Information security systematics of software supply chains
نویسندگان
چکیده
منابع مشابه
Open Source Supply Chains: Enabling software technologies and methodologies for Information Supply Chains
The project concerns the identification of commonalties amongst a set of operational European RTD projects in the IST Programme, that reside in the wider area of ECommerce, aiming to harmonize efforts for the establishment of common methodological and technological building blocks in the area of smart organizations, taking into consideration relevant standardized models and methodologies develo...
متن کاملOptimizing Software Supply Chains
The software supply chain is best described as interconnected business processes that enable software products to be developed, converted to SKUs, distributed and provisioned (i.e., licensing and entitlement) to users. Most companies have a unique software supply chain, depending on the business model; but at a very high level, the sequence of steps remains the same. Hardware and high-technolog...
متن کاملInformation Leakage in Supply Chains
Information sharing within a supply chain has numerous bene ts. However, in the past decade, several works have pointed out using game-theoretic models that: (i) a supply chain entity may not have an incentive to share information for fear of exploitation by the party (e.g. manufacturer) with whom they share information as well as leakage of information to their competitors, (ii) the negative e...
متن کاملSecurity And Risk Management in Supply Chains
The reduction of risk constitutes a pillar of success in business. A crucial concern in any business activity includes the variable of risk due to security threats in information systems. Risks increase as the business increases in success and profit. Risk Management becomes a crucial part of every successful business model to deal with uncertain and risky socio-economic changes. Security conce...
متن کاملCybersecurity Information Sharing: a Framework for Sustainable Information Security Management in UK SME Supply Chains
UK small to medium sized enterprises (SMEs) are suffering increasing levels of cybersecurity breaches and are a major point of vulnerability in the supply chain networks in which they participate. A key factor for achieving optimal security levels within supply chains is the management and sharing of cybersecurity information associated with specific metrics. Such information sharing schemes am...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Bezopasnost informacionnyh tehnology
سال: 2019
ISSN: 2074-7136,2074-7128
DOI: 10.26583/bit.2019.3.06