2019
DOI: 10.1016/j.procs.2019.01.108
|View full text |Cite
|
Sign up to set email alerts
|

Information systems for supply chain management: uncertainties, risks and cyber security

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
26
0
3

Year Published

2020
2020
2024
2024

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 61 publications
(29 citation statements)
references
References 6 publications
0
26
0
3
Order By: Relevance
“…Colicchia et al (2019) found that employees are increasingly being used as tool for malicious attacks. This assertion supports (Boiko et al, 2019) where the researchers found that end-suppliers, subcontractors, third-party personnel underestimate the risk cyber vulnerabilities associated with loopholes in their corporate network, cloud, and end-device infrastructure; as a result, some personnel will connect various Internet of Things (IoT) devices to their organization's dynamic network infrastructure. Security managers struggle to identify cyber warnings from connected IoT devices and consequently, the responsible employee in the case of an attack on IoT devices (Boiko et al, 2019).…”
Section: Supply Chain Cybersecurity Ethical Considerationmentioning
confidence: 59%
See 4 more Smart Citations
“…Colicchia et al (2019) found that employees are increasingly being used as tool for malicious attacks. This assertion supports (Boiko et al, 2019) where the researchers found that end-suppliers, subcontractors, third-party personnel underestimate the risk cyber vulnerabilities associated with loopholes in their corporate network, cloud, and end-device infrastructure; as a result, some personnel will connect various Internet of Things (IoT) devices to their organization's dynamic network infrastructure. Security managers struggle to identify cyber warnings from connected IoT devices and consequently, the responsible employee in the case of an attack on IoT devices (Boiko et al, 2019).…”
Section: Supply Chain Cybersecurity Ethical Considerationmentioning
confidence: 59%
“…This assertion supports (Boiko et al, 2019) where the researchers found that end-suppliers, subcontractors, third-party personnel underestimate the risk cyber vulnerabilities associated with loopholes in their corporate network, cloud, and end-device infrastructure; as a result, some personnel will connect various Internet of Things (IoT) devices to their organization's dynamic network infrastructure. Security managers struggle to identify cyber warnings from connected IoT devices and consequently, the responsible employee in the case of an attack on IoT devices (Boiko et al, 2019). Colicchia et al (2019) stated that cybersecurity non-compliant behaviors are deliberate choices that could lead to underestimating the consequences of actions on the supply chain, with oblivious victims of a cyber-attack.…”
Section: Supply Chain Cybersecurity Ethical Considerationmentioning
confidence: 59%
See 3 more Smart Citations