{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,14]],"date-time":"2026-04-14T13:37:03Z","timestamp":1776173823561,"version":"3.50.1"},"reference-count":86,"publisher":"American Accounting Association","issue":"2","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,6,1]]},"abstract":"<jats:title>ABSTRACT<\/jats:title>\n               <jats:p>Recognizing the need for effective cyber risk management processes across the supply chain, the AICPA issued a new SOC in March 2020 for assuring cyber supply chain risk management (C-SCRM) processes. This study examines supply chain relationship factors and cyber risk issues to better understand the demand for C-SCRM assurance. Resource-Advantage Theory of Competition provides the conceptual foundation for assessing the dual drivers of relationship building and cyber risk management on demand for assurance. We use a field survey to collect data from 205 professionals enabling evaluation of the complex relationships in the theoretical model. Results support all hypotheses, provide satisfactory model fit, and support the underlying theory. Trust and cyber supply chain risk both positively influence demand for assurance over C-SCRM processes. This study expands the literature on cyber assurance by auditors and elaborates on overall supply chain processes that help drive value from auditors providing such assurance.<\/jats:p>","DOI":"10.2308\/isys-19-050","type":"journal-article","created":{"date-parts":[[2020,10,7]],"date-time":"2020-10-07T21:19:50Z","timestamp":1602105590000},"page":"37-60","source":"Crossref","is-referenced-by-count":13,"title":["Cyber Supply Chain Risk Management: Toward an Understanding of the Antecedents to Demand for Assurance"],"prefix":"10.2308","volume":"35","author":[{"given":"Clark","family":"Hampton","sequence":"first","affiliation":[{"name":"University of South Carolina"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7096-7394","authenticated-orcid":true,"given":"Steve G.","family":"Sutton","sequence":"additional","affiliation":[{"name":"Norwegian School of Economics"},{"name":"University of Central Florida"}]},{"given":"Vicky","family":"Arnold","sequence":"additional","affiliation":[{"name":"Norwegian School of Economics"},{"name":"University of Central Florida"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2675-2871","authenticated-orcid":true,"given":"Deepak","family":"Khazanchi","sequence":"additional","affiliation":[{"name":"University of Nebraska at Omaha"}]}],"member":"1112","published-online":{"date-parts":[[2020,10,7]]},"reference":[{"key":"2024082915271362600_i1558-7959-35-2-37-AICPA1","unstructured":"American Institute of Certified Public Accountants (AICPA).\n          2020\n          a. SOC for Supply Chains Backgrounder. New York, NY: AICPA."},{"key":"2024082915271362600_i1558-7959-35-2-37-AICPA2","unstructured":"American Institute of Certified Public Accountants (AICPA).\n          2020\n          b.\n          \n            Appendix A: Information for Management\n          .\n\t\t\t\t\tNew York, NY:\n\t\t\t\t\tAICPA."},{"key":"2024082915271362600_i1558-7959-35-2-37-AICPA3","unstructured":"American Institute of Certified Public Accountants (AICPA).\n          2020\n          c. Appendix B: Comparison of SOC for Supply Chain, SOC 2, and SOC for Cybersecurity Examinations and Related Reports. New York, NY: AICPA."},{"key":"2024082915271362600_i1558-7959-35-2-37-Anderson1","doi-asserted-by":"crossref","unstructured":"Anderson,\n              S.,\n             and\n\t\t\t\t\t\tLanenW.\n          2002.\n\t\t\t\t\tUsing electronic data interchange (EDI) to improve the efficiency of accounting transactions.\n\t\t\t\t\tThe Accounting Review77 (\n\t\t\t\t\t4):\n\t\t\t\t\t703\u2013\n\t\t\t\t\t729.\n\t\t\t\t\thttps:\/\/doi.org\/10.2308\/accr.2002.77.4.703","DOI":"10.2308\/accr.2002.77.4.703"},{"key":"2024082915271362600_i1558-7959-35-2-37-Armstrong1","doi-asserted-by":"crossref","unstructured":"Armstrong,\n              C.,\n             and\n\t\t\t\t\t\tSambamurthyV.\n          1999.\n\t\t\t\t\tInformation technology assimilation in firms: The influence of senior leadership and IT infrastructures.\n\t\t\t\t\tInformation Systems Research10 (\n\t\t\t\t\t4):\n\t\t\t\t\t304\u2013\n\t\t\t\t\t327.\n\t\t\t\t\thttps:\/\/doi.org\/10.1287\/isre.10.4.304","DOI":"10.1287\/isre.10.4.304"},{"key":"2024082915271362600_i1558-7959-35-2-37-Arnett1","unstructured":"Arnett,\n              D. B.\n            \n          \n          2011.\n\t\t\t\t\tResource-Advantage Theory: The Research Tradition Period. Legends in Marketing: Shelby D. Hunt.\n\t\t\t\t\tWashington, DC:\n\t\t\t\t\tSage Publishing."},{"key":"2024082915271362600_i1558-7959-35-2-37-Arnold1","doi-asserted-by":"crossref","unstructured":"Arnold,\n              V.,\n            \n            \n              Benford\n              T.,\n            \n            \n              Canada\n              J.,\n             and\n\t\t\t\t\t\tSuttonS.\n          2015.\n\t\t\t\t\tLeveraging integrated information systems to enhance strategic flexibility and performance: The enabling role of enterprise risk management.\n\t\t\t\t\tInternational Journal of Accounting Information Systems19:\n\t\t\t\t\t1\u2013\n\t\t\t\t\t16.\n\t\t\t\t\thttps:\/\/doi.org\/10.1016\/j.accinf.2015.10.001","DOI":"10.1016\/j.accinf.2015.10.001"},{"key":"2024082915271362600_i1558-7959-35-2-37-Arnold2","doi-asserted-by":"crossref","unstructured":"Arnold,\n              V.,\n            \n            \n              Benford\n              T.,\n            \n            \n              Hampton\n              C.,\n             and\n\t\t\t\t\t\tSuttonS.\n          2010.\n\t\t\t\t\tCompeting pressures of risk and absorptive capacity potential on commitment and information sharing in global supply chains.\n\t\t\t\t\tEuropean Journal of Information Systems19 (\n\t\t\t\t\t2):\n\t\t\t\t\t134\u2013\n\t\t\t\t\t152.\n\t\t\t\t\thttps:\/\/doi.org\/10.1057\/ejis.2009.49","DOI":"10.1057\/ejis.2009.49"},{"key":"2024082915271362600_i1558-7959-35-2-37-Arnold3","doi-asserted-by":"crossref","unstructured":"Arnold,\n              V.,\n            \n            \n              Benford\n              T.,\n            \n            \n              Hampton\n              C.,\n             and\n\t\t\t\t\t\tSuttonS.\n          2012.\n\t\t\t\t\tEnterprise risk management as a strategic governance mechanism in B2B enabled transnational supply chains.\n\t\t\t\t\tJournal of Information Systems26 (\n\t\t\t\t\t1):\n\t\t\t\t\t51\u2013\n\t\t\t\t\t76.\n\t\t\t\t\thttps:\/\/doi.org\/10.2308\/isys-10253","DOI":"10.2308\/isys-10253"},{"key":"2024082915271362600_i1558-7959-35-2-37-Arnold4","doi-asserted-by":"crossref","unstructured":"Arnold,\n              V.,\n            \n            \n              Benford\n              T.,\n            \n            \n              Hampton\n              C.,\n             and\n\t\t\t\t\t\tSuttonS.\n          2014.\n\t\t\t\t\tEnterprise risk management: Re-conceptualizing the role of risk and trust on information sharing in transnational alliances.\n\t\t\t\t\tJournal of Information Systems28 (\n\t\t\t\t\t2):\n\t\t\t\t\t257\u2013\n\t\t\t\t\t285.\n\t\t\t\t\thttps:\/\/doi.org\/10.2308\/isys-50812","DOI":"10.2308\/isys-50812"},{"key":"2024082915271362600_i1558-7959-35-2-37-Arnold5","unstructured":"Arnold,\n              V.,\n            \n            \n              Hampton\n              C.,\n            \n            \n              Khazanchi\n              D.,\n             and\n\t\t\t\t\t\tSuttonS.\n          2004.\n\t\t\t\t\tEnterprise Risk Management: Identifying Risks in B2B E-Commerce Relationships.\n\t\t\t\t\tAltamonte Springs, FL:\n\t\t\t\t\tInstitute of Internal Auditors Research Foundation."},{"key":"2024082915271362600_i1558-7959-35-2-37-Bedard1","doi-asserted-by":"crossref","unstructured":"Bedard,\n              J.,\n            \n            \n              Jackson\n              C.,\n             and\n\t\t\t\t\t\tGrahamL.\n          2005.\n\t\t\t\t\tIssues and risks in performing SysTrust engagements: Implications for research and practice.\n\t\t\t\t\tInternational Journal of Accounting Information Systems6 (\n\t\t\t\t\t1):\n\t\t\t\t\t55\u2013\n\t\t\t\t\t79.\n\t\t\t\t\thttps:\/\/doi.org\/10.1016\/j.accinf.2004.10.001","DOI":"10.1016\/j.accinf.2004.10.001"},{"key":"2024082915271362600_i1558-7959-35-2-37-Bergh1","doi-asserted-by":"crossref","unstructured":"Bergh,\n              D. D.,\n            \n            \n              Connelly\n              B. L.,\n            \n            \n              Ketchen,\n              D. J.\n              Jr.,\n             and\n\t\t\t\t\t\tShannonL. M.\n          2014.\n\t\t\t\t\tSignalling theory and equilibrium in strategic management research: An assessment and a research agenda.\n\t\t\t\t\tJournal of Management Studies51 (\n\t\t\t\t\t8):\n\t\t\t\t\t1334\u2013\n\t\t\t\t\t1360.\n\t\t\t\t\thttps:\/\/doi.org\/10.1111\/joms.12097","DOI":"10.1111\/joms.12097"},{"key":"2024082915271362600_i1558-7959-35-2-37-Beugre1","doi-asserted-by":"crossref","unstructured":"Beugr\u00e9,\n              C.,\n             and\n\t\t\t\t\t\tAcarW.\n          2008.\n\t\t\t\t\tOffshoring and cross-border interorganizational relationships: A justice model.\n\t\t\t\t\tDecision Sciences39 (\n\t\t\t\t\t3):\n\t\t\t\t\t445\u2013\n\t\t\t\t\t468.\n\t\t\t\t\thttps:\/\/doi.org\/10.1111\/j.1540-5915.2008.00199.x","DOI":"10.1111\/j.1540-5915.2008.00199.x"},{"key":"2024082915271362600_i1558-7959-35-2-37-Bharadwaj1","doi-asserted-by":"crossref","unstructured":"Bharadwaj,\n              S.,\n            \n            \n              Varadarajan\n              P.,\n             and\n\t\t\t\t\t\tFahyJ.\n          1993.\n\t\t\t\t\tSustainable competitive advantage in service industries: A conceptual model and research propositions.\n\t\t\t\t\tJournal of Marketing57 (\n\t\t\t\t\t4):\n\t\t\t\t\t83\u2013\n\t\t\t\t\t99.\n\t\t\t\t\thttps:\/\/doi.org\/10.1177\/002224299305700407","DOI":"10.1177\/002224299305700407"},{"key":"2024082915271362600_i1558-7959-35-2-37-Bissell1","unstructured":"Bissell,\n              K.,\n            \n            \n              Lasalle\n              R.,\n             and\n\t\t\t\t\t\tCinP.\n          2019.\n\t\t\t\t\tNinth annual cost of cybercrime study: Unlocking the value of improved cybersecurity protection.\n\t\t\t\t\tAvailable at: https:\/\/www.accenture.com\/_acnmedia\/PDF-96\/Accenture-2019-Cost-of-Cybercrime-Study-Final.pdf"},{"key":"2024082915271362600_i1558-7959-35-2-37-Bitsight1","unstructured":"Bitsight.\n          2019.\n\t\t\t\t\tThird party cyber risk for financial services: Blind spots, emerging issues and best practices.\n\t\t\t\t\tBoston, MA:\n\t\t\t\t\tBitsight\/Center for Financial Professionals."},{"key":"2024082915271362600_i1558-7959-35-2-37-Bollen1","doi-asserted-by":"crossref","unstructured":"Bollen,\n              K.,\n             and\n\t\t\t\t\t\tLennoxR.\n          1991.\n\t\t\t\t\tConventional wisdom on measurement: A structural equation perspective.\n\t\t\t\t\tPsychological Bulletin110 (\n\t\t\t\t\t2):\n\t\t\t\t\t305\u2013\n\t\t\t\t\t314.\n\t\t\t\t\thttps:\/\/doi.org\/10.1037\/0033-2909.110.2.305","DOI":"10.1037\/\/0033-2909.110.2.305"},{"key":"2024082915271362600_i1558-7959-35-2-37-Boulianne1","doi-asserted-by":"crossref","unstructured":"Boulianne,\n              E.,\n             and\n\t\t\t\t\t\tChoC.\n          2009.\n\t\t\t\t\tThe rise and fall of WebTrust.\n\t\t\t\t\tInternational Journal of Accounting Information Systems10 (\n\t\t\t\t\t4):\n\t\t\t\t\t229\u2013\n\t\t\t\t\t244.\n\t\t\t\t\thttps:\/\/doi.org\/10.1016\/j.accinf.2009.10.002","DOI":"10.1016\/j.accinf.2009.10.002"},{"key":"2024082915271362600_i1558-7959-35-2-37-Boyle1","doi-asserted-by":"crossref","unstructured":"Boyle,\n              B.,\n            \n            \n              Dwyer\n              R.,\n            \n            \n              Robicheaux\n              R.,\n             and\n\t\t\t\t\t\tSimpsonJ.\n          1992.\n\t\t\t\t\tInfluence strategies in marketing channels: Measures and use in different relationship structures.\n\t\t\t\t\tJournal of Marketing Research29 (\n\t\t\t\t\t4):\n\t\t\t\t\t462\u2013\n\t\t\t\t\t473.\n\t\t\t\t\thttps:\/\/doi.org\/10.1177\/002224379202900407","DOI":"10.1177\/002224379202900407"},{"key":"2024082915271362600_i1558-7959-35-2-37-BurtonJones1","doi-asserted-by":"crossref","unstructured":"Burton-Jones,\n              A.\n            \n          \n          2009.\n\t\t\t\t\tMinimizing method bias through programmatic research.\n\t\t\t\t\tManagement Information Systems Quarterly33 (\n\t\t\t\t\t3):\n\t\t\t\t\t445\u2013\n\t\t\t\t\t471.\n\t\t\t\t\thttps:\/\/doi.org\/10.2307\/20650304","DOI":"10.2307\/20650304"},{"key":"2024082915271362600_i1558-7959-35-2-37-Caker1","doi-asserted-by":"crossref","unstructured":"C\u00e4ker,\n              M.\n            \n          \n          2008.\n\t\t\t\t\tIntertwined coordination mechanisms in interorganizational relationships with dominated suppliers.\n\t\t\t\t\tManagement Accounting Research19 (\n\t\t\t\t\t3):\n\t\t\t\t\t231\u2013\n\t\t\t\t\t251.\n\t\t\t\t\thttps:\/\/doi.org\/10.1016\/j.mar.2008.06.003","DOI":"10.1016\/j.mar.2008.06.003"},{"key":"2024082915271362600_i1558-7959-35-2-37-Chen1","doi-asserted-by":"crossref","unstructured":"Chen,\n              I.,\n            \n            \n              Paulraj\n              A.,\n             and\n\t\t\t\t\t\tLadoA.\n          2004.\n\t\t\t\t\tStrategic purchasing, supply management, and firm performance.\n\t\t\t\t\tJournal of Operations Management22 (\n\t\t\t\t\t5):\n\t\t\t\t\t505\u2013\n\t\t\t\t\t523.\n\t\t\t\t\thttps:\/\/doi.org\/10.1016\/j.jom.2004.06.002","DOI":"10.1016\/j.jom.2004.06.002"},{"key":"2024082915271362600_i1558-7959-35-2-37-Chin1","unstructured":"Chin,\n              W.\n            \n          \n          1998.\n\t\t\t\t\tThe partial least squares approach to structural equation modeling. In Modern Methods for Business Research, edited by G. Marcoulides, 295\u2013336. Hilldale, NJ: Lawrence Erlbaum Associates."},{"key":"2024082915271362600_i1558-7959-35-2-37-Chua1","doi-asserted-by":"crossref","unstructured":"Chua,\n              W.,\n             and\n\t\t\t\t\t\tMahamaH.\n          2007.\n\t\t\t\t\tThe effect of network ties on accounting controls in a supply alliance: Field study evidence.\n\t\t\t\t\tContemporary Accounting Research24 (\n\t\t\t\t\t1):\n\t\t\t\t\t47\u2013\n\t\t\t\t\t92.\n\t\t\t\t\thttps:\/\/doi.org\/10.1506\/7156-201W-1290-83H4","DOI":"10.1506\/7156-201W-1290-83H4"},{"key":"2024082915271362600_i1558-7959-35-2-37-Coletti1","doi-asserted-by":"crossref","unstructured":"Coletti,\n              A.,\n            \n            \n              Sedatole\n              K.,\n             and\n\t\t\t\t\t\tTowryK.\n          2005.\n\t\t\t\t\tThe effect of control systems on trust and cooperation in collaborative environments.\n\t\t\t\t\tThe Accounting Review80 (\n\t\t\t\t\t2):\n\t\t\t\t\t477\u2013\n\t\t\t\t\t500.\n\t\t\t\t\thttps:\/\/doi.org\/10.2308\/accr.2005.80.2.477","DOI":"10.2308\/accr.2005.80.2.477"},{"key":"2024082915271362600_i1558-7959-35-2-37-Colicchia1","doi-asserted-by":"crossref","unstructured":"Colicchia,\n              C.,\n            \n            \n              Creazza\n              A.,\n             and\n\t\t\t\t\t\tMenachofD.\n          2019.\n\t\t\t\t\tManaging cyber and information risks in supply chains: Insights from an exploratory analysis.\n\t\t\t\t\tSupply Chain Management24 (\n\t\t\t\t\t2):\n\t\t\t\t\t215\u2013\n\t\t\t\t\t240.\n\t\t\t\t\thttps:\/\/doi.org\/10.1108\/SCM-09-2017-0289","DOI":"10.1108\/SCM-09-2017-0289"},{"key":"2024082915271362600_i1558-7959-35-2-37-Dekker1","doi-asserted-by":"crossref","unstructured":"Dekker,\n              H.\n            \n          \n          2003.\n\t\t\t\t\tValue chain analysis in interfirm relationships: A field study.\n\t\t\t\t\tManagement Accounting Research14 (\n\t\t\t\t\t1):\n\t\t\t\t\t1\u2013\n\t\t\t\t\t23.\n\t\t\t\t\thttps:\/\/doi.org\/10.1016\/S1044-5005(02)00067-7","DOI":"10.1016\/S1044-5005(02)00067-7"},{"key":"2024082915271362600_i1558-7959-35-2-37-Diamantopoulos1","doi-asserted-by":"crossref","unstructured":"Diamantopoulos,\n              A.,\n             and\n\t\t\t\t\t\tWinklhoferH.\n          2001.\n\t\t\t\t\tIndex construction with formative indicators: An alternative to scale development.\n\t\t\t\t\tJournal of Marketing Research38 (\n\t\t\t\t\t2):\n\t\t\t\t\t269\u2013\n\t\t\t\t\t277.\n\t\t\t\t\thttps:\/\/doi.org\/10.1509\/jmkr.38.2.269.18845","DOI":"10.1509\/jmkr.38.2.269.18845"},{"key":"2024082915271362600_i1558-7959-35-2-37-Diamantopoulos2","doi-asserted-by":"crossref","unstructured":"Diamantopoulos,\n              A.,\n            \n            \n              Riefler\n              P.,\n             and\n\t\t\t\t\t\tRothK.\n          2008.\n\t\t\t\t\tAdvancing formative measurement models.\n\t\t\t\t\tJournal of Business Research61 (\n\t\t\t\t\t12):\n\t\t\t\t\t1203\u2013\n\t\t\t\t\t1218.\n\t\t\t\t\thttps:\/\/doi.org\/10.1016\/j.jbusres.2008.01.009","DOI":"10.1016\/j.jbusres.2008.01.009"},{"key":"2024082915271362600_i1558-7959-35-2-37-Duncan1","doi-asserted-by":"crossref","unstructured":"Duncan,\n              R.\n            \n          \n          2019.\n\t\t\t\t\tHow to secure your supply chain.\n\t\t\t\t\tNetwork Security2019 (\n\t\t\t\t\t3):\n\t\t\t\t\t18\u2013\n\t\t\t\t\t19.\n\t\t\t\t\thttps:\/\/doi.org\/10.1016\/S1353-4858(19)30038-8","DOI":"10.1016\/S1353-4858(19)30038-8"},{"key":"2024082915271362600_i1558-7959-35-2-37-Eaton1","doi-asserted-by":"crossref","unstructured":"Eaton,\n              T.,\n            \n            \n              Grenier\n              J.,\n             and\n\t\t\t\t\t\tLaymanD.\n          2019.\n\t\t\t\t\tAccounting and cybersecurity risk management.\n\t\t\t\t\tCurrent Issues in Auditing13 (\n\t\t\t\t\t2):\n\t\t\t\t\tC1\u2013\n\t\t\t\t\tC9.\n\t\t\t\t\thttps:\/\/doi.org\/10.2308\/ciia-52419","DOI":"10.2308\/ciia-52419"},{"key":"2024082915271362600_i1558-7959-35-2-37-Emerson1","doi-asserted-by":"crossref","unstructured":"Emerson,\n              R. M.\n            \n          \n          1962.\n\t\t\t\t\tPower-dependence relations.\n\t\t\t\t\tAmerican Sociological Review27 (\n\t\t\t\t\t1):\n\t\t\t\t\t31\u2013\n\t\t\t\t\t41.\n\t\t\t\t\thttps:\/\/doi.org\/10.2307\/2089716","DOI":"10.2307\/2089716"},{"key":"2024082915271362600_i1558-7959-35-2-37-Emsley1","doi-asserted-by":"crossref","unstructured":"Emsley,\n              D.,\n             and\n\t\t\t\t\t\tKidonF.\n          2007.\n\t\t\t\t\tThe relationship between trust and control in international joint ventures: Evidence from the airline industry.\n\t\t\t\t\tContemporary Accounting Research24 (\n\t\t\t\t\t3):\n\t\t\t\t\t829\u2013\n\t\t\t\t\t858.\n\t\t\t\t\thttps:\/\/doi.org\/10.1506\/car.24.3.7","DOI":"10.1506\/car.24.3.7"},{"key":"2024082915271362600_i1558-7959-35-2-37-Fan1","doi-asserted-by":"crossref","unstructured":"Fan,\n              Y.,\n             and\n\t\t\t\t\t\tStevensonM.\n          2018.\n\t\t\t\t\tReading on and between the lines: Risk identification in collaborative and adversarial buyer-supplier relationships.\n\t\t\t\t\tSupply Chain Management23 (\n\t\t\t\t\t4):\n\t\t\t\t\t351\u2013\n\t\t\t\t\t376.\n\t\t\t\t\thttps:\/\/doi.org\/10.1108\/SCM-04-2017-0144","DOI":"10.1108\/SCM-04-2017-0144"},{"key":"2024082915271362600_i1558-7959-35-2-37-Ferrell1","unstructured":"Ferrell,\n              O. C.\n            \n          \n          2011.\n\t\t\t\t\tResource-Advantage Theory: The Development Period. Legends in Marketing: Shelby D. Hunt.\n\t\t\t\t\tWashington, DC:\n\t\t\t\t\tSage Publishing."},{"key":"2024082915271362600_i1558-7959-35-2-37-Fornell1","doi-asserted-by":"crossref","unstructured":"Fornell,\n              C.,\n             and\n\t\t\t\t\t\tLarckerD.\n          1981.\n\t\t\t\t\tEvaluating structural equation models with unobservable variables and measurement error.\n\t\t\t\t\tJournal of Marketing Research18 (\n\t\t\t\t\t1):\n\t\t\t\t\t39\u2013\n\t\t\t\t\t50.\n\t\t\t\t\thttps:\/\/doi.org\/10.1177\/002224378101800104","DOI":"10.1177\/002224378101800104"},{"key":"2024082915271362600_i1558-7959-35-2-37-Frank1","doi-asserted-by":"crossref","unstructured":"Frank,\n              M.,\n            \n            \n              Grenier\n              J.,\n             and\n\t\t\t\t\t\tPyzohaJ.\n          2019.\n\t\t\t\t\tHow disclosing a prior cyberattack influences the efficacy of cybersecurity risk management reporting and independent assurance.\n\t\t\t\t\tJournal of Information Systems33 (\n\t\t\t\t\t3):\n\t\t\t\t\t183\u2013\n\t\t\t\t\t200.\n\t\t\t\t\thttps:\/\/doi.org\/10.2308\/isys-52374","DOI":"10.2308\/isys-52374"},{"key":"2024082915271362600_i1558-7959-35-2-37-Free1","doi-asserted-by":"crossref","unstructured":"Free,\n              C.\n            \n          \n          2008.\n\t\t\t\t\tWalking the talk? Supply chain accounting and trust among UK supermarkets and suppliers.\n\t\t\t\t\tAccounting, Organizations and Society33 (\n\t\t\t\t\t6):\n\t\t\t\t\t629\u2013\n\t\t\t\t\t662.\n\t\t\t\t\thttps:\/\/doi.org\/10.1016\/j.aos.2007.09.001","DOI":"10.1016\/j.aos.2007.09.001"},{"key":"2024082915271362600_i1558-7959-35-2-37-Ganesan1","doi-asserted-by":"crossref","unstructured":"Ganesan,\n              S.\n            \n          \n          1994.\n\t\t\t\t\tDeterminants of long-term orientations in buyer-seller relationships.\n\t\t\t\t\tJournal of Marketing58 (\n\t\t\t\t\t2):\n\t\t\t\t\t1\u2013\n\t\t\t\t\t19.\n\t\t\t\t\thttps:\/\/doi.org\/10.1177\/002224299405800201","DOI":"10.1177\/002224299405800201"},{"key":"2024082915271362600_i1558-7959-35-2-37-Gendron1","doi-asserted-by":"crossref","unstructured":"Gendron,\n              Y.,\n             and\n\t\t\t\t\t\tBarrettM.\n          2004.\n\t\t\t\t\tProfessionalization in action: Accountants' attempt at building a network of support for the WebTrust seal of assurance.\n\t\t\t\t\tContemporary Accounting Research21 (\n\t\t\t\t\t3):\n\t\t\t\t\t563\u2013\n\t\t\t\t\t602.\n\t\t\t\t\thttps:\/\/doi.org\/10.1506\/H1C0-EU27-UU2K-8EC8","DOI":"10.1506\/H1C0-EU27-UU2K-8EC8"},{"key":"2024082915271362600_i1558-7959-35-2-37-Gordon1","doi-asserted-by":"crossref","unstructured":"Gordon,\n              L.,\n            \n            \n              Loeb\n              M.,\n            \n            \n              Lucyshyn\n              W.,\n             and\n\t\t\t\t\t\tZhouL.\n          2015.\n\t\t\t\t\tThe impact of information sharing on cybersecurity underinvestment: A real options perspective.\n\t\t\t\t\tJournal of Accounting and Public Policy34 (\n\t\t\t\t\t5):\n\t\t\t\t\t509\u2013\n\t\t\t\t\t519.\n\t\t\t\t\thttps:\/\/doi.org\/10.1016\/j.jaccpubpol.2015.05.001","DOI":"10.1016\/j.jaccpubpol.2015.05.001"},{"key":"2024082915271362600_i1558-7959-35-2-37-Hair1","unstructured":"Hair,\n              J.,\n            \n            \n              Black\n              W.,\n            \n            \n              Babin\n              B.,\n            \n            \n              Anderson\n              R.,\n             and\n\t\t\t\t\t\tTathamR.\n          2010.\n\t\t\t\t\tMultivariate Data Analysis.\n\t\t\t\t\tUpper Saddle River, NJ:\n\t\t\t\t\tPearson Prentice Hall."},{"key":"2024082915271362600_i1558-7959-35-2-37-Hart1","doi-asserted-by":"crossref","unstructured":"Hart,\n              P.,\n             and\n\t\t\t\t\t\tSaundersC.\n          1997.\n\t\t\t\t\tPower and trust: Critical factors in the adoption and use of electronic data interchange.\n\t\t\t\t\tOrganization Science8 (\n\t\t\t\t\t1):\n\t\t\t\t\t23\u2013\n\t\t\t\t\t42.\n\t\t\t\t\thttps:\/\/doi.org\/10.1287\/orsc.8.1.23","DOI":"10.1287\/orsc.8.1.23"},{"key":"2024082915271362600_i1558-7959-35-2-37-Hart2","doi-asserted-by":"crossref","unstructured":"Hart,\n              P.,\n             and\n\t\t\t\t\t\tSaundersC.\n          1998.\n\t\t\t\t\tEmerging electronic partnerships: Antecedents and dimensions of EDI use from the supplier's perspective.\n\t\t\t\t\tJournal of Management Information Systems14 (\n\t\t\t\t\t4):\n\t\t\t\t\t87\u2013\n\t\t\t\t\t111.\n\t\t\t\t\thttps:\/\/doi.org\/10.1080\/07421222.1998.11518187","DOI":"10.1080\/07421222.1998.11518187"},{"key":"2024082915271362600_i1558-7959-35-2-37-Hunt1","doi-asserted-by":"crossref","unstructured":"Hunt,\n              S.\n            \n          \n          1995.\n\t\t\t\t\tResource-advantage theory of competition: Toward explaining productivity and economic growth.\n\t\t\t\t\tJournal of Management Inquiry4 (\n\t\t\t\t\t4):\n\t\t\t\t\t317\u2013\n\t\t\t\t\t332.\n\t\t\t\t\thttps:\/\/doi.org\/10.1177\/105649269500400403","DOI":"10.1177\/105649269500400403"},{"key":"2024082915271362600_i1558-7959-35-2-37-Hunt2","doi-asserted-by":"crossref","unstructured":"Hunt,\n              S.\n            \n          \n          1997\n          a.\n          Competing through relationships: Grounding relationship marketing in resource-advantage theory.\n\t\t\t\t\tJournal of Marketing Management13 (\n\t\t\t\t\t5):\n\t\t\t\t\t431\u2013\n\t\t\t\t\t445.\n\t\t\t\t\thttps:\/\/doi.org\/10.1080\/0267257X.1997.9964484","DOI":"10.1080\/0267257X.1997.9964484"},{"key":"2024082915271362600_i1558-7959-35-2-37-Hunt3","doi-asserted-by":"crossref","unstructured":"Hunt,\n              S.\n            \n          \n          1997\n          b.\n          Resource-advantage theory: An evolutionary theory of competitive behavior?\n          \n            Journal of Economic Issues\n          \n          31 (\n\t\t\t\t\t1):\n\t\t\t\t\t59\u2013\n\t\t\t\t\t78.\n\t\t\t\t\thttps:\/\/doi.org\/10.1080\/00213624.1997.11505891","DOI":"10.1080\/00213624.1997.11505891"},{"key":"2024082915271362600_i1558-7959-35-2-37-Hunt4","doi-asserted-by":"crossref","unstructured":"Hunt,\n              S.\n            \n          \n          1997\n          c.\n          Resource-advantage theory and the wealth of nations: Developing the socio-economic research tradition.\n\t\t\t\t\tJournal of Socio-Economics26 (\n\t\t\t\t\t4):\n\t\t\t\t\t335\u2013\n\t\t\t\t\t357.\n\t\t\t\t\thttps:\/\/doi.org\/10.1016\/S1053-5357(97)90001-9","DOI":"10.1016\/S1053-5357(97)90001-9"},{"key":"2024082915271362600_i1558-7959-35-2-37-Hunt5","doi-asserted-by":"crossref","unstructured":"Hunt,\n              S.\n            \n          \n          1999.\n\t\t\t\t\tThe strategic imperative and sustainable competitive advantage: Public policy implications of resource-advantage theory.\n\t\t\t\t\tAcademy of Marketing Science Journal27 (\n\t\t\t\t\t2):\n\t\t\t\t\t144\u2013\n\t\t\t\t\t159.\n\t\t\t\t\thttps:\/\/doi.org\/10.1177\/0092070399272003","DOI":"10.1177\/0092070399272003"},{"key":"2024082915271362600_i1558-7959-35-2-37-Hunt6","doi-asserted-by":"crossref","unstructured":"Hunt,\n              S.\n            \n          \n          2000.\n\t\t\t\t\tA General Theory of Competition: Resources, Competences, Productivity, Economic Growth.\n\t\t\t\t\tThousand Oaks, CA:\n\t\t\t\t\tSage Publications.","DOI":"10.4135\/9781452220321"},{"key":"2024082915271362600_i1558-7959-35-2-37-Hunt7","doi-asserted-by":"crossref","unstructured":"Hunt,\n              S.,\n             and\n\t\t\t\t\t\tDavisD.\n          2008.\n\t\t\t\t\tGrounding supply chain management in resource-advantage theory.\n\t\t\t\t\tThe Journal of Supply Chain Management44 (\n\t\t\t\t\t1):\n\t\t\t\t\t10\u2013\n\t\t\t\t\t21.\n\t\t\t\t\thttps:\/\/doi.org\/10.1111\/j.1745-493X.2008.00042.x","DOI":"10.1111\/j.1745-493X.2008.00042.x"},{"key":"2024082915271362600_i1558-7959-35-2-37-Hunt8","unstructured":"Hunt,\n              S.,\n             and\n\t\t\t\t\t\tMorganR.\n          1994.\n\t\t\t\t\tRelationship marketing in the era of network competition.\n\t\t\t\t\tMarketing Management3 (\n\t\t\t\t\t1):\n\t\t\t\t\t19\u2013\n\t\t\t\t\t28."},{"key":"2024082915271362600_i1558-7959-35-2-37-Hunt9","doi-asserted-by":"crossref","unstructured":"Hunt,\n              S.,\n             and\n\t\t\t\t\t\tMorganR.\n          1995.\n\t\t\t\t\tThe comparative advantage theory of competition.\n\t\t\t\t\tJournal of Marketing59 (\n\t\t\t\t\t2):\n\t\t\t\t\t1\u2013\n\t\t\t\t\t15.\n\t\t\t\t\thttps:\/\/doi.org\/10.1177\/002224299505900201","DOI":"10.1177\/002224299505900201"},{"key":"2024082915271362600_i1558-7959-35-2-37-Jamal1","doi-asserted-by":"crossref","unstructured":"Jamal,\n              K.,\n            \n            \n              Maier\n              M.,\n             and\n\t\t\t\t\t\tSunderS.\n          2003.\n\t\t\t\t\tPrivacy in e-commerce development of reporting standards, disclosure, and assurance services in unregulated markets.\n\t\t\t\t\tJournal of Accounting Research41 (\n\t\t\t\t\t2):\n\t\t\t\t\t285\u2013\n\t\t\t\t\t309.\n\t\t\t\t\thttps:\/\/doi.org\/10.1111\/1475-679X.00104","DOI":"10.1111\/1475-679X.00104"},{"key":"2024082915271362600_i1558-7959-35-2-37-Janvrin1","doi-asserted-by":"crossref","unstructured":"Janvrin,\n              D.,\n             and\n\t\t\t\t\t\tWangT.\n          2019.\n\t\t\t\t\tEditorial: Implications of cybersecurity on accounting information.\n\t\t\t\t\tJournal of Information Systems33 (\n\t\t\t\t\t3):\n\t\t\t\t\tA1\u2013\n\t\t\t\t\tA2.\n\t\t\t\t\thttps:\/\/doi.org\/10.2308\/isys-10715","DOI":"10.2308\/isys-10715"},{"key":"2024082915271362600_i1558-7959-35-2-37-Jarvis1","doi-asserted-by":"crossref","unstructured":"Jarvis,\n              C.,\n            \n            \n              MacKenzie\n              S.,\n             and\n\t\t\t\t\t\tPodsakoffP.\n          2003.\n\t\t\t\t\tA critical review of construct indicators and measurement model misspecification in marketing and consumer research.\n\t\t\t\t\tThe Journal of Consumer Research30 (\n\t\t\t\t\t2):\n\t\t\t\t\t199\u2013\n\t\t\t\t\t218.\n\t\t\t\t\thttps:\/\/doi.org\/10.1086\/376806","DOI":"10.1086\/376806"},{"key":"2024082915271362600_i1558-7959-35-2-37-Johnson1","unstructured":"Johnson,\n              C.\n            \n          \n          2016.\n\t\t\t\t\tYou Outsource the Service but not the Risk: Supply Chain Risk Management for the Cyber Security of Safety Critical Systems.\n\t\t\t\t\tProceedings of the 34th International System Safety Conference, Orlando, FL, August 8\u201312."},{"key":"2024082915271362600_i1558-7959-35-2-37-Khazanchi1","doi-asserted-by":"crossref","unstructured":"Khazanchi,\n              D.,\n             and\n\t\t\t\t\t\tSuttonS..\n\t\t\t\t\t2001.\n\t\t\t\t\tAssurance services for business-to-business electronic commerce: A framework and implications.\n\t\t\t\t\tJournal of the Association for Information Systems1 (\n\t\t\t\t\t11):\n\t\t\t\t\t1\u2013\n\t\t\t\t\t54.\n\t\t\t\t\thttps:\/\/doi.org\/10.17705\/1jais.00011","DOI":"10.17705\/1jais.00011"},{"key":"2024082915271362600_i1558-7959-35-2-37-Kline1","unstructured":"Kline,\n              R.\n            \n          \n          2005.\n\t\t\t\t\tPrinciples and Practice of Structural Equation Modeling.\n\t\t\t\t\tNew York, NY:\n\t\t\t\t\tThe Guilford Press."},{"key":"2024082915271362600_i1558-7959-35-2-37-Kumar1","doi-asserted-by":"crossref","unstructured":"Kumar,\n              N.,\n            \n            \n              Scheer\n              L.,\n             and\n\t\t\t\t\t\tSteenkampJ. B. E. M.\n          1998.\n\t\t\t\t\tInterdependence, punitive capability, and the reciprocation of punitive actions in channel relationships.\n\t\t\t\t\tJournal of Marketing Research35 (\n\t\t\t\t\t2):\n\t\t\t\t\t225\u2013\n\t\t\t\t\t235.\n\t\t\t\t\thttps:\/\/doi.org\/10.1177\/002224379803500208","DOI":"10.1177\/002224379803500208"},{"key":"2024082915271362600_i1558-7959-35-2-37-Lavastre1","doi-asserted-by":"crossref","unstructured":"Lavastre,\n              O.,\n            \n            \n              Gunasekaran\n              A.,\n             and\n\t\t\t\t\t\tSpalanzaniA.\n          2012.\n\t\t\t\t\tSupply chain risk management in French companies.\n\t\t\t\t\tDecision Support Systems52 (\n\t\t\t\t\t4):\n\t\t\t\t\t828\u2013\n\t\t\t\t\t838.\n\t\t\t\t\thttps:\/\/doi.org\/10.1016\/j.dss.2011.11.017","DOI":"10.1016\/j.dss.2011.11.017"},{"key":"2024082915271362600_i1558-7959-35-2-37-Lord1","unstructured":"Lord,\n              N.\n            \n          \n          2018.\n\t\t\t\t\tThe history of data breaches.\n\t\t\t\t\tAvailable at: https:\/\/digitalguardian.com\/blog\/history-data-breaches"},{"key":"2024082915271362600_i1558-7959-35-2-37-Luo1","doi-asserted-by":"crossref","unstructured":"Luo,\n              Y.\n            \n          \n          2007.\n\t\t\t\t\tThe independent and interactive roles of procedural, distributive, and interactional justice in strategic alliances.\n\t\t\t\t\tAcademy of Management Journal50 (\n\t\t\t\t\t3):\n\t\t\t\t\t644\u2013\n\t\t\t\t\t664.\n\t\t\t\t\thttps:\/\/doi.org\/10.5465\/amj.2007.25526452","DOI":"10.5465\/amj.2007.25526452"},{"key":"2024082915271362600_i1558-7959-35-2-37-Moorman1","doi-asserted-by":"crossref","unstructured":"Moorman,\n              C.,\n            \n            \n              Zaltman\n              G.,\n             and\n\t\t\t\t\t\tDespandeR.\n          1992.\n\t\t\t\t\tRelationships between providers and users of marketing research: The dynamics of trust within and between organizations.\n\t\t\t\t\tJournal of Marketing Research29 (\n\t\t\t\t\t3):\n\t\t\t\t\t314\u2013\n\t\t\t\t\t328.\n\t\t\t\t\thttps:\/\/doi.org\/10.1177\/002224379202900303","DOI":"10.1177\/002224379202900303"},{"key":"2024082915271362600_i1558-7959-35-2-37-Morgan1","doi-asserted-by":"crossref","unstructured":"Morgan,\n              R.,\n             and\n\t\t\t\t\t\tHuntS.\n          1994.\n\t\t\t\t\tThe commitment-trust theory of relationship marketing.\n\t\t\t\t\tJournal of Marketing58 (\n\t\t\t\t\t3):\n\t\t\t\t\t20\u2013\n\t\t\t\t\t38.\n\t\t\t\t\thttps:\/\/doi.org\/10.1177\/002224299405800302","DOI":"10.1177\/002224299405800302"},{"key":"2024082915271362600_i1558-7959-35-2-37-Morgan2","doi-asserted-by":"crossref","unstructured":"Morgan,\n              R.,\n             and\n\t\t\t\t\t\tHuntS.\n          1999.\n\t\t\t\t\tRelationship-based competitive advantage: The role of relationship marketing in marketing strategy.\n\t\t\t\t\tJournal of Business Research46 (\n\t\t\t\t\t3):\n\t\t\t\t\t281\u2013\n\t\t\t\t\t290.\n\t\t\t\t\thttps:\/\/doi.org\/10.1016\/S0148-2963(98)00035-6","DOI":"10.1016\/S0148-2963(98)00035-6"},{"key":"2024082915271362600_i1558-7959-35-2-37-Nicolaou1","doi-asserted-by":"crossref","unstructured":"Nicolaou,\n              A.\n            \n          \n          2008.\n\t\t\t\t\tResearch issues on the use of ERPS in interorganizational relationships.\n\t\t\t\t\tInternational Journal of Accounting Information Systems9 (\n\t\t\t\t\t4):\n\t\t\t\t\t216\u2013\n\t\t\t\t\t226.\n\t\t\t\t\thttps:\/\/doi.org\/10.1016\/j.accinf.2008.09.003","DOI":"10.1016\/j.accinf.2008.09.003"},{"key":"2024082915271362600_i1558-7959-35-2-37-Nicolaou2","doi-asserted-by":"crossref","unstructured":"Nicolaou,\n              A.,\n             and\n\t\t\t\t\t\tMcKnightD.\n          2006.\n\t\t\t\t\tPerceived information quality in data exchanges: Effects on risk, trust, and intentions to use.\n\t\t\t\t\tInformation Systems Research17 (\n\t\t\t\t\t4):\n\t\t\t\t\t332\u2013\n\t\t\t\t\t351.\n\t\t\t\t\thttps:\/\/doi.org\/10.1287\/isre.1060.0103","DOI":"10.1287\/isre.1060.0103"},{"key":"2024082915271362600_i1558-7959-35-2-37-No1","doi-asserted-by":"crossref","unstructured":"No,\n              W.,\n             and\n\t\t\t\t\t\tVasarhelyiM.\n          2017.\n\t\t\t\t\tCybersecurity and continuous assurance.\n\t\t\t\t\tJournal of Emerging Technologies in Accounting14 (\n\t\t\t\t\t1):\n\t\t\t\t\t1\u2013\n\t\t\t\t\t12.\n\t\t\t\t\thttps:\/\/doi.org\/10.2308\/jeta-10539","DOI":"10.2308\/jeta-10539"},{"key":"2024082915271362600_i1558-7959-35-2-37-Nunnaly1","unstructured":"Nunnaly,\n              J.,\n             and\n\t\t\t\t\t\tBernsteinI.\n          1994.\n\t\t\t\t\tPsychometric Theory.\n\t\t\t\t\tNew York, NY:\n\t\t\t\t\tMcGraw-Hill."},{"key":"2024082915271362600_i1558-7959-35-2-37-Olyaei1","unstructured":"Olyaei,\n              S.,\n            \n            \n              Ambrose\n              C.,\n             and\n\t\t\t\t\t\tWheatmanJ.\n          2018.\n\t\t\t\t\tInnovation Insight for Security Rating Services.\n\t\t\t\t\tStamford, CT:\n\t\t\t\t\tGartner."},{"key":"2024082915271362600_i1558-7959-35-2-37-Petter1","doi-asserted-by":"crossref","unstructured":"Petter,\n              S.,\n            \n            \n              Straub\n              D.,\n             and\n\t\t\t\t\t\tRaiA.\n          2007.\n\t\t\t\t\tSpecifying formative constructs in information systems research.\n\t\t\t\t\tManagement Information Systems Quarterly31 (\n\t\t\t\t\t4):\n\t\t\t\t\t623\u2013\n\t\t\t\t\t656.\n\t\t\t\t\thttps:\/\/doi.org\/10.2307\/25148814","DOI":"10.2307\/25148814"},{"key":"2024082915271362600_i1558-7959-35-2-37-Podsakoff1","doi-asserted-by":"crossref","unstructured":"Podsakoff,\n              P.,\n            \n            \n              MacKenzie\n              S.,\n            \n            \n              Lee\n              J.,\n             and\n\t\t\t\t\t\tPodsakoffN.\n          2003.\n\t\t\t\t\tCommon method biases in behavioral research: A critical review of the literature and recommended remedies.\n\t\t\t\t\tThe Journal of Applied Psychology88 (\n\t\t\t\t\t5):\n\t\t\t\t\t879\u2013\n\t\t\t\t\t903.\n\t\t\t\t\thttps:\/\/doi.org\/10.1037\/0021-9010.88.5.879","DOI":"10.1037\/0021-9010.88.5.879"},{"key":"2024082915271362600_i1558-7959-35-2-37-Ringle1","unstructured":"Ringle,\n              C.,\n            \n            \n              Wende\n              S.,\n             and\n\t\t\t\t\t\tWillA.\n          2005. SmartPLS 2.0 (beta).\n          Available at: www.smartpls.de"},{"key":"2024082915271362600_i1558-7959-35-2-37-Seal1","doi-asserted-by":"crossref","unstructured":"Seal,\n              W.,\n            \n            \n              Berry\n              A.,\n             and\n\t\t\t\t\t\tCullenJ.\n          2004.\n\t\t\t\t\tDisembedding the supply chain: Institutional reflexivity and inter-firm accounting.\n\t\t\t\t\tAccounting, Organizations and Society29 (\n\t\t\t\t\t1):\n\t\t\t\t\t73\u2013\n\t\t\t\t\t92.\n\t\t\t\t\thttps:\/\/doi.org\/10.1016\/S0361-3682(02)00055-7","DOI":"10.1016\/S0361-3682(02)00055-7"},{"key":"2024082915271362600_i1558-7959-35-2-37-Son1","doi-asserted-by":"crossref","unstructured":"Son,\n              J.,\n            \n            \n              Narasimhan\n              S.,\n             and\n\t\t\t\t\t\tRigginsF.\n          2005.\n\t\t\t\t\tEffects of relational factors and channel climate on EDI usage in the customer-supplier relationship.\n\t\t\t\t\tJournal of Management Information Systems22 (\n\t\t\t\t\t1):\n\t\t\t\t\t321\u2013\n\t\t\t\t\t353.\n\t\t\t\t\thttps:\/\/doi.org\/10.1080\/07421222.2003.11045839","DOI":"10.1080\/07421222.2003.11045839"},{"key":"2024082915271362600_i1558-7959-35-2-37-Soosay1","doi-asserted-by":"crossref","unstructured":"Soosay,\n              C. A.,\n             and\n\t\t\t\t\t\tHylandP.\n          2015.\n\t\t\t\t\tA decade of supply chain collaboration and directions for future research.\n\t\t\t\t\tSupply Chain Management20 (\n\t\t\t\t\t6):\n\t\t\t\t\t613\u2013\n\t\t\t\t\t630.\n\t\t\t\t\thttps:\/\/doi.org\/10.1108\/SCM-06-2015-0217","DOI":"10.1108\/SCM-06-2015-0217"},{"key":"2024082915271362600_i1558-7959-35-2-37-Spence1","doi-asserted-by":"crossref","unstructured":"Spence,\n              M.\n            \n          \n          1973.\n\t\t\t\t\tJob market signaling.\n\t\t\t\t\tThe Quarterly Journal of Economics87 (\n\t\t\t\t\t3):\n\t\t\t\t\t355\u2013\n\t\t\t\t\t374.\n\t\t\t\t\thttps:\/\/doi.org\/10.2307\/1882010","DOI":"10.2307\/1882010"},{"key":"2024082915271362600_i1558-7959-35-2-37-Sutton1","doi-asserted-by":"crossref","unstructured":"Sutton,\n              S. G.\n            \n          \n          2006.\n\t\t\t\t\tExtended enterprise systems' impact on enterprise risk management.\n\t\t\t\t\tJournal of Enterprise Information Management19 (\n\t\t\t\t\t1):\n\t\t\t\t\t97\u2013\n\t\t\t\t\t114.\n\t\t\t\t\thttps:\/\/doi.org\/10.1108\/17410390610636904","DOI":"10.1108\/17410390610636904"},{"key":"2024082915271362600_i1558-7959-35-2-37-Sutton2","doi-asserted-by":"crossref","unstructured":"Sutton,\n              S.,\n             and\n\t\t\t\t\t\tHamptonC.\n          2003.\n\t\t\t\t\tRisk assessment in an extended enterprise environment: Redefining the audit model.\n\t\t\t\t\tInternational Journal of Accounting Information Systems4 (\n\t\t\t\t\t1):\n\t\t\t\t\t57\u2013\n\t\t\t\t\t73.\n\t\t\t\t\thttps:\/\/doi.org\/10.1016\/S1467-0895(03)00010-1","DOI":"10.1016\/S1467-0895(03)00010-1"},{"key":"2024082915271362600_i1558-7959-35-2-37-Sutton3","doi-asserted-by":"crossref","unstructured":"Sutton,\n              S.,\n            \n            \n              Hampton\n              C.,\n            \n            \n              Khazanchi\n              D.,\n             and\n\t\t\t\t\t\tArnoldV.\n          2008.\n\t\t\t\t\tRisk analysis in extended enterprise environments: Identification of critical risk factors in B2B e-commerce relationships.\n\t\t\t\t\tJournal of the Association for Information Systems9 (\n\t\t\t\t\t4):\n\t\t\t\t\t151\u2013\n\t\t\t\t\t176.\n\t\t\t\t\thttps:\/\/doi.org\/10.17705\/1jais.00155","DOI":"10.17705\/1jais.00155"},{"key":"2024082915271362600_i1558-7959-35-2-37-Sutton4","unstructured":"Sutton,\n              S.,\n            \n            \n              Arnold\n              V.,\n            \n            \n              Benford\n              T.,\n             and\n\t\t\t\t\t\tCanadaJ.\n          2009.\n\t\t\t\t\tWhy Enterprise Risk Management is Vital: Learning from Company Experiences with Sarbanes-Oxley Section 404 Compliance.\n\t\t\t\t\tAltamonte Springs, FL: Institute of Internal Auditors Research Foundation."},{"key":"2024082915271362600_i1558-7959-35-2-37-Vosselman1","doi-asserted-by":"crossref","unstructured":"Vosselman,\n              E.,\n             and\n\t\t\t\t\t\tvan der Meer-KooistraJ.\n          2009.\n\t\t\t\t\tAccounting for control and trust building in interfirm transactional relationships.\n\t\t\t\t\tAccounting, Organizations and Society34 (\n\t\t\t\t\t2):\n\t\t\t\t\t267\u2013\n\t\t\t\t\t283.\n\t\t\t\t\thttps:\/\/doi.org\/10.1016\/j.aos.2008.04.002","DOI":"10.1016\/j.aos.2008.04.002"},{"key":"2024082915271362600_i1558-7959-35-2-37-Yilmaz1","doi-asserted-by":"crossref","unstructured":"Yilmaz,\n              C.,\n            \n            \n              Sezen\n              B.,\n             and\n\t\t\t\t\t\tKabadayE.\n          2004.\n\t\t\t\t\tSupplier fairness as mediating factor in the supplier performance-reseller satisfaction relationship.\n\t\t\t\t\tJournal of Business Research57 (\n\t\t\t\t\t8):\n\t\t\t\t\t854\u2013\n\t\t\t\t\t863.\n\t\t\t\t\thttps:\/\/doi.org\/10.1016\/S0148-2963(02)00485-X","DOI":"10.1016\/S0148-2963(02)00485-X"},{"key":"2024082915271362600_i1558-7959-35-2-37-Zaheer1","doi-asserted-by":"crossref","unstructured":"Zaheer,\n              A.,\n            \n            \n              McEvily\n              B.,\n             and\n\t\t\t\t\t\tPerroneV.\n          1998.\n\t\t\t\t\tDoes trust matter? Exploring the effects of interorganizational and interpersonal trust on performance.\n\t\t\t\t\tOrganization Science9 (\n\t\t\t\t\t2):\n\t\t\t\t\t141\u2013\n\t\t\t\t\t159.\n\t\t\t\t\thttps:\/\/doi.org\/10.1287\/orsc.9.2.141","DOI":"10.1287\/orsc.9.2.141"}],"container-title":["Journal of Information Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/publications.aaahq.org\/jis\/article-pdf\/35\/2\/37\/7597\/i1558-7959-35-2-37.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/publications.aaahq.org\/jis\/article-pdf\/35\/2\/37\/7597\/i1558-7959-35-2-37.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,8,29]],"date-time":"2024-08-29T16:57:34Z","timestamp":1724950654000},"score":1,"resource":{"primary":{"URL":"https:\/\/publications.aaahq.org\/jis\/article\/35\/2\/37\/953\/Cyber-Supply-Chain-Risk-Management-Toward-an"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,10,7]]},"references-count":86,"journal-issue":{"issue":"2","published-online":{"date-parts":[[2020,10,7]]},"published-print":{"date-parts":[[2021,6,1]]}},"URL":"https:\/\/doi.org\/10.2308\/isys-19-050","relation":{},"ISSN":["1558-7959","0888-7985"],"issn-type":[{"value":"1558-7959","type":"electronic"},{"value":"0888-7985","type":"print"}],"subject":[],"published":{"date-parts":[[2020,10,7]]}}}