CINXE.COM

A Survey on Supply Chain Management: Exploring Physical and Cyber Security Challenges, Threats, Critical Applications, and Innovative Technologies

<!DOCTYPE html> <!--[if IE 8]> <html class="ie ie8"> <![endif]--> <!--[if IE 9]> <html class="ie ie9"> <![endif]--> <!--[if gt IE 9]><!--> <html> <!--<![endif]--> <head> <meta charset="utf-8" /> <title>A Survey on Supply Chain Management: Exploring Physical and Cyber Security Challenges, Threats, Critical Applications, and Innovative Technologies</title> <!-- favicon --> <link rel="shortcut icon" type="image/ico" href="./data/ijsom/coversheet/favicon.ico" /> <!-- mobile settings --> <meta name="viewport" content="width=device-width, maximum-scale=1, initial-scale=1, user-scalable=0" /> <!--[if IE]><meta http-equiv='X-UA-Compatible' content='IE=edge,chrome=1'><![endif]--> <!-- user defined metatags --> <meta name="keywords" content="Supply Chain Management,Cybersecurity,Physical Security,Blockchain Technology,Artificial intelligence,Physically Unclonable Function" /> <meta name="description" content="Supply chain cybersecurity has become a critical concern for organizations due to the increasing frequency of cyber threats that endanger sensitive information, disrupt operations, and cause financial harm. This survey article presents the outcomes of a comprehensive study aimed at deepening our understanding of the challenges and best practices in supply chain cybersecurity. It provides a comprehensive review of critical applications that are susceptible to cyber threats across various sectors of the supply chain. The literature review identifies two distinct categories of approaches utilized to secure the supply chain: traditional and innovative methods. Both categories are extensively examined, providing valuable insights into the current state of supply chain cybersecurity. The findings of this study serve as a valuable resource for organizations seeking to enhance their cybersecurity strategies and fortify their resilience against evolving cyber threats. Furthermore, this research contributes to the knowledge base of supply chain management by facilitating the development of robust and efficient supply chain cybersecurity frameworks. By understanding vulnerabilities and best practices, organizations can proactively tackle cybersecurity challenges and safeguard their supply chains effectively. This survey article empowers organizations with practical insights and guidance to enhance their cybersecurity posture in the dynamic landscape of supply chain operations." /> <meta name="title" content="A Survey on Supply Chain Management: Exploring Physical and Cyber Security Challenges, Threats, Critical Applications, and Innovative Technologies" /> <meta name="googlebot" content="NOODP" /> <meta name="citation_title" content="A Survey on Supply Chain Management: Exploring Physical and Cyber Security Challenges, Threats, Critical Applications, and Innovative Technologies" /> <meta name="citation_author" content="Khokhar, Rashid Hussain" /> <meta name="citation_author_institution" content="Canadian Institute for Cybersecurity, University of New Brunswick" /> <meta name="citation_author" content="Rankothge, Windhya" /> <meta name="citation_author_institution" content="Canadian Institute for Cybersecurity, University of New Brunswick" /> <meta name="citation_author" content="Rashidi, Leila" /> <meta name="citation_author_institution" content="Huawei Ottawa Research &amp;amp; Development Centre" /> <meta name="citation_author" content="Mohammadian, Hesamodin" /> <meta name="citation_author_institution" content="Canadian Institute for Cybersecurity, University of New Brunswick" /> <meta name="citation_author" content="Frei, Brian" /> <meta name="citation_author_institution" content="ADGA Group Consultants Inc., Ottawa, Canada" /> <meta name="citation_author" content="Ellis, Shawn" /> <meta name="citation_author_institution" content="ADGA Group Consultants Inc., Ottawa, Canada" /> <meta name="citation_author" content="Freitas, Iago" /> <meta name="citation_author_institution" content="ADGA Group Consultants Inc., Ottawa, Canada" /> <meta name="citation_author" content="Ghorbani, Ali" /> <meta name="citation_author_institution" content="Canadian Institute for Cybersecurity, University of New Brunswick, Fredericton, Canada" /> <meta name="citation_abstract" content="Supply chain cybersecurity has become a critical concern for organizations due to the increasing frequency of cyber threats that endanger sensitive information, disrupt operations, and cause financial harm. This survey article presents the outcomes of a comprehensive study aimed at deepening our understanding of the challenges and best practices in supply chain cybersecurity. It provides a comprehensive review of critical applications that are susceptible to cyber threats across various sectors of the supply chain. The literature review identifies two distinct categories of approaches utilized to secure the supply chain: traditional and innovative methods. Both categories are extensively examined, providing valuable insights into the current state of supply chain cybersecurity. The findings of this study serve as a valuable resource for organizations seeking to enhance their cybersecurity strategies and fortify their resilience against evolving cyber threats. Furthermore, this research contributes to the knowledge base of supply chain management by facilitating the development of robust and efficient supply chain cybersecurity frameworks. By understanding vulnerabilities and best practices, organizations can proactively tackle cybersecurity challenges and safeguard their supply chains effectively. This survey article empowers organizations with practical insights and guidance to enhance their cybersecurity posture in the dynamic landscape of supply chain operations." /> <meta name="citation_id" content="2936" /> <meta name="citation_publication_date" content="2024/08/01" /> <meta name="citation_date" content="2024-08-01" /> <meta name="citation_journal_title" content="International Journal of Supply and Operations Management" /> <meta name="citation_issn" content="23831359" /> <meta name="citation_volume" content="11" /> <meta name="citation_issue" content="3" /> <meta name="citation_firstpage" content="250" /> <meta name="citation_lastpage" content="283" /> <meta name="citation_publisher" content="Kharazmi University" /> <meta name="citation_doi" content="10.22034/ijsom.2024.110219.2975" /> <meta name="DC.Identifier" content="10.22034/ijsom.2024.110219.2975" /> <meta name="citation_abstract_html_url" content="http://www.ijsom.com/article_2936.html" /> <meta name="citation_pdf_url" content="http://www.ijsom.com/article_2936_b978921cd9f7ae74570c1f0838f746b9.pdf" /> <meta name="DC.Title" content="A Survey on Supply Chain Management: Exploring Physical and Cyber Security Challenges, Threats, Critical Applications, and Innovative Technologies" /> <meta name="DC.Source" content="International Journal of Supply and Operations Management" /> <meta name="DC.Date" content="01/08/2024" /> <meta name="DC.Date.issued" content="2024-08-01" /> <meta name="DC.Format" content="application/pdf" /> <meta name="DC.Contributor" content="Khokhar, Rashid Hussain" /> <meta name="DC.Contributor" content="Rankothge, Windhya" /> <meta name="DC.Contributor" content="Rashidi, Leila" /> <meta name="DC.Contributor" content="Mohammadian, Hesamodin" /> <meta name="DC.Contributor" content="Frei, Brian" /> <meta name="DC.Contributor" content="Ellis, Shawn" /> <meta name="DC.Contributor" content="Freitas, Iago" /> <meta name="DC.Contributor" content="Ghorbani, Ali" /> <meta name="og:title" content="A Survey on Supply Chain Management: Exploring Physical and Cyber Security Challenges, Threats, Critical Applications, and Innovative Technologies" /> <meta name="og:description" content="Supply chain cybersecurity has become a critical concern for organizations due to the increasing frequency of cyber threats that endanger sensitive information, disrupt operations, and cause financial harm. This survey article presents the outcomes of a comprehensive study aimed at deepening our understanding of the challenges and best practices in supply chain cybersecurity. It provides a comprehensive review of critical applications that are susceptible to cyber threats across various sectors of the supply chain. The literature review identifies two distinct categories of approaches utilized to secure the supply chain: traditional and innovative methods. Both categories are extensively examined, providing valuable insights into the current state of supply chain cybersecurity. The findings of this study serve as a valuable resource for organizations seeking to enhance their cybersecurity strategies and fortify their resilience against evolving cyber threats. Furthermore, this research contributes to the knowledge base of supply chain management by facilitating the development of robust and efficient supply chain cybersecurity frameworks. By understanding vulnerabilities and best practices, organizations can proactively tackle cybersecurity challenges and safeguard their supply chains effectively. This survey article empowers organizations with practical insights and guidance to enhance their cybersecurity posture in the dynamic landscape of supply chain operations." /> <meta name="og:url" content="http://www.ijsom.com/article_2936.html" /> <!-- WEB FONTS : use %7C instead of | (pipe) --> <link href="./themes/base/front/assets/css/social-icon-font.css" rel="stylesheet" type="text/css" /> <!-- CORE CSS --> <link href="./themes/base/front/assets/plugins/bootstrap/css/bootstrap.min.css?v=0.02" rel="stylesheet" type="text/css" /> <link href="./themes/old/front/assets/css/header.css?v=0.05" rel="stylesheet" type="text/css" /> <link href="./themes/old/front/assets/css/footer.css" rel="stylesheet" type="text/css" /> <link href="./inc/css/essentials.css?v=0.2" rel="stylesheet" type="text/css" /> <link href="./inc/css/cookieconsent.min.css" rel="stylesheet" type="text/css" /> <link href="./inc/css/print.css" rel="stylesheet" type="text/css" media="print"/> <!-- RTL CSS --> <link href="./themes/base/front/assets/plugins/bootstrap/css/bootstrap-ltr.min.css" rel="stylesheet" type="text/css" /> <link href=" ./themes/base/front/assets/css/gfonts-OpenSans.css" rel="stylesheet" type="text/css" /> <link href="./themes/old/front/assets/css/accordian.css" rel="stylesheet" type="text/css" /> <link href="./themes/base/front/assets/css/academicons.min.css" rel="stylesheet" type="text/css" /> <!-- user defined metatags--> <meta name="google-site-verification" content="UlbWpwabckk_wTgRmzoJCVPEYKnomtCLcftujpXdou4" /> <link href="./data/ijsom/coversheet/stl_front.css?v=0.58" rel="stylesheet" type="text/css" /> <link href="./data/ijsom/coversheet/stl.css" rel="stylesheet" type="text/css" /> <!-- Feed--> <link rel="alternate" type="application/rss+xml" title="RSS feed" href="ju.rss" /> <script type="text/javascript" src="./themes/base/front/assets/plugins/jquery/jquery.min.js?v=0.5"></script> <script type="text/javascript" src="./inc/js/common.js?v=0.1"></script> <script type="text/javascript" src="./inc/js/jquery/cookieconsent.min.js"></script> <!-- Extra Style Scripts --> <!-- Extra Script Scripts --> <script src="inc/js/article.js?v=0.31" type="text/javascript" ></script> </head> <body class="ltr len"> <div class="container" id="header"> <div class="row"> <div class="col-xs-12 text-center"> <img src="./data/ijsom/coversheet/head_en.jpg" class="img-responsive text-center" style="display:-webkit-inline-box; width: 100%;" > </div> </div> </div> <div class="container"> <div class="row"> <div class="col-xs-12 col-lg-12 col-md-12 text-center"> <nav class="navbar navbar-default noborder nomargin noradius" role="navigation"> <div class="container-fluid nopadding" > <div class="navbar-header" style="background: #FFFFFF;"> <button type="button" class="navbar-toggle" data-toggle="collapse" data-target="#bs-example-navbar-collapse-1"> <span class="sr-only">Toggle navigation</span> <span class="icon-bar"></span> <span class="icon-bar"></span> <span class="icon-bar"></span> </button> <!-- <a class="navbar-brand" href="#">Brand</a> --> </div> <!-- Collect the nav links, forms, and other content for toggling --> <div class="collapse navbar-collapse nopadding" id="bs-example-navbar-collapse-1"> <ul class="nav navbar-nav"> <li><a href="././"> Home</a></li> <li class="dropdown"> <a href="" class="dropdown-toggle" data-toggle="dropdown">Browse <b class="caret"></b></a> <ul class="dropdown-menu"> <li><a href="./?_action=current">Current Issue</a></li> <li class="divider margin-bottom-6 margin-top-6"></li> <li><a href="./browse?_action=issue">By Issue</a></li> <li class="divider margin-bottom-6 margin-top-6"></li> <li><a href="./browse?_action=author">By Author</a></li> <li class="divider margin-bottom-6 margin-top-6"></li> <li><a href="./browse?_action=subject">By Subject</a></li> <li class="divider margin-bottom-6 margin-top-6"></li> <li><a href="./author.index">Author Index</a></li> <li class="divider margin-bottom-6 margin-top-6"></li> <li><a href="./keyword.index">Keyword Index</a></li> </ul> </li> <li class="dropdown"> <a href="" class="dropdown-toggle" data-toggle="dropdown">Journal Info <b class="caret"></b></a> <ul class="dropdown-menu"> <li><a href="./journal/about">About Journal</a></li> <li class="divider margin-bottom-6 margin-top-6"></li> <li><a href="./journal/aim_scope">Aims and Scope</a></li> <li class="divider margin-bottom-6 margin-top-6"></li> <li><a href="./journal/editorial.board">Editorial Board</a></li> <li class="divider margin-bottom-6 margin-top-6"></li> <li><a href="./journal/process?ethics">Publication Ethics</a></li> <li class="divider margin-bottom-6 margin-top-6"></li> <li><a href="./journal/indexing">Indexing and Abstracting</a></li> <li class="divider margin-bottom-6 margin-top-6"></li> <li><a href="./journal/links">Related Links</a></li> <li class="divider margin-bottom-6 margin-top-6"></li> <li><a href="./journal/faq">FAQ</a></li> <li class="divider margin-bottom-6 margin-top-6"></li> <li><a href="./journal/process">Peer Review Process</a></li> <li class="divider margin-bottom-6 margin-top-6"></li> <li><a href="./journal/metrics">Journal Metrics</a></li> <li class="divider margin-bottom-6 margin-top-6"></li> <li><a href="./news">News</a></li> </ul> </li> <li><a href="./journal/authors.note"> Guide for Authors</a></li> <li><a href="./author"> Submit Manuscript</a></li> <li><a href="./reviewer?_action=info"> Reviewers</a></li> <li><a href="./journal/contact.us"> Contact Us</a></li> </ul> <ul class="nav navbar-nav navbar-right nomargin"> <li><a href="./contacts">Login</a></li> <li><a href="./contacts?_action=signup">Register</a></li> </ul> </div> <!-- /.navbar-collapse --> </div> <!-- /.container-fluid --> </nav> </div> </div> </div> <!-- MAIN SECTION --> <div class="container" > <div id="dv_main_cnt"> <section class="no-cover-box"> <div class="row"> <!-- CENTER --> <div class="col-lg-9 col-md-9 col-sm-8" id="dv_artcl"> <!-- Current Issue --> <div> <h1 class="margin-bottom-20 size-18 ltr"><span class="article_title bold"> A Survey on Supply Chain Management: Exploring Physical and Cyber Security Challenges, Threats, Critical Applications, and Innovative Technologies</span></h1> <div> <div class="margin-bottom-3"> </div> <p class="margin-bottom-3">Document Type : Review Paper</p> <p class="padding-0" style="margin:12px -2px 0 -2px"><strong>Authors</strong></p> <ul class="list-inline list-inline-seprator margin-bottom-6 ltr"> <li class="padding-3"> <a href="./?_action=article&amp;au=130861&amp;_au=Rashid+Hussain+Khokhar">Rashid Hussain Khokhar</a> <sup><a href="mailto:rashid.khokhar@unb.ca" data-toggle="tooltip" data-placement="bottom" title="Email to Corresponding Author"><i class="fa fa-envelope-o" ></i></a></sup> <sup class="ltr"><a class=" text-green" href="https://www.orcid.org/0000-0002-2941-1239" data-toggle="tooltip" data-placement="bottom" data-html="true" title="ORCID: 0000-0002-2941-1239" target="_blank"><i class="ai ai-orcid size-13" ></i></a></sup> <sup><a href="#aff1" >1</a></sup> </li> <li class="padding-3"> <a href="./?_action=article&amp;au=130862&amp;_au=Windhya++Rankothge">Windhya Rankothge</a> <sup><a href="#aff1" >1</a></sup> </li> <li class="padding-3"> <a href="./?_action=article&amp;au=131044&amp;_au=Leila++Rashidi">Leila Rashidi</a> <sup><a href="#aff2" >2</a></sup> </li> <li class="padding-3"> <a href="./?_action=article&amp;au=130864&amp;_au=Hesamodin++Mohammadian">Hesamodin Mohammadian</a> <sup><a href="#aff1" >1</a></sup> </li> <li class="padding-3"> <a href="./?_action=article&amp;au=130865&amp;_au=Brian++Frei">Brian Frei</a> <sup><a href="#aff3" >3</a></sup> </li> <li class="padding-3"> <a href="./?_action=article&amp;au=130866&amp;_au=Shawn++Ellis">Shawn Ellis</a> <sup><a href="#aff3" >3</a></sup> </li> <li class="padding-3"> <a href="./?_action=article&amp;au=130867&amp;_au=Iago++Freitas">Iago Freitas</a> <sup><a href="#aff3" >3</a></sup> </li> <li class="padding-3"> <a href="./?_action=article&amp;au=130986&amp;_au=Ali++Ghorbani">Ali Ghorbani</a> <sup><a href="#aff4" >4</a></sup> </li> </ul> <p class="margin-bottom-3 ltr" id="aff1"> <sup>1</sup> Canadian Institute for Cybersecurity, University of New Brunswick </p> <p class="margin-bottom-3 ltr" id="aff2"> <sup>2</sup> Huawei Ottawa Research &amp;amp; Development Centre </p> <p class="margin-bottom-3 ltr" id="aff3"> <sup>3</sup> ADGA Group Consultants Inc., Ottawa, Canada </p> <p class="margin-bottom-3 ltr" id="aff4"> <sup>4</sup> Canadian Institute for Cybersecurity, University of New Brunswick, Fredericton, Canada </p> <div class="margin-bottom-3 ltr" id="ar_doi" title="DOI"><i class="ai ai-doi size-25 text-orange"></i> <span dir="ltr"><a href="https://dx.doi.org/10.22034/ijsom.2024.110219.2975">10.22034/ijsom.2024.110219.2975</a></span></div> <p style="margin:12px -2px 0 -2px"><strong>Abstract</strong></p> <div class="padding_abstract justify ltr">Supply chain cybersecurity has become a critical concern for organizations due to the increasing frequency of cyber threats that endanger sensitive information, disrupt operations, and cause financial harm. This survey article presents the outcomes of a comprehensive study aimed at deepening our understanding of the challenges and best practices in supply chain cybersecurity. It provides a comprehensive review of critical applications that are susceptible to cyber threats across various sectors of the supply chain. The literature review identifies two distinct categories of approaches utilized to secure the supply chain: traditional and innovative methods. Both categories are extensively examined, providing valuable insights into the current state of supply chain cybersecurity. The findings of this study serve as a valuable resource for organizations seeking to enhance their cybersecurity strategies and fortify their resilience against evolving cyber threats. Furthermore, this research contributes to the knowledge base of supply chain management by facilitating the development of robust and efficient supply chain cybersecurity frameworks. By understanding vulnerabilities and best practices, organizations can proactively tackle cybersecurity challenges and safeguard their supply chains effectively. This survey article empowers organizations with practical insights and guidance to enhance their cybersecurity posture in the dynamic landscape of supply chain operations.</div> <p class="padding-0" style="margin:12px -2px 0 -2px"><strong>Keywords</strong></p> <ul class="block list-inline list-inline-seprator margin-bottom-6 ltr"> <li class="padding-3"> <a class="tag_a" href="./?_action=article&amp;kw=102141&amp;_kw=Supply+Chain+Management" >Supply Chain Management</a> </li> <li class="padding-3"> <a class="tag_a" href="./?_action=article&amp;kw=106513&amp;_kw=Cybersecurity" >Cybersecurity</a> </li> <li class="padding-3"> <a class="tag_a" href="./?_action=article&amp;kw=106514&amp;_kw=Physical+Security" >Physical Security</a> </li> <li class="padding-3"> <a class="tag_a" href="./?_action=article&amp;kw=106515&amp;_kw=Blockchain+Technology" >Blockchain Technology</a> </li> <li class="padding-3"> <a class="tag_a" href="./?_action=article&amp;kw=102504&amp;_kw=Artificial+Intelligence" >Artificial Intelligence</a> </li> <li class="padding-3"> <a class="tag_a" href="./?_action=article&amp;kw=106516&amp;_kw=Physically+Unclonable+Function" >Physically Unclonable Function</a> </li> </ul> </div> <hr> <div class="page_break"></div> <div class="panel"> <div class="panel-heading card-header"> <h4 class="panel-title "> <a data-toggle="collapse" data-parent="#accordions" href="#collapsesRef"><i class="fa fa-plus"></i> References</a> </h4> </div> <div id="collapsesRef" class="panel-collapse collapse"> <div class="panel-body justify"> <ol><li class="ltr justify"><p>Abrams, L. (2021a).&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Chemical distributor pays $4.4 million to DarkSide ransomware. <a href="https://www.bleepingcomputer.com/news/security/chemical-distributor-pays-44-million-to-darkside-ransomware/">https://www.bleepingcomputer.com/news/security/chemical-distributor-pays</a><a href="https://www.bleepingcomputer.com/news/security/chemical-distributor-pays-44-million-to-darkside-ransomware/">44-million-to-darkside-ransomware/</a><a href="https://www.bleepingcomputer.com/news/security/chemical-distributor-pays-44-million-to-darkside-ransomware/">.</a></p> <p>Abrams, L. (2021b).&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Kia Motors America suffers ransomware attack, $20 million ransom. <a href="https://www.bleepingcomputer.com/news/security/kia-motors-america-suffers-ransomware-attack-20-million-ransom/">https://www.bleepingcomputer.com/news/security/kia-motors-america</a><a href="https://www.bleepingcomputer.com/news/security/kia-motors-america-suffers-ransomware-attack-20-million-ransom/">suffers-ransomware-attack-20-million-ransom/</a><a href="https://www.bleepingcomputer.com/news/security/kia-motors-america-suffers-ransomware-attack-20-million-ransom/">.</a></p> <p>Adnan, S. M., Hamdan, A., &amp; Alareeni, B. (2021). Artificial intelligence for public sector: Chatbots as a customer service representative. In <em>The Importance of New Technologies and Entrepreneurship in Business Development: In The Context of Economic Diversity in Developing Countries </em>(pp. 164&ndash;73). Springer International Publishing.</p> <p>Alkhader, W., Salah, K., Sleptchenko, A., Jayaraman, R., Yaqoob, I., &amp; Omar, M. (2021). Blockchain-based decentralized digital manufacturing and supply for COVID-19 medical devices and supplies. <em>IEEE Access</em>, <em>9</em>, 137923&ndash;4.</p> <p>Alshurideha, M. T., Alquqac, E. K., Alzoubid, H. M., AlKurdie, B., &amp; AlHamad, A. (2023). The impact of cyber resilience and robustness on supply chain performance: Evidence from the uae chemical industry. <em>Uncertain Supply Chain Management</em>, <em>11</em>.</p> <p>Alzahrani, N., &amp; Bulusu, N. (2018). Block-supply chain: A new anti-counterfeiting supply chain using NFC and Blockchain. <em>Proceedings of the 1st Workshop on Cryptocurrencies and Blockchains for Distributed Systems</em>.</p> <p>Andoni, M., Robu, V., Flynn, D., Abram, S., Geach, D., Jenkins, D., McCallum, P., &amp; Peacock, A. (2019). Blockchain technology in the energy sector: A systematic review of challenges and opportunities. <em>Renewable and Sustainable Energy Reviews</em>, <em>100</em>, 143&ndash;74.</p> <p>Aniello, L., Halak, B., Chai, P., Dhall, R., Mihalea, M., &amp; Wilczynski, A. (2019). Towards a supply chain management system for counterfeit mitigation using Blockchain and PUF.</p> <p>Arooj, A., Farooq, M. S., &amp; Umer, T. (2022). Unfolding the blockchain era: Timeline, evolution, types and real-world applications. <em>Journal of Network and Computer Applications</em>, (p. 103511).</p> <p>Arora, M., &amp; Gigras, Y. (2018). Importance of supply chain management in healthcare of third world countries. <em>International Journal of Supply and Operations Management</em>, <em>5</em>.</p> <p>Asante, M., Epiphaniou, G., Maple, C., Al-Khateeb, H., Bottarelli, M., &amp; Ghafoor, K. Z. (2021). Distributed ledger technologies in supply chain security management: A comprehensive survey. <em>IEEE Transactions on Engineering Management</em>, (pp. 1&ndash;27).</p> <p>Ashok, M., Madan, R., Joha, A., &amp; Sivarajah, U. (2022). Ethical framework for artificial intelligence and digital technologies. <em>International Journal of Information Management</em>, <em>62</em>, 102433.</p> <p>Aslam, J., Saleem, A., Khan, N. T., &amp; Kim, Y. B. (2021). Factors influencing blockchain adoption in supply chain management practices: A study based on the oil industry. <em>Journal of Innovation &amp; Knowledge</em>, <em>6</em>, 124&ndash;34.</p> <p>Baezner, M., &amp; Robin, P. (2017). <em>Stuxnet</em>. Technical Report ETH Zurich.</p> <p>Banerjea, A. (2018). NotPetya: How a Russian malware created the world&rsquo;s worst cyberattack ever. <a href="https://www.business-standard.com/article/technology/notpetya-how-a-russian-malware-created-the-world-s-worst-cyberattack-ever-118082700261_1.html">https://www.business-standard.com/article/technology/notpetya</a><a href="https://www.business-standard.com/article/technology/notpetya-how-a-russian-malware-created-the-world-s-worst-cyberattack-ever-118082700261_1.html">how-a-russian-malware-created-the-world-s-worst-cyberattack-ever</a><a href="https://www.business-standard.com/article/technology/notpetya-how-a-russian-malware-created-the-world-s-worst-cyberattack-ever-118082700261_1.html">118082700261_1.html</a><a href="https://www.business-standard.com/article/technology/notpetya-how-a-russian-malware-created-the-world-s-worst-cyberattack-ever-118082700261_1.html">.</a></p> <p>Booz-Allen, &amp; Hamilton (2004). Engineering principles for information technology security (a baseline for achieving security), revision a. <em>NIST Special Publication</em>.</p> <p>Bottoni, P., Gessa, N., Massa, G., Pareschi, R., Selim, H., &amp; Arcuri, E. (2020). Intelligent smart contracts for innovative supply chain management. <em>Frontiers in Blockchain</em>, <em>3</em>.</p> <p>Boyson, S. (2014). Cyber supply chain risk management: Revolutionizing the strategic control of critical IT systems. <em>Technovation</em>, <em>34</em>, 342&ndash;53.</p> <p>Brock, D. L. (2001). The electronic product code (EPC)-a naming scheme for physical objects. <em>White paper</em>, .</p> <p>Buckley, G. J., &amp; Gostin, L. O. (2013). Countering the problem of falsified and substandard drugs. <em>Consensus Study Report - Institute of Medicine</em>.</p> <p>Budhwar, P., Chowdhury, S., Wood, G., Aguinis, H., Bamber, G. J., Beltran, J. R., Boselie, P., Lee Cooke, F., Decker, S., DeNisi, A., Dey, P. K., Guest, D., Knoblich, A. J., Malik, A., Paauwe, J., Papagiannidis, S., Patel, C., Pereira, V., Ren, S., Rogelberg, S., Saunders, M. N. K., Tung, R. L., &amp; Varma, A. (2023). Human resource management in the age of generative artificial intelligence: Perspectives and research directions on ChatGPT. <em>Human Resource Management Journal</em>, <em>33</em>, 606&ndash;59.</p> <p>Carmody, S., Coravos, A., Fahs, G., Hatch, A., Medina, J., Woods, B., &amp; Corman, J. (2021). Building resilient medical technology supply chains with a software bill of materials. <em>NPJ Digital Medicine</em>, <em>4</em>, 1&ndash;6.</p> <p>Cheung, K.-F., Bell, M. G., &amp; Bhattacharjya, J. (2021). Cybersecurity in logistics and supply chain management: An overview and future research directions. <em>Transportation Research Part E: Logistics and Transportation Review</em>, <em>146</em>, 102217.</p> <p>Chmielewski, J., Daher, M., &amp; Ghazal, O. (2021). Enabling holistic decisionmaking to create a more intelligent network - The future of movement of goods. <a href="https://www2.deloitte.com/us/en/insights/focus/transportation/intelligent-supply-chain-movement-of-goods.html">https://www2.deloitte.com/us/en/insights/focus/transportation/intelligent</a><a href="https://www2.deloitte.com/us/en/insights/focus/transportation/intelligent-supply-chain-movement-of-goods.html">supply-chain-movement-of-goods.html</a><a href="https://www2.deloitte.com/us/en/insights/focus/transportation/intelligent-supply-chain-movement-of-goods.html">.</a></p> <p>Chowdhury, M., Rifat, N., Latif, S., Ahsan, M., Rahman, M. S., &amp; Gomes, R. (2023). ChatGPT: The curious case of attack vectors&rsquo; supply chain management improvement. <em>IEEE International Conference on Electro Information Technology</em>,.</p> <p>Christopher, M. L. (1992). Supply chain. <em>Logistics and Supply Chain Management</em>.</p> <p>Cimpanu, C. (2020a). Cloud provider stopped ransomware attack but had to pay ransom demand anyway. <a href="https://www.zdnet.com/article/cloud-provider-stopped-ransomware-attack-but-had-to-pay-ransom-demand-anyway/">https://www.zdnet.com/article/cloud-provider-stopped</a><a href="https://www.zdnet.com/article/cloud-provider-stopped-ransomware-attack-but-had-to-pay-ransom-demand-anyway/">ransomware-attack-but-had-to-pay-ransom-demand-anyway/</a><a href="https://www.zdnet.com/article/cloud-provider-stopped-ransomware-attack-but-had-to-pay-ransom-demand-anyway/">.</a></p> <p>Cimpanu, C. (2020b). FBI warns about ongoing attacks against software supply chain companies. <a href="https://www.zdnet.com/article/fbi-warns-about-ongoing-attacks-against-software-supply-chain-companies/">https://www.zdnet.com/article/fbi-warns-about-ongoing-attacks</a><a href="https://www.zdnet.com/article/fbi-warns-about-ongoing-attacks-against-software-supply-chain-companies/">against-software-supply-chain-companies/</a><a href="https://www.zdnet.com/article/fbi-warns-about-ongoing-attacks-against-software-supply-chain-companies/">.</a></p> <p>Coates, R. (2019). Counterfeits are still a major problem. <a href="https://www.scmr.com/article/counterfeits_are_still_a_major_problem">https://www.scmr.com/article/ </a><a href="https://www.scmr.com/article/counterfeits_are_still_a_major_problem">counterfeits_are_still_a_major_problem</a><a href="https://www.scmr.com/article/counterfeits_are_still_a_major_problem">.</a></p> <p>Constantin, L. (2020). SolarWinds attack explained: And why it was so hard to detect. <a href="https://www.csoonline.com/article/3601508/solarwinds-supply-chain-attack-explained-why-organizations-were-not-prepared.html">https://www.csoonline.com/article/3601508/solarwinds-supply-chain</a><a href="https://www.csoonline.com/article/3601508/solarwinds-supply-chain-attack-explained-why-organizations-were-not-prepared.html">attack-explained-why-organizations-were-not-prepared.html</a><a href="https://www.csoonline.com/article/3601508/solarwinds-supply-chain-attack-explained-why-organizations-were-not-prepared.html">.</a></p> <p>Cooper, M. C., &amp; Ellram, L. M. (1993). Characteristics of supply chain management and the implication for purchasing and logistics strategy. <em>The International Journal of Logistics Management</em>, <em>4</em>, 13&ndash;24.</p> <p>Cortese, P. F., Gemmiti, F., Palazzi, B., Pizzonia, M., &amp; Rimondini, M. (2010). Efficient and practical authentication of PUF-based RFID tags in supply chains. In <em>IEEE International Conference on RFID-Technology and Applications </em>(pp. 182&ndash;8).</p> <p>Cruz, L., &amp; Ignacio, P. S. D. A. (2023). Application of blockchain disruptive technology in agri-food chains for sustainable development, a systematic review. <em>International Journal of Supply and Operations Management</em>, <em>10</em>.</p> <p>Devadas, S., Suh, E., Paral, S., Sowell, R., Ziola, T., &amp; Khandelwal, V. (2008). Design and implementation of PUF-based &rdquo;unclonable&rdquo; RFID ICs for anti-counterfeiting and security applications. In <em>IEEE International Conference on RFID </em>(pp. 58&ndash;64).</p> <p>Doman, C. (2020). Team TNT &ndash; the first cryptomining worm to steal AWS credentials. <a href="https://www.cadosecurity.com/team-tnt-the-first-crypto-mining-worm-to-steal-aws-credentials/">https://www.cadosecurity.com/team-tnt-the-first-crypto-mining-worm</a><a href="https://www.cadosecurity.com/team-tnt-the-first-crypto-mining-worm-to-steal-aws-credentials/">to-steal-aws-credentials/</a><a href="https://www.cadosecurity.com/team-tnt-the-first-crypto-mining-worm-to-steal-aws-credentials/">.</a></p> <p>Duman, O., Ghafouri, M., Kassouf, M., Atallah, R., Wang, L., &amp; Debbabi, M. (2019). Modeling supply chain attacks in IEC 61850 substations. In <em>IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grids (SmartGridComm) </em>(pp. 1&ndash;6). IEEE.</p> <p>Dwivedi, Y. K., Kshetri, N., Hughes, L., Slade, E. L., Jeyaraj, A., Kar, A. K., Baabdullah, A. M., Koohang, A., Raghavan, V., Ahuja, M., Albanna, H., Albashrawi, M. A., AlBusaidi, A. S., Balakrishnan, J., Barlette, Y., Basu, S., Bose, I., Brooks, L., Buhalis, D., Carter, L., Chowdhury, S., Crick, T., Cunningham, S. W., Davies, G. H., Davison,</p> <ol start="102642"> <li class="ltr justify">M., D&acute;e, R., Dennehy, D., Duan, Y., Dubey, R., Dwivedi, R., Edwards, J. S., Flavia&acute;n, C., Gauld, R., Grover, V., Hu, M.-C., Janssen, M., Jones, P., Junglas, I., Khorana, S., Kraus, S., Larsen, K. R., Latreille, P., Laumer, S., Malik, F. T., Mardani, A., Mariani, M., Mithas, S., Mogaji, E., Nord, J. H., O&rsquo;Connor, S., Okumus, F., Pagani, M., Pandey, N., Papagiannidis, S., Pappas, I. O., Pathak, N., Pries-Heje, J., Raman, R., Rana, N. P., Rehm, S.-V., Ribeiro-Navarrete, S., Richter, A., Rowe, F., Sarker, S., Stahl, B. C., Tiwari, M. K., van der Aalst, W., Venkatesh, V., Viglia, G., Wade, M., Walton, P., Wirtz, J., &amp; Wright, R. (2023). Opinion paper: &ldquo;so what if chatgpt wrote it?&rdquo; multidisciplinary perspectives on opportunities, challenges and implications of generative conversational for research, practice and policy. <em>International Journal of Information Management</em>, <em>71</em>, 102642.</li> </ol> <p>EL Azzaoui, A., Chen, H., Kim, S. H., Pan, Y., &amp; Park, J. H. (2022). Blockchain-based distributed information hiding framework for data privacy preserving in medical supply chain systems. <em>Sensors</em>, <em>22</em>, 1371.</p> <p>El Hathat, Z., Zouadi, T., Sreedharan, V. R., &amp; Sunder M., V. (2023). Strategizing a logistics framework for organizational transformation: A technological perspective. <em>IEEE Transactions on Engineering Management</em>, 1&ndash;22.</p> <p>Epiphaniou, G., Pillai, P., Bottarelli, M., Al-Khateeb, H., Hammoudesh, M., &amp; Maple, C. (2020). Electronic regulation of data sharing and processing using smart ledger technologies for supply-chain security. <em>IEEE Transactions on Engineering Management</em>, <em>67</em>, 1059&ndash;73.</p> <p>Falcone, A., Felicetti, C., Garro, A., Rullo, A., &amp; Sacca`, D. (2021). PUF-based smart tags for supply chain management. In <em>The 16th International Conference on Availability, Reliability and Security</em>. Association for Computing Machinery.</p> <p>Ferdousi, T., Gruenbacher, D., &amp; Scoglio, C. M. (2020). A permissioned distributed ledger for the US beef cattle supply chain. <em>IEEE Access</em>, <em>8</em>, 154833&ndash;4.</p> <p>Fernando, Y., Tseng, M.-L., Wahyuni-Td, I. S., Jabbour, A. B. L. d. S., Jabbour, C. J. C., &amp; Foropon, C. (2023). Cyber supply chain risk management and performance in industry 4.0 era: information system security practices in malaysia. <em>Journal of Industrial and Production Engineering</em>, <em>40</em>.</p> <p>Fiorini, P. d. C., &amp; Jabbour, C. J. C. (2017). Information systems and sustainable supply chain management towards a more sustainable society: Where we are and where we are going. <em>International Journal of Information Management</em>, <em>37</em>, 241&ndash;9.</p> <p>Fishbein,&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; N.&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; (2021).&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Rocke&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; group&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; actively&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; targeting&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; the&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; cloud:&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Wants your</p> <p>SSH keys. <a href="https://www.intezer.com/blog/cloud-security/rocke-group-actively-targeting-the-cloud-wants-your-ssh-keys/">https://www.intezer.com/blog/cloud-security/rocke-group-actively</a><a href="https://www.intezer.com/blog/cloud-security/rocke-group-actively-targeting-the-cloud-wants-your-ssh-keys/">targeting-the-cloud-wants-your-ssh-keys/</a><a href="https://www.intezer.com/blog/cloud-security/rocke-group-actively-targeting-the-cloud-wants-your-ssh-keys/">.</a></p> <p>Garrod, J. (2016). The real world of the decentralized autonomous society. <em>tripleC</em>, <em>14</em>.</p> <p>Ghadge, A., Wei&szlig;, M., Caldwell, N. D., &amp; Wilding, R. (2019). Managing cyber risk in supply chains: A review and research agenda. <em>Supply Chain Management: An International Journal</em>.</p> <p>Gokhale, V. (2021). Protecting hospitals from supply-chain counterfeits and other security threats. <a href="https://www.securitymagazine.com/blogs/14-security-blog/post/96068-protecting-hospitals-from-supply-chain-counterfeits-and-other-security-threats">https://www.securitymagazine.com/blogs/14-security-blog/post/96068</a><a href="https://www.securitymagazine.com/blogs/14-security-blog/post/96068-protecting-hospitals-from-supply-chain-counterfeits-and-other-security-threats">protecting-hospitals-from-supply-chain-counterfeits-and-other-security</a><a href="https://www.securitymagazine.com/blogs/14-security-blog/post/96068-protecting-hospitals-from-supply-chain-counterfeits-and-other-security-threats">threats</a><a href="https://www.securitymagazine.com/blogs/14-security-blog/post/96068-protecting-hospitals-from-supply-chain-counterfeits-and-other-security-threats">.</a></p> <p>Green,&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; W. (2022). Cyber attack on supplier halts Toyota production.&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; <a href="https://www.cips.org/supply-management/news/2022/march/cyber-attack-on-supplier-halts-toyota-production/">https:</a></p> <p><a href="https://www.cips.org/supply-management/news/2022/march/cyber-attack-on-supplier-halts-toyota-production/">//www.cips.org/supply-management/news/2022/march/cyber-attack-on</a><a href="https://www.cips.org/supply-management/news/2022/march/cyber-attack-on-supplier-halts-toyota-production/">supplier-halts-toyota-production/</a><a href="https://www.cips.org/supply-management/news/2022/march/cyber-attack-on-supplier-halts-toyota-production/">.</a></p> <p>Gupta, A., Anpalagan, A., Guan, L., &amp; Khwaja, A. S. (2021). Deep learning for object detection and scene perception in self-driving cars: Survey, challenges, and open issues. <em>Array</em>, <em>10</em>, 100057.</p> <p>Haddad, A., Habaebi, M. H., Islam, M. R., Hasbullah, N. F., &amp; Zabidi, S. A. (2022). Systematic review on ai-blockchain based e-healthcare records management systems. <em>IEEE Access</em>, <em>10</em>, 94583&ndash;615.</p> <p>Hammi, B., &amp; Zeadally, S. (2023). Software supply-chain security: Issues and countermeasures. <em>IEEE Computer</em>, <em>56</em>.</p> <p>Hammi, B., Zeadally, S., &amp; Nebhen, J. (2023). Security threats, countermeasures, and challenges of digital supply chains. <em>ACM Computing Surveys</em>, <em>55</em>.</p> <p>Hashim, A.&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; (2021).&nbsp; Swiss&nbsp;&nbsp;&nbsp; cloud&nbsp;&nbsp;&nbsp;&nbsp; hosting&nbsp; provider&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; suffered ransomware&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; attack. <a href="https://latesthackingnews.com/2021/05/06/swiss-cloud-hosting-provider-suffered-ransomware-attack/">https://latesthackingnews.com/2021/05/06/swiss-cloud-hosting-provider</a><a href="https://latesthackingnews.com/2021/05/06/swiss-cloud-hosting-provider-suffered-ransomware-attack/">suffered-ransomware-attack/</a><a href="https://latesthackingnews.com/2021/05/06/swiss-cloud-hosting-provider-suffered-ransomware-attack/">.</a></p> <p>Hassija, V., Chamola, V., Gupta, V., Jain, S., &amp; Guizani, N. (2020). A survey on supply chain security: Application areas, security threats, and solution architectures. <em>IEEE Internet of Things Journal</em>, <em>8</em>, 6222&ndash;46.</p> <p>Hassija, V., Chamola, V., Saxena, V., Jain, D., Goyal, P., &amp; Sikdar, B. (2019). A survey on IoT security: Application areas, security threats, and solution architectures. <em>IEEE Access</em>, <em>7</em>, 82721&ndash;43.</p> <p>Herr, T., Lee, J., Loomis, W., &amp; Scott, S. (2020). Deep impact: States and software supply chain attacks. <a href="https://www.atlanticcouncil.org/commentary/feature/deep-impact-states-and-software-supply-chain-attacks/">https://www.atlanticcouncil.org/commentary/feature/deep</a><a href="https://www.atlanticcouncil.org/commentary/feature/deep-impact-states-and-software-supply-chain-attacks/">impact-states-and-software-supply-chain-attacks/</a><a href="https://www.atlanticcouncil.org/commentary/feature/deep-impact-states-and-software-supply-chain-attacks/">.</a></p> <p>Holloway, M. (2015). Stuxnet worm attack on Iranian nuclear facilities. <a href="http://large.stanford.edu/courses/2015/ph241/holloway1/">http://large. </a><a href="http://large.stanford.edu/courses/2015/ph241/holloway1/">stanford.edu/courses/2015/ph241/holloway1/</a><a href="http://large.stanford.edu/courses/2015/ph241/holloway1/">.</a></p> <p>Hou, Y., Such, J., &amp; Rashid, A. (2019). Understanding security requirements for industrial control system supply chains. In <em>IEEE/ACM 5th International Workshop on Software Engineering for Smart Cyber-Physical Systems (SEsCPS) </em>(pp. 50&ndash;3). IEEE.</p> <p>Hristea, C., &amp; T&cedil;iplea, F. L. (2019). A PUF-based destructive private mutual authentication RFID protocol. In <em>Innovative Security Solutions for Information Technology and Communications </em>(pp. 331&ndash;43). Springer International Publishing.</p> <p>Huang, H.-H., Yeh, L.-Y., &amp; Tsaur, W.-J. (2017). PUF-based protocols about mutual authentication and ownership transfer for RFID Gen2 v2 systems. In <em>Transactions on Engineering Technologies </em>(pp. 49&ndash;59). Springer.</p> <p>Hwang, Y., Moon, J., &amp; Yoo, S. (2015). Developing a RFID-based food traceability system in Korea Ginseng industry: Focused on the business process reengineering. <em>International Journal of Control and Automation</em>, <em>8</em>, 397&ndash;406.</p> <p>Islam, M. N., &amp; Kundu, S. (2019). Enabling IC traceability via blockchain pegged to embedded PUF. <em>ACM Transactions on Design Automation of Electronic Systems</em>, <em>24</em>.</p> <p>Kaiser, D., &amp; Vincent, S. (2019). Analysis and detection of golden SAML attacks. <em>Report</em>, .</p> <p>Kelion, L. (2020). Huawei 5G kit must be removed from UK by 2027. <a href="https://www.bbc.com/news/technology-53403793">https://www.bbc. </a><a href="https://www.bbc.com/news/technology-53403793">com/news/technology-53403793</a><a href="https://www.bbc.com/news/technology-53403793">.</a></p> <p>Khursheed, A., Kumar, M., &amp; Sharma, M. (2016). Security against cyber-attacks in food industry. <em>International Journal of Control Theory and Applications</em>, <em>9</em>, 8623&ndash;8.</p> <p>Kim, K., Kim, J. S., Jeong, S., Park, J.-H., &amp; Kim, H. K. (2021). Cybersecurity for autonomous vehicles: Review of attacks and defense. <em>Computers &amp; Security</em>, <em>103</em>, 102150.</p> <p>Kim, S., Heo, G., Zio, E., Shin, J., &amp; Song, J.-g. (2020). Cyber attack taxonomy for digital environment in nuclear power plants. <em>Nuclear Engineering and Technology</em>, <em>52</em>, 995&ndash;1001.</p> <p>Koeberl, P., Li, J., Maes, R., Rajan, A., Vishik, C., Wo&acute;jcik, M., &amp; Wu, W. (2012). A practical device authentication scheme using SRAM PUFs. <em>Journal of Cryptographic Engineering</em>, <em>2</em>, 255&ndash;69.</p> <p>Kosba, A., Miller, A., Shi, E., Wen, Z., &amp; Papamanthou, C. (2016). Hawk: The blockchain model of cryptography and privacy-preserving smart contracts. In <em>IEEE Symposium on Security and Privacy (SP) </em>(pp. 839&ndash;58).</p> <p>La Londe, B. J., &amp; Masters, J. M. (1994). Emerging logistics strategies: Blueprints for the next century. <em>International Journal of Physical Distribution and Logistics Management</em>, <em>24</em>, 35&ndash;47.</p> <p>Lennane,&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; A. (2020).&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Toll group resists ransom demands from hackers after cyber attack. <a href="https://theloadstar.com/toll-group-resists-ransom-demands-from-hackers-after-cyber-attack/">https://theloadstar.com/toll-group-resists-ransom-demands-from</a><a href="https://theloadstar.com/toll-group-resists-ransom-demands-from-hackers-after-cyber-attack/">hackers-after-cyber-attack/</a><a href="https://theloadstar.com/toll-group-resists-ransom-demands-from-hackers-after-cyber-attack/">.</a></p> <p>Lin, Q., Wang, H., Pei, X., &amp; Wang, J. (2019). Food safety traceability system based on Blockchain and EPCIS. <em>IEEE Access</em>, <em>7</em>.</p> <p>Logility (2023). Ai-first demand planning how human-machine collaboration cuts costs, error, and implementation time.</p> <p>Mahraz, M.-I., Benabbou, L., &amp; Berrado, A. (2022). Machine learning in supply chain management: A systematic literature review. <em>International Journal of Supply and Operations Management</em>, <em>9</em>.</p> <p>Mainetti, L., Patrono, L., Stefanizzi, M. L., &amp; Vergallo, R. (2013). An innovative and lowcost gapless traceability system of fresh vegetable products using RF technologies and EPC global standard. <em>Computers and electronics in agriculture</em>, <em>98</em>, 146&ndash;57.</p> <p>Marle, G. v. (2020). Toll refuses to pay cyber ransom as it acts to get its systems back online. <a href="https://theloadstar.com/toll-refuses-to-pay-cyber-ransom-as-it-acts-to-get-its-systems-back-online/">https://theloadstar.com/toll-refuses-to-pay-cyber-ransom-as-it-acts</a><a href="https://theloadstar.com/toll-refuses-to-pay-cyber-ransom-as-it-acts-to-get-its-systems-back-online/">to-get-its-systems-back-online/</a><a href="https://theloadstar.com/toll-refuses-to-pay-cyber-ransom-as-it-acts-to-get-its-systems-back-online/">.</a></p> <p>Mentzer, J. T., DeWitt, W., Keebler, J. S., Min, S., Nix, N. W., Smith, C. D., &amp; Zacharia, Z. G. (2001). Defining supply chain management. <em>Journal of Business Logistics</em>, <em>22</em>, 1&ndash;25.</p> <p>Min, H. (2019). Blockchain technology for enhancing supply chain resilience. <em>International Journal of Information Management</em>, <em>62</em>, 35&ndash;45.</p> <p>Monczka, R., Trent, R., &amp; Handfield, R. (1998). <em>Purchasing and Supply Chain Management </em>volume 8. South-Western College Publishing.</p> <p>Mor, R., Singh, S., Bhardwaj, A., &amp; Singh, L. (2015). Technological implications of supply chain practices in agri-food sector: A review. <em>International Journal of Supply and Operations Management</em>, <em>2</em>.</p> <p>Morgan, T. R., Gabler, C. B., &amp; Manhart, P. S. (2023). Supply chain transparency: theoretical perspectives for future research. <em>The International Journal of Logistics Management</em>, <em>34</em>, 1422&ndash;45.</p> <p>Musamih, A., Salah, K., Jayaraman, R., Arshad, J., Debe, M., Al-Hammadi, Y., &amp; Ellahham, S. (2021). A blockchain-based approach for drug traceability in healthcare supply chain. <em>IEEE Access</em>, <em>9</em>, 9728&ndash;43.</p> <p>Network, T. L. (2020). How Walmart used blockchain to increase supply chain transparency. <a href="https://theleadershipnetwork.com/article/how-walmart-used-blockchain-to-increase-supply-chain-transparency">https://theleadershipnetwork.com/article/how-walmart</a><a href="https://theleadershipnetwork.com/article/how-walmart-used-blockchain-to-increase-supply-chain-transparency">used-blockchain-to-increase-supply-chain-transparency</a><a href="https://theleadershipnetwork.com/article/how-walmart-used-blockchain-to-increase-supply-chain-transparency">.</a></p> <p>Nicholson, P. (2022).&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Five most famous DDoS attacks and then some. <a href="https://www.a10networks.com/blog/5-most-famous-ddos-attacks/">https://www. </a><a href="https://www.a10networks.com/blog/5-most-famous-ddos-attacks/">a10networks.com/blog/5-most-famous-ddos-attacks/</a><a href="https://www.a10networks.com/blog/5-most-famous-ddos-attacks/">.</a></p> <p>Nofer, M., Gomber, P., Hinz, O., &amp; Schiereck, D. (2017). Blockchain. <em>Business and Information Systems Engineering</em>, <em>59</em>, 183&ndash;187.</p> <p>Park, A., &amp; Li, H. (2021). The effect of blockchain technology on supply chain sustainability performances. <em>Sustainability</em>, <em>13</em>.</p> <p>Peepliwal, A. K., Narula, S., Sharma, R., Bonde, C., &amp; Jain, K. (2022). Theoretical blockchain architecture model (t-bam) to control covid-19 related counterfeit medical products across supply chain. <em>International Journal of Supply and Operations Management</em>, <em>9</em>.</p> <p>Piper, E. (2017). Cyber attack hits 200,000 in at least 150 countries: Europol. <em>Reuters</em>.</p> <p>Polatidis, N., Pavlidis, M., &amp; Mouratidis, H. (2018). Cyber-attack path discovery in a dynamic supply chain maritime risk management system. <em>Computer Standards &amp; Interfaces</em>, <em>56</em>, 74&ndash;82.</p> <p>Pratap, M. (2018). How is blockchain disrupting the supply chain industry? <a href="https://medium.com/hackernoon/how-is-blockchain-disrupting-the-supply-chain-industry-f3a1c599daef">https://medium.com/hackernoon/how-is-blockchain-disrupting-the</a><a href="https://medium.com/hackernoon/how-is-blockchain-disrupting-the-supply-chain-industry-f3a1c599daef">supply-chain-industry-f3a1c599daef</a><a href="https://medium.com/hackernoon/how-is-blockchain-disrupting-the-supply-chain-industry-f3a1c599daef">.</a></p> <p>Puthal, D., Malik, N., Mohanty, S., Kougianos, E., &amp; Yang, C. (2018). The blockchain as a decentralized security framework. <em>IEEE Consumer Electronics Magazine</em>, <em>7</em>, 18&ndash;21.</p> <p>Quist, N. (2021). TeamTNT actively enumerating cloud environments to infiltrate organisations. <a href="https://unit42.paloaltonetworks.com/teamtnt-operations-cloud-environments/">https://unit42.paloaltonetworks.com/teamtnt-operations-cloud</a><a href="https://unit42.paloaltonetworks.com/teamtnt-operations-cloud-environments/">environments/</a><a href="https://unit42.paloaltonetworks.com/teamtnt-operations-cloud-environments/">.</a></p> <p>Ranathunga, D., Roughan, M., Nguyen, H., Kernick, P., &amp; Falkner, N. (2016). Case studies of scada firewall configurations and the implications for best practices. <em>IEEE Transactions on Network and Service Management</em>, <em>13</em>, 871&ndash;84.</p> <p>Richey Jr., R. G., Chowdhury, S., Davis-Sramek, B., Giannakis, M., &amp; Dwivedi, Y. K. (2023). Artificial intelligence in logistics and supply chain management: A primer and roadmap for research. <em>Journal of Business Logistics</em>, <em>44</em>, 532&ndash;49.</p> <p>Robinson, R., &amp; Fishbein, N. (2021). New attacks on Kubernetes via misconfigured Argo</p> <p>Workflows. <a href="https://www.intezer.com/blog/container-security/new-attacks-on-kubernetes-via-misconfigured-argo-workflows/">https://www.intezer.com/blog/container-security/new-attacks-on</a><a href="https://www.intezer.com/blog/container-security/new-attacks-on-kubernetes-via-misconfigured-argo-workflows/">kubernetes-via-misconfigured-argo-workflows/</a><a href="https://www.intezer.com/blog/container-security/new-attacks-on-kubernetes-via-misconfigured-argo-workflows/">.</a></p> <p>Ruan, P., Dinh, T. T. A., Loghin, D., Zhang, M., &amp; Chen, G. (2022). <em>Blockchains: Decentralized and Verifiable Data Systems</em>. Springer.</p> <p>Sabry, S. S., Kaittan, N. M., &amp; Majeed, I. (2019). The road to the blockchain technology: Concept and types. <em>Periodicals of Engineering and Natural Sciences</em>, <em>7</em>, 1821&ndash;32.</p> <p>Savelyev, A. (2017). Contract law 2.0: &lsquo;smart&rsquo; contracts as the beginning of the end of classic contract law. <em>Information &amp; Communications Technology Law</em>, <em>26</em>, 116&ndash;34.</p> <p>Scholliers, J., Permala, A., Toivonen, S., &amp; Salmela, H. (2016). Improving the security of containers in port related supply chains. <em>Transportation research procedia</em>, <em>14</em>, 1374&ndash;83.</p> <p>Scroxton, A. (2020). Cloud Snooper firewall bypass may be work of nation state. <a href="https://www.computerweekly.com/news/252479189/Cloud-Snooper-firewall-bypass-may-be-work-of-nation-state">https://www.computerweekly.com/news/252479189/Cloud-Snooper</a><a href="https://www.computerweekly.com/news/252479189/Cloud-Snooper-firewall-bypass-may-be-work-of-nation-state">firewall-bypass-may-be-work-of-nation-state</a><a href="https://www.computerweekly.com/news/252479189/Cloud-Snooper-firewall-bypass-may-be-work-of-nation-state">.</a></p> <p>Shahrubudin, N., Lee, T. C., &amp; Ramlan, R. (2019). An overview on 3D printing technology: Technological, materials, and applications. <em>Procedia Manufacturing</em>, <em>35</em>, 1286&ndash;96.</p> <p>Shamsoshoara, A., Korenda, A., Afghah, F., &amp; Zeadally, S. (2020). A survey on physical unclonable function (PUF)-based security solutions for internet of things. <em>Computer Networks</em>, <em>183</em>, 107593.</p> <p>Shepard, W. (2018). Meet the man fighting America&rsquo;s trade war against Chinese counterfeits</p> <p>(it&rsquo;s not Trump). <a href="https://www.forbes.com/sites/wadeshepard/2018/03/29/meet-the-man-fighting-americas-trade-war-against-chinese-counterfeits">https://www.forbes.com/sites/wadeshepard/2018/03/29/meet</a><a href="https://www.forbes.com/sites/wadeshepard/2018/03/29/meet-the-man-fighting-americas-trade-war-against-chinese-counterfeits">the-man-fighting-americas-trade-war-against-chinese-counterfeits</a><a href="https://www.forbes.com/sites/wadeshepard/2018/03/29/meet-the-man-fighting-americas-trade-war-against-chinese-counterfeits">.</a></p> <p>Sillaber, C., &amp; Waltl, B. (2017). Life cycle of smart contracts in blockchain ecosystems.</p> <p><em>Datenschutz und Datensicherheit</em>, <em>41</em>, 497&ndash;500.</p> <p>Snowdon, A. W., Saunders, M., &amp; Wright, A. (2021). Key characteristics of a fragile healthcare supply chain: Learning from a pandemic. <em>Healthcare quarterly (Toronto, Ont.)</em>, <em>24</em>, 36&ndash;43.</p> <p>Staake, T., Thiesse, F., &amp; Fleisch, E. (2005). Extending the EPC network: the potential of RFID in anti-counterfeiting. In <em>Proceedings of the 2005 ACM symposium on Applied computing </em>(pp. 1607&ndash;12).</p> <p>Suh, G. E., &amp; Devadas, S. (2007). Physical unclonable functions for device authentication and secret key generation. In <em>2007 44th ACM/IEEE Design Automation Conference </em>(pp. 9&ndash;14).</p> <p>Szabo, N. (1997). Formalizing and securing relationships on public networks. <em>First Monday</em>, <em>2</em>.</p> <p>Tian, F. (2016). An agri-food supply chain traceability system for china based on RFID &amp; blockchain technology. <em>International Conference on Service Systems and Service Management (ICSSSM)</em>, .</p> <p>Toyoda, K., Mathiopoulos, P. T., Sasase, I., &amp; Ohtsuki, T. (2017). A novel blockchain-based product ownership management system (POMS) for anti-counterfeits in the post supply chain. <em>IEEE Access</em>, <em>5</em>, 17465&ndash;77.</p> <p>Treiblmaier, H., &amp; Garaus, M. (2023). Using blockchain to signal quality in the food supply chain: The impact on consumer purchase intentions and the moderating effect of brand familiarity. <em>International Journal of Information Management</em>, <em>68</em>.</p> <p>Urciuoli, L., Ma&uml;nnisto&uml;, T., Hintsa, J., &amp; Khan, T. (2013). Supply chain cyber security&ndash; potential threats. <em>Information &amp; Security: An International Journal</em>, <em>29</em>.</p> <p>Verma, G. K., Singh, B., Kumar, N., &amp; Chamola, V. (2019). CB-CAS: Certificate-based efficient signature scheme with compact aggregation for industrial Internet of Things environment. <em>IEEE Internet of Things Journal</em>, <em>7</em>, 2563&ndash;72.</p> <p>Wang, L., Xu, L., Zheng, Z., Liu, S., Li, X., Cao, L., Li, J., &amp; Sun, C. (2021). Smart contract-based agricultural food supply chain traceability. <em>IEEE Access</em>, <em>9</em>, 9296&ndash;307.</p> <p>Weingartner, T., Batista, D., Kochli, S., &amp; Voutat, G. (2021). Prototyping a smart contract based public procurement to fight corruption. <em>Computers</em>, <em>10</em>.</p> <p>Wong, L.-W., Lee, V.-H., Tan, G. W.-H., Ooi, K.-B., &amp; Sohal, A. (2022). The role of cybersecurity and policy awareness in shifting employee compliance attitudes: Building supply chain capabilities. <em>International Journal of Information Management</em>, <em>66</em>.</p> <p>Wright, A., &amp; De Filippi, P. (2015). Decentralized blockchain technology and the rise of lex cryptographia. <em>SSRN</em>, .</p> <p>Xiujuan Wang, M. K. (2018). Blockchain based provenance for agricultural products: A distributed platform with duplicated and shared bookkeeping. In <em>IEEE Intelligent Vehicles Symposium</em>. IEEE.</p> <p>Yu, M.-D., Hiller, M., Delvaux, J., Sowell, R., Devadas, S., &amp; Verbauwhede, I. (2016). A lockdown technique to prevent machine learning on PUFs for lightweight authentication.</p> <p><em>IEEE Transactions on Multi-Scale Computing Systems</em>, <em>2</em>, 146&ndash;59.</p> </div> </div> </div> </div> </div> <!-- /CENTER --> <!-- LEFT --> <div class="col-lg-3 col-md-3 col-sm-4"> <div class="panel panel-default my_panel-default margin-bottom-10"> <div class="panel-body ar_info_pnl" id="ar_info_pnl_cover"> <div id="pnl_cover"> <div class="row" > <div class="col-xs-6 col-md-6 nomargin-bottom"> <a href="javascript:loadModal('International Journal of Supply and Operations Management', './data/ijsom/coversheet/cover_en.jpg')"> <img src="data/ijsom/coversheet/cover_en.jpg" alt="International Journal of Supply and Operations Management" style="width: 100%;"> </a> </div> <div class="col-xs-6 col-md-6 nomargin-bottom"> <h6><a href="./issue_542_545.html">Volume 11, Issue 3</a><br/>August 2024<div id="sp_ar_pages">Pages <span dir="ltr">250-283</span></div></h6> </div> </div> </div> </div> </div> <!-- Download Files --> <div class="panel panel-default my_panel-default margin-bottom-10 panel-lists"> <div class="panel-heading"> <h3 class="panel-title"><a data-toggle="collapse" data-parent="#accordion" href="#ar_info_pnl_fl"><i class="fa fa-files-o"></i> Files</a></h3> </div> <div id="ar_info_pnl_fl" class="panel-collapse collapse in"> <div class="panel-body ar_info_pnl padding-6"> <ul class="list-group list-group-bordered list-group-noicon nomargin"> <li class="list-group-item"><a href="./?_action=xml&amp;article=2936" target="_blank" class="tag_a pdf_link"><i class="fa fa-file-code-o text-orange" ></i> XML</a></li> <li class="list-group-item"><a href="./article_2936_b978921cd9f7ae74570c1f0838f746b9.pdf" target="_blank" class="tag_a pdf_link"><i class="fa fa-file-pdf-o text-red" ></i> PDF 1.34 MB</a></li> <!-- Suplement Files --> </ul> </div> </div> </div> <div class="panel panel-default my_panel-default margin-bottom-10"> <div class="panel-heading"> <h3 class="panel-title"><a data-toggle="collapse" data-parent="#accordion" href="#ar_info_pnl_share"><i class="fa fa-share-square-o" aria-hidden="true"></i> Share</a></h3> </div> <div id="ar_info_pnl_share" class="panel-collapse collapse"> <div class="panel-body ar_info_pnl padding-10 text-center"> <a id="share_facebook" href="https://www.facebook.com/sharer.php?u=http://www.ijsom.com/article_2936.html" target="_blank" class="social-icon social-icon-sm social-facebook" data-toggle="tooltip" data-placement="top" title="Facebook"> <i class="icon-facebook"></i> <i class="icon-facebook"></i> </a> <a id="share_linkedin" href="https://www.linkedin.com/shareArticle?mini=true&amp;url=http://www.ijsom.com/article_2936.html" target="_blank" class="social-icon social-icon-sm social-linkedin" data-toggle="tooltip" data-placement="top" title="Linkedin"> <i class="icon-linkedin"></i> <i class="icon-linkedin"></i> </a> <a id="share_mendeley" href="https://www.mendeley.com/import/?url=http://www.ijsom.com/article_2936.html" target="_blank" class="social-icon social-icon-sm social-youtube" data-toggle="tooltip" data-placement="top" title="Mendeley"> <i class="icon-mendeley"></i> <i class="icon-mendeley"></i> </a> <a id="share_refworks" href="https://www.refworks.com/express/ExpressImport.asp?url=http://www.ijsom.com/article_2936.html" target="_blank" class="social-icon social-icon-sm social-disqus" data-toggle="tooltip" data-placement="top" title="Refworks"> <i class="icon-refworks"><span class="path1"></span><span class="path2"></span><span class="path3"></span><span class="path4"></span><span class="path5"></span><span class="path6"></span><span class="path7"></span><span class="path8"></span><span class="path9"></span><span class="path10"></span></i> <i class="icon-refworks"><span class="path1"></span><span class="path2"></span><span class="path3"></span><span class="path4"></span><span class="path5"></span><span class="path6"></span><span class="path7"></span><span class="path8"></span><span class="path9"></span><span class="path10"></span></i> </a> <a id="share_instagram" href="https://www.instagram.com/?url=http://www.ijsom.com/article_2936.html" target="_blank" class="social-icon social-icon-sm social-instagram" data-toggle="tooltip" data-placement="top" title="Instagram"> <i class="icon-instagram"></i> <i class="icon-instagram"></i> </a> <a id="share_twitter" href="https://twitter.com/share?url=http://www.ijsom.com/article_2936.html&amp;text=A Survey on Supply Chain Management: Exploring Physical and Cyber Security Challenges, Threats, Critical Applications, and Innovative Technologies" target="_blank" class="social-icon social-icon-sm social-twitter" data-toggle="tooltip" data-placement="top" title="Twitter"> <i class="icon-twitter"></i> <i class="icon-twitter"></i> </a> <a id="share_email" href="javascript:act('email')" class="social-icon social-icon-sm social-email3 " data-toggle="tooltip" data-placement="top" title="Email"> <i class="icon-email3"></i> <i class="icon-email3"></i> </a> <a id="share_print" href="javascript:printDiv('dv_artcl')" class="social-icon social-icon-sm social-print" data-toggle="tooltip" data-placement="top" title="Print"> <i class="icon-print"></i> <i class="icon-print"></i> </a> <a id="share_stumble" href="https://mix.com/mixit?su=submit&url=http://www.ijsom.com/article_2936.html" target="_blank" class="social-icon social-icon-sm social-stumbleupon" data-toggle="tooltip" data-placement="top" title="StumbleUpon"> <i class="icon-stumbleupon"></i> <i class="icon-stumbleupon"></i> </a> <a id="share_acedemia" href="https://www.academia.edu/" target="_blank" class="social-icon social-icon-sm social-academia" data-toggle="tooltip" data-placement="top" title="Academia"> <i class="ai ai-academia"></i> <i class="ai ai-academia"></i> </a> <a id="share_sems" href="https://www.semanticscholar.org/" target="_blank" class="social-icon social-icon-sm social-forrst" data-toggle="tooltip" data-placement="top" title="Semantic scholar"> <i class="ai ai-semantic-scholar"></i> <i class="ai ai-semantic-scholar"></i> </a> <a id="share_reddit" href="https://www.reddit.com/submit?url=http://www.ijsom.com/article_2936.html" target="_blank" class="social-icon social-icon-sm social-dwolla" data-toggle="tooltip" data-placement="top" title="Reddit"> <i class="icon-reddit"></i> <i class="icon-reddit"></i> </a> <a id="share_rg" href="https://www.researchgate.net/" target="_blank" class="social-icon social-icon-sm social-researchgate" data-toggle="tooltip" data-placement="top" title="Research Gate"> <i class="ai ai-researchgate"></i> <i class="ai ai-researchgate"></i> </a> <a id="share_blogger" href="https://www.blogger.com/blog-this.g?u=http://www.ijsom.com/article_2936.html" target="_blank" class="social-icon social-icon-sm social-blogger" data-toggle="tooltip" data-placement="top" title="Blogger"> <i class="icon-blogger"></i> <i class="icon-blogger"></i> </a> <a id="share_pinterest" href="https://pinterest.com/pin/create/bookmarklet/?media=&url=http://www.ijsom.com/article_2936.html" target="_blank" class="social-icon social-icon-sm social-pinterest" data-toggle="tooltip" data-placement="top" title="Pinterest"> <i class="icon-pinterest"></i> <i class="icon-pinterest"></i> </a> <a id="share_digg" href="https://www.digg.com/submit?http://www.ijsom.com/article_2936.html&title=A Survey on Supply Chain Management: Exploring Physical and Cyber Security Challenges, Threats, Critical Applications, and Innovative Technologies" target="_blank" class="social-icon social-icon-sm social-digg" data-toggle="tooltip" data-placement="top" title="Digg"> <i class="icon-digg"></i> <i class="icon-digg"></i> </a> <a id="share_delicious" href="https://del.icio.us/post?url=http://www.ijsom.com/article_2936.html" target="_blank" class="social-icon social-icon-sm social-delicious" data-toggle="tooltip" data-placement="top" title="Delicious"> <i class="icon-delicious"></i> <i class="icon-delicious"></i> </a> <a id="share_skype" href="https://web.skype.com/share?url=http://www.ijsom.com/article_2936.html" target="_blank" class="social-icon social-icon-sm social-skype" data-toggle="tooltip" data-placement="top" title="Skype"> <i class="icon-skype"></i> <i class="icon-skype"></i> </a> </div> </div> </div> <!-- Cite This Article --> <div class="panel panel-default my_panel-default margin-bottom-10 panel-lists"> <div class="panel-heading"> <h3 class="panel-title"><a data-toggle="collapse" data-parent="#accordion" href="#ar_info_pnl_cite"><i class=" fa fa-external-link"></i> How to cite</a></h3> </div> <div id="ar_info_pnl_cite" class="panel-collapse collapse "> <div class="panel-body ar_info_pnl"> <ul class="list-group list-group-bordered list-group-noicon" style="display:block !important;max-height:9999px"> <li class="list-group-item ltr"><a class="tag_a" href="./?_action=export&rf=ris&rc=2936">RIS</a></li> <li class="list-group-item ltr"><a class="tag_a" href="./?_action=export&rf=enw&rc=2936">EndNote</a></li> <li class="list-group-item ltr"><a class="tag_a" href="./?_action=export&rf=ris&rc=2936">Mendeley</a></li> <li class="list-group-item ltr"><a class="tag_a" href="./?_action=export&rf=bibtex&rc=2936">BibTeX</a></li> <li class="list-group-item ltr"><a class="tag_a" href="javascript:void(0)" data-toggle="modal" data-target="#cite-apa">APA</a></li> <li class="list-group-item ltr"><a class="tag_a" href="javascript:void(0)" data-toggle="modal" data-target="#cite-mla">MLA</a></li> <li class="list-group-item ltr"><a class="tag_a" href="javascript:void(0)" data-toggle="modal" data-target="#cite-harvard">HARVARD</a></li> <li class="list-group-item ltr"><a class="tag_a" href="javascript:void(0)" data-toggle="modal" data-target="#cite-vancouver">VANCOUVER</a></li> </ul> </div> </div> </div> <!-- Article Statastic --> <div class="panel panel-default my_panel-default panel-lists"> <div class="panel-heading"> <h3 class="panel-title"><a data-toggle="collapse" data-parent="#accordion" href="#ar_info_pnl_st"><i class="fa fa-bar-chart" aria-hidden="true"></i> Statistics</a></h3> </div> <div id="ar_info_pnl_st" class="panel-collapse collapse in"> <div class="panel-body ar_info_pnl"> <ul class="list-group list-group-bordered list-group-noicon" style="display:block !important;max-height:9999px"> <li class="list-group-item"><a class="tag_a">Article View: <i>1,117</i></a></li> <li class="list-group-item"><a class="tag_a">PDF Download: <i>1,273</i></a></li> </ul> </div> </div> </div> </div> <!-- /LEFT --> </div> </section> <div id="cite-apa" class="modal fade" tabindex="-1" role="dialog" aria-labelledby="myModalLabel" aria-hidden="true"> <div class="modal-dialog"> <div class="modal-content"> <!-- Modal Header --> <div class="modal-header"> <button type="button" class="close" data-dismiss="modal" aria-label="Close"><span aria-hidden="true">&times;</span></button> <h4 class="modal-title" id="myModalLabel">APA</h4> </div> <!-- Modal Body --> <div class="modal-body"> <p>Khokhar, R., Rankothge, W., Rashidi, L., Mohammadian, H., Frei, B., Ellis, S., Freitas, I., & Ghorbani, A. (2024). A Survey on Supply Chain Management: Exploring Physical and Cyber Security Challenges, Threats, Critical Applications, and Innovative Technologies. <em>International Journal of Supply and Operations Management</em>, 11(3), 250-283. doi: 10.22034/ijsom.2024.110219.2975</p> </div> </div> </div> </div> <div id="cite-mla" class="modal fade" tabindex="-1" role="dialog" aria-labelledby="myModalLabel" aria-hidden="true"> <div class="modal-dialog"> <div class="modal-content"> <!-- Modal Header --> <div class="modal-header"> <button type="button" class="close" data-dismiss="modal" aria-label="Close"><span aria-hidden="true">&times;</span></button> <h4 class="modal-title" id="myModalLabel">MLA</h4> </div> <!-- Modal Body --> <div class="modal-body"> <p>Rashid Hussain Khokhar; Windhya Rankothge; Leila Rashidi; Hesamodin Mohammadian; Brian Frei; Shawn Ellis; Iago Freitas; Ali Ghorbani. "A Survey on Supply Chain Management: Exploring Physical and Cyber Security Challenges, Threats, Critical Applications, and Innovative Technologies". <em>International Journal of Supply and Operations Management</em>, 11, 3, 2024, 250-283. doi: 10.22034/ijsom.2024.110219.2975</p> </div> </div> </div> </div> <div id="cite-harvard" class="modal fade" tabindex="-1" role="dialog" aria-labelledby="myModalLabel" aria-hidden="true"> <div class="modal-dialog"> <div class="modal-content"> <!-- Modal Header --> <div class="modal-header"> <button type="button" class="close" data-dismiss="modal" aria-label="Close"><span aria-hidden="true">&times;</span></button> <h4 class="modal-title" id="myModalLabel">HARVARD</h4> </div> <!-- Modal Body --> <div class="modal-body"> <p>Khokhar, R., Rankothge, W., Rashidi, L., Mohammadian, H., Frei, B., Ellis, S., Freitas, I., Ghorbani, A. (2024). 'A Survey on Supply Chain Management: Exploring Physical and Cyber Security Challenges, Threats, Critical Applications, and Innovative Technologies', <em>International Journal of Supply and Operations Management</em>, 11(3), pp. 250-283. doi: 10.22034/ijsom.2024.110219.2975</p> </div> </div> </div> </div> <div id="cite-vancouver" class="modal fade" tabindex="-1" role="dialog" aria-labelledby="myModalLabel" aria-hidden="true"> <div class="modal-dialog"> <div class="modal-content"> <!-- Modal Header --> <div class="modal-header"> <button type="button" class="close" data-dismiss="modal" aria-label="Close"><span aria-hidden="true">&times;</span></button> <h4 class="modal-title" id="myModalLabel">VANCOUVER</h4> </div> <!-- Modal Body --> <div class="modal-body"> <p>Khokhar, R., Rankothge, W., Rashidi, L., Mohammadian, H., Frei, B., Ellis, S., Freitas, I., Ghorbani, A. A Survey on Supply Chain Management: Exploring Physical and Cyber Security Challenges, Threats, Critical Applications, and Innovative Technologies. <em>International Journal of Supply and Operations Management</em>, 2024; 11(3): 250-283. doi: 10.22034/ijsom.2024.110219.2975</p> </div> </div> </div> </div> </div> </div> <!-- /MAIN CONTENT --> <!-- Subscribe --> <section class="alternate padding-xxs"> </section> <!-- /Subscribe --> <!-- FOOTER --> <div class="container"> <footer id="footer"> <div class="scrollup" id="scroll" href="#"><span></span></div> <div class="row"> <div class="col-md-2"> <!-- Links --> <h4 class="">Explore Journal</h4> <ul class="footer-links list-unstyled"> <li id="fli_home"><a href="./">Home</a></li> <li id="fli_about"><a href="./journal/about">About Journal</a></li> <li id="fli_Edb"><a href="./journal/editorial.board">Editorial Board</a></li> <li id="fli_submit"><a href="./author">Submit Manuscript</a></li> <li id="fli_contactus"><a href="./journal/contact.us">Contact Us</a></li> <li id="fli_glossary"><a href="./journal/glossary">Glossary</a></li> <li id="fli_order_hrdj"><a href="./journal/subscription.form">Hard Copy Subscription</a></li> <li id="fli_sitemap"><a href="./sitemap.xml?usr">Sitemap</a></li> </ul> <!-- /Links --> </div> <div class="col-md-3"> <!-- Latest News --> <h4 class="">Latest News</h4> <ul class="footer-posts list-unstyled"> <li> <a href="./news?newsCode=173">SD of ISC: Sustainable Development of Intelligent Supply Chains based on Trends and Future Directions: Application of Novel Solution Techniques</a> <small class="ltr">2023-03-05</small> </li> </ul> <!-- /Latest News --> </div> <div class="col-md-3"> <!-- Footer Note --> <div><p><a title="Linkedin" href="http://www.linkedin.com/company/ijsom?trk=eml-cp_mktg-btn-welcome-20120607%2F"><img src="images/linkedin.jpg" alt="linkedin" /></a></p></div> <!-- /Footer Note --> </div> <div class="col-md-4"> <!-- Newsletter Form --> <h4 class="">Newsletter Subscription</h4> <p>Subscribe to the journal newsletter and receive the latest news and updates</p> <form class="validate" action="" method="post" data-success="Subscription saved successfully." data-toastr-position="bottom-right"> <input type="hidden" name="_token" value="cff5e45a5f1088ef6f34fbaf792b4737c0d298b91ddbcf2b"/> <div class="input-group"> <span class="input-group-addon"><i class="fa fa-envelope"></i></span> <input type="email" id="email" name="email" required="required" class="form-control required sbs_email" placeholder="Enter your Email" oninvalid="this.setCustomValidity('Enter a valid email address.')" oninput="this.setCustomValidity('')"> <span class="input-group-btn"> <button class="btn btn-primary mybtn" type="submit">Subscribe</button> </span> </div> </form> <!-- /Newsletter Form --> <!-- Social Icons --> <div class="margin-top-20"> <a class="noborder" href="" target="_blank" class="social-icon social-icon-border social-facebook pull-left block" data-toggle="tooltip" data-placement="top" title="Facebook"> <i class="fa fa-facebook-square" aria-hidden="true"></i> </a> <a class="noborder" href="" target="_blank" class="social-icon social-icon-border social-facebook pull-left block" data-toggle="tooltip" data-placement="top" title="Twitter"> <i class="fa fa-twitter-square" aria-hidden="true"></i> </a> <a class="noborder" href="" target="_blank" class="social-icon social-icon-border social-facebook pull-left block" data-toggle="tooltip" data-placement="top" title="Linkedin"> <i class="fa fa-linkedin-square" aria-hidden="true"></i> </a> <a class="noborder" href="./ju.rss" class="social-icon social-icon-border social-rss pull-left block" data-toggle="tooltip" data-placement="top" title="Rss"><i class="fa fa-rss-square" aria-hidden="true"></i></a> </div> </div> </div> <div class="copyright" style="position: relative"> <ul class="nomargin list-inline mobile-block"> <li>&copy; Journal Management System. <span id='sp_crt'>Powered by <a target='_blank' href='https://www.sinaweb.net/'>Sinaweb</a></span></li> </ul> </div> </footer> </div> <!-- /FOOTER --> </div> <!-- /wrapper --> <!-- SCROLL TO TOP --> <a href="#" id="toTop_old"></a> <!-- PRELOADER --> <div id="preloader"> <div class="inner"> <span class="loader"></span> </div> </div><!-- /PRELOADER --> <!-- JAVASCRIPT FILES --> <script type="text/javascript">var plugin_path = './themes/base/front/assets/plugins/';</script> <script type="text/javascript" src="./themes/base/front/assets/js/scripts.js?v=0.02"></script> <!-- user defined scripts--> <!-- Extra Script Scripts --> <script type="text/javascript"> $('ul.nav li.dropdown').hover(function() { if (window.matchMedia('(max-width: 767px)').matches) return; $(this).find('.dropdown-menu').stop(true, true).delay(200).fadeIn(500); }, function() { if (window.matchMedia('(max-width: 767px)').matches) return; $(this).find('.dropdown-menu').stop(true, true).delay(200).fadeOut(500); }); var btn = $('#toTop_old'); $(window).scroll(function() { if ($(window).scrollTop() > 300) { btn.addClass('show'); } else { btn.removeClass('show'); } }); btn.on('click', function(e) { e.preventDefault(); $('html, body').animate({scrollTop:0}, '300'); }); window.cookieconsent.initialise({ "palette": { "popup": { "background": "#222" }, "button": { "background": "#f1d600" } }, "content": { "message": "This website uses cookies to ensure you get the best experience on our website.", "dismiss": "Got it!", "link": "" } }); </script> </body> </html><div id="actn_modal" class="modal fade" tabindex="-1"> <div id="" class="modal-dialog modal-dialog madal-aw"> <div class="modal-content"> <div class="modal-header"> <button type="button" class="close pull-right" data-dismiss="modal" aria-hidden="true" href="#lost">&times;</button> <h5 class="modal-title"></h5> </div> <div class="modal-body"></div> <div class="modal-footer"></div> </div> </div> </div>

Pages: 1 2 3 4 5 6 7 8 9 10