2016 IEEE Systems and Information Engineering Design Symposium (SIEDS) 2016
DOI: 10.1109/sieds.2016.7489299
|View full text |Cite
|
Sign up to set email alerts
|

Systems-based cyber security in the supply chain

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
10
0

Year Published

2017
2017
2023
2023

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 12 publications
(10 citation statements)
references
References 1 publication
0
10
0
Order By: Relevance
“…First, Stephens and Valverde (2013) point out in their research study the growing importance of security in the field of procurement and supply chain management, especially 969 Digitisation of procurement and supply chains with regard to a number of virtual information flows and automated transactions. Barron et al (2016) highlight cybersecurity in the supply chain overall and possible risks for organisations in cases of a malevolent attack. Therefore, it is essential to extend the developments of security and related security systems within the supply chain based on a common approach by including all supply chain parties and create common solutions and systems to secure the future common supply chain ecosystems against external violence ( Johnson, 2013).…”
Section: Procurement and Digitisationmentioning
confidence: 99%
See 1 more Smart Citation
“…First, Stephens and Valverde (2013) point out in their research study the growing importance of security in the field of procurement and supply chain management, especially 969 Digitisation of procurement and supply chains with regard to a number of virtual information flows and automated transactions. Barron et al (2016) highlight cybersecurity in the supply chain overall and possible risks for organisations in cases of a malevolent attack. Therefore, it is essential to extend the developments of security and related security systems within the supply chain based on a common approach by including all supply chain parties and create common solutions and systems to secure the future common supply chain ecosystems against external violence ( Johnson, 2013).…”
Section: Procurement and Digitisationmentioning
confidence: 99%
“…Furthermore, the survey results highlight the support function of predictive analytical tools and algorithms to automate and speed-up transactions and processes. Due to the increasing amount of virtual information flows and automated transactions the importance of cybersecurity is rapidly increasing (Barron et al, 2016). The survey results point out the importance to manage this issue based on a cross-functional approach including all supply chain parties to define appropriate solutions and systems to ensure the security of the common supply chain ecosystems against external violence.…”
Section: Digitisation and Technologiesmentioning
confidence: 99%
“…Designing a standard data transmission protocol for communication and information transmission within IIP that is agreed upon by all stakeholder for smooth data transfer will also be crucial (Haddud et al , 2016; Zolnowski et al , 2016). Process redesign will prompt need of cybersecurity and trust with increase in automated transactions, availability of data and wireless transmission (Barron et al , 2016; Stephens and Valverde, 2014). Privacy and security concerns will intensify in buyer supplier relationship as more data will be exchanged (Osmonbekov and Johnston, 2018).…”
Section: Discussionmentioning
confidence: 99%
“…Fu et al [21] acknowledge that the SC is subject to both internal and external risks. Barron et al [52] argue that the introduction of new technology into the SC introduces new risks, making SC risk management difficult. BC characteristics such as traceability, transparency and smart contracts can help with the identification of risks in the SC.…”
Section: ) Risk Managementmentioning
confidence: 99%