Design and Risk Management of Flexible Supply Chain Network Influenced on Vulnerability Modeling

Author(s):  
He Tao ◽  
Liang Zhidong ◽  
Ye Xinquan ◽  
Pang Jihongn
Author(s):  
Yanjun Zuo ◽  
Wen-Chen Hu

Information risk management is crucial for an organization operating in an increasingly integrated and intensively communicated environment to mitigate risks and ensure core business functions. Given the open and dynamic nature of a supply chain network, information risk management is challenging and various factors must be considered. This article introduces a trust-based approach to facilitate supply chain participants to perform effective risk management. The major components of the proposed framework include supply chain member trust evaluation, data classification, and trust-based decision making. The major purpose of the framework is to control and mitigate information risks that a participant faces in a supply chain network (e.g., risks to information confidentiality, privacy, and integrity). We apply the principle of transitive trust for trust evaluation and use several decision tools for risk analysis and mitigation.


Author(s):  
Anisha Banu Dawood Gani ◽  
Yudi Fernando

The objective of this chapter is to discuss the concept and practices of cyber supply chain (CSC) in manufacturing context. Technological advancements are drastically transforming manufacturing industry, which in turn drives the need for a digitally integrated supply chain. While CSC has its share of benefits, it is also vulnerable to cyber threats. In order to mitigate the risks, a comprehensive security measures must be undertaken in the areas of technology, organization, governance, and culture, and integrate them into the company's established risk management processes. To ensure a resilient CSC, all members of the supply chain network must play a role to protect their respective systems from potential breach.


Author(s):  
Anisha Banu Dawood Gani ◽  
Yudi Fernando

The objective of this chapter is to discuss the concept and practices of cyber supply chains (CSC) in the manufacturing context. Technological advancements are drastically transforming the manufacturing industry, which in turn drives the need for a digitally integrated supply chain. While CSC has its share of benefits, it is also vulnerable to cyber threats. In order to mitigate the risks, comprehensive security measures must be undertaken in the areas of technology, organization, governance, and culture, and they must be integrated into the company's established risk management processes. To ensure a resilient CSC, all members of the supply chain network must play a role to protect their respective systems from potential breach.


2019 ◽  
Vol 24 (2) ◽  
pp. 215-240 ◽  
Author(s):  
Claudia Colicchia ◽  
Alessandro Creazza ◽  
David A. Menachof

Purpose The purpose of this paper is to explore how companies approach the management of cyber and information risks in their supply chain, what initiatives they adopt to this aim, and to what extent along the supply chain. In fact, the increasing level of connectivity is transforming supply chains, and it creates new opportunities but also new risks in the cyber space. Hence, cyber supply chain risk management (CSCRM) is emerging as a new management construct. The ultimate aim is to help organizations in understanding and improving the CSCRM process and cyber resilience in their supply chains. Design/methodology/approach This research relied on a qualitative approach based on a comparative case study analysis involving five large multinational companies with headquarters, or branches, in the UK. Findings Results highlight the importance for CSCRM to shift the viewpoint from the traditional focus on companies’ internal information technology (IT) infrastructure, able to “firewall themselves” only, to the whole supply chain with a cross-functional approach; initiatives for CSCRM are mainly adopted to “respond” and “recover” without a well-rounded approach to supply chain resilience for a long-term capacity to adapt to changes according to an evolutionary approach. Initiatives are adopted at a firm/dyadic level, and a network perspective is missing. Research limitations/implications This paper extends the current theory on cyber and information risks in supply chains, as a combination of supply chain risk management and resilience, and information risk management. It provides an analysis and classification of cyber and information risks, sources of risks and initiatives to managing them according to a supply chain perspective, along with an investigation of their adoption across the supply chain. It also studies how the concept of resilience has been deployed in the CSCRM process by companies. By laying the first empirical foundations of the subject, this study stimulates further research on the challenges and drivers of initiatives and coordination mechanisms for CSCRM at a supply chain network level. Practical implications Results invite companies to break the “silos” of their activities in CSCRM, embracing the whole supply chain network for better resilience. The adoption of IT security initiatives should be combined with organisational ones and extended beyond the dyad. Where applicable, initiatives should be bi-directional to involve supply chain partners, remove the typical isolation in the CSCRM process and leverage the value of information. Decisions on investments in CSCRM should involve also supply chain managers according to a holistic approach. Originality/value A supply chain perspective in the existing scientific contributions is missing in the management of cyber and information risk. This is one of the first empirical studies dealing with this interdisciplinary subject, focusing on risks that are now very high in the companies’ agenda, but still overlooked. It contributes to theory on information risk because it addresses cyber and information risks in massively connected supply chains through a holistic approach that includes technology, people and processes at an extended level that goes beyond the dyad.


Sign in / Sign up

Export Citation Format

Share Document