2009
DOI: 10.1007/s12063-009-0018-2
|View full text |Cite
|
Sign up to set email alerts
|

Managing supply chain risk and disruption from IT security incidents

Abstract: Supply chain practices often put companies and their supply chains at risk. One of the most serious risks is disruptions. While many types of disruptions have been considered, little attention has been given to disruptions caused by information technology (IT) security incidents. Partner cooperation can assist in preventing or mitigating damage from IT security breaches in supply chains, where breaches can disrupt production, cause loss of essential data, and compromise confidential information. We develop a g… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

1
21
0

Year Published

2014
2014
2024
2024

Publication Types

Select...
4
4

Relationship

0
8

Authors

Journals

citations
Cited by 43 publications
(22 citation statements)
references
References 10 publications
1
21
0
Order By: Relevance
“…Sawik, 2013). Deane et al (2009) developed a model of risk within a supply chain by developing a mixed integer programming model in the form of a network flow problem (Deane et al, 2009). Other models have taken a more operational perspective by introducing stochastic methods in petri-net models (e.g.…”
Section: Past Models Of Risk Measurementmentioning
confidence: 99%
“…Sawik, 2013). Deane et al (2009) developed a model of risk within a supply chain by developing a mixed integer programming model in the form of a network flow problem (Deane et al, 2009). Other models have taken a more operational perspective by introducing stochastic methods in petri-net models (e.g.…”
Section: Past Models Of Risk Measurementmentioning
confidence: 99%
“…The cyber risk of deliberate assaults falls into two categories -direct attacks and indirect attacks. The first category comprises acts such as hacking attacks (Deane et al, 2009;Khursheed et al, 2016;Sharma and Routroy, 2016;Boone, 2017), denial-of-service (Faisal et al, 2007;Deane et al, 2010) or password sniffing (Warren and Hutchinson, 2000) for financial gains. Several authors, for example, Faisal et al (2007) and Tran et al (2016), include the risks of industrial espionage or compromises to intellectual property, under direct attack.…”
Section: Indirect and Direct Attacksmentioning
confidence: 99%
“…In connection with these acts of thoughtlessness, the literature also reports incidents in which employees consciously misuse or even sabotage a company's information. For example, opportunistic misuse of confidential data (Deane et al, 2009) or a premeditated personal vendetta against an employer (Sharma and Routroy, 2016). As the employee cyber threat is internal, whether deliberate or accidental, this is termed an insider threat.…”
Section: Insider Threatmentioning
confidence: 99%
See 1 more Smart Citation
“…A lot of scholars recently indicate uncertainty as a risk factor of supply chain [1,[12][13][14][15][16][17][18]. Regarding such uncertainty in supply chain, Hur et al [2] make mention of the complexity of products as a determinant factor of supply chain structure, and Kim and Ham [19] mention that the types of products, the number of distribution centers and plants, and the types of transportation vehicles are the factors to increase complexity.…”
Section: Complexity Of Supply Chainmentioning
confidence: 99%