2007
DOI: 10.1080/00207540601020544
|View full text |Cite
|
Sign up to set email alerts
|

A critical balance: collaboration and security in the IT-enabled supply chain

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

2
124
0
4

Year Published

2011
2011
2022
2022

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 129 publications
(130 citation statements)
references
References 29 publications
2
124
0
4
Order By: Relevance
“…In this case ontology is more specific than category from [14]. -Misuse and sabotage: Closely related with Vulnerability.…”
Section: Various Forms Of Attacks In the Form Of Spoofing Masqueradimentioning
confidence: 99%
See 4 more Smart Citations
“…In this case ontology is more specific than category from [14]. -Misuse and sabotage: Closely related with Vulnerability.…”
Section: Various Forms Of Attacks In the Form Of Spoofing Masqueradimentioning
confidence: 99%
“…Particularly interesting is to consider its relationship with the following six general categories of information technology risk [14]. Note that concept mapping between these general categories and INTECO-CERT categories provides useful insights to enrich the description of action classes related with them.…”
Section: Features Of Descriptional Ontological Levelmentioning
confidence: 99%
See 3 more Smart Citations