput. Educ. 2018, 123, 109–123. [CrossRef] 20. Ameri, G.; Rankin, A.; Baxter, J.S.; Moore, J.; Ganapathy, S.; Peters, T.M.; Chen, E.C. Development and evaluation of an augmented reality ultrasound guidance system for spinal anesthesia: Preliminary results. Ultrasound Med. Biol. 2019, 45, 2736–2746. [CrossRef] [PubMed] 21. Nee, A.; Ong, S. Virtual and augmented reality applications in Manufacturing. IFAC Proc. Vol. 2013, 46, 15–26. [CrossRef] 22. Lamberti, F.; Manuri, F.; Sanna, A.; Paravati, G.; Pezzolla, P.; Montuschi, P. Challenges, opportunities, and future trends of emerging techniques for augmented reality-based maintenance. IEEE Trans. Emerg. Top. Comput. 2014, 2, 411–421. [CrossRef] 23. Loizeau, Q.; Danglade, F.; Ababsa, F.; Merienne, F. Evaluating added value of aug-mented reality to assist aeronautical mainte- nance workers—Experimentation on on-field use case. In Virtual Reality and Augmented Reality; Bourdot, P., Interrante, V., Nedel, L., Magnenat-Thalmann, N., Zachmann, G., Eds.; Springer International Publishing: Cham, Switzerland, 2019; pp. 151–169. 24. Setti, A.; Bosetti, P.; Ragni, M. Artool-augmented reality platform for machining setup and maintenance. In Proceedings of SAI Intelligent Systems Conference (IntelliSys); Bi, Y., Kapoor, S., Bhatia, R., Eds.; Springer International Publishing: Cham, Switzerland, 2018; pp. 457–475. 25. Parida, K.; Bark, H.; Lee, P.S. Emerging thermal technology enabled augmented reality. Adv. Funct. Mater. 2021, 31, 2007952. [CrossRef] 26. Segovia, D.; Ramírez, H.; Mendoza, M.; Mendoza, M.; Mendoza, E.; González, E. Machining and dimensional validation training using augmented reality for a lean process. Procedia Comput. Sci. 2015, 75, 195–204. [CrossRef] 27. Mourtzis, D.; Zogopoulos, V.; Vlachou, E. Augmented reality application to support remote maintenance as a service in the robotics industry. Procedia CIRP 2017, 63, 46–51. [CrossRef] 28. Mourtzis, D.; Angelopoulos, J.; Panopoulos, N. A framework for automatic generation of augmented reality maintenance & repair instructions based on convolutional neural networks. Procedia CIRP 2020, 93, 977–982. 29. Jeffri, N.F.S.; Rambli, D.R.A. A review of augmented reality systems and their effects on mental workload and task performance. Heliyon 2021, 7, e06277. [CrossRef] [PubMed] 30. Zhang, P.; Liu, H.; Li, H.; Wang, J.J. The application of navigation system based on augmented reality head-mounted devices in spine surgery. Neurosci. Inform. 2022, 2, 100076. [CrossRef] 31. Balco, P.; Bajzík, P.; Škovierová, K. Virtual and Augmented Reality in Manufacturing Companies in Slovakia. Procedia Comput. Sci. 2022, 1, 313–320. [CrossRef] 32. Carl, B.; Bopp, M.; Saß, B.; Nimsky, C. Microscope-based augmented reality in degenerative spine surgery: Initial experience. World Neurosurg. 2019, 128, e541–e551. [CrossRef] 33. Anon. IFR Press Conference. 2019. Available online: https://ifr.org/downloads/press2018/IFR%20World%20Robotics%20 Presentation%20-%2018%20Sept%202019.pdf (accessed on 25 June 2022). 34. Aditya, U.S.P.S.; Singh, R.; Singh, P.K.; Kalla, A. A Survey on Blockchain in Robotics: Issues, Opportunities, Challenges and Future Directions. J. Netw. Comput. Appl. 2021, 196, 103245. 35. Lin, P.; Abney, K.; Bekey, G. Robot ethics: Mapping the issues for a mechanized world. Artif. Intell. 2011, 175, 942–949. [CrossRef] 36. Flechsig, C.; Anslinger, F.; Lasch, R. Robotic Process Automation in purchasing and supply management: A multiple case study on potentials, barriers, and implementation. J. Purch. Supply Manag. 2022, 28, 100718. [CrossRef] 37. Bauer, W.; Bender, M.; Braun, M.; Rally, P.; Scholtz, O. Lightweight Robots in Manual Assembly—Best to Start Simply! Examining Com- panies’ Initial Experiences with Lightweight Robots; Fraunhofer Institute for Industrial Engineering IAO: Stuttgart, Germany, 2016. 38. Zinn, M.; Roth, B.; Khatib, O.; Salisbury, J.K. A new actuation approach for human friendly robot design. Int. J. Robot. Res. 2004, 23, 379–398. [CrossRef] Appl. Syst. Innov. 2023, 6, 54 16 of 18 39. Riek, L.; Howard, D. A code of ethics for the human-robot interaction profession. Proc. We Robot 2014. Available online: https://ssrn.com/abstract=2757805 (accessed on 25 June 2022). 40. Kopacek, P. Roboethics. IFAC Proc. Vol. 2012, 45, 67–72. [CrossRef] 41. Rao, R.V.; Selvamani, K. Data Security Challenges and Its Solutions in Cloud Computing. Procedia Comput. Sci. 2015, 48, 204–209. [CrossRef] 42. Cao, L.; Li, Y.; Zhang, J.; Jiang, Y.; Han, Y.; Wei, J. Electrical load prediction of healthcare buildings through single and ensemble learning. Energy Rep. 2020, 6, 2751–2767. [CrossRef] 43. Chen, M. Smart city and cyber-security; technologies used, leading challenges and future recommendations. Energy Rep. 2021, 7, 7999–8012. 44. Zheng, Y.; Li, Z.; Xu, X.; Zhao, Q. Dynamic defenses in cyber security: Techniques, methods and challenges. Digit. Commun. Netw. 2020, 8, 422–435. [CrossRef] 45. Uchendu, B.; Nurse, J.R.; Bada, M.; Furnell, S. Developing a cyber security culture: Current practices and future needs. Comput. Secur. 2021, 109, 102387. [CrossRef] 46. Gunes, B.; Kayisoglu, G.; Bolat, P. Cyber security risk assessment for seaports: A case study of a container port. Comput. Secur. 2021, 103, 102196. [CrossRef] 47. Chaum, D. Computer Systems Established, Maintained, and Trusted by Mutually Suspicious Groups. Ph. D Thesis, University of California, Berkeley, CA, USA, 1982. 48. Angelis, J.; da Silva, E.R. Blockchain adoption: A value driver perspective. Bus. Horiz. 2019, 62, 307–314. [CrossRef] 49. Gatteschi, V.; Lamberti, F.; Demartini, C.; Pranteda, C.; Santamaria, V. To blockchain or not to blockchain: That is the question. IT Prof. 2018, 20, 62–74. [CrossRef] 50. Hoy, M.B. An introduction to the blockchain and its implications for libraries and medicine. Med. Ref. Serv. Q 2017, 36, 273–279. [CrossRef] [PubMed] 51. Panetta, K. Gartner the CIO’s Guide to Blockchain. 2019. Available online: https://www.gartner.com/smarterwithgartner/the- cios-guide-to-blockchain/ (accessed on 25 June 2022). 52. Crosby, M.; Pattanayak, P.; Verma, S.; Kalyanaraman, V. BlockChain technology: Beyond Bitcoin. Appl. Innov. Rev. 2016, 2, 71. 53. Marchesi, L.; Marchesi, M.; Tonelli, R.; Lunesu, M.I. A blockchain architecture for industrial applications. Blockchain Res. Appl. 2022, 3, 100088. [CrossRef] 54. Chen, Y.; Chen, H.; Zhang, Y.; Han, M.; Siddula, M.; Cai, Z. A survey on blockchain systems: Attacks, defenses, and privacy preservation. High Confid. Comput. 2022, 2, 100048. [CrossRef] 55. Munim, Z.H.; Balasubramaniyan, S.; Kouhizadeh, M.; Hossain, N.U.I. Using Bayesian Best Worst Method to assess blockchain technology adoption in the Norwegian oil and gas industry. J. Ind. Inf. Integr. 2022, 28, 100346. 56. Fang, L.; Li, Z.; He, Z. Research on the progress in cross-chain technology of blockchains. J. Softw. 2019, 30, 1649–1660. 57. Iqbal, M.; Matulevicius, ˇ R. Exploring sybil and double-spending risks in blockchain systems. IEEE Access 2021, 9, 76153–76177. [CrossRef] 58. Yli-Huumo, J.; Ko, D.; Choi, S.; Park, S.; Smolander, K. Where Is Current Research on Blockchain Technology? A Systematic Review. PLoS ONE 2016, 11, e0163477. [CrossRef] 59. Hassani, H.L.; Bahnasse, A.; Martin, E.; Roland, C.; Bouattane, O.; Diouri, M.E.M. Vulnerability and security risk assessment in a IIoT environment in compliance with standard IEC 62443. Procedia Comput. Sci. 2021, 191, 33–40. [CrossRef] 60. Florea, B.C. Blockchain and internet of things data provider for smart applications. In Proceedings of the 7th Mediterranean Conference on Embedded Computing (MECO), Budva, Montenegro, 10–14 June 2018. [CrossRef] 61. Kumar, R.L.; Khan, F.; Kadry, S.; Rho, S. A Survey on blockchain for industrial Internet of Things. Alex. Eng. J. 2022, 61, 6001–6022. [CrossRef] 62. Mosenia, A.; Jha, N.K. A comprehensive study of the security of Internet-of-Things. IEEE Trans. Emerg. Top. Comput. 2017, 5, 586–602. [CrossRef] 63. Lu, X.; Niyato, D.; Jiang, H.; Kim, D.I.; Xiao, Y.; Han, Z. Ambient Backscatter Assisted Wireless Powered Communications. IEEE Wirel. Commun. 2018, 25, 170–177. [CrossRef] 64. Makhdoom, I.; Abolhasan, M.; Lipman, J.; Liu, R.P.; Ni, W. Anatomy of threats to the Internet of Things. IEEE Commun. Surv. Tutor. 2018, 21, 1636–1675. [CrossRef] 65. Conoscenti, M.; Vetro, A.; De Martin, J.C. Peer to peer for privacy and decentralization in the internet of things. In Proceedings of the IEEE/ACM 39th IEEE International Conference on Software Engineering Companion, Buenos Aires, Argentina, 20–28 May 2017. 66. Fisher, C.K.; Smith, A.M.; Walsh, J.R. Machine learning for comprehensive forecasting of Alzheimer ’s Disease progression. Sci. Rep. 2019, 9, 13622. [CrossRef] 67. Davenport, T.H.; Harris, J.G.; David, W.; Jacobson, A.L. Data to knowledge to results: Building an analytic capability. Calif. Manag. Rev. 2001, 43, 117–138. [CrossRef] 68. Arunachalam, D.; Kumar, N.; Kawalek, J.P. Understanding big data analytics capabilities in supply chain management: Unravel- ling the issues, challenges and implications for practice. Transport. Res. Part E Log. Transport. Rev. 2018, 114, 416–436. [CrossRef] 69. Ward, J.S.; Barker, A. Undefined by Data: A Survey of Big Data Definitions. arXiv 2013, arXiv:1309.5821. Appl. Syst. Innov. 2023, 6, 54 17 of 18 70. Balachandran, B.M.; Prasad, S. Challenges and Benefits of Deploying Big Data Analytics in the Cloud for Business Intelligence. Procedia Comput. Sci. 2017, 112, 1112–1122. [CrossRef] 71. Blackburn, R.; Lurz, K.; Priese, B.; Göb, R.; Darkow, I.L. A predictive analytics approach for demand forecasting in the process industry. Int. Transact. Operat. Res. 2015, 22, 407–428. [CrossRef] 72. Gunasekaran, A.; Papadopoulos, T.; Dubey, R.; Wamba, S.F.; Childe, S.J.; Hazen, B.; Akter, S. Big data and predictive analytics for supply chain and organizational performance. J. Bus. Res. 2017, 70, 308–317. [CrossRef] 73. Richey, R.G., Jr.; Morgan, T.R.; xLindsey-Hall, K.; Adams, F.G. A global exploration of big data in the supply chain. Int. J. Phys. Distribut. Log. Manag. 2016, 46, 710–739. [CrossRef] 74. Mell, P.; Grance, T. The NIST Definition of Cloud Computing; National Institute of Standards and Technology Special Publication: Gaithersburg, MD, USA, 2011. 75. Avram, M.G. Advantages and challenges of adopting cloud computing from an enterprise perspective. Procedia Technol. 2014, 12, 529–534. [CrossRef] 76. Vasiljeva, T.; Shaikhulina, S.; Kreslins, K. Cloud Computing: Business Perspectives, Benefits and Challenges for Small and Medium Enterprises (Case of Latvia). Procedia Eng. 2017, 178, 443–451. [CrossRef] 77. Han, H.; Fei, S.; Yan, Z.; Zhou, X. A survey on blockchain-based integrity auditing for cloud data. Digit. Commun. Netw. 2022, 8, 591–603. [CrossRef] 78. Chetouane, F. An Overview on RFID Technology Instruction and Application. IFAC PapersOnLine 2015, 48, 382–387. [CrossRef] 79. Wamba, S.F.; Lefebvre, L.A.; Bendavid, Y.; Lefebvre, É. Exploring the impact of RFID technology and the EPC network on mobile B2B eCommerce: A case study in the retail industry. Int. J. Prod. Econ. 2008, 112, 614–629. [CrossRef] 80. Wamba, S.F. Achieving Supply Chain Integration using RFID Technology: The Case of Emerging Intelligent B-to-B e-Commerce Processes in a Living Laboratory. Bus. Process Manag. J. 2012, 18, 58–81. [CrossRef] 81. Duroc, Y.; Tedjini, S. RFID: A key technology for Humanity. Comptes Rendus Phys. 2018, 19, 64–71. [CrossRef] 82. Gunasekaran, A.; Ngai, E.W. Build-to-order supply chain management: A literature review and framework for development. J. Oper. Manag. 2005, 23, 423–451. [CrossRef] 83. Abugabah, A.; Nizamuddin, N.; Abuqabbeh, A. A review of challenges and barriers implementing RFID technology in the Healthcare sector. Procedia Comput. Sci. 2020, 170, 1003–1010. [CrossRef] 84. Liu, X.; Yin, J.; Liu, Y.; Zhang, S.; Guo, S.; Wang, K. Vital signs monitoring with RFID: Opportunities and challenges. IEEE Netw. 2019, 33, 126–132. [CrossRef] 85. Gaukler, G.M.; Seifert, R.W. Seifert. Applications of RFID in supply chains. In Trends in Supply Chain Design and Management; Springer: London, UK, 2007; pp. 29–48. 86. Kuo, C.-H.; Chen, H.-G. The critical issues about deploying RFID in the healthcare industry by service perspective. In Proceedings of the 41st Annual Hawaii International Conference on System Sciences (HICSS 2008), Waikoloa, HI, USA, 7–10 January 2008; p. 111. 87. Gallab, M.; Bouloiz, H.; Tkiouat, M. Modeling and simulation of complex industrial systems. In Modeling and Simulation: Of Complex Industrial Systems; LAP LAMBERT Academic Publishing: Saarbrücken, Germany, 2019. 88. Gajsek, B.; Marolt, J.; Rupnik, B.; Lerher, T.; Sternad, M. Using Maturity Model and Discrete-Event. Int. J. Simul. Model. 2019, 18, 488–499. [CrossRef] [PubMed] 89. Lima, F.; de Carvalho, C.N.; Acardi, M.B.; dos Santos, E.G.; de Miranda, G.B.; Maia, R.F.; Massote, A.A. Digital manufacturing tools in the simulation of collaborative robots: Towards Industry 4.0. Braz. J. Oper. Prod. Manag. 2019, 16, 261–280. [CrossRef] 90. Duplakova, D.; Teliskova, M.; Duplak, J.; Torok, J.; Hatala, M.; Steranka, J.; Radchenko, S. Determination of optimal production process using scheduling and simulation software. Int. J. Simul. Model. 2018, 17, 609–622. [CrossRef] [PubMed] 91. Naciri, L.; Mouhib, Z.; Gallab, M.; Nali, M.; Abbou, R.; Kebe, A. Lean and industry 4.0: A leading harmony. Procedia Comput. Sci. 2022, 200, 394–406. [CrossRef] 92. Bianco, D.; Bueno, A.; Godinho Filho, M.; Latan, H.; Ganga, G.M.D.; Frank, A.G.; Jabbour, C.J.C. The role of Industry 4.0 in developing resilience for manufacturing companies during COVID-19. Int. J. Prod. Econ. 2023, 256, 108728. [CrossRef] 93. Tiwari, K.; Khan, M.S. Sustainability accounting and reporting in the industry 4.0. J. Clean. Prod. 2020, 258, 120783. [CrossRef] 94. Javaid, M.; Haleem, A. Industry 4.0 applications in medical field: A brief review. Cur. Med. Res. Pract. 2019, 9, 102–109. [CrossRef] 95. Javaid, M.; Haleem, A.; Singh, R.P.; Suman, R.; Gonzalez, E.S. Understanding the adoption of Industry 4.0 technologies in improving environmental sustainability. Sustain. Oper. Comput. 2022, 3, 203–217. [CrossRef] 96. Arnold, C.; Kiel, D.; Voigt, K.I. How the industrial internet of things changes business models in different manufacturing industries. Int. J. Innov. Manag. 2016, 20, 1640015. [CrossRef] 97. Ibarra, D.; Ganzarain, J.; Igartua, J.I. Business model innovation through Industry 4.0: A review. Procedia Manfacturing 2018, 22, 4–10. [CrossRef] 98. Bylya, O.I.; Ward, M.; Krishnamurty, B.; Tamang, S.; Vasin, R.A. Modelling challenges for incremental bulk processes despite advances in simulation technology: Example issues and approaches. Procedia Eng. 2017, 207, 2358–2363. [CrossRef] 99. Booch, G.; Rumbaugh, J.; Jacobson, I. The Unified Modeling Language User Guide; 6th printing; Addison Wesley: North York, ON, Canada, 2000. [CrossRef] Appl. Syst. Innov. 2023, 6, 54 18 of 18 100. Gallab, M.; Mouhib, Z.; Naciri, L.; Kebe, S.A.; Nali, M.; Abbou, R.; Di Nardo, M. Aeronautics 4.0: Modeling and Simulation of a Smart Tool. In Proceedings of the 2022 The 3rd International Conference on Industrial Engineering and Industrial Management (IEIM 2022), Barcelona, Spain, 12–14 January 2022; ACM: New York, NY, USA, 2022. [CrossRef] 101. Bakhtari, A.R.; Waris, M.M.; Mannan, B.; Sanin, C.; Szczerbicki, E. Assessing Industry 4.0 Features Using SWOT Analysis. In Proceedings of the Intelligent Information and Database Systems: 12th Asian Conference, ACIIDS 2020, Phuket, Thailand, 23–26 March 2020; Springer: Singapore, 2020. Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Journal

Applied System InnovationMultidisciplinary Digital Publishing Institute

Published: May 4, 2023

Keywords: innovative; sustainable; resilient; modeling; risk and opportunities; simulation; X.0 technologies; lean manufacturing

There are no references for this article.