Supply Chain Risk Management 2017
DOI: 10.1007/978-981-10-4106-8_5
|View full text |Cite
|
Sign up to set email alerts
|

Managing IT and Cyber Risks in Supply Chains

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
5
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
5
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 15 publications
(5 citation statements)
references
References 37 publications
0
5
0
Order By: Relevance
“…1. Compliance: In the context of supply chain cyber risk management, risk compliance can be understood as to identifying and conforming to the legislation affecting this area, as well as to the standards that must be met [4].…”
Section: A Research Themesmentioning
confidence: 99%
See 3 more Smart Citations
“…1. Compliance: In the context of supply chain cyber risk management, risk compliance can be understood as to identifying and conforming to the legislation affecting this area, as well as to the standards that must be met [4].…”
Section: A Research Themesmentioning
confidence: 99%
“…This proposed dynamic approach positions all the identified themes in a sort of timeline, position related to to how each element interacts in time, both 1) with the prevention of, response to, and recovery from cyber risk events, as well as with their 2) short, medium or longterm effects. As a result, the main elements from section III are represented on a timeline as shown in Fig 3. The order of the elements shown in the timeline is derived from literature, as it has been argued that Compliance can be regarded as the precedent for the management of cyber risks, where the risks and security standards to conform to exert influence into the risk assessment process [4], which forms part of Situational Awareness. Good situation awareness in the context of supply chain resilience leads to the understanding of the vulnerabilities of the supply chain and the planning for risk events, allowing for the elaboration of early warning strategies or continuity planning and the identification of supporting elements needed for them, like information sharing, coordination, and the availability of knowledge [7].…”
Section: A Description Of the Frameworkmentioning
confidence: 99%
See 2 more Smart Citations
“…As a result of the use of advanced information and communication technology, especially the danger that comes from communicating through the Internet, various forms of cyber threats have also increased. The severity and complexity of these attacks have serious business consequences [3], [4], [5], [6], [7].…”
Section: Introductionmentioning
confidence: 99%