Trust-Based Information Risk Management in a Supply Chain Network

Author(s):  
Yanjun Zuo ◽  
Wen-Chen Hu

Information risk management is crucial for an organization operating in an increasingly integrated and intensively communicated environment to mitigate risks and ensure core business functions. Given the open and dynamic nature of a supply chain network, information risk management is challenging and various factors must be considered. This article introduces a trust-based approach to facilitate supply chain participants to perform effective risk management. The major components of the proposed framework include supply chain member trust evaluation, data classification, and trust-based decision making. The major purpose of the framework is to control and mitigate information risks that a participant faces in a supply chain network (e.g., risks to information confidentiality, privacy, and integrity). We apply the principle of transitive trust for trust evaluation and use several decision tools for risk analysis and mitigation.

2019 ◽  
Vol 24 (2) ◽  
pp. 215-240 ◽  
Author(s):  
Claudia Colicchia ◽  
Alessandro Creazza ◽  
David A. Menachof

Purpose The purpose of this paper is to explore how companies approach the management of cyber and information risks in their supply chain, what initiatives they adopt to this aim, and to what extent along the supply chain. In fact, the increasing level of connectivity is transforming supply chains, and it creates new opportunities but also new risks in the cyber space. Hence, cyber supply chain risk management (CSCRM) is emerging as a new management construct. The ultimate aim is to help organizations in understanding and improving the CSCRM process and cyber resilience in their supply chains. Design/methodology/approach This research relied on a qualitative approach based on a comparative case study analysis involving five large multinational companies with headquarters, or branches, in the UK. Findings Results highlight the importance for CSCRM to shift the viewpoint from the traditional focus on companies’ internal information technology (IT) infrastructure, able to “firewall themselves” only, to the whole supply chain with a cross-functional approach; initiatives for CSCRM are mainly adopted to “respond” and “recover” without a well-rounded approach to supply chain resilience for a long-term capacity to adapt to changes according to an evolutionary approach. Initiatives are adopted at a firm/dyadic level, and a network perspective is missing. Research limitations/implications This paper extends the current theory on cyber and information risks in supply chains, as a combination of supply chain risk management and resilience, and information risk management. It provides an analysis and classification of cyber and information risks, sources of risks and initiatives to managing them according to a supply chain perspective, along with an investigation of their adoption across the supply chain. It also studies how the concept of resilience has been deployed in the CSCRM process by companies. By laying the first empirical foundations of the subject, this study stimulates further research on the challenges and drivers of initiatives and coordination mechanisms for CSCRM at a supply chain network level. Practical implications Results invite companies to break the “silos” of their activities in CSCRM, embracing the whole supply chain network for better resilience. The adoption of IT security initiatives should be combined with organisational ones and extended beyond the dyad. Where applicable, initiatives should be bi-directional to involve supply chain partners, remove the typical isolation in the CSCRM process and leverage the value of information. Decisions on investments in CSCRM should involve also supply chain managers according to a holistic approach. Originality/value A supply chain perspective in the existing scientific contributions is missing in the management of cyber and information risk. This is one of the first empirical studies dealing with this interdisciplinary subject, focusing on risks that are now very high in the companies’ agenda, but still overlooked. It contributes to theory on information risk because it addresses cyber and information risks in massively connected supply chains through a holistic approach that includes technology, people and processes at an extended level that goes beyond the dyad.


2019 ◽  
Vol 15 (2) ◽  
pp. 54-68 ◽  
Author(s):  
Jian Tan ◽  
Guoqiang Jiang ◽  
Zuogong Wang

In the supply chain network, information sharing between enterprises can produce synergistic effect and improve the benefits. In this article, evolutionary game theory is used to analyse the evolution process of the information sharing behaviour between supply chain network enterprises with different penalties and information sharing risk costs. Analysis and agent-based simulation results show that when the amount of information between enterprises in supply chain networks is very large, it is difficult to form a sharing of cooperation; increase penalties, control cost sharing risk can increase the probability of supply chain information sharing network and shorten the time for information sharing.


Author(s):  
Anisha Banu Dawood Gani ◽  
Yudi Fernando

The objective of this chapter is to discuss the concept and practices of cyber supply chain (CSC) in manufacturing context. Technological advancements are drastically transforming manufacturing industry, which in turn drives the need for a digitally integrated supply chain. While CSC has its share of benefits, it is also vulnerable to cyber threats. In order to mitigate the risks, a comprehensive security measures must be undertaken in the areas of technology, organization, governance, and culture, and integrate them into the company's established risk management processes. To ensure a resilient CSC, all members of the supply chain network must play a role to protect their respective systems from potential breach.


Author(s):  
Anisha Banu Dawood Gani ◽  
Yudi Fernando

The objective of this chapter is to discuss the concept and practices of cyber supply chains (CSC) in the manufacturing context. Technological advancements are drastically transforming the manufacturing industry, which in turn drives the need for a digitally integrated supply chain. While CSC has its share of benefits, it is also vulnerable to cyber threats. In order to mitigate the risks, comprehensive security measures must be undertaken in the areas of technology, organization, governance, and culture, and they must be integrated into the company's established risk management processes. To ensure a resilient CSC, all members of the supply chain network must play a role to protect their respective systems from potential breach.


2016 ◽  
Vol 116 (4) ◽  
pp. 740-758 ◽  
Author(s):  
Hua Song ◽  
Kangkang Yu ◽  
Anirban Ganguly ◽  
Rabia Turson

Purpose – The purpose of this paper is to examine the effect of small and medium enterprises (SMEs)’ supply chain network on influencing credit quality, or more specifically, whether bridging tie (structural network) or strong tie (relational network) of SMEs in the supply chain can improve the availability of equity and debt capital through information sharing. Design/methodology/approach – A survey was conducted in manufacturing industry in China and 208 valid questionnaires were used to test all the hypotheses. The data were then analyzed by employing partial least squares path modeling. Findings – The results suggest that both strong tie and bridging tie of SMEs can lead to a positive effect on information sharing in supply chain, which can further enhance the credit quality for SMEs. However, without information sharing, the strong tie has not significant influence on SMEs’ credit quality, while bridging tie can directly impact on credit quality. Originality/value – Despite their crucial role in sustaining national economies, SMEs are beset by the critical constraint of risk-free financing. Based on a survey, this research finds that the credit quality of SMEs is affected by two important factors: one concerns information sharing in supply chain and the other relates to the attributes of SMEs’ supply chain network. This study implies that a SME may have a financing advantage for better embedding in the supply chain network, but different effects will be experienced according to constraints associated with information asymmetry in the supply chain.


Sign in / Sign up

Export Citation Format

Share Document