This dissertation provides empirical and theoretical support for the antecedents and consequences of cyber resilience via three essays on cyber resilience. Essay 1 comprises 2 studies using a multi-method empirical research effort to determine whether emphasizing suppliers' implementation and use of business continuity management (S-BCM) is actually beneficial to buyers. In Study 1, data from 150 managers was collected via a survey-based questionnaire to determine whether buyers' adoption of monitoring supplier operational performance (MS-OP) and monitoring S-BCM (MS-BCM) enhances S-BCM implementation and use. Evidence from Study 1 suggests that MS-BCM is more effective than MS-OP. Moreover, the results suggest that while buyer power positi...
PurposeThe purpose of this paper is to explore how companies approach the management of cyber and in...
PurposeThe purpose of this paper is to explore how companies approach the management of cyber and in...
PurposeThe purpose of this paper is to explore how companies approach the management of cyber and in...
Risk management and resilience strategies in supply chains have an important role in ensuring busine...
Risk management and resilience strategies in supply chains have an important role in ensuring busine...
Risk management and resilience strategies in supply chains have an important role in ensuring busine...
This study considers two major disruptions for modern supply chains: IT and cyber risks. As they may...
Purpose: Despite growing research interest in cyber security, inter-firm based cyber risk studies ar...
Purpose The purpose of this paper is to explore how companies approach the management of cyber and i...
Purpose The purpose of this paper is to explore how companies approach the management of cyber and i...
Purpose The purpose of this paper is to explore how companies approach the management of cyber and i...
This study considers two major disruptions for modern supply chains: IT and Cyber risks. As they may...
Purpose The purpose of this paper is to explore how companies approach the management of cyber and i...
Purpose The purpose of this paper is to explore how companies approach the management of cyber and i...
Purpose The purpose of this paper is to explore how companies approach the management of cyber and i...
PurposeThe purpose of this paper is to explore how companies approach the management of cyber and in...
PurposeThe purpose of this paper is to explore how companies approach the management of cyber and in...
PurposeThe purpose of this paper is to explore how companies approach the management of cyber and in...
Risk management and resilience strategies in supply chains have an important role in ensuring busine...
Risk management and resilience strategies in supply chains have an important role in ensuring busine...
Risk management and resilience strategies in supply chains have an important role in ensuring busine...
This study considers two major disruptions for modern supply chains: IT and cyber risks. As they may...
Purpose: Despite growing research interest in cyber security, inter-firm based cyber risk studies ar...
Purpose The purpose of this paper is to explore how companies approach the management of cyber and i...
Purpose The purpose of this paper is to explore how companies approach the management of cyber and i...
Purpose The purpose of this paper is to explore how companies approach the management of cyber and i...
This study considers two major disruptions for modern supply chains: IT and Cyber risks. As they may...
Purpose The purpose of this paper is to explore how companies approach the management of cyber and i...
Purpose The purpose of this paper is to explore how companies approach the management of cyber and i...
Purpose The purpose of this paper is to explore how companies approach the management of cyber and i...
PurposeThe purpose of this paper is to explore how companies approach the management of cyber and in...
PurposeThe purpose of this paper is to explore how companies approach the management of cyber and in...
PurposeThe purpose of this paper is to explore how companies approach the management of cyber and in...