{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,8,7]],"date-time":"2024-08-07T09:53:52Z","timestamp":1723024432571},"reference-count":35,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2021,1,22]],"date-time":"2021-01-22T00:00:00Z","timestamp":1611273600000},"content-version":"vor","delay-in-days":21,"URL":"http:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100001871","name":"Funda\u00e7\u00e3o para a Ci\u00eancia e a Tecnologia","doi-asserted-by":"publisher","award":["SFRH\/BD\/145941\/2019"],"id":[{"id":"10.13039\/501100001871","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Procedia Computer Science"],"published-print":{"date-parts":[[2021]]},"DOI":"10.1016\/j.procs.2021.01.145","type":"journal-article","created":{"date-parts":[[2021,2,23]],"date-time":"2021-02-23T01:55:22Z","timestamp":1614045322000},"page":"261-268","update-policy":"http:\/\/dx.doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":10,"special_numbering":"C","title":["Supply chain flows and stocks as entry points for cyber-risks"],"prefix":"10.1016","volume":"181","author":[{"given":"N\u00fabio Gomes","family":"Filho","sequence":"first","affiliation":[]},{"given":"Nazar\u00e9","family":"Rego","sequence":"additional","affiliation":[]},{"given":"Jo\u00e3o","family":"Claro","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.procs.2021.01.145_bib1","doi-asserted-by":"crossref","first-page":"66","DOI":"10.3390\/computers8030066","article-title":"\"CSCCRA: A Novel Quantitative Risk Assessment Model for SaaS Cloud Service Providers\"","volume":"8","author":"Akinrolabu","year":"2019","journal-title":"Computers"},{"key":"10.1016\/j.procs.2021.01.145_bib2","doi-asserted-by":"crossref","first-page":"58","DOI":"10.4018\/ijcwt.2013100107","article-title":"\"Security Risks to IT Supply Chains under Economic Stress\"","volume":"3","author":"Axelrod","year":"2018","journal-title":"Int. J. Cyber Warf. Terror"},{"key":"10.1016\/j.procs.2021.01.145_bib3","doi-asserted-by":"crossref","first-page":"354","DOI":"10.1016\/j.technovation.2014.01.005","article-title":"\"Cyber supply chain security practices DNA - Filling in the puzzle using a diverse set of disciplines\"","volume":"34","author":"Bartol","year":"2014","journal-title":"Technovation"},{"key":"10.1016\/j.procs.2021.01.145_bib4","doi-asserted-by":"crossref","first-page":"390","DOI":"10.1016\/j.jaccpubpol.2006.05.006","article-title":"\"Virtual integration costs and the limits of supply chain scalability\"","volume":"25","author":"Bhimani","year":"2006","journal-title":"J. Account. Public Policy"},{"key":"10.1016\/j.procs.2021.01.145_bib5","doi-asserted-by":"crossref","first-page":"39","DOI":"10.1108\/SCM-03-2018-0142","article-title":"\"Impact of IoT challenges and risks for SCM\"","volume":"24","author":"Birkel","year":"2019","journal-title":"Supply Chain Manag. An Int. J"},{"key":"10.1016\/j.procs.2021.01.145_bib6","doi-asserted-by":"crossref","first-page":"65","DOI":"10.1016\/j.procs.2019.01.108","article-title":"\"Information systems for supply chain management: Uncertainties, risks and cyber security\"","volume":"149","author":"Boiko","year":"2019","journal-title":"Procedia Comput. Sci."},{"key":"10.1016\/j.procs.2021.01.145_bib7","doi-asserted-by":"crossref","first-page":"28","DOI":"10.22215\/timreview\/888","article-title":"\"Cybersecurity and Cyber-Resilient Supply Chains\"","volume":"5","author":"Boyes","year":"2015","journal-title":"Technol. Innov. Manag. Rev"},{"key":"10.1016\/j.procs.2021.01.145_bib8","doi-asserted-by":"crossref","first-page":"342","DOI":"10.1016\/j.technovation.2014.02.001","article-title":"\"Cyber supply chain risk management: Revolutionizing the strategic control of critical IT systems\"","volume":"34","author":"Boyson","year":"2014","journal-title":"Technovation"},{"key":"10.1016\/j.procs.2021.01.145_bib9","first-page":"31","article-title":"\"High on the Risk Radar - Reputation Risk\"","volume":"67","author":"Brown","year":"2015","journal-title":"Food Aust"},{"key":"10.1016\/j.procs.2021.01.145_bib10","article-title":"\"Attacker-Defender Model against Quantal Response Adversaries for Cyber Security in Logistics Management: An Introductory Study\"","author":"Cheung","year":"2019","journal-title":"Eur. J. Oper. Res"},{"key":"10.1016\/j.procs.2021.01.145_bib11","first-page":"55","article-title":"\"An Integrative View on Cyber Threat to Global Supply Chain Management Systems\"","volume":"15","author":"Cho","year":"2011","journal-title":"J. Korea Trade"},{"key":"10.1016\/j.procs.2021.01.145_bib12","doi-asserted-by":"crossref","first-page":"215","DOI":"10.1108\/SCM-09-2017-0289","article-title":"\"Managing cyber and information risks in supply chains: insights from an exploratory analysis\"","volume":"24","author":"Colicchia","year":"2019","journal-title":"Supply Chain Manag. An Int. J"},{"key":"10.1016\/j.procs.2021.01.145_bib13","first-page":"4","article-title":"\"We cannot blindly reap the benefits of a globalized ICT supply chain!\"","volume":"26","author":"Davidson","year":"2013","journal-title":"CrossTalk"},{"key":"10.1016\/j.procs.2021.01.145_bib14","doi-asserted-by":"crossref","first-page":"54","DOI":"10.1002\/inst.12090","article-title":"\"A path towards cyber resilient and secure systems metrics and measures\"","volume":"19","author":"Dunlap","year":"2016","journal-title":"Insight"},{"key":"10.1016\/j.procs.2021.01.145_bib15","first-page":"42","article-title":"\"A Comprehensive Assessment Model for Critical Infrastructure Protection\"","volume":"8","author":"H\u00e4yhti\u00f6","year":"2017","journal-title":"Manag. Prod. Eng. Rev."},{"key":"10.1016\/j.procs.2021.01.145_bib16","first-page":"1","article-title":"\"Cybersecurity Consulting Services in the World of IoT\"","volume":"12","author":"Ioshifu","year":"2017","journal-title":"NEC Tech. J."},{"key":"10.1016\/j.procs.2021.01.145_bib17","doi-asserted-by":"crossref","first-page":"829","DOI":"10.1080\/00207543.2018.1488086","article-title":"\"The impact of digital technology and Industry 4.0 on the ripple effect and supply chain risk analytics\"","volume":"57","author":"Ivanov","year":"2019","journal-title":"Int. J. Prod. Res."},{"key":"10.1016\/j.procs.2021.01.145_bib18","doi-asserted-by":"crossref","first-page":"225","DOI":"10.1002\/sys.21206","article-title":"\"A System-Aware Cyber Security architecture\"","volume":"15","author":"Jones","year":"2012","journal-title":"Syst. Eng."},{"key":"10.1016\/j.procs.2021.01.145_bib19","doi-asserted-by":"crossref","first-page":"1477","DOI":"10.3390\/app8091477","article-title":"\"A Novel Risk Assessment Methodology for SCADA Maritime Logistics Environments\"","volume":"8","author":"Kalogeraki","year":"2018","journal-title":"Appl. Sci."},{"key":"10.1016\/j.procs.2021.01.145_bib20","doi-asserted-by":"crossref","first-page":"6","DOI":"10.22215\/timreview\/885","article-title":"\"Supply Chain Cyber-Resilience: Creating an Agenda for Future Research\"","author":"Khan","year":"2015","journal-title":"Technol. Innov. Manag. Rev."},{"key":"10.1016\/j.procs.2021.01.145_bib21","doi-asserted-by":"crossref","first-page":"309","DOI":"10.1016\/j.sbspro.2013.12.875","article-title":"\"Developing a Resilient Supply Chain\"","volume":"110","author":"Mensah","year":"2014","journal-title":"Procedia - Soc. Behav. Sci"},{"key":"10.1016\/j.procs.2021.01.145_bib22","doi-asserted-by":"crossref","first-page":"101","DOI":"10.1016\/j.procs.2014.12.014","article-title":"\"Using ICT in Developing a Resilient Supply Chain Strategy\"","volume":"43","author":"Mensah","year":"2015","journal-title":"Procedia Comput. Sci."},{"key":"10.1016\/j.procs.2021.01.145_bib23","doi-asserted-by":"crossref","first-page":"472","DOI":"10.1093\/comjnl\/bxx093","article-title":"\"Risk and the Small-Scale Cyber Security Decision Making Dialogue - A UK Case Study\"","volume":"61","author":"Osborn","year":"2018","journal-title":"Comput. J."},{"key":"10.1016\/j.procs.2021.01.145_bib24","doi-asserted-by":"crossref","first-page":"200","DOI":"10.1016\/j.arcontrol.2019.02.002","article-title":"\"Challenges for the cyber-physical manufacturing enterprises of the future\"","volume":"47","author":"Panetto","year":"2019","journal-title":"Annu. Rev. Control"},{"key":"10.1016\/j.procs.2021.01.145_bib25","doi-asserted-by":"crossref","first-page":"74","DOI":"10.1016\/j.csi.2017.09.006","article-title":"\"Cyber-attack path discovery in a dynamic supply chain maritime risk management system\"","volume":"56","author":"Polatidis","year":"2018","journal-title":"Comput. Stand. Interfaces"},{"key":"10.1016\/j.procs.2021.01.145_bib26","doi-asserted-by":"crossref","first-page":"154","DOI":"10.1016\/J.ENG.2017.02.011","article-title":"\"Fundamental Theories and Key Technologies for Smart and Optimal Manufacturing in the Process Industry\"","volume":"3","author":"Qian","year":"2017","journal-title":"Engineering"},{"key":"10.1016\/j.procs.2021.01.145_bib27","doi-asserted-by":"crossref","first-page":"161","DOI":"10.1016\/j.ejor.2019.09.017","article-title":"\"Cybersecurity investments in the supply chain: Coordination and a strategic attacker\"","volume":"282","author":"Simon","year":"2020","journal-title":"Eur. J. Oper. Res."},{"key":"10.1016\/j.procs.2021.01.145_bib28","unstructured":"Symantec. (2019) \u201cInternet Security Threat Report: Volume 24\u201d."},{"key":"10.1016\/j.procs.2021.01.145_bib29","doi-asserted-by":"crossref","first-page":"201","DOI":"10.1016\/j.ssci.2016.06.015","article-title":"\"An enhanced risk assessment framework for business continuity management systems\"","volume":"89","author":"Torabi","year":"2016","journal-title":"Saf. Sci."},{"key":"10.1016\/j.procs.2021.01.145_bib30","doi-asserted-by":"crossref","first-page":"13","DOI":"10.22215\/timreview\/886","article-title":"\"Cyber-Resilience: A Strategic Approach for Supply Chain Management\"","volume":"5","author":"Urciuoli","year":"2015","journal-title":"Technol. Innov. Manag. Rev."},{"key":"10.1016\/j.procs.2021.01.145_bib31","doi-asserted-by":"crossref","first-page":"710","DOI":"10.1108\/09600030010346521","article-title":"\"Cyber attacks against supply chain management systems: a short note\"","volume":"30","author":"Warren","year":"2000","journal-title":"Int. J. Phys. Distrib. Logist. Manag."},{"key":"10.1016\/j.procs.2021.01.145_bib32","doi-asserted-by":"crossref","first-page":"4","DOI":"10.1016\/j.ijcip.2015.11.003","article-title":"\"Objectives for managing cyber supply chain risk\"","volume":"12","author":"Windelberg","year":"2016","journal-title":"Int. J. Crit. Infrastruct. Prot."},{"key":"10.1016\/j.procs.2021.01.145_bib33","doi-asserted-by":"crossref","first-page":"1846","DOI":"10.1016\/j.ifacol.2015.06.355","article-title":"\"The effectiveness of COBIT 5 information security framework for reducing cyber attacks on supply chain management system\"","volume":"28","author":"Wolden","year":"2015","journal-title":"IFAC-PapersOnLine"},{"key":"10.1016\/j.procs.2021.01.145_bib34","unstructured":"World Economic Forum. (2020) \u201cThe Global Risks Report 2020\u201d."},{"key":"10.1016\/j.procs.2021.01.145_bib35","doi-asserted-by":"crossref","first-page":"2076","DOI":"10.1111\/risa.13269","article-title":"\"A Robust Approach for Mitigating Risks in Cyber Supply Chains\"","volume":"39","author":"Zheng","year":"2019","journal-title":"Risk Anal."}],"container-title":["Procedia Computer Science"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S187705092100185X?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S187705092100185X?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2022,7,17]],"date-time":"2022-07-17T16:12:12Z","timestamp":1658074332000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S187705092100185X"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"references-count":35,"alternative-id":["S187705092100185X"],"URL":"https:\/\/doi.org\/10.1016\/j.procs.2021.01.145","relation":{},"ISSN":["1877-0509"],"issn-type":[{"value":"1877-0509","type":"print"}],"subject":[],"published":{"date-parts":[[2021]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"Supply chain flows and stocks as entry points for cyber-risks","name":"articletitle","label":"Article Title"},{"value":"Procedia Computer Science","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.procs.2021.01.145","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2021 The Author(s). Published by Elsevier B.V.","name":"copyright","label":"Copyright"}]}}