Cybersecurity and Cyber-Resilient Supply Chains
نویسندگان
چکیده
منابع مشابه
Design of Resilient Supply Chains with Risk of Facility Disruptions
The design of resilient supply chains under the risk of disruptions at candidate locations for distribution centers (DCs) is formulated as a two-stage stochastic program. The problem involves selecting DC locations, determining storage capacities for multiple commodities, and establishing the distribution strategy in scenarios that describe disruptions at potential DCs. The objective is to mini...
متن کاملModelling resilient supply chains: A complex systems perspective
A supply network structure design, that is resilient to any adverse, fast changing, or unexpected conditions, serves as a catalyst to propel a business forward while competition sits still. Complex systems theory provides an approach to capture the evolution of supply chains over times, where companies co-evolve with their suppliers, customers and competitors to adapt to changing business envir...
متن کاملAntecedents of Resilient Supply Chains: An Empirical Study
In recent years, there has been a proliferation of interest in resilience in the supply chain field. Even though literature has acknowledged the antecedents of resilient supply chains, such as supply chain visibility, cooperation, and information sharing, their confluence in creating resilient supply chains where other behavioural issues are prevailing (i.e. trust and behavioural uncertainty) h...
متن کاملResilient Cyber Ecosystems
Cyber Mission Resilience (CMR) is a significant step in the evolution of IT security. Not only does it reduce the complexity and cost of securing today’s IT systems, it helps prioritize security-related activities. The focus on mission resilience extends the scope of past security practices while simultaneously honing in on mission-critical systems, networks, and processes. This article explore...
متن کاملEngineering cybersecurity in cyber physical systems
Advances in the interconnected capabilities of cyber physical systems (CPS) affect virtually every engineered system. Today, software approaches dominate all aspects of connecting the physical and cyber worlds in part due to the convergence of computing, control and communications software technologies. Unfortunately, software technologies are more vulnerable to cybersecurity problems than trad...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Technology Innovation Management Review
سال: 2015
ISSN: 1927-0321
DOI: 10.22215/timreview888