2016
DOI: 10.1080/13675567.2016.1219703
|View full text |Cite|
|
Sign up to set email alerts
|

Adapting supply chain management strategies to security – an analysis of existing gaps and recommendations for improvement

Abstract: This is the accepted version of a paper published in. This paper has been peer-reviewed but does not include the final publisher proof-corrections or journal pagination.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

2
31
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
5
2

Relationship

1
6

Authors

Journals

citations
Cited by 33 publications
(33 citation statements)
references
References 50 publications
2
31
0
Order By: Relevance
“…In this study, a few articles (e.g. Faisal et al, 2007;Smith et al, 2007;Charitoudi and Blyth, 2014;Tran et al, 2016;Urciuoli and Hintsa, 2017) acknowledge natural disasters as a critical driver for cyber risks. For example, when a flood or a tornado disrupts the functioning of servers, which then interferes with the seamless flow of the cyber supply chain network.…”
Section: Physical Threatsmentioning
confidence: 89%
See 2 more Smart Citations
“…In this study, a few articles (e.g. Faisal et al, 2007;Smith et al, 2007;Charitoudi and Blyth, 2014;Tran et al, 2016;Urciuoli and Hintsa, 2017) acknowledge natural disasters as a critical driver for cyber risks. For example, when a flood or a tornado disrupts the functioning of servers, which then interferes with the seamless flow of the cyber supply chain network.…”
Section: Physical Threatsmentioning
confidence: 89%
“…Meanwhile, Smith et al (2007) and Urciuoli and Hintsa (2017) go one step further and add the deliberate damaging or theft of physical infrastructure components to this physical risk category. Faisal et al (2007) also consider terrorist attacks to be a part of the physical aspect of cyber risks.…”
Section: Physical Threatsmentioning
confidence: 99%
See 1 more Smart Citation
“…Supply chain managers and suppliers share a large amount of data to support communication and collaborative efforts as well as build trust in the supply chain management process (Urciuoli and Hintsa, 2017). According to Boiko et al (2019) "the chains of manufacturers, suppliers, contractors, transport and trading companies are intertwined in the most intimate way and are already real online networks" (p. 67).…”
Section: Overviewmentioning
confidence: 99%
“…With the increase in cybercrimes and identity thefts, it is crucial for both supply chain managers and information security managers to understand the importance of embracing ethical cultures, moral reasoning, and ethical decision making. Urciuoli and Hintsa (2017) asserted that most supply chain managers were unaware of their supply chain exposure to cyberattack because they lacked visibility across the entire supply chain. This assertion supports the need for whistleblowing.…”
Section: Risk Of Reprisalmentioning
confidence: 99%