2016
DOI: 10.24924/ijise/2016.11/v4.iss2/58.68
|View full text |Cite
|
Sign up to set email alerts
|

Information Security Risks in Supply Chain Management:

Abstract: The security of information is up most important for not only organisations but also their supply chains. Based on literature review, the study proposes a framework implementing information protection that supports supply chain management at intra-organisational and interorganisational levels in the developing country context. The paper suggests that developing countries' dimensions of power distance, uncertainty avoidance, and collectivism actively support information protection practices in supply chain mana… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
4
1
1

Relationship

0
6

Authors

Journals

citations
Cited by 7 publications
(3 citation statements)
references
References 37 publications
(52 reference statements)
0
3
0
Order By: Relevance
“…Consequently, SC are more frequently changed and composed differently. Also, controlling data in a digital SC cannot be restricted to a single area that is governed by a single organization, as it does not lie within the borders of a single organization [16], [35]. Hence, this increased dynamic challenges traditional approaches of SCRM.…”
Section: Characteristics Of the Digital Supply Chainmentioning
confidence: 99%
See 1 more Smart Citation
“…Consequently, SC are more frequently changed and composed differently. Also, controlling data in a digital SC cannot be restricted to a single area that is governed by a single organization, as it does not lie within the borders of a single organization [16], [35]. Hence, this increased dynamic challenges traditional approaches of SCRM.…”
Section: Characteristics Of the Digital Supply Chainmentioning
confidence: 99%
“…Many companies have attempted to reduce their providers and establish better relationships with main partners, in the aim of establishing a secure infrastructure and of preventing unauthorized persons from disclosure, e.g. [35], [34], [13]. Another way is to implement auditing procedures [52].…”
Section: Technical Viewmentioning
confidence: 99%
“…Second, this study enhances the landscape of information security research within the OM domain. While some OM studies have emphasized information security as a critical aspect of supply chain operations (Ulhaq et al, 2016; Williams et al, 2008), they have often neglected to delve into the specific influence of information security on enterprise operations and supply chain decision‐making. Furthermore, there remains a scarcity of empirical research on information security within the OM field (Massimino et al, 2018).…”
Section: Discussionmentioning
confidence: 99%