Table 2.
Domain 2: The Technology.
| Complexity Level | Theme | Facilitator | Barrier |
|---|---|---|---|
| Complex | Technical functionality and reliability |
Real-time synchronisation between real and virtual entities [14,27,57,58,59,60,61,62,63] |
Establishing a synchronised cyber-physical system [27,57] |
| Internet of Things (IoT) [12,14,28,33,43,59,60] |
Vulnerabilities in computational storage and infrastructural resources [14,60] | ||
| Cloud computing [27,28,33,40,43,59,60] |
Hacking and Viruses [30,34,40] | ||
| Complex | Technology Features | Real-time simulation [6,7,9,11,14,29,47,57,59,65] Real-time remote monitoring of a patient’s health [14,27,28,33,39,40,43,60,66,67,68,69] |
Lack of regulations and rules establishing validation methodologies [14,57,59] |
| Real-time experimentation [7,11,28,55,57] Predictive maintenance [9,13,14,27,32,70] Virtual collaboration [28,40,67,71,72] |
Specialised skills required [7,29,43,44] | ||
| Complex | Patient data | Real-time data collection [3,30,31,32,33,43,44,60,70] |
Huge amounts of data required [7,32,57,63,66,69,73] |
| Data fusion techniques and multiscale data integration [27,28,40,59,74] Dedicated structured reading team [75] |
Challenges of integrating data from different sources [27,28,40,42,59,75,76] High cost and time consuming [40] Privacy risks: (1) commodification [31,33,39]; (2) surveillance [33,34,60,76,77]; (3) behavior manipulation [12,31,33,34,39,60] |