March 2020, Volume 9, 1, pp 1-10
Logistics management, Cybersecurity, Human factors cybersecurity Whistleblowing.
Bhargava, N., M.K. Madala and D.N. Burrell, 2018. Emotional acumen on the propensity of graduating technology students to whistle-blow about organizational cyber security breaches. International Journal of Smart Education and Urban Society (IJSEUS), 9(4): 1-14.Available at: https://doi.org/10.4018/ijseus.2018100101.
Boiko, A., V. Shendryk and O. Boiko, 2019. Information systems for supply chain management: Uncertainties, risks and cyber security. Procedia Computer Science, 149: 65-70.Available at: https://doi.org/10.1016/j.procs.2019.01.108.
Boyson, S., 2014. Cyber supply chain risk management: Revolutionizing the strategic control of critical IT systems. Technovation, 34(7): 342-353.Available at: https://doi.org/10.1016/j.technovation.2014.02.001.
Burkhead, R.L., 2014. A phenomenological study of information security incidents experienced by information security professionals providing corporate information security incident management (Order No. 3682325). Available from ProQuest Dissertations & Theses Globai.
Colicchia, C., A. Creazza and D.A. Menachof, 2019. Managing cyber and information risks in supply chains: Insights from an exploratory analysis. Supply Chain Management: An International Journal, 24(2): 215-240.Available at: https://doi.org/10.1108/scm-09-2017-0289.
Dhillon, G. and J. Backhouse, 1996. Risks in the use of information technology within organizations. International Journal of Information Management, 16(1): 65-74.Available at: https://doi.org/10.1016/0268-4012(95)00062-3.
Djatsa, F., 2019. Examining the relationship between millennial professionals’ perceptions of cybersecurity risks and users’ online security behaviors (Order No. 22623854). Available from ProQuest Dissertations & Theses Global. (2308215337).
Fantazy, K. and S. Tipu, 2019. Exploring the relationships of the culture of competitiveness and knowledge development to sustainable supply chain management and organizational performance. Journal of Enterprise Information Management, 32(6): 936-963.Available at: https://doi.org/10.1108/jeim-06-2018-0129.
Gardiyawasam, P.H.S. and V.A. Oleshchuk, 2016. Privacy preserving mechanisms for enforcing security and privacy requirements in e-health solutions. International Journal of Information Management, 36(6): 1161-1173.Available at: https://doi.org/10.1016/j.ijinfomgt.2016.07.006.
Hoffman, W. and R.E. McNulty, 2010. A business ethics theory of whistle-blowing: Responding to the $1 trillion question. In M. Arszulowicz & W. Gasparski, (Eds.), Defense of Proper Action: The whistle-blowing. Piscataway, NJ: Transaction Publishers. pp: 45-60.
Lee, S.M. and J.S. Rha, 2016. Ambidextrous supply chain as a dynamic capability: Building a resilient supply chain. Management Decision, 54(1): 2-23.Available at: https://doi.org/10.1108/md-12-2014-0674.
Li, X. and C. Chandra, 2007. A knowledge integration framework for complex network management. Industrial Management & Data Systems, 107(8): 1089-1109.Available at: https://doi.org/10.1108/02635570710822769.
Madani, M. and P. Wajeetongratana, 2019. The effects of culture and human resources management policies on supply chain management strategy. Polish Journal of Management Studies, 19(1): 235-248.Available at: https://doi.org/10.17512/pjms.2019.19.1.18.
Martin, G., P. Martin, C. Hankin, A. Darzi and J. Kinross, 2017. Cybersecurity and healthcare: How safe are we? British Medical Journal (Clinical research ed.), 358: j3179-j3179.Available at: https://doi.org/10.1136/bmj.j3179.
McLeod, A. and D. Dolezel, 2018. Cyber-analytics: Modeling factors associated with healthcare data breaches. Decision Support Systems, 108: 57-68.Available at: https://doi.org/10.1016/j.dss.2018.02.007.
Okonofua, H.I., 2018. The effects of information technology leadership and information security governance on information security risk management in usa organizations (Order No. 13426600). Available from ProQuest Dissertations & Theses Global. (2185921827).
Simon, J. and A. Omar, 2020. Cybersecurity investments in the supply chain: Coordination and a strategic attacker. European Journal of Operational Research, 282(1): 161-171.Available at: 10.1016/j.ejor.2019.09.017.
Soomro, Z.A., M.H. Shah and J. Ahmed, 2016. Information security management needs more holistic approach: A literature review. International Journal of Information Management, 36(2): 215-225.Available at: https://doi.org/10.1016/j.ijinfomgt.2015.11.009.
The U.S. Securities and Exchange Commission, 2018. SEC adopts statement and interpretive guidance on public company cybersecurity disclosures. Available from https://www.sec.gov/news/press-release/2018-22.
Urciuoli, L. and J. Hintsa, 2017. Adapting supply chain management strategies to security–an analysis of existing gaps and recommendations for improvement. International Journal of Logistics Research and Applications, 20(3): 276-295.Available at: https://doi.org/10.1080/13675567.2016.1219703.
Vadera, A.K., R.V. Aguilera and B.B. Caza, 2009. Making sense of whistle-blowing's antecedents: Learning from research on identity and ethics programs. Business Ethics Quarterly, 19(4): 553-586.Available at: https://doi.org/10.5840/beq200919432.
Wilde, J.H., 2013. Citizen watch in the accounting department? Tax and financial reporting responses to employee whistle-blowing allegations (Order No. 3608021). Available from ProQuest Dissertations & Theses Global. (1497226692).
Windelberg, M., 2016. Objectives for managing cyber supply chain risk. International Journal of Critical Infrastructure Protection, 100(12): 4-11.Available at: https://doi.org/10.1016/j.ijcip.2015.11.003.