Asset Details
MbrlCatalogueTitleDetail
Do you wish to reserve the book?
Eleven years of cyberattacks on Chinese supply chains in an era of cyber warfare, a review and future research agenda
by
Pérez-Morón, James
in
Artificial intelligence
/ Computers
/ Cybercrime
/ Cybersecurity
/ Internet
/ Internet access
/ Internet of Things
/ Literature reviews
/ Social sciences
/ Supply chain management
/ Technology
/ Technology Acceptance Model
2022
Hey, we have placed the reservation for you!
By the way, why not check out events that you can attend while you pick your title.
You are currently in the queue to collect this book. You will be notified once it is your turn to collect the book.
Oops! Something went wrong.
Looks like we were not able to place the reservation. Kindly try again later.
Are you sure you want to remove the book from the shelf?
Eleven years of cyberattacks on Chinese supply chains in an era of cyber warfare, a review and future research agenda
by
Pérez-Morón, James
in
Artificial intelligence
/ Computers
/ Cybercrime
/ Cybersecurity
/ Internet
/ Internet access
/ Internet of Things
/ Literature reviews
/ Social sciences
/ Supply chain management
/ Technology
/ Technology Acceptance Model
2022
Oops! Something went wrong.
While trying to remove the title from your shelf something went wrong :( Kindly try again later!
Do you wish to request the book?
Eleven years of cyberattacks on Chinese supply chains in an era of cyber warfare, a review and future research agenda
by
Pérez-Morón, James
in
Artificial intelligence
/ Computers
/ Cybercrime
/ Cybersecurity
/ Internet
/ Internet access
/ Internet of Things
/ Literature reviews
/ Social sciences
/ Supply chain management
/ Technology
/ Technology Acceptance Model
2022
Please be aware that the book you have requested cannot be checked out. If you would like to checkout this book, you can reserve another copy
We have requested the book for you!
Your request is successful and it will be processed during the Library working hours. Please check the status of your request in My Requests.
Oops! Something went wrong.
Looks like we were not able to place your request. Kindly try again later.
Eleven years of cyberattacks on Chinese supply chains in an era of cyber warfare, a review and future research agenda
Journal Article
Eleven years of cyberattacks on Chinese supply chains in an era of cyber warfare, a review and future research agenda
2022
Request Book From Autostore
and Choose the Collection Method
Overview
Purpose
The contribution of this study aims to twofold: First, it provides an overview of the current state of research on cyberattacks on Chinese supply chains (SCs). Second, it offers a look at the Chinese Government’s approach to fighting cyberattacks on Chinese SCs and its calls for global governance.
Design/methodology/approach
A comprehensive literature review was conducted on Clarivate Analytics’ Web of Science, in Social Sciences Citation Index journals, Scopus and Google Scholar, published between 2010–2021. A systematic review of practitioner literature was also conducted.
Findings
Chinese SCs have become a matter of national security, especially in the era of cyber warfare. The risks to SC have been outlined. Cybersecurity regulations are increasing as China aims to build a robust environment for cyberspace development. Using the Technology-organization-environment (TOE) framework, the results show that the top five factors influencing the adoption process in firms are as follows: relative advantage and technological readiness (Technology context); top management support and firm size (Organization context) and government policy and regulations (Environment context).
Research limitations/implications
This review focuses on cyberattacks on Chinese SCs and great care was taken when selecting search terms. However, the author acknowledges that the choice of databases/terms may have excluded a few articles on cyberattacks from this review.
Practical implications
This review provides managerial insights for SC practitioners into how cyberattacks have the potential to disrupt the global SC network.
Originality/value
Past researchers proposed a taxonomic approach to evaluate progress with SC integration into Industry 4.0; in contrast, this study is one of the first steps toward an enhanced understanding of cyberattacks on Chinese SCs and their contribution to the global SC network using the TOE framework.
Publisher
Emerald Publishing Limited,Emerald Group Publishing Limited
This website uses cookies to ensure you get the best experience on our website.