Pub Date : 2021-06-01DOI: 10.1142/9789811233128_0006
Andy Jones, O. Khan
{"title":"Surviving NotPetya: Global Supply Chains in the Era of the Cyber Weapon","authors":"Andy Jones, O. Khan","doi":"10.1142/9789811233128_0006","DOIUrl":"https://doi.org/10.1142/9789811233128_0006","url":null,"abstract":"","PeriodicalId":146392,"journal":{"name":"Cyber Security and Supply Chain Management","volume":"134 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123204673","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-06-01DOI: 10.1142/9789811233128_0005
Myles D. Garvey, Jim Samuel, A. Kretinin
{"title":"An Ontology of Supply Chain Cybersecurity","authors":"Myles D. Garvey, Jim Samuel, A. Kretinin","doi":"10.1142/9789811233128_0005","DOIUrl":"https://doi.org/10.1142/9789811233128_0005","url":null,"abstract":"","PeriodicalId":146392,"journal":{"name":"Cyber Security and Supply Chain Management","volume":"113 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117202196","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-06-01DOI: 10.1142/9789811233128_0001
Myles D. Garvey
{"title":"A Philosophical Examination on the Definition of Cyberspace","authors":"Myles D. Garvey","doi":"10.1142/9789811233128_0001","DOIUrl":"https://doi.org/10.1142/9789811233128_0001","url":null,"abstract":"","PeriodicalId":146392,"journal":{"name":"Cyber Security and Supply Chain Management","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131749276","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-06-01DOI: 10.1142/9789811233128_0007
Stefan Kendzierskyj, H. Jahankhani, Farooq Habib, A. Jamal, Murtaza F. Khan
{"title":"The Role of Blockchain with a Cybersecurity Maturity Model in the Governance of Pharmaceutical Supply Chains","authors":"Stefan Kendzierskyj, H. Jahankhani, Farooq Habib, A. Jamal, Murtaza F. Khan","doi":"10.1142/9789811233128_0007","DOIUrl":"https://doi.org/10.1142/9789811233128_0007","url":null,"abstract":"","PeriodicalId":146392,"journal":{"name":"Cyber Security and Supply Chain Management","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125090244","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-06-01DOI: 10.1142/9789811233128_0004
Esen Andiç-Mortan
{"title":"Humans of the Supply Chain: The First Frontier in the Battle Against Cyber Vulnerabilities","authors":"Esen Andiç-Mortan","doi":"10.1142/9789811233128_0004","DOIUrl":"https://doi.org/10.1142/9789811233128_0004","url":null,"abstract":"","PeriodicalId":146392,"journal":{"name":"Cyber Security and Supply Chain Management","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115191122","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1142/9789811233128_0008
Ronald Lembke
{"title":"Reducing Cybersecurity Vulnerabilities Through the Use of 12N QR Codes","authors":"Ronald Lembke","doi":"10.1142/9789811233128_0008","DOIUrl":"https://doi.org/10.1142/9789811233128_0008","url":null,"abstract":"","PeriodicalId":146392,"journal":{"name":"Cyber Security and Supply Chain Management","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134228920","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}