Impact of Information Security Initiatives on Supply Chain Performance

1
Hossam Ahmed Hanafy
Hossam Ahmed Hanafy
2
Abd`Elazez Hashem
Abd`Elazez Hashem
1 Cairo university

Send Message

To: Author

GJMBR Volume 17 Issue A6

Article Fingerprint

ReserarchID

97PP6

Impact of Information Security Initiatives on Supply Chain Performance Banner
  • English
  • Afrikaans
  • Albanian
  • Amharic
  • Arabic
  • Armenian
  • Azerbaijani
  • Basque
  • Belarusian
  • Bengali
  • Bosnian
  • Bulgarian
  • Catalan
  • Cebuano
  • Chichewa
  • Chinese (Simplified)
  • Chinese (Traditional)
  • Corsican
  • Croatian
  • Czech
  • Danish
  • Dutch
  • Esperanto
  • Estonian
  • Filipino
  • Finnish
  • French
  • Frisian
  • Galician
  • Georgian
  • German
  • Greek
  • Gujarati
  • Haitian Creole
  • Hausa
  • Hawaiian
  • Hebrew
  • Hindi
  • Hmong
  • Hungarian
  • Icelandic
  • Igbo
  • Indonesian
  • Irish
  • Italian
  • Japanese
  • Javanese
  • Kannada
  • Kazakh
  • Khmer
  • Korean
  • Kurdish (Kurmanji)
  • Kyrgyz
  • Lao
  • Latin
  • Latvian
  • Lithuanian
  • Luxembourgish
  • Macedonian
  • Malagasy
  • Malay
  • Malayalam
  • Maltese
  • Maori
  • Marathi
  • Mongolian
  • Myanmar (Burmese)
  • Nepali
  • Norwegian
  • Pashto
  • Persian
  • Polish
  • Portuguese
  • Punjabi
  • Romanian
  • Russian
  • Samoan
  • Scots Gaelic
  • Serbian
  • Sesotho
  • Shona
  • Sindhi
  • Sinhala
  • Slovak
  • Slovenian
  • Somali
  • Spanish
  • Sundanese
  • Swahili
  • Swedish
  • Tajik
  • Tamil
  • Telugu
  • Thai
  • Turkish
  • Ukrainian
  • Urdu
  • Uzbek
  • Vietnamese
  • Welsh
  • Xhosa
  • Yiddish
  • Yoruba
  • Zulu

1. Develop a comprehensive framework for the effective application of information security encompassing the internal and external technical environment, formal and informal management, and includes several aspects from an organizational perspective and between organizations in the context of the supply chain. 2. Exploring the potential outcomes and outcomes of the effective application of internal and external information security initiatives to supply chain performance. 3. Study the impact of effective application of internal and external information security initiatives on supply chain operations from the internal and inter-organizational perspective. 4. Study the impact of supply chain operations on supply chain performance. Design/ Methodology/ Approach -Based on extant information security management and supply chain security management literature, a conceptual model was developed and validated. A questionnaire survey instrument was developed and administered among supply chain managers to collect data.

39 Cites in Articles

References

  1. Debi Ashenden (2008). Information Security management: A human challenge?.
  2. K Akram (2013). Evaluating the impact of information security on enhancing the business decision-making process.
  3. J Hagen,E Albrechtsen,J Hovden (2008). Implementation and effectiveness of organizational information security measures.
  4. J Hair,R Anderson (1995). Multivariate Data Analysis.
  5. J Johna (2012). Information security and business continuity management in inter organizational IT relationships.
  6. Mouna Jouini,Latifa Rabai,Anis Aissa (2014). Classification of Security Threats in Information Systems.
  7. Atreyi Kankanhalli,Hock-Hai Teo,Bernard Tan,Kwok-Kee Wei (2003). An integrative study of information systems security effectiveness.
  8. Ramesh Kolluru,Paul Meredith (2005). Security and trust management in supply chains.
  9. E Kritzinger,E Smith (2008). Information security management: An information security retrieval and awareness model for industry.
  10. Sean Lancaster,David Yen,Cheng‐yuan Ku (2006). E‐supply chain management: an evaluation of current web initiatives.
  11. S Lee,F Luthans,D Olson (1982). A Management Science Approach to Contingency Models of Organizational Structure..
  12. S Li,S Rao,T Ragu-Nathan,B Ragu-Nathan (2005). Development and validation of a measurement instrument for studying supply chain management practices.
  13. Suhong Li,Bhanu Ragu-Nathan,T Ragu-Nathan,S Subba Rao (2006). The impact of supply chain management practices on competitive advantage and organizational performance.
  14. Qingxiong Ma,Allen Johnston,J Pearson (2008). Information security management objectives and practices: a parsimonious framework.
  15. Arvind Malhotra,Sanjay Gosain,Omar El Sawy (2005). Absorptive Capacity Configurations in Supply Chains: Gearing for Partner-Enabled Market Knowledge Creation1.
  16. J Merete,A Erik,J Hovden (2008). Implementation and effectiveness of organizational information security measures.
  17. E Metalidou,C Marinagi,P Trivella,N Eberhagerm,C Kourlas,G Kopoulos (2014). The human factor of information security, unintentional damage perspective.
  18. P Michelberger,C Labodi (2009). Development of information security management systemat the members of the supply chain.
  19. B Nijaz (2006). Information technologies for business continuity: an implementation framework.
  20. M Qingxiong,J Johnston,P Micheal (2008). Information security management objectives and practices: a parsimonious framework.
  21. A Ramesh,D Banwet,R Shanker (2010). Modeling the barriers of supply chain collaboration.
  22. Pauline Ratnasingam,Dien Phan (2000). Trading Partner Trust in B2B E-Commerce: A Case Study.
  23. J Rice,F Caniato (2003). Building a secure and resilient supply network.
  24. R Richey (2009). The supply chain crisis and disaster pyramid: A theoretical framework for understanding preparedness and recovery.
  25. D Russell,J Saldanha (2003). Five tenets of security-aware logistics and supply chainoperation.
  26. R Sarathy (2006). Security and the global supply chain.
  27. P Sindhuja (2014). Impact of information security initiatives on supply chain performance.
  28. S Stephens (2001). Das Supply Chain Operations Reference Model (SCOR-Modell).
  29. S Soonhong,J Roath,E Daugherty,R Genchev,R Glenn (2005). Supply chain collaboration: What's happening?.
  30. D Suhazimah,Z Ali (2012). Assessment of information security maturity.
  31. Felix Tan,M Hunter (2002). The Repertory Grid Technique: A Method for the Study of Cognition in Information Systems1.
  32. A Theeranuphattana,J Tang (2008). A conceptual model of performance measurement for supply chains: Alternate considerations.
  33. M Voss,Judith Whipple,David Closs (2008). The Role of Strategic Security: Internal and External Security Measures with Security Performance Implications.
  34. Rodrigo Werlinger,Kirstie Hawkey,Konstantin Beznosov (2009). An integrated view of human, organizational, and technological challenges of IT security management.
  35. Zachary Williams,Jason Lueg,Ronald Taylor,Robert Cook (2009). Why all the changes?.
  36. M Wilson,J Hash (2003). Building an Information Technology Security awareness and Training Program.
  37. M Yu,S Ting,C Chen (2010). Evaluating the cross-efficiency of information sharing in supply chains.
  38. L Zahra,M Mukhtar,S Sahran,A Zadeh (2013). Information Sharing in Supply Chain Management.
  39. Honggeng Zhou,W Benton (2007). Supply chain practice and information sharing.

Funding

No external funding was declared for this work.

Conflict of Interest

The authors declare no conflict of interest.

Ethical Approval

No ethics committee approval was required for this article type.

Data Availability

Not applicable for this article.

Hossam Ahmed Hanafy. 2017. \u201cImpact of Information Security Initiatives on Supply Chain Performance\u201d. Global Journal of Management and Business Research - A: Administration & Management GJMBR-A Volume 17 (GJMBR Volume 17 Issue A6): .

Download Citation

Issue Cover
GJMBR Volume 17 Issue A6
Pg. 41- 54
Journal Specifications

Crossref Journal DOI 10.17406/GJMBR

Print ISSN 0975-5853

e-ISSN 2249-4588

Keywords
Classification
GJMBR-A Classification: JEL Code: M19
Version of record

v1.2

Issue date

October 23, 2017

Language

English

Experiance in AR

The methods for personal identification and authentication are no exception.

Read in 3D

The methods for personal identification and authentication are no exception.

Article Matrices
Total Views: 3352
Total Downloads: 1727
2026 Trends
Research Identity (RIN)
Related Research

Published Article

1. Develop a comprehensive framework for the effective application of information security encompassing the internal and external technical environment, formal and informal management, and includes several aspects from an organizational perspective and between organizations in the context of the supply chain. 2. Exploring the potential outcomes and outcomes of the effective application of internal and external information security initiatives to supply chain performance. 3. Study the impact of effective application of internal and external information security initiatives on supply chain operations from the internal and inter-organizational perspective. 4. Study the impact of supply chain operations on supply chain performance. Design/ Methodology/ Approach -Based on extant information security management and supply chain security management literature, a conceptual model was developed and validated. A questionnaire survey instrument was developed and administered among supply chain managers to collect data.

Our website is actively being updated, and changes may occur frequently. Please clear your browser cache if needed. For feedback or error reporting, please email [email protected]
×

This Page is Under Development

We are currently updating this article page for a better experience.

Request Access

Please fill out the form below to request access to this research paper. Your request will be reviewed by the editorial or author team.
X

Quote and Order Details

Contact Person

Invoice Address

Notes or Comments

This is the heading

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

High-quality academic research articles on global topics and journals.

Impact of Information Security Initiatives on Supply Chain Performance

Hossam Ahmed Hanafy
Hossam Ahmed Hanafy Cairo university
Abd`Elazez Hashem
Abd`Elazez Hashem

Research Journals