2017
DOI: 10.2139/ssrn.3492687
|View full text |Cite
|
Sign up to set email alerts
|

Analyzing and Fixing Cyber Security Threats for Supply Chain Management

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
8
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 7 publications
(10 citation statements)
references
References 0 publications
0
8
0
Order By: Relevance
“…These articles report small numbers of published articles on BD in PSM-related domains. Rozados and Tjahjono (2014), Barbosa et al, (2018), and Chehbi-Gamoura and Derrouiche (2017) did not analyze the content of the publications, while Wang et al, (2016), Lamba and Singh (2017), and Nguyen et al, (2017) studied BD applications in supplier selection, supply spending/sourcing costs, and supply risk management processes. Nguyen et al, (2017) relate BD to levels of analytics and report that BD in the area of PSM is applied using descriptive, predictive, and prescriptive analytics, and Rozados and Tjahjono (2014) list 25 data sources of relevance to PSM.…”
Section: A Closer Look At the Literature Review Papersmentioning
confidence: 99%
See 3 more Smart Citations
“…These articles report small numbers of published articles on BD in PSM-related domains. Rozados and Tjahjono (2014), Barbosa et al, (2018), and Chehbi-Gamoura and Derrouiche (2017) did not analyze the content of the publications, while Wang et al, (2016), Lamba and Singh (2017), and Nguyen et al, (2017) studied BD applications in supplier selection, supply spending/sourcing costs, and supply risk management processes. Nguyen et al, (2017) relate BD to levels of analytics and report that BD in the area of PSM is applied using descriptive, predictive, and prescriptive analytics, and Rozados and Tjahjono (2014) list 25 data sources of relevance to PSM.…”
Section: A Closer Look At the Literature Review Papersmentioning
confidence: 99%
“…Facebook, Twitter, discussion forums) [1,6,7,9,14,15,17,23,24,25] Trends, the deviant performance of suppliers, public and private perceptions, scandals, risk and disruption signals Market (e.g. company profiles, market research companies, the stock market, electronic marketplaces, exhibitions) [4,8,9,11,14,15,17,21,20,22] Tax data, competitors, supplier possibilities, economic and market trends, innovations, indicators Media (e.g. news, websites, records, reports) [1,7,9,15,17] Financial news on suppliers or competitors, trends…”
Section: Externalmentioning
confidence: 99%
See 2 more Smart Citations
“…Organisations are more focused on boosting the technology investment to protect themselves against external cyberattacks, and not enough emphasis is put on the insider threat aspects (Safa et al 2019). Effective cybersecurity measures cannot be realised when the roles of users are not taken into consideration, as threats and attacks from employees may have a negative impact on the operation of the organisation's computer systems (Lamba et al 2019). Furthermore, Clarke (2018) found that organisations are not putting enough effort towards reducing cybersecurity insider threats to improve their security posture and foster organisational culture change in security behaviour.…”
Section: Introductionmentioning
confidence: 99%