Interplay between cyber supply chain risk management practices and cyber security performance
نویسندگان
چکیده
Purpose This study aims to examine whether the cyber supply chain risk management (CSCRM) practices adopted by manufacturing firms contribute achieving (CSC) visibility. Studies have highlighted necessity of having visibility across interconnected chains. Thus, this examines extent CSCRM enabling CSC act as a mediator in performance. Design/methodology/approach A survey method was used obtain data from electrical and electronics registered with Federations Malaysian Manufacturers directory. Data 130 respondents were analysed using IBM SPSS PLS-SEM. Findings empirically proves dedicated governance team's integral role setting security tone within its CSC. The result also confirms significant that plays As theorised literature, there is strong direct relationship between performance, assuring investments policies devised improve are fruitful. Originality/value significance an integrated recognised studied analytical models, behavioural techniques case studies. Substantial empirical evidence on which contributes towards still elusive. study's major contribution lies identifying can visibility, mediating
منابع مشابه
MITIGATE: An Innovative Cyber-Security Maritime Supply Chain Risk Management System
Despite the importance of Critical Information Infrastructures (CIIs) and dynamic ICT-based maritime Supply Chains (SCs) for ports operations, state-of-the-art Risk Management (RM) methodologies for maritime environments pay limited attention to cyber-security and do not adequately address security processes for international SCs. Motivated by these limitations, we have developed and will valid...
متن کاملCyber Risk Exposure and Prospects for Cyber Insurance
This study draws attention to the ubiquitous and borderless nature of cybercrime. It examines the prospect of introducing customized cyber insurance policy in the Nigerian market. As secondary data was not available, the study conducted a survey by administering three sets of questionnaire to purposively selected top executives in four Trade Groups that rely heavily on Internet transactions for...
متن کاملcyber risk exposure and prospects for cyber insurance
this study draws attention to the ubiquitous and borderless nature of cybercrime. it examines the prospect of introducing customized cyber insurance policy in the nigerian market. as secondary data was not available, the study conducted a survey by administering three sets of questionnaire to purposively selected top executives in four trade groups that rely heavily on internet transactions for...
متن کاملBeyond the Castle Model of cyber-risk and cyber-security
Article history: Received 13 July 2015 Received in revised form 27 January 2016 Accepted 29 January 2016 Available online xxxx The predominant metaphor for secure computing today is modeled on ever higher, ever better layers of walls. This article explains why that approach is as outmoded for cyber security today as it became for physical security centuries ago. Three forces are undermining the...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Industrial Management and Data Systems
سال: 2022
ISSN: ['1758-5783', '0263-5577']
DOI: https://doi.org/10.1108/imds-05-2022-0313