{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,8]],"date-time":"2026-04-08T11:15:56Z","timestamp":1775646956923,"version":"3.50.1"},"reference-count":66,"publisher":"Informa UK Limited","issue":"6","funder":[{"name":"100 Youth Research Projects Foundation","award":["GDMUD2022012"],"award-info":[{"award-number":["GDMUD2022012"]}]},{"name":"Doctoral Starting up Foundation of Guangdong Medical university","award":["4SG22225G"],"award-info":[{"award-number":["4SG22225G"]}]},{"name":"Research and Innovation Platform Construction Plan funds of Wuhan College","award":["KYP201901"],"award-info":[{"award-number":["KYP201901"]}]},{"name":"Outstanding Young and Middle-Aged Scientific and Technological Innovation Team Funds of Hubei Universities","award":["T2022056"],"award-info":[{"award-number":["T2022056"]}]}],"content-domain":{"domain":["www.tandfonline.com"],"crossmark-restriction":true},"short-container-title":["International Journal of Production Research"],"published-print":{"date-parts":[[2024,3,18]]},"DOI":"10.1080\/00207543.2023.2206923","type":"journal-article","created":{"date-parts":[[2023,5,3]],"date-time":"2023-05-03T07:00:39Z","timestamp":1683097239000},"page":"2034-2059","update-policy":"https:\/\/doi.org\/10.1080\/tandf_crossmark_01","source":"Crossref","is-referenced-by-count":12,"title":["Supply chain cybersecurity investments with interdependent risks under different information exchange modes"],"prefix":"10.1080","volume":"62","author":[{"given":"Lu","family":"Xu","sequence":"first","affiliation":[{"name":"School of Humanities and Management, Guangdong Medical University, Dongguan, People's Republic of China"}]},{"given":"Yanhui","family":"Li","sequence":"additional","affiliation":[{"name":"School of Information Management, Central China Normal University, Wuhan, People's Republic of China"},{"name":"School of Management, Wuhan College, Wuhan, People's Republic of China"}]},{"given":"Yanwei","family":"Lin","sequence":"additional","affiliation":[{"name":"School of Humanities and Management, Guangdong Medical University, Dongguan, People's Republic of China"}]},{"given":"Chaofeng","family":"Tang","sequence":"additional","affiliation":[{"name":"School of Humanities and Management, Guangdong Medical University, Dongguan, People's Republic of China"}]},{"given":"Qi","family":"Yao","sequence":"additional","affiliation":[{"name":"School of Management, Wuhan College, Wuhan, People's Republic of China"}]}],"member":"301","published-online":{"date-parts":[[2023,5,2]]},"reference":[{"key":"e_1_3_5_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACSAC.2001.991552"},{"key":"e_1_3_5_3_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10799-010-0066-1"},{"key":"e_1_3_5_4_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10796-012-9373-x"},{"key":"e_1_3_5_5_1","unstructured":"Bischoff Paul. 2020. \u201c8 Million UK Shopping Records Exposed on the Web Customers Personal Info Leaked.\u201d Accessed 4 November 2022. https:\/\/www.comparitech.com\/blog\/information-security\/uk-shopper-records-exposed\/."},{"key":"e_1_3_5_6_1","unstructured":"Brennan Sarah. 2020. \u201cNearly 70% of Major Companies Will Increase Cybersecurity Spending Post-Coronavirus.\u201d Accessed 4 November 2022. https:\/\/www.itpro.co.uk\/business-operations\/budgeting\/355768\/68-of-organizations-will-increase-cybersecurity-in-2020."},{"key":"e_1_3_5_7_1","unstructured":"Bruce Schneier. 2021. \u201cWhy Was SolarWinds So Vulnerable to a Hack?\u201d Accessed 4 February 2023. https:\/\/www.nytimes.com\/2021\/02\/23\/opinion\/solarwinds-hack.html."},{"key":"e_1_3_5_8_1","doi-asserted-by":"publisher","DOI":"10.3982\/ECTA11991"},{"key":"e_1_3_5_9_1","doi-asserted-by":"publisher","DOI":"10.1287\/mnsc.47.5.629.10486"},{"key":"e_1_3_5_10_1","doi-asserted-by":"publisher","DOI":"10.1080\/10864415.2004.11044320"},{"key":"e_1_3_5_11_1","doi-asserted-by":"publisher","DOI":"10.1111\/poms.2017.26.issue-5"},{"key":"e_1_3_5_12_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.tre.2020.102217"},{"key":"e_1_3_5_13_1","doi-asserted-by":"publisher","DOI":"10.1287\/mksc.10.4.271"},{"key":"e_1_3_5_14_1","doi-asserted-by":"publisher","DOI":"10.23952\/jnva.4.2020.1.05"},{"key":"e_1_3_5_15_1","doi-asserted-by":"publisher","DOI":"10.1007\/s12063-009-0018-2"},{"key":"e_1_3_5_16_1","unstructured":"Digiday. 2020. \u201cHow E-Commerce Growth Has Changed Unilevers Media Strategy.\u201d Accessed 4 November 2022. https:\/\/www.msspalert.com\/cybersecurity-services-and-products\/internet-of-things\/ibm-x-force-iot-threat-management-services\/."},{"key":"e_1_3_5_17_1","doi-asserted-by":"publisher","DOI":"10.1080\/00207543.2017.1387680"},{"key":"e_1_3_5_18_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2016.02.012"},{"key":"e_1_3_5_19_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jfineco.2013.11.006"},{"key":"e_1_3_5_20_1","doi-asserted-by":"publisher","DOI":"10.1287\/isre.1050.0053"},{"key":"e_1_3_5_21_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2022.117894"},{"key":"e_1_3_5_22_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10796-013-9411-3"},{"key":"e_1_3_5_23_1","doi-asserted-by":"publisher","DOI":"10.2307\/2032478"},{"key":"e_1_3_5_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/581271.581274"},{"key":"e_1_3_5_25_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jaccpubpol.2003.09.001"},{"key":"e_1_3_5_26_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10796-006-9011-6"},{"key":"e_1_3_5_27_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jaccpubpol.2007.10.001"},{"key":"e_1_3_5_28_1","doi-asserted-by":"publisher","DOI":"10.1002\/(ISSN)1099-1255"},{"key":"e_1_3_5_29_1","doi-asserted-by":"publisher","DOI":"10.1111\/poms.2018.27.issue-6"},{"key":"e_1_3_5_30_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijpe.2008.04.002"},{"key":"e_1_3_5_31_1","doi-asserted-by":"publisher","DOI":"10.1080\/00207543.2022.2118892"},{"key":"e_1_3_5_32_1","doi-asserted-by":"publisher","DOI":"10.1080\/00207543.2018.1521025"},{"key":"e_1_3_5_33_1","doi-asserted-by":"publisher","DOI":"10.1080\/00207543.2020.1750727"},{"key":"e_1_3_5_34_1","doi-asserted-by":"publisher","DOI":"10.1080\/00207543.2023.2177049"},{"key":"e_1_3_5_35_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.im.2018.11.003"},{"key":"e_1_3_5_36_1","doi-asserted-by":"publisher","DOI":"10.1287\/msom.2016.0575"},{"key":"e_1_3_5_37_1","unstructured":"Kobialka Dan. 2020. \u201cIBM Launches X-Force Threat Management Services for IoT.\u201d Accessed 4 November 2022. https:\/\/www.msspalert.com\/cybersecurity-services-and-products\/internet-of-things\/ibm-x-force-iot-threat-management-services\/."},{"key":"e_1_3_5_38_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1024119208153"},{"key":"e_1_3_5_39_1","doi-asserted-by":"publisher","DOI":"10.3401\/poms.1080.0057"},{"key":"e_1_3_5_40_1","doi-asserted-by":"publisher","DOI":"10.1080\/00207543.2020.1721591"},{"key":"e_1_3_5_41_1","unstructured":"Microsoft. 2019. \u201cA Year After the SolarWinds Hack Supply Chain Threats Still Loom.\u201d Accessed 4 November 2022. https:\/\/www.microsoft.com\/en-us\/procurement\/sspa."},{"key":"e_1_3_5_42_1","doi-asserted-by":"publisher","DOI":"10.1111\/jbl.2019.40.issue-1"},{"key":"e_1_3_5_43_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11129-013-9132-4"},{"key":"e_1_3_5_44_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10479-016-2209-1"},{"key":"e_1_3_5_45_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ejor.2016.12.034"},{"key":"e_1_3_5_46_1","unstructured":"New BBC. 2016. \u201cNearly 157 000 Had Data Breached in TalkTalk Cyber-Attack.\u201d https:\/\/www.bbc.co.uk\/news\/business-34743185. Accessed November 4 2022."},{"key":"e_1_3_5_47_1","unstructured":"Newman Lily Hay. 2021. \u201cA Year After the SolarWinds Hack Supply Chain Threats Still Loom.\u201d Accessed 4 November 2022. https:\/\/www.wired.com\/story\/solarwinds-hack-supply-chain-threats-improvements\/."},{"issue":"11","key":"e_1_3_5_48_1","first-page":"64","article-title":"How Smart, Connected Products Are Transforming Competition","volume":"92","author":"Porter Michael E.","year":"2014","unstructured":"Porter, Michael E., and James E. Heppelmann. 2014. \u201cHow Smart, Connected Products Are Transforming Competition.\u201d Harvard Business Review 92 (11): 64\u201388.","journal-title":"Harvard Business Review"},{"key":"e_1_3_5_49_1","unstructured":"PwC. 2013. \u201cThe Global State of Cybersecurity Survey 2013.\u201d Accessed 4 November 2022. https:\/\/www.pwc.com\/giss2013."},{"key":"e_1_3_5_50_1","doi-asserted-by":"publisher","DOI":"10.1080\/00207543.2017.1400704"},{"key":"e_1_3_5_51_1","doi-asserted-by":"publisher","DOI":"10.1007\/s12553-022-00691-6"},{"key":"e_1_3_5_52_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-022-13451-5"},{"key":"e_1_3_5_53_1","doi-asserted-by":"publisher","DOI":"10.1007\/s42486-021-00057-3"},{"key":"e_1_3_5_54_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2013.01.001"},{"key":"e_1_3_5_55_1","doi-asserted-by":"publisher","DOI":"10.1080\/00207543.2020.1856442"},{"key":"e_1_3_5_56_1","doi-asserted-by":"publisher","DOI":"10.1080\/00207543.2021.1914356"},{"key":"e_1_3_5_57_1","doi-asserted-by":"publisher","DOI":"10.1080\/00207543.2021.1994166"},{"key":"e_1_3_5_58_1","unstructured":"Scott Tony. 2020. \"Supply Chain Cybersecurity: A Report on The Current Risks and A Proposal for A Path Forward.\" Accessed 4 November. https:\/\/www-file.huawei.com\/-\/media\/corporate\/pdf\/trust-center\/supply-chain-cybersecurity.pdf?la=en-us."},{"key":"e_1_3_5_59_1","unstructured":"Securelink. 2021. \u201cA Crisis in Third-Party Remote Access Security.\u201d Accessed 4 November 2022. https:\/\/www.securelink.com\/research-reports\/a-crisis-in-third-party-remote-access-security\/."},{"key":"e_1_3_5_60_1","doi-asserted-by":"crossref","unstructured":"Security Risk Based. 2020. \u201cThe 2020 Q1 Data Breach Quickview Report.\u201d Accessed 4 November 2022. https:\/\/pages.riskbasedsecurity.com\/en\/2020-q1-data-breach-quickview-report.","DOI":"10.1016\/S1361-3723(20)30059-2"},{"key":"e_1_3_5_61_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ejor.2019.09.017"},{"key":"e_1_3_5_62_1","doi-asserted-by":"publisher","DOI":"10.1007\/1-4020-8090-5_1"},{"key":"e_1_3_5_63_1","doi-asserted-by":"publisher","DOI":"10.1057\/s41274-017-0263-y"},{"key":"e_1_3_5_64_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2015.03.033"},{"key":"e_1_3_5_65_1","doi-asserted-by":"publisher","DOI":"10.1080\/00207543.2021.1933643"},{"key":"e_1_3_5_66_1","doi-asserted-by":"publisher","DOI":"10.1080\/00207543.2019.1634296"},{"key":"e_1_3_5_67_1","doi-asserted-by":"publisher","DOI":"10.4018\/IRMJ"}],"container-title":["International Journal of Production Research"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.tandfonline.com\/doi\/pdf\/10.1080\/00207543.2023.2206923","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,16]],"date-time":"2024-03-16T13:18:12Z","timestamp":1710595092000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.tandfonline.com\/doi\/full\/10.1080\/00207543.2023.2206923"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,5,2]]},"references-count":66,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2024,3,18]]}},"alternative-id":["10.1080\/00207543.2023.2206923"],"URL":"https:\/\/doi.org\/10.1080\/00207543.2023.2206923","relation":{},"ISSN":["0020-7543","1366-588X"],"issn-type":[{"value":"0020-7543","type":"print"},{"value":"1366-588X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,5,2]]},"assertion":[{"value":"The publishing and review policy for this title is described in its Aims & Scope.","order":1,"name":"peerreview_statement","label":"Peer Review Statement"},{"value":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=tprs20","URL":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=tprs20","order":2,"name":"aims_and_scope_url","label":"Aim & Scope"},{"value":"2023-02-13","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2023-04-16","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2023-05-02","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}