2017
DOI: 10.1016/j.cose.2016.12.015
|View full text |Cite
|
Sign up to set email alerts
|

Why a counterfeit risk avoidance strategy fails

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
1
0

Year Published

2017
2017
2025
2025

Publication Types

Select...
4
1
1

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(2 citation statements)
references
References 39 publications
0
1
0
Order By: Relevance
“…The cyber security strategy had influence on Cybersecurity Investment (Barney, 1986;Miyamoto et al, 2017) H4: Financial consideration had influences on Cybersecurity Investment (Gordon & Loeb, 2002;Gordon et al, 2020;Jensen & Meckling, 1976) H5:…”
Section: H1mentioning
confidence: 99%
“…The cyber security strategy had influence on Cybersecurity Investment (Barney, 1986;Miyamoto et al, 2017) H4: Financial consideration had influences on Cybersecurity Investment (Gordon & Loeb, 2002;Gordon et al, 2020;Jensen & Meckling, 1976) H5:…”
Section: H1mentioning
confidence: 99%
“…Unfortunately, vendors are not always able to oversee all parts of the supply chain [38,60]. The constant reduction in transistor size makes IC fabrication an expensive process, and IC designers often outsource the fabrication task to overseas foundries to reduce their costs [35,46,99].…”
Section: Introductionmentioning
confidence: 99%