The current trend of increasing networks among companies is greatly enabled by the ICT solutions. This increased use of computerizes systems even interorganizationally creates new risks for companies. Firms should be able to plan and understand their ICT risks in the networked context. There should be a means how to assess and evaluate the firm's risks and dependencies of different information systems and information system providers. This study clarifies this topical and important issue. The paper presents the challenges of ICT supported business and the perceived risks on the basis of a case study and proposes an example framework for risk management and security policy development in supply networks
AbstractSupply chains in today's globalization are very vulnerable to risks such as natural disaster...
This study considers two major disruptions for modern supply chains: IT and Cyber risks. As they may...
Maritime information infrastructures have developed to highly interrelated cyber ecosystems, where p...
Increasing product/service complexity, outsourcing and globalisation have led to increasingly comple...
This chapter describes the potential impact of Information Technology (IT) and cyber risks on the co...
This paper deals with risk management in supplier networks. The primary aim is to illustrate challen...
This paper deals with risk management in supplier networks. The primary aim is to illustrate challen...
The purpose of this paper is to analyze when and how IT risks and Cyber risks impact on the continui...
Purpose The purpose of this paper is to explore how companies approach the management of cyber and i...
Purpose The purpose of this paper is to explore how companies approach the management of cyber and i...
Purpose The purpose of this paper is to explore how companies approach the management of cyber and i...
Purpose The purpose of this paper is to explore how companies approach the management of cyber and i...
Purpose The purpose of this paper is to explore how companies approach the management of cyber and i...
Purpose The purpose of this paper is to explore how companies approach the management of cyber and i...
Maritime information infrastructures have developed to highly interrelated cyber ecosystems, where p...
AbstractSupply chains in today's globalization are very vulnerable to risks such as natural disaster...
This study considers two major disruptions for modern supply chains: IT and Cyber risks. As they may...
Maritime information infrastructures have developed to highly interrelated cyber ecosystems, where p...
Increasing product/service complexity, outsourcing and globalisation have led to increasingly comple...
This chapter describes the potential impact of Information Technology (IT) and cyber risks on the co...
This paper deals with risk management in supplier networks. The primary aim is to illustrate challen...
This paper deals with risk management in supplier networks. The primary aim is to illustrate challen...
The purpose of this paper is to analyze when and how IT risks and Cyber risks impact on the continui...
Purpose The purpose of this paper is to explore how companies approach the management of cyber and i...
Purpose The purpose of this paper is to explore how companies approach the management of cyber and i...
Purpose The purpose of this paper is to explore how companies approach the management of cyber and i...
Purpose The purpose of this paper is to explore how companies approach the management of cyber and i...
Purpose The purpose of this paper is to explore how companies approach the management of cyber and i...
Purpose The purpose of this paper is to explore how companies approach the management of cyber and i...
Maritime information infrastructures have developed to highly interrelated cyber ecosystems, where p...
AbstractSupply chains in today's globalization are very vulnerable to risks such as natural disaster...
This study considers two major disruptions for modern supply chains: IT and Cyber risks. As they may...
Maritime information infrastructures have developed to highly interrelated cyber ecosystems, where p...