Mostrar el registro sencillo del ítem
Eleven years of cyberattacks on Chinese supply chains in an era of cyber warfare, a review and future research agenda
dc.contributor.author | Pérez-Moron, James | |
dc.date.accessioned | 2022-04-18T19:06:54Z | |
dc.date.available | 2022-04-18T19:06:54Z | |
dc.date.issued | 2021-08-10 | |
dc.date.submitted | 2022-04-07 | |
dc.identifier.citation | Perez-Moron, James. (2021). Eleven years of cyberattacks on Chinese supply chains in an era of cyber warfare, a review and future research agenda. Journal of Asia Business Studies. ahead-of-print. 10.1108/JABS-11-2020-0444. | spa |
dc.identifier.uri | https://hdl.handle.net/20.500.12585/10670 | |
dc.description.abstract | Purpose – The contribution of this study aims to twofold: First, it provides an overview of the current state of research on cyberattacks on Chinese supply chains (SCs). Second, it offers a look at the Chinese Government’s approach to fighting cyberattacks on Chinese SCs and its calls for global governance. Design/methodology/approach – A comprehensive literature review was conducted on Clarivate Analytics’ Web of Science, in Social Sciences Citation Index journals, Scopus and Google Scholar, published between 2010–2021. A systematic review of practitioner literature was also conducted. Findings – Chinese SCs have become a matter of national security, especially in the era of cyber warfare. The risks to SC have been outlined. Cybersecurity regulations are increasing as China aims to build a robust environment for cyberspace development. Using the Technology-organizationenvironment (TOE) framework, the results show that the top five factors influencing the adoption process in firms are as follows: relative advantage and technological readiness (Technology context); top management support and firm size (Organization context) and government policy and regulations (Environment context). Research limitations/implications – This review focuses on cyberattacks on Chinese SCs and great care was taken when selecting search terms. However, the author acknowledges that the choice of databases/terms may have excluded a few articles on cyberattacks from this review. Practical implications – This review provides managerial insights for SC practitioners into how cyberattacks have the potential to disrupt the global SC network. Originality/value – Past researchers proposed a taxonomic approach to evaluate progress with SC integration into Industry 4.0; in contrast, this study is one of the first steps toward an enhanced understanding of cyberattacks on Chinese SCs and their contribution to the global SC network using the TOE framework | spa |
dc.format.extent | 26 Páginas | |
dc.format.mimetype | application/pdf | spa |
dc.language.iso | eng | spa |
dc.rights.uri | http://creativecommons.org/licenses/by-nc-nd/4.0/ | * |
dc.source | Journal of Asia Business Studies - Vol. 16 N° 2 (2022) | spa |
dc.title | Eleven years of cyberattacks on Chinese supply chains in an era of cyber warfare, a review and future research agenda | spa |
dcterms.bibliographicCitation | Ahmad, A., Maynard, S.B., Desouza, K.C., Kotsias, J., Whitty, M.T., Baskerville, R.L. How can organizations develop situation awareness for incident response: A case study of management practice (Open Access) (2021) Computers and Security, 101, art. no. 102122. Cited 16 times. https://www.journals.elsevier.com/computers-and-security doi: 10.1016/j.cose.2020.102122 | spa |
dcterms.bibliographicCitation | Al Hadwera, A., Tavana, M., Gillis, D., Rezania, D. (2021) A systematic review of organizational factors impacting cloud-based technology adoption using Technology-organization-environment framework Internet of Things, 100407 | spa |
dcterms.bibliographicCitation | Alazab, M., Alhyari, S., Awajan, A., Abdallah, A.B. Blockchain technology in supply chain management: an empirical study of the factors affecting user adoption/acceptance (2021) Cluster Computing, 24 (1), pp. 83-101. Cited 14 times. https://link.springer.com/journal/volumesAndIssues/10586 doi: 10.1007/s10586-020-03200-4 | spa |
dcterms.bibliographicCitation | Alazab, M., Lakshmanna, K., G, T.R., Pham, Q.-V., Reddy Maddikunta, P.K. Multi-objective cluster head selection using fitness averaged rider optimization algorithm for IoT networks in smart cities (2021) Sustainable Energy Technologies and Assessments, 43, art. no. 100973. Cited 31 times. http://www.journals.elsevier.com/sustainable-energy-technologies-and-assessments doi: 10.1016/j.seta.2020.100973 | spa |
dcterms.bibliographicCitation | Alzubaidi, A. Cybercrime Awareness among Saudi Nationals: Dataset (Open Access) (2021) Data in Brief, 36, art. no. 106965. Cited 2 times. https://www.journals.elsevier.com/data-in-brief doi: 10.1016/j.dib.2021.106965 | spa |
dcterms.bibliographicCitation | Annarelli, A., Nonino, F., Palombi, G. Understanding the management of cyber resilient systems (2020) Computers and Industrial Engineering, 149, art. no. 106829. Cited 15 times. https://www.journals.elsevier.com/computers-and-industrial-engineering doi: 10.1016/j.cie.2020.106829 | spa |
dcterms.bibliographicCitation | Ariffin, K.A.Z., Ahmad, F.H. Indicators for maturity and readiness for digital forensic investigation in era of industrial revolution 4.0 (2021) Computers and Security, 105, art. no. 102237. Cited 9 times. https://www.journals.elsevier.com/computers-and-security doi: 10.1016/j.cose.2021.102237 | spa |
dcterms.bibliographicCitation | Austin, G. (2016) China, and Cybersecurity: Espionage, Strategy, and Politics in the Digital Domain, p. 398. p., Oxford University Press, New York, NY: 2015, The China Journal, 75, 161–163 | spa |
dcterms.bibliographicCitation | Ayson, R. New Zealand and the great irresponsibles: coping with Russia, China and the US (Open Access) (2020) Australian Journal of International Affairs, 74 (4), pp. 455-478. Cited 3 times. http://www.tandf.co.uk/journals/titles/10357718. doi: 10.1080/10357718.2020.1734773 | spa |
dcterms.bibliographicCitation | Baker, J. The technology–organization–environment framework (2011) Integrated Series in Information Systems, pp. 231-245 | spa |
dcterms.bibliographicCitation | Ball, D., Waters, G. Cyber defence and warfare (2013) Security Challenges, 9 (2), pp. 91-98. | spa |
dcterms.bibliographicCitation | Bambauer, D.E. Ghost in the network (2014) University of Pennsylvania Law Review, 162 (5), pp. 1011-1091 | spa |
dcterms.bibliographicCitation | Bandaly, D., Shanker, L., Kahyaoglu, Y., Satir, A. Supply chain risk management-II: A review of operational, financial and integrated approaches (Open Access) (2013) Risk Management, 15 (1), pp. 1-31 | spa |
dcterms.bibliographicCitation | Bellabona, P., Spigarelli, F. Moving from open door to go global: China goes on the world stage (2007) International Journal of Chinese Culture and Management, 1 (1), p. 93 | spa |
dcterms.bibliographicCitation | Black, F., Scholes, M. The pricing of options and corporate liabilities (1973) Journal of Political Economy, 81 (3), pp. 637-657. | spa |
dcterms.bibliographicCitation | Blackwood-Brown, C., Levy, Y., D’Arcy, J. Cybersecurity Awareness and Skills of Senior Citizens: A Motivation Perspective (2021) Journal of Computer Information Systems, 61 (3), pp. 195-206. | spa |
dcterms.bibliographicCitation | Bousfield, D. Revisiting Cyber-Diplomacy: Canada–China Relations Online (2017) Globalizations, 14 (6), pp. 1045-1059. http://www.tandfonline.com/toc/rglo20/current doi: 10.1080/14747731.2017.1362176 | spa |
dcterms.bibliographicCitation | Boyson, S. Cyber supply chain risk management: Revolutionizing the strategic control of critical IT systems (2014) Technovation, 34 (7), pp. 342-353. | spa |
dcterms.bibliographicCitation | Brookson, C., Cadzow, S., Eckmaier, R., Eschweiler, J., Gerber, B., Guarino, A., Rannenberg, K., (...), Górniak, S. (2016) Definition of cybersecurity - gaps and overlaps in standardization. | spa |
dcterms.bibliographicCitation | Buil-Gil, D., Miró-Llinares, F., Moneva, A., Kemp, S., Díaz-Castaño, N. Cybercrime and shifts in opportunities during COVID-19: a preliminary analysis in the UK (Open Access) (2021) European Societies, 23 (S1), pp. S47-S59. | spa |
dcterms.bibliographicCitation | Cai, M. (2013) Making joint efforts to maintain cyber security (keynote at the 4th world cyberspace cooperation summit). | spa |
dcterms.bibliographicCitation | Cascavilla, G., Tamburri, D.A., Van Den Heuvel, W.-J. Cybercrime threat intelligence: A systematic multi-vocal literature review (Open Access) (2021) Computers and Security, 105, art. no. 102258. | spa |
dcterms.bibliographicCitation | Chana, F.T.S., Chong, A.Y.-L. Determinants of mobile supply chain management system diffusion: A structural equation analysis of manufacturing firms (2013) International Journal of Production Research, 51 (4), pp. 1196-1213 | spa |
dcterms.bibliographicCitation | Chandra, A., Snowe, M.J. A taxonomy of cybercrime: Theory and design (2020) International Journal of Accounting Information Systems, 38, art. no. 100467 | spa |
dcterms.bibliographicCitation | Chau, P.Y.K., Tam, K.Y. Factors affecting the adoption of open systems: An exploratory study (1997) MIS Quarterly: Management Information Systems, 21 (1), pp. 1-20 | spa |
dcterms.bibliographicCitation | (2019) Cyberattack trends: 2019- mid year report. | spa |
dcterms.bibliographicCitation | Cheung, K.-F., Bell, M.G.H., Bhattacharjya, J. Cybersecurity in logistics and supply chain management: An overview and future research directions (2021) Transportation Research Part E: Logistics and Transportation Review, 146, art. no. 102217. | spa |
dcterms.bibliographicCitation | Childerhouse, P., Hermiz, R., Mason-Jones, R., Popp, A., Towill, D.R. Information flow in automotive supply chains - Present industrial practice (2003) Industrial Management and Data Systems, 103 (3-4), pp. 137-149. | spa |
dcterms.bibliographicCitation | (2017) (2020 www.cnnic.cn/hlwfzyj/hlwxzbg/hlwtjbg/202004/P020200428399188064169.pdf | spa |
dcterms.bibliographicCitation | Cho, Y., Chung, J. Bring the State Back In: Conflict and Cooperation Among States in Cybersecurity (2017) Pacific Focus, 32 (2), pp. 290-314. | spa |
dcterms.bibliographicCitation | Choo, K.-K.R., Gai, K., Chiaraviglio, L., Yang, Q. A multidisciplinary approach to Internet of Things (IoT) cybersecurity and risk management (2021) Computers and Security, 102, art. no. 102136. | spa |
dcterms.bibliographicCitation | hopra, S., Reinhardt, G., Mohan, U. The importance of decoupling recurrent and disruption risks in a supply chain (Open Access) (2007) Naval Research Logistics, 54 (5), pp. 544-555. | spa |
dcterms.bibliographicCitation | Christopher, M., Lee, H. Mitigating supply chain risk through improved confidence (2004) International Journal of Physical Distribution and Logistics Management, 34 (5), pp. 388-396. | spa |
dcterms.bibliographicCitation | Christopher, M., Towill, D. An integrated model for the design of agile supply chains (2001) International Journal of Physical Distribution & Logistics Management, 31 (4), pp. 235-246. | spa |
dcterms.bibliographicCitation | (2020) Cisco cybersecurity report series 2020 www.newhorizons.com/Portals/278/Downloads/Final_Cisco_2020_ACR_WEB.pdf | spa |
dcterms.bibliographicCitation | Colajanni, G., Daniele, P., Giuffrè, S., Nagurney, A. Cybersecurity investments with nonlinear budget constraints and conservation laws: variational equilibrium, marginal expected utilities, and Lagrange multipliers (2018) International Transactions in Operational Research, 25 (5), pp. 1443-1464. | spa |
dcterms.bibliographicCitation | Crosston, M. World gone cyber MAD: how ‘mutually assured debilitation’ is the best hope for cyber deterrence (2011) Strategic Studies Quarterly, 5 (1), pp. 100-116. | spa |
dcterms.bibliographicCitation | Cui, Y., Kara, S., Chan, K.C. Manufacturing big data ecosystem: A systematic literature review (Open Access) (2020) Robotics and Computer-Integrated Manufacturing, 62, art. no. 101861. | spa |
dcterms.bibliographicCitation | Dahabiyeh, L. Factors affecting organizational adoption and acceptance of computer-based security awareness training tools (2021) Information and Computer Security, 29 (5), pp. 836-849. https://www.emerald.com/insight/publication/issn/2056-4961 doi: 10.1108/ICS-12-2020-0200 | spa |
dcterms.bibliographicCitation | Daniels, N., Jokonya, O. Factors affecting digital transformation in the retail supply chain (2020) International Conference on Multidisciplinary Research, 2020-December, pp. 117-133. myres.net/ ISBN: 978-999490615-4 | spa |
dcterms.bibliographicCitation | Galinec, D., Moznik, D., Guberina, B. Cybersecurity and cyber defence: national level strategic approach (Open Access) (2017) Automatika, 58 (3), pp. 273-286. | spa |
dcterms.bibliographicCitation | Dashora, K. Cyber crime in the society: problems and preventions (2011) Journal of Alternative Perspectives in the Social Sciences, 3 (1), pp. 240-259. | spa |
dcterms.bibliographicCitation | Davis, F.D. Perceived usefulness, perceived ease of use, and user acceptance of information technology (1989) MIS Quarterly: Management Information Systems, 13 (3), pp. 319-339. | spa |
dcterms.bibliographicCitation | Davis, A. Building cyber-resilience into supply chains (2015) Technology Innovation Management Review, 5 (4). | spa |
dcterms.bibliographicCitation | Dehghani, M., Mashatan, A., Kennedy, R.W. Innovation within networks–patent strategies for blockchain technology (2020) Journal of Business & Industrial Marketing. | spa |
dcterms.bibliographicCitation | Deibert, R. Tracking the emerging arms race in cyberspace (2011) Bulletin of the Atomic Scientists, 67 (1), pp. 1-8 | spa |
dcterms.bibliographicCitation | DePietro, R., Wiarda, E., Fleischer, M. The context for change: organization, technology and environment (1990) The Process of Technological Innovation, pp. 151-175. | spa |
dcterms.bibliographicCitation | Duong, L.N.K., Al-Fadhli, M., Jagtap, S., Bader, F., Martindale, W., Swainson, M., Paoli, A. A review of robotics and autonomous systems in the food industry: From the supply chains perspective (Open Access) (2020) Trends in Food Science and Technology, 106, pp. 355-364. | spa |
dcterms.bibliographicCitation | (2021) ENISA threat landscape for supply chain attacks. | spa |
dcterms.bibliographicCitation | Etemadi, N., Van Gelder, P., Strozzi, F. An ism modeling of barriers for blockchain/distributed ledger technology adoption in supply chains towards cybersecurity (Open Access) (2021) Sustainability (Switzerland), 13 (9), art. no. 4672. | spa |
dcterms.bibliographicCitation | (2021) Everstream analytics: annual risk report 2021. | spa |
dcterms.bibliographicCitation | Feng, Y. The future of China’s personal data protection law: challenges and prospects (2019) Asia Pacific Law Review, 27 (1), pp. 62-82. | spa |
dcterms.bibliographicCitation | Fosso Wamba, S., Kala Kamdjoug, J.R., Epie Bawack, R., Keogh, J.G. Bitcoin, blockchain, and FinTech: a systematic review and case studies in the supply chain (2018) Production Planning and Control. | spa |
dcterms.bibliographicCitation | Fracalossi de Moraes, R. Whither Security Cooperation in the BRICS? Between the Protection of Norms and Domestic Politics Dynamics (2020) Global Policy, 11 (4), pp. 439-447. http://onlinelibrary.wiley.com/journal/10.1111/(ISSN)1758-5899 doi: 10.1111/1758-5899.12846 | spa |
dcterms.bibliographicCitation | Ghadge, A., Weiß, M., Caldwell, N.D., Wilding, R. Managing cyber risk in supply chains: a review and research agenda (Open Access) (2020) Supply Chain Management, 25 (2), pp. 223-240. | spa |
dcterms.bibliographicCitation | Gilal, F., Jian, Z., Paul, J., Gilal, N. The role of self-determination theory in marketing science: an integrative review and agenda for marketing research (2018) European Management Journal | spa |
dcterms.bibliographicCitation | Gill, B. The United States and Asia in 2015: Across the region, US-China competition intensifies (2016) Asian Survey, 56 (1), pp. 8-18. http://caliber.ucpress.net/loi/as doi: 10.1525/AS.2016.56.1.8 | spa |
dcterms.bibliographicCitation | Gjesvik, L., Øverbø, E.J. (2019) Internasjonal Politikk, 77 (3), pp. 278-287. https://tidsskriftet-ip.no/index.php/intpol/article/view/1396 doi: 10.23865/intpol.v77.1396 | spa |
dcterms.bibliographicCitation | Goel, R., Kumar, A., Haddow, J. PRISM: a strategic decision framework for cybersecurity risk assessment (2020) Information and Computer Security, 28 (4), pp. 591-625. | spa |
dcterms.bibliographicCitation | Golmohammadi, A., Hassini, E. Review of supplier diversification and pricing strategies under random supply and demand (2020) International Journal of Production Research, 58 (11), pp. 3455-3487. | spa |
dcterms.bibliographicCitation | Gökalp, E., Gökalp, M., Çoban, S. Blockchain-based supply chain management: understanding the determinants of adoption in the context of organizations (2020) Information Systems Management, pp. 1-22. | spa |
dcterms.bibliographicCitation | Goodhue, D.L., Thompson, R.L. Task-technology fit and individual performance (1995) MIS Quarterly: Management Information Systems, 19 (2), pp. 213-233. | spa |
dcterms.bibliographicCitation | Gourisetti, S.N.G., Mylrea, M., Patangia, H. Evaluation and Demonstration of Blockchain Applicability Framework (2020) IEEE Transactions on Engineering Management, 67 (4), art. no. 8822381, pp. 1142-1156. | spa |
dcterms.bibliographicCitation | Gupta, P., Chauhan, S., Paul, J., Jaiswal, M.P. Social entrepreneurship research: A review and future research agenda (2020) Journal of Business Research, 113, pp. 209-229. | spa |
dcterms.bibliographicCitation | Gupta, S., Meissonier, R., Drave, V.A., Roubaud, D. Examining the impact of Cloud ERP on sustainable performance: A dynamic capability view (2020) International Journal of Information Management, 51, art. no. 102028. | spa |
dcterms.bibliographicCitation | Hang, N. The rise of China: challenges, implications, and options for the United States (2017) Indian Journal of Asian Affairs, 30 (1-2), pp. 47-64 | spa |
dcterms.bibliographicCitation | Harfouche, A., Robbin, A. E-government (2015) Wiley Encyclopedia of Management John Wiley and Sons, Ltd www.researchgate.net/profile/AliceRobbin/publication/319615017_EGovernment/links/5c1aa7d192851c22a3381630/E-Government.pdf | spa |
dcterms.bibliographicCitation | Hasan, S., Ali, M., Kurnia, S., Thurasamy, R. Evaluating the cyber security readiness of organizations and its influence on performance (2021) Journal of Information Security and Applications, 58, art. no. 102726. | spa |
dcterms.bibliographicCitation | Hassija, V., Chamola, V., Gupta, V., Jain, S., Guizani, N. A survey on supply chain security: application areas, security threats, and solution architectures (2020) IEEE Internet of Things Journal, p. 1. | spa |
dcterms.bibliographicCitation | Hassija, V., Chamola, V., Krishna, D.N.G., Kumar, N., Guizani, M. A Blockchain and Edge-Computing-Based Secure Framework for Government Tender Allocation (2021) IEEE Internet of Things Journal, 8 (4), art. no. 9206548, pp. 2409-2418. | spa |
dcterms.bibliographicCitation | Hayden, P., Woolrich, D., Sobolewski, K. Providing cyber situational awareness on defense platform networks (2004) The Cyber Defense Review, 2 (2), pp. 125-140. | spa |
dcterms.bibliographicCitation | Heath, E.A., Mitchell, J.E., Sharkey, T.C. Models for restoration decision making for a supply chain network after a cyber attack (Open Access) (2020) Journal of Defense Modeling and Simulation, 17 (1), pp. 5-19. | spa |
dcterms.bibliographicCitation | Herzog, S. Revisiting the Estonian cyber attacks: digital threats and multinational responses (2011) Journal of Strategic Security, 4 (2), pp. 49-60. | spa |
dcterms.bibliographicCitation | Hjortdal, M. China’s use of cyber warfare: espionage meets strategic deterrence (2017) Journal of Strategic Security, 4 (2), pp. 1-24. | spa |
dcterms.bibliographicCitation | Huma, Z.E., Latif, S., Ahmad, J., Idrees, Z., Ibrar, A., Zou, Z., Alqahtani, F., (...), Baothman, F. A Hybrid Deep Random Neural Network for Cyberattack Detection in the Industrial Internet of Things (Open Access) (2021) IEEE Access, 9, art. no. 9399085, pp. 55595-55605. | spa |
dcterms.bibliographicCitation | Huang, Y., Liu, S., Zhang, C., You, X., Wu, H. True-data testbed for 5G/B5G intelligent network (2021) Intelligent and Converged Networks, 2 (2), pp. 133-149. | spa |
dcterms.bibliographicCitation | Iasiello, E. China's cyber initiatives counter international pressure (Open Access) (2016) Journal of Strategic Security, 10 (1), pp. 1-16. | spa |
dcterms.bibliographicCitation | Ikenson, D. (2017) Cybersecurity or protectionism? Defusing the most volatile issue in the US-China relationship. | spa |
dcterms.bibliographicCitation | Jabbour, K., Devendorf, E. Cyber threat characterization (2017) The Cyber Defense Review, 2 (3), pp. 79-94 | spa |
dcterms.bibliographicCitation | abbour, K., Poisson, J. Cyber risk assessment in distributed information systems (2016) The Cyber Defense Review, 1 (1), pp. 91-112. | spa |
datacite.rights | http://purl.org/coar/access_right/c_abf2 | spa |
oaire.version | http://purl.org/coar/version/c_ab4af688f83e57aa | spa |
dc.type.driver | info:eu-repo/semantics/article | spa |
dc.type.hasversion | info:eu-repo/semantics/restrictedAccess | spa |
dc.identifier.doi | 10.1108/JABS-11-2020-0444 | |
dc.subject.keywords | China | spa |
dc.subject.keywords | Supply chain | spa |
dc.subject.keywords | Supply chain management | spa |
dc.subject.keywords | Cybersecurity | spa |
dc.subject.keywords | Cyberattacks | spa |
dc.subject.keywords | Supply chain risks | spa |
dc.subject.keywords | TOE framework | spa |
dc.rights.accessrights | info:eu-repo/semantics/openAccess | spa |
dc.rights.cc | Attribution-NonCommercial-NoDerivatives 4.0 Internacional | * |
dc.identifier.instname | Universidad Tecnológica de Bolívar | spa |
dc.identifier.reponame | Repositorio Universidad Tecnológica de Bolívar | spa |
dc.publisher.place | Cartagena de Indias | spa |
dc.subject.armarc | LEMB | |
dc.type.spa | http://purl.org/coar/resource_type/c_2df8fbb1 | spa |
oaire.resourcetype | http://purl.org/coar/resource_type/c_2df8fbb1 | spa |
Ficheros en el ítem
Este ítem aparece en la(s) siguiente(s) colección(ones)
-
Productos de investigación [1453]
Universidad Tecnológica de Bolívar - 2017 Institución de Educación Superior sujeta a inspección y vigilancia por el Ministerio de Educación Nacional. Resolución No 961 del 26 de octubre de 1970 a través de la cual la Gobernación de Bolívar otorga la Personería Jurídica a la Universidad Tecnológica de Bolívar.