E‐Commerce supply chains with considerations of cyber‐security: Should governments play a role?

Author(s):  
Suyuan Luo ◽  
Tsan‐Ming Choi
Keyword(s):  
2020 ◽  
Vol 13 (1) ◽  
pp. 103-128 ◽  
Author(s):  
Shipra Pandey ◽  
Rajesh Kumar Singh ◽  
Angappa Gunasekaran ◽  
Anjali Kaushik

Purpose The purpose of this study is to examine cyber security risks in globalized supply chains (SCs). It has been seen to have a greater impact on the performance of SCs. The information and communication technology of a firm, which enhances the efficiency and effectiveness in the SC, could simultaneously be the cause of vulnerabilities and exposure to security threats. Researchers have primarily focussed on the cyber-physical system (CPS) vulnerabilities impacting SC. This paper tries to categorize the cyber security risks occurring because of the SCs operating in CPS. Design/methodology/approach Based on the flow of information along the upstream and downstream SC, this paper tries to identify cyber security risks in the global SCs. It has further tried to categorize these cyber security risks from a strategic point of view. Findings This paper tries to identify the various cyber security risk and cyber-attacks in globalized SC for improving the performance. The 16 cyber security risks have been categorized into three categories, namely, supply risk, operational risk and demand risk. The paper proposes a framework consisting of different cyber-attacks across the information that flows in global SCs along-with suitable mitigation strategies. Research limitations/implications The paper presents the conceptual model of cyber security risks and cyber-attacks in globalized SCs based on literature review and industry experts. Further validation and scale development of these risks can be done through empirical study. Practical implications This paper provides significant managerial insights by developing a framework for understanding the cyber security risks in terms of the drivers of these risks and how to deal with them. From a managerial perspective, this framework can be used as a decision-making process while considering different cyber security risks across the stages of globalized SCs. Originality/value The major contribution of this study is the identification and categorization of cyber security risks across the global SCs in the digital age. Thus, this paper introduces a new phenomenon to the field of management that has the potential to investigate new areas of future research. Based on the categorization, the paper provides insights on how cyber security risks impact the continuity of SC operations.


2019 ◽  
Vol 25 (2) ◽  
pp. 223-240 ◽  
Author(s):  
Abhijeet Ghadge ◽  
Maximilian Weiß ◽  
Nigel D. Caldwell ◽  
Richard Wilding

Purpose In spite of growing research interest in cyber security, inter-firm based cyber risk studies are rare. Therefore, this study aims to investigate cyber risk management in supply chain contexts. Design/methodology/approach Adapting a systematic literature review process, papers from interdisciplinary areas published between 1990 and 2017 were selected. Different typologies, developed for conducting descriptive and thematic analysis, were established using data mining techniques to conduct a comprehensive, replicable and transparent review. Findings The review identifies multiple future research directions for cyber security/resilience in supply chains. A conceptual model is developed, which indicates a strong link between information technology, organisational and supply chain security systems. The human/behavioural elements within cyber security risk are found to be critical; however, behavioural risks have attracted less attention because of a perceived bias towards technical (data, application and network) risks. There is a need for raising risk awareness, standardised policies, collaborative strategies and empirical models for creating supply chain cyber-resilience. Research limitations/implications Different types of cyber risks and their points of penetration, propagation levels, consequences and mitigation measures are identified. The conceptual model developed in this study drives an agenda for future research on supply chain cyber security/resilience. Practical implications A multi-perspective, systematic study provides a holistic guide for practitioners in understanding cyber-physical systems. The cyber risk challenges and the mitigation strategies identified support supply chain managers in making informed decisions. Originality/value To the best of the authors’ knowledge, this is the first systematic literature review on managing cyber risks in supply chains. The review defines supply chain cyber risk and develops a conceptual model for supply chain cyber security systems and an agenda for future studies.


Electronics ◽  
2020 ◽  
Vol 9 (11) ◽  
pp. 1864
Author(s):  
Theresa Sobb ◽  
Benjamin Turnbull ◽  
Nour Moustafa

Supply chain 4.0 denotes the fourth revolution of supply chain management systems, integrating manufacturing operations with telecommunication and Information Technology processes. Although the overarching aim of supply chain 4.0 is the enhancement of production systems within supply chains, making use of global reach, increasing agility and emerging technology, with the ultimate goal of increasing efficiency, timeliness and profitability, Supply chain 4.0 suffers from unique and emerging operational and cyber risks. Supply chain 4.0 has a lack of semantic standards, poor interoperability, and a dearth of security in the operation of its manufacturing and Information Technology processes. The technologies that underpin supply chain 4.0 include blockchain, smart contracts, applications of Artificial Intelligence, cyber-physical systems, Internet of Things and Industrial Internet of Things. Each of these technologies, individually and combined, create cyber security issues that should be addressed. This paper explains the nature of the military supply chains 4.0 and how it uniquely differs from the commercial supply chain, revealing their strengths, weaknesses, dependencies and the fundamental technologies upon which they are built. This encompasses an assessment of the cyber risks and opportunities for research in the field, including consideration of connectivity, sensing and convergence of systems. Current and emerging semantic models related to the standardization, development and safety assurance considerations for implementing new technologies into military supply chains 4.0 are also discussed. This is examined from a holistic standpoint and through technology-specific lenses to determine current states and implications for future research directions.


2021 ◽  
pp. 102536
Author(s):  
Naeem Firdous Syed ◽  
Syed W. Shah ◽  
Rolando Trujillo-Rasua ◽  
Robin Doss

Significance Reports of cybercrimes increased by 13% in the financial year to June 2021, according to the Australian Cyber Security Centre (ACSC). Agencies linked to foreign governments and criminal enterprises have both become more active, targeting essential services and critical infrastructure in sectors including healthcare, energy and telecoms. Impacts The costs of cybercrime, particularly ransomware attacks, will rise as criminals choose targets that are insured. Supply chains are highly vulnerable, with distribution channels for COVID-19 vaccines becoming a particular target. Businesses will need to strengthen their guard against state-sponsored efforts to steal intellectual property through cyber theft.


2021 ◽  
Vol 122 ◽  
pp. 102888
Author(s):  
Han Zou ◽  
Maged M. Dessouky ◽  
Shichun Hu

2012 ◽  
Author(s):  
Michael McNeese ◽  
Nancy J. Cooke ◽  
Anita D'Amico ◽  
Mica R. Endsley ◽  
Cleotilde Gonzalez ◽  
...  
Keyword(s):  

2020 ◽  
Vol 02 (03/04) ◽  
pp. 60-61
Author(s):  
Jörg Schlüchtermann ◽  
Johannes Heller

Insbesondere in komplexen Supply Chains ist es heute üblich, dass Kunden ihre Lieferanten über Selbstverpflichtungserklärungen (Codes of Conduct) steuern. Forschungen aus anderen Industrien zeigen die Möglichkeiten, aber auch Grenzen der Arbeit mit diesem Instrument des Lieferantenmanagements. Davon können auch Krankenhauseinkäufer profitieren.


Sign in / Sign up

Export Citation Format

Share Document