Next Article in Journal
Analysis and Implementation of Controlled Semiconductor Switch for Ultra-Wideband Radar Sensor Applications
Previous Article in Journal
“GeSn Rule-23”—The Performance Limit of GeSn Infrared Photodiodes
Previous Article in Special Issue
An Adaptive Simultaneous Multi-Protocol Extension of CRAFT
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

A Holistic Review of Cyber–Physical–Social Systems: New Directions and Opportunities

School of Systems and Computing, University of New South Wales, Canberra 2612, Australia
*
Author to whom correspondence should be addressed.
Sensors 2023, 23(17), 7391; https://doi.org/10.3390/s23177391
Submission received: 30 July 2023 / Revised: 15 August 2023 / Accepted: 22 August 2023 / Published: 24 August 2023
(This article belongs to the Special Issue Security and Privacy for IoT and Metaverse)

Abstract

:
A Cyber–Physical–Social System (CPSS) is an evolving subset of Cyber–Physical Systems (CPS), which involve the interlinking of the cyber, physical, and social domains within a system-of-systems mindset. CPSS is in a growing state, which combines secure digital technologies with physical systems (e.g., sensors and actuators) and incorporates social aspects (e.g., human interactions and behaviors, and societal norms) to facilitate automated and secure services to end-users and organisations. This paper reviews the field of CPSS, especially in the scope of complexity theory and cyber security to determine its impact on CPS and social media’s influence activities. The significance of CPSS lies in its potential to provide solutions to complex societal problems that are difficult to address through traditional approaches. With the integration of physical, social, and cyber components, CPSS can realize the full potential of IoT, big data analytics, and machine learning, leading to increased efficiency, improved sustainability and better decision making. CPSS presents exciting opportunities for innovation and advancement in multiple domains, improving the quality of life for people around the world. Research challenges to CPSS include the integration of hard and soft system components within all three domains, in addition to sociological metrics, data security, processing optimization and ethical implications. The findings of this paper note key research trends in the fields of CPSS, and recent novel contributions, followed by identified research gaps and future work.

1. Introduction

Cyber–Physical Systems (CPS) are increasingly becoming integration points for computation and are a significant part of people’s daily lives in their homes, businesses, governments, and industry. CPS were developed in order to address modeling challenges for control systems and embedded computing, focusing on efficiency optimization and secure components [1]. Not only have CPS come to represent industrial control systems, but a wide variety of systems at the interface of the digital and physical worlds, including medical devices, education devices, Internet of Things (IoT), smart cities, and transportation systems, among others [2,3,4]. A CPS integrates the computational and physical capabilities of systems, enabling those embedded systems to interact with sensors and actuators that exist in the physical world [4,5]. A CPS is characterized by its ability to interact with the physical world through a combination of control and computation, enabled through communication [5] (p. 1) and [1]. The term is broad, spanning several generations of technological growth and application development, and has evolved with technologies such as the Internet of Things (IoT).
CPS have traditionally been focused on systems that involve purely technical and physical components, with humans existing as external entities to the system, considering cyber aspects, including confidentiality, integrity and availability [6]. A CPS architecture is closely aligned with IoT, consisting of three layers: the perception layer, the network layer, and the application layer [4,6,7]. The perception layer is concerned with sensors and actuators that measure and collect data. The network layer is responsible for the communication of data between agents. Finally, the application layer is concerned with the processing of information and decision making. As the field of CPS grows and system boundaries extend beyond traditional Cyber–Physical components, there is the potential need for new architectural paradigms to be considered, especially including a security-by-design layer to be embedded in order to safeguard these layers efficiently.
With the prevalence of social media, a Cyber–Physical–Social System (CPSS) has emerged, concerned with identifying and understanding how humans integrate within systems that encompass the cyber, physical and social space [6,8]. Such systems extend beyond human-in-the-loop systems, where people interact with the system in switch-case-like predefined actions or decision support scenarios [9]. Instead, CPSSs include an understanding of the social ramifications and their feedback loops within the scope of the system boundary [6]. CPSSs are designed to offer seamless communication, coordination, and integration between the cyber, physical, and social elements, resulting in more effective system performance. This integration allows systems to adapt and respond to changing conditions, optimise resource allocation, and improve overall system performance and user experiences. A CPSS was defined as a Cyber–Physical System that exhibits the coordination, conjoining and integration of both human and social characteristics within a larger CPS [10] (p. 85). This further highlighted the complexity of CPSS, being exacerbated by the social system’s inclusion in the wider system boundary. This definition would be linked with three hypotheses, where the physical, mental, and artificial worlds combine, and highlighted the internet as a vector for this integration [10,11]. Pervasive Intelligent Spaces (PIS) would be also added in the definition to enable the interaction of all agents in real time and heavily rely on pervasive IoT technologies later expanded [10] (p. 86). This research highlights that social media serves as the new revolution for CPSSs, changing the way that societies and industries may function [10]. Each of the domains incorporated into CPSSs—social, physical, and cyber—individually meet the definition of complex systems. The large-scale and significant numbers of interactions between each of these domains create a strong system-of-systems dynamic [12]. Considering CPSS approaches therefore requires the use of a system-of-systems mindset, and will continue to do so in the future [13].
The field of CPSS attempts to bridge the gap between traditional CPS research and social complexity research. As CPS become more integrated into society within a system-of-systems mindset, social factors have the potential to effect the functioning of Cyber–Physical components in unpredictable ways. CPSS provides researchers with the opportunity to solve complex societal problems that are difficult to address using traditional methods. These include attempts to understand and model human behavior in online social media environments in addition to modeling systems that include real-time human feedback such as seen in smart cities and smart transportation [14,15].
Some of the emerging trends in CPSS include the development of smart cities, intelligent transportation systems, and smart healthcare systems [16,17,18,19]. The significance of CPSS lies in its potential to provide solutions to complex societal problems that are difficult to address through traditional approaches. CPSS can be used in numerous domains such as healthcare, transportation, energy conservation, disaster management, and environmental monitoring [17,20,21,22]. With the integration of physical, social, and cyber systems, CPSS can realize the full potential of IoT, big data analytics, and machine learning, leading to increased efficiency, improved sustainability and better decision making. Therefore, CPSS presents exciting opportunities for innovation and advancement in multiple domains, improving the quality of life for people around the world. In a CPSS, the cyber component involves the seamless integration of computational algorithms, communication networks, and software applications. The physical component includes physical infrastructure, devices, and sensors that collect and provide data to the system. The social component encompasses human interactions, preferences, and behaviors, which influence the system’s operation and outcomes
In a CPSS, sensors and actuators in the physical domain are often underpinned by IoT technologies. Security challenges posed by IoT-enabling technologies include signal integrity and accurate event actuation [23]. Thapa et al. addresses concerns related to these fundamental units in a complex CPS context, proposing security solutions for autonomous vehicle case studies to enable secure design [24]. However, the perception layer of a CPSS has the potential to exist conceptually beyond the physical domain, and within the cyber and/or social ones. For example, a human agent within a social network acts as a sensor to its environment, which may then inform feedback loops into the wider CPSS [25].
A CPSS represents a field that encompasses a complex system of systems. Social factors have the potential to create emergent behaviors that can induce instability into critical CPSS networks within the world. CPSS effects exist beyond the boundaries of traditional CPS. This can be exemplified with two case examples—Non-Fungible Tokens (NFTs) and the historical events of the Arab Spring. These case studies highlight the importance of CPSSs and the need to understand their interactions within a complex system-of-systems due to their potential wide-scale consequences across multiple domains.
The economic value of Non-Fungible Tokens (NFTs) is derived through social factors. They exist within the cyber domain, but have real physical-world consequences including economic and market impacts. The value of NFTs is created based on social perception of the cost/benefit trade-off of that token, and is heavily influenced by aesthetic human psychological values [26]. Of course, NFTs and similar digital ledger technologies exist within the cyber domain, but they also have physical-world impacts through economic returns and potential changes to the labor market [27,28,29]. Thus, the existence and financial impacts of NFTs demonstrate the consequences of CPSSs on the large scale system-of-systems that effects large-scale world dynamics.
The Arab Spring [30] also highlighted how CPSSs can induce emergent behaviors that have multi-domain impacts. Protests that initially began in Tunisia spread to other countries including Libya, Egypt, Yemen, Syria, and Bahrain. This information spread was fueled through social media platforms including Facebook and Twitter, enabling real-time dissemination of information across national boundaries and organization and mobilization of protests based on shared ideologies. During the Arab Spring, features of complexity were exemplified through sensitivity to initial conditions with the initial protest suicide of Tunisian Mohamed Bouazizi, the self-organization of political groups via the internet, adaptive interaction of protests as events evolved, and emergent behaviors including the coup of the Egyptian President Mohamed Morsi [31,32,33,34,35,36]. The three CPSS domains were also clearly present throughout the Arab Spring. The cyber component was a key enabler to the dissemination of information between protesters via social media. The social component manifested through the sharing of ideologies and political engagement by both citizens and governments. Finally, the physical domain manifested through physical protests, the Egyptian coup, the Tremeseh massacre, the Syrian civil war, and diverse government reactions and reform.
A CPSS poses several challenges from a scientific perspective. One of the main challenges is the integration of various components of the CPS within the CPSS context. These components include sensors, network components, and actuators [37]. The nature of CPSS components further requires that resource synchronization and optimization occur for performance—a complex task [38,39]. The development of secure and reliable communication protocols that can safely transmit data between different components is an issue [4,40]. The new trends in CPSSs are characterized by the use of advanced technologies and methods such as artificial intelligence, machine learning, blockchain, and IoT [41,42,43]. These technologies allow CPSSs to interact with their environment more intelligently, accurately, and efficiently. As a result, CPSSs can improve the performance of physical and social systems, enhance decision-making capabilities, and unlock new applications.
CPSSs face a variety of cyber security challenges. Some challenges are common with those underlying the IoT, such as node capture, routing attacks and data theft [44]. Because CPSSs include the social landscape, this provides greater opportunity for social engineering attacks that exploit human vulnerabilities, using tactics such as deception, manipulation, or influence [45,46,47]. CPSSs present unique cyber security challenges, where threats may arise through any of the cyber, physical or social agents within the system. Subsequently, conscious development of CPSSs within a secure digital technology mindset is essential to assuring system operation in the face of cyber threats [48]. Ensuring the security and privacy of CPSSs is crucial because of the high volume of sensitive data being processed and shared [49]. Protecting against cyber attacks, asserting data integrity, and maintaining user privacy are significant challenges. CPSSs include various interconnected components, such as sensors, devices, and networks [50]. Ensuring seamless interoperability between these components is a challenge because of differences in protocols, standards, and technologies. CPSSs would also need to handle large amounts of data, users, and interconnected systems, ensuring scalability to accommodate such growth while maintaining system performance and efficiency, which is a problem. A CPSS should be resilient to failures, disruptions, and adverse events [51]. Ensuring robustness and fault tolerance to maintain system functionality and minimize potential damages is a significant challenge [52]. CPSSs raise ethical concerns, such as the potential amplification of social biases, discriminatory practices, and the misuse of personal data. Addressing these challenges and promoting responsible and inclusive CPSS design and usage is essential, which we attempt to highlight in this study.
The ongoing advancements in CPSSs are expected to have a significant impact on various industries and aspects of daily lives [52]. As a consequence, understanding the scope of current CPSS research within these topics is essential for the development of future work and innovation in the research field. This is enhanced by CPSS’s potential for impact in diverse and interconnected domains, ranging from politics to economics, infrastructure and algorithm design [18,51,53]. This paper aims to holistically review CPSSs from three angles—cyber, physical and social—in order to determine their impact on system performance and how they offer secure and automated services to end-users and organisations in the era of artificial intelligence (AI). We define a CPSS as a system that integrates cyber, physical, and social elements to interact and collaborate with each other.
The key contributions of this work are structured as follows:
  • We determine a CPS and its interaction with social media and its components, and to what level it influences human behaviors.
  • We examine the distribution and intersection of research associated with CPSS, complex systems, social media, influence and cyber security applications.
  • We discuss the recent advancements of CPSSs and how they enhance human activities and system performances.
  • We describe the recent challenges and lessons learned and future research directions of CPSSs.
This paper discusses Cyber–Physical–Social Systems within the larger context of Cyber–Physical Systems and the impact of social complexity on these systems in Section 2. In Section 3, we discuss the related studies mixed between CPS, social media, and CPSS. The recent technologies with CPSS are explained in Section 4. This is followed by examining the most influential terms in Section 5. Section 6 describes the role of CPSS with recent smart applications. Research challenges and lessons learned are explained in Section 7. Finally, we conclude the paper in Section 8.

2. Cyber Physical Social System (CPSS)

We define a CPSS in a similar way to Wang [10], but in addition, we include security-by-design to each component as an extension of a Cyber–Physical-System that includes human social systems within its holistic system boundary. A CPSS, therefore, includes social and cognitive functions not considered within traditional CPS [54]. We define a CPSS as a systematic architecture that connects social features with human and network elements, with social attributes disseminating in accordance with node relationships, considering a secure design to the elements and fractures. In this way, the social space exists beyond just people, but also within their interactions, networks, and interactions.
We do not consider any of the competing definitions of CPSS that do not model social systems within their system boundary, and instead note that these systems interface with the CPS, as seen in the work of Zhou and Lin [55]. Competing definitions include considering CPSS as battery-supplied low-energy devices [55] or systems that highly conjoin communication, sensing, computing, and C2 (Command and Control) within larger human societal contexts [56]. The application of CPSSs spans various domains, including smart cities, transportation systems, healthcare, manufacturing, and entertainment. By combining cyber, physical, and social elements, CPSSs can enable advancements such as autonomous vehicles, smart grid systems, personalized healthcare, and immersive virtual environments. Overall, CPSSs represent an interdependent and interconnected system that leverages digital technologies, physical infrastructure, and social dynamics to create intelligent and adaptive systems capable of addressing complex societal challenges.
A further distinction should be made between the concept of CPSS and Cyber–Physical–Human Systems (CPHS). CPHS include humans in the loop and focus on the interaction between people and Cyber–Physical Systems [9]. CPHS play a crucial role in various scientific fields, including robotics, artificial intelligence, and human–computer interaction. They enable the development of advanced technologies such as autonomous vehicles, wearable devices, smart homes, and interactive virtual reality platforms. By leveraging CPHS, researchers aim to enhance human productivity, safety, and well-being in various domains such as healthcare, transportation, manufacturing, and entertainment. For example, in healthcare, CPHS can be used to monitor patients’ vital signs remotely, enabling early detection of health issues and prompt intervention. In transportation, CPHS can facilitate the development of self-driving cars that optimize traffic flow and improve road safety. However, CPHS rely on people who feature cognition, predictability and motivation without considering complex social factors [9]. CPHS are suited for applications where the human element of the CPS behaves in a defined way using defined options, and has been used heavily in modelling human-in-the-loop systems such as those at the National Aeronautics and Space Administration [9].

2.1. Cyber–Physical System

The ontology of CPSSs is difficult to define for two reasons. The first is that the boundaries between these agents or sub-systems are unclear. The second reason is that a CPSS includes human social systems within its holistic system boundary, as shown in Figure 1. Subsequently, modelling and measuring people’s social feelings and attitudes is more difficult than placing sensors in traditional Cyber–Physical Systems, because these sensors may need to exist at the interface or within the human mind itself [57]. The collection of data from social sensors is therefore a challenge within this field, as accurate metrics regarding social or emotional human states pose obstacles in terms of collection accuracy. In a traditional CPS, sensors can be implemented technically through technology paradigms such as IoT.
The connection between CPS IoT lies in their shared objective of connecting and exchanging data between physical devices. CPS involves the integration of sensors, actuators, and control systems, while IoT extends this concept by connecting a vast array of everyday objects or “things” through the internet. IoT acts as the backbone for CPS, providing the network infrastructure and communication protocols necessary to connect and exchange data between CPS components. This allows remote monitoring and control of physical processes in real time, enabling more efficient and autonomous decision making.
Converting human interactions and and behaviors in the social space into calculations inputted to sensors is a challenge within CPSS. Intrinsic social calculations that occur within the human mind are difficult to effectively record and calculate, and thus developing mechanisms to appropriately measure these social metrics is a field of continued CPSS research [57].
The combination of CPS with IoT leads to numerous applications across various domains, such as smart cities, transportation systems, healthcare, manufacturing, and energy management. By leveraging the capabilities of CPS and IoT, organizations can achieve improved efficiency, increased productivity, enhanced safety, and better resource management. The introduction of humans and their associated social contexts presents a unique challenge for CPSS research, as sensors to monitor these conditions need to quantify social data points [57]. An example of a CPS in this context would be a modern manufacturing facility, which would have computational sensors, actuators, and humans that would be making predefined or limited decisions based on the system state. By contrast, an example of a CPSS would be a humanitarian assistance or disaster relief effort, which would be considering multiple sensors and unstructured reports from groups of people. This latter example has a greater role for people, social systems and their interactions. This is an evolving area, as the forms of human interaction are increasing, especially as new communication platforms appear. There has been some development into ontologies for CPSS modelling, although much of this is sourced from a few limited authors [8,58].

2.2. Social Media Complexity

Social media exemplifies the construct of a Cyber–Physical–Social System. Social systems, regardless of technological integration, are regarded as complex systems [31] (p. 29). Complex systems are entities that consist of “many interacting parts”, and exist on the “edge of chaos” [59] (p. 1) and [60]. Social media is inherently reliant on layers of complex systems, often driven by people, and is fed by these principles [61,62]. Terms such as “the Internet of Minds” and “Humans as Sensors” have also contributed to understanding social interaction with CPS through an IoT perspective [63,64]. Furthermore, Maier et al. [65] discussed the role of humans as “neurons in a hive mind” as part of Society 5.0, enabled by the token economy. Subsequently, there is a strong link between the concept of social media and its intersection with the field of CPSS.
Complex systems are characterized by several behaviors and features. These aid in distinguishing complex systems from both chaos and complicated systems. Complicated systems contain a multitude of parts that are defined by ordered and simple rules [66]. Complex systems exist at the intersection between chaos and complicated systems, with sub-units potentially including both chaotic and complicated dynamics. Complex adaptive systems are a more specialized case of complex systems, although sometimes the terms are used interchangeably. Complex adaptive systems dynamically evolve with and exhibit adaptation within changing environments, meaning that the system will not always react consistently to the same stimuli [67] (p. 2). They are distinct from the features of systems of equilibrium or homeostasis. Complex adaptive systems contain agents within their system boundaries, which are semi-autonomous units that seek to optimize based on a schema of prescriptive actions and rules [68] (p. 18) and [69] (p. 85). The behavior of these agents can subsequently display patterns at the system level, not all of which are predictable or repeatable. The degree of complexity experienced by a system can be measured by its difficulty in description, its difficulty in creation, and its degree of organization [70]. Many complex adaptive systems change over time, with changing optimized organization depending on the current context or environment. Many human and social interactions form parts of larger complex adaptive systems, with wider environment changes influencing both individual and system behavior [71].
The features of complex systems identified in the literature are varied; however, there are some key commonalities between interpretations [31,32,33,34]. The boundaries between these systems and their sub-units are sometimes blurred [34]. Complex systems often contain the features of self-organization; interdependence; hierarchy and scale; evolution, feedback and adaptive interaction; unpredictability and non-linearity; sensitivity to initial conditions; and emergence [31,32,33,34]. Social media is clearly established in the literature as a complex system, which creates additional challenges for the conceptualization and modelling of the system within the scope of CPSS [72] (p. 374). Social media case studies have exemplified how its emergence has had far-reaching consequences on political, economic, and social outcomes.
Conceptual frameworks and analysis of historic social and economic events fueled by complex social media interactions have been studied, including such diverse events as the Arab Spring, Euromaidan, and Gamestop [73,74,75,76,77]. Furthermore, the evolution of news consumption through social media has increased opportunities for the generation of ‘Fake News’. This has been a contributing factor to real-world phenomena including politically influenced ideological polarization within the social population [78,79,80]. CPS theory is an opportunity to examine emergence within social media, and therefore model the complexity in CPSS. There are further epistemological questions regarding complex CPSS, with challenges in identifying and understanding the inputs, processes, and outputs that social agents have within these systems. Subsequently, modelling and understanding social media as a form of complex CPSS is a field warranting further investigation. This study attempts to understand the distribution of research relating to this topic and determine where research gaps and opportunities exist to further its conceptual development.

3. Current State of the Art

This study was conducted via a mixed methods approach, with both quantitative and qualitative data analysis. It involved surveying search results from the Scopus database related to the research topic, statistical analysis of those results, exporting result metadata to file for topic cluster analysis in VOSViewer, and finally a conceptual analysis of key research papers identified. VOSViewer and similar visualization tools have been widely used in the preliminary analysis and identification research opportunities in several academic domains [81], including specific IoT environments [82] and computational physical chemistry [83]. There are also several other tools designed to perform similar meta-analysis of academic media via citations, keywords and themes. These include CitNetExplorer [84] and SciMAT [85]. These tools, first developed a decade ago, are seeing increased and significant use in publication analysis, in particular for environmental scans and surveys. Visualization has become an important tool across understanding research domains as varied as deep learning in autonomous vehicles [86], understanding how COVID-19 has shaped research [87], and the links with Augmented Reality in learning [88]. This work has chosen VOSViewer for use, but does not preclude the use of other tools for future comparative analysis. Through the methods discussed, the aforementioned research questions were analyzed and able to be answered.

3.1. Distribution of Current Research

Data collection occurred by searching for key terms within the Scopus database, and analysis of the results’ bibliographic data. The search phrases utilized are detailed in Table 1. The search query was applied to the article title, abstract and keywords. These terms were used because they related to answering the aforementioned research questions. They focus on understanding the distribution of research across these fields, whilst also highlighting the degree of intersection into the chosen research area.

3.2. Statistical Visualization of Current Research

From the Scopus data sets the degree of research within the chosen fields is quantified and visualized. Figure 2 illustrates the comparative size of each search result. The field of complex systems is the largest and most comprehensive. This implies how this field is endemic and underlies many other research areas. As a subset of CPS, CPSS predictably returned a smaller results size. In its early stage, CPSS is mainly focused on exploring potential applications across various domains, including smart cities, healthcare, transportation, and manufacturing. The CPSS trend focuses on studying how to merge traditional physical systems with cyber intelligence, communication capabilities, and social behavior analysis.
The intersection between CPS and CPSS involves exploring how technology and human behavior interact and influence each other, considering the security by design of their elements. For example, in a smart city scenario, CPS would include sensor networks and data processing systems to monitor and control infrastructure, while CPSS considers how people will interact with these systems, such as through social media platforms or mobile apps that provide information about the city’s status and encourage citizen engagement. Understanding the intersection between CPS and CPSS is important for designing more efficient and user-centric systems, as well as addressing ethical, legal, and societal implications. It involves studying complex socio-technical systems to ensure that technological advancements are aligned with human needs, values, and social structures.
CPS are systems that combine physical components with computational elements to enable data sensing, processing, and control, with applications ranging from smart homes and energy grids to autonomous vehicles and industrial automation. CPSS, on the other hand, extends CPS by considering not only the technical aspects but also the social interactions, human behavior and cyber security within these systems. Figure 3 presents the intersection of the different fields of research. The most common fields of intersection were complex systems and CPS, followed by complex systems and social media. Conversely, intersections between CPSS and other topics were among the lowest statistics. These statistics align with the general trends identified in Figure 2, as topics that had a larger quantity of papers were more likely to have a larger intersection of multiple paper topics in Figure 3. With CPSS being a subset of CPS, the results aligned with this assumption that the subset topic’s intersection with other fields of research would be less than the overarching parents’ topic intersection.
Table 2 shows the distribution of papers with an intersection of multiple search topics. Of note, CPSS intersection with multiple other research fields yielded no results in any combination. This indicates that there is potentially a research gap in these areas, which is worth exploring further within the literature.

3.3. Network Analysis of Current Research

The bibliographic data from the Scopus database results were then assessed utilizing network analysis maps in the tool VOSViewer. They were analyzed utilizing the co-occurrence method using keywords of the papers. The counting method specified was ‘full counting’ and no thesaurus file was used. Phrases were prioritized for analysis by lowering the occurrence threshold until the number of occurrences was simultaneously minimized, whilst remaining above 30. For inputs that could not meet the threshold of 30, all terms were used. This meant that most maps had approximately 30 terms. The Scopus search terms for each result set were discounted from the final data set, and any outlying data that did not connect to the main graph was also discounted.

3.4. Conceptual Analysis of Most Influential Research

The conceptual analysis involved a review of the key topics utilizing the Scopus search outputs for the CPSS search term. The intent of this analysis was to determine novel research within the field and highlight the most influential papers. Selection criteria were applied to the results to narrow the focus of the review. The following terms and criteria were excluded from the analysis: survey papers, conference proceedings/journal introductions/opening chapters, references that did not contain abstracts, papers that did not include CPSS in their abstract, references whose full text could not be found, and papers that were not written in English. After this, the top 30 highly cited papers were selected for the development of a CPSS influence concept map.
This process was then repeated with the original CPSS Scopus search results data set. In this iteration, research papers were limited to the years 2021–2023 to assist in identifying the most novel and highly influential recent papers. References were chosen that had 5 or more citations for review, with the final reference count for analysis being 25.

3.5. Analysis of Current Research

The distribution of the research topics was significantly varied. Fields such as complex systems returned over a million results, whereas newer terms such as CPSS returned less than one thousand. CPSS was also highlighted as a significantly small subset against the wider field of CPS, with approximately 500 papers compared to 25,000 in the search results. These results indicated that the field of CPSS is relatively small compared to other established related research areas, and may warrant further expansion and investigation.
When considering the intersection of multiple search terms, as highlighted in Table 2, there were limited multi-disciplinary papers that addressed the research topics defined in Table 1. In particular, the queries that searched for the intersection of CPSS with multiple other research topics all produced zero search results, indicating that there is a significant research gap at the overlap of these key areas. As an emerging research area, this indicates that applications and research into CPSS require increased focus and commitment in order to understand the interrelation of complex CPS in the case of social media implications for cyber security.

4. Recent Technologies with CPSS

Recent technologies, including big data, IoT, machine learning and social media platforms have been employed in conjunction with CPSS. These technologies with CPSS, have revolutionised various fields by allowing advanced data analysis and decision-making processes. Big data allow massive volumes of structured and unstructured data that cannot be effectively processed by traditional methods. With recent technological advancements, it is now possible to collect, store, and analyze these vast amounts of data. Machine learning (ML), a subset of artificial intelligence, is a methodology that allows computer systems to automatically learn and improve from experience without being explicitly programmed. By utilizing ML algorithms, they can make predictions, classify data, and discover patterns within big data sets. Social media plays a significant role in the collection and generation of big data. Platforms like Facebook, Twitter, and Instagram provide vast amounts of data generated by users worldwide. These data can be utilized to study human behavior, sentiment analysis, and societal trends.
The integration of these technologies allows monitoring and control of various systems, ranging from smart cities, transportation networks, and healthcare systems, to environmental monitoring. Figure 4, which is the Complex system and CPS intersection map, exemplifies this trend. Every cluster map generated throughout the analysis, with the exception of the CPS and CPSS intersection map and the CPSS and social media intersection map, includes at least one of the aforementioned topics. This indicates a significant research focus across the literature on these key topics.
When drilling down into the research topic of CPSS, the largest areas of research focused on big data and the IoT; see Figure 5. In this model, the oldest research areas included IoT, intelligent systems, and social manufacturing. The newest areas included computational modelling, the Metaverse, and computational experiments.
When considering the intersection of topics, research that focused on both CPSS and complex systems was clustered across a linear scale. The oldest research topics were located in the center, with newer research extending to either side, as shown in Figure 6. The oldest research was associated with knowledge automation and parallel control, with newer research associated with computational modeling, smart manufacturing, task analysis and the Metaverse.

5. Most Influential Research Focuses

Within the field of Cyber–Physical–Social Systems, there are several areas of research focus apparent within the literature. Figure 7 highlights the top thirty influential CPSS papers, based on citations, and their topic clusters. Modelling CPSS through frameworks, simulations and data models is a key research area within the most influential CPSS papers. The complexity considerations of CPSS are identified and discussed throughout the literature. There was also a significant research focus on data processing implementations and optimization in areas such as resource allocation and capacity management.
The most influential case studies within the field related to manufacturing and industrial applications, smart cities, social media, and the smart grid. The most influential enabling technologies identified included tensor, edge computing, the IoT, and artificial societies, computational experiments, and parallel execution (ACP).

6. Role of CPSS with Recent Smart Applications

The concept of CPSS was noted in the literature to be linked regularly to several smart applications such as smart cities, smart healthcare, blockchain technologies, etc. The most regularly referenced included industrial applications and smart city implementations. These included manufacturing and Industry 4.0, smart cities, and blockchain tokenization [89,90,91,92]. Smart city implementations are also referred to in the highest CPSS paper citations [15,18,92,93]. Other CPSS implementations explored within the recent novel literature include smart wearable devices, data center cooling systems, industrial chart data processing, and electricity savings [22,94,95,96]. The gaming industry is additionally identified as a CPSS, with research in this space aligning with opportunities to crowd-source task allocation and optimization problems relying on the interaction of people with digital systems [97]. Future aims of this work include crowd-sensing via real user testing in order to generate incentive strategy evaluations [97].
Industrial implementations are identified in the literature as novel case studies for CPSS within the wider context of Industry 4.0. Performance monitoring is one area of development, where a CPSS framework is complimented to enable greater fidelity to detection and monitoring processes [90]. Evolving out of Industry 4.0, Industry 5.0 is an additional paradigm through which the concept of CPSS is discussed, integrating with other enabling technologies such as 6G, tokenization, robotics, tactile internet and collective intelligence [65,91]. These novel ideas also further link to the concept of Society 5.0, where CPSS’s aim becomes to enhance wider system harmony [65,91]. However, Maier’s work is challenged by the semantics of CPSS, sometimes identifying human-in-the-loop centric systems, which in some scenarios may align better with categorization as Cyber–Physical–Human Systems (CPHS) [91]. This cross-association indicates there is potentially a need for further work in defining the ontologies that separate these two sub-types of CPS, and the factors that conclusively assign a system to one definition over another.
A portion of the research related to industrial applications of CPSS appears to be more closely aligned with a traditional CPS or Industrial CPS (ICPS), instead of the social dimensions and metrics traditionally included within the CPSS construct. In some papers, this manifested in a Cyber–Physical–Human System (CPHS) context, where people’s interactions with the industrial system were considered, but frameworks did not include metrics or sensors relating to complex human social systems, and instead focused on predictable defined human-in-the-loop switch case interactions [9].

6.1. Data Processing and Resource Allocation

Innovations and novel implementations of CPSS in the recent literature often focused on improving resource allocation or optimizing data mining within large data sets as enabled by sensors and IoT. CPSS is identified as having significant data processing and analysis considerations due to its heterogeneity, growth, and dimensionality [98].
Collaboration is one research area that aims to improve CPSS data processing in order to support multi-goal optimization solutions [98]. Furthermore, Wang et al. introduced and tests the performance of algorithms in their role of processing CPSS big data in smart cities, including singular value decomposition (HOSVD), ring-based tree algorithms and tree-based tree algorithms [92]. This research identifies the need for future computational efficiency studies to improve the algorithmic processing of CPSS data in wide-scale applications [92].
Machine learning is a further tool used to build solutions to big data for CPSS processing challenges, with algorithms leveraging computing constructs such as cloud computing, edge computing, and distributed training in order to enable systematic processing [92]. Linear Regression is another machine learning technique that is applied to data analysis for CPSS, with application implications to the cyber security of data processed in untrustworthy environments, such as cloud servers or the blockchain [99]. Whilst privacy and security concerns were identified as a focus point for experimentation in CPSS data processing, the authors noted that future work in this domain would need to continue to improve data privacy, verifiability of results, and fairness [99] (p. 3966). Parallel execution is used as one way to validate AI-processed CPSS data, with future work in this space highlighting the need for real-world accurate simulation systems, and validation of outputs against read scene data [93]. Notably, the recent novel literature regarding CPSS data algorithms does not address newly emerging fields such as federated learning, where collaborative machine learning occurs across multiple decentralized clients utilizing architecture such as IoT [100,101]. The discussions regarding applications of such algorithms are limited, and present a further opportunity for research growth and maturity [96].
The processing of data to feed recommendation services as part of the CPSS construct is also considered in the literature, with algorithms built to process and analyze user characteristic data in diverse scenarios [51]. Future work in this area focuses on testing existing solutions with larger and more complex data sets to ensure quality of service in wide-scale applications [51] (p. 3858). Diverse scenario processing in the context of CPSS is an emerging space. Through the conceptual analysis, there were limited novel studies identified that challenge legacy machine learning algorithms with alternatives such as federated learning.
Data for CPSS processing must also be considered with a system-of-systems mindset, where multiple subsystems with varying data sets must be interconnected and processed. Within the smart city case study, this problem set is exemplified, with sub-systems including power grids, human social systems, and SCADA systems [102]. Hazard identification for safety is one research goal of these studies, where risk analytics are derived from interdependent network theory. However, future work is required in the fields of system resiliency in the case of cyber attacks in order to provide accurate hazard assessments [102] (p. 15).
Tensors are identified as one avenue for enabling heterogeneous data learning and optimization for CPSS [103,104,105]. Considerations for how to optimize the modelling of CPSS that utilize Intelligent Edge Services (IES) as part of an edge computing construct experience barriers in the form of security-efficiency compromises, energy consumption effects, and cost [104]. Future work in this optimization space needs to consider the secure optimization of multiple objectives, due to the complexity of CPSS, in order for CPSS-related price execution to become more economically viable [104] (p. 44). Additionally, the application of leading-edge machine learning technologies, such as federated learning, is a further opportunity for CPSS data processing research, especially in consideration of the joint foundational applicability of IoT to the two fields [101,106].
Algorithms that leverage sensor technology are identified in the literature to demonstrate more accurate classification results compared to legacy models; however, they highlight challenges to the flexibility of such models when training data constraints are introduced [105]. This is of particular concern when considered within the CPSS construct, where emergence may introduce unpredictable results to algorithm outputs, with the potential introduction of new data sets that do not nearly align with trained parameters.
The social component of human-generated information is also a data processing challenge, with sensors such as social media posts requiring analysis and comprehension in the digital space. The use of models such as Natural Language Processing needs to evolve to meet this need, as data sets may exhibit emergent or unpredictable behavior [63]. Opportunities within this sphere are posed through solutions such as Zero-Shot algorithms, that can potentially analyze data from unseen classes; however, continued development into the processing of unlabeled data is required to improve performance, especially in relation to semantics and knowledge graphs [63].

6.2. Cyber Security Implications

Cyber security and privacy concerns relating to data in IoT-enabled CPSS are of note within the literature and are explored through multiple case studies and implementations. Integration of social and IoT technologies into CPSS presents an opportunity to develop frameworks that conceptualize Enterprise Digital Transformation, such as seen in Mendhurwar and Mishra’s framework [107]. Their model specifically identifies not only the inter-dependencies between social agents and IoT sensors as part of CPSS but highlights the cyber security challenges associated with this digital transformation process [107]. They further identify that future work in this space may consider case studies that can provide insight into the nuances of specific applications and deliverables within the industry, considering factors such as entity needs and security posture [107].
Data analysis in industrial applications is also at the leading edge of research regarding CPSS, especially in conjunction with privacy considerations associated with data mining [89]. Algorithms such as the high-order Bi-Lanczos (HOBI-Lanczos) approach demonstrate an ability to securitize data and protect user privacy. Future work in this space includes exploration of energy implementations and collusion approach considerations [89]. Gati et al. [41] explored this concern regarding privacy preservation within CPSS, with their solution leveraging deep learning techniques in order to process private data. They propose a differential privacy framework that is applicable across multiple use cases such as smart agriculture, smart healthcare, and smart transportation [41]. Privacy protection and secure data considerations are also highlighted within CPSS research [96,103]. Human Activity Recognition (HAR) utilizing machine learning is one avenue for enabling secure processing of data framed through wearable devices [96]. Future research in this field involves investing in greater efficiency of algorithms, in addition to more personalized modelling whilst maintaining user privacy [96]. Additional challenges in this space involve the privacy preservation of data and processing, in relation to centralized models, and also the collection and integration of nonindependent and identically distributed (non-IID) data.
CPSS is also identified in the literature as an opportunity for attack vectors, which have the potential to compromise the cyber security of systems and their users. In these contexts, variations of existing attack vectors such as social engineering and malicious code execution are applied within the CPSS context, rather than a new attack class being defined. For example, Yang et al. propose the use of a neural network, called MCNN, to identify digitally manipulated ‘fake’ images in order to reduce the attack surface for anti-forensics tools [108]. Research such as this highlights the potential for CPSS to have real-world impacts; however, current works tend to focus on specific case studies rather than wider cross-domain conceptual applications. As people and technology integrate further in the Cyber–Physical–Social world, this poses additional opportunities for cyber attacks, as each edge between nodes in the CPSS presents additional potential attack vectors.

7. Research Challenges and Lessons Learned

As discussed above, the majority of novel contributions to the literature surrounding CPSS over the last three years can be categorized into one of three research fields. These areas of concern are broadly considered as case study CPSS implementations, such as smart cities; data processing considerations, such as efficiency algorithms; and cyber security implications, such as user data privacy concerns.
Through this critical survey and analysis of the literature, several significant research gaps and opportunities were identified and synthesized. Research gaps that specifically addressed the research questions included a lack of social metric inclusion in system-of-systems modelling for CPSS, a need for a CPSS ontology that includes consideration of the other intersecting research fields, and the inclusion of complex system dynamics within frameworks, including an understanding of emergent effects within the cyber, physical and social domains of CPSS. Additionally, CPSS research gaps were identified that related to comprehensive holistic case study analysis and cross-silo analysis of enabling emergent technologies including smart contracts and the blockchain, federated learning, sensor design and distribution. Furthermore, the existing research rarely addresses the impact of opaqueness within complex CPSS and how that may affect the accuracy and reliability of machine learning algorithms and decision support systems.
There is a lack of highly cited novel papers that specifically focus on developing frameworks or ontologies related to the social component of CPSS. Many papers that reference CPSS in their keywords or abstract often use this term to exemplify how a system can be considered a CPSS, without necessarily focusing on the nature of CPSS as part of their research. Multiple CPSS papers in the literature name the system in question as a CPSS, but then focus research on multidisciplinary fields such as algorithms for resource allocation or case studies such as smart grids [95]. Models and frameworks for CPSS as identified in the most recent novel literature also highlighted implementations focused on either parallel execution, or only considered the Cyber–Physical components of the system instead of including the human social metrics. Social data within the context of CPSS are focused upon little within the literature, with the outputs usually measured through methods such as social media posts or interactions with CPS system boundaries, such as interfacing with a smart city application.
There is, therefore, a research opportunity to aid in defining how these social data can be measured, and the subsequent challenges of processing such heterogeneous unlabeled data at scale. There is subsequently a need to identify how human metrics can be effectively modelled within larger CPSS frameworks, which include their social behaviors, attributes, and subsystems. Furthermore, there was evidence in the literature that CPSS was defined in broad and sometimes contradicting ways between different authors, with the comparison of CPHS to CPSS as an example of this. Analysis of the literature further highlighted some related research terms that could contribute to understanding the nature of CPSS. Terms such as persuasive computing, Society 5.0, Internet of Minds, and cybernetics also appeared to constitute part of CPSS as a concept, thus warranting further investigation and linking towards this larger CPSS ontology.
Whilst complexity is defined as an essential component of CPSS as per its originating conception, features of complexity such as emergence are rarely considered within the literature [10]. When machine learning is considered part of a CPSS application, the feature of emergence is conceptually at odds with the traditional design of training data, which tend to be predictable. Additionally, algorithm design is often considered within a data mining/processing context instead of from the context of human interaction and social media analytics. Finally, there is a lack of research focus associated with understanding multi-domain effects caused by the complexity of data within CPSS, particularly in the social space, especially when these effects are related to emergence. Social systems are inherently complex, albeit self-organizing, and subsequently CPSS research needs to consider the features of complexity within its models and frameworks. As an example, leveraging technologies such as machine learning and artificial intelligence to assist in modelling and data processing for CPSS is an opportunity. However, complications arise when considering the effects of emergence on pre-trained models, and unstructured, unlabeled human metric data sets.
There is a research need for future work that directly addresses these concerns relative to human metrics, an inclusive research ontology, and complexity considerations. This research would have to rely on the assumption that CPSS are inherently different to CPHS and that social systems are included within the CPSS boundary, instead of simply interfacing with it. The development of such a framework would then require testing against an established real-world CPSS that includes real social interactions for validation purposes, such as social media.
The process used to develop this work prioritized impact based on the number of citations individual publications have received. This approach therefore focuses on what has already been deemed impactful within the academic communities. Subsequently, there were some very recent publications that did not fall within the catchment of the analysis, but represent the leading edge of literature published within the last year. Such research still should be considered in future work in the field of CPSS.
Additionally, some of the existing novel literature focuses on fields relating to this paper’s research question. For example, Che et al.’s work into tensor factorization for fake news detection does not explicitly identify the system in question as a CPSS, but still offers valuable insight into CPSS research [109]. Other recent non-CPSS explicit literature that may contribute to CPSS future research related to this paper’s research focus include studies pertaining to modeling misinformation and bias within social networks and those that address emergence within CPS constructs [110,111,112,113,114,115]. Additionally, emergence in the field of cyber security is an identified area of research interest that is worth exploring within the context of CPSS and the IoT.
Ultimately, the field of Cyber–Physical–Social Systems is growing, which has the potential to underpin a multitude of cross-domain applications from healthcare to politics to algorithm optimization to Industry 4.0. Thus, building effective frameworks to understand this field and its cyber security implications is fundamental to ongoing reliance in both the cyber, physical and social spheres of influence.

8. Conclusions

The research field of CPSS is in an evolving state. Definitions, applications, and understandings of the concept are fluid and sometimes contradicting. This is exacerbated by its cross-applicability to multi-disciplinary applications, enabling silos of ontological understanding. However, the research in the field clearly points towards constructs of CPSS being a key enabler for future technological development and implementation into digitally enabled society, and thus warrants continued research and synthesis.
This work has shown that there is are several areas of CPSS that require additional research in order to reach its potential. This work has noted that the community is yet to standardize on common terms and definitions. This is not unexpected with such an emerging area. The development of structured representation mechanisms, such as formal ontologies, are one area of potential future research, that would assist in alleviating some of these issues.
Similarly, the broad nature of CPSS requires both a balance of the holistic in addition to detailed perspectives. This balance is difficult to achieve. The nature of complex systems makes this difficult, and there is more work to be carried out to understand some of the interactions of and between different domains.
Finally, this work has outlined the need for additional cybersecurity research both across both each domain of interest and at the areas that these domains integrate. The social aspect of cybersecurity is well known, but as CPSS evolves, so too will the challenges and opportunities in this area.
Social factors can heavily influence global current affairs, and thus the relationship between social agents and their Cyber–Physical counterparts presents a potentially volatile vector for influence, feedback, and emergence. Fake news, political events like the Arab Spring and Euromaidan, and economic events such as Gamestop all exemplify how Cyber–Physical Systems can have social components that affect outcomes in the real, physical world. Understanding how Cyber–Physical–Social Systems exist and operate is imperative to predict the emergence and the subsequent cyber security implications of these events.

Author Contributions

Conceptualization, T.S. and B.T.; methodology, T.S. and B.T.; software, T.S.; validation, T.S., B.T. and N.M.; formal analysis, T.S.; investigation, T.S.; resources, T.S. and B.T.; data curation, T.S.; writing—original draft preparation, T.S.; writing—review and editing, T.S., B.T. and N.M.; visualization, T.S., B.T. and N.M.; supervision, B.T. and N.M.; project administration, B.T.; funding acquisition, B.T. All authors have read and agreed to the published version of the manuscript.

Funding

This research is funded by UNSW Canberra.

Institutional Review Board Statement

Not applicable

Informed Consent Statement

Not applicable

Data Availability Statement

No new data were created or analyzed in this study. Data sharing is not applicable to this article.

Conflicts of Interest

The authors declare no conflict of interest.

Abbreviations

The following abbreviations are used in this manuscript:
MDPIMultidisciplinary Digital Publishing Institute
DOAJDirectory of open access journals
TLAThree letter acronym
LDLinear dichroism
IoTInternet of Things
CPSCyber–Physical System
CPSSCyber–Physical–Social System
C2Command and Control
CPHSCyber–Physical–Human System
HOBI-LanczosHigh-Order Bi-Lanczos
IESIntelligent Edge Services
HARHuman Activity Recognition
Non-IIDNonindependent and Identically Distributed
ICPSIndustrial Cyber–Physical Systems
ACPArtificial Societies, Computational Experiments, and Parallel Execution

References

  1. Wolf, W. Cyber-physical systems. Computer 2009, 42, 88–89. [Google Scholar] [CrossRef]
  2. Chen, H. Applications of cyber-physical system: A literature review. J. Ind. Integr. Manag. 2017, 2, 1750012. [Google Scholar] [CrossRef]
  3. Ranjith, J. Security Challenges Prospective Measures in the Current Status of Internet of Things (IoT). In Proceedings of the 2022 International Conference on Connected Systems & Intelligence (CSI), Trivandrum, India, 31 August–12 September 2022; pp. 1–8. [Google Scholar]
  4. Yaacoub, J.P.A.; Salman, O.; Noura, H.N.; Kaaniche, N.; Chehab, A.; Malli, M. Cyber-physical systems security: Limitations, issues and future trends. Microprocess. Microsyst. 2020, 77, 103201. [Google Scholar] [CrossRef] [PubMed]
  5. Baheti, R.; Gill, H. Cyber-physical systems. Impact Control. Technol. 2011, 12, 161–166. [Google Scholar]
  6. Yilma, B.A.; Panetto, H.; Naudet, Y. Systemic formalisation of Cyber-Physical-Social System (CPSS): A systematic literature review. Comput. Ind. 2021, 129, 103458. [Google Scholar] [CrossRef]
  7. Mahmoud, R.; Yousuf, T.; Aloul, F.; Zualkernan, I. Internet of things (IoT) security: Current status, challenges and prospective measures. In Proceedings of the 2015 10th International Conference for Internet Technology and Secured Transactions (ICITST), Bristol, UK, 14–16 December 2015; pp. 336–341. [Google Scholar]
  8. Smirnov, A.; Levashova, T.; Shilov, N.; Sandkuhl, K. Ontology for cyber-physical-social systems self-organisation. In Proceedings of the 16th Conference of Open Innovations Association FRUCT, Oulu, Finland, 27–31 October 2014; pp. 101–107. [Google Scholar]
  9. Sowe, S.K.; Zettsu, K.; Simmon, E.; de Vaulx, F.; Bojanova, I. Cyber-Physical Human Systems: Putting People in the Loop. IT Prof. 2016, 18, 10–13. [Google Scholar] [CrossRef]
  10. Wang, F.Y. The Emergence of Intelligent Enterprises: From CPS to CPSS. IEEE Intell. Syst. 2010, 25, 85–88. [Google Scholar] [CrossRef]
  11. Popper, K. Three worlds by Karl Popper. In The Tanner Lecture on Human Values; delivered at the University of Michigan on April 7, 1978; pp. 143–167. Available online: https://tannerlectures.utah.edu/_resources/documents/a-to-z/p/popper80.pdf (accessed on 29 July 2023).
  12. Dahmann, J.S. Systems of Systems Characterization and Types. In Systems of Systems Engineering for NATO Defence Applications; North Atlantic Treaty Organization Science and Technology Organization. 2015; pp. 1–14. Available online: https://www.sto.nato.int/publications/STO%20Educational%20Notes/STO-EN-SCI-276 (accessed on 29 July 2023).
  13. Barachini, F.; Stary, C. System-of-Systems Thinking. In From Digital Twins to Digital Selves and beyond: Engineering and Social Models for a Trans-Humanist World; Springer Nature: Cham, Switzerland, 2022; pp. 77–79. [Google Scholar]
  14. Cernian, A.; Vasile, N.; Sacala, I.S. Fostering Cyber-Physical Social Systems through an Ontological Approach to Personality Classification Based on Social Media Posts. Sensors 2021, 21, 6611. [Google Scholar] [CrossRef]
  15. Zhou, X.; Li, S.; Li, Z.; Li, W. Information diffusion across cyber-physical-social systems in smart city: A survey. Neurocomputing 2021, 444, 203–213. [Google Scholar] [CrossRef]
  16. Anwar, N.; Xiong, G.; Lu, W.; Ye, P.; Zhao, H.; Wei, Q. Cyber-physical -social systems for smart cities: An overview. In Proceedings of the 2021 IEEE 1st International Conference on Digital Twins and Parallel Intelligence, DTPI, Beijing, China, 15 July–15 August 2021; pp. 348–353. [Google Scholar] [CrossRef]
  17. Magutshwa, S.; Radianti, J. Is this Digital Resilience? In Insights from Adaptation and Exaptation of a Cyber-Physical-Social System. In Proceedings of the HICSS, Maui, HI, USA, 4–7 January 2022; pp. 1–10. [Google Scholar]
  18. Puliafito, A.; Tricomi, G.; Zafeiropoulos, A.; Papavassiliou, S. Smart cities of the future as cyber physical systems: Challenges and enabling technologies. Sensors 2021, 21, 3349. [Google Scholar] [CrossRef]
  19. Wang, F.Y.; Bennett, G.; Nazanin, B.G.; Li, Y.; Zhang, J.J.; Durgin, G.; Mirabbasi, S.; Lau, P.Y.; Valenta, C.; Amato, F.; et al. IEEE Council on Radio-Frequency Identification: History, Present, and Future Vision. IEEE J. Radio Freq. Identif. 2020, 4, 170–175. [Google Scholar] [CrossRef]
  20. Reine, R.; Juwono, F.H.; Sim, Z.A.; Wong, W. Cyber-physical-social systems: An overview. In Smart Connected World: Technologies and Applications Shaping the Future; Springer: Berlin/Heidelberg, Germany, 2021; pp. 25–45. [Google Scholar]
  21. Wang, Y.; Chen, C.F.; Kong, P.Y.; Li, H.; Wen, Q. A Cyber–Physical–Social Perspective on Future Smart Distribution Systems. Proc. IEEE 2022, 11, 1–31. [Google Scholar] [CrossRef]
  22. Zhang, Q.; Tang, C.; Bai, T.; Meng, Z.; Zhan, Y.; Niu, J.; Deen, M.J. A two-layer optimal scheduling framework for energy savings in a data center for Cyber–Physical–Social Systems. J. Syst. Archit. 2021, 116, 102050. [Google Scholar] [CrossRef]
  23. Xu, T.; Wendt, J.B.; Potkonjak, M. Security of IoT systems: Design challenges and opportunities. In Proceedings of the 2014 IEEE/ACM International Conference on Computer-Aided Design (ICCAD), San Jose, CA, USA, 3–6 November 2014; pp. 417–423. [Google Scholar]
  24. Thapa, B.; Fernandez, E.B.; Cardei, I.; Larrondo-Petrie, M.M. Abstract Entity Patterns for Sensors and Actuators. Computers 2023, 12, 93. [Google Scholar] [CrossRef]
  25. Wang, D.; Amin, M.T.; Li, S.; Abdelzaher, T.; Kaplan, L.; Gu, S.; Pan, C.; Liu, H.; Aggarwal, C.C.; Ganti, R.; et al. Using humans as sensors: An estimation-theoretic perspective. In Proceedings of the IPSN-14 13th International Symposium on Information Processing in Sensor Networks, Berlin, Germany, 15–17 April 2014; pp. 35–46. [Google Scholar]
  26. Velasco, C.; Pombo, M.; Barbosa Escobar, F. Value in the Age of Non-Fungible Tokens (NFTs).
  27. Borri, N.; Liu, Y.; Tsyvinski, A. The Economics of Non-Fungible Tokens. 2022. Available online: https://ssrn.com/abstract=4052045 (accessed on 29 July 2023). [CrossRef]
  28. Nadini, M.; Alessandretti, L.; Di Giacinto, F.; Martino, M.; Aiello, L.M.; Baronchelli, A. Mapping the NFT revolution: Market trends, trade networks, and visual features. Sci. Rep. 2021, 11, 20902. [Google Scholar] [CrossRef]
  29. Makridis, C.A.; Liao, G.Y. Democratizing effects of digital ledger technologies: Implications for economic mobility. Front. Blockchain 2023, 6, 972183. [Google Scholar] [CrossRef]
  30. Dalacoura, K. The 2011 uprisings in the Arab Middle East: Political change and geopolitical implications. Int. Aff. 2012, 88, 63–79. [Google Scholar] [CrossRef]
  31. Bar-Yam, Y. General features of complex systems. In Encyclopedia of Life Support Systems; UNESCO, EOLSS Publishers: Oxford, UK, 2002; Volume 1. [Google Scholar]
  32. Holland, J.H. Complexity: A Very Short Introduction; OUP: Oxford, UK, 2014. [Google Scholar]
  33. Ladyman, J.; Lambert, J.; Wiesner, K. What is a complex system? Eur. J. Philos. Sci. 2013, 3, 33–67. [Google Scholar] [CrossRef]
  34. Sturmberg, J.P. Health System Redesign; Springer: Berlin/Heidelberg, Germany, 2018; pp. 21–44. [Google Scholar]
  35. Montuori, A. Creativity and the Arab Spring. East–West Aff. 2013, 1, 30–47. [Google Scholar]
  36. Açıkalın, Ş.N.; Artun, E.C. The concept of self-organized criticality: The case study of the Arab uprising. In Chaos, Complexity and Leadership 2017: Explorations of Chaos and Complexity Theory; Springer: Cham, Switzerland, 2019; Volume 5, pp. 73–85. [Google Scholar]
  37. Nandhini, R.S.; Lakshmanan, R. A Review of the Integration of Cyber-Physical System and Internet of Things. Int. J. Adv. Comput. Sci. Appl. 2022, 13, 10761. [Google Scholar] [CrossRef]
  38. Rani, S.; Kataria, A.; Chauhan, M. Fog computing in industry 4.0: Applications and challenges—A research roadmap. In Energy Conservation Solutions for Fog-Edge Computing Paradigms; Springer: Berlin/Heidelberg, Germany, 2022; pp. 173–190. [Google Scholar]
  39. Rao, P.M.; Deebak, B. Security and privacy issues in smart cities/industries: Technologies, applications, and challenges. J. Ambient. Intell. Humaniz. Comput. 2022, 5, 1–37. [Google Scholar] [CrossRef]
  40. Ly, K.; Jin, Y. Security challenges in CPS and IoT: From end-node to the system. In Proceedings of the 2016 IEEE Computer Society Annual Symposium on VLSI (ISVLSI), Pittsburgh, PA, USA, 11–13 July 2016; pp. 63–68. [Google Scholar]
  41. Gati, N.J.; Yang, L.T.; Feng, J.; Nie, X.; Ren, Z.; Tarus, S.K. Differentially private data fusion and deep learning Framework for Cyber–Physical–Social Systems: State-of-the-art and perspectives. Inf. Fusion 2021, 76, 298–314. [Google Scholar] [CrossRef]
  42. Song, M.; Cai, Y.; Gao, C.; Chen, T.; Yao, Y.; Ming, H. Transactive energy in power distribution systems: Paving the path towards cyber-physical-social system. Int. J. Electr. Power Energy Syst. 2022, 142, 108289. [Google Scholar] [CrossRef]
  43. Wang, F.Y.; Rudas, I.J.; Wu, D.; Wang, X.; Yuan, Y.; Zhang, J.J.; Li, Y.; Bennett, G.; Bassiri-Gharb, N. Artificial Identification, Blockchain, Cyberphysical Social Systems, Digital Twins, and Parallel Intelligence: Opportunities and Synergies Between the IEEE Council on Radio-Frequency Identification and Systems, Man, and Cybernetics Society [Essay]. IEEE Syst. Man Cybern. Mag. 2021, 7, 61-C4. [Google Scholar] [CrossRef]
  44. Altulaihan, E.; Almaiah, M.A.; Aljughaiman, A. Cybersecurity threats, countermeasures and mitigation techniques on the IoT: Future research directions. Electronics 2022, 11, 3330. [Google Scholar] [CrossRef]
  45. Siddiqi, M.A.; Pak, W.; Siddiqi, M.A. A study on the psychology of social engineering-based cyberattacks and existing countermeasures. Appl. Sci. 2022, 12, 6042. [Google Scholar] [CrossRef]
  46. Albladi, S.M.; Weir, G.R. Predicting individuals’ vulnerability to social engineering in social networks. Cybersecurity 2020, 3, 7. [Google Scholar] [CrossRef]
  47. Wang, Z.; Zhu, H.; Sun, L. Social engineering in cybersecurity: Effect mechanisms, human vulnerabilities and attack methods. IEEE Access 2021, 9, 11895–11910. [Google Scholar] [CrossRef]
  48. Khargonekar, P.P.; Sampath, M. A framework for ethics in cyber-physical-human systems. IFAC-PapersOnLine 2020, 53, 17008–17015. [Google Scholar] [CrossRef]
  49. Chui, M.; Collins, M.; Patel, M. The Internet of Things: Catching up to an Accelerating Opportunity; McKinsey & Company: New York, NY, USA, 2021. [Google Scholar]
  50. Ning, H.; Lin, Y.; Wang, W.; Wang, H.; Shi, F.; Zhang, X.; Daneshmand, M. Cyberology: Cyber-Physical-Social-Thinking Spaces based Discipline and Inter-discipline Hierarchy for Metaverse (General Cyberspace). IEEE Internet Things J. 2022, 3, 2091. [Google Scholar]
  51. Chent, X.; Liang, W.; Xu, J.; Wang, C.; Li, K.C.; Qiu, M. An Efficient Service Recommendation Algorithm for Cyber-Physical-Social Systems. IEEE Trans. Netw. Sci. Eng. 2022, 9, 3847–3859. [Google Scholar] [CrossRef]
  52. Zhou, Y.; Yu, F.R.; Chen, J.; Kuo, Y. Cyber-physical-social systems: A state-of-the-art survey, challenges and opportunities. IEEE Commun. Surv. Tutorials 2019, 22, 389–425. [Google Scholar] [CrossRef]
  53. Mohebbi, S.; Zhang, Q.; Wells, E.C.; Zhao, T.; Nguyen, H.; Li, M.; Abdel-Mottaleb, N.; Uddin, S.; Lu, Q.; Wakhungu, M.J. Cyber-physical-social interdependencies and organizational resilience: A review of water, transportation, and cyber infrastructure systems and processes. Sustain. Cities Soc. 2020, 62, 102327. [Google Scholar] [CrossRef]
  54. Abera, Y.B.; Naudet, Y.; Panetto, H. A new paradigm and meta-model for cyber-physical-social systems. IFAC-PapersOnLine 2020, 53, 10949–10954. [Google Scholar] [CrossRef]
  55. Zhou, T.; Lin, M. Deadline-Aware Deep-Recurrent-Q-Network Governor for Smart Energy Saving. IEEE Trans. Netw. Sci. Eng. 2022, 9, 3886–3895. [Google Scholar] [CrossRef]
  56. Wang, Y. Probabilistic Modeling of Information Dynamics in Networked Cyber–Physical–Social Systems. IEEE Internet Things J. 2021, 8, 14934–14947. [Google Scholar] [CrossRef]
  57. Sowe, S.K.; Zettsu, K. Human Factors in Cyber-Physical Social Systems: Leveraging Social Sensor Data. Front. Artif. Intell. Appl. 2016, 280, 157–165. [Google Scholar] [CrossRef]
  58. Smirnov, A.; Kashevnik, A.; Shilov, N. Cyber-Physical-Social System Self-Organization: Ontology-Based Multi-level Approach and Case Study. In Proceedings of the 2015 IEEE 9th International Conference on Self-Adaptive and Self-Organizing Systems, Cambridge, MA, USA, 21–25 September 2015; pp. 168–169. [Google Scholar] [CrossRef]
  59. Mitchell, M.; Newman, M. Complex systems theory and evolution. Encycl. Evol. 2002, 1, 1–5. [Google Scholar]
  60. Ziemelis, K.; Allen, L. Complex systems. Nature 2001, 410, 241. [Google Scholar] [CrossRef]
  61. Collinson, S.; Jay, M. From complexity to simplicity. In Unleash Your Organisation’s Potential; Springer: Berlin/Heidelberg, Germany, 2012. [Google Scholar]
  62. Guckenheimer, J.; Ottino, J.M. Foundations for Complex Systems Research in the Physical Sciences and Engineering, Report from an NSF Workshop; Cornell University: Cornell, NY, USA, 2008. [Google Scholar]
  63. Chen, Q.; Wang, W.; Huang, K.; Coenen, F. Zero-Shot Text Classification via Knowledge Graph Embedding for Social Media Data. IEEE Internet Things J. 2022, 9, 9205–9213. [Google Scholar] [CrossRef]
  64. Zhang, J.J.; Wang, F.Y.; Wang, X.; Xiong, G.; Zhu, F.; Lv, Y.; Hou, J.; Han, S.; Yuan, Y.; Lu, Q.; et al. Cyber-Physical-Social Systems: The State of the Art and Perspectives. IEEE Trans. Comput. Soc. Syst. 2018, 5, 829–840. [Google Scholar] [CrossRef]
  65. Maier, M.; Ebrahimzadeh, A.; Beniiche, A.; Rostami, S. The Art of 6G (TAO 6G): How to wire Society 5.0. J. Opt. Commun. Netw. 2022, 14, A101–A112. [Google Scholar] [CrossRef]
  66. Rickles, D.; Hawe, P.; Shiell, A. A simple guide to chaos and complexity. J. Epidemiol. Community Health 2007, 61, 933–937. [Google Scholar] [CrossRef] [PubMed]
  67. Chan, S. Complex adaptive systems. In Proceedings of the ESD 83 Research Seminar in Engineering Systems, MIT, Cambridge, MA, USA, 2–5 September 2001; Volume 31, pp. 1–9. [Google Scholar]
  68. Gell-Mann, M. Complex Adaptation Systems; Number 19; Addison-Wesley: Boston, MA, USA, 1994. [Google Scholar]
  69. Dooley, K.J. A complex adaptive systems model of organization change. Nonlinear Dyn. Psychol. Life Sci. 1997, 1, 69–97. [Google Scholar] [CrossRef]
  70. Lloyd, S. Measures of complexity: A nonexhaustive list. IEEE Control. Syst. Mag. 2001, 21, 7–8. [Google Scholar]
  71. Buckley, W. Society as a complex adaptive system. In Systems Research for Behavioral Science; Routledge: Abingdon, UK, 2017; pp. 490–513. [Google Scholar]
  72. De Domenico, M.; Brockmann, D.; Camargo, C.; Gershenson, C.; Goldsmith, D.; Jeschonnek, S.; Kay, L.; Nichele, S.; Nicolás, J.; Schmickl, T. Complexity Explained. Springer: Berlin/Heidelberg, Germany, 2019. Available online: https://complexityexplained.github.io (accessed on 29 July 2023).
  73. Bohdanova, T. Unexpected revolution: The role of social media in Ukraine’s Euromaidan uprising. Eur. View 2014, 13, 133–142. [Google Scholar] [CrossRef]
  74. Comunello, F.; Anzera, G. Will the revolution be tweeted? A conceptual framework for understanding the social media and the Arab Spring. Islam Christ. Relations 2012, 23, 453–470. [Google Scholar] [CrossRef]
  75. Kim, K.; Lee, S.Y.T.; Kauffman, R.J. Social informedness and investor sentiment in the GameStop short squeeze. Electron. Mark. 2023, 33, 23. [Google Scholar] [CrossRef]
  76. Long, S.; Lucey, B.; Xie, Y.; Yarovaya, L. “I just like the stock”: The role of Reddit sentiment in the GameStop share rally. Financ. Rev. 2023, 58, 19–37. [Google Scholar] [CrossRef]
  77. Surzhko-Harned, L.; Zahuranec, A.J. Framing the revolution: The role of social media in Ukraine’s Euromaidan movement. Natl. Pap. 2017, 45, 758–779. [Google Scholar] [CrossRef]
  78. Allcott, H.; Gentzkow, M. Social media and fake news in the 2016 election. J. Econ. Perspect. 2017, 31, 211–236. [Google Scholar] [CrossRef]
  79. Cain, J. I’m the One: Social Media, Social Identity, and Elections. Online J. Commun. Media Technol. 2020, 10, e202025. [Google Scholar] [CrossRef]
  80. Spohr, D. Fake news and ideological polarization: Filter bubbles and selective exposure on social media. Bus. Inf. Rev. 2017, 34, 150–160. [Google Scholar] [CrossRef]
  81. Kirby, A. Exploratory Bibliometrics: Using VOSviewer as a Preliminary Research Tool. Publications 2023, 11, 10. [Google Scholar] [CrossRef]
  82. Wang, J.; Kim, H.S. Visualizing the Landscape of Home IoT Research: A Bibliometric Analysis Using VOSviewer. Sensors 2023, 23, 3086. [Google Scholar] [CrossRef] [PubMed]
  83. Finandhita, A.; Mega, R.U.; Jumansyah, R.; Rafdhi, A.A.; Oktafiani, D. VOSviewer application analysis: Computational physical chemistry case study. Moroc. J. Chem. 2022, 10, 1–10. [Google Scholar]
  84. Van Eck, N.J.; Waltman, L. CitNetExplorer: A new software tool for analyzing and visualizing citation networks. J. Inf. 2014, 8, 802–823. [Google Scholar] [CrossRef]
  85. Cobo, M.J.; López-Herrera, A.G.; Herrera-Viedma, E.; Herrera, F. SciMAT: A new science mapping analysis software tool. J. Am. Soc. Inf. Sci. Technol. 2012, 63, 1609–1630. [Google Scholar] [CrossRef]
  86. Morooka, F.E.; Junior, A.M.; Sigahi, T.F.; Pinto, J.d.S.; Rampasso, I.S.; Anholon, R. Deep Learning and Autonomous Vehicles: Strategic Themes, Applications, and Research Agenda Using SciMAT and Content-Centric Analysis, a Systematic Review. Mach. Learn. Knowl. Extr. 2023, 5, 763–781. [Google Scholar] [CrossRef]
  87. Viedma, E.H.; Robles, J.R.L.; Guallar, J.; Cobo, M.J. Global trends in coronavirus research at the time of COVID-19: A general bibliometric approach and content analysis using SciMAT. Prof. Inf. 2020, 29, 11. [Google Scholar]
  88. Min, W.; Yu, Z. A Bibliometric Analysis of Augmented Reality in Language Learning. Sustainability 2023, 15, 7235. [Google Scholar] [CrossRef]
  89. Feng, J.; Yang, L.T.; Zhang, R.; Qiang, W.; Chen, J. Privacy Preserving High-Order Bi-Lanczos in Cloud-Fog Computing for Industrial Applications. IEEE Trans. Ind. Inform. 2022, 18, 7009–7018. [Google Scholar] [CrossRef]
  90. Jiang, Y.; Yin, S.; Kaynak, O. Performance Supervised Plant-Wide Process Monitoring in Industry 4.0: A Roadmap. IEEE Open J. Ind. Electron. Soc. 2021, 2, 21–35. [Google Scholar] [CrossRef]
  91. Maier, M. 6G as if People Mattered: From Industry 4 0 toward Society 5.0: Aper. In Proceedings of the International Conference on Computer Communications and Networks, ICCCN, Athens, Greece, 19–22 July 2021; Volume 2021. [Google Scholar] [CrossRef]
  92. Wang, X.; Yang, L.T.; Chen, X.; Deen, M.J.; Jin, J. Improved Multi-Order Distributed HOSVD with Its Incremental Computing for Smart City Services. IEEE Trans. Sustain. Comput. 2021, 6, 456–468. [Google Scholar] [CrossRef]
  93. Xiong, G.; Li, Z.; Wu, H.; Chen, S.; Dong, X.; Zhu, F.; Lv, Y. Building urban public traffic dynamic network based on CPSS: An integrated approach of big data and AI. Appl. Sci. 2021, 11, 1109. [Google Scholar] [CrossRef]
  94. Chen, L.; Zhao, K. An approach for chart description generation in cyber–physical–social system. Symmetry 2021, 13, 1552. [Google Scholar] [CrossRef]
  95. Zhang, Q.; Meng, Z.; Hong, X.; Zhan, Y.; Liu, J.; Dong, J.; Bai, T.; Niu, J.; Deen, M.J. A survey on data center cooling systems: Technology, power consumption modeling and control strategy optimization. J. Syst. Archit. 2021, 119, 102253. [Google Scholar] [CrossRef]
  96. Zhou, X.; Liang, W.; Ma, J.; Yan, Z.; Wang, K.I.K. 2D Federated Learning for Personalized Human Activity Recognition in Cyber-Physical-Social Systems. IEEE Trans. Netw. Sci. Eng. 2022, 9, 3934–3944. [Google Scholar] [CrossRef]
  97. Predescu, A.; Arsene, D.; Pahonțu, B.; Mocanu, M.; Chiru, C. A Serious Gaming Approach for Crowdsensing in Urban Water Infrastructure with Blockchain Support. Appl. Sci. 2021, 11, 1449. [Google Scholar] [CrossRef]
  98. Cui, Z.; Zhang, Z.; Hu, Z.; Geng, S.; Chen, J. A Many-Objective Optimization Based Intelligent High Performance Data Processing Model for Cyber-Physical-Social Systems. IEEE Trans. Netw. Sci. Eng. 2022, 9, 3825–3834. [Google Scholar] [CrossRef]
  99. Zhang, H.; Gao, P.; Yu, J.; Lin, J.; Xiong, N.N. Machine Learning on Cloud with Blockchain: A Secure, Verifiable and Fair Approach to Outsource the Linear Regression. IEEE Trans. Netw. Sci. Eng. 2022, 9, 3956–3967. [Google Scholar] [CrossRef]
  100. Banabilah, S.; Aloqaily, M.; Alsayed, E.; Malik, N.; Jararweh, Y. Federated learning review: Fundamentals, enabling technologies, and future applications. Inf. Process. Manag. 2022, 59, 103061. [Google Scholar] [CrossRef]
  101. Ghimire, B.; Rawat, D.B. Recent advances on federated learning for cybersecurity and cybersecurity for federated learning for internet of things. IEEE Internet Things J. 2022, 19, 1017. [Google Scholar] [CrossRef]
  102. Hu, J.; Dong, S.; Zhang, L.; Chen, Y.; Xu, K. Cyber–physical–social hazard analysis for LNG port terminal system based on interdependent network theory. Saf. Sci. 2021, 137, 105180. [Google Scholar] [CrossRef]
  103. Feng, J.; Yang, L.T.; Nie, X.; Gati, N.J. Edge-Cloud-Aided Differentially Private Tucker Decomposition for Cyber-Physical-Social Systems. IEEE Internet Things J. 2022, 9, 8387–8396. [Google Scholar] [CrossRef]
  104. Wang, X.; Yang, L.T.; Ren, L.; Wang, Y.; Deen, M.J. A tensor-based computing and optimization model for intelligent edge services. IEEE Netw. 2022, 36, 40–44. [Google Scholar] [CrossRef]
  105. Yu, H.; Yang, L.T.; Fan, X.; Zhang, Q. A deep residual computation model for heterogeneous data learning in smart Internet of Things. Appl. Soft Comput. 2021, 107, 107361. [Google Scholar] [CrossRef]
  106. MacÍas, A.; Navarro, E. Paradigms for the conceptualization of Cyber-Physical-Social-Thinking hyperspace: A Thematic Synthesis. J. Ambient. Intell. Smart Environ. 2022, 14, 285–316. [Google Scholar] [CrossRef]
  107. Mendhurwar, S.; Mishra, R. Integration of social and IoT technologies: Architectural framework for digital transformation and cyber security challenges. Enterp. Inf. Syst. 2021, 15, 565–584. [Google Scholar] [CrossRef]
  108. Yang, B.; Guo, H.; Cao, E. Design of cyber-physical-social systems with forensic-awareness based on deep learning. In Advances in Computers; Elsevier: Amsterdam, The Netherlands, 2021; Volume 120, pp. 39–79. [Google Scholar] [CrossRef]
  109. Che, H.; Pan, B.; Leung, M.F.; Cao, Y.; Yan, Z. Tensor Factorization With Sparse and Graph Regularization for Fake News Detection on Social Networks. IEEE Trans. Comput. Soc. Syst. 2023, 9, 287. [Google Scholar] [CrossRef]
  110. Azzimonti, M.; Fernandes, M. Social media networks, fake news, and polarization. Eur. J. Political Econ. 2023, 76, 102256. [Google Scholar] [CrossRef]
  111. Törnberg, P.; Andersson, C.; Lindgren, K.; Banisch, S. Modeling the emergence of affective polarization in the social media society. PLoS ONE 2021, 16, e0258259. [Google Scholar] [CrossRef] [PubMed]
  112. Del Vicario, M.; Scala, A.; Caldarelli, G.; Stanley, H.E.; Quattrociocchi, W. Modeling confirmation bias and polarization. Sci. Rep. 2017, 7, 40391. [Google Scholar] [CrossRef] [PubMed]
  113. Hugues, J.; Cancila, D. Increasingly Autonomous CPS: Taming Emergent Behaviors from an Architectural Perspective; CEUR Workshop Proceedings (CEUR-WS.org): Aachen, Germany, 2022. [Google Scholar]
  114. Tyszberowicz, S.; Faitelson, D. Emergence in cyber-physical systems: Potential and risk. Front. Inf. Technol. Electron. Eng. 2020, 21, 1554–1566. [Google Scholar] [CrossRef]
  115. Li, Z.; Sim, C.H.; Low, M.Y.H. A survey of emergent behavior and its impacts in agent-based systems. In Proceedings of the 2006 4th IEEE International Conference on Industrial Informatics, Singapore, 16–18 August 2006; pp. 1295–1300. [Google Scholar]
Figure 1. Evolution of the CPSS.
Figure 1. Evolution of the CPSS.
Sensors 23 07391 g001
Figure 2. Single search term results.
Figure 2. Single search term results.
Sensors 23 07391 g002
Figure 3. Dual term search results.
Figure 3. Dual term search results.
Sensors 23 07391 g003
Figure 4. Complex system + Cyber–Physical System clusters (2019–2020).
Figure 4. Complex system + Cyber–Physical System clusters (2019–2020).
Sensors 23 07391 g004
Figure 5. CPSS research clusters (2018–2021).
Figure 5. CPSS research clusters (2018–2021).
Sensors 23 07391 g005
Figure 6. CPSS + complex systems time overlay (2019–2022).
Figure 6. CPSS + complex systems time overlay (2019–2022).
Sensors 23 07391 g006
Figure 7. Most influential research clusters in the field of CPSS.
Figure 7. Most influential research clusters in the field of CPSS.
Sensors 23 07391 g007
Table 1. Scopus search phrases.
Table 1. Scopus search phrases.
Report TermScopus Search Phrase
Complex system“*Complex system*” OR “*Complexity*”
Cyber–Physical System/CPS“*Cyber Physical System*” OR “*Cyber–Physical System*”
Cyber–Physical–Social System/CPSS“*Cyber Physical Social System*” OR “*Cyber–Physical Social System*”
Social Media“*Social media*”
Influence“*Influence*”
Cyber Security“*Cybersecurity*” OR “*Cyber security*”
Table 2. Multiple term search results.
Table 2. Multiple term search results.
CPSSCPS
Three TermsComplex system + Social Media03
Three TermsComplex system + Cyber Security0182
Four TermsComplex system + Social Media + Cyber Security00
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Sobb, T.; Turnbull, B.; Moustafa, N. A Holistic Review of Cyber–Physical–Social Systems: New Directions and Opportunities. Sensors 2023, 23, 7391. https://doi.org/10.3390/s23177391

AMA Style

Sobb T, Turnbull B, Moustafa N. A Holistic Review of Cyber–Physical–Social Systems: New Directions and Opportunities. Sensors. 2023; 23(17):7391. https://doi.org/10.3390/s23177391

Chicago/Turabian Style

Sobb, Theresa, Benjamin Turnbull, and Nour Moustafa. 2023. "A Holistic Review of Cyber–Physical–Social Systems: New Directions and Opportunities" Sensors 23, no. 17: 7391. https://doi.org/10.3390/s23177391

APA Style

Sobb, T., Turnbull, B., & Moustafa, N. (2023). A Holistic Review of Cyber–Physical–Social Systems: New Directions and Opportunities. Sensors, 23(17), 7391. https://doi.org/10.3390/s23177391

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop