Impact of Information Security Initiatives on Supply Chain Performance

Hossam Ahmed Hanafy
Hossam Ahmed Hanafy
Abd`Elazez Hashem
Abd`Elazez Hashem
Cairo University Cairo University

Send Message

To: Author

Impact of Information Security Initiatives on Supply Chain Performance

Article Fingerprint

ReserarchID

97PP6

Impact of Information Security Initiatives on Supply Chain Performance Banner

AI TAKEAWAY

Connecting with the Eternal Ground
  • English
  • Afrikaans
  • Albanian
  • Amharic
  • Arabic
  • Armenian
  • Azerbaijani
  • Basque
  • Belarusian
  • Bengali
  • Bosnian
  • Bulgarian
  • Catalan
  • Cebuano
  • Chichewa
  • Chinese (Simplified)
  • Chinese (Traditional)
  • Corsican
  • Croatian
  • Czech
  • Danish
  • Dutch
  • Esperanto
  • Estonian
  • Filipino
  • Finnish
  • French
  • Frisian
  • Galician
  • Georgian
  • German
  • Greek
  • Gujarati
  • Haitian Creole
  • Hausa
  • Hawaiian
  • Hebrew
  • Hindi
  • Hmong
  • Hungarian
  • Icelandic
  • Igbo
  • Indonesian
  • Irish
  • Italian
  • Japanese
  • Javanese
  • Kannada
  • Kazakh
  • Khmer
  • Korean
  • Kurdish (Kurmanji)
  • Kyrgyz
  • Lao
  • Latin
  • Latvian
  • Lithuanian
  • Luxembourgish
  • Macedonian
  • Malagasy
  • Malay
  • Malayalam
  • Maltese
  • Maori
  • Marathi
  • Mongolian
  • Myanmar (Burmese)
  • Nepali
  • Norwegian
  • Pashto
  • Persian
  • Polish
  • Portuguese
  • Punjabi
  • Romanian
  • Russian
  • Samoan
  • Scots Gaelic
  • Serbian
  • Sesotho
  • Shona
  • Sindhi
  • Sinhala
  • Slovak
  • Slovenian
  • Somali
  • Spanish
  • Sundanese
  • Swahili
  • Swedish
  • Tajik
  • Tamil
  • Telugu
  • Thai
  • Turkish
  • Ukrainian
  • Urdu
  • Uzbek
  • Vietnamese
  • Welsh
  • Xhosa
  • Yiddish
  • Yoruba
  • Zulu
Font Type
Font Size
Font Size
Bedground

Abstract

1. Develop a comprehensive framework for the effective application of information security encompassing the internal and external technical environment, formal and informal management, and includes several aspects from an organizational perspective and between organizations in the context of the supply chain. 2. Exploring the potential outcomes and outcomes of the effective application of internal and external information security initiatives to supply chain performance. 3. Study the impact of effective application of internal and external information security initiatives on supply chain operations from the internal and inter-organizational perspective. 4. Study the impact of supply chain operations on supply chain performance. Design/ Methodology/ Approach -Based on extant information security management and supply chain security management literature, a conceptual model was developed and validated. A questionnaire survey instrument was developed and administered among supply chain managers to collect data.

References

39 Cites in Article
  1. Debi Ashenden (2008). Information Security management: A human challenge?.
  2. K Akram (2013). Evaluating the impact of information security on enhancing the business decision-making process.
  3. J Hagen,E Albrechtsen,J Hovden (2008). Implementation and effectiveness of organizational information security measures.
  4. J Hair,R Anderson (1995). Multivariate Data Analysis.
  5. J Johna (2012). Information security and business continuity management in inter organizational IT relationships.
  6. Mouna Jouini,Latifa Rabai,Anis Aissa (2014). Classification of Security Threats in Information Systems.
  7. Atreyi Kankanhalli,Hock-Hai Teo,Bernard Tan,Kwok-Kee Wei (2003). An integrative study of information systems security effectiveness.
  8. Ramesh Kolluru,Paul Meredith (2005). Security and trust management in supply chains.
  9. E Kritzinger,E Smith (2008). Information security management: An information security retrieval and awareness model for industry.
  10. Sean Lancaster,David Yen,Cheng‐yuan Ku (2006). E‐supply chain management: an evaluation of current web initiatives.
  11. S Lee,F Luthans,D Olson (1982). A Management Science Approach to Contingency Models of Organizational Structure..
  12. S Li,S Rao,T Ragu-Nathan,B Ragu-Nathan (2005). Development and validation of a measurement instrument for studying supply chain management practices.
  13. Suhong Li,Bhanu Ragu-Nathan,T Ragu-Nathan,S Subba Rao (2006). The impact of supply chain management practices on competitive advantage and organizational performance.
  14. Qingxiong Ma,Allen Johnston,J Pearson (2008). Information security management objectives and practices: a parsimonious framework.
  15. Arvind Malhotra,Sanjay Gosain,Omar El Sawy (2005). Absorptive Capacity Configurations in Supply Chains: Gearing for Partner-Enabled Market Knowledge Creation1.
  16. J Merete,A Erik,J Hovden (2008). Implementation and effectiveness of organizational information security measures.
  17. E Metalidou,C Marinagi,P Trivella,N Eberhagerm,C Kourlas,G Kopoulos (2014). The human factor of information security, unintentional damage perspective.
  18. P Michelberger,C Labodi (2009). Development of information security management systemat the members of the supply chain.
  19. B Nijaz (2006). Information technologies for business continuity: an implementation framework.
  20. M Qingxiong,J Johnston,P Micheal (2008). Information security management objectives and practices: a parsimonious framework.
  21. A Ramesh,D Banwet,R Shanker (2010). Modeling the barriers of supply chain collaboration.
  22. Pauline Ratnasingam,Dien Phan (2000). Trading Partner Trust in B2B E-Commerce: A Case Study.
  23. J Rice,F Caniato (2003). Building a secure and resilient supply network.
  24. R Richey (2009). The supply chain crisis and disaster pyramid: A theoretical framework for understanding preparedness and recovery.
  25. D Russell,J Saldanha (2003). Five tenets of security-aware logistics and supply chainoperation.
  26. R Sarathy (2006). Security and the global supply chain.
  27. P Sindhuja (2014). Impact of information security initiatives on supply chain performance.
  28. S Stephens (2001). Das Supply Chain Operations Reference Model (SCOR-Modell).
  29. S Soonhong,J Roath,E Daugherty,R Genchev,R Glenn (2005). Supply chain collaboration: What's happening?.
  30. D Suhazimah,Z Ali (2012). Assessment of information security maturity.
  31. Felix Tan,M Hunter (2002). The Repertory Grid Technique: A Method for the Study of Cognition in Information Systems1.
  32. A Theeranuphattana,J Tang (2008). A conceptual model of performance measurement for supply chains: Alternate considerations.
  33. M Voss,Judith Whipple,David Closs (2008). The Role of Strategic Security: Internal and External Security Measures with Security Performance Implications.
  34. Rodrigo Werlinger,Kirstie Hawkey,Konstantin Beznosov (2009). An integrated view of human, organizational, and technological challenges of IT security management.
  35. Zachary Williams,Jason Lueg,Ronald Taylor,Robert Cook (2009). Why all the changes?.
  36. M Wilson,J Hash (2003). Building an Information Technology Security awareness and Training Program.
  37. M Yu,S Ting,C Chen (2010). Evaluating the cross-efficiency of information sharing in supply chains.
  38. L Zahra,M Mukhtar,S Sahran,A Zadeh (2013). Information Sharing in Supply Chain Management.
  39. Honggeng Zhou,W Benton (2007). Supply chain practice and information sharing.

Funding

No external funding was declared for this work.

Conflict of Interest

The authors declare no conflict of interest.

Ethical Approval

No ethics committee approval was required for this article type.

Data Availability

Not applicable for this article.

How to Cite This Article

Hossam Ahmed Hanafy. 2017. \u201cImpact of Information Security Initiatives on Supply Chain Performance\u201d. Global Journal of Management and Business Research - A: Administration & Management GJMBR-A Volume 17 (GJMBR Volume 17 Issue A6).

Download Citation

Journal Specifications

Crossref Journal DOI 10.17406/GJMBR

Print ISSN 0975-5853

e-ISSN 2249-4588

Keywords
Classification
GJMBR-A Classification JEL Code: M19
Version of record

v1.2

Issue date
October 23, 2017

Language
en
Experiance in AR

Explore published articles in an immersive Augmented Reality environment. Our platform converts research papers into interactive 3D books, allowing readers to view and interact with content using AR and VR compatible devices.

Read in 3D

Your published article is automatically converted into a realistic 3D book. Flip through pages and read research papers in a more engaging and interactive format.

Article Matrices
Total Views: 3468
Total Downloads: 1721
2026 Trends
Related Research
Our website is actively being updated, and changes may occur frequently. Please clear your browser cache if needed. For feedback or error reporting, please email [email protected]

Request Access

Please fill out the form below to request access to this research paper. Your request will be reviewed by the editorial or author team.
X

Quote and Order Details

Contact Person

Invoice Address

Notes or Comments

This is the heading

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

High-quality academic research articles on global topics and journals.

Impact of Information Security Initiatives on Supply Chain Performance

Hossam Ahmed Hanafy
Hossam Ahmed Hanafy <p>Cairo University</p>
Abd`Elazez Hashem
Abd`Elazez Hashem

Research Journals