Mostrar el registro sencillo del ítem

dc.contributor.authorPérez-Moron, James
dc.date.accessioned2022-04-18T19:06:54Z
dc.date.available2022-04-18T19:06:54Z
dc.date.issued2021-08-10
dc.date.submitted2022-04-07
dc.identifier.citationPerez-Moron, James. (2021). Eleven years of cyberattacks on Chinese supply chains in an era of cyber warfare, a review and future research agenda. Journal of Asia Business Studies. ahead-of-print. 10.1108/JABS-11-2020-0444.spa
dc.identifier.urihttps://hdl.handle.net/20.500.12585/10670
dc.description.abstractPurpose – The contribution of this study aims to twofold: First, it provides an overview of the current state of research on cyberattacks on Chinese supply chains (SCs). Second, it offers a look at the Chinese Government’s approach to fighting cyberattacks on Chinese SCs and its calls for global governance. Design/methodology/approach – A comprehensive literature review was conducted on Clarivate Analytics’ Web of Science, in Social Sciences Citation Index journals, Scopus and Google Scholar, published between 2010–2021. A systematic review of practitioner literature was also conducted. Findings – Chinese SCs have become a matter of national security, especially in the era of cyber warfare. The risks to SC have been outlined. Cybersecurity regulations are increasing as China aims to build a robust environment for cyberspace development. Using the Technology-organizationenvironment (TOE) framework, the results show that the top five factors influencing the adoption process in firms are as follows: relative advantage and technological readiness (Technology context); top management support and firm size (Organization context) and government policy and regulations (Environment context). Research limitations/implications – This review focuses on cyberattacks on Chinese SCs and great care was taken when selecting search terms. However, the author acknowledges that the choice of databases/terms may have excluded a few articles on cyberattacks from this review. Practical implications – This review provides managerial insights for SC practitioners into how cyberattacks have the potential to disrupt the global SC network. Originality/value – Past researchers proposed a taxonomic approach to evaluate progress with SC integration into Industry 4.0; in contrast, this study is one of the first steps toward an enhanced understanding of cyberattacks on Chinese SCs and their contribution to the global SC network using the TOE frameworkspa
dc.format.extent26 Páginas
dc.format.mimetypeapplication/pdfspa
dc.language.isoengspa
dc.rights.urihttp://creativecommons.org/licenses/by-nc-nd/4.0/*
dc.sourceJournal of Asia Business Studies - Vol. 16 N° 2 (2022)spa
dc.titleEleven years of cyberattacks on Chinese supply chains in an era of cyber warfare, a review and future research agendaspa
dcterms.bibliographicCitationAhmad, A., Maynard, S.B., Desouza, K.C., Kotsias, J., Whitty, M.T., Baskerville, R.L. How can organizations develop situation awareness for incident response: A case study of management practice (Open Access) (2021) Computers and Security, 101, art. no. 102122. Cited 16 times. https://www.journals.elsevier.com/computers-and-security doi: 10.1016/j.cose.2020.102122spa
dcterms.bibliographicCitationAl Hadwera, A., Tavana, M., Gillis, D., Rezania, D. (2021) A systematic review of organizational factors impacting cloud-based technology adoption using Technology-organization-environment framework Internet of Things, 100407spa
dcterms.bibliographicCitationAlazab, M., Alhyari, S., Awajan, A., Abdallah, A.B. Blockchain technology in supply chain management: an empirical study of the factors affecting user adoption/acceptance (2021) Cluster Computing, 24 (1), pp. 83-101. Cited 14 times. https://link.springer.com/journal/volumesAndIssues/10586 doi: 10.1007/s10586-020-03200-4spa
dcterms.bibliographicCitationAlazab, M., Lakshmanna, K., G, T.R., Pham, Q.-V., Reddy Maddikunta, P.K. Multi-objective cluster head selection using fitness averaged rider optimization algorithm for IoT networks in smart cities (2021) Sustainable Energy Technologies and Assessments, 43, art. no. 100973. Cited 31 times. http://www.journals.elsevier.com/sustainable-energy-technologies-and-assessments doi: 10.1016/j.seta.2020.100973spa
dcterms.bibliographicCitationAlzubaidi, A. Cybercrime Awareness among Saudi Nationals: Dataset (Open Access) (2021) Data in Brief, 36, art. no. 106965. Cited 2 times. https://www.journals.elsevier.com/data-in-brief doi: 10.1016/j.dib.2021.106965spa
dcterms.bibliographicCitationAnnarelli, A., Nonino, F., Palombi, G. Understanding the management of cyber resilient systems (2020) Computers and Industrial Engineering, 149, art. no. 106829. Cited 15 times. https://www.journals.elsevier.com/computers-and-industrial-engineering doi: 10.1016/j.cie.2020.106829spa
dcterms.bibliographicCitationAriffin, K.A.Z., Ahmad, F.H. Indicators for maturity and readiness for digital forensic investigation in era of industrial revolution 4.0 (2021) Computers and Security, 105, art. no. 102237. Cited 9 times. https://www.journals.elsevier.com/computers-and-security doi: 10.1016/j.cose.2021.102237spa
dcterms.bibliographicCitationAustin, G. (2016) China, and Cybersecurity: Espionage, Strategy, and Politics in the Digital Domain, p. 398. p., Oxford University Press, New York, NY: 2015, The China Journal, 75, 161–163spa
dcterms.bibliographicCitationAyson, R. New Zealand and the great irresponsibles: coping with Russia, China and the US (Open Access) (2020) Australian Journal of International Affairs, 74 (4), pp. 455-478. Cited 3 times. http://www.tandf.co.uk/journals/titles/10357718. doi: 10.1080/10357718.2020.1734773spa
dcterms.bibliographicCitationBaker, J. The technology–organization–environment framework (2011) Integrated Series in Information Systems, pp. 231-245spa
dcterms.bibliographicCitationBall, D., Waters, G. Cyber defence and warfare (2013) Security Challenges, 9 (2), pp. 91-98.spa
dcterms.bibliographicCitationBambauer, D.E. Ghost in the network (2014) University of Pennsylvania Law Review, 162 (5), pp. 1011-1091spa
dcterms.bibliographicCitationBandaly, D., Shanker, L., Kahyaoglu, Y., Satir, A. Supply chain risk management-II: A review of operational, financial and integrated approaches (Open Access) (2013) Risk Management, 15 (1), pp. 1-31spa
dcterms.bibliographicCitationBellabona, P., Spigarelli, F. Moving from open door to go global: China goes on the world stage (2007) International Journal of Chinese Culture and Management, 1 (1), p. 93spa
dcterms.bibliographicCitationBlack, F., Scholes, M. The pricing of options and corporate liabilities (1973) Journal of Political Economy, 81 (3), pp. 637-657.spa
dcterms.bibliographicCitationBlackwood-Brown, C., Levy, Y., D’Arcy, J. Cybersecurity Awareness and Skills of Senior Citizens: A Motivation Perspective (2021) Journal of Computer Information Systems, 61 (3), pp. 195-206.spa
dcterms.bibliographicCitationBousfield, D. Revisiting Cyber-Diplomacy: Canada–China Relations Online (2017) Globalizations, 14 (6), pp. 1045-1059. http://www.tandfonline.com/toc/rglo20/current doi: 10.1080/14747731.2017.1362176spa
dcterms.bibliographicCitationBoyson, S. Cyber supply chain risk management: Revolutionizing the strategic control of critical IT systems (2014) Technovation, 34 (7), pp. 342-353.spa
dcterms.bibliographicCitationBrookson, C., Cadzow, S., Eckmaier, R., Eschweiler, J., Gerber, B., Guarino, A., Rannenberg, K., (...), Górniak, S. (2016) Definition of cybersecurity - gaps and overlaps in standardization.spa
dcterms.bibliographicCitationBuil-Gil, D., Miró-Llinares, F., Moneva, A., Kemp, S., Díaz-Castaño, N. Cybercrime and shifts in opportunities during COVID-19: a preliminary analysis in the UK (Open Access) (2021) European Societies, 23 (S1), pp. S47-S59.spa
dcterms.bibliographicCitationCai, M. (2013) Making joint efforts to maintain cyber security (keynote at the 4th world cyberspace cooperation summit).spa
dcterms.bibliographicCitationCascavilla, G., Tamburri, D.A., Van Den Heuvel, W.-J. Cybercrime threat intelligence: A systematic multi-vocal literature review (Open Access) (2021) Computers and Security, 105, art. no. 102258.spa
dcterms.bibliographicCitationChana, F.T.S., Chong, A.Y.-L. Determinants of mobile supply chain management system diffusion: A structural equation analysis of manufacturing firms (2013) International Journal of Production Research, 51 (4), pp. 1196-1213spa
dcterms.bibliographicCitationChandra, A., Snowe, M.J. A taxonomy of cybercrime: Theory and design (2020) International Journal of Accounting Information Systems, 38, art. no. 100467spa
dcterms.bibliographicCitationChau, P.Y.K., Tam, K.Y. Factors affecting the adoption of open systems: An exploratory study (1997) MIS Quarterly: Management Information Systems, 21 (1), pp. 1-20spa
dcterms.bibliographicCitation(2019) Cyberattack trends: 2019- mid year report.spa
dcterms.bibliographicCitationCheung, K.-F., Bell, M.G.H., Bhattacharjya, J. Cybersecurity in logistics and supply chain management: An overview and future research directions (2021) Transportation Research Part E: Logistics and Transportation Review, 146, art. no. 102217.spa
dcterms.bibliographicCitationChilderhouse, P., Hermiz, R., Mason-Jones, R., Popp, A., Towill, D.R. Information flow in automotive supply chains - Present industrial practice (2003) Industrial Management and Data Systems, 103 (3-4), pp. 137-149.spa
dcterms.bibliographicCitation(2017) (2020 www.cnnic.cn/hlwfzyj/hlwxzbg/hlwtjbg/202004/P020200428399188064169.pdfspa
dcterms.bibliographicCitationCho, Y., Chung, J. Bring the State Back In: Conflict and Cooperation Among States in Cybersecurity (2017) Pacific Focus, 32 (2), pp. 290-314.spa
dcterms.bibliographicCitationChoo, K.-K.R., Gai, K., Chiaraviglio, L., Yang, Q. A multidisciplinary approach to Internet of Things (IoT) cybersecurity and risk management (2021) Computers and Security, 102, art. no. 102136.spa
dcterms.bibliographicCitationhopra, S., Reinhardt, G., Mohan, U. The importance of decoupling recurrent and disruption risks in a supply chain (Open Access) (2007) Naval Research Logistics, 54 (5), pp. 544-555.spa
dcterms.bibliographicCitationChristopher, M., Lee, H. Mitigating supply chain risk through improved confidence (2004) International Journal of Physical Distribution and Logistics Management, 34 (5), pp. 388-396.spa
dcterms.bibliographicCitationChristopher, M., Towill, D. An integrated model for the design of agile supply chains (2001) International Journal of Physical Distribution & Logistics Management, 31 (4), pp. 235-246.spa
dcterms.bibliographicCitation(2020) Cisco cybersecurity report series 2020 www.newhorizons.com/Portals/278/Downloads/Final_Cisco_2020_ACR_WEB.pdfspa
dcterms.bibliographicCitationColajanni, G., Daniele, P., Giuffrè, S., Nagurney, A. Cybersecurity investments with nonlinear budget constraints and conservation laws: variational equilibrium, marginal expected utilities, and Lagrange multipliers (2018) International Transactions in Operational Research, 25 (5), pp. 1443-1464.spa
dcterms.bibliographicCitationCrosston, M. World gone cyber MAD: how ‘mutually assured debilitation’ is the best hope for cyber deterrence (2011) Strategic Studies Quarterly, 5 (1), pp. 100-116.spa
dcterms.bibliographicCitationCui, Y., Kara, S., Chan, K.C. Manufacturing big data ecosystem: A systematic literature review (Open Access) (2020) Robotics and Computer-Integrated Manufacturing, 62, art. no. 101861.spa
dcterms.bibliographicCitationDahabiyeh, L. Factors affecting organizational adoption and acceptance of computer-based security awareness training tools (2021) Information and Computer Security, 29 (5), pp. 836-849. https://www.emerald.com/insight/publication/issn/2056-4961 doi: 10.1108/ICS-12-2020-0200spa
dcterms.bibliographicCitationDaniels, N., Jokonya, O. Factors affecting digital transformation in the retail supply chain (2020) International Conference on Multidisciplinary Research, 2020-December, pp. 117-133. myres.net/ ISBN: 978-999490615-4spa
dcterms.bibliographicCitationGalinec, D., Moznik, D., Guberina, B. Cybersecurity and cyber defence: national level strategic approach (Open Access) (2017) Automatika, 58 (3), pp. 273-286.spa
dcterms.bibliographicCitationDashora, K. Cyber crime in the society: problems and preventions (2011) Journal of Alternative Perspectives in the Social Sciences, 3 (1), pp. 240-259.spa
dcterms.bibliographicCitationDavis, F.D. Perceived usefulness, perceived ease of use, and user acceptance of information technology (1989) MIS Quarterly: Management Information Systems, 13 (3), pp. 319-339.spa
dcterms.bibliographicCitationDavis, A. Building cyber-resilience into supply chains (2015) Technology Innovation Management Review, 5 (4).spa
dcterms.bibliographicCitationDehghani, M., Mashatan, A., Kennedy, R.W. Innovation within networks–patent strategies for blockchain technology (2020) Journal of Business & Industrial Marketing.spa
dcterms.bibliographicCitationDeibert, R. Tracking the emerging arms race in cyberspace (2011) Bulletin of the Atomic Scientists, 67 (1), pp. 1-8spa
dcterms.bibliographicCitationDePietro, R., Wiarda, E., Fleischer, M. The context for change: organization, technology and environment (1990) The Process of Technological Innovation, pp. 151-175.spa
dcterms.bibliographicCitationDuong, L.N.K., Al-Fadhli, M., Jagtap, S., Bader, F., Martindale, W., Swainson, M., Paoli, A. A review of robotics and autonomous systems in the food industry: From the supply chains perspective (Open Access) (2020) Trends in Food Science and Technology, 106, pp. 355-364.spa
dcterms.bibliographicCitation(2021) ENISA threat landscape for supply chain attacks.spa
dcterms.bibliographicCitationEtemadi, N., Van Gelder, P., Strozzi, F. An ism modeling of barriers for blockchain/distributed ledger technology adoption in supply chains towards cybersecurity (Open Access) (2021) Sustainability (Switzerland), 13 (9), art. no. 4672.spa
dcterms.bibliographicCitation(2021) Everstream analytics: annual risk report 2021.spa
dcterms.bibliographicCitationFeng, Y. The future of China’s personal data protection law: challenges and prospects (2019) Asia Pacific Law Review, 27 (1), pp. 62-82.spa
dcterms.bibliographicCitationFosso Wamba, S., Kala Kamdjoug, J.R., Epie Bawack, R., Keogh, J.G. Bitcoin, blockchain, and FinTech: a systematic review and case studies in the supply chain (2018) Production Planning and Control.spa
dcterms.bibliographicCitationFracalossi de Moraes, R. Whither Security Cooperation in the BRICS? Between the Protection of Norms and Domestic Politics Dynamics (2020) Global Policy, 11 (4), pp. 439-447. http://onlinelibrary.wiley.com/journal/10.1111/(ISSN)1758-5899 doi: 10.1111/1758-5899.12846spa
dcterms.bibliographicCitationGhadge, A., Weiß, M., Caldwell, N.D., Wilding, R. Managing cyber risk in supply chains: a review and research agenda (Open Access) (2020) Supply Chain Management, 25 (2), pp. 223-240.spa
dcterms.bibliographicCitationGilal, F., Jian, Z., Paul, J., Gilal, N. The role of self-determination theory in marketing science: an integrative review and agenda for marketing research (2018) European Management Journalspa
dcterms.bibliographicCitationGill, B. The United States and Asia in 2015: Across the region, US-China competition intensifies (2016) Asian Survey, 56 (1), pp. 8-18. http://caliber.ucpress.net/loi/as doi: 10.1525/AS.2016.56.1.8spa
dcterms.bibliographicCitationGjesvik, L., Øverbø, E.J. (2019) Internasjonal Politikk, 77 (3), pp. 278-287. https://tidsskriftet-ip.no/index.php/intpol/article/view/1396 doi: 10.23865/intpol.v77.1396spa
dcterms.bibliographicCitationGoel, R., Kumar, A., Haddow, J. PRISM: a strategic decision framework for cybersecurity risk assessment (2020) Information and Computer Security, 28 (4), pp. 591-625.spa
dcterms.bibliographicCitationGolmohammadi, A., Hassini, E. Review of supplier diversification and pricing strategies under random supply and demand (2020) International Journal of Production Research, 58 (11), pp. 3455-3487.spa
dcterms.bibliographicCitationGökalp, E., Gökalp, M., Çoban, S. Blockchain-based supply chain management: understanding the determinants of adoption in the context of organizations (2020) Information Systems Management, pp. 1-22.spa
dcterms.bibliographicCitationGoodhue, D.L., Thompson, R.L. Task-technology fit and individual performance (1995) MIS Quarterly: Management Information Systems, 19 (2), pp. 213-233.spa
dcterms.bibliographicCitationGourisetti, S.N.G., Mylrea, M., Patangia, H. Evaluation and Demonstration of Blockchain Applicability Framework (2020) IEEE Transactions on Engineering Management, 67 (4), art. no. 8822381, pp. 1142-1156.spa
dcterms.bibliographicCitationGupta, P., Chauhan, S., Paul, J., Jaiswal, M.P. Social entrepreneurship research: A review and future research agenda (2020) Journal of Business Research, 113, pp. 209-229.spa
dcterms.bibliographicCitationGupta, S., Meissonier, R., Drave, V.A., Roubaud, D. Examining the impact of Cloud ERP on sustainable performance: A dynamic capability view (2020) International Journal of Information Management, 51, art. no. 102028.spa
dcterms.bibliographicCitationHang, N. The rise of China: challenges, implications, and options for the United States (2017) Indian Journal of Asian Affairs, 30 (1-2), pp. 47-64spa
dcterms.bibliographicCitationHarfouche, A., Robbin, A. E-government (2015) Wiley Encyclopedia of Management John Wiley and Sons, Ltd www.researchgate.net/profile/AliceRobbin/publication/319615017_EGovernment/links/5c1aa7d192851c22a3381630/E-Government.pdfspa
dcterms.bibliographicCitationHasan, S., Ali, M., Kurnia, S., Thurasamy, R. Evaluating the cyber security readiness of organizations and its influence on performance (2021) Journal of Information Security and Applications, 58, art. no. 102726.spa
dcterms.bibliographicCitationHassija, V., Chamola, V., Gupta, V., Jain, S., Guizani, N. A survey on supply chain security: application areas, security threats, and solution architectures (2020) IEEE Internet of Things Journal, p. 1.spa
dcterms.bibliographicCitationHassija, V., Chamola, V., Krishna, D.N.G., Kumar, N., Guizani, M. A Blockchain and Edge-Computing-Based Secure Framework for Government Tender Allocation (2021) IEEE Internet of Things Journal, 8 (4), art. no. 9206548, pp. 2409-2418.spa
dcterms.bibliographicCitationHayden, P., Woolrich, D., Sobolewski, K. Providing cyber situational awareness on defense platform networks (2004) The Cyber Defense Review, 2 (2), pp. 125-140.spa
dcterms.bibliographicCitationHeath, E.A., Mitchell, J.E., Sharkey, T.C. Models for restoration decision making for a supply chain network after a cyber attack (Open Access) (2020) Journal of Defense Modeling and Simulation, 17 (1), pp. 5-19.spa
dcterms.bibliographicCitationHerzog, S. Revisiting the Estonian cyber attacks: digital threats and multinational responses (2011) Journal of Strategic Security, 4 (2), pp. 49-60.spa
dcterms.bibliographicCitationHjortdal, M. China’s use of cyber warfare: espionage meets strategic deterrence (2017) Journal of Strategic Security, 4 (2), pp. 1-24.spa
dcterms.bibliographicCitationHuma, Z.E., Latif, S., Ahmad, J., Idrees, Z., Ibrar, A., Zou, Z., Alqahtani, F., (...), Baothman, F. A Hybrid Deep Random Neural Network for Cyberattack Detection in the Industrial Internet of Things (Open Access) (2021) IEEE Access, 9, art. no. 9399085, pp. 55595-55605.spa
dcterms.bibliographicCitationHuang, Y., Liu, S., Zhang, C., You, X., Wu, H. True-data testbed for 5G/B5G intelligent network (2021) Intelligent and Converged Networks, 2 (2), pp. 133-149.spa
dcterms.bibliographicCitationIasiello, E. China's cyber initiatives counter international pressure (Open Access) (2016) Journal of Strategic Security, 10 (1), pp. 1-16.spa
dcterms.bibliographicCitationIkenson, D. (2017) Cybersecurity or protectionism? Defusing the most volatile issue in the US-China relationship.spa
dcterms.bibliographicCitationJabbour, K., Devendorf, E. Cyber threat characterization (2017) The Cyber Defense Review, 2 (3), pp. 79-94spa
dcterms.bibliographicCitationabbour, K., Poisson, J. Cyber risk assessment in distributed information systems (2016) The Cyber Defense Review, 1 (1), pp. 91-112.spa
datacite.rightshttp://purl.org/coar/access_right/c_abf2spa
oaire.versionhttp://purl.org/coar/version/c_ab4af688f83e57aaspa
dc.type.driverinfo:eu-repo/semantics/articlespa
dc.type.hasversioninfo:eu-repo/semantics/restrictedAccessspa
dc.identifier.doi10.1108/JABS-11-2020-0444
dc.subject.keywordsChinaspa
dc.subject.keywordsSupply chainspa
dc.subject.keywordsSupply chain managementspa
dc.subject.keywordsCybersecurityspa
dc.subject.keywordsCyberattacksspa
dc.subject.keywordsSupply chain risksspa
dc.subject.keywordsTOE frameworkspa
dc.rights.accessrightsinfo:eu-repo/semantics/openAccessspa
dc.rights.ccAttribution-NonCommercial-NoDerivatives 4.0 Internacional*
dc.identifier.instnameUniversidad Tecnológica de Bolívarspa
dc.identifier.reponameRepositorio Universidad Tecnológica de Bolívarspa
dc.publisher.placeCartagena de Indiasspa
dc.subject.armarcLEMB
dc.type.spahttp://purl.org/coar/resource_type/c_2df8fbb1spa
oaire.resourcetypehttp://purl.org/coar/resource_type/c_2df8fbb1spa


Ficheros en el ítem

Thumbnail
Thumbnail

Este ítem aparece en la(s) siguiente(s) colección(ones)

Mostrar el registro sencillo del ítem

http://creativecommons.org/licenses/by-nc-nd/4.0/
http://creativecommons.org/licenses/by-nc-nd/4.0/

Universidad Tecnológica de Bolívar - 2017 Institución de Educación Superior sujeta a inspección y vigilancia por el Ministerio de Educación Nacional. Resolución No 961 del 26 de octubre de 1970 a través de la cual la Gobernación de Bolívar otorga la Personería Jurídica a la Universidad Tecnológica de Bolívar.