The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Port services and maritime supply chain processes depend upon complex interrelated ICT systems hosted in the ports' Critical Information Infrastructures (CIIs). Current research efforts for securing the dual nature (cyber-physical) of the ports and their supply chain partners are presented here.
In recent years, The vulnerability of agricultural products chain is been exposed because of the endlessly insecure events appeared in every areas and every degrees from the natural disasters on the each node operation of agricultural products supply chain in recently years. As an very important place of HUNAN Province because of its abundant agricultural products, the Eastern Area's security in agricultural...
The globalization of today's supply chains (e.g., information and communication technologies, military systems, etc.) has created an emerging security threat that could degrade the integrity and availability of sensitive and critical government data, control systems, and infrastructures. Commercial-off-the-shelf (COTS) and even government-off-the-self (GOTS) products often are designed, developed,...
This paper presents a work in progress simulation and a novel model for estimating the impact of cyber attacks. Previous methods so far, have taken the old - fashioned "intuition" approach - a qualitative or quantitative risk based analysis on the business level. More recent technical approaches involve simulations on networks of systems and sensor input from 3rd party detection tools of...
In this paper we examine the interdependencies and common points of failure (and attack) that plague commonly-used system and network hardware and software. The proposed approach requires not only generating inventories of acquiring organizations' equipment and software products, and clear and detailed descriptions of every link in the supply chain, but also the identification of common components...
In supply chain, information asymmetry will bring risk to cooperative enterprises when they are sharing information and the risk may also make them lose their interests, so it's very important to weak the information sharing risk as far as possible. This article gives some examples of the information sharing risk in several forms, analyzes the causes and proposes several corresponding preventive measures.
The methodology of the supply chain can be applied to many subjects. The capital management in financial markets embodies the characteristics of the supply chain completely. The research on the capital supply chain in financial markets using the method of the supply chain can not only broaden the range of the research on supply chain, but also contribute to the efficient capital management in financial...
Before Sept.11, 2001, the question "what is supply-chain security" would surely have brought out the more traditional areas of risk management-natural and man-made disasters; equipment and infrastructure failures; regulatory requirements; loss prevention; geopolitical events; and personnel strikes. Today, especially after the attacks of Sept. 11, supply chain security has taken on a whole...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.