State-of-the-Art Reviews
Nov 26, 2022

A Scoping Review for Cybersecurity in the Construction Industry

Publication: Journal of Management in Engineering
Volume 39, Issue 2

Abstract

The 4th industrial revolution and its inherent digitalization are changing every aspect of the construction industry. However, these technological transformations bring new challenges, including cybersecurity. Although a number of studies in recent years have aimed to analyze cybersecurity issues in the construction sector, further research investment in this area is vital. The first step towards identifying needed and promising research directions in this domain is to systematically analyze the existing body of knowledge and detect knowledge gaps. This study addresses this need through a systematic scoping review designed based on the Preferred Reporting Items for Systematic Reviews and Meta-Analysis extension for Scoping Review (PRISMA-ScR). To synthesize the existing knowledge, the extracted information is mapped with multiple benchmarks, including the National Institute of Standards and Technology (NIST) framework for cybersecurity management. The outcomes of the scoping review indicated that, from the construction perspective, the existing literature mainly focuses on a few areas, including Building Information Modeling (BIM), while other digital systems such as construction robots and prefabrication platforms need to be considered in future works. In terms of cybersecurity management, most of the existing studies focus on identifying risks and protecting assets. Other aspects of cybersecurity management, including detecting intrusions, responding to threats, and recovering from cyber-attacks need to be addressed in future studies. Regarding the technology-mediated countermeasures, the existing studies have explored only a limited number of potential solutions with a considerable focus on Blockchain-based systems, while the application of other countermeasures such as network virtualization can be a basis for future studies. Finally, the existing studies focused on procedural guidelines lack systematic solutions for areas including integrated cyber risk management and organizational change.

Get full access to this article

View all available purchase options and get full access to this article.

Data Availability Statement

All data, models, and code generated or used during the study appear in the published article.

References

Ackerson, J. M., R. Dave, and N. Seliya. 2021. “Applications of recurrent neural network for biometric authentication & anomaly detection.” Information 12 (7): 272. https://doi.org/10.3390/info12070272.
Adams, J. 2019. “Construction consultants in the global market place.” In Global construction success, 19–23. Hoboken, NJ: Wiley.
Adaros Boye, C., P. Kearney, and M. Josephs. 2018. “Cyber-risks in the industrial internet of things (IIoT): Towards a method for continuous assessment.” In Proc., Int. Conf. on Information Security, 502–519. Cham, Switzerland: Springer.
Akinosho, T. D., L. O. Oyedele, M. Bilal, A. O. Ajayi, M. D. Delgado, O. O. Akinade, and A. A. Ahmed. 2020. “Deep learning in the construction industry: A review of present status and future innovations.” J. Build. Eng. 32 (Nov): 101827. https://doi.org/10.1016/j.jobe.2020.101827.
Aldawood, H., and G. Skinner. 2019. “Reviewing cyber security social engineering training and awareness programs—Pitfalls and ongoing issues.” Future Internet 11 (3): 73. https://doi.org/10.3390/fi11030073.
Alshammari, K., T. Beach, and Y. Rezgui. 2021. “Cybersecurity for digital twins in the built environment: Current research and future directions.” J. Inf. Technol. Constr. 26 (Apr): 159–173. https://doi.org/10.36680/j.itcon.2021.010.
Amoroso, E. G. 2013. Cyber attacks: Protecting national infrastructure. Oxford, UK: Butterworth-Heinemann.
Amoroso, E. G., and M. E. Amoroso. 2017. From C.I.A. to APT: An introduction to cyber security. Hoboken, NJ: Independently Published.
Arksey, H., and L. O’Malley. 2005. “Scoping studies: Towards a methodological framework.” Int. J. Social Res. Methodol. 8 (1): 19–32. https://doi.org/10.1080/1364557032000119616.
Bademosi, F., and R. R. Issa. 2021. “Factors influencing adoption and integration of construction robotics and automation technology in the US.” J. Constr. Eng. Manage. 147 (8): 04021075. https://doi.org/10.1061/(ASCE)CO.1943-7862.0002103.
Bangcawayan, J. 2021. “Cybersecurity challenges faced by engineering companies.” Secure Sockets Layer. Accessed August 1, 2022. https://www.ssl.com/blogs/cybersecurity-engineering-companies.
Barrett, M. P. 2018. Framework for improving critical infrastructure cybersecurity version 1.1. Gaithersburg, MD: NIST.
Bello, A., and A. Maurushat. 2020. “Technical and behavioural training and awareness solutions for mitigating ransomware attacks.” In Proc., Computer Science On-line Conf., 164–176. Cham, Switzerland: Springer.
Boyes, H. 2013. “Cyber security of intelligent buildings: A review.” In Proc., 8th IET Int. System Safety Conf. incorporating the Cyber Security Conf., 1–7. London: Institution of Engineering and Technology.
Boyes, H. 2014. Building information modelling (BIM): Addressing the cyber security issues. London: Institution of Engineering and Technology.
Boyes, H. 2015. “Security, privacy, and the built environment.” IT Prof. 17 (3): 25–31. https://doi.org/10.1109/MITP.2015.49.
Boyes, H., R. Isbell, P. Norris, and T. Watson. 2014. Enabling intelligent cities through cyber security of building information and building systems. London: Institution of Engineering and Technology.
Brooks, D. J., M. Coole, and P. Haskell-Dowland. 2019. “Intelligent building systems: Security and facility professionals’ understanding of system threats, vulnerabilities and mitigation practice.” Secur. J. 33 (2): 244–265. https://doi.org/10.1057/s41284-019-00183-9.
Chowdhury, N. M. K., and R. Boutaba. 2009. “Network virtualization: State of the art and research challenges.” IEEE Commun. Mag. 47 (7): 20–26. https://doi.org/10.1109/MCOM.2009.5183468.
Construction Equipment Guide. 2021. “What can contractors do to protect company data, assets from hackers?” Accessed August 1, 2022. https://www.constructionequipmentguide.com/staying-ahead-of-hackers/52319.
Construction News. 2020. “Cyber-attack: The tier ones targeted by hackers–and how to protect your firm.” Accessed January 20, 2022. https://www.constructionnews.co.uk/agenda/cyber-attack-how-hackers-are-trying-to-take-down-construction-and-how-to-stop-them-14-10-2020/.
Cyware. 2018. “Hackers hit French firm Ingerop stealing 65 GB data relating to nuclear power plants.” Accessed August 1, 2022. https://cyware.com/news/hackers-hit-french-firm-ingerop-stealing-65-gb-data-relating-to-nuclear-power-plants-f193b9ba.
Das, M., H. Luo, and J. C. Cheng. 2020. “Securing interim payments in construction projects through a blockchain-based framework.” Autom. Constr. 118 (Oct): 103284. https://doi.org/10.1016/j.autcon.2020.103284.
Das, M., X. Tao, and J. C. Cheng. 2021. “BIM security: A critical review and recommendations using encryption strategy and Blockchain.” Autom. Constr. 126 (Jun): 103682. https://doi.org/10.1016/j.autcon.2021.103682.
de Soto, B. G., A. Georgescu, B. R. K. Mantha, Ž. Turk, and A. Maciel. 2020. “Construction cybersecurity and critical infrastructure protection: Significance, overlaps, and proposed action plan.” Preprint, submitted May 10, 2020. https://doi.org/10.20944/preprints202005.0213.v1.
du Plessis, C., and F. Sherratt. 2020. “Construction 4.0 and built assets in-use: Creating an e-topia or dystopia?” Proc. Inst. Civ. Eng. Manage. Procure. Law 173 (4): 182–189. https://doi.org/10.1680/jmapl.19.00054.
Egnyte. 2021. “State of ransomware report for architecture, engineering and construction.” Accessed January 20, 2022. https://pages.egnyte.com/rs/038-PTQ-391/images/%5BWHITEPAPER%5D%20State-of-Ransomware-AEC.pdf.
El-Sayegh, S., L. Romdhane, and S. Manjikian. 2020. “A critical review of 3D printing in construction: Benefits, challenges, and risks.” Arch. Civ. Mech. Eng. 20 (2): 1–25. https://doi.org/10.1007/s43452-020-00038-w.
Executive Office of the President. 2013. “Improving critical infrastructure cybersecurity.” Fed. Regist. 78 (33): 11737–11744.
FBI (Federal Bureau of Investigation). 2020. “Internet crime report.” Accessed January 20, 2022. https://www.ic3.gov/Media/PDF/AnnualReport/2020_IC3Report.pdf.
Fisk, D. 2012. “Cyber security, building automation, and the intelligent building.” Intell. Build. Int. 4 (3): 169–181. https://doi.org/10.1080/17508975.2012.695277.
García de Soto, B., Ž. Turk, A. Maciel, B. Mantha, A. Georgescu, and M. S. Sonkor. 2022. “Understanding the significance of cybersecurity in the construction industry: Survey findings.” J. Constr. Eng. Manage. 148 (9): 04022095. https://doi.org/10.1061/(ASCE)CO.1943-7862.0002344.
Ghadiminia, N., M. Mayouf, S. Cox, and J. Krasniewicz. 2021. “BIM-enabled facilities management (FM): A scrutiny of risks resulting from cyber attacks.” J. Facil. Manage. 20 (3): 326–349. https://doi.org/10.1108/JFM-01-2021-0001.
Glantz, C., S. Somasundaram, M. Mylrea, R. Underhill, and A. Nicholls. 2016. Evaluating the maturity of cybersecurity programs for building control systems. Richland, WA: National Security Building.
Gracanin, D., A. D’Amico, M. Manuel, W. Carson, M. Eltoweissy, and L. Cheng. 2018. “Biologically inspired safety and security for smart built environments: Position paper.” In Proc., 2018 IEEE Security and Privacy Workshops (SPW), 293–298. New York: IEEE.
Gusenbauer, M., and N. R. Haddaway. 2020. “Which academic search systems are suitable for systematic reviews or meta-analyses? Evaluating retrieval qualities of Google Scholar, PubMed, and 26 other resources.” Res. Synth. Methods 11 (2): 181–217. https://doi.org/10.1002/jrsm.1378.
Hasan, A., S. Ahn, B. Baroudi, and R. Rameezdeen. 2021. “Structuration model of construction management professionals’ use of mobile devices.” J. Manage. Eng. 37 (4): 04021026. https://doi.org/10.1061/(ASCE)ME.1943-5479.0000930.
Heister, S., and K. Yuthas. 2021. “How blockchain and ai enable personal data privacy and support cybersecurity.” In Advances in the convergence of blockchain and artificial intelligence, edited by T. M. P. Fernández-CaramésFraga-Lamas and P. Fraga-Lamas. London: IntechOpen.
Jacobs, E. 2018. “Job-site security risk management beyond gates, guards, and guns.” In North American Tunneling 2018 Proc. Englewood, CO: Society for Mining, Metallurgy, and Exploration.
Kaur, J., and K. R. Ramkumar. 2021. “The recent trends in cyber security: A review.” J. King Saud Univ. Comput. Inf. Sci. 34 (8): 5766–5781. https://doi.org/10.1016/j.jksuci.2021.01.018.
Kavanaugh, M. S., V. Stamatopoulos, D. Cohen, and L. Zhang. 2016. “Unacknowledged caregivers: A scoping review of research on caregiving youth in the United States.” Adolesc. Res. Rev. 1 (1): 29–49. https://doi.org/10.1007/s40894-015-0015-7.
Kirstein, P. T., and A. Ruiz-Zafra. 2018. “Use of templates and the handle for large-scale provision of security and IoT in the built environment.” In Living in the internet of things: Cybersecurity of the IoT-2018, 1–10. London: Institution of Engineering and Technology.
Knowles, W., D. Prince, D. Hutchison, J. F. P. Disso, and K. Jones. 2015. “A survey of cyber security management in industrial control systems.” Int. J. Crit. Infrastruct. Prot. 9 (Jun): 52–80. https://doi.org/10.1016/j.ijcip.2015.02.002.
Levac, D., H. Colquhoun, and K. K. O’Brien. 2010. “Scoping studies: Advancing the methodology.” Implementation Sci. 5 (1): 1–9. https://doi.org/10.1186/1748-5908-5-69.
Lezzi, M., M. Lazoi, and A. Corallo. 2018. “Cybersecurity for Industry 4.0 in the current literature: A reference framework.” Comput. Ind. 103 (Dec): 97–110. https://doi.org/10.1016/j.compind.2018.09.004.
Liao, H. J., C. H. R. Lin, Y. C. Lin, and K. Y. Tung. 2013. “Intrusion detection system: A comprehensive review.” J. Network Comput. Appl. 36 (1): 16–24. https://doi.org/10.1016/j.jnca.2012.09.004.
Lu, W., L. Wu, J. Xu, and J. Lou. 2022. “Construction E-inspection 2.0 in the COVID-19 pandemic era: A blockchain-based technical solution.” J. Manage. Eng. 38 (4): 04022032. https://doi.org/10.1061/(ASCE)ME.1943-5479.0001063.
Maalem Lahcen, R. A., B. Caulkins, R. Mohapatra, and M. Kumar. 2020. “Review and insight on the behavioral aspects of cybersecurity.” Cybersecurity 3 (1): 1–18. https://doi.org/10.1186/s42400-020-00050-w.
Mahamadu, A. M., L. Mahdjoubi, and C. Booth. 2013. “Challenges to BIM-cloud integration: Implication of security issues on secure collaboration.” In Vol. 2 of Proc., 2013 IEEE 5th Int. Conf. on Cloud Computing Technology and Science, 209–214. New York: IEEE.
Mantha, B., B. G. de Soto, and R. Karri. 2021. “Cyber security threat modeling in the AEC industry: An example for the commissioning of the built environment.” Sustainable Cities Soc. 66 (Mar): 102682. https://doi.org/10.1016/j.scs.2020.102682.
Mantha, B. R., and B. G. de Soto. 2019. “Cyber security challenges and vulnerability assessment in the construction industry.” In Proc., Creative Construction Conf. 2019, 29–37. Budapest, Hungary: Budapest Univ. of Technology and Economics.
Mantha, B. R., and B. G. de Soto. 2020. “Assessment of the cybersecurity vulnerability of construction networks.” Eng. Constr. Archit. Manage. 28 (10): 3078–3105. https://doi.org/10.1108/ECAM-06-2020-0400.
Mantha, B. R., and B. G. de Soto. 2021. “Cybersecurity in construction: Where do we stand and how do we get better prepared.” Front. Built Environ. 7 (Aug): 612668. https://doi.org/10.3389/fbuil.2021.612668.
Menezes, A. J., P. C. Van Oorschot, and S. A. Vanstone. 2018. Handbook of applied cryptography. Boca Raton, FL: CRC Press.
Mishra, P., V. Varadharajan, U. Tupakula, and E. S. Pilli. 2018. “A detailed investigation and analysis of using machine learning techniques for intrusion detection.” IEEE Commun. Surv. Tutorials 21 (1): 686–728. https://doi.org/10.1109/COMST.2018.2847722.
Mohammed, I. A. 2013. “Intelligent authentication for identity and access management: A review paper.” Int. J. Manage. IT Eng. 3 (1): 696–705.
Munn, Z., M. D. Peters, C. Stern, C. Tufanaru, A. McArthur, and E. Aromataris. 2018. “Systematic review or scoping review? Guidance for authors when choosing between a systematic or scoping review approach.” BMC Med. Res. Methodol. 18 (1): 1–7. https://doi.org/10.3390/buildings9060149.
Mutis, I., and A. Paramashivam. 2019. “Cybersecurity management framework for a cloud-based BIM model.” In Advances in informatics and computing in civil and construction engineering, 325–333. Cham, Switzerland: Springer.
Nawari, N. O., and S. Ravindran. 2019a. “Blockchain and building information modeling (BIM): Review and applications in post-disaster recovery.” Buildings 9 (6): 149. https://doi.org/10.3390/buildings9060149.
Nawari, N. O., and S. Ravindran. 2019b. “Blockchain and the built environment: Potentials and limitations.” J. Build. Eng. 25 (Sep): 100832. https://doi.org/10.1016/j.jobe.2019.100832.
Oesterreich, T. D., and F. Teuteberg. 2016. “Understanding the implications of digitisation and automation in the context of Industry 4.0: A triangulation approach and elements of a research agenda for the construction industry.” Comput. Ind. 83 (Dec): 121–139. https://doi.org/10.1016/j.compind.2016.09.006.
Pan, Z., S. Hariri, and J. Pacheco. 2019. “Context aware intrusion detection for building automation systems.” Comput. Secur. 85 (Aug): 181–201. https://doi.org/10.1016/j.cose.2019.04.011.
Parn, E. A., and B. G. de Soto. 2020. “Cyber threats and actors confronting the Construction 4.0.” In Construction 4.0, 441–459. London: Routledge.
Parn, E. A., and D. Edwards. 2019. “Cyber threats confronting the digital built environment: Common data environment vulnerabilities and block chain deterrence.” Eng. Constr. Archit. Manage. 26 (2): 245–266. https://doi.org/10.1108/ECAM-03-2018-0101.
Patel, T., and V. Patel. 2020. “Data privacy in construction industry by privacy-preserving data mining (PPDM) approach.” Asian J. Civ. Eng. 21 (3): 505–515. https://doi.org/10.1007/s42107-020-00225-3.
Pranckutė, R. 2021. “Web of science (WoS) and Scopus: The titans of bibliographic information in today’s academic world.” Publications 9 (1): 12. https://doi.org/10.3390/publications9010012.
Qin, B., J. Huang, Q. Wang, X. Luo, B. Liang, and W. Shi. 2020. “Cecoin: A decentralized PKI mitigating MitM attacks.” Future Gener. Comput. Syst. 107 (Jun): 805–815. https://doi.org/10.1016/j.future.2017.08.025.
Raoufi, M., and A. R. Fayek. 2022. “New modes of operating for construction organizations during the COVID-19 pandemic: Challenges, actions, and future best practices.” J. Manage. Eng. 38 (2): 04021091. https://doi.org/10.1061/(ASCE)ME.1943-5479.0001009.
Reuters. 2013. “Australian spy HQ plans stolen by Chinese hackers: Report.” Accessed August 1, 2022. https://www.reuters.com/article/us-australia-hacking/australian-spy-hq-plans-stolen-by-chinese-hackers-report-idUSBRE94R02A20130528.
Richey, E., and T. Sawyer. 2015. “Know your enemy: Construction industry needs better information about cyber crime risk.” Accessed January 20, 2022. https://www.enr.com/articles/9023-know-your-enemy-construction-industry-needs-better-information-about-cyber-crime-risk.
Ruhlandt, R. W. S., R. Levitt, R. Jain, and D. Hall. 2020. “Drivers of data and analytics utilization within (smart) cities: A multimethod approach.” J. Manage. Eng. 36 (2): 04019050. https://doi.org/10.1061/(ASCE)ME.1943-5479.0000762.
Safa, M., S. Baeza, and K. Weeks. 2019. “Incorporating Blockchain technology in construction management.” Strategic Direction 35 (10): 1–3. https://doi.org/10.1108/SD-03-2019-0062.
Safety Detective. 2021. “Ransomware facts, trends & statistics for 2021.” Accessed January 20, 2022. https://www.safetydetectives.com/blog/ransomware-statistics.
Samonas, S., and D. Coss. 2014. “The CIA strikes back: Redefining confidentiality, integrity and availability in security.” J. Inf. Syst. Secur. 10 (3): 21–45.
Sawyer, T. 2015. “Vendors serving construction comment on cyber security concerns today.” Accessed January 20, 2022. https://www.enr.com/articles/9027-vendors-serving-construction-comment-on-cyber-security-concerns-today.
Scarfone, K., and P. Mell. 2007. “Guide to intrusion detection and prevention systems (idps).” NIST Spec. Publ. 800 (Feb): 94.
Sheikh, A., V. Kamuni, A. Patil, S. Wagh, and N. Singh. 2019. “Cyber attack and fault identification of HVAC system in building management systems.” In Proc., 2019 9th Int. Conf. on Power and Energy Systems (ICPES), 1–6. New York: IEEE.
Sheikh, N., M. Pawar, and V. Lawrence. 2021. “Zero trust using network micro segmentation.” In Proc., IEEE Infocom 2021-IEEE Conf. on Computer Communications Workshops (INFOCOM WKSHPS), 1–6. New York: IEEE.
Shemov, G., B. G. de Soto, and H. Alkhzaimi. 2020. “Blockchain applied to the construction supply chain: A case study with threat model.” Front. Eng. Manage. 7 (4): 564–577. https://doi.org/10.1007/s42524-020-0129-x.
Shi, M., A. Hoffmann, A. Wagner, T. Huyeng, C. D. Thiele, and U. Rüppel. 2020. “Using blockchain technology to implement peer-to-peer network in construction industry.” In Proc., Int. Conf. on Computing in Civil and Building Engineering, 839–849. Cham, Switzerland: Springer.
Shu, X., K. Tian, A. Ciambrone, and D. Yao. 2017. “Breaking the target: An analysis of target data breach and lessons learned.” Preprint, submitted July 5, 2022. https://arxiv.org/1701.04940.
Sinenko, S. A., and I. N. Doroshin. 2020. “Use of modern means and methods in the organization and management in construction.” IOP Conf. Ser. Mater. Sci. Eng. 753 (4): 042017. https://doi.org/10.1088/1757-899X/753/4/042017.
Skandhakumar, N., J. Reid, F. Salim, and E. Dawson. 2018. “A policy model for access control using building information models.” Int. J. Crit. Infrastruct. Prot. 23 (Jul): 1–10. https://doi.org/10.1016/j.ijcip.2018.08.005.
Skandhakumar, N., F. Salim, J. Reid, R. Drogemuller, and E. Dawson. 2016. “Graph theory based representation of building information models for access control applications.” Autom. Constr. 68 (Aug): 44–51. https://doi.org/10.1016/j.autcon.2016.04.001.
Sonkor, M. S. 2020. “Collaborative BIM environments: Mitigating cybersecurity threats in the design phase.” Master’s thesis, Dept. of Civil Engineering, Univ. of Ljubljana.
Sonkor, M. S., and B. G. de Soto. 2021. “Operational technology on construction sites: A review from the cybersecurity perspective.” J. Constr. Eng. Manage. 147 (12): 04021172. https://doi.org/10.1061/(ASCE)CO.1943-7862.0002193.
Stine, K. M., K. Quill, and G. A. Witte. 2014. Framework for improving critical infrastructure cybersecurity. Gaithersburg, MD: NIST.
Tao, X., M. Das, Y. Liu, and J. C. Cheng. 2021. “Distributed common data environment using blockchain and interplanetary file system for secure bim-based collaborative design.” Autom. Constr. 130 (Jun): 103851. https://doi.org/10.1016/j.autcon.2021.103851.
Taylor, P. J., T. Dargahi, A. Dehghantanha, R. M. Parizi, and K. K. R. Choo. 2020. “A systematic literature review of Blockchain cyber security.” Digital Commun. Networks 6 (2): 147–156. https://doi.org/10.1016/j.dcan.2019.01.005.
Techopedia. 2022. “Air gap.” Accessed August 1, 2022. https://www.techopedia.com/definition/17037/air-gap.
Thompson, E. C. 2018. Cybersecurity incident response: How to contain, eradicate, and recover from incidents. New York: Apress.
Tricco, A. C., et al. 2018. “PRISMA extension for scoping reviews (PRISMA-ScR): Checklist and explanation.” Ann. Internal Med. 169 (7): 467–473. https://doi.org/10.7326/M18-0850.
Turk, Ž., B. G. de Soto, B. R. Mantha, A. Maciel, and A. Georgescu. 2022. “A systemic framework for addressing cybersecurity in construction.” Autom. Constr. 133 (Jan): 103988. https://doi.org/10.1016/j.autcon.2021.103988.
von Solms, B., and R. von Solms. 2018. Cybersecurity and information security–what goes where?. Bingley, UK: Emerald.
Werbach, K. 2018. The Blockchain and the new architecture of trust. Cambridge, MA: MIT Press.
Wu, L., et al. 2022. “Using Blockchain to improve information sharing accuracy in the onsite assembly of modular construction.” J. Manage. Eng. 38 (3): 04022014. https://doi.org/10.1061/(ASCE)ME.1943-5479.0001029.
Xia, F., and J. Hu. 2020. “Application of virtual firewall in computer network security.” In Proc., 2020 IEEE Conf. on Telecommunications, Optics and Computer Science (TOCS), 42–48. New York: IEEE.

Information & Authors

Information

Published In

Go to Journal of Management in Engineering
Journal of Management in Engineering
Volume 39Issue 2March 2023

History

Published online: Nov 26, 2022
Published in print: Mar 1, 2023
Discussion open until: Apr 26, 2023

Permissions

Request permissions for this article.

ASCE Technical Topics:

Authors

Affiliations

Graduate Student, Dept. of Civil, Environmental, and Ocean Engineering, Stevens Institute of Technology, Hoboken, NJ 07030. ORCID: https://orcid.org/0000-0002-7295-5813. Email: [email protected]
Assistant Professor, Dept. of Civil, Environmental, and Ocean Engineering, Stevens Institute of Technology, Hoboken, NJ 07030 (corresponding author). ORCID: https://orcid.org/0000-0001-6576-3808. Email: [email protected]

Metrics & Citations

Metrics

Citations

Download citation

If you have the appropriate software installed, you can download article citation data to the citation manager of your choice. Simply select your manager software from the list below and click Download.

Cited by

  • Blockchain Orchestration and Transformation for Construction, Smart Cities, 10.3390/smartcities6010031, 6, 1, (652-675), (2023).

View Options

Get Access

Access content

Please select your options to get access

Log in/Register Log in via your institution (Shibboleth)
ASCE Members: Please log in to see member pricing

Purchase

Save for later Information on ASCE Library Cards
ASCE Library Cards let you download journal articles, proceedings papers, and available book chapters across the entire ASCE Library platform. ASCE Library Cards remain active for 24 months or until all downloads are used. Note: This content will be debited as one download at time of checkout.

Terms of Use: ASCE Library Cards are for individual, personal use only. Reselling, republishing, or forwarding the materials to libraries or reading rooms is prohibited.
ASCE Library Card (5 downloads)
$105.00
Add to cart
ASCE Library Card (20 downloads)
$280.00
Add to cart
Buy Single Article
$35.00
Add to cart

Get Access

Access content

Please select your options to get access

Log in/Register Log in via your institution (Shibboleth)
ASCE Members: Please log in to see member pricing

Purchase

Save for later Information on ASCE Library Cards
ASCE Library Cards let you download journal articles, proceedings papers, and available book chapters across the entire ASCE Library platform. ASCE Library Cards remain active for 24 months or until all downloads are used. Note: This content will be debited as one download at time of checkout.

Terms of Use: ASCE Library Cards are for individual, personal use only. Reselling, republishing, or forwarding the materials to libraries or reading rooms is prohibited.
ASCE Library Card (5 downloads)
$105.00
Add to cart
ASCE Library Card (20 downloads)
$280.00
Add to cart
Buy Single Article
$35.00
Add to cart

Media

Figures

Other

Tables

Share

Share

Copy the content Link

Share with email

Email a colleague

Share