ABSTRACT: The past year has seen critical fluctuations in business operations throughout the US and the world. Due to COVID-19, employees have been encouraged or forced to work from home instead of commuting to a regular work location. Remote work has disrupted and weakened security processes. Cyber criminals have seen an opportunity in this weakened infrastructure. Cybersecurity attacks have disrupted supply chains for businesses, schools, healthcare organizations and other entities. Organizations will need to reassess security strategies with the assumption that work-from-home will become permanent. The US Department of Homeland Security has stepped up its efforts to meet this risk head-on and has incorporated supply chain cybersecurity ...
Recent catastrophic events, such as terrorist attacks, nat-ural disasters, and pandemics, have drawn...
The emerging Cyber Supply Chain Risk Management (C-SCRM) concept assists at all levels of the supply...
Reports on supply chains as major sources of cybersecurity threats. Companies and organizations incr...
The same Information and Communication Technologies (ICT) that have contributed tremendously to the ...
ABSTRACT: There have been many unprecedented changes in the Customs-Trade Partnership Against Terror...
Purpose: Despite growing research interest in cyber security, inter-firm based cyber risk studies ar...
Companies have continued to place a premium on the management of their supply-chain. Through an effe...
This paper aims to examine the current status and future direction of cybersecurity processes in sup...
Supply chains are increasingly targeted by threat actors. Using a recent taxonomy, we contrast the d...
The global economy can be viewed today as a myriad of border-crossing supply chain networks of produ...
Supply chain security continues to be an overlooked field with consequences that can disrupt industr...
In the last few decades, supply chain success has been achieved through management techniques that h...
Objective. This study examines the cybersecurity measures currently in place to protect the United S...
In the aftermath of the terrorist attacks of September 11, 2001, it became apparent that the way org...
The perception of maritime security in the post 9/11 era has dramatically shifted to a focus of prev...
Recent catastrophic events, such as terrorist attacks, nat-ural disasters, and pandemics, have drawn...
The emerging Cyber Supply Chain Risk Management (C-SCRM) concept assists at all levels of the supply...
Reports on supply chains as major sources of cybersecurity threats. Companies and organizations incr...
The same Information and Communication Technologies (ICT) that have contributed tremendously to the ...
ABSTRACT: There have been many unprecedented changes in the Customs-Trade Partnership Against Terror...
Purpose: Despite growing research interest in cyber security, inter-firm based cyber risk studies ar...
Companies have continued to place a premium on the management of their supply-chain. Through an effe...
This paper aims to examine the current status and future direction of cybersecurity processes in sup...
Supply chains are increasingly targeted by threat actors. Using a recent taxonomy, we contrast the d...
The global economy can be viewed today as a myriad of border-crossing supply chain networks of produ...
Supply chain security continues to be an overlooked field with consequences that can disrupt industr...
In the last few decades, supply chain success has been achieved through management techniques that h...
Objective. This study examines the cybersecurity measures currently in place to protect the United S...
In the aftermath of the terrorist attacks of September 11, 2001, it became apparent that the way org...
The perception of maritime security in the post 9/11 era has dramatically shifted to a focus of prev...
Recent catastrophic events, such as terrorist attacks, nat-ural disasters, and pandemics, have drawn...
The emerging Cyber Supply Chain Risk Management (C-SCRM) concept assists at all levels of the supply...
Reports on supply chains as major sources of cybersecurity threats. Companies and organizations incr...