Open access peer-reviewed chapter - ONLINE FIRST

Integrating MLSecOps in the Biotechnology Industry 5.0

Written By

Naseela Pervez and Alexander J. Titus

Reviewed: 09 April 2024 Published: 10 May 2024

DOI: 10.5772/intechopen.114972

The Role of Cybersecurity in the Industry 5.0 Era IntechOpen
The Role of Cybersecurity in the Industry 5.0 Era Edited by Christos Kalloniatis

From the Edited Volume

The Role of Cybersecurity in the Industry 5.0 Era [Working Title]

Associate Prof. Christos Kalloniatis

Chapter metrics overview

25 Chapter Downloads

View Full Metrics

Abstract

Biotechnology Industry 5.0 is advancing with the integration of cutting-edge technologies such as Machine Learning (ML), the Internet of Things (IoT), and cloud computing. It is no surprise that an industry that utilizes data from customers and can alter their lives is a target of a variety of attacks. This chapter provides a perspective on how Machine Learning Security Operations (MLSecOps) can help secure the biotechnology Industry 5.0. The chapter provides an analysis of the threats in the biotechnology Industry 5.0 and how ML algorithms can help secure with industry best practices. This chapter explores the scope of MLSecOps in the biotechnology Industry 5.0, highlighting how crucial it is to comply with current regulatory frameworks. With biotechnology Industry 5.0 developing innovative solutions in healthcare, supply chain management, biomanufacturing, pharmaceutical sectors, and more, the chapter also discusses the MLSecOps best practices that industry and enterprises should follow while also considering ethical responsibilities. Overall, the chapter provides a discussion of how to integrate MLSecOps into the design, deployment, and regulation of the processes in the biotechnology Industry 5.0.

Keywords

  • artificial intelligence
  • machine learning
  • internet of things
  • security operations
  • biotechnology

1. Introduction

Industry 5.0 has revolutionized the way humans interact with various industrial sectors [1], from human-machine collaboration to creating more human-centric experiences. With a growing emphasis on sustainability, ethical responsibilities, and involvement of social sciences in industry [2], there has been a growing awareness of big data, manufacturing, Internet of Things (IoT), digitalization, and production sectors. Industry 5.0 has witnessed the launch of humanistic technologies and products like human-approved high automation self-driven cars that leverage artificial intelligence (AI), which have been rolled out in various cities [3], IoT-based contact-less shopping experiences that seemed like need of the hour during the pandemic [4], and remote healthcare systems [5].

The biotechnology sector is as relevant to Industry 5.0 as microprocessors are to computers. With every industrial revolution, the biomanufacturing sector has undergone constructive development. Industry 5.0 is expected to revolutionize the adaptation of robotic automation in manufacturing industries to provide a more humanistic experience while achieving high yields on production [6]. As the biotechnology industry supports critical sectors such as food, agriculture, healthcare, pharmaceuticals, and energy, companies must stay current with industry standards. Maintaining integrity, security, proper regulations, and ethical policies remain paramount to ensure responsible development and use of biotechnologies across industries [7]. Massive amounts of data in various biotechnology sectors (e.g., bioengineering, biodefense, forensics) have resulted in the deployment of technological solutions—big data, IoT, and AI in biotechnology. AI in biotechnology ranges from the use of machine learning (ML) models for predictive analytics [8] to employing generative AI techniques for accelerating discoveries with high computational power [9]. AI, combined with IoT and big data, has resulted in an increasing presence of biotechnology data in cyberspace. To protect the data, we need to ensure that the AI models employed are secured.

Cloud technologies, which are centralizing data, have increased the threat of attacks [10]. There have been surveys and studies that have discussed the vulnerabilities of traditional cybersecurity practices [11, 12], and ML techniques have been created to enable more secure cyberspace. These tools are being developed to combat the growing threats to previously established cybersecurity techniques. Industry 5.0 has introduced state-of-the-art (SOTA) human-centric industry standards such as employing robotic automation in manufacturing and production sectors, using IoT and AI-enabled healthcare systems, and employing generative AI in research and development. This has led to the need for developing better security measures, including malware detection, network security, and intrusion detection; all crucial for the current industrial revolution. Machine Learning Security Operations (MLSecOps) integrates ML techniques to combat threats in the technology and digital space and highlights the cybersecurity vulnerabilities of deployed ML models. It is a promising approach to enhance cybersecurity [13] and promote a more secure, less vulnerable cyberspace for various industrial sectors. Machine learning has a proven ability to forecast future risks and threats, recognize threat patterns, and detect anomalies [14]. These capabilities have led to the development of several ML-based cybersecurity pipelines [15, 16] in various industrial sectors.

The presence of biotechnology data in cyberspace and the digitization of labs and biomanufacturing equipment has increased the industry’s threat of attacks. The biotechnology sector must protect itself from cyber threats and cyberattacks while also adopting the revolutionized approaches of Industry 5.0. Adopting MLSecOps to develop modern and effective cybersecurity measures to make the biotechnology industry less vulnerable and less prone to attacks will pave the way for digitalized biotechnology sectors (e.g., bioengineering, biosynthesis, biomanufacturing). In this chapter, we aim to provide an overview of existing vulnerabilities in the biotechnology Industry 5.0, integrating MLSecOps to secure the biotechnology Industry 5.0, and enabling decision-makers to understand how ML techniques can be employed to secure the threat ecosystem of the biotechnology Industry 5.0, and how cybersecurity best practices can protect the rapidly expanding number of ML tools in production. Our focus is to provide an analysis and discussion of MLSecOps in the biotechnology Industry 5.0.

Advertisement

2. Understanding the biotechnology industry 5.0

Biotechnology Industry 5.0 aims to employ advanced AI techniques to create more personalized products. Involving humans more in industrial processes while harnessing the power of advanced technology enables the industry to benefit from the best of human intelligence as well as advanced computation. Digitalization was introduced in industries during the third industrial revolution in the 1950s. This era was a catalyst for the biotechnology industry with the discovery of recombinant DNA which resulted in the development and production of new proteins, antibiotics, and modern-day synthetic biology [17]. This was a significant step for the drug discovery sector in particular. The biotechnology industry has continued to digitize ever since. The commercialization of the first biotechnology drug, human insulin, which was developed using genetically engineered bacteria [18] transformed the biotechnology industry from a niche industry into an economic engine. The intersection of biotechnology with modern technological discoveries such as IoT, AI, and automation, and biotech sectors, such as synthetic biology, genomics, and bioinformatics, have accelerated research and development, manufacturing, and production industries across major economic sectors. With the biotechnology Industry 5.0, there is the potential for customization and personalization of biotechnology products and services (i.e., personalized medicine) powered by AI/ML, robotics, and IoT. This will not only improve the quality of human life in various aspects, but it will also have a major impact on corporate growth.

The role of emerging technology in the biotechnology industry is an area of interest for the decision-makers of numerous sectors [19] and governments. In this section, we will highlight the key technologies and their impact on the biotechnology industry. We have briefly mentioned in Section 1 the amount of data present in the biotechnology industry and how that has promoted the integration of the latest computational tools into the industry. Every sector of the biotechnology industry has an increasingly large amount of data that is used to draw meaningful insights, or that provides crucial insights for decision-making. These data need to be stored and accessed by multiple organizations, either working on similar products or independent of each other. One of the advancements of Industry 4.0 was the centralization of data using cloud computing technologies. Cloud computing has enabled industries not only to store huge amounts of data cost-effectively, but the data can also be accessed remotely by people in an organization. With the development of cloud technologies, data, such as genomics, biomarkers, and clinical data, could be stored easily at low storage and maintenance costs [20]. Data are considered a valuable asset to an organization, and companies have been collecting data for decades. With the higher computational power provided by cloud computing to study and analyze the data, the data are worth billions of dollars in today’s world [21]. The data in the biotechnology industry has been used for a plethora of sectors, such as genetic engineering, personalized medications, regulatory compliance, sustainability, and identifying patterns in genomic data, among others.

Artificial Intelligence (AI) is used to develop computer systems that can process and recognize patterns in data, draw statistical inferences, and interact with the physical world through mechanisms such as IoT devices [22]. In biotechnology, AI is being employed to support decision-making in the development of smart and intelligent systems. Machine Learning (ML) is a sub-discipline of AI that employs statistical methods for drawing inferences from data. ML models have been used to detect COVID-19 virus from MRIs [23], optimize manufacturing processes [24], analyze crop growth patterns in agriculture [25], and gain insights from gene data [26, 27]. Robotic automation of biotech labs has resulted in a reduction in human errors, improving safety, enabling faster clinical translations, and increasing the rates of experimentation [28]. ML and deep learning (DL) techniques have furthered the development of biotech industries since Industry 4.0. Recent developments in AI, such as generative AI, explainable AI, and large language and vision models (LLMs) have opened up applications of AI/ML in the biotechnology industry.

Environmental factors play a crucial role in the biotechnology sector. For example, precipitation and sunlight play a significant role in the agriculture sector in determining crop yield and temperature is a major factor for drug production. Keeping these environmental factors under control requires human intervention. Internet of Things (IoT) was introduced in the biotech industry to reduce human labor and to control environmental factors. There is a study that has proposed an end-to-end web application-based framework that integrates embedded Arduino systems with Abiotic sensors to monitor, measure, and analyze environmental factors such as temperature, humidity, luminance, audio/noise, and CO levels, and precision manufacturing is a rapidly growing market [29].

Additionally, IoT devices are integrated into healthcare systems for medical devices and remote patient monitoring [30], which has promoted patient care from the comfort of their homes. One of the recent breakthrough developments in IoT devices is the wearable device. Wearable technology and digitalization of healthcare systems can promote patient engagement and involvement in their healthcare plan [31], and these devices are used for daily monitoring of physical factors such as heartbeat, oxygen levels, and human activity.

Industrially, the use of IoT devices in various sectors of the biotechnology industry has enabled the expansion of biomanufacturing capacity, giving a boost to the bioeconomy [32].

This section has briefly described the effect various technologies have on various biotechnology industries. The biotechnology Industry 5.0 focuses on developing a more humanistic approach to utilizing these technologies. IoT devices in combination with AI can unlock powerful capabilities, such as personalization, automation, context awareness, enhanced forecasting, and predictive maintenance. Data being at the center of all this creates targets and vulnerabilities in the biotechnology Industry 5.0. The subsequent sections will discuss the threat landscapes, safety regulations, and enabling AI/ML techniques to ensure a secure biotechnology framework.

Advertisement

3. The role of MLSecOps in the biotechnology industry 5.0

The biotechnology Industry 5.0 combines digital technology with biotechnology. Industry 5.0 has made breakthrough solutions to complex solutions—automatic therapeutic systems [33], antiaging research [34], cancer treatment research [35], and lab-grown organs [36], among the most impactful ones. These complex experiments have led to data being at the center of the biotechnology research and development sector [37]. There is a persistent tension in biotechnology—threat and safety. Like any other industry, ML algorithms are being applied to develop efficient solutions. Section 2 provides an overview of how ML has been used to architect various design solutions to biotechnology problems. Section 4 will dive into threats in the biotechnology industry. It will explain where security breaches can occur and how they affect the implementation of digital technology in the biotechnology sector. This section is a discussion on the role of ML in security operations in the biotechnology Industry 5.0. This section provides two distinct views:

  1. Employing ML techniques to secure and protect the biotechnology industry against cyber threats.

  2. Securing the machine learning models against attacks employing cyber principles.

Machine learning (ML) has been employed to enhance the performance of various traditional technologies. Autonomous vehicles are a great example of this. Although ML algorithms play a major role in product development, they have promising applications in other sectors like deployment and security.

Genome data have been growing at an unprecedented pace [38] and are used in various industries—forensic investigations, healthcare, and biotechnology being primary users. Preserving genome data are crucial and one of the most important tasks currently at hand in the biotechnology Industry 5.0. The current legal frameworks aim to protect genome data from malicious attacks, but the data are still the target of existing threats [39]. Encrypting genome data while sharing and accessing it provides some protection against attacks, but encryption algorithms are prone to being attacked themselves by hackers to gain access to data [40, 41]. Genome data, if hacked can be manipulated and used for harmful activities. ResNetAct is a deep learning model based on the pre-trained ResNet model that has been fine-tuned to encrypt genome data [42]. AI/ML algorithms have also been successful in detecting threats and ransomware detection [43]. AI/ML algorithms have shown promising performance on the classification task of the ransomware samples [44], and deep learning architectures have been employed to detect Trojan attacks on encrypted DNA data. The supply chain is also a crucial sector of the biotechnology Industry 5.0 and directly affects every aspect of the bioeconomy [45], from transportation to industrial machinery in labs. It even extends to automating fault detection and building resilient fault detection systems that keep highly sensitive research and manufacturing equipment safe.

ML techniques have been integrated into fault detection pipelines in automobile supply chain frameworks. Statistical ML algorithms, such as linear discriminant analysis and Naive Bayes algorithm, have shown promising results in classifying the condition of electric drive trains in the supply chain [46]. ML algorithms are also employed for monitoring and assessing bioprocesses in the biotechnology Industry 5.0. [47]. Biotechnology Industry 5.0 has a network of software in various sectors [48] and everything from running experiments to carrying out visualizations and maintaining lab inventory all have different software today. These software are prone to attacks and have vulnerabilities in code that make them less secure. Large language models (LLMs) have showcased promising results in identifying vulnerabilities in code [49], which can be employed in securing the software architecture.

Healthcare and pharmaceuticals are major contributors to the bioeconomy. The application of ML to diagnostic procedures has been booming. However, developing these solutions while keeping data privacy and protection in mind is crucial. Federated machine learning algorithms have been used for developing secure medical imaging diagnostic solutions [50]. The bioinformatics sector of the biotechnology Industry 5.0 is also vulnerable to attacks, and biometric recognition systems are particularly impactful if breached, as these systems rely heavily on AI/ML algorithms. The biotechnology Industry 5.0 is emerging in developing robust authentication systems by training advanced ML models on real-time data (e.g., developing an object recognition system on real-time humans rather than images of humans which might classify a human sticker on a road as a pedestrian [51]) as well as using ML for continuous authentication of mobile devices based on behavioral biometrics [52].

Throughout the chapter, there have been examples showcasing the use of ML in combination with IoT devices in the biotechnology Industry 5.0. These models are used for an array of solutions in the biotechnology industry, including predictive analysis for crop yield [53], classification of genome data [54], enhanced manufacturing of biotechnology products [55], management of biotechnology labs [56], and more. Like other components of Industry 5.0, the ML models are also vulnerable. ML models are like intellectual property. If one gets access to data for gene therapies, emulating results or altering the therapy is a concern for genetic research and development [57], and there have been studies carried out to identify the vast threat landscape in ML models [58]. MLSecOps in the biotechnology Industry 5.0 not only uses ML techniques for security operations but also protects the AI and ML models that are used to design solutions or products. ML models, particularly modern AI applications, require huge computational power for training. Most of the training of these huge models is done on outsourced cloud platforms, and they are increasingly being subjected to malicious training [59] which can lead to drift in the expected results. The above-mentioned paper has carried out two experiments: 1. handwritten digits and 2. street sign detector, which reflect that the model performs well on user data but badly on some inputs that might be attacker-chosen chosen, for example, a situation where red light can be classified as green. One of the breakthroughs in Industry 5.0 has been the use of language models in all sectors. The large language models (LLMs) are used for automating production, customer service, as well as automating instruction manuals in manufacturing industries. However, these models are prone to attacks. Data theft is one of the major concerns and is one of the reasons for skepticism to applying ML models in the biotechnology Industry 5.0 [60].

Frameworks have been developed to identify and mitigate backdoor triggers in language models. One of the ways through which the model training can be protected against malicious training samples is to train a second model to recognize if the triggers are classified as safe targets [61]. Preventing corrupted samples from training subsets has shown impressive results in securing the language models and building the confidence to employ these secure language models in production lines of supply chain framework for various industries. Bias in machine learning models is also an active research area. These biases can be reflected in the results produced by ML systems. Integration of ML techniques in the healthcare industry has reflected biases in the electronic health records of patients [62]. Identifying and reducing these biases is crucial to make the ML systems trustworthy in biotechnology Industry 5.0. There have been solutions developed to tackle the problem of model bias in the healthcare sector of biotechnology Industry 5.0, where focusing on data handling for ML systems has been shown to reduce these biases in radiology data [63]. Another approach to identifying the biases and risks of ML models is to perform behavioral analysis of the model on outlier data points and keep track of the model performance for any abnormalities [64]. Analyzing model metrics and behaviors over time enables users to understand if there are any biases or alterations in models that affect the model performances (e.g., if a classifier’s accuracy decreases over time or classifies input wrong, it indicates that the model has been altered). Monitoring frameworks in biotechnology Industry 5.0 have huge applications and requirements to catch any abnormal ML model behaviors early on.

In this section, we have discussed the role of MLSecOps and its application in the biotechnology Industry 5.0. We have provided an overview of how ML systems can be used to protect biotechnology Industry 5.0 frameworks. This section also emphasizes the importance of securing the ML frameworks and infrastructures employed in biotechnology Industry 5.0. The remainder of the chapter focuses on identifying the threats in the biotechnology Industry 5.0 and discussing regulations and ethical responsibilities that should be fulfilled while designing infrastructure and solutions for various sectors in the biotechnology Industry 5.0.

Advertisement

4. Threat landscape in biotechnology industry 5.0

Biotechnology Industry 5.0 can lead to progressive research as well as product development in the biotech sectors. This is crucial for the bioeconomy. We have discussed the biotechnology sectors and the effect of the fifth industrial revolution on the biotechnology industry in Section 2. Although employing combinations of modern technologies such as advanced IoT devices and ML models that can outperform human expertise has resulted in smart industries [65]; it has also exposed biotechnology data to threats. Section 2 has also introduced cloud technologies in the biotechnology Industry 5.0. The presence of huge amounts of data on these centralized systems and the growing reliance on production ML models have increased the vulnerability to cyberattacks. This section covers the biotechnology industry’s cyber threats as well as sophisticated cyberattacks. We will provide references to case studies that are crucial in the cybersecurity space in biotechnology Industry 5.0. Recognizing threats specific to biotechnology Industry 5.0 will help stakeholders make informed decisions on securing the industry and introducing security measures in biotech sectors.

4.1 Cyber threats specific to biotech: identifying unique vulnerabilities

There is variability in the data in biotechnology Industry 5.0, which requires unique and specific attention to these vulnerabilities. Digital DNA has wide applications in retail, healthcare, and forensic departments [66]. Encoding DNA efficiently into digital form opens the horizons to employing AI/ML algorithms on this data for various downstream tasks (DNA sequencing, DNA genotyping, and DNA matching) [67, 68]. Sensors and IoT devices have become a part of our livelihoods. Homes have light sensors for energy conservation [69], cars have motion sensors to detect real-time vehicle motion [70], which can be employed in self-driving cars, and thermal and humidity sensors have been used to check for overheating in buildings [71]. Similarly, the use of IoT devices in various biotechnology sectors such as agriculture, healthcare industries, and biomanufacturing can create end-to-end cost-effective, and high-efficiency systems. Wireless body area network—a network of IoT devices or sensors as wearable devices as well as implants, has revolutionized remote healthcare, making patient real-time monitoring systems proactive [72]. This can have promising results in developing healthcare systems for patients, such as those with dementia, which maintain a balance between the risks of symptoms like wandering while also assuring autonomy to the patients [73]. In addition to healthcare systems, there have been studies and reports in the agriculture and food domain carried out for multiple use cases [74]. The data from these implants and IoT devices are used to create dashboards for tracking and management purposes, ML architectures for drawing out various inferences, or stored in the cloud to be accessed by stakeholders. This makes the data from IoT devices vulnerable and also poses a risk of breaching the privacy of the stakeholders involved. Biometrics, such as fingerprints and facial recognition systems, are used in defense and law enforcement industries as well as other industries and unauthorized access to biometric data can aid bad actors, such as terrorist organizations, and create a risk to an entire nation [75]. Securing biometric data, such as facial features, iris patterns, and speech data, is of national interest and there have been attempts to secure this data [76]. Digital ID cards like driver’s licenses as well as state IDs have made storing and producing these cards an easy task. Banking services have automated their identification system using AI-enabled technologies. This means an AI model will access your driver’s license to check for authenticity. ID verification using AI has been viewed as a hazard to human privacy. A biometric data breach can lead to identity theft, deepfakes, and possible criminal activities. Biotechnology Industry 5.0 has to ensure that the data in various sectors of the industry is secure and protected against malicious attacks.

4.2 Advanced persistent threats (APTs) and biohacking: addressing sophisticated cyberattacks

The COVID-19 pandemic witnessed the need for protecting the biotechnology Industry 5.0. Pandemics and epidemics pose a risk to a broad swath of society. Advanced Persistent Threats (APTs) can be described as malicious activities that are hard to uncover and remain undetected. In the biotechnology industry, one example of APTs is illegally manufacturing and selling some variants of approved drugs [77]. The under-the-radar behavior of APTs allows them to remain undetected for longer amounts of time. In the past, there have been reports of APTs attacking various sectors of the biotechnology industry. Biotechnology Industry 5.0 being more than ever present in cyberspace makes it prone to APTs. Currently, various APTs have been reported to be active. One of them is APT41, suspected to have originated in China and targets biotechnology sectors such as the pharmaceutical industry for financial gains [78]. The healthcare industry has always been a threatened sector of the biotechnology industry. Case studies have been carried out that showcase recent developments to make the threats more evasive by Wekby (also known as APT18)—a famous APT in the healthcare sector [79].

In this section, we have provided a picture of the biotechnology Industry 5.0 data that could be under attack and needs to be secured and protected. We have also given a brief on the progression of APTs and biohacking in the biotechnology Industry 5.0. Now that we have a deeper understanding of the biotechnology-specific threat landscape, we can focus on how developing and adopting practices that avoid these landscapes. The rest of the chapter will focus on how MLSecOps can be integrated into biotechnology Industry 5.0 to enhance privacy and security. We aim to discuss how MLSecOps can be employed for cybersecurity while ensuring that we maintain regulatory adherence and consider social and ethical responsibility.

Advertisement

5. Regulatory frameworks and compliance

The biotechnology Industry 5.0 has millions of consumers throughout the world. It has an approximate value of $2.9 trillion impact on the US economy and provides 2.1 million jobs in the United States [80]. The biotechnology sectors include agriculture, healthcare, pharmaceuticals, energy, and many sectors that have a direct impact on consumers. The products of the biotechnology industry must meet standards of quality, privacy, and security [81]. Regulatory frameworks are established to standardize and streamline production and manufacturing processes and prevent any security or privacy breaches. In the previous sections, we discussed how ML and AI are integrated into the security operations of the biotechnology Industry 5.0. We have discussed the current threats to the biotechnology Industry 5.0 in Section 4. Throughout the chapter, we have discussed how IoT in combination with ML and AI can help personalize the biotechnology Industry 5.0. However, enterprises are apprehensive about rolling out AI-based products to the public [82]. These products must achieve complete compliance with regulations. In this section, we provide an overview of the current regulatory frameworks, challenges in compliance frameworks, and standardization of regulatory and compliance frameworks globally, keeping biotechnology Industry 5.0 as a focus point.

5.1 Current regulatory landscape: overview of existing cybersecurity and biotech regulations

Artificial intelligence integration and the growing digitization in the biotechnology Industry 5.0 have made the industry vulnerable to cyberattacks. To ensure the safety of the industry as well as to ensure that consumers’ privacy stays intact, the biotechnology Industry 5.0 has to comply with two major groups of regulations: biotechnology regulations and cybersecurity regulations. Here, we discuss what regulations fall under these that the biotechnology Industry 5.0 has to comply with. Biotechnology regulatory frameworks include the sectors of the food industry, drug production, and energy industry. The National Academies of Sciences Engineering and Medicine [83] has provided an overview of existing regulations in these sectors. The food and drug industries are very large consumer markets. They directly affect children, adults, and seniors equally. In the past, there have been mishaps related to the food industry. In 2015, there was a multistate outbreak of high-risk infection Listeriosis in the United States that was directly linked to Blue Bell Creameries products [84]. There have been reports of 23 deaths among patients who are using a non-approved anti-gout drug [85]. Developing and adapting the regulatory frameworks in the food and drug industry is crucial. The Food and Drug Administration (FDA) is a prominent regulatory body of the food and drug industry in biotechnology [86]. FDA regulates and approves products such as food, drugs, medical devices, vaccines, cosmetics, and tobacco. Biotechnology Industry 5.0 will see a boom in technologically advanced products, especially medical devices. For these devices to be approved for public use, they must comply with FDA regulations. FDA also regulates gene therapies which are crucial to the biotechnology Industry 5.0.

While building products that comply with regulatory frameworks is essential, there are also regulatory frameworks that oversee the production process. Bioprocessing and biomanufacturing industries release substances into the environment. Global greenhouse gas emissions have led to climate change, which affects terrestrial as well as aquatic organisms. Wastes from the manufacturing sector of the biotechnology Industry 5.0 include biological waste such as pathogens, toxins from drug production, heavy metals, hazardous chemicals, and greenhouse gases. Industry 5.0 needs to ensure sustainability while developing high-efficiency products. The Environmental Protected Agency (EPA) ensures proper waste disposal, regulates the production of hazardous gases and chemicals, and regulates the environmental release of pathogens [87]. The supply chain management of biotechnology Industry 5.0 needs to ensure that all the processes comply with EPA regulations.

Agriculture is one of the largest sectors of the economy globally. The agriculture sector of biotechnology has prospered and developed into an economic asset for every nation. However, there are regulatory frameworks that the sector has to comply with to ensure safety and protection. US Department of Agriculture [88] overlooks the agriculture industry and regulates farming, food and nutrition, forestry, opioid production, and organic produce frameworks. The USDA also ensures that it complies with EPA regulations and maintains the climate conditions.

Having discussed some of the major biotechnology regulatory frameworks, some cybersecurity frameworks are crucial to the biotechnology Industry 5.0. Medical devices and monitoring products have been growing more than ever. Remote patient monitoring is a prospective advancement in biotechnology Industry 5.0. However, these systems should be safe and secure for the patients. Health Insurance Portability and Accountability Act (HIPAA) [89] ensures that the healthcare industry protects patient information. HIPAA ensures that the healthcare products released into the market safeguard the patients’ privacy. Business owners who step into the healthcare sector should ensure HIPAA compliance. Online payments and transactions have made our everyday lives easy. Any purchases can be made online without any hassle using your card. However, card information needs to be protected. Biotech labs and healthcare businesses make use of online transactions. However, the payment gateways must secure the card information. Payment Card Industry Data Security Standard (PCI DSS) [90] ensures the protection of card information data while making online payments. All enterprises in the biotechnology Industry 5.0 need to comply with this standard to ensure consumer trust. The National Institute of Standard and Technology (NIST) Cybersecurity Framework [91] provides guidelines to enterprises, industries, and government agencies to minimize cybersecurity risk. The framework ensures a high level of protection against cyberattacks. Complying with NIST cybersecurity regulations will ensure that advanced technology can be employed in biotechnology Industry 5.0 with more confidence, fewer apprehensions, and fewer vulnerabilities. As we transition into Industry 5.0, the need for trustworthy, safe, and secure AI practices is needed more than ever. The US government has released executive orders that outline the emerging policies for the safe and secure use of AI [92]. The executive order has mentioned practices and policies that ensure the safe use of AI by developers as well as protect the public from AI-enabled attacks. This is truly the need of the hour as we see AI being used in all dimensions of industries and integrated into public use at a scale that has not been witnessed before.

5.2 Compliance challenges: adapting to fast-evolving biotech advancements

Although the above-mentioned regulatory bodies ensure security and safety, complying with these regulations has put many enterprises and industries in a tight spot. From product development to product release, complying with so many regulations requires a separate legal team, abundant documentation, and iterating through the process over and over again. Enterprises, especially small business owners, believe that following so many regulations is counter-productive and costs them money as well as labor [93]. The study further presented the views of how small business owners have a hard time making decisions to comply with regulations due to the absence of behavioral heuristics taken into account while designing these frameworks. The regulatory frameworks differ from country to country. And so does the expense and documentation of implementing these frameworks. Business owners in the United States have reported higher legal costs and delayed economic activity or profit to get a compliance clearance from the government as opposed to other economically established nations [94].

A key example is the discovery and development of the ground-breaking tool, CRISPR, for gene modification. CRISPR has potential applications in agriculture to cater to global food demand and human healthcare to develop treatment plans for genetic diseases and cancer [95], among many other areas. CRISPR combined with AI technologies will transform medicine in the next decade, and while CRISPR was first published in 2012, the first evidence of CRISPR being fruitful in gene therapies was identified in under a decade [96]. However, CRISPR has only just been approved in December 2023 by the FDA for sickle cell disease [97]. There is a major opportunity for CRISPR, and other emerging biotechnologies, to have an impact as long as regulation modernizes alongside it.

Many technologies discussed in this chapter utilize IoT and AI sectors, such as machine learning, deep learning, and reinforcement learning. However, getting these products to production lines has been a struggle for biotech companies because they do not meet the current regulatory standards. Although there are compliance challenges currently in biotechnology Industry 5.0, there is no doubt that Industry 5.0 and its ground-breaking developments are here to stay. Transitioning from Industry 4.0 to Industry 5.0 relies on the decision-making of policymakers to set standards for regulatory frameworks [98].

5.3 International standards: the role of global cooperation in standard setting

A common refrain notes that the world is a small place. We can now travel from one side of the world to another in a matter of a few hours. Standardization has been implemented in measuring distances, heights, and weights for many centuries. Now that businesses are globally releasing their products, they have to make sure that their product meets the regulations of each country they appear in. This costs the business owners time, money, and labor. Introducing technology in all industries has challenged global standardization. Technology has had a global impact on standardization policies [99], with nations largely developing their own standards. Standardization ensures interoperability, which means that a product developed in Italy can benefit the people of the United States, and vice versa, equally and unified standards would be beneficial in the biotechnology industry. Standardization maintains consistency in the industry while also ensuring that consumers are protected and there is transparency between the industry and consumers [99].

We now have a good understanding of how biotechnology Industry 5.0 differs from biotechnology Industry 4.0 and what are the potential threats in the biotechnology Industry 5.0. We have also discussed how ML can be implemented in the security operations of biotechnology Industry 5.0. This section gives an overview of the existing regulations and how Industry 5.0 has compliance challenges with these regulations. We have also briefly highlighted the importance of maintaining global standards. In the remainder of the chapter, we will present a perspective of how can MLSecOps be integrated into biotechnology Industry 5.0 while complying with the regulations, and the ethical and social responsibilities of Industry 5.0. We will also provide a perspective of what goes into decision-making for designing policies and regulations for Industry 5.0 focusing more on biotechnology Industry 5.0.

Advertisement

6. MLSecOps best practices for biotechnology industry 5.0

Industry 5.0 is all about personalizing products and making industrial processes human-centric. In Section 2 and Section 3, we have discussed the role of machine learning in Industry 5.0 focusing on the biotechnology sector. The chapter has highlighted the threat landscape in biotechnology Industry 5.0 in Section 4, which is one of the most crucial aspects of employing the latest technology. Having discussed the role of machine learning in MLSecOps and the current threat landscape in biotechnology Industry 5.0, as well as the major regulatory bodies in Section 5, this section aims to discuss the MLSecOps practices that can be employed in biotechnology Industry 5.0. In this section, we aim to discuss how MLSecOps can be integrated into Industry 5.0 while also complying with current regulatory frameworks. In Section 3, we have discussed the role of ML in MLSecOps in two aspects—protecting the machine learning systems used in Industry 5.0 and employing machine learning to protect the Industry 5.0 products. In this section as well we will discuss the MLSecOps practices keeping the two aspects of machine learning in MLSecOps for biotechnology Industry 5.0.

6.1 Risk assessment and management

Risk assessment and management are a major part of all sectors. Building products with risk analysis and management best practices ensures that the complexities in manufacturing, production, and usage have been considered before the products are commercialized [100]. Biotechnology Industry 5.0 includes sectors such as informatics, pharmaceuticals, healthcare, and agriculture. These sectors all have crucial data and information that needs to be protected against threats. The products in Industry 5.0 employ machine learning techniques in various processes, which makes Industry 5.0 more vulnerable [101]. Risk assessment and management ensure that these products protect the privacy of the enterprise, industries, as well as end users. The healthcare sector in biotechnology Industry 5.0 deals with high risks of phishing, cloud configuration errors as well as web application-based attacks, among others. With the increased use of modern technologies such as IoT, cloud, and artificial intelligence, healthcare data are increasingly online. There have been studies that have emphasized the need to build modern security risk assessment frameworks for healthcare in Industry 5.0 [102]. During the COVID-19 pandemic, biotechnology sectors such as healthcare, pharmaceutical companies, and government departments for public safety faced increased security breaches and cyberattacks [103], which emphasized the need to implement robust access control. Employing more robotics and automation in manufacturing in Industry 5.0 can also lead to vulnerabilities such as data theft and security breaches that need to be addressed [104]. With the increased amount of data sharing in the advanced solutions developed in Industry 5.0 using AI, there is an increased risk to the data [105] and hence developing frameworks to assess and manage these risks is crucial to the success of Industry 5.0.

Besides the risks and vulnerabilities in the digital landscape, the effects of AI and technology also pose risks in the physical system. Supply chain and manufacturing sectors of the biotechnology Industry 5.0 deal with production, manufacturing as well as waste disposal in the biotech industry. Biotechnology Industry 5.0 sectors, mainly the pharmaceutical industry, is a major producer of heavy metals. With rapid advancement in applying technologies to supply chain management, the production and manufacturing of pharmaceuticals have skyrocketed. There is a need to assess the risk and take steps toward mitigating and managing the risks from heavy metal release into the environment [106]. AI algorithms have showcased promising results in the detection of heavy metals, such as mercury, cobalt, and chromium, in blood and urine samples [107]. Machine learning has been used to develop security assessment and management frameworks for digital consumers and the energy industry [108, 109], which emphasizes the role of ML and AI in developing secure and robust risk analysis systems in Industry 5.0.

In biotechnology Industry 5.0, one of the most vulnerable components is data. Regulating the data access and implementing access controls on this crucial data are of utmost importance. Electronic record compliance in FDA regulatory frameworks emphasizes implementing access control in enterprises and industries [110]. The pharmaceutical sector of the biotechnology industry has been threatened and faced cyberattacks on multiple occasions [111]. There have been multiple data breaches that have put the privacy of people as well as the security of the population at high risk. It is, therefore, important to build access-controlled secure systems in Industry 5.0.

6.2 Building robust and resilient systems

The biotechnology industry has witnessed a substantial increase in technology dependency over the decades. The role of modern technologies, especially AI, has been growing exponentially in all biotechnology sectors [112]. Although ML combined with IoT has led to some groundbreaking developments in biotechnology sectors such as biometrics, healthcare, and agriculture, building resilient systems, and adopting powerful ML techniques is an ongoing challenge. One of the major issues in building resilient and robust systems in the biotechnology Industry 5.0 is deploying the machine learning pipelines securely. This involves considering any retraining of the models that might be required after releasing into the production lines [113]. Since machine learning models might need to be retrained on data continuously over time, some studies have proposed robust frameworks for continuous deployments of these ML models [114]. Biotechnology Industry 5.0 products that integrate IoT and AI models depend on these robust frameworks for commercialization.

While protecting ML models is crucial, biotechnology Industry 5.0 can also exploit the power of these models in developing robust and resilient systems. Machine learning and deep learning techniques have been used to develop efficient frameworks for anomaly and outlier detection [115, 116, 117]. Since the advent of the manufacturing industry, having humans in the loop has enhanced the reliability as well as efficiency of the products. Biotechnology Industry 5.0 deals with real-world problems that are crucial and high risk. One example is during COVID-19 when production lines of vaccines were threatened [118].

The ML models employed in agriculture, healthcare, pharmaceuticals, and supply chain sectors of the biotechnology Industry 5.0 are also at a very high risk of attacks. There have been studies that showcase the effectiveness of human-in-loop for human-machine teaming (HMT) in the healthcare sector. The study has effectively simulated the human-in-loop intelligent system in two case scenarios: 1. emergency care provider using voice-based synthetic assistants for MARCHE protocol scenario (massive hemorrhage) where it provides a step-wise treatment plan with no adverse effect to the patient and 2. Medic treating a patient follows the scenario in case 1 but involves extra steps of history taking and assessing the patient’s airways where the caretaker takes less time to understand the instructions and thus fastens the treatment plan. This study has showcased how human-in-the-loop (HIL) can be used to enhance the performance of HMT systems [119]. Another study has quantified the effectiveness of HMTs and attempted to provide a benchmark to enhance human-machine collaboration [120]. Keeping technology updated and current is another important aspect of building resilient systems to ensure smooth operations. AI/ML applications have been growing exponentially over the last decade. Updating models and replacing these models with better and recent models is crucial to developing systems that can prevail in the industrial revolutions. Voice-based assistants are now based on large language models (LLMs) as opposed to long short term memory (LSTM) models which were quite heavily employed until the introduction of the transformer architecture [121]. These recently developed voice assistants are robust, reliable, and efficient and have a promising future in the manufacturing, production, as well as advertising sectors of Industry 5.0 [122]. Some of the guidelines and practices discussed here for the development of robust and resilient systems are crucial for the integration of ML in product development and enhancing the security of current products in biotechnology Industry 5.0.

6.3 Monitoring and incident resolution

MLSecOps in biotechnology Industry 5.0 ensures privacy and safety in products or services integrating machine learning with other technologies, such as IoT and cloud computing. Developing and defining standards to use modern technologies ensures standardization, global usage, and effective commercialization. So far in this section, we have discussed risk assessment and management of ML pipelines as well as practices that pave the way for the development of robust and resilient systems in Industry 5.0. However, ML models are sensitive and the results can easily fluctuate on outlier data points [123]. The vulnerabilities of ML models make it crucial to include monitoring the models in the practices of MLSecOps in Industry 5.0. This chapter has discussed how the biotechnology Industry 5.0 deals with crucial data that affects the economy, industry, as well as end users. One of the ways to make sure that the ML models are resilient is to probe these models for weaknesses. Adversarial Machine Learning (AML) is among the most effective techniques for checking ML pipelines for attacks, threats, and vulnerabilities. AML has been used to test the defense mechanism of ML techniques in IoT environments [124] and intrusion detection systems [125, 126].

While probing the ML models is an effective technique to find weaknesses of the developed systems in Industry 5.0, the models also need continuous training and deployment as discussed in Section 6.2. It is therefore important that the models be monitored. Continuous monitoring of the ML integrated system not only helps protect them against attacks but also helps identify any drift or abnormalities in functioning. Machine learning has promising growth in the supply chain management sector of biotechnology Industry 5.0. Frameworks for continuous monitoring in the supply chain post-deployment have been proposed [127]. In biotechnology Industry 5.0, we not only need to monitor ML models but also the data. Any data alterations can lead to abnormal behavior of ML models in an ecosystem. Therefore, monitoring the data to prevent any data poisoning is also crucial in Industry 5.0, especially the bioinformatics and genetic sectors of biotechnology Industry 5.0. Access control over who can retrain and deploy models, checking the updated model for performance drifts, and control over who can get access to data are some of the techniques to handle and detect data poisoning [128]. Monitoring ML ecosystems and implementing practices to deal with threats or attacks ensures a robust, enduring, and safe biotechnology Industry 5.0.

This section has discussed effective MLSecOps practices that can be employed to advance the biotechnology Industry 5.0 while ensuring privacy and security. The section has also given an overview of the importance of monitoring ML systems as well as the data used in AI/ML environments. Access control and monitoring practices concerning ML integration ensure that the biotechnology Industry 5.0 has a positive impact on the economy, strong research, and end user acceptance of innovative products. Toward the end of this chapter, the focus is drawn toward ethical and social responsibilities in Industry 5.0 and providing key points to assist decision-makers in developing compliance and regulatory frameworks for biotechnology Industry 5.0.

Advertisement

7. Ethical considerations and social responsibility

Biotechnology Industry 5.0 focuses on developing human-centric products. While the latest technological advances, such as machine learning, natural language processing models, and computer vision models, are being integrated, Industry 5.0 has a goal of personalization. Personalizing medicine, workouts, meals, etc. is advancing in all sectors of Industry 5.0. This chapter has outlined how Industry 5.0 will witness the growth of integrating ML with other technologies in all sectors. This will lead to biotechnology Industry 5.0 contributing more to the global economy. However, Section 4 has provided an analysis of the threats that are current in the biotechnology Industry 5.0. Although Industry 5.0 has laid out some regulations discussed in Section 5, the biotechnology Industry 5.0 is still vulnerable. In this section, we will highlight the importance of considering social responsibilities and ethical considerations in biotechnology Industry 5.0.

7.1 Ethical use of biotech data: balancing innovation with privacy rights

The biotechnology industry has a plethora of data. Biometrics, genetic data, patient notes, and medical device data are some of the most common examples of data in the biotechnology industry. This industry is expected to grow by 13.96% approximately [129]. Data are huge source of income and Industry 5.0 aims to build products for the end users that harness the power of ML algorithms on this data. The data are crucial and need to be secured while being employed in the product development stage. Section 1 has discussed how the data must be protected and secured while being used in ML algorithms as well as while being stored in the cloud. There is however one more aspect to this. The users must be aware that their data are being used. Many biotechnology companies monetize their data by selling it to other companies for product development [130]. This however raises a concern—Is the user aware that their data is being sold?. There have been multiple reports of private data being sold without the consent of users [131] and this puts the privacy of individuals at risk. However, there have been introductions and amendments to consumer data privacy acts globally that make sure that users are aware of where their data goes [132, 133]. The users should not only be aware of the fact that their data is being sold but there should be transparency regarding the data activities. The user should have full information on how the company is using the data internally and if the data are being provided to external sources [134]. This builds trust among users and enterprises as well as assures that the user is compliant with the data being used. To build a balanced ecosystem of innovation and security the biotechnology Industry 5.0 needs to ensure that they are following cybersecurity best practices. This minimizes the vulnerability of the ML models, software, and the data. Section 5.1 has discussed the cybersecurity regulations and policies. These regulatory frameworks ensure consumer as well as industry protection and growth.

7.2 AI ethics in biotechnology: addressing potential biases and ethical dilemmas

The scope of this chapter is to focus on biotechnology Industry 5.0. Personalization and developing technology that is human-centric has been the goal of Industry 5.0 and integrating ML with other technologies such as cloud computing and IoT has made this goal achievable. However, ML algorithms are vulnerable, which makes them an easy target for malicious activities. MLSecOps in biotechnology Industry 5.0 focuses on developing secure biotechnology practices by securing ML algorithms as well as enhancing security by employing ML models. This has been described in Section 3. AI models perform based on the data they are trained on. The biases of these data get transferred to the models implicitly. The biometric sector of biotechnology Industry 5.0, for example, has developed advanced facial recognition software. However, there have been reports of racial bias in this software, where they have failed to recognize people of color [135]. Similarly, facial recognition systems also exhibit demographic biases [136]. Gender bias in research and clinical trials has been reported where male-centric research is given more funding compared to female-centric research [137, 138]. There have been attempts to mitigate these biases [139]. Addressing these issues in the biotechnology Industry 5.0, which includes the implicit bias in ML systems, will result in a secure and privacy-oriented Industry 5.0. Although, identifying the biases and mitigating them in AI is an important step toward a more safe biotechnology Industry 5.0. It is crucial to form regulatory frameworks and ensure industry compliance with these frameworks in their practices. Section 5.1 has described the current as well as emerging cybersecurity frameworks. These frameworks ensure precautionary steps are taken and there is transparency between the end user and the companies regarding how their data are being used. Taking responsibility for one’s actions is a step toward empathy and improvement. Biotechnology Industry 5.0, especially the healthcare sector, demands that not only precautionary measures be taken but in case of any errors, it is important that the industry takes responsibility and makes corrections of these errors. Liability frameworks that consider the immense integration of AI in healthcare and medicine ensure that there is a balance between innovation and safety [140].

7.3 Social implications: the impact of biotech advancements on society

We are well aware that change incurs some impact. While we try to maximize the positive impact of any development, there are always some negative impacts associated with it. Similarly, with advanced technology being at the center of the biotechnology Industry 5.0, we are looking at labor force change, where reskilling and upskilling will be critical. With advancements in supply chain automation in Industry 5.0, human jobs are expected to decelerate [141]. This may be a point of concern for society where more and more automation can cut out the jobs of humans and their livelihoods. Biotechnology Industry 5.0 must focus on reskilling and upskilling the talented workforce, particularly in areas where jobs will be impacted by automation. Besides this, another social impact of Industry 5.0 can be the cost. With advanced medical devices in the healthcare industry as well as AI-enabled gene therapies, the affordability of the industry can decrease [142]. However, biotechnology Industry 5.0 focuses on employing cutting-edge technology with a great focus on sustainability [143]. This not only makes the products from biotechnology Industry 5.0 such as pharmaceuticals, healthcare, and clinical trials, affordable but also promotes the bioeconomy.

Biotechnology Industry 5.0 possesses great potential to improve human life on many fronts. The healthcare industry has displayed great potential at integrating technology to improve patient care, remote patient monitoring, and using voice-based assistants in surgical processes as mentioned in Section 6.2. Keeping societal well-being and ethical responsibilities in consideration, biotechnology Industry 5.0 will boom at providing human-centric solutions to current problems in all sectors. Understanding the vulnerabilities and the role of MLSecOps in the biotechnology Industry 5.0, we have provided a perspective of the ethical and social responsibilities in this section that must be adhered to develop sustainable, robust, and resilient systems.

Advertisement

8. Conclusions

With every industrial revolution, there has been a growing demand for technology and digitalization. While it is important to integrate technology into various industries, it also makes these industries prone to malicious attacks. The integration of MLSecOps into the biotechnology Industry 5.0 is not just beneficial but imperative for safeguarding against increasingly sophisticated cyber threats. This chapter is aimed at discussing the various aspects of MLSecOps in biotechnology Industry 5.0. The chapter provides an understanding of biotechnology Industry 5.0 delving into how various technologies are integrated into the industry. To better delve into how important MLSecOps is in terms of biotechnology Industry 5.0, the chapter has laid out cyber threats pertinent to the biotechnology sector and how to integrate ML into security operations by leveraging the technology against traditional cyber threats as well as protecting deployed ML models in production. Finally, the chapter has discussed how the compliance frameworks and MLSecOps work hand-in-hand in the biotechnology Industry 5.0. While the integration of MLSecOps is crucial to Industry 5.0, numerous complications and security concerns need to be addressed. Overall, this chapter has underscored the critical vulnerabilities within the industry and presented a case for adopting MLSecOps practices. By embracing a proactive approach to cybersecurity, leveraging advanced ML techniques, and adhering to regulatory and ethical standards, the biotechnology sector can fortify its defenses and ensure the privacy and security of its data and systems. Looking forward, the industry must continue to evolve its security practices in tandem with technological advancements, ensuring a resilient and robust defense mechanism that can adapt to new challenges. In doing so, the biotechnology Industry 5.0 can achieve its full potential, driving innovation while safeguarding the invaluable data at its core.

Advertisement

Abbreviations

ML

machine learning

IoT

internet of things

AI

artificial intelligence

References

  1. 1. Adel A. Future of industry 5.0 in society: Human-centric solutions, challenges and prospective research areas. Journal of Cloud Computing: Advances, Systems and Applications. 2022;11(1):40
  2. 2. Özdemir V, Hekim N. Birth of industry 5.0: Making sense of big data with artificial intelligence, “the internet of things” and next-generation technology policy. OMICS: A Journal of Integrative Biology. 2018;22(1):65-76. DOI: 10.1089/omi.2017.0194
  3. 3. Lee YJ, Park J. The safety paradox of self-driving cars. Asia Marketing Journal. 2022;23(4). Article 1
  4. 4. Faang HY, Yaakob N, Elshaikh ME, Sidek AK, Lynn OB, Almashor M. IoT-based automated and contactless shopping cart during pandemic diseases outbreak. Journal of Physics: Conference Series. 2021;1962(1):012051. Ser. 1962 012051. DOI: 10.1088/1742-6596/1962/1/012051
  5. 5. Zamzami IF, Pathoee K, Gupta BB, Mishra A, Rawat D, Alhalabi W. Machine learning algorithms for smart and intelligent healthcare system in society 5.0. International Journal of Intelligence Systems. 2022;37(12):11742-11763
  6. 6. Selvam A, Aggarwal T, Mukherjee M, Verma YK. Humans and robots: Friends of the future? A bird’s eye view of biomanufacturing industry 5.0. Biotechnology Advances. 2023;68:108237. Available from: https://www.sciencedirect.com/science/article/pii/S0734975023001441
  7. 7. Trump B, Cummings C, Klasa K, Galaitsi S, Linkov I. Governing biotechnology to provide safety and security and address ethical, legal, and social implications. Frontiers in Genetics. 2022;13:1052371
  8. 8. Lee KM, Gilmore DF. Statistical experimental design for bioprocess modeling and optimization analysis: Repeated-measures method for dynamic biotechnology process. Applied Biochemistry and Biotechnology. 2006;135(2):110-115
  9. 9. Caudai C, Galizia A, Geraci F, Le Pera L, Morea V, Salerno E, et al. AI applications in functional genomics. Computational and Structural Biotechnology Journal. 2021;19:5762-5790
  10. 10. Soveizi N, Turkmen F, Karastoyanova D. Security and privacy concerns in cloud-based scientific and business workflows: A systematic review. Future Generation Computer Systems. 2023;148:184-200
  11. 11. Jang-Jaccard J, Nepal S. A survey of emerging threats in cybersecurity. Journal of Computer and System Sciences. 2014;80(5):973-993
  12. 12. Kimani K, Oduol V, Langat K. Cyber security challenges for IoT-based smart grid networks. International Journal of Critical Infrastructure Protection. 2019;25:2272358
  13. 13. Mohamed N. Current trends in AI and ML for cybersecurity: A state-of-the-art survey. Cogent Engineering. 2023;10(2):1-38
  14. 14. Apruzzese G, Laskov P, de Oca EM, Mallouli W, Rapa LB, Grammatopoulos AV, et al. The role of machine learning in cybersecurity. Digital Threats. 2022;4:1-38
  15. 15. Chachra A, Sharma D. Applications of machine learning algorithms for countermeasures to cyber attacks. SSRN Electronic Journal. 2019
  16. 16. Yamin MM, Katt B, Sattar K, Ahmad MB. Implementation of insider threat detection system using honeypot based sensors and threat analytics. In: Lecture Notes in Networks and Systems, Lecture Notes in Networks and Systems. Cham: Springer International Publishing; 2020. pp. 801-829
  17. 17. Cohen SN, Chang AC, Boyer HW, Helling RB. Construction of biologically functional bacterial plasmids in vitro. Proceedings of the National Academy of Sciences of the United States of America. 1973;70(11):3240-3244
  18. 18. Johnson IS. Human insulin from recombinant DNA technology. Science. 1983;219(4585):632-637
  19. 19. Impact of Emerging Technologies On The Biological Sciences; 1995. Available from: https://www.nsf.gov/bio/pubs/reports/stctechn/stcmain.htm [Accessed: December 24, 2023]
  20. 20. SBA K, Gkoutos GV, Acharjee A. Cloud computing enabled big multi-omics data analytics. Bioinformatics and Biology Insights. 2021;15:11779322211035921
  21. 21. Haggin P. Personal data is worth billions. These startups want you to get a cut. The Wall Street Journal (East Ed). 2021
  22. 22. Xu Y, Liu X, Cao X, Huang C, Liu E, Qian S, et al. Artificial intelligence: A powerful paradigm for scientific research. Innovation (Camb). 2021;2(4):100179
  23. 23. Jia LL, Zhao JX, Pan NN, Shi LY, Zhao LP, Tian JH, et al. Artificial intelligence model on chest imaging to diagnose COVID-19 and other pneumonias: A systematic review and meta-analysis. European Journal of Radiology Open. 2022;9(100438):100438
  24. 24. Rajesh AS, Prabhuswamy MS, Krishnasamy S. Smart manufacturing through machine learning: A review, perspective, and future directions to the machining industry. Journal of Industrial Engineering. 2022;2022:1-6
  25. 25. Sahu S, Daniya T, Cristin R. A study on weather based crop prediction system using big data analytics and machine learning. In: 2023 5th International Conference on Smart Systems and Inventive Technology (ICSSIT). Tirunelveli, India: IEEE; 2023
  26. 26. Ahemad MT, Hameed MA, Vankdothu R. COVID-19 detection and classification for machine learning methods using human genomic data. Measurement: Sensors. 2022;24(100537):100537
  27. 27. Schwarzer A, Talbot SR, Selich A, Morgan M, Schott JW, Dittrich-Breiholz O, et al. Predicting genotoxicity of viral vectors for stem cell gene therapy using gene expression-based machine learning. Molecular Therapy. 2021;29(12):3383-3397
  28. 28. Holland I, Davies JA. Automation in the life science research laboratory. Frontiers in Bioengineering and Biotechnology. 2020;8:571777
  29. 29. Vidakis N, Lasithiotakis MA, Karapidakis E. Environmental monitoring through embedded system and sensors. In: 2017 52nd International Universities Power Engineering Conference (UPEC). Heraklion, Greece: IEEE; 2017
  30. 30. Yew HT, Ng MF, Ping SZ, Chung SK, Chekima A, Dargham JA. IoT based real-time remote patient monitoring system. In: 2020 16th IEEE International Colloquium on Signal Processing & its Applications (CSPA). Langkawi, Malaysia: IEEE; 2020
  31. 31. Bove LA. Increasing patient engagement through the use of wearable technology. The Journal for Nurse Practitioners. 2019;15(8):535-539
  32. 32. Wei X, Luo J, Pu A, Liu Q , Zhang L, Wu S, et al. From biotechnology to bioeconomy: A review of development dynamics and pathways. Sustainability. 2022;14(16):10413
  33. 33. Tomassini S, Sbrollini A, Morettini M, Dragoni AF, Burattini L. CLAUDIA: Cloud-based automatic diagnosis of Alzheimer’s prodromal stage and disease from 3D brain magnetic resonance. In: 2023 IEEE 36th International Symposium on Computer-Based Medical Systems (CBMS). L’Aquila, Italy: IEEE; 2023
  34. 34. Duan H, Li J, Yu L, Fan L. The road ahead of dietary restriction on anti-aging: Focusing on personalized nutrition. Critical Reviews in Food Science and Nutrition. 2022;64(4):1-18
  35. 35. Ayala-Orozco C, Galvez-Aranda D, Corona A, Seminario JM, Rangel R, Myers JN, et al. Molecular jackhammers eradicate cancer cells by vibronic-driven action. Nature Chemistry. 2023;16(3):456-465
  36. 36. Li J, Chen J, Bai H, Wang H, Hao S, Ding Y, et al. An overview of organs-on-chips based on deep learning. Research (Wash DC). 2022;2022:9869518
  37. 37. Tommasone S, Megan Craig MS. Exploring the Potential of Big Data in Biotechnology. AZO lifesciences; 2023. Available from: https://www.azolifesciences.com/article/Exploring-the-Potential-of-Big-Data-in-Biotechnology.aspx [Accessed: January 5, 2024]
  38. 38. Stephens ZD, Lee SY, Faghri F, Campbell RH, Zhai C, Efron MJ, et al. Big Data: Astronomical or genomical? PLoS Biology. 2015;13(7):e1002195
  39. 39. Wan Z, Hazel JW, Clayton EW, Vorobeychik Y, Kantarcioglu M, Malin BA. Sociotechnical safeguards for genomic data privacy. Nature Reviews. Genetics. 2022;23(7):429-445
  40. 40. Kuo TT, Jiang X, Tang H, Wang X, Harmanci A, Kim M, et al. The evolving privacy and security concerns for genomic data analysis and sharing as observed from the iDASH competition. Journal of the American Medical Informatics Association. 2022;29(12):2182-2190
  41. 41. Arshad S, Arshad J, Khan MM, Parkinson S. Analysis of security and privacy challenges for DNA-genomics applications and databases. Journal of Biomedical Informatics. 2021;119(103815):103815
  42. 42. Song C, Shi X. Secure deep learning on genomics data via a homomorphic encrypted residue activation network. bioRxiv. 2023
  43. 43. Charmilisri A, Harshi I, Madhushalini V, Raja L. A novel ransomware virus detection technique using machine and deep learning methods. In: 2023 7th International Conference on Intelligent Computing and Control Systems (ICICCS). Madurai, India: IEEE; 2023
  44. 44. Almousa M, Basavaraju S, Anwar M. API-based ransomware detection using machine learning-based threat detection models. In: 2021 18th International Conference on Privacy, Security and Trust (PST). Auckland, New Zealand: IEEE; 2021
  45. 45. Islam MS, Ivanov S, Awan H, Drohan J, Balasubramaniam S, Coffey L, et al. Using deep learning to detect digitally encoded DNA trigger for Trojan malware in bio-cyber attacks. Scientific Reports. 2022;12(1):9631
  46. 46. Lahmiri S. A comparative study of statistical machine learning methods for condition monitoring of electric drive trains in supply chains. Supply Chain Analytics. 2023;2:100011
  47. 47. Mondal PP, Galodha A, Verma VK, Singh V, Show PL, Awasthi MK, et al. Review on machine learning-based bioprocess optimization, monitoring, and control systems. Bioresource Technology. 2023;370(128523):128523
  48. 48. Ben Youssef A, Mejri I. Linking digital technologies to sustainability through industry 5.0: A bibliometric analysis. Sustainability. 2023;15(9):7465
  49. 49. Omar M. Detecting software vulnerabilities using language models. arXiv. 2023
  50. 50. Kaissis GA, Makowski MR, Rückert D, Braren RF. Secure, privacy-preserving and federated machine learning in medical imaging. Nature Machine Intelligence. 2020;2(6):305-311
  51. 51. Salunke SV, Ouda A. Ensemble learning to enhance continuous user authentication for real world environments. In: 2023 IEEE International Black Sea Conference on Communications and Networking (BlackSeaCom). Istanbul, Turkiye: IEEE; 2023
  52. 52. Rocha R, Carneiro D, Costa R, Analide C. Continuous authentication in mobile devices using behavioral biometrics. In: Advances in Intelligent Systems and Computing. Advances in Intelligent Systems and Computing. Cham: Springer International Publishing; 2020. pp. 191-198
  53. 53. Elbasi E, Zaki C, Topcu AE, Abdelbaki W, Zreikat AI, Cina E, et al. Crop prediction model using machine learning algorithms. Applied Sciences (Basel). 2023;13(16):9288
  54. 54. Monaco A, Pantaleo E, Amoroso N, Lacalamita A, Lo Giudice C, Fonzino A, et al. A primer on machine learning techniques for genomic applications. Computational and Structural Biotechnology Journal. 2021;19:4345-4359
  55. 55. Hickerson DHM, Hunsberger J. Applying AI to advanced biomanufacturing. In: Artificial Intelligence in Tissue and Organ Regeneration. Elsevier; 2023. pp. 267-288
  56. 56. Duong-Trung N, Born S, Kim JW, Schermeyer MT, Paulick K, Borisyak M, et al. When bioprocess engineering meets machine learning: A survey from the perspective of automated bioprocess development. Biochemical Engineering Journal. 2023;190:108764
  57. 57. Lux CT, Scharenberg AM. Therapeutic gene editing safety and specificity. Hematology/Oncology Clinics of North America. 2017;31(5):787-795
  58. 58. Tidjon LN, Khomh F. Threat assessment in machine learning based systems. arXiv. 2022
  59. 59. Gu T, Dolan-Gavitt B, Garg S. BadNets: Identifying vulnerabilities in the machine learning model supply chain. arXiv. 2017
  60. 60. Păvăloaia VD, Necula SC. Artificial intelligence as a disruptive technology—A systematic literature review. Electronics (Basel). 2023;12, 5:1102
  61. 61. Omar M. RobustNLP: A technique to defend NLP models against backdoor attacks. arXiv. 2023
  62. 62. Gianfrancesco MA, Tamang S, Yazdany J, Schmajuk G. Potential biases in machine learning algorithms using electronic health record data. JAMA Internal Medicine. 2018;178(11):1544-1547
  63. 63. Rouzrokh P, Khosravi B, Faghani S, Moassefi M, Vera Garcia DV, Singh Y, et al. Mitigating bias in radiology machine learning: 1. Data handling. Radiology: Artificial Intelligence. 2022;4(5):e210290
  64. 64. Cabrera ÁA, Fu E, Bertucci D, Holstein K, Talwalkar A, Hong JI, et al. Zeno: An interactive framework for behavioral evaluation of machine learning. In: Proceedings of the 2023 CHI Conference on Human Factors in Computing Systems. New York, NY, USA: ACM; 2023
  65. 65. Herath HMKKMB, Mittal M. Adoption of artificial intelligence in smart cities: A comprehensive review. International Journal of Information Management Data Insights. 2022;2(1):100076
  66. 66. The rise of digital DNA; 2020. Available from: https://www.competitormonitor.com/blog/the-rise-of-digital-dna/ [Accessed: December 29, 2023]
  67. 67. DePristo MA, Banks E, Poplin R, Garimella KV, Maguire JR, Hartl C, et al. A framework for variation discovery and genotyping using next-generation DNA sequencing data. Nature Genetics. 2011;43(5):491-498
  68. 68. Busia A, Dahl GE, Fannjiang C, Alexander DH, Dorfman E, Poplin R, et al. A deep learning approach to pattern recognition for short DNA sequences. bioRxiv. 2018
  69. 69. Sithravel R, Olsson T, Aries M. Optimizing presence sensing lighting for energy efficiency and user behavioral needs in small Swedish homes. Leukos. 2024;20(1):107-125
  70. 70. Zhao W, Yin J, Wang X, Hu J, Qi B, Runge T. Real-time vehicle motion detection and motion altering for connected vehicle: Algorithm design and practical applications. Sensors (Basel). 2019;19(19):4108
  71. 71. Szagri D, Dobszay B, Nagy B, Szalay Z. Wireless temperature, relative humidity and occupancy monitoring system for investigating overheating in buildings. Sensors (Basel). 2022;22(22):8638
  72. 72. Pramanik PKD, Nayyar A, Pareek G. WBAN: Driving e-healthcare beyond telemedicine to remote health monitoring. In: Telemedicine Technologies. Elsevier; 2019. pp. 89-119
  73. 73. Robinson L, Hutchings D, Corner L, Finch T, Hughes J, Brittain K, et al. Balancing rights and risks: Conflicting perspectives in the management of wandering in dementia. Health, Risk & Society. 2007;9(4):389-406
  74. 74. Verdouw C, Sundmaeker H, Tekinerdogan B, Conzon D, Montanaro T. Architecture framework of IoT-based food and farm systems: A multiple case study. Computers and Electronics in Agriculture. 2019;165:104939
  75. 75. Guo E. This is the real story of the afghan biometric databases abandoned to the Taliban. Technology Review. 2021
  76. 76. Shopon M, Tumpa SN, Bhatia Y, Kumar KNP, Gavrilova ML. Biometric systems DE-identification: Current advancements and future directions. Journal of Cybersecurity and Privacy. 2021;1(3):470-495
  77. 77. Mustazza C, Gaudiano MC, Borioni A, Valvo L. The evolution of the illegal market of falsified medicines and the experience of the Italian OMCL: From control to research. Editorial. Annali dell'Istituto Superiore di Sanità. 2018;54(4):267-269
  78. 78. Nalani Fraser Jovcrldpces Fred Plan. APT41 Chinese cyber threat group; 2021. Available from: https://www.mandiant.com/resources/blog/apt41-dual-espionage-and-cyber-crime-operation [Accessed: December 30, 2023]
  79. 79. Shelmire A. Evasive Maneuvers by the Wekby group with custom ROP-packing and DNS covert channels. Available from: https://www.anomali.com/blog/evasive-maneuvers-the-wekby-group-attempts-to-evade-analysis-via-custom-rop [Accessed: December 30, 2023]
  80. 80. Thacker M. U.S. biotech is a major economic driver with a broad range, report says; 2022. Available from: https://gabio.org/u-s-biotech-is-a-major-economic-driver-with-a-broad-range-report-says/ [Accessed: January 6, 2024]
  81. 81. Esearch HR. Bold goals for U.S. biotechnology and biomanufacturing. Available from: https://www.whitehouse.gov/wp-content/uploads/2023/03/Bold-Goals-for-U.S.-Biotechnology-and-Biomanufacturing-Harnessing-Research-and-Development-To-Further-Societal-Goals-FINAL.pdf [Accessed: January 6, 2024]
  82. 82. McKendrick J. Business leaders are still nervous about the side effects of artificial intelligence; 2022. Available from: https://www.forbes.com/sites/joemckendrick/2022/12/11/business-leaders-are-still-nervous-about-the-side-effects-of-artificial-intelligence/?sh=6e3d269c4683 [Accessed: January 6, 2024]
  83. 83. National Academies of Sciences, Engineering, and Medicine, Division on Earth and Life Studies, Board on Chemical Sciences and Technology, Board on Agriculture and Natural Resources, Board on Life Sciences, Committee on Future Biotechnology Products and Opportunities to Enhance Capabilities of the Biotechnology Regulatory System. The Current Biotechnology Regulatory System. Washington, D.C.: National Academies Press; 2017
  84. 84. Multistate outbreak of listeriosis linked to Blue Bell creameries products; 2018. Available from: https://www.cdc.gov/listeria/outbreaks/ice-cream-03-15/index.html [Accessed: January 6, 2024]
  85. 85. FDA says 23 deaths linked to unapproved drug. (2024, January). Available from: https://www.reuters.com/article/health-fda-drugwarning-dc/fda-says-23-deaths-linked-to-unapproved-drug-idUKN0630777020080206/ [Accessed: January 6, 2024]
  86. 86. U.S. food and drug administration; 2024. Available from: https://www.fda.gov/ [Accessed: January 6, 2024]
  87. 87. Us Epa OA. U.S. environmental Protection Agency. 2013.
  88. 88. USDA. Available from: https://www.usda.gov/ [Accessed: January 6, 2024].
  89. 89. Health insurance portability and accountability act of 1996 (HIPAA); 2022. Available from: https://www.cdc.gov/phlp/publications/topic/hipaa.html [Accessed: January 6, 2024]
  90. 90. PCI DSS Quick Reference Guide; 2018. Available from: https://listings.pcisecuritystandards.org/documents/PCI_DSS-QRG-v3_2_1.pdf [Accessed: January 6, 2024]
  91. 91. Nist GMD. The NIST Cybersecurity Framework 2.0. Gaithersburg, MD: U.S. Department of Commerce; 2023. NIST CSWP 29
  92. 92. The White House. FACT SHEET: President Biden issues Executive Order on safe, secure, and trustworthy artificial intelligence; 2023. Available from: https://www.whitehouse.gov/briefing-room/statements-releases/2023/10/30/fact-sheet-president-biden-issues-executive-order-on-safe-secure-and-trustworthy-artificial-intelligence/ [Accessed: January 19, 2024]
  93. 93. Shapiro S, Borie-Holtz D. Small business response to regulation: Incorporating a behavioral perspective. Humanities and Social Sciences Communications. 2020;7(1):58
  94. 94. Potter HR, Kagan RA, Axelrad L. Regulatory encounters: Multinational corporations and American adversarial legalism. Contemporary Sociology. 2002;31(5):594
  95. 95. Nidhi S, Anand U, Oleksak P, Tripathi P, Lal JA, Thomas G, et al. Novel CRISPR-Cas systems: An updated review of the current achievements, applications, and future research perspectives. International Journal of Molecular Sciences. 2021;22(7):3327
  96. 96. Thorne L. The History and Evolution of CRISPR; 2021. Available from: https://www.biocompare.com/Editorial-Articles/578958-The-History-and-Evolution-of-CRISPR/ [Accessed: January 25, 2024]
  97. 97. Leo L, Satija B. US FDA approves two gene therapies for sickle cell disease. December 2023. Available from: https://www.reuters.com/business/healthcare-pharmaceuticals/us-approves-two-gene-therapies-sickle-cell-disease-2023-12-08/ [Accessed: January 25, 2024]
  98. 98. Ghobakhloo M, Iranmanesh M, Morales ME, Nilashi M, Amran A. Actions and approaches for enabling industry 5.0-driven sustainable industrial transformation: A strategy roadmap. Corporate Social Responsibility and Environmental Management. 2023;30(3):1473-1494
  99. 99. Holland M. Global cooperation on tech standards is falling apart; 2023. Available from: https://www.techtarget.com/searchcio/news/366541797/Global-cooperation-on-tech-standards-is-falling-apart [Accessed: January 6, 2024]
  100. 100. Rodríguez-Espíndola O, Chowdhury S, Dey PK, Albores P, Emrouznejad A. Analysis of the adoption of emergent technologies for risk management in the era of digital manufacturing. Technological Forecasting and Social Change. 2022;178(121562):121562
  101. 101. Duarte CG. Why Industry 5.0 is both a boon — and a cyber security challenge; 2022. Available from: https://www.businessandindustry.co.uk/manufacturing/why-industry-5-0-is-both-a-boon-and-a-cyber-security-challenge/ [Accessed: January 17, 2024]
  102. 102. Baz A, Ahmed R, Khan SA, Kumar S. Security risk assessment framework for the healthcare industry 5.0. Sustainability. 2023;15(23):16519
  103. 103. He Y, Aliyu A, Evans M, Luo C. Health care cybersecurity challenges and solutions under the climate of COVID-19: Scoping review. Journal of Medical Internet Research. 2021;23(4):e21747
  104. 104. Abishek BA, Kavyashree T, Jayalakshmi R, Tharunkumar S, Raffik R. Collaborative robots and cyber security in industry 5.0. In: 2023 2nd International Conference on Advancements in Electrical, Electronics, Communication, Computing and Automation (ICAECA). Coimbatore, India: IEEE; 2023. pp. 1-6
  105. 105. Chander B, Pal S, De D, Buyya R. Artificial intelligence-based internet of things for industry 5.0. In: Internet of Things. Cham: Springer International Publishing; 2022. pp. 3-45
  106. 106. Wang Z, Luo P, Zha X, Xu C, Kang S, Zhou M, et al. Overview assessment of risk evaluation and treatment technologies for heavy metal pollution of water and soil. Journal of Cleaner Production. 2022;379:134043
  107. 107. Yadav N, Maurya BM, Chettri D, Pooja PC, Jajula M, et al. Artificial intelligence in heavy metals detection: Methodological and ethical challenges. Hygiene and Environmental Health Advances. 2023;7:100071
  108. 108. Sharma A, Rani S, Bashir AK, Krichen M, Alshammari A. A low-rank learning based multi-label security solution for industry 5.0 consumers using machine learning classifiers. IEEE Transactions on Consumer Electronics. 2023;69(4):1-1
  109. 109. Paltrinieri N, Comfort L, Reniers G. Learning about risk: Machine learning for risk assessment. Safety Science. 2019;118:475-486
  110. 110. Part 11, Electronic Records; Electronic Signatures - scope and application. FDA; 2023. Available from: https://www.fda.gov/regulatory-information/search-fda-guidance-documents/part-11-electronic-records-electronic-signatures-scope-and-application [Accessed: January 17, 2024]
  111. 111. Case studies: cybersecurity in the pharmaceutical industry - Pharma Technology Focus. Available from: https://pharma.nridigital.com/pharma_jun23/case-studies-cybersecurity-pharmaceutical-industry [Accessed: January 17, 2024]
  112. 112. Holzinger A, Keiblinger K, Holub P, Zatloukal K, Müller H. AI for life: Trends in artificial intelligence for biotechnology. New Biotechnology. 2023;74:16-24
  113. 113. Heymann H, Kies AD, Frye M, Schmitt RH, Boza A. Guideline for deployment of machine learning models for predictive quality in production. Procedia CIRP. 2022;107:815-820
  114. 114. Jelassi O, Negi NS, Chaouchi H. New data novelty check and distributed learning for IoT data anomaly detection. In: Proceedings of Eighth International Congress on Information and Communication Technology. Lecture Notes in Networks and Systems. Singapore: Springer Nature Singapore; 2024. pp. 105-124
  115. 115. Chauhan S, Vig L. Anomaly detection in ECG time signals via deep long short-term memory networks. In: 2015 IEEE International Conference on Data Science and Advanced Analytics (DSAA). Paris, France: IEEE; 2015. pp. 1-7
  116. 116. Hodge V, Austin J. A survey of outlier detection methodologies. Artificial Intelligence Review. 2004;22(2):85-126
  117. 117. Negi N, Jelassi O, Chaouchi H, Clemençon S. Distributed online data anomaly detection for connected vehicles. In: 2020 International Conference on Artificial Intelligence in Information and Communication (ICAIIC). Fukuoka, Japan: IEEE; 2020. pp. 494-500
  118. 118. Sanger DE, LaFraniere S. Cyberattacks Discovered on Vaccine Distribution Operations. NY Times; 2020
  119. 119. Damacharla P, Dhakal P, Bandreddi JP, Javaid AY, Gallimore JJ, Elkin C, et al. Novel human-in-the-loop (HIL) simulation method to study synthetic agents and standardize human–machine teams (HMT). Applied Sciences (Basel). 2020;10(23):8390
  120. 120. Damacharla P, Javaid AY, Gallimore JJ, Devabhaktuni VK. Common metrics to benchmark human-machine teams (HMT): A review. IEEE Access. 2018;6:38637-38655
  121. 121. Chen J, Liu Z, Huang X, Wu C, Liu Q , Jiang G, et al. When Large Language Models Meet Personalization: Perspectives of Challenges and Opportunities. 2023
  122. 122. November. Voice assistants and LLMs: a marketing match made in heaven? Available from: https://www.performancemarketingworld.com/article/1847587/voice-assistants-llms-marketing-match-made-heaven [Accessed: January 18, 2024]
  123. 123. Sharma V. Outliers in Machine Learning: Understanding their Impact on Data Analysis; 2023. Available from: https://levelup.gitconnected.com/outliers-in-machine-learning-understanding-their-impact-on-data-analysis-7ee025fb0022 [Accessed: January 18, 2024]
  124. 124. Alkadi S, Al-Ahmadi S, Ismail MMB. Better safe than never: A survey on adversarial machine learning applications towards IoT environment. Applied Sciences (Basel). 2023;13(10):6001
  125. 125. Alatwi HA, Morisset C. Adversarial machine learning in network intrusion detection domain: A systematic review. arXiv. 2021
  126. 126. Alatwi HA, Aldweesh A. Adversarial black-box attacks against network intrusion detection systems: A survey. In: 2021 IEEE World AI IoT Congress (AIIoT). Seattle, WA, USA: IEEE; 2021. pp. 0034-0040
  127. 127. Eck B, Kabakci-Zorlu D, Chen Y, Savard F, Bao X. A monitoring framework for deployed machine learning models with supply chain examples. arXiv. 2022
  128. 128. Constantin L. How Data Poisoning Attacks Corrupt Machine Learning Models; CSO. 2021. Available from: https://www.csoonline.com/article/570555/how-data-poisoning-attacks-corrupt-machine-learning-models.html [Accessed: January 18, 2024]
  129. 129. Biotechnology market size, share & trend analysis by technology (nanobiotechnology, DNA sequencing, cell-based assays), by application (health, bioinformatics), by region, and segment forecasts, 2024-2030. Available from: https://www.grandviewresearch.com/industry-analysis/biotechnology-market [Accessed: January 23, 2024]
  130. 130. Konieczka J. How pharmaceutical companies can monetize their data; 2023. Available from: https://arekskuza.com/the-innovation-blog/how-pharmaceutical-companies-can-monetize-their-data/ [Accessed: January 23, 2024]
  131. 131. Fung B. Feds Crack Down Hard on Selling of Personal Data without Consent. CNN; 2024
  132. 132. Nahra KJ, Gujarathi R, Jessani AA. California Privacy Update—October 13, 2023. WilmerHale; 2023. Available from: https://www.wilmerhale.com/en/insights/blogs/wilmerhale-privacy-and-cybersecurity-law/20231012-california-privacy-update [Accessed: January 23, 2024]
  133. 133. 17 new privacy laws around the world and how they’ll affect your analytics; 2021. Available from: https://piwik.pro/privacy-laws-around-globe/ [Accessed: January 23, 2024]
  134. 134. Boué S, Byrne M, Hayes AW, Hoeng J, Peitsch MC. Embracing transparency through data sharing. International Journal of Toxicology. 2018;37(6):466-471
  135. 135. SITNFlash. Racial discrimination in face recognition technology; 2020. Available from: https://sitn.hms.harvard.edu/flash/2020/racial-discrimination-in-face-recognition-technology/ [Accessed: January 25, 2024]
  136. 136. Drozdowski P, Rathgeb C, Dantcheva A, Damer N, Busch C. Demographic bias in biometrics: A survey on an emerging challenge. IEEE Transactions on Technology and Society. 2020;1(2):89-103
  137. 137. Chilet-Rosell E. Gender bias in clinical research, pharmaceutical marketing, and the prescription of drugs. Global Health Action. 2014;7(1):25484
  138. 138. Orbach DN. Gender bias in the study of genital evolution: Females continue to receive less attention than males. Integrative and Comparative Biology. 2022;62(3):533-541
  139. 139. Huang L, Wang M, Liang J, Deng W, Shi H, Wen D, et al. Gradient attention balance network: Mitigating face recognition racial bias via gradient attention. arXiv. 2023:38-47. arXiv Publication
  140. 140. Maliha G, Gerke S, Cohen IG, Parikh RB. Artificial intelligence and liability in medicine: Balancing safety and innovation. The Milbank Quarterly. 2021;99(3):629-647
  141. 141. Demir KA, Döven G, Sezen B. Industry 5.0 and human-robot co-working. Procedia Computer Science. 2019;158:688-695
  142. 142. The America will struggle to pay for ultra-expensive gene therapies. Economist. 2023
  143. 143. Low M. Solving the gene therapy cost-effectiveness conundrum; 2020. Available from: https://www.marugroup.net/insights/blog/gene-therapy-cost-effectiveness [Accessed: January 25, 2024]

Written By

Naseela Pervez and Alexander J. Titus

Reviewed: 09 April 2024 Published: 10 May 2024