PL EN


Preferencje help
Widoczny [Schowaj] Abstrakt
Liczba wyników
2017 | 8 | nr 4 | 42--53
Tytuł artykułu

A comprehensive assessment model for critical infrastructure protection

Warianty tytułu
Języki publikacji
EN
Abstrakty
EN
International business demands seamless service and IT-infrastructure throughout the entire supply chain. However, dependencies between different parts of this vulnerable ecosystem form a fragile web. Assessment of the financial effects of any abnormalities in any part of the network is demanded in order to protect this network in a financially viable way. Contractual environment between the actors in a supply chain, different business domains and functions requires a management model, which enables a network wide protection for critical infrastructure. In this paper authors introduce such a model. It can be used to assess financial differences between centralized and decentralized protection of critical infrastructure. As an end result of this assessment business resilience to unknown threats can be improved across the entire supply chain. (original abstract)
Rocznik
Tom
8
Numer
Strony
42--53
Opis fizyczny
Twórcy
  • National Defence University Helsinki, Finland
  • National Defence University Helsinki, Finland
Bibliografia
  • Laanti R., Gabrielsson M., Gabrielsson P., The globalization strategies of business-to-business born global firms in the wireless technology industry, Industrial Marketing Management, 36, 8, 1104-1117, 2007.
  • Bertelsmann Foundation, Globalization Gains for Developed Countries Outpace Those for Emerging Nations Retrieved June 15, 2016, from http://www.bfna.org/article/globalizationgains-for-developed-countries-outpace-those-foremerging-nations.
  • Lewis T.G., Critical infrastructure protection in homeland security: defending a networked nation, John Wiley & Sons, 2014.
  • Beer R.D., A dynamical systems perspective on agent-environment interaction, Artificial Intelligence, 72, 1, 173-215, 1995.
  • Teller J., Kock A., Gemünden H.G., Risk management in project portfolios is more than managing project risks: a contingency perspective on risk management, Project Management Journal, 45, 4, 67-80, 2014.
  • Galbraith J.R., Designing complex organizations, Addison-Wesley Longman Publishing Co., Inc., 1973.
  • Liesch P.W., Welch L.S., Buckley P.J., Risk and uncertainty in internationalisation and international entrepreneurship studies, Management International Review, 51, 6, 851-873, 2011.
  • Zsidisin G.A. et al., An analysis of supply risk assessment techniques, International Journal of Physical Distribution & Logistics Management, 34, 5, 397-413, 2004.
  • Vargo S.L., Lusch R.F., Service-dominant logic: continuing the evolution, Journal of the Academy of Marketing Science, 36, 1, 1-10, 2008.
  • Grönroos C., Marketing as promise management: regaining customer management for marketing, Journal of Business & Industrial Marketing, 24, 5/6, 351-359, 2009.
  • Hoffman M.L., Empathy and moral development: implications for caring and justice, Cambridge University Press, 2001.
  • Bronfenbrenner U., Ecology of the family as a context for human development: research perspectives, Developmental Psychology, 22, 6, 723, 1986.
  • Horsmanheimo S., Kokkoniemi-Tarkkanen H., Kuusela P., Tuomimäki L., Puuska S., Vankka J., Kriittisen infrastruktuurin tilannetietoisuus, Valtioneuvoston Selvitys- ja Tutkimustoiminnan Julkaisusarja, 19, 2017.
  • Endsley M.R., Toward a theory of situation awareness in dynamic systems, Human Factors: the Journal of the Human Factors and Ergonomics Society, 37, 1, 32-64, 1995.
  • Skyttner L., General systems theory: problems, perspectives, practice, World Scientific, 2005.
  • Anteroinen J., Enhancing the development of military capabilities by a systems approach, Maanpuolustuskorkeakoulu, 2013.
  • Lyons B., Mehta J., Contracts, opportunism and trust: self-interest and social orientation, Cambridge Journal of Economics, 21, 2, 239-257, 1997.
  • Rousseau D.M., Sitkin S.B., Burt R.S., Camerer C., Not so different after all: a cross-discipline view of trust, Academy of Management Review, 23, 3, 393-404, 1998.
  • McCabe K.A., Rigdon M.L., Smith V.L., Positive reciprocity and intentions in trust games, Journal of Economic Behavior & Organization, 52, 2, 267-275, 2003.
  • Trivers R.L., The evolution of reciprocal altruism, The Quarterly Eeview of Biology, 46, 1, 35-57, 1971.
  • Mickos J., Interview, March 23.
  • BAE systems threat research blog. Retrieved June 3rd, 2017 from: http://baesystemsai.blogspot.se/2017/04/apt10-operation-cloud-hopper3.html. [Accessed 3 Jun. 2017].
  • FireEye, HAMMERTOSS: Stealthy Tactics Define a Russian Cyber Threat Group, FireEye Threat Intelligence, Special Report, 2015.
  • Naraine R., Nortel hacking attack went unnoticed for almost 10 years, [online] ZDNet. Retrieved June 3rd, 2017, from http://www.zdnet.com/article/nortel-hacking-attack-went-unnoticed-for-almost-10-years, 2012.
  • Reuters, TIMELINE: Key dates in the history of Nortel, Reuters TECHNOLOGY NEWS, 14.1.2009. Retrieved July 1st, 2017 from http://www.reuters.com/article/us-nortel-timelinesb-idUSTRE50D3N120090115.
  • US-CERT, U.S. Department of Homeland Security: Alert Report, Retrieved May 27th, from https://www.us-cert.gov/ncas, 2017.
  • Zaerens K., Business Resilient Vulnerability Analysis for Dynamic High Security Environment, 18th International Conference on Network-Based Information Systems, 2015.
  • Maglio P.P., Srinivasan S., Kreulen J.T., Spohrer J., Service systems, service scientists, SSME, and innovation, Communications of the ACM, 49, 7, 81-85, 2006.
  • Randall W.S., Pohlen T.L., Hanna J.B., Evolving a theory of performance-based logistics using insights from service dominant logic, Journal of Business Logistics, 31, 2, 35-61, 2010.
  • Berkowitz D., Gupta J.N., Simpson J.T., McWilliams J., Delayne L., Brown B., Sparks T., Performance Based Logistics, Center for the Management of Science and Technology, Huntsville, AL, 2003.
  • Doerr K., Lewis I., Eaton D.R., Measurement issues in performance-based logistics, Journal of Public Procurement, 5, 2, 164, 2005.
  • ForMin Finland, Tietoturvaloukkaus Suomen ulkoasiainhallinnossa - Ulkoasiainministeriö: Ajankohtaista, Retrieved June 3rd, from http://formin.finland.fi/public/default.aspx?contentid=291701&contentlan=1&culture=fi-FI, 2013.
  • Yle Uutiset, Supo: Ulkoministeriö joutui kaksi kertaa vakoilun kohteeksi, Retrieved June 3rd, from http://yle.fi/uutiset/3-7332824, 2014.
  • Kuusisto T., Kybertaistelu 2020, Julkaisusarja 2: Asiatietoa, No. 1/2014.
  • Buckley P.J., Casson M., Future of the multinational enterprise. Springer, 1976.
  • Dunning J.H., Toward an eclectic theory of international production: some empirical tests, Journal of International Business Studies, 11, 1, 9-31, 1980.
  • Henriques I., Sanjay Sharma, Pathways of stakeholder influence in the Canadian forestry industry, Business Strategy and the Environment, 14, 6, 384-398, 2005.
  • Johanson J., Vahlne J.E., The Uppsala internationalization process model revisited: from liability of foreignness to liability of outsidership, Journal of International Business Studies, 40, 9, 1411-1431, 2009.
Typ dokumentu
Bibliografia
Identyfikatory
Identyfikator YADDA
bwmeta1.element.ekon-element-000171518845

Zgłoszenie zostało wysłane

Zgłoszenie zostało wysłane

Musisz być zalogowany aby pisać komentarze.
JavaScript jest wyłączony w Twojej przeglądarce internetowej. Włącz go, a następnie odśwież stronę, aby móc w pełni z niej korzystać.