2015
DOI: 10.22215/timreview885
|View full text |Cite
|
Sign up to set email alerts
|

Supply Chain Cyber-Resilience: Creating an Agenda for Future Research

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
10
0

Year Published

2016
2016
2024
2024

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 10 publications
(10 citation statements)
references
References 0 publications
0
10
0
Order By: Relevance
“…In both cases, Boyes (2015) and Khan and Estay (2015) are not dealing with port or maritime supply chain, but their conclusions and recommendations are valid for our study. Vessels, along with ports, are susceptible to attacks, especially in navigation and identification systems (Newberry, 2014), because these systems are more integrated and complex (Odderstol, 2014).…”
Section: Introductionmentioning
confidence: 70%
See 1 more Smart Citation
“…In both cases, Boyes (2015) and Khan and Estay (2015) are not dealing with port or maritime supply chain, but their conclusions and recommendations are valid for our study. Vessels, along with ports, are susceptible to attacks, especially in navigation and identification systems (Newberry, 2014), because these systems are more integrated and complex (Odderstol, 2014).…”
Section: Introductionmentioning
confidence: 70%
“…Cyber security of the entire supply chain is also a rising risk (Polemi and Papastergiou, 2015). In fact, the research from Khan and Estay (2015) has identified that cyber resilience and cyber risk is a complete new topic in the supply chain research agenda. One of their main conclusion points was that there are no specific frameworks to deal with cyber resilience problems in this industry and thus, they provide relevant insights for both academicians and industry members to tackle the problems of cyberattacks.…”
Section: Introductionmentioning
confidence: 99%
“…This problem is easily remedied, but it is a reflection of other organizational shortcomings in the workforce. Khan et al (2015) notes that the weak links in supply chains are often subject to attack. By analyzed the literature to identify if supply chain models can incorporate "cyber-resilience," they provided recommendations for practice as well as a number of research directions for identifying and securing against cyber-risk in supply chains [37].…”
Section: Privatementioning
confidence: 99%
“…The growing complexity of supply chains, as well as an increasing sophistication in cyber-attacks, suggests that companies must prepare "for the inevitable" [2]. Consequently, it has been suggested that research focus in the area should lean more towards how to build cyberresilient supply chains [3].…”
Section: Introductionmentioning
confidence: 99%
“…However, supply chain cyber risk management is a relatively novel field with only few frameworks available that have been specifically adapted and/or validated for the management of this kind of risks in the supply chain [3], [4].…”
Section: Introductionmentioning
confidence: 99%