{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,7]],"date-time":"2026-02-07T17:18:44Z","timestamp":1770484724196,"version":"3.49.0"},"reference-count":70,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,8]]},"DOI":"10.1109\/issa.2015.7335076","type":"proceedings-article","created":{"date-parts":[[2015,11,23]],"date-time":"2015-11-23T22:50:11Z","timestamp":1448319011000},"page":"1-9","source":"Crossref","is-referenced-by-count":4,"title":["Cloud supply chain resilience"],"prefix":"10.1109","author":[{"given":"Andrea","family":"Herrera","sequence":"first","affiliation":[]},{"given":"Lech","family":"Janczewski","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1108\/09574090110806262"},{"key":"ref39","article-title":"Implementation of Real Time Alert System over Cloud Computing","volume":"4","author":"shim","year":"2013","journal-title":"International Journal of Energy Information & Communications"},{"key":"ref38","article-title":"Cloud Nine? An Integrative Risk Management Framework for Cloud Computing","author":"troshani","year":"2011","journal-title":"BLED Conference"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1145\/1866835.1866850"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/CCIS.2011.6045064"},{"key":"ref31","article-title":"From disaster response planning to e-resilience: a literature review","author":"maurer","year":"2014","journal-title":"BLED 2014 Proceedings Paper 32"},{"key":"ref30","article-title":"CERT&#x00AE; Resilience Management Model v1.0: improving operational resilience processes","author":"caralli","year":"2010","journal-title":"Carnegie Mellon CMU\/SEI-2010-TR-012\/ESC-TR-2010-012"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/CLOUD.2010.22"},{"key":"ref36","article-title":"Risk and Compliance Management for Cloud Computing Services: Designing a Reference Model","author":"martens","year":"2011","journal-title":"17th Americas Conference on Information Systems"},{"key":"ref35","article-title":"Toward Risk Assessment as a Service in Cloud Environments","author":"kaliski","year":"2010","journal-title":"2nd Conference on Hot Topics in Cloud Computing"},{"key":"ref34","doi-asserted-by":"crossref","first-page":"39","DOI":"10.1080\/08874417.2013.11645649","article-title":"Risks in Enterprise Cloud Computing: The Perspective of its Experts","volume":"53","author":"dutta","year":"2013","journal-title":"Journal of Computer Information Systems"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1108\/09574090410700275"},{"key":"ref62","article-title":"The resilient enterprise: overcoming vulnerability for competitive advantage","volume":"1","author":"sheffi","year":"2005","journal-title":"MIT Press"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1002\/j.2158-1592.2010.tb00125.x"},{"key":"ref63","article-title":"Creating resilient supply chains","volume":"11","author":"christopher","year":"2004","journal-title":"Logistics Europe"},{"key":"ref28","article-title":"Resilience, vulnerability and adaptive capacity: implications for system performance","author":"dalziell","year":"2004","journal-title":"Int Forum on Eng Decis Making"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1016\/j.cie.2014.04.019"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1111\/j.1937-5956.2005.tb00009.x"},{"key":"ref65","article-title":"A coordination theory approach to process description and redesign","author":"crowston","year":"2003","journal-title":"Organizing Business Knowledge The MIT Process Handbook"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1108\/13598540410544953"},{"key":"ref29","article-title":"BS ISO\/IEC 27031: 2011 Information technology. Security techniques. Guidelines for information and communication technology readiness for business continuity","year":"2011","journal-title":"British Standards Institute"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1145\/1342327.1342340"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1080\/17517575.2012.690891"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1108\/14637150810876698"},{"key":"ref2","article-title":"Worldwide and regional public it cloud services 2013-2017 forecast","year":"2013","journal-title":"IDC"},{"key":"ref1","article-title":"Gartner says worldwide cloud services market to surpass $109 billion in 2012","year":"2012","journal-title":"Gartner"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1146\/annurev.es.04.110173.000245"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1007\/s10021-001-0045-9"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1016\/j.hazards.2004.02.001"},{"key":"ref24","first-page":"51","article-title":"Engineering resilience versus ecological resilience","author":"holling","year":"2010"},{"key":"ref23","article-title":"Key concepts","year":"2012","journal-title":"The Resilience Alliance"},{"key":"ref26","first-page":"23","article-title":"Organizing for high reliability: processes of collective mindfulness","volume":"21","author":"weick","year":"1999","journal-title":"Research in Organizational Behavior"},{"key":"ref25","article-title":"Organizational resilience models applied to companies in bankruptcy","author":"wilson","year":"2010"},{"key":"ref50","article-title":"Resilient organisations in the cloud","author":"herrera","year":"2014","journal-title":"The 25th Australasian Conference on Information Systems"},{"key":"ref51","article-title":"Why do Internet services fail, and what can be done about it?","author":"oppenheimer","year":"2003","journal-title":"USENIX Symposium on Internet Technologies and Systems"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1108\/09574090910954873"},{"key":"ref58","article-title":"Coordinating the relationship between it services providers and clients: the case of cloud computing","author":"simmonds","year":"2010","journal-title":"Proceedings of SIGSVC Workshop"},{"key":"ref57","article-title":"E-Procurement of cloud-based information systems - a product-service system approach","author":"schrodl","year":"2013","journal-title":"Thirty Fourth International Conference on Information Systems"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1109\/INM.2011.5990505"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-22760-8_3"},{"key":"ref54","article-title":"Understanding cloud requirements-a supply chain lifecycle approach","author":"lindner","year":"2011","journal-title":"Proceedings of the Second International Conference on Cloud Computing GRIDs and Virtualization"},{"key":"ref53","article-title":"Guiding principles for cloud computing adoption and use","year":"2012","journal-title":"ISACA"},{"key":"ref52","article-title":"Cloud computing as a supply chain","author":"fischer","year":"2009","journal-title":"Walden University"},{"key":"ref10","article-title":"Resilience in the era of enterprise cloud computing","year":"2014","journal-title":"IBM Global Technology Services"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1016\/S1353-4858(13)70101-6"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2011.33"},{"key":"ref12","article-title":"BS 65000:2014 Guidance on organizational resilience","year":"2014","journal-title":"British Standards Institute"},{"key":"ref13","article-title":"Organisational resilience","author":"cockram","year":"2012","journal-title":"Business Continuity Institute"},{"key":"ref14","article-title":"Business continuity in network organizations-a literature review","author":"morisse","year":"2014","journal-title":"Twentieth Americas Conference on Information Systems"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1016\/j.protcy.2014.10.065"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/174666.174668"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1002\/j.2158-1592.2006.tb00220.x"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-19257-9_3"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1111\/j.1745-493X.2006.04201002.x"},{"key":"ref4","article-title":"Critical cloud computing: a CIIP perspective on cloud computing services","author":"dekker","year":"2012","journal-title":"ENISA"},{"key":"ref3","article-title":"Sizing the cloud: understanding and quantifying the future of cloud computing","author":"ried","year":"2011","journal-title":"Forrester"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1057\/9781137347473"},{"key":"ref5","doi-asserted-by":"crossref","first-page":"35","DOI":"10.17705\/1CAIS.03102","article-title":"A descriptive literature review and classification of cloud computing research","volume":"31","author":"yang","year":"2012","journal-title":"Communications of The Association for Information Systems"},{"key":"ref8","article-title":"Cloud security incident reporting: framework for reporting about major cloud security incidents","author":"dekker","year":"2013","journal-title":"ENISA"},{"key":"ref7","article-title":"The cloud supply chain: A framework for information, monitoring, accounting and billing","author":"lindner","year":"2010","journal-title":"2nd International ICST Conference on Cloud Computing CloudComp"},{"key":"ref49","article-title":"The NIST definition of cloud computing","author":"mell","year":"2011","journal-title":"US National Institute of Standards and Technology"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4614-1614-2_14"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.2011.36"},{"key":"ref45","article-title":"Towards an analysis of software supply chain risk management","author":"du","year":"2013","journal-title":"Proceedings of the worid Congress on Engineering and Computer Science"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.2753\/MIS0742-1222260405"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1007\/s12525-012-0086-2"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/PICMET.2001.952380"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1108\/09685221211286511"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/ICSEA.2007.42"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/INDIN.2005.1560376"}],"event":{"name":"2015 Information Security for South Africa (ISSA)","location":"Johannesburg, South Africa","start":{"date-parts":[[2015,8,12]]},"end":{"date-parts":[[2015,8,13]]}},"container-title":["2015 Information Security for South Africa (ISSA)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7328027\/7335039\/07335076.pdf?arnumber=7335076","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,1]],"date-time":"2019-09-01T20:53:47Z","timestamp":1567371227000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7335076\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,8]]},"references-count":70,"URL":"https:\/\/doi.org\/10.1109\/issa.2015.7335076","relation":{},"subject":[],"published":{"date-parts":[[2015,8]]}}}