메뉴 건너뛰기




Volumn 34, Issue 7, 2014, Pages 342-353

Cyber supply chain risk management: Revolutionizing the strategic control of critical IT systems

Author keywords

Cybersecurity; Risk management; Supply chain management

Indexed keywords

INDUSTRY; SUPPLY CHAIN MANAGEMENT;

EID: 84901751938     PISSN: 01664972     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.technovation.2014.02.001     Document Type: Article
Times cited : (100)

References (41)
  • 1
    • 84901766823 scopus 로고    scopus 로고
    • (accessed August 12, 2013)
    • Askville, http://askville.amazon.com/word-cyber-older-modern-meaning/ AnswerViewer.do?requestId=4086267(accessed August 12, 2013).
    • Askville
  • 2
    • 84901783512 scopus 로고    scopus 로고
    • Booz Allen Hamilton (November)
    • Booz Allen Hamilton, 2009. Milestones of Cyber Security. (November) http://www.boozallen.com/media/file/milestones-of-cyber-security.pdfa.
    • (2009) Milestones of Cyber Security
  • 3
    • 85029156777 scopus 로고    scopus 로고
    • Securing the Supply Chain for Electronic Equipment: A Strategy and Framework
    • (last accessed November 9, 2013)
    • Borg, S., 2010. Securing the Supply Chain for Electronic Equipment: A Strategy and Framework. Internet Security Alliance. http://www.whitehouse.gov/ files/documents/cyber/ISA-Securing the Supply Chain for Electronic Equipment.pdfa. (last accessed November 9, 2013).
    • (2010) Internet Security Alliance
    • Borg, S.1
  • 8
    • 84901780728 scopus 로고    scopus 로고
    • CSCMP (Council of Supply Chain Management Professionals)
    • CSCMP (Council of Supply Chain Management Professionals). http://cscmp.org/about-us/supply-chain-management-definitionsa.
  • 13
    • 48749089518 scopus 로고    scopus 로고
    • Supply chain variability, organizational structure & performance: The moderating effect of demand unpredictability
    • R. Germain, C. Claycomb, and C. Dröge Supply chain variability, organizational structure & performance: the moderating effect of demand unpredictability J. Oper. Manage. 26 5 2008 557 570
    • (2008) J. Oper. Manage. , vol.26 , Issue.5 , pp. 557-570
    • Germain, R.1    Claycomb, C.2    Dröge, C.3
  • 14
    • 84901816698 scopus 로고    scopus 로고
    • Supply chain risk management and the software supply chain
    • (November) (last accessed November 10, 2013)
    • Goertzel, K., 2010. Supply chain risk management and the software supply chain. In: Presentation at OWASP AppSec DC Conference. (November) https://www.owasp.org/images/7/77/BoozAllen-AppSecDC2010-sw-scrm.pdf(last accessed November 10, 2013).
    • (2010) OWASP AppSec DC Conference
    • Goertzel, K.1
  • 18
    • 84901777775 scopus 로고    scopus 로고
    • InfoSecurity Europe (July 22) (last accessed November 8, 2013)
    • InfoSecurity Europe, 2010. Dell PowerEdge Servers Shipping with Onboard Malware? (July 22) http://www.infosecurity-magazine.com/view/11143/dell- poweredge-servers-shipping-with-onboard-malware-/(last accessed November 8, 2013).
    • (2010) Dell PowerEdge Servers Shipping with Onboard Malware?
  • 19
    • 85024092590 scopus 로고    scopus 로고
    • Institute of Medicine (June) (accessed February 27, 2012)
    • Institute of Medicine, 2009. Initial National Priorities for Comparative Effectiveness Research, Report Brief (June) p.1, http://www.hrsonline.org/ Policy/LegislationTakeAction/upload/CER-report-brief-6-22-09.pdf(accessed February 27, 2012).
    • (2009) Initial National Priorities for Comparative Effectiveness Research, Report Brief , pp. 1
  • 20
    • 84901763993 scopus 로고    scopus 로고
    • Leader of CISCO Counterfeit Ring Jailed for 60 Months
    • (September 12) (last accessed Nov. 8, 2013)
    • Kunert, P., 2011. Leader of CISCO Counterfeit Ring Jailed for 60 Months. The A Channel. (September 12) http://www.channelregister.co.uk/2011/09/12/cisco- counterfeit-ring(last accessed Nov. 8, 2013).
    • (2011) The A Channel
    • Kunert, P.1
  • 21
    • 84901809774 scopus 로고    scopus 로고
    • Manufacturing.net
    • Manufacturing.net, 2012. History of Supply Chain Management. http://www.manufacturing.net/articles/2012/05/history-of-logistics-and-supply- chain-managementa.
    • (2012) History of Supply Chain Management
  • 22
    • 84901788040 scopus 로고    scopus 로고
    • (November 13). (last accessed November 10, 2013)
    • McMillan, R. 2007. Seagate Ships Virus-laden Hard Drives. (November 13). http://www.pcworld.com/article/139576/article.html(last accessed November 10, 2013).
    • (2007) Seagate Ships Virus-laden Hard Drives
    • McMillan, R.1
  • 23
    • 84901752631 scopus 로고    scopus 로고
    • Woman Helped Sell Fake Chips to U.S. Military
    • (November 23)
    • McMillan, R., 2010. Woman Helped Sell Fake Chips to U.S. Military. PCWorld. (November 23) http://www.pcworld.com/article/211428/article.htmla.
    • (2010) PCWorld
    • McMillan, R.1
  • 24
    • 84942420461 scopus 로고    scopus 로고
    • National Public Radio (November 27) (last accessed November 8, 2013)
    • National Public Radio, 2011. China's Cyber Threat a High-Stakes Spy Game. (November 27) http://www.npr.org/2011/11/27/142828055/chinas-cyber-threat-a- high-stakes-spy-game(last accessed November 8, 2013).
    • (2011) China's Cyber Threat A High-Stakes Spy Game
  • 26
    • 84901810107 scopus 로고    scopus 로고
    • NIST National Institute of Security and Technology (August 28) (last accessed December 8, 2013)
    • NIST, 2013. Discussion Draft of the Preliminary Cybersecurity Framework. National Institute of Security and Technology. (August 28) http://www.nist.gov/ itl/upload/discussion-draft-preliminary-cybersecurity-framework-082813.pdf(last accessed December 8, 2013).
    • (2013) Discussion Draft of the Preliminary Cybersecurity Framework
  • 29
    • 84901807575 scopus 로고    scopus 로고
    • PCAST President's Council of Advisors on Science and Technology. (November)
    • PCAST, 2013. Immediate Opportunities for Strengthening the Nation's Cybersecurity. President's Council of Advisors on Science and Technology. (November) http://www.whitehouse.gov/sites/default/files/microsites/ostp/PCAST/ pcast-cybersecurity-nov-2013.pdfa.
    • (2013) Immediate Opportunities for Strengthening the Nation's Cybersecurity
  • 31
    • 70449567647 scopus 로고    scopus 로고
    • Norbert and Gregory
    • M. Ramage Norbert and Gregory Inf. Commun. Soc. 12 5 2009 735 749
    • (2009) Inf. Commun. Soc. , vol.12 , Issue.5 , pp. 735-749
    • Ramage, M.1
  • 33
    • 84901749987 scopus 로고    scopus 로고
    • SCRLC Supply Chain Risk Leadership Council (May) (last accessed November 8, 2013)
    • SCRLC, 2013. Supply Chain Risk Management Maturity Model. Supply Chain Risk Leadership Council. (May) http://www.scrlc.com(last accessed November 8, 2013).
    • (2013) Supply Chain Risk Management Maturity Model
  • 35
    • 84901779951 scopus 로고    scopus 로고
    • Software Integrity Controls: An Assurance-Based Approach to Minimizing Risks in the Software Supply Chain
    • (June 14) (last accessed November 10, 2013)
    • Simpson, S.,(Ed.), 2010. Software Integrity Controls: An Assurance-Based Approach to Minimizing Risks in the Software Supply Chain. Software Assurance Forum for Excellence in Code. (June 14) http://www.safecode.org/publications/ SAFECode-Software-Integrity-Controls0610.pdf(last accessed November 10, 2013).
    • (2010) Software Assurance Forum for Excellence in Code
    • Simpson, S.1
  • 36
    • 84901782095 scopus 로고    scopus 로고
    • Toward a Trusted Supply Chain: A Risk-Based Approach to Managing Software Integrity
    • (July 26) (last accessed November 10, 2013)
    • Storch, T., 2011. Toward a Trusted Supply Chain: A Risk-Based Approach to Managing Software Integrity. Microsoft Corp. (July 26) http://www.microsoft. com/download/en/details.aspx?id=26828(last accessed November 10, 2013).
    • (2011) Microsoft Corp
    • Storch, T.1
  • 37
    • 84901765607 scopus 로고    scopus 로고
    • Symantec
    • Symantec, 2013a. 2013 Internet Security Threat Report, vol. 18. http://www.symantec.com/security-response/publications/threatreport.jspa.
    • (2013) 2013 Internet Security Threat Report , vol.18
  • 39
    • 16844361812 scopus 로고    scopus 로고
    • Treadway Commission Committee of Sponsoring Organizations of the Treadway Commission (COSO
    • Treadway Commission, 2004. Committee of Sponsoring Organizations of the Treadway Commission (COSO), Enterprise Risk Framework Executive Summary, p.2. www.coso.org/documents/coso-erm-executivesummary.pdfa.
    • (2004) Enterprise Risk Framework Executive Summary , pp. 2
  • 40
    • 84901796805 scopus 로고    scopus 로고
    • TechTarget
    • WhatIs.com. TechTarget. http://whatis.techtarget.com/definition/ cybersecuritya.
    • WhatIs.com
  • 41
    • 84901746218 scopus 로고    scopus 로고
    • PwC (November) (last accessed November 8, 2013)
    • PwC, 2012. Cyber Security M&A: Decoding deals in the global Cyber Security industry. (November) http://www.pwc.com/gx/en/aerospace-defence/ publications/cyber-security-mergers-and-acquisitions.jhtml(last accessed November 8, 2013).
    • (2012) Cyber Security M&A: Decoding Deals in the Global Cyber Security Industry


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.