BazEkon - The Main Library of the Cracow University of Economics

BazEkon home page

Main menu

Author
Latif Mohd Nasrulddin Abd (Politeknik Mukah Sarawak, Malaysia), Aziz Nurul Ashykin Abd (Universiti Malaysia Kelantan, Malaysia), Hussin Nik Syuhailah Nik (Universiti Malaysia Kelantan, Malaysia), Zuraimi Abdul Aziz (Universiti Malaysia Kelantan, Malaysia)
Title
Cyber Security in Supply Chain Management: a Systematic Review
Bezpieczeństwo cybernetyczne w zarządzaniu łańcuchem dostaw
Source
LogForum, 2021, vol. 17, nr 1, s. 49-57, rys., wykr., bibliogr. 31 poz.
Keyword
Zarządzanie łańcuchem dostaw, Bezpieczeństwo łańcucha dostaw
Supply Chain Management (SCM), Supply chain security
Note
summ., streszcz.
Abstract
Wstęp: Bezpieczeństwo cybernetyczne łańcucha dostaw jest częścią postępowania mającego na celu zapewnienie bezpieczeństwa, które skupia się na zarządzaniu bezpieczeństwem systemów technologicznych, oprogramowania i sieci. Zarządzanie łańcuchem dostaw jest zagrożone cyberatakami terrorystycznymi, złośliwym oprogramowaniem oraz kradzieżą danych. Działania obejmujące bezpieczeństwo cybernetyczne mają na celu minimalizację ryzyk, między innymi zakup tylko do zaufanych dostawców czy niepodłączanie krytycznych urządzeń od zewnętrznych sieci. Metody: Praca oparta jest na przeglądzie publikacji naukowych z latach 2010-2020 w podlegających recenzji czasopismach z baz Web of Science i Scopus. Zastosowano metodo liczne podejście zgodne z zasadami PRISMA, ukazując trendy w dziedzinie bezpieczeństwa cybernetycznego w zarządzaniu łańcuchem dostaw. Wyniki: Wyselekcjonowano 41 publikacji, których tematyka obejmuje bezpieczeństwo cybernetyczne w zarządzaniu łańcuchem dostaw. Przeanalizowano trendy w dziedzinie bezpieczeństwa cybernetycznego w zarządzaniu łańcuchem dostaw. Przeprowadzona analiza wykazała, że najwięcej publikacji ukazało się w 2019 w bazie Scopus. Dodatkowo, wyodrębniono cztery główne elementy badań: bezpieczeństwo sieci, bezpieczeństwo informacji, bezpieczeństwo aplikacji sieciowych oraz Internet rzeczy. Sformułowano kilka sugestii, które mogą być wskazówkami do dalszych badań nad bezpieczeństwem cybernetycznym w zarządzaniu łańcuchem dostaw. (abstrakt oryginalny)

Background: Cyber security of supply chain is a part of its safety measure that focuses on the management of the required cyber security that includes information technology systems, software, and networks. Supply chain management has a high risk of being threatened by cyber terrorism, malware and data-theft. Common supply chain cyber security activities are done to minimize risks including sole-purchase from trusted vendors, and disconnection of critical machines from external networks. Methods: The main data sources for this study are research articles published from 2010 to 2020 in a peer-reviewed journal in the Web of Science and Scopus database. This study uses a systematic survey approach that is guided by PRISMA Statement, where the current study shows the trend of cyber research security in supply chain management. Results: The final screening shows 41 identified related articles that are related to cyber security in supply chain management. This study also examined the publishing trends related to cyber security in supply chain management for both WOS and Scopus databases. The analysis shows that the highest publishing value was in 2019, coming from the Scopus database. In addition, four elements are covered in this study namely: (i) network security; (ii) information security; (iii) web application security and (iv) internet of things (IoT). Conclusions: In brief, some suggestions are proposed to provide guidance for future researchers to study deeper about cyber security in supply chain management. (original abstract)
Full text
Show
Bibliography
Show
  1. Ardito L., Petruzzelli A. M., Panniello U., Garavelli A.C., 2019. Towards Industry 4.0: Mapping digital technologies for supply chain management-marketing integration. Business Process Management Journal, 25(2), 323-346. http://doi.org/10.1108/BPMJ-04-2017-0088
  2. Boyson S., 2014. Cyber supply chain risk management: Revolutionizing the strategic control of critical IT systems. Technovation, 34(7), 342-353. http://doi.org/10.1016/j.technovation.2014.02.001
  3. Cheung K.F., Bell M.G.H., 2019. Attacker-defender model against quantal response adversaries for cyber security in Logistics management: An introductory study. European Journal of Operational Research. http://doi.org/10.1016/j.ejor.2019.10.019
  4. de Vass T., Shee H., Miah S.J., 2018. The Effect of "Internet of Things" on Supply Chain Integration and Performance: An Organisational Capability Perspective. Australasian Journal of Information Systems, 22, 1-29. http://doi.org/10.3127/ajis.v22i0.1734
  5. Durai K.N., Priyadharsini K., 2014. A Survey on Security Properties and Web Application Scanner. International Journal of Computer Science and Mobile Computing, 3(10), 517-527.
  6. Fasco P., 2004. Citation Searching. Online Information Review, 28(6), 454-460.
  7. Fernández-Caramés T.M., Blanco-Novoa O., Froiz-Míguez I., Fraga-Lamas P., 2019. Towards an Autonomous Industry 4.0 Warehouse: A UAV and Blockchain-Based System for Inventory and Traceability Applications in Big Data-Driven Supply Chain Management. Sensors (Basel, Switzerland), 19(10). http://doi.org/10.3390/s19102394
  8. Gaigole M.S., Kalyankar M., 2015. The Study of Network Security With Its Penetrating Attacks and Possible Security Mechanisms. International Journal of Computer Science and Mobile Computing, 4(5), 728-735.
  9. Gajek S., Lees M., Jansen C., 2020. IIoT and cyber-resilience: Could blockchain have thwarted the Stuxnet attack? AI and Society, (0123456789). http://doi.org/10.1007/s00146-020-01023-w
  10. Ge X., Paige R., Polack F., Chivers H., Brooke P., 2006. Agile Development of Secure Web Applications. In The 6th International Conference on Web Engineering, 305-312. Palo Alto.
  11. Jain J., Parashu R.P., 2017. A Recent Study over Cyber Security and its Elements. International Journal of Advanced Research in Computer Science, 8(3), 791-793.
  12. Kizza J., 2013. Guide to Computer Network Security. Springer.
  13. Klos S., Richardson J., Corporation S., 2013. Support Better Cyber Security.
  14. Koien G., Oleshchuk V., 2013. Aspects of Persona Privacy in Communications-Problems, Technology and Solutions. River Publishers.
  15. Kshetri N., Voas J., 2019. Supply chain trust. IT Professional, 21(2), 6-10. https://doi.org/10.1109/MITP.2019.2895423
  16. Mostafa N.A., Hamdy W., Alawady H., 2018. Impacts of Internet of Things on Supply Chains: A Framework for Warehousing. Social Sciences (Special Industry 4.0 Implication for Economy and Society), 84, 1-10. http://doi.org/10.3390/socsci8030084
  17. Osborn E., Simpson A., 2017. On small-scale IT users' system architectures and cyber security: A UK case study. Computers and Security, 70, 27-50. http://doi.org/10.1016/j.cose.2017.05.001
  18. Osborn E., Simpson A., 2018. Risk and the Small-Scale Cyber Security Decision Making Dialogue - A UK Case Study. Computer Journal, 61(4), 472-495. http://doi.org/10.1093/comjnl/bxx093
  19. Pandey S., Singh R.K., 2020. Cyber Security Risks In Globalized Supply Chains: Conceptual Framework. Cyber Security Risks. http://doi.org/10.1108/JGOSS-05-2019-0042
  20. Pandey S., Singh R.K., Gunasekaran A., Kaushik A., 2020. Cyber security risks in globalized supply chains: conceptual framework. Journal of Global Operations and Strategic Sourcing, 13(1), 103-128. http://doi.org/10.1108/JGOSS-05-2019-0042
  21. Phase A., Mhetre N., 2018. Using IoT in Supply Chain Management. International Journal Pf Engineering and Techniques, 4(2), 973-979.
  22. Polatidis N., Pavlidis M., Mouratidis H., 2018. Cyber-attack path discovery in a dynamic supply chain maritime risk management system. Computer Standards and Interfaces, 56, 74-82. http://doi.org/10.1016/j.csi.2017.09.006
  23. Rahman M., 2013. Search Engines Going Beyond Keyword Search: A Survey. International Journal Pf Computer Applications, 75, 1-8.
  24. Ram J., Zhang Z., 2020. Belt and road initiative (BRI) supply chain risks: propositions and model development. International Journal of Logistics Management. http://doi.org/10.1108/IJLM-12-2019-0366
  25. SANS Technology Instirute. (2020). Predictions and Trends for Information, Computer and Network Security. Retrieved from https://www.sans.edu/cyber-research
  26. Seemma P., Nandhini S., Sowmiya M., 2018. Overview of Cyber Security. International Journal of Advanced Research in Computer and Communication Engineering, 7(11), 125-128. http://doi.org/10.17148/IJARCCE.2018.71127
  27. Tamy S., Belhadaoui H., Rabbah N., Rifi M., 2020. Cyber security based machine learning algorithms applied to industry 4.0 application case: Development of network intrusion detection system using hybrid method. Journal of Theoretical and Applied Information Technology, 98(12), 2078-2091.
  28. Taneja M., 2013. An Analytics Framework to Detect Compromised IOT Devices Using Mobility Behaviour. In ICT Convergence (ICTC) on. IEEE, 38-43.
  29. Urquhart L., McAuley D., 2018. Avoiding the internet of insecure industrial things. Computer Law and Security Review, 34(3), 450-466. http://doi.org/10.1016/j.clsr.2017.12.004
  30. Wright K., Golder S., Rodriguez-Lopez R., 2014. Citation Searching: A Systematic Review Case Study of Multiple Risk Behaviour Interventions. Medical Research Methodology, 14(73), 1-8.
  31. Zhu J., 2020. A Tale of Two Databases: The Use of Web of Science and Scopus in Academic Papers. Forthcoming in Scientometrics.
Cited by
Show
ISSN
1895-2038
Language
eng
URI / DOI
http://dx.doi.org/10.17270/J.LOG.2021.555
Share on Facebook Share on Twitter Share on Google+ Share on Pinterest Share on LinkedIn Wyślij znajomemu