Interplay between cyber supply chain risk management practices and cyber security performance

نویسندگان

چکیده

Purpose This study aims to examine whether the cyber supply chain risk management (CSCRM) practices adopted by manufacturing firms contribute achieving (CSC) visibility. Studies have highlighted necessity of having visibility across interconnected chains. Thus, this examines extent CSCRM enabling CSC act as a mediator in performance. Design/methodology/approach A survey method was used obtain data from electrical and electronics registered with Federations Malaysian Manufacturers directory. Data 130 respondents were analysed using IBM SPSS PLS-SEM. Findings empirically proves dedicated governance team's integral role setting security tone within its CSC. The result also confirms significant that plays As theorised literature, there is strong direct relationship between performance, assuring investments policies devised improve are fruitful. Originality/value significance an integrated recognised studied analytical models, behavioural techniques case studies. Substantial empirical evidence on which contributes towards still elusive. study's major contribution lies identifying can visibility, mediating

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

MITIGATE: An Innovative Cyber-Security Maritime Supply Chain Risk Management System

Despite the importance of Critical Information Infrastructures (CIIs) and dynamic ICT-based maritime Supply Chains (SCs) for ports operations, state-of-the-art Risk Management (RM) methodologies for maritime environments pay limited attention to cyber-security and do not adequately address security processes for international SCs. Motivated by these limitations, we have developed and will valid...

متن کامل

Cyber Risk Exposure and Prospects for Cyber Insurance

This study draws attention to the ubiquitous and borderless nature of cybercrime. It examines the prospect of introducing customized cyber insurance policy in the Nigerian market. As secondary data was not available, the study conducted a survey by administering three sets of questionnaire to purposively selected top executives in four Trade Groups that rely heavily on Internet transactions for...

متن کامل

cyber risk exposure and prospects for cyber insurance

this study draws attention to the ubiquitous and borderless nature of cybercrime. it examines the prospect of introducing customized cyber insurance policy in the nigerian market. as secondary data was not available, the study conducted a survey by administering three sets of questionnaire to purposively selected top executives in four trade groups that rely heavily on internet transactions for...

متن کامل

Beyond the Castle Model of cyber-risk and cyber-security

Article history: Received 13 July 2015 Received in revised form 27 January 2016 Accepted 29 January 2016 Available online xxxx The predominant metaphor for secure computing today is modeled on ever higher, ever better layers of walls. This article explains why that approach is as outmoded for cyber security today as it became for physical security centuries ago. Three forces are undermining the...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Industrial Management and Data Systems

سال: 2022

ISSN: ['1758-5783', '0263-5577']

DOI: https://doi.org/10.1108/imds-05-2022-0313