Eleven years of cyberattacks on Chinese supply chains in an era of cyber warfare, a review and future research agenda
Purpose – The contribution of this study aims to twofold: First, it provides an overview of the current state of research on cyberattacks on Chinese supply chains (SCs). Second, it offers a look at the Chinese Government’s approach to fighting cyberattacks on Chinese SCs and its calls for global gov...
- Autores:
-
Pérez-Moron, James
- Tipo de recurso:
- Fecha de publicación:
- 2021
- Institución:
- Universidad Tecnológica de Bolívar
- Repositorio:
- Repositorio Institucional UTB
- Idioma:
- eng
- OAI Identifier:
- oai:repositorio.utb.edu.co:20.500.12585/10670
- Acceso en línea:
- https://hdl.handle.net/20.500.12585/10670
- Palabra clave:
- China
Supply chain
Supply chain management
Cybersecurity
Cyberattacks
Supply chain risks
TOE framework
LEMB
- Rights
- openAccess
- License
- http://creativecommons.org/licenses/by-nc-nd/4.0/
id |
UTB2_caf1d28e4215d4edb34f56ff280e1a91 |
---|---|
oai_identifier_str |
oai:repositorio.utb.edu.co:20.500.12585/10670 |
network_acronym_str |
UTB2 |
network_name_str |
Repositorio Institucional UTB |
repository_id_str |
|
dc.title.spa.fl_str_mv |
Eleven years of cyberattacks on Chinese supply chains in an era of cyber warfare, a review and future research agenda |
title |
Eleven years of cyberattacks on Chinese supply chains in an era of cyber warfare, a review and future research agenda |
spellingShingle |
Eleven years of cyberattacks on Chinese supply chains in an era of cyber warfare, a review and future research agenda China Supply chain Supply chain management Cybersecurity Cyberattacks Supply chain risks TOE framework LEMB |
title_short |
Eleven years of cyberattacks on Chinese supply chains in an era of cyber warfare, a review and future research agenda |
title_full |
Eleven years of cyberattacks on Chinese supply chains in an era of cyber warfare, a review and future research agenda |
title_fullStr |
Eleven years of cyberattacks on Chinese supply chains in an era of cyber warfare, a review and future research agenda |
title_full_unstemmed |
Eleven years of cyberattacks on Chinese supply chains in an era of cyber warfare, a review and future research agenda |
title_sort |
Eleven years of cyberattacks on Chinese supply chains in an era of cyber warfare, a review and future research agenda |
dc.creator.fl_str_mv |
Pérez-Moron, James |
dc.contributor.author.none.fl_str_mv |
Pérez-Moron, James |
dc.subject.keywords.spa.fl_str_mv |
China Supply chain Supply chain management Cybersecurity Cyberattacks Supply chain risks TOE framework |
topic |
China Supply chain Supply chain management Cybersecurity Cyberattacks Supply chain risks TOE framework LEMB |
dc.subject.armarc.none.fl_str_mv |
LEMB |
description |
Purpose – The contribution of this study aims to twofold: First, it provides an overview of the current state of research on cyberattacks on Chinese supply chains (SCs). Second, it offers a look at the Chinese Government’s approach to fighting cyberattacks on Chinese SCs and its calls for global governance. Design/methodology/approach – A comprehensive literature review was conducted on Clarivate Analytics’ Web of Science, in Social Sciences Citation Index journals, Scopus and Google Scholar, published between 2010–2021. A systematic review of practitioner literature was also conducted. Findings – Chinese SCs have become a matter of national security, especially in the era of cyber warfare. The risks to SC have been outlined. Cybersecurity regulations are increasing as China aims to build a robust environment for cyberspace development. Using the Technology-organizationenvironment (TOE) framework, the results show that the top five factors influencing the adoption process in firms are as follows: relative advantage and technological readiness (Technology context); top management support and firm size (Organization context) and government policy and regulations (Environment context). Research limitations/implications – This review focuses on cyberattacks on Chinese SCs and great care was taken when selecting search terms. However, the author acknowledges that the choice of databases/terms may have excluded a few articles on cyberattacks from this review. Practical implications – This review provides managerial insights for SC practitioners into how cyberattacks have the potential to disrupt the global SC network. Originality/value – Past researchers proposed a taxonomic approach to evaluate progress with SC integration into Industry 4.0; in contrast, this study is one of the first steps toward an enhanced understanding of cyberattacks on Chinese SCs and their contribution to the global SC network using the TOE framework |
publishDate |
2021 |
dc.date.issued.none.fl_str_mv |
2021-08-10 |
dc.date.accessioned.none.fl_str_mv |
2022-04-18T19:06:54Z |
dc.date.available.none.fl_str_mv |
2022-04-18T19:06:54Z |
dc.date.submitted.none.fl_str_mv |
2022-04-07 |
dc.type.driver.spa.fl_str_mv |
info:eu-repo/semantics/article |
dc.type.hasVersion.spa.fl_str_mv |
info:eu-repo/semantics/restrictedAccess |
dc.type.spa.spa.fl_str_mv |
http://purl.org/coar/resource_type/c_2df8fbb1 |
dc.identifier.citation.spa.fl_str_mv |
Perez-Moron, James. (2021). Eleven years of cyberattacks on Chinese supply chains in an era of cyber warfare, a review and future research agenda. Journal of Asia Business Studies. ahead-of-print. 10.1108/JABS-11-2020-0444. |
dc.identifier.uri.none.fl_str_mv |
https://hdl.handle.net/20.500.12585/10670 |
dc.identifier.doi.none.fl_str_mv |
10.1108/JABS-11-2020-0444 |
dc.identifier.instname.spa.fl_str_mv |
Universidad Tecnológica de Bolívar |
dc.identifier.reponame.spa.fl_str_mv |
Repositorio Universidad Tecnológica de Bolívar |
identifier_str_mv |
Perez-Moron, James. (2021). Eleven years of cyberattacks on Chinese supply chains in an era of cyber warfare, a review and future research agenda. Journal of Asia Business Studies. ahead-of-print. 10.1108/JABS-11-2020-0444. 10.1108/JABS-11-2020-0444 Universidad Tecnológica de Bolívar Repositorio Universidad Tecnológica de Bolívar |
url |
https://hdl.handle.net/20.500.12585/10670 |
dc.language.iso.spa.fl_str_mv |
eng |
language |
eng |
dc.rights.coar.fl_str_mv |
http://purl.org/coar/access_right/c_abf2 |
dc.rights.uri.*.fl_str_mv |
http://creativecommons.org/licenses/by-nc-nd/4.0/ |
dc.rights.accessRights.spa.fl_str_mv |
info:eu-repo/semantics/openAccess |
dc.rights.cc.*.fl_str_mv |
Attribution-NonCommercial-NoDerivatives 4.0 Internacional |
rights_invalid_str_mv |
http://creativecommons.org/licenses/by-nc-nd/4.0/ Attribution-NonCommercial-NoDerivatives 4.0 Internacional http://purl.org/coar/access_right/c_abf2 |
eu_rights_str_mv |
openAccess |
dc.format.extent.none.fl_str_mv |
26 Páginas |
dc.format.mimetype.spa.fl_str_mv |
application/pdf |
dc.publisher.place.spa.fl_str_mv |
Cartagena de Indias |
dc.source.spa.fl_str_mv |
Journal of Asia Business Studies - Vol. 16 N° 2 (2022) |
institution |
Universidad Tecnológica de Bolívar |
bitstream.url.fl_str_mv |
https://repositorio.utb.edu.co/bitstream/20.500.12585/10670/1/10-1108_JABS-11-2020-0444.pdf https://repositorio.utb.edu.co/bitstream/20.500.12585/10670/2/license_rdf https://repositorio.utb.edu.co/bitstream/20.500.12585/10670/3/license.txt https://repositorio.utb.edu.co/bitstream/20.500.12585/10670/4/10-1108_JABS-11-2020-0444.pdf.txt https://repositorio.utb.edu.co/bitstream/20.500.12585/10670/5/10-1108_JABS-11-2020-0444.pdf.jpg |
bitstream.checksum.fl_str_mv |
f0659120ccba697474181bce38e74a1f 4460e5956bc1d1639be9ae6146a50347 e20ad307a1c5f3f25af9304a7a7c86b6 b2a76ac34f63eb167ec136aa9bb9b5a1 fdcc297d5dce38ee73f7753afc99aa10 |
bitstream.checksumAlgorithm.fl_str_mv |
MD5 MD5 MD5 MD5 MD5 |
repository.name.fl_str_mv |
Repositorio Institucional UTB |
repository.mail.fl_str_mv |
repositorioutb@utb.edu.co |
_version_ |
1814021646384627712 |
spelling |
Pérez-Moron, Jamesf5a14d42-7540-4c41-a623-f3674644538d2022-04-18T19:06:54Z2022-04-18T19:06:54Z2021-08-102022-04-07Perez-Moron, James. (2021). Eleven years of cyberattacks on Chinese supply chains in an era of cyber warfare, a review and future research agenda. Journal of Asia Business Studies. ahead-of-print. 10.1108/JABS-11-2020-0444.https://hdl.handle.net/20.500.12585/1067010.1108/JABS-11-2020-0444Universidad Tecnológica de BolívarRepositorio Universidad Tecnológica de BolívarPurpose – The contribution of this study aims to twofold: First, it provides an overview of the current state of research on cyberattacks on Chinese supply chains (SCs). Second, it offers a look at the Chinese Government’s approach to fighting cyberattacks on Chinese SCs and its calls for global governance. Design/methodology/approach – A comprehensive literature review was conducted on Clarivate Analytics’ Web of Science, in Social Sciences Citation Index journals, Scopus and Google Scholar, published between 2010–2021. A systematic review of practitioner literature was also conducted. Findings – Chinese SCs have become a matter of national security, especially in the era of cyber warfare. The risks to SC have been outlined. Cybersecurity regulations are increasing as China aims to build a robust environment for cyberspace development. Using the Technology-organizationenvironment (TOE) framework, the results show that the top five factors influencing the adoption process in firms are as follows: relative advantage and technological readiness (Technology context); top management support and firm size (Organization context) and government policy and regulations (Environment context). Research limitations/implications – This review focuses on cyberattacks on Chinese SCs and great care was taken when selecting search terms. However, the author acknowledges that the choice of databases/terms may have excluded a few articles on cyberattacks from this review. Practical implications – This review provides managerial insights for SC practitioners into how cyberattacks have the potential to disrupt the global SC network. Originality/value – Past researchers proposed a taxonomic approach to evaluate progress with SC integration into Industry 4.0; in contrast, this study is one of the first steps toward an enhanced understanding of cyberattacks on Chinese SCs and their contribution to the global SC network using the TOE framework26 Páginasapplication/pdfenghttp://creativecommons.org/licenses/by-nc-nd/4.0/info:eu-repo/semantics/openAccessAttribution-NonCommercial-NoDerivatives 4.0 Internacionalhttp://purl.org/coar/access_right/c_abf2Journal of Asia Business Studies - Vol. 16 N° 2 (2022)Eleven years of cyberattacks on Chinese supply chains in an era of cyber warfare, a review and future research agendainfo:eu-repo/semantics/articleinfo:eu-repo/semantics/restrictedAccesshttp://purl.org/coar/resource_type/c_2df8fbb1ChinaSupply chainSupply chain managementCybersecurityCyberattacksSupply chain risksTOE frameworkLEMBCartagena de IndiasAhmad, A., Maynard, S.B., Desouza, K.C., Kotsias, J., Whitty, M.T., Baskerville, R.L. How can organizations develop situation awareness for incident response: A case study of management practice (Open Access) (2021) Computers and Security, 101, art. no. 102122. Cited 16 times. https://www.journals.elsevier.com/computers-and-security doi: 10.1016/j.cose.2020.102122Al Hadwera, A., Tavana, M., Gillis, D., Rezania, D. (2021) A systematic review of organizational factors impacting cloud-based technology adoption using Technology-organization-environment framework Internet of Things, 100407Alazab, M., Alhyari, S., Awajan, A., Abdallah, A.B. Blockchain technology in supply chain management: an empirical study of the factors affecting user adoption/acceptance (2021) Cluster Computing, 24 (1), pp. 83-101. Cited 14 times. https://link.springer.com/journal/volumesAndIssues/10586 doi: 10.1007/s10586-020-03200-4Alazab, M., Lakshmanna, K., G, T.R., Pham, Q.-V., Reddy Maddikunta, P.K. Multi-objective cluster head selection using fitness averaged rider optimization algorithm for IoT networks in smart cities (2021) Sustainable Energy Technologies and Assessments, 43, art. no. 100973. Cited 31 times. http://www.journals.elsevier.com/sustainable-energy-technologies-and-assessments doi: 10.1016/j.seta.2020.100973Alzubaidi, A. Cybercrime Awareness among Saudi Nationals: Dataset (Open Access) (2021) Data in Brief, 36, art. no. 106965. Cited 2 times. https://www.journals.elsevier.com/data-in-brief doi: 10.1016/j.dib.2021.106965Annarelli, A., Nonino, F., Palombi, G. Understanding the management of cyber resilient systems (2020) Computers and Industrial Engineering, 149, art. no. 106829. Cited 15 times. https://www.journals.elsevier.com/computers-and-industrial-engineering doi: 10.1016/j.cie.2020.106829Ariffin, K.A.Z., Ahmad, F.H. Indicators for maturity and readiness for digital forensic investigation in era of industrial revolution 4.0 (2021) Computers and Security, 105, art. no. 102237. Cited 9 times. https://www.journals.elsevier.com/computers-and-security doi: 10.1016/j.cose.2021.102237Austin, G. (2016) China, and Cybersecurity: Espionage, Strategy, and Politics in the Digital Domain, p. 398. p., Oxford University Press, New York, NY: 2015, The China Journal, 75, 161–163Ayson, R. New Zealand and the great irresponsibles: coping with Russia, China and the US (Open Access) (2020) Australian Journal of International Affairs, 74 (4), pp. 455-478. Cited 3 times. http://www.tandf.co.uk/journals/titles/10357718. doi: 10.1080/10357718.2020.1734773Baker, J. The technology–organization–environment framework (2011) Integrated Series in Information Systems, pp. 231-245Ball, D., Waters, G. Cyber defence and warfare (2013) Security Challenges, 9 (2), pp. 91-98.Bambauer, D.E. Ghost in the network (2014) University of Pennsylvania Law Review, 162 (5), pp. 1011-1091Bandaly, D., Shanker, L., Kahyaoglu, Y., Satir, A. Supply chain risk management-II: A review of operational, financial and integrated approaches (Open Access) (2013) Risk Management, 15 (1), pp. 1-31Bellabona, P., Spigarelli, F. Moving from open door to go global: China goes on the world stage (2007) International Journal of Chinese Culture and Management, 1 (1), p. 93Black, F., Scholes, M. The pricing of options and corporate liabilities (1973) Journal of Political Economy, 81 (3), pp. 637-657.Blackwood-Brown, C., Levy, Y., D’Arcy, J. Cybersecurity Awareness and Skills of Senior Citizens: A Motivation Perspective (2021) Journal of Computer Information Systems, 61 (3), pp. 195-206.Bousfield, D. Revisiting Cyber-Diplomacy: Canada–China Relations Online (2017) Globalizations, 14 (6), pp. 1045-1059. http://www.tandfonline.com/toc/rglo20/current doi: 10.1080/14747731.2017.1362176Boyson, S. Cyber supply chain risk management: Revolutionizing the strategic control of critical IT systems (2014) Technovation, 34 (7), pp. 342-353.Brookson, C., Cadzow, S., Eckmaier, R., Eschweiler, J., Gerber, B., Guarino, A., Rannenberg, K., (...), Górniak, S. (2016) Definition of cybersecurity - gaps and overlaps in standardization.Buil-Gil, D., Miró-Llinares, F., Moneva, A., Kemp, S., Díaz-Castaño, N. Cybercrime and shifts in opportunities during COVID-19: a preliminary analysis in the UK (Open Access) (2021) European Societies, 23 (S1), pp. S47-S59.Cai, M. (2013) Making joint efforts to maintain cyber security (keynote at the 4th world cyberspace cooperation summit).Cascavilla, G., Tamburri, D.A., Van Den Heuvel, W.-J. Cybercrime threat intelligence: A systematic multi-vocal literature review (Open Access) (2021) Computers and Security, 105, art. no. 102258.Chana, F.T.S., Chong, A.Y.-L. Determinants of mobile supply chain management system diffusion: A structural equation analysis of manufacturing firms (2013) International Journal of Production Research, 51 (4), pp. 1196-1213Chandra, A., Snowe, M.J. A taxonomy of cybercrime: Theory and design (2020) International Journal of Accounting Information Systems, 38, art. no. 100467Chau, P.Y.K., Tam, K.Y. Factors affecting the adoption of open systems: An exploratory study (1997) MIS Quarterly: Management Information Systems, 21 (1), pp. 1-20(2019) Cyberattack trends: 2019- mid year report.Cheung, K.-F., Bell, M.G.H., Bhattacharjya, J. Cybersecurity in logistics and supply chain management: An overview and future research directions (2021) Transportation Research Part E: Logistics and Transportation Review, 146, art. no. 102217.Childerhouse, P., Hermiz, R., Mason-Jones, R., Popp, A., Towill, D.R. Information flow in automotive supply chains - Present industrial practice (2003) Industrial Management and Data Systems, 103 (3-4), pp. 137-149.(2017) (2020 www.cnnic.cn/hlwfzyj/hlwxzbg/hlwtjbg/202004/P020200428399188064169.pdfCho, Y., Chung, J. Bring the State Back In: Conflict and Cooperation Among States in Cybersecurity (2017) Pacific Focus, 32 (2), pp. 290-314.Choo, K.-K.R., Gai, K., Chiaraviglio, L., Yang, Q. A multidisciplinary approach to Internet of Things (IoT) cybersecurity and risk management (2021) Computers and Security, 102, art. no. 102136.hopra, S., Reinhardt, G., Mohan, U. The importance of decoupling recurrent and disruption risks in a supply chain (Open Access) (2007) Naval Research Logistics, 54 (5), pp. 544-555.Christopher, M., Lee, H. Mitigating supply chain risk through improved confidence (2004) International Journal of Physical Distribution and Logistics Management, 34 (5), pp. 388-396.Christopher, M., Towill, D. An integrated model for the design of agile supply chains (2001) International Journal of Physical Distribution & Logistics Management, 31 (4), pp. 235-246.(2020) Cisco cybersecurity report series 2020 www.newhorizons.com/Portals/278/Downloads/Final_Cisco_2020_ACR_WEB.pdfColajanni, G., Daniele, P., Giuffrè, S., Nagurney, A. Cybersecurity investments with nonlinear budget constraints and conservation laws: variational equilibrium, marginal expected utilities, and Lagrange multipliers (2018) International Transactions in Operational Research, 25 (5), pp. 1443-1464.Crosston, M. World gone cyber MAD: how ‘mutually assured debilitation’ is the best hope for cyber deterrence (2011) Strategic Studies Quarterly, 5 (1), pp. 100-116.Cui, Y., Kara, S., Chan, K.C. Manufacturing big data ecosystem: A systematic literature review (Open Access) (2020) Robotics and Computer-Integrated Manufacturing, 62, art. no. 101861.Dahabiyeh, L. Factors affecting organizational adoption and acceptance of computer-based security awareness training tools (2021) Information and Computer Security, 29 (5), pp. 836-849. https://www.emerald.com/insight/publication/issn/2056-4961 doi: 10.1108/ICS-12-2020-0200Daniels, N., Jokonya, O. Factors affecting digital transformation in the retail supply chain (2020) International Conference on Multidisciplinary Research, 2020-December, pp. 117-133. myres.net/ ISBN: 978-999490615-4Galinec, D., Moznik, D., Guberina, B. Cybersecurity and cyber defence: national level strategic approach (Open Access) (2017) Automatika, 58 (3), pp. 273-286.Dashora, K. Cyber crime in the society: problems and preventions (2011) Journal of Alternative Perspectives in the Social Sciences, 3 (1), pp. 240-259.Davis, F.D. Perceived usefulness, perceived ease of use, and user acceptance of information technology (1989) MIS Quarterly: Management Information Systems, 13 (3), pp. 319-339.Davis, A. Building cyber-resilience into supply chains (2015) Technology Innovation Management Review, 5 (4).Dehghani, M., Mashatan, A., Kennedy, R.W. Innovation within networks–patent strategies for blockchain technology (2020) Journal of Business & Industrial Marketing.Deibert, R. Tracking the emerging arms race in cyberspace (2011) Bulletin of the Atomic Scientists, 67 (1), pp. 1-8DePietro, R., Wiarda, E., Fleischer, M. The context for change: organization, technology and environment (1990) The Process of Technological Innovation, pp. 151-175.Duong, L.N.K., Al-Fadhli, M., Jagtap, S., Bader, F., Martindale, W., Swainson, M., Paoli, A. A review of robotics and autonomous systems in the food industry: From the supply chains perspective (Open Access) (2020) Trends in Food Science and Technology, 106, pp. 355-364.(2021) ENISA threat landscape for supply chain attacks.Etemadi, N., Van Gelder, P., Strozzi, F. An ism modeling of barriers for blockchain/distributed ledger technology adoption in supply chains towards cybersecurity (Open Access) (2021) Sustainability (Switzerland), 13 (9), art. no. 4672.(2021) Everstream analytics: annual risk report 2021.Feng, Y. The future of China’s personal data protection law: challenges and prospects (2019) Asia Pacific Law Review, 27 (1), pp. 62-82.Fosso Wamba, S., Kala Kamdjoug, J.R., Epie Bawack, R., Keogh, J.G. Bitcoin, blockchain, and FinTech: a systematic review and case studies in the supply chain (2018) Production Planning and Control.Fracalossi de Moraes, R. Whither Security Cooperation in the BRICS? Between the Protection of Norms and Domestic Politics Dynamics (2020) Global Policy, 11 (4), pp. 439-447. http://onlinelibrary.wiley.com/journal/10.1111/(ISSN)1758-5899 doi: 10.1111/1758-5899.12846Ghadge, A., Weiß, M., Caldwell, N.D., Wilding, R. Managing cyber risk in supply chains: a review and research agenda (Open Access) (2020) Supply Chain Management, 25 (2), pp. 223-240.Gilal, F., Jian, Z., Paul, J., Gilal, N. The role of self-determination theory in marketing science: an integrative review and agenda for marketing research (2018) European Management JournalGill, B. The United States and Asia in 2015: Across the region, US-China competition intensifies (2016) Asian Survey, 56 (1), pp. 8-18. http://caliber.ucpress.net/loi/as doi: 10.1525/AS.2016.56.1.8Gjesvik, L., Øverbø, E.J. (2019) Internasjonal Politikk, 77 (3), pp. 278-287. https://tidsskriftet-ip.no/index.php/intpol/article/view/1396 doi: 10.23865/intpol.v77.1396Goel, R., Kumar, A., Haddow, J. PRISM: a strategic decision framework for cybersecurity risk assessment (2020) Information and Computer Security, 28 (4), pp. 591-625.Golmohammadi, A., Hassini, E. Review of supplier diversification and pricing strategies under random supply and demand (2020) International Journal of Production Research, 58 (11), pp. 3455-3487.Gökalp, E., Gökalp, M., Çoban, S. Blockchain-based supply chain management: understanding the determinants of adoption in the context of organizations (2020) Information Systems Management, pp. 1-22.Goodhue, D.L., Thompson, R.L. Task-technology fit and individual performance (1995) MIS Quarterly: Management Information Systems, 19 (2), pp. 213-233.Gourisetti, S.N.G., Mylrea, M., Patangia, H. Evaluation and Demonstration of Blockchain Applicability Framework (2020) IEEE Transactions on Engineering Management, 67 (4), art. no. 8822381, pp. 1142-1156.Gupta, P., Chauhan, S., Paul, J., Jaiswal, M.P. Social entrepreneurship research: A review and future research agenda (2020) Journal of Business Research, 113, pp. 209-229.Gupta, S., Meissonier, R., Drave, V.A., Roubaud, D. Examining the impact of Cloud ERP on sustainable performance: A dynamic capability view (2020) International Journal of Information Management, 51, art. no. 102028.Hang, N. The rise of China: challenges, implications, and options for the United States (2017) Indian Journal of Asian Affairs, 30 (1-2), pp. 47-64Harfouche, A., Robbin, A. E-government (2015) Wiley Encyclopedia of Management John Wiley and Sons, Ltd www.researchgate.net/profile/AliceRobbin/publication/319615017_EGovernment/links/5c1aa7d192851c22a3381630/E-Government.pdfHasan, S., Ali, M., Kurnia, S., Thurasamy, R. Evaluating the cyber security readiness of organizations and its influence on performance (2021) Journal of Information Security and Applications, 58, art. no. 102726.Hassija, V., Chamola, V., Gupta, V., Jain, S., Guizani, N. A survey on supply chain security: application areas, security threats, and solution architectures (2020) IEEE Internet of Things Journal, p. 1.Hassija, V., Chamola, V., Krishna, D.N.G., Kumar, N., Guizani, M. A Blockchain and Edge-Computing-Based Secure Framework for Government Tender Allocation (2021) IEEE Internet of Things Journal, 8 (4), art. no. 9206548, pp. 2409-2418.Hayden, P., Woolrich, D., Sobolewski, K. Providing cyber situational awareness on defense platform networks (2004) The Cyber Defense Review, 2 (2), pp. 125-140.Heath, E.A., Mitchell, J.E., Sharkey, T.C. Models for restoration decision making for a supply chain network after a cyber attack (Open Access) (2020) Journal of Defense Modeling and Simulation, 17 (1), pp. 5-19.Herzog, S. Revisiting the Estonian cyber attacks: digital threats and multinational responses (2011) Journal of Strategic Security, 4 (2), pp. 49-60.Hjortdal, M. China’s use of cyber warfare: espionage meets strategic deterrence (2017) Journal of Strategic Security, 4 (2), pp. 1-24.Huma, Z.E., Latif, S., Ahmad, J., Idrees, Z., Ibrar, A., Zou, Z., Alqahtani, F., (...), Baothman, F. A Hybrid Deep Random Neural Network for Cyberattack Detection in the Industrial Internet of Things (Open Access) (2021) IEEE Access, 9, art. no. 9399085, pp. 55595-55605.Huang, Y., Liu, S., Zhang, C., You, X., Wu, H. True-data testbed for 5G/B5G intelligent network (2021) Intelligent and Converged Networks, 2 (2), pp. 133-149.Iasiello, E. China's cyber initiatives counter international pressure (Open Access) (2016) Journal of Strategic Security, 10 (1), pp. 1-16.Ikenson, D. (2017) Cybersecurity or protectionism? Defusing the most volatile issue in the US-China relationship.Jabbour, K., Devendorf, E. Cyber threat characterization (2017) The Cyber Defense Review, 2 (3), pp. 79-94abbour, K., Poisson, J. Cyber risk assessment in distributed information systems (2016) The Cyber Defense Review, 1 (1), pp. 91-112.http://purl.org/coar/resource_type/c_2df8fbb1ORIGINAL10-1108_JABS-11-2020-0444.pdf10-1108_JABS-11-2020-0444.pdfapplication/pdf698448https://repositorio.utb.edu.co/bitstream/20.500.12585/10670/1/10-1108_JABS-11-2020-0444.pdff0659120ccba697474181bce38e74a1fMD51CC-LICENSElicense_rdflicense_rdfapplication/rdf+xml; charset=utf-8805https://repositorio.utb.edu.co/bitstream/20.500.12585/10670/2/license_rdf4460e5956bc1d1639be9ae6146a50347MD52LICENSElicense.txtlicense.txttext/plain; charset=utf-83182https://repositorio.utb.edu.co/bitstream/20.500.12585/10670/3/license.txte20ad307a1c5f3f25af9304a7a7c86b6MD53TEXT10-1108_JABS-11-2020-0444.pdf.txt10-1108_JABS-11-2020-0444.pdf.txtExtracted texttext/plain90693https://repositorio.utb.edu.co/bitstream/20.500.12585/10670/4/10-1108_JABS-11-2020-0444.pdf.txtb2a76ac34f63eb167ec136aa9bb9b5a1MD54THUMBNAIL10-1108_JABS-11-2020-0444.pdf.jpg10-1108_JABS-11-2020-0444.pdf.jpgGenerated Thumbnailimage/jpeg18524https://repositorio.utb.edu.co/bitstream/20.500.12585/10670/5/10-1108_JABS-11-2020-0444.pdf.jpgfdcc297d5dce38ee73f7753afc99aa10MD5520.500.12585/10670oai:repositorio.utb.edu.co:20.500.12585/106702022-04-19 00:18:12.193Repositorio Institucional UTBrepositorioutb@utb.edu.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 |