{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,5]],"date-time":"2026-05-05T01:47:11Z","timestamp":1777945631807,"version":"3.51.4"},"reference-count":93,"publisher":"Emerald","issue":"2","license":[{"start":{"date-parts":[[2021,6,10]],"date-time":"2021-06-10T00:00:00Z","timestamp":1623283200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.emerald.com\/insight\/site-policies"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["ICS"],"published-print":{"date-parts":[[2021,8,3]]},"abstract":"<jats:sec><jats:title content-type=\"abstract-subheading\">Purpose<\/jats:title><jats:p>Information security is an essential element in all business activities. The damage to businesses from information security breaches has become pervasive. The scope of information security has widened as information has become a critical supply chain asset, making it more important to protect the organization\u2019s data. Today\u2019s global supply chains rely upon the speedy and robust dissemination of information among supply chain partners. Hence, processing of accurate supply chain information is quintessential to ensure the robustness and performance of supply chains. An effective information security management (ISM) is deemed to ensure the robustness of supply chains. The purpose of the paper is to examine the impact of information security initiatives on supply chain robustness and performance.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-subheading\">Design\/methodology\/approach<\/jats:title><jats:p>Based on extant literature, a research model was developed and validated using a questionnaire survey instrument administered among information systems\/information technology managers. Data collected were analyzed using exploratory and confirmatory factor analysis. Further, to test the hypotheses and to fit the theoretical model, Structural equation modeling techniques were used.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-subheading\">Findings<\/jats:title><jats:p>Results of this study indicated that information security initiatives are positively associated with supply chain robustness and performance. These initiatives are likely to enhance the robustness and performance of the supply chains.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-subheading\">Originality\/value<\/jats:title><jats:p>With the advancements in internet technologies and capabilities as well as considering the dynamic environment of supply chains, this study is relevant in terms of the capability that an organization needs to acquire with regards to ISM. Benefiting from the resource dependency theory, information security initiatives could be considered as a critical resource having an influence on the internal and external environment of supply chains.<\/jats:p><\/jats:sec>","DOI":"10.1108\/ics-07-2020-0128","type":"journal-article","created":{"date-parts":[[2021,6,8]],"date-time":"2021-06-08T07:51:19Z","timestamp":1623138679000},"page":"365-391","source":"Crossref","is-referenced-by-count":15,"title":["The impact of information security initiatives on supply chain robustness and performance: an empirical study"],"prefix":"10.1108","volume":"29","author":[{"given":"Sindhuja","family":"P.N.","sequence":"first","affiliation":[]}],"member":"140","published-online":{"date-parts":[[2021,6,10]]},"reference":[{"issue":"2","key":"key2021080202132343700_ref001","doi-asserted-by":"crossref","first-page":"205","DOI":"10.1108\/ICS-01-2016-0006","article-title":"An information security risk-driven investment model for analysing human factors","volume":"24","year":"2016","journal-title":"Information and Computer Security"},{"key":"key2021080202132343700_ref002","first-page":"15","article-title":"Assessing the vulnerability of supply chains","volume-title":"Supply Chain Risk: A Handbook of Assessment, Management and Performance","year":"2008"},{"issue":"4","key":"key2021080202132343700_ref003","doi-asserted-by":"crossref","first-page":"195","DOI":"10.1016\/j.istr.2008.10.006","article-title":"Information security management: a human challenge","volume":"13","year":"2008","journal-title":"Information Security Technical Report"},{"issue":"1","key":"key2021080202132343700_ref004","doi-asserted-by":"crossref","first-page":"138","DOI":"10.1016\/j.im.2013.11.004","article-title":"Incident-centered information security: managing a strategic balance between prevention and response","volume":"51","year":"2014","journal-title":"Information and Management"},{"key":"key2021080202132343700_ref005","doi-asserted-by":"crossref","first-page":"145","DOI":"10.1016\/j.cose.2017.04.009","article-title":"Prevention is better than cure! Designing information security awareness programs to overcome users\u2019 non-compliance with information security policies in banks","volume":"68","year":"2017","journal-title":"Computers and Security"},{"issue":"3","key":"key2021080202132343700_ref006","doi-asserted-by":"crossref","first-page":"281","DOI":"10.1016\/S0925-5273(98)00079-6","article-title":"Supply chain design and analysis: models and methods","volume":"55","year":"1998","journal-title":"International Journal of Production Economics"},{"issue":"3","key":"key2021080202132343700_ref007","doi-asserted-by":"crossref","first-page":"275","DOI":"10.1108\/01443579910249714","article-title":"Measuring supply chain performance","volume":"19","year":"1999","journal-title":"International Journal of Operations and Production Management"},{"issue":"5","key":"key2021080202132343700_ref008","doi-asserted-by":"crossref","first-page":"420","DOI":"10.1108\/09685220710831152","article-title":"On the imbalance of the security problem space and its expected consequences","volume":"15","year":"2007","journal-title":"Information Management and Computer Security"},{"key":"key2021080202132343700_ref009","volume-title":"Information Security Management Metrics","year":"2009"},{"issue":"4","key":"key2021080202132343700_ref033c","doi-asserted-by":"crossref","first-page":"385","DOI":"10.1016\/j.im.2014.12.004","article-title":"Institutional pressures in security management: direct and indirect influences on organizational investment in information security control resources","volume":"52","year":"2015","journal-title":"Information & Management"},{"issue":"3","key":"key2021080202132343700_ref010","doi-asserted-by":"crossref","first-page":"345","DOI":"10.1108\/02635570610653498","article-title":"Organizational factors to the effectiveness of implementing information security management","volume":"106","year":"2006","journal-title":"Industrial Management and Data Systems"},{"issue":"3","key":"key2021080202132343700_ref011","doi-asserted-by":"crossref","first-page":"438","DOI":"10.1108\/02635570710734316","article-title":"Exploring organizational culture for information security management","volume":"107","year":"2007","journal-title":"Industrial Management and Data Systems"},{"issue":"4","key":"key2021080202132343700_ref012","doi-asserted-by":"crossref","first-page":"360","DOI":"10.1108\/09685220810908787","article-title":"A cross-cultural investigation of situational information security awareness programs","volume":"16","year":"2008","journal-title":"Information Management and Computer Security"},{"key":"key2021080202132343700_ref013","doi-asserted-by":"crossref","first-page":"198","DOI":"10.1016\/j.tre.2015.02.015","article-title":"Robust supply chain strategies for recovering from unanticipated disaster","volume":"77","year":"2015","journal-title":"Transportation Research Part E: Logistics and Transportation Review"},{"issue":"1","key":"key2021080202132343700_ref014","doi-asserted-by":"crossref","first-page":"37","DOI":"10.1177\/001316446002000104","article-title":"A coefficient of agreement for nominal scales","volume":"20","year":"1960","journal-title":"Educational and Psychological Measurement"},{"issue":"3","key":"key2021080202132343700_ref015","doi-asserted-by":"crossref","first-page":"297","DOI":"10.1007\/BF02310555","article-title":"Coefficient alpha and the internal structure of tests","volume":"16","year":"1951","journal-title":"Psychometrika"},{"issue":"2","key":"key2021080202132343700_ref016","doi-asserted-by":"crossref","first-page":"139","DOI":"10.1108\/ICS-12-2015-0048","article-title":"Comparing the information security culture of employees who had read the information security policy and those who had not: Illustrated through an empirical study","volume":"24","year":"2016","journal-title":"Information and Computer Security"},{"key":"key2021080202132343700_ref017","first-page":"234","volume-title":"Principles of Information Systems Security: Text and Cases","year":"2007"},{"issue":"3","key":"key2021080202132343700_ref018","doi-asserted-by":"crossref","first-page":"293","DOI":"10.1111\/j.1365-2575.2006.00219.x","article-title":"Value-focused assessment of information security in organizations","volume":"16","year":"2006","journal-title":"Information Systems Journal"},{"issue":"3\/4","key":"key2021080202132343700_ref019","first-page":"189","article-title":"Information security: the moving target","volume":"28","year":"2009","journal-title":"Computers and Security"},{"issue":"1\/2","key":"key2021080202132343700_ref020","doi-asserted-by":"crossref","first-page":"118","DOI":"10.1108\/IJPDLM-05-2013-0133","article-title":"Antecedents and dimensions of supply chain robustness: a systematic literature review","volume":"45","year":"2015","journal-title":"International Journal of Physical Distribution and Logistics Management"},{"issue":"3","key":"key2021080202132343700_ref021","doi-asserted-by":"crossref","first-page":"243","DOI":"10.1016\/S0167-4048(00)88613-7","article-title":"Information security management: a hierarchical framework for various approaches","volume":"19","year":"2000","journal-title":"Computers and Security"},{"issue":"5","key":"key2021080202132343700_ref022","first-page":"419","article-title":"Information sharing in supply chains","volume":"33","year":"1995","journal-title":"Omega"},{"issue":"3","key":"key2021080202132343700_ref023","doi-asserted-by":"crossref","first-page":"106","DOI":"10.1108\/09685220310480381","article-title":"The application of information security policies in large UK-based organizations: an exploratory investigation","volume":"11","year":"2003","journal-title":"Information Management and Computer Security"},{"issue":"1\/2","key":"key2021080202132343700_ref024","doi-asserted-by":"crossref","first-page":"71","DOI":"10.1108\/01443570110358468","article-title":"Performance measures and metrics in a supply chain environment","volume":"21","year":"2001","journal-title":"International Journal of Operations and Production Management"},{"key":"key2021080202132343700_ref055a","volume-title":"Multivariate Data Analysis","year":"1998","edition":"5th edn"},{"issue":"2","key":"key2021080202132343700_ref025","doi-asserted-by":"crossref","first-page":"154","DOI":"10.1016\/j.dss.2009.02.005","article-title":"Encouraging information security behaviors in organizations: role of penalties, pressures and perceived effectiveness","volume":"47","year":"2009","journal-title":"Decision Support Systems"},{"issue":"5","key":"key2021080202132343700_ref026","doi-asserted-by":"crossref","first-page":"243","DOI":"10.1108\/09685220310500153","article-title":"An integrated system theory of information security management","volume":"11","year":"2003","journal-title":"Information Management and Computer Security"},{"issue":"2","key":"key2021080202132343700_ref027","doi-asserted-by":"crossref","first-page":"104","DOI":"10.1108\/09685220610655861","article-title":"An empirical study of information security policy on information security elevation in Taiwan","volume":"14","year":"2006","journal-title":"Information Management and Computer Security"},{"key":"key2021080202132343700_ref028","volume-title":"Handbook of Structural Equation Modeling","year":"2012"},{"issue":"1","key":"key2021080202132343700_ref029","doi-asserted-by":"crossref","first-page":"69","DOI":"10.1016\/j.im.2013.10.001","article-title":"Information systems security policy compliance: an empirical study of the effects of socialisation, influence, and cognition","volume":"51","year":"2014","journal-title":"Information and Management"},{"key":"key2021080202132343700_ref030","volume-title":"COBIT for Information Security","author":"ISACA","year":"2012"},{"issue":"7","key":"key2021080202132343700_ref031","doi-asserted-by":"crossref","first-page":"2154","DOI":"10.1080\/00207543.2013.858836","article-title":"The ripple effect in supply chains: trade-off \u2018efficiency-flexibility-resilience\u2019 in disruption management","volume":"52","year":"2014","journal-title":"International Journal of Production Research"},{"key":"key2021080202132343700_ref062x","volume-title":"LISREL-7 User\u2019s Reference Guide","year":"1989"},{"issue":"2","key":"key2021080202132343700_ref032","doi-asserted-by":"crossref","first-page":"139","DOI":"10.1016\/S0268-4012(02)00105-6","article-title":"An integrative study of information systems security effectiveness","volume":"23","year":"2003","journal-title":"International Journal of Information Management"},{"issue":"5","key":"key2021080202132343700_ref033","doi-asserted-by":"crossref","first-page":"418","DOI":"10.1108\/ICS-11-2016-091","article-title":"Inter-organisational information security: a systematic literature review","volume":"24","year":"2016","journal-title":"Information and Computer Security"},{"issue":"3","key":"key2021080202132343700_ref034","doi-asserted-by":"crossref","first-page":"246","DOI":"10.1016\/j.cose.2004.08.011","article-title":"Information systems security policies: a contextual perspective","volume":"24","year":"2005","journal-title":"Computers and Security"},{"key":"key2021080202132343700_ref033a","article-title":"Cybersecurity at Aetna is a matter of business risk","volume-title":"Wall Street Journal","year":"2015"},{"issue":"2","key":"key2021080202132343700_ref035","doi-asserted-by":"crossref","first-page":"283","DOI":"10.1016\/j.ejor.2009.06.011","article-title":"The design of robust value-creating supply chain networks: a critical review","volume":"203","year":"2010","journal-title":"European Journal of Operational Research"},{"issue":"1","key":"key2021080202132343700_ref036","doi-asserted-by":"crossref","first-page":"24","DOI":"10.1108\/09685220610648355","article-title":"Information security: management\u2019s effect on culture and policy","volume":"14","year":"2006","journal-title":"Information Management and Computer Security"},{"issue":"5","key":"key2021080202132343700_ref037","doi-asserted-by":"crossref","first-page":"597","DOI":"10.1016\/j.im.2003.08.001","article-title":"Why there aren\u2019t more information security research studies?","volume":"41","year":"2004","journal-title":"Information and Management"},{"issue":"2","key":"key2021080202132343700_ref038","doi-asserted-by":"crossref","first-page":"143","DOI":"10.1016\/j.apergo.2006.03.010","article-title":"Human errors and violations in computer and information security: the viewpoint of network administrators and security specialists","volume":"38","year":"2007","journal-title":"Applied Ergonomics"},{"issue":"6","key":"key2021080202132343700_ref039","doi-asserted-by":"crossref","first-page":"444","DOI":"10.1108\/13598540710826371","article-title":"Relationship between supply chain performance and degree of linkage among supplier, internal integration, and customer","volume":"12","year":"2007","journal-title":"Supply Chain Management: An International Journal"},{"issue":"2","key":"key2021080202132343700_ref040","doi-asserted-by":"crossref","first-page":"107","DOI":"10.1016\/j.omega.2004.08.002","article-title":"The impact of supply chain management practices on competitive advantage and organizational performance","volume":"34","year":"2006","journal-title":"Omega"},{"key":"key2021080202132343700_ref041","article-title":"Achieving build-to-order supply chain capability through practices driven by supplier alignment and supplier empowerment","year":"2008"},{"issue":"3","key":"key2021080202132343700_ref042","doi-asserted-by":"crossref","first-page":"251","DOI":"10.1108\/09685220810893207","article-title":"Implementation security management objectives and practices: a parsimonious framework","volume":"16","year":"2008","journal-title":"Information Management and Computer Security"},{"issue":"1","key":"key2021080202132343700_ref043","doi-asserted-by":"crossref","first-page":"145","DOI":"10.2307\/25148671","article-title":"Absorptive capacity configurations in supply chains: gearing for partner-enabled market knowledge creation","volume":"29","year":"2005","journal-title":"MIS Quarterly"},{"key":"key2021080202132343700_ref044","first-page":"203","article-title":"Information security culture","volume-title":"IFIP TC11 proceedings of the 17th international conference on information security (SEC2002)","year":"2002"},{"issue":"4","key":"key2021080202132343700_ref045","first-page":"69","article-title":"Development of information security management system at the members of the supply chain","volume":"9","year":"2009","journal-title":"Annals of the University of Petrosani, Economics"},{"key":"key2021080202132343700_ref046","doi-asserted-by":"crossref","first-page":"110","DOI":"10.1016\/j.procir.2017.12.185","article-title":"Supply chains\u2019 robustness: challenges and opportunities","volume":"67","year":"2018","journal-title":"Procedia CIRP"},{"issue":"3","key":"key2021080202132343700_ref047","doi-asserted-by":"crossref","first-page":"192","DOI":"10.1287\/isre.2.3.192","article-title":"Development of an instrument to measure perceptions of adopting an information technology innovation","volume":"2","year":"1991","journal-title":"Information Systems Research"},{"issue":"1","key":"key2021080202132343700_ref048","doi-asserted-by":"crossref","first-page":"114","DOI":"10.22237\/jmasm\/1020255360","article-title":"The Q-Sort method: assessing reliability and construct validity of questionnaire items at a pre-testing stage","volume":"1","year":"2002","journal-title":"Journal of Modern Applied Statistical Methods"},{"issue":"3","key":"key2021080202132343700_ref049","doi-asserted-by":"crossref","first-page":"579","DOI":"10.1111\/j.1540-5915.1998.tb01355.x","article-title":"Causal linkage in supply chain management: an exploratory study of North American manufacturing firms","volume":"29","year":"1998","journal-title":"Decision Sciences"},{"issue":"1","key":"key2021080202132343700_ref050","doi-asserted-by":"crossref","first-page":"123","DOI":"10.1016\/j.im.2014.10.009","article-title":"A system dynamics model for information security management","volume":"52","year":"2015","journal-title":"Information and Management"},{"issue":"6","key":"key2021080202132343700_ref051","doi-asserted-by":"crossref","first-page":"622","DOI":"10.1080\/09537280412331283928","article-title":"Critical success factors of web-based supply chain management systems: an exploratory study","volume":"15","year":"2004","journal-title":"Production Planning and Control"},{"key":"key2021080202132343700_ref052","volume-title":"Psychometric Theory","year":"1978"},{"key":"key2021080202132343700_ref053","volume-title":"The External Control of Organizations: A Resource Dependence Perspective","year":"1978"},{"issue":"5","key":"key2021080202132343700_ref054","doi-asserted-by":"crossref","first-page":"551","DOI":"10.1016\/j.im.2014.03.009","article-title":"Bridging the divide: a qualitative comparison of information security thought patterns between information security professionals and ordinary organizational insiders","volume":"51","year":"2014","journal-title":"Information and Management"},{"key":"key2021080202132343700_ref033b","unstructured":"PricewaterhouseCoopers (2013), \u201c10Minutes on the stark realities of cybersecurity\u201d, available at: www.pwc.com\/us\/en\/10minutes\/cybersecurity-realities.html"},{"issue":"2","key":"key2021080202132343700_ref062a","doi-asserted-by":"crossref","first-page":"177","DOI":"10.1287\/isre.6.2.177","article-title":"A confirmatory factor analysis of the user information satisfaction instrument","volume":"6","year":"1995","journal-title":"Information Systems Research"},{"issue":"4","key":"key2021080202132343700_ref055","doi-asserted-by":"crossref","first-page":"343","DOI":"10.1287\/isre.10.4.343","article-title":"Dimensionality of strategic grid framework: the construct and its measurement","volume":"10","year":"1999","journal-title":"Information Systems Research"},{"key":"key2021080202132343700_ref056","article-title":"Trading partner trust in electronic commerce participation","volume-title":"the proceedings of the twenty first international conference on Information systems","year":"2000"},{"key":"key2021080202132343700_ref057","volume-title":"Computer Security Basics","year":"1991"},{"issue":"4","key":"key2021080202132343700_ref058","first-page":"44","article-title":"Five tenets of security-aware logistics and supply chain operation","volume":"42","year":"2003","journal-title":"Transportation Journal"},{"issue":"3","key":"key2021080202132343700_ref059","doi-asserted-by":"crossref","first-page":"346","DOI":"10.1108\/17410390910949751","article-title":"Performance measures and metrics for e-supply chains","volume":"22","year":"2009","journal-title":"Journal of Enterprise Information Management"},{"issue":"4","key":"key2021080202132343700_ref060","doi-asserted-by":"crossref","first-page":"28","DOI":"10.2307\/20713653","article-title":"Security and the global supply chain","volume":"45","year":"2006","journal-title":"Transportation Journal"},{"key":"key2021080202132343700_ref061","article-title":"Information security culture- from analysis to change","volume-title":"Information Security South Africa (ISSA) 2003 conference proceedings of the 3rd Annual Information Security Conference","year":"2003"},{"issue":"12","key":"key2021080202132343700_ref062","doi-asserted-by":"crossref","first-page":"1601","DOI":"10.1287\/mnsc.40.12.1601","article-title":"Development of measures to assess the extent to which an information technology application provides competitive advantage","volume":"40","year":"1994","journal-title":"Management Science"},{"issue":"6","key":"key2021080202132343700_ref063","doi-asserted-by":"crossref","first-page":"623","DOI":"10.1108\/09600031111147844","article-title":"Optimizing efficiency robustness trade\u2010offs in supply chain design under uncertainty due to disruptions","volume":"41","year":"2011","journal-title":"International Journal of Physical Distribution and Logistics Management"},{"issue":"5","key":"key2021080202132343700_ref064","doi-asserted-by":"crossref","first-page":"476","DOI":"10.1108\/ICS-07-2014-0050","article-title":"Information security in supply chains: a management control perspective","volume":"23","year":"2015","journal-title":"Information and Computer Security"},{"issue":"5","key":"key2021080202132343700_ref065","doi-asserted-by":"crossref","first-page":"267","DOI":"10.1016\/j.im.2008.12.007","article-title":"Information security management standards: problems and solutions","volume":"46","year":"2009","journal-title":"Information and Management"},{"issue":"2","key":"key2021080202132343700_ref066","doi-asserted-by":"crossref","first-page":"217","DOI":"10.1016\/j.im.2013.08.006","article-title":"Employees\u2019 adherence to information security policies: an exploratory field study","volume":"51","year":"2014","journal-title":"Information and Management"},{"key":"key2021080202132343700_ref018a","article-title":"Is your supply chain safe from cyberattacks?","year":"2015","journal-title":"Supply Chain Quarterly Newsletter"},{"issue":"11","key":"key2021080202132343700_ref067","doi-asserted-by":"crossref","first-page":"2595","DOI":"10.1080\/00207540601020544","article-title":"A critical balance: collaboration and security in the IT-enabled supply chain","volume":"45","year":"2007","journal-title":"International Journal of Production Research"},{"key":"key2021080202132343700_ref068","first-page":"630","article-title":"An empirical investigation into supply chain management: a perspective on partnerships","volume":"28","year":"1998","journal-title":"International Journal of Physical Distribution and Logistics Management"},{"issue":"1","key":"key2021080202132343700_ref069","doi-asserted-by":"crossref","first-page":"71","DOI":"10.2308\/isys-51257","article-title":"SECURQUAL: an instrument for evaluating the effectiveness of enterprise information security programs","volume":"30","year":"2016","journal-title":"Journal of Information Systems"},{"key":"key2021080202132343700_ref070","first-page":"16","article-title":"The supply chain council and the supply chain operations reference (SCOR) model: integrating processes, performance measurements, technology and best practice","volume":"34","year":"2001","journal-title":"Logistic Spectrum"},{"issue":"2","key":"key2021080202132343700_ref071","doi-asserted-by":"crossref","first-page":"38","DOI":"10.1108\/09576059510085000","article-title":"Supply chain performance benchmarking study reveals keys to supply chain excellence","volume":"8","year":"1995","journal-title":"Logistics Information Management"},{"issue":"5","key":"key2021080202132343700_ref072","doi-asserted-by":"crossref","first-page":"494","DOI":"10.1108\/ICS-07-2016-0054","article-title":"Information security management and the human aspect in organizations","volume":"25","year":"2017","journal-title":"Information and Computer Security"},{"issue":"1","key":"key2021080202132343700_ref073","doi-asserted-by":"crossref","first-page":"39","DOI":"10.2307\/4132340","article-title":"The repertory grid technique: a method for the study of cognition in information systems","volume":"26","year":"2002","journal-title":"MIS Quarterly"},{"key":"key2021080202132343700_ref074","first-page":"2","article-title":"Supply chain management: supplier performance and firm performance","volume":"34","year":"1998","journal-title":"International Journal of Purchasing and Materials Management"},{"issue":"1","key":"key2021080202132343700_ref075","doi-asserted-by":"crossref","first-page":"33","DOI":"10.1080\/13675560500405584","article-title":"Robust strategies for mitigating supply chain disruptions","volume":"9","year":"2006","journal-title":"International Journal of Logistics Research and Applications"},{"issue":"2","key":"key2021080202132343700_ref076","doi-asserted-by":"crossref","first-page":"196","DOI":"10.1016\/j.cose.2009.09.002","article-title":"A framework and assessment instrument for information security culture","volume":"29","year":"2010","journal-title":"Computers and Security"},{"issue":"7","key":"key2021080202132343700_ref077","doi-asserted-by":"crossref","first-page":"615","DOI":"10.1016\/S0167-4048(00)07021-8","article-title":"Information security \u2013 the third wave","volume":"19","year":"2000","journal-title":"Computers and Security"},{"issue":"3","key":"key2021080202132343700_ref078","doi-asserted-by":"crossref","first-page":"143","DOI":"10.1016\/0378-7206(94)90038-8","article-title":"A framework for information security evaluation","volume":"26","year":"1994","journal-title":"Information and Management"},{"issue":"2","key":"key2021080202132343700_ref079","first-page":"5","article-title":"The role of strategic security: Internal and external security measures with security performance implications","volume":"28","year":"2009","journal-title":"Transportation Journal"},{"issue":"6","key":"key2021080202132343700_ref080","doi-asserted-by":"crossref","first-page":"301","DOI":"10.1016\/j.pursup.2007.01.004","article-title":"An empirical investigation into supply chain vulnerability","volume":"12","year":"2006","journal-title":"Journal of Purchasing and Supply Management"},{"issue":"1","key":"key2021080202132343700_ref081","doi-asserted-by":"crossref","first-page":"4","DOI":"10.1108\/09685220910944722","article-title":"An integrated view of human, organizational and technological challenges of IT security management","volume":"17","year":"2009","journal-title":"Information Management and Computer Security"},{"issue":"7","key":"key2021080202132343700_ref082","doi-asserted-by":"crossref","first-page":"574","DOI":"10.1108\/09600030910996260","article-title":"Supply chain security practices in the food industry: do firms operating globally and domestically differ?","volume":"39","year":"2009","journal-title":"International Journal of Physical Distribution and Logistics Management"},{"issue":"10","key":"key2021080202132343700_ref083","doi-asserted-by":"crossref","first-page":"887","DOI":"10.1108\/09600031211281411","article-title":"Dealing with supply chain risks: linking risk management practices and strategies to performance","volume":"42","year":"2012","journal-title":"International Journal of Physical Distribution and Logistics Management"},{"issue":"2","key":"key2021080202132343700_ref084","first-page":"231","article-title":"Empirical research on associations among information technology, supply chain robustness and supply chain performance","volume":"6","year":"2011","journal-title":"International Journal of Business and Management"},{"issue":"3","key":"key2021080202132343700_ref085","doi-asserted-by":"crossref","first-page":"201","DOI":"10.1007\/s12198-011-0067-2","article-title":"How robustness and resilience support security business against antagonistic threats in transport network","volume":"4","year":"2011","journal-title":"Journal of Transportation Security"},{"key":"key2021080202132343700_ref086","volume-title":"Information Technology \u2014 Security Techniques \u2014 Code of Practice for Information Security Controls","author":"ISO\/IEC 27002","year":"2013","edition":"2nd ed."}],"container-title":["Information &amp; Computer Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/ICS-07-2020-0128\/full\/xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/ICS-07-2020-0128\/full\/html","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,25]],"date-time":"2025-07-25T01:23:04Z","timestamp":1753406584000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.emerald.com\/ics\/article\/29\/2\/365-391\/117684"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,6,10]]},"references-count":93,"journal-issue":{"issue":"2","published-online":{"date-parts":[[2021,6,10]]},"published-print":{"date-parts":[[2021,8,3]]}},"alternative-id":["10.1108\/ICS-07-2020-0128"],"URL":"https:\/\/doi.org\/10.1108\/ics-07-2020-0128","relation":{},"ISSN":["2056-4961","2056-4961"],"issn-type":[{"value":"2056-4961","type":"print"},{"value":"2056-4961","type":"print"}],"subject":[],"published":{"date-parts":[[2021,6,10]]}}}