-
1
-
-
84901766823
-
-
(accessed August 12, 2013)
-
Askville, http://askville.amazon.com/word-cyber-older-modern-meaning/ AnswerViewer.do?requestId=4086267(accessed August 12, 2013).
-
Askville
-
-
-
2
-
-
84901783512
-
-
Booz Allen Hamilton (November)
-
Booz Allen Hamilton, 2009. Milestones of Cyber Security. (November) http://www.boozallen.com/media/file/milestones-of-cyber-security.pdfa.
-
(2009)
Milestones of Cyber Security
-
-
-
3
-
-
85029156777
-
Securing the Supply Chain for Electronic Equipment: A Strategy and Framework
-
(last accessed November 9, 2013)
-
Borg, S., 2010. Securing the Supply Chain for Electronic Equipment: A Strategy and Framework. Internet Security Alliance. http://www.whitehouse.gov/ files/documents/cyber/ISA-Securing the Supply Chain for Electronic Equipment.pdfa. (last accessed November 9, 2013).
-
(2010)
Internet Security Alliance
-
-
Borg, S.1
-
5
-
-
78651487418
-
-
(June) (last accessed November 9, 2013)
-
Boyson, S., Corsi, T., Rossman, H., 2009. Building a Cyber Supply Chain Assurance Reference Model. (June) www.saic.com/news/resources/Cyber-Supply- Chain.pdf (last accessed November 9, 2013).
-
(2009)
Building A Cyber Supply Chain Assurance Reference Model
-
-
Boyson, S.1
Corsi, T.2
Rossman, H.3
-
8
-
-
84901780728
-
-
CSCMP (Council of Supply Chain Management Professionals)
-
CSCMP (Council of Supply Chain Management Professionals). http://cscmp.org/about-us/supply-chain-management-definitionsa.
-
-
-
-
12
-
-
77956729551
-
-
(May) (last accessed November 9, 2013)
-
Ellison, R., Goodenough, J., Weinstock, C., Woody, C., 2010. Evaluating and Mitigating Software Supply Chain Security Risks. (May) http://www.sei.cmu. edu/library/abstracts/reports/10tn016.cfm(last accessed November 9, 2013).
-
(2010)
Evaluating and Mitigating Software Supply Chain Security Risks
-
-
Ellison, R.1
Goodenough, J.2
Weinstock, C.3
Woody, C.4
-
13
-
-
48749089518
-
Supply chain variability, organizational structure & performance: The moderating effect of demand unpredictability
-
R. Germain, C. Claycomb, and C. Dröge Supply chain variability, organizational structure & performance: the moderating effect of demand unpredictability J. Oper. Manage. 26 5 2008 557 570
-
(2008)
J. Oper. Manage.
, vol.26
, Issue.5
, pp. 557-570
-
-
Germain, R.1
Claycomb, C.2
Dröge, C.3
-
14
-
-
84901816698
-
Supply chain risk management and the software supply chain
-
(November) (last accessed November 10, 2013)
-
Goertzel, K., 2010. Supply chain risk management and the software supply chain. In: Presentation at OWASP AppSec DC Conference. (November) https://www.owasp.org/images/7/77/BoozAllen-AppSecDC2010-sw-scrm.pdf(last accessed November 10, 2013).
-
(2010)
OWASP AppSec DC Conference
-
-
Goertzel, K.1
-
18
-
-
84901777775
-
-
InfoSecurity Europe (July 22) (last accessed November 8, 2013)
-
InfoSecurity Europe, 2010. Dell PowerEdge Servers Shipping with Onboard Malware? (July 22) http://www.infosecurity-magazine.com/view/11143/dell- poweredge-servers-shipping-with-onboard-malware-/(last accessed November 8, 2013).
-
(2010)
Dell PowerEdge Servers Shipping with Onboard Malware?
-
-
-
19
-
-
85024092590
-
-
Institute of Medicine (June) (accessed February 27, 2012)
-
Institute of Medicine, 2009. Initial National Priorities for Comparative Effectiveness Research, Report Brief (June) p.1, http://www.hrsonline.org/ Policy/LegislationTakeAction/upload/CER-report-brief-6-22-09.pdf(accessed February 27, 2012).
-
(2009)
Initial National Priorities for Comparative Effectiveness Research, Report Brief
, pp. 1
-
-
-
20
-
-
84901763993
-
Leader of CISCO Counterfeit Ring Jailed for 60 Months
-
(September 12) (last accessed Nov. 8, 2013)
-
Kunert, P., 2011. Leader of CISCO Counterfeit Ring Jailed for 60 Months. The A Channel. (September 12) http://www.channelregister.co.uk/2011/09/12/cisco- counterfeit-ring(last accessed Nov. 8, 2013).
-
(2011)
The A Channel
-
-
Kunert, P.1
-
21
-
-
84901809774
-
-
Manufacturing.net
-
Manufacturing.net, 2012. History of Supply Chain Management. http://www.manufacturing.net/articles/2012/05/history-of-logistics-and-supply- chain-managementa.
-
(2012)
History of Supply Chain Management
-
-
-
22
-
-
84901788040
-
-
(November 13). (last accessed November 10, 2013)
-
McMillan, R. 2007. Seagate Ships Virus-laden Hard Drives. (November 13). http://www.pcworld.com/article/139576/article.html(last accessed November 10, 2013).
-
(2007)
Seagate Ships Virus-laden Hard Drives
-
-
McMillan, R.1
-
23
-
-
84901752631
-
Woman Helped Sell Fake Chips to U.S. Military
-
(November 23)
-
McMillan, R., 2010. Woman Helped Sell Fake Chips to U.S. Military. PCWorld. (November 23) http://www.pcworld.com/article/211428/article.htmla.
-
(2010)
PCWorld
-
-
McMillan, R.1
-
24
-
-
84942420461
-
-
National Public Radio (November 27) (last accessed November 8, 2013)
-
National Public Radio, 2011. China's Cyber Threat a High-Stakes Spy Game. (November 27) http://www.npr.org/2011/11/27/142828055/chinas-cyber-threat-a- high-stakes-spy-game(last accessed November 8, 2013).
-
(2011)
China's Cyber Threat A High-Stakes Spy Game
-
-
-
26
-
-
84901810107
-
-
NIST National Institute of Security and Technology (August 28) (last accessed December 8, 2013)
-
NIST, 2013. Discussion Draft of the Preliminary Cybersecurity Framework. National Institute of Security and Technology. (August 28) http://www.nist.gov/ itl/upload/discussion-draft-preliminary-cybersecurity-framework-082813.pdf(last accessed December 8, 2013).
-
(2013)
Discussion Draft of the Preliminary Cybersecurity Framework
-
-
-
27
-
-
84876559266
-
-
(November 28). (last accessed November 10, 2013)
-
Oltsik, J., Gahm, J., McKnight, J., 2010. Assessing Cyber Supply Chain Security Vulnerabilities Within the U.S. Critical Infrastructure. (November 28) http://www.enterprisestrategygroup.com/2010/11/cyber-supply-chain-security- research-report/a. (last accessed November 10, 2013).
-
(2010)
Assessing Cyber Supply Chain Security Vulnerabilities Within the U.S. Critical Infrastructure
-
-
Oltsik, J.1
Gahm, J.2
McKnight, J.3
-
29
-
-
84901807575
-
-
PCAST President's Council of Advisors on Science and Technology. (November)
-
PCAST, 2013. Immediate Opportunities for Strengthening the Nation's Cybersecurity. President's Council of Advisors on Science and Technology. (November) http://www.whitehouse.gov/sites/default/files/microsites/ostp/PCAST/ pcast-cybersecurity-nov-2013.pdfa.
-
(2013)
Immediate Opportunities for Strengthening the Nation's Cybersecurity
-
-
-
31
-
-
70449567647
-
Norbert and Gregory
-
M. Ramage Norbert and Gregory Inf. Commun. Soc. 12 5 2009 735 749
-
(2009)
Inf. Commun. Soc.
, vol.12
, Issue.5
, pp. 735-749
-
-
Ramage, M.1
-
33
-
-
84901749987
-
-
SCRLC Supply Chain Risk Leadership Council (May) (last accessed November 8, 2013)
-
SCRLC, 2013. Supply Chain Risk Management Maturity Model. Supply Chain Risk Leadership Council. (May) http://www.scrlc.com(last accessed November 8, 2013).
-
(2013)
Supply Chain Risk Management Maturity Model
-
-
-
35
-
-
84901779951
-
Software Integrity Controls: An Assurance-Based Approach to Minimizing Risks in the Software Supply Chain
-
(June 14) (last accessed November 10, 2013)
-
Simpson, S.,(Ed.), 2010. Software Integrity Controls: An Assurance-Based Approach to Minimizing Risks in the Software Supply Chain. Software Assurance Forum for Excellence in Code. (June 14) http://www.safecode.org/publications/ SAFECode-Software-Integrity-Controls0610.pdf(last accessed November 10, 2013).
-
(2010)
Software Assurance Forum for Excellence in Code
-
-
Simpson, S.1
-
36
-
-
84901782095
-
Toward a Trusted Supply Chain: A Risk-Based Approach to Managing Software Integrity
-
(July 26) (last accessed November 10, 2013)
-
Storch, T., 2011. Toward a Trusted Supply Chain: A Risk-Based Approach to Managing Software Integrity. Microsoft Corp. (July 26) http://www.microsoft. com/download/en/details.aspx?id=26828(last accessed November 10, 2013).
-
(2011)
Microsoft Corp
-
-
Storch, T.1
-
37
-
-
84901765607
-
-
Symantec
-
Symantec, 2013a. 2013 Internet Security Threat Report, vol. 18. http://www.symantec.com/security-response/publications/threatreport.jspa.
-
(2013)
2013 Internet Security Threat Report
, vol.18
-
-
-
39
-
-
16844361812
-
-
Treadway Commission Committee of Sponsoring Organizations of the Treadway Commission (COSO
-
Treadway Commission, 2004. Committee of Sponsoring Organizations of the Treadway Commission (COSO), Enterprise Risk Framework Executive Summary, p.2. www.coso.org/documents/coso-erm-executivesummary.pdfa.
-
(2004)
Enterprise Risk Framework Executive Summary
, pp. 2
-
-
-
40
-
-
84901796805
-
-
TechTarget
-
WhatIs.com. TechTarget. http://whatis.techtarget.com/definition/ cybersecuritya.
-
WhatIs.com
-
-
-
41
-
-
84901746218
-
-
PwC (November) (last accessed November 8, 2013)
-
PwC, 2012. Cyber Security M&A: Decoding deals in the global Cyber Security industry. (November) http://www.pwc.com/gx/en/aerospace-defence/ publications/cyber-security-mergers-and-acquisitions.jhtml(last accessed November 8, 2013).
-
(2012)
Cyber Security M&A: Decoding Deals in the Global Cyber Security Industry
-
-
|