Openly accessible

Development of a supply chain management security risk management method : a conceptual model

Warren, Matthew and Leitch, Shona 2010, Development of a supply chain management security risk management method : a conceptual model, in ECIW 2010 : Proceedings of the 9th European Conference on Information Warfare and Security, University of Macedonia, Thessaloniki, Greece, pp. 327-333.

Attached Files
Name Description MIMEType Size Downloads
warren-developmentofasupply-2010.pdf Published version application/pdf 364.69KB 34

Title Development of a supply chain management security risk management method : a conceptual model
Author(s) Warren, Matthew
Leitch, Shona
Conference name European Conference on Information Warfare and Security (9th : 2010 : Thessaloniki, Greece)
Conference location Thessaloniki, Greece
Conference dates 1-2 Jul. 2010
Title of proceedings ECIW 2010 : Proceedings of the 9th European Conference on Information Warfare and Security
Editor(s) Demergis, Josef
Publication date 2010
Conference series European Conference on Information Warfare and Security
Start page 327
End page 333
Total pages 7
Publisher University of Macedonia
Place of publication Thessaloniki, Greece
Keyword(s) critical infrastructure
security risk analysis
supply change management
Summary This paper continues the prior research undertaken by Warren and Leitch (2009), in which a series of initial research findings were presented. These findings identified that in Australia, Supply Chain Management (SCM) systems were the weak link of Australian critical infrastructure. This paper focuses upon the security and risk issues associated with SCM systems and puts forward a new SCM Security Risk Management method, continuing the research presented at the European Conference of Information Warfare in 2009.This paper proposes a new Security Risk Analysis model that deals with the complexity of protecting SCM critical infrastructure systems and also introduces a new approach that organisations can apply to protect their SCM systems. The paper describes the importance of SCM systems from a critical infrastructure protection perspective. The paper then discusses the importance of SCM systems in relation to supporting centres of populations and gives examples of the impact of failure. The paper proposes a new SCM security risk analysis method that deals with the security issues related to SCM security and the security issues associated with Information Security. The paper will also discuss a risk framework that can be used to protect against high and low level associated security risks using a new SCM security risk analysis method.
Notes Conference program and abstracts : http://academic-conferences.org/pdfs/ECIW_2010-Booklet.pdf
ISBN 9781906638665
1906638667
Language eng
Field of Research 080303 Computer System Security
Socio Economic Objective 970108 Expanding Knowledge in the Information and Computing Sciences
HERDC Research category E1 Full written paper - refereed
Copyright notice ©2010, Academic Publishing
Persistent URL http://hdl.handle.net/10536/DRO/DU:30032161

Connect to link resolver
 
Link to Related Work
 
Unless expressly stated otherwise, the copyright for items in DRO is owned by the author, with all rights reserved.

Every reasonable effort has been made to ensure that permission has been obtained for items included in DRO. If you believe that your rights have been infringed by this repository, please contact drosupport@deakin.edu.au.

Versions
Version Filter Type
Access Statistics: 371 Abstract Views, 34 File Downloads  -  Detailed Statistics
Created: Fri, 07 Jan 2011, 14:03:17 EST by Katrina Fleming

Every reasonable effort has been made to ensure that permission has been obtained for items included in DRO. If you believe that your rights have been infringed by this repository, please contact drosupport@deakin.edu.au.