Citations


Contact Us

For Marketing, Sales and Subscriptions Inquiries
2637 E Atlantic Blvd #43110
Pompano Beach, FL 33062
USA

Conference List

Supply Chain and Logistics Management and an Open Door Policy Concerning Cyber Security Introduction

Darrell Norman Burrell

,

Nimisha Bhargava

,

Orna Bradley-Swanson

,

Maurice Harmon

,

Jorja Wright

,

Delores Springs

,

Maurice Dawson

Darrell Norman Burrell 1

Nimisha Bhargava 2
Orna Bradley-Swanson 3
Maurice Harmon 4
Jorja Wright 5
Delores Springs 6
Maurice Dawson 7

  1. Florida Institute of Technology, USA. 1

  2. National Institute of Industrial Engineering, India. 2

  3. Walden University, USA. 3

  4. University of Phoenix, USA. 4

  5. University of Charleston, WV, USA. 5

  6. Regent University, USA. 6

  7. Illinois Institute of Technology, USA. 7

Pages: 1-10

DOI: 10.18488/journal.11.2020.91.1.10

Share :

Article History:

Received: 08 October, 2019
Revised: 15 November, 2019
Accepted: 17 December, 2019
Published: 24 January, 2020


Abstract:

The need for integrity and reliability in the supply chain and logistics management operations has a well-established array of theoretical frameworks that guide organizations and managers in the field. However, what is missing is a comprehensive, established framework for logistics and supply chain cybersecurity. The emerging area of cyber-supply chain security continues to lack suitable models to help secure critical data and systems. In all industries and fields today, cybersecurity is no longer just an information technology issue. It is a business sustainability and business strategy issue. The human factors in the cyber-supply chain operations represent the actions or events when human error results in a successful hack or data breach. Today, protecting logistics and supply chain organizations from cyber and data security risks is no longer just an information technology employee function. Every organizational employee has a responsibility in the data protection process. Progressive organizations are ones that can create methods, policies, and approaches that encourage employees to play an active role in the information and cybersecurity process. This paper explores innovative approaches around open-door systems as a proactive data security and cybersecurity risk reduction organizational strategy. This research provides cyber-supply chain practitioners and scholars an array of concepts to help them understand and describe the dynamics of cyber-supply chain and logistics management data security vulnerabilities and opportunities for process improvements.
Contribution/ Originality
This study contributes to the existing literature by exploring innovative approaches around open-door systems as a proactive risk reduction approach.

Keywords:

Logistics management, Cybersecurity, Human factors cybersecurity Whistleblowing.

Video:

Reference:

Alamoudi, Y. and W. Alamoudi, 2016. Cloud computing - the future of business. Journal of Information Systems Technology and Planning, 8(19): 41–60.

Bazzetta, D.J., 2015. Whistle-blowers and post-conventional moral development: Toward identifying ethical & moral leadership (Order No. 3688375). Available from ABI/INFORM Collection. (1673895415).

Bhargava, N., M.K. Madala and D.N. Burrell, 2018. Emotional acumen on the propensity of graduating technology students to whistle-blow about organizational cyber security breaches. International Journal of Smart Education and Urban Society (IJSEUS), 9(4): 1-14.Available at: https://doi.org/10.4018/ijseus.2018100101.

Boiko, A., V. Shendryk and O. Boiko, 2019. Information systems for supply chain management: Uncertainties, risks and cyber security. Procedia Computer Science, 149: 65-70.Available at: https://doi.org/10.1016/j.procs.2019.01.108.

Boyson, S., 2014. Cyber supply chain risk management: Revolutionizing the strategic control of critical IT systems. Technovation, 34(7): 342-353.Available at: https://doi.org/10.1016/j.technovation.2014.02.001.

Burkhead, R.L., 2014. A phenomenological study of information security incidents experienced by information security professionals providing corporate information security incident management (Order No. 3682325). Available from ProQuest Dissertations & Theses Globai.

Caridi, M., A. Moretto, A. Perego and A. Tumino, 2014. The benefits of supply chain visibility: A value assessment model. International Journal of Production Economics, 151: 1-19.

Colicchia, C., A. Creazza and D.A. Menachof, 2019. Managing cyber and information risks in supply chains: Insights from an exploratory analysis. Supply Chain Management: An International Journal, 24(2): 215-240.Available at: https://doi.org/10.1108/scm-09-2017-0289.

Courtemanche, G., 1988. The ethics of whistle-blowing. The Internal Auditor, 45(1): 36- 41.

Dhillon, G. and J. Backhouse, 1996. Risks in the use of information technology within organizations. International Journal of Information Management, 16(1): 65-74.Available at: https://doi.org/10.1016/0268-4012(95)00062-3.

Djatsa, F., 2019. Examining the relationship between millennial professionals’ perceptions of cybersecurity risks and users’ online security behaviors (Order No. 22623854). Available from ProQuest Dissertations & Theses Global. (2308215337).

Edwards, C.K., 2013. A framework for the governance of information security (doctoral dissertation). Retrieved from ProQuest Dissertations & Theses Global. (Order No. 3607548).

Fantazy, K. and S. Tipu, 2019. Exploring the relationships of the culture of competitiveness and knowledge development to sustainable supply chain management and organizational performance. Journal of Enterprise Information Management, 32(6): 936-963.Available at: https://doi.org/10.1108/jeim-06-2018-0129.

Gardiyawasam, P.H.S. and V.A. Oleshchuk, 2016. Privacy preserving mechanisms for enforcing security and privacy requirements in e-health solutions. International Journal of Information Management, 36(6): 1161-1173.Available at: https://doi.org/10.1016/j.ijinfomgt.2016.07.006.

Hoffman, W. and R.E. McNulty, 2010. A business ethics theory of whistle-blowing: Responding to the $1 trillion question. In M. Arszulowicz & W. Gasparski, (Eds.), Defense of Proper Action: The whistle-blowing. Piscataway, NJ: Transaction Publishers. pp: 45-60.

Holtfreter, R.E. and A. Harrington, 2015. Data breach trends in the United States. Journal of Financial Crime, 22(2): 242-260.Available at: https://doi.org/10.1108/jfc-09-2013-0055.

Lee, E., 2005. Whistleblowers: Heroes or villains. Accountants Today, August 2005: 14-18.

Lee, S.M. and J.S. Rha, 2016. Ambidextrous supply chain as a dynamic capability: Building a resilient supply chain. Management Decision, 54(1): 2-23.Available at: https://doi.org/10.1108/md-12-2014-0674.

Li, X. and C. Chandra, 2007. A knowledge integration framework for complex network management. Industrial Management & Data Systems, 107(8): 1089-1109.Available at: https://doi.org/10.1108/02635570710822769.

Madani, M. and P. Wajeetongratana, 2019. The effects of culture and human resources management policies on supply chain management strategy. Polish Journal of Management Studies, 19(1): 235-248.Available at: https://doi.org/10.17512/pjms.2019.19.1.18.

Martin, G., P. Martin, C. Hankin, A. Darzi and J. Kinross, 2017. Cybersecurity and healthcare: How safe are we? British Medical Journal (Clinical research ed.), 358: j3179-j3179.Available at: https://doi.org/10.1136/bmj.j3179.

McLeod, A. and D. Dolezel, 2018. Cyber-analytics: Modeling factors associated with healthcare data breaches. Decision Support Systems, 108: 57-68.Available at: https://doi.org/10.1016/j.dss.2018.02.007.

Miceli, M. and J.P. Near, 1992. Blowing the whistle. New York: Lexington Books.

Mutek, M.W. and A.D. Irwin, 2018. Focus on supply chain risk management. Contract Management, 58(11): 26–37.

Okonofua, H.I., 2018. The effects of information technology leadership and information security governance on information security risk management in usa organizations (Order No. 13426600). Available from ProQuest Dissertations & Theses Global. (2185921827).

Simchi-Levi, D., P. Kaminsky and E. Simchi-Levi, 2008. Designing and managing the supply chain concepts, strategies and cases. 3rd Edn., New York: McGraw-Hill Book Company.

Simon, J. and A. Omar, 2020. Cybersecurity investments in the supply chain: Coordination and a strategic attacker. European Journal of Operational Research, 282(1): 161-171.Available at: 10.1016/j.ejor.2019.09.017.

Soomro, Z.A., M.H. Shah and J. Ahmed, 2016. Information security management needs more holistic approach: A literature review. International Journal of Information Management, 36(2): 215-225.Available at: https://doi.org/10.1016/j.ijinfomgt.2015.11.009.

Stewart, D., 1996. Organization ethics. New York: McGraw-Hill Companies, Inc.

Symantec, 2019. ISTR Internet Security Threat Report. Available from https://www.symantec.com/content/dam/symantec/docs/reports/istr-24-2019-en.pdf.

The U.S. Securities and Exchange Commission, 2018. SEC adopts statement and interpretive guidance on public company cybersecurity disclosures. Available from https://www.sec.gov/news/press-release/2018-22.

Urciuoli, L. and J. Hintsa, 2017. Adapting supply chain management strategies to security–an analysis of existing gaps and recommendations for improvement. International Journal of Logistics Research and Applications, 20(3): 276-295.Available at: https://doi.org/10.1080/13675567.2016.1219703.

Vadera, A.K., R.V. Aguilera and B.B. Caza, 2009. Making sense of whistle-blowing's antecedents: Learning from research on identity and ethics programs. Business Ethics Quarterly, 19(4): 553-586.Available at: https://doi.org/10.5840/beq200919432.

Waytz, A., J. Dungan and L. Young, 2013. The New York Times, 1: SR12.

Weiss, J.W., 2006. Organization ethics. 4th Edn., Ontario, CA: Thompson/South West.

Wilde, J.H., 2013. Citizen watch in the accounting department? Tax and financial reporting responses to employee whistle-blowing allegations (Order No. 3608021). Available from ProQuest Dissertations & Theses Global. (1497226692).

Windelberg, M., 2016. Objectives for managing cyber supply chain risk. International Journal of Critical Infrastructure Protection, 100(12): 4-11.Available at: https://doi.org/10.1016/j.ijcip.2015.11.003.

Statistics:

Google Scholor ideas Microsoft Academic Search bing Google Scholor

Funding:

This study received no specific financial support.

Competing Interests:

The authors declare that they have no competing interests.

Acknowledgement:

Both authors contributed equally to the conception and design of the study.

Related Article

( 1 ) Strategic Supply Chain Framework as an Effective Approach to Procurement of Public Construction Projects in Nigeria
( 2 ) Supplier Selection and Optimization of Supply Chains
( 3 ) Pricing Strategy of Supply Chains with Uncertain Remanufacturing Rate and WTP Discrepancy
( 4 ) Sustainability in Supply Chain Management: The Role of Partner Collaboration and Power
( 5 ) Supply Chain and Logistics Management and an Open Door Policy Concerning Cyber Security Introduction
( 6 ) Fostering Supply Chain Integration through Blockchain Technology: A Study of Malaysian Manufacturing Sector
( 7 ) Mediating Effect of Integrated Systems on the Relationship between Supply Chain Management Practices and Public Healthcare Performance: Structural Equation Modeling
( 8 ) Application of Value Chain Analysis in the Sustainable Management of Tertiary Distance Education Programmes in Nigeria
( 16 ) The International Logistics Center of Turkey: Situational Analysis of Mersin Port’s Seaways Logistics
( 17 ) Development of Mobile Voice Picking and Cargo Tracing Systems with Internet of Things in Third-Party Logistics Warehouse Operations
( 19 ) Perception And Management of Human Fertility: A Shona Landscape
( 20 ) Compliance Behavior Analysis of the Ship Crew to the International Safety Management (Ism) Code in Indonesia
( 21 ) Reinventing South African Management Students as Stewards of Democratization: A Critical Pedagogy Perspective
( 22 ) Solutions to Improve Educational Management Quality
( 23 ) Does Risk Management Affect On Bank Efficiency? An Analysis of Sri Lankan Banking Sector
( 24 ) The Impact of Credit Risk Management on the Commercial Banks Performance in Nigeria
( 25 ) Analysis of Workplace Stress and Organizational Performance in Human Resource Management: A Case Study of Air Traffic Controllers of Pakistan
( 26 ) An Exploratory Study of Financial Management Practices Among Ghanaian Households
( 27 ) Management in Public Utility Companies in Ghana: An Appraisal of Ghana Water Company Limited
( 28 ) Features of a Strategic Approach to Human Resource Management
( 30 ) A Comprehensive Public-Private Partnership Concept for Resources Sustainability from a Mega-Project Management Multi-Level Perspective
( 31 ) Conceptual Framework of Brand Image for Tourism Industry: Tourism Management and Advertisement as Moderators
( 32 ) Sustainability Risk Management (SRM): An Extension of Enterprise Risk Management (ERM) Concept
( 33 ) Tourism and Hospitality Management Students’ Perceptions Towards Foreign Languages at State Universities in Zimbabwe: Case of Midlands State University
( 34 ) Analysis of Infectious Diseases Spreading Process and ICT-Based Management System
( 35 ) QSPM Usage in SWOT Analysis as a Tool for Strategic Management of Caspian Sea Coasts (Case Study: Tourism Development in Caspian Eastern Coast at Gilan Province)
( 36 ) The Relationship between Sport Organizational Management Practices and Coaching Leadership Style of Primer League Football Clubs in Ethiopian
( 37 ) Organisation Restructuring: The Influence of Interpersonal Conflict, Anomie, and Trust in Management on Counterproductive Work Behaviour
( 38 ) Management and Agrarian Sustainability-Impact of Institutions in Bulgaria
( 39 ) Customer Care Service Management is Moving Forward to Achieve Sustainable Customer Retention in Every Industry. Does it play a Role to Increase Brand Retention?
( 40 ) Managements and Tourists Knowledge and Appreciation of Eco-Labeling and Eco-Certification at Selected Coastal Tourist Destinations in Lagos, Nigeria