{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,14]],"date-time":"2026-04-14T10:09:08Z","timestamp":1776161348320,"version":"3.50.1"},"reference-count":21,"publisher":"Informa UK Limited","issue":"2","content-domain":{"domain":["www.tandfonline.com"],"crossmark-restriction":true},"short-container-title":["International Journal of Production Research"],"published-print":{"date-parts":[[2022,1,17]]},"DOI":"10.1080\/00207543.2021.1914356","type":"journal-article","created":{"date-parts":[[2021,4,20]],"date-time":"2021-04-20T08:53:19Z","timestamp":1618908799000},"page":"766-782","update-policy":"https:\/\/doi.org\/10.1080\/tandf_crossmark_01","source":"Crossref","is-referenced-by-count":26,"title":["Balancing cybersecurity in a supply chain under direct and indirect cyber risks"],"prefix":"10.1080","volume":"60","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-6054-550X","authenticated-orcid":false,"given":"Tadeusz","family":"Sawik","sequence":"first","affiliation":[{"name":"Department of Engineering, Reykjavik University, Reykjavik, Iceland"},{"name":"Department of Operations Research, AGH University of Science & Technology, Krak\u00f3w, Poland"}]}],"member":"301","published-online":{"date-parts":[[2021,4,20]]},"reference":[{"key":"CIT0001","unstructured":"The Australian Signals Directorate. 2017. \u201cStrategies to Mitigate Cyber Security Incidents.\u201d https:\/\/www.cyber.gov.au\/sites\/default\/files\/2019-03\/Mitigation_Strategies_2017.pdf."},{"key":"CIT0002","doi-asserted-by":"publisher","DOI":"10.3390\/risks8020061"},{"key":"CIT0003","doi-asserted-by":"publisher","DOI":"10.1007\/s12063-009-0018-2"},{"key":"CIT0004","doi-asserted-by":"publisher","DOI":"10.1126\/science.aaz4795"},{"key":"CIT0005","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2016.02.012"},{"key":"CIT0006","doi-asserted-by":"publisher","DOI":"10.1108\/SCM-10-2018-0357"},{"key":"CIT0007","doi-asserted-by":"publisher","DOI":"10.1145\/581271.581274"},{"key":"CIT0008","doi-asserted-by":"publisher","DOI":"10.1007\/s10796-006-9011-6"},{"key":"CIT0009","unstructured":"Identity Theft Resource Center. 2018. \u201cEnd-of-Year Data Breach Report 2018.\u201d https:\/\/www.idtheftcenter.org\/2018-end-of-year-databreach-report\/."},{"key":"CIT0010","doi-asserted-by":"publisher","DOI":"10.1016\/j.ejor.2019.04.035"},{"key":"CIT0011","doi-asserted-by":"publisher","DOI":"10.1016\/j.ejor.2020.09.053"},{"key":"CIT0012","doi-asserted-by":"publisher","DOI":"10.1080\/00207543.2020.1721591"},{"key":"CIT0013","doi-asserted-by":"publisher","DOI":"10.1016\/j.omega.2011.03.008"},{"key":"CIT0014","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2013.01.001"},{"key":"CIT0015","doi-asserted-by":"publisher","DOI":"10.1016\/j.omega.2014.12.004"},{"key":"CIT0016","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-44814-1"},{"key":"CIT0017","doi-asserted-by":"publisher","DOI":"10.1080\/00207543.2020.1856442"},{"key":"CIT0018","doi-asserted-by":"publisher","DOI":"10.1016\/j.omega.2020.102267"},{"key":"CIT0019","doi-asserted-by":"publisher","DOI":"10.1016\/j.ejor.2015.06.048"},{"key":"CIT0020","doi-asserted-by":"publisher","DOI":"10.1016\/j.ejor.2019.09.017"},{"key":"CIT0021","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2012.04.001"}],"container-title":["International Journal of Production Research"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.tandfonline.com\/doi\/pdf\/10.1080\/00207543.2021.1914356","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,2,21]],"date-time":"2022-02-21T08:32:48Z","timestamp":1645432368000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.tandfonline.com\/doi\/full\/10.1080\/00207543.2021.1914356"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,4,20]]},"references-count":21,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2022,1,17]]}},"alternative-id":["10.1080\/00207543.2021.1914356"],"URL":"https:\/\/doi.org\/10.1080\/00207543.2021.1914356","relation":{},"ISSN":["0020-7543","1366-588X"],"issn-type":[{"value":"0020-7543","type":"print"},{"value":"1366-588X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,4,20]]},"assertion":[{"value":"The publishing and review policy for this title is described in its Aims & Scope.","order":1,"name":"peerreview_statement","label":"Peer Review Statement"},{"value":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=tprs20","URL":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=tprs20","order":2,"name":"aims_and_scope_url","label":"Aim & Scope"},{"value":"2021-01-28","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2021-03-30","order":2,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2021-04-20","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}