{"id":"https://openalex.org/W7125397281","doi":"https://doi.org/10.1007/s10207-025-01207-9","title":"Cyber Supply Chain Risk Management: From Threats to Treatment","display_name":"Cyber Supply Chain Risk Management: From Threats to Treatment","publication_year":2026,"publication_date":"2026-01-22","ids":{"openalex":"https://openalex.org/W7125397281","doi":"https://doi.org/10.1007/s10207-025-01207-9"},"language":"en","primary_location":{"id":"doi:10.1007/s10207-025-01207-9","is_oa":true,"landing_page_url":"https://doi.org/10.1007/s10207-025-01207-9","pdf_url":"https://link.springer.com/content/pdf/10.1007/s10207-025-01207-9.pdf","source":{"id":"https://openalex.org/S164062316","display_name":"International Journal of Information Security","issn_l":"1615-5262","issn":["1615-5262","1615-5270"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Information Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"hybrid","oa_url":"https://link.springer.com/content/pdf/10.1007/s10207-025-01207-9.pdf","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5123565265","display_name":"Aikaterina Latsiou","orcid":null},"institutions":[{"id":"https://openalex.org/I154757721","display_name":"University of Piraeus","ror":"https://ror.org/02qs84g94","country_code":"GR","type":"education","lineage":["https://openalex.org/I154757721"]}],"countries":["GR"],"is_corresponding":false,"raw_author_name":"Aikaterina Latsiou","raw_affiliation_strings":["Department of Digital Systems, University of Piraeus, 80 M. Karaoli & A. Dimitriou Street, Piraeus, Greece"],"affiliations":[{"raw_affiliation_string":"Department of Digital Systems, University of Piraeus, 80 M. Karaoli & A. Dimitriou Street, Piraeus, Greece","institution_ids":["https://openalex.org/I154757721"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5123581310","display_name":"Costas Lambrinoudakis","orcid":null},"institutions":[{"id":"https://openalex.org/I154757721","display_name":"University of Piraeus","ror":"https://ror.org/02qs84g94","country_code":"GR","type":"education","lineage":["https://openalex.org/I154757721"]}],"countries":["GR"],"is_corresponding":true,"raw_author_name":"Costas Lambrinoudakis","raw_affiliation_strings":["Department of Digital Systems, University of Piraeus, 80 M. Karaoli & A. Dimitriou Street, Piraeus, Greece"],"affiliations":[{"raw_affiliation_string":"Department of Digital Systems, University of Piraeus, 80 M. Karaoli & A. Dimitriou Street, Piraeus, Greece","institution_ids":["https://openalex.org/I154757721"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5123581310"],"corresponding_institution_ids":["https://openalex.org/I154757721"],"apc_list":{"value":2590,"currency":"EUR","value_usd":3190},"apc_paid":{"value":2590,"currency":"EUR","value_usd":3190},"fwci":0.0,"has_fulltext":true,"cited_by_count":0,"citation_normalized_percentile":{"value":0.17317933,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"25","issue":"1","first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11864","display_name":"Supply Chain Resilience and Risk Management","score":0.536899983882904,"subfield":{"id":"https://openalex.org/subfields/1408","display_name":"Strategy and Management"},"field":{"id":"https://openalex.org/fields/14","display_name":"Business, Management and Accounting"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},"topics":[{"id":"https://openalex.org/T11864","display_name":"Supply Chain Resilience and Risk Management","score":0.536899983882904,"subfield":{"id":"https://openalex.org/subfields/1408","display_name":"Strategy and Management"},"field":{"id":"https://openalex.org/fields/14","display_name":"Business, Management and Accounting"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T11807","display_name":"Infrastructure Resilience and Vulnerability Analysis","score":0.020800000056624413,"subfield":{"id":"https://openalex.org/subfields/2205","display_name":"Civil and Structural Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.01979999989271164,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/exploit","display_name":"Exploit","score":0.6646000146865845},{"id":"https://openalex.org/keywords/resilience","display_name":"Resilience (materials science)","score":0.6151000261306763},{"id":"https://openalex.org/keywords/risk-management","display_name":"Risk management","score":0.605400025844574},{"id":"https://openalex.org/keywords/supply-chain","display_name":"Supply chain","score":0.5509999990463257},{"id":"https://openalex.org/keywords/vulnerability","display_name":"Vulnerability (computing)","score":0.5134999752044678},{"id":"https://openalex.org/keywords/security-management","display_name":"Security management","score":0.4065999984741211},{"id":"https://openalex.org/keywords/service","display_name":"Service (business)","score":0.4027000069618225},{"id":"https://openalex.org/keywords/safeguard","display_name":"Safeguard","score":0.39739999175071716},{"id":"https://openalex.org/keywords/critical-infrastructure","display_name":"Critical infrastructure","score":0.38530001044273376},{"id":"https://openalex.org/keywords/service-provider","display_name":"Service provider","score":0.3840999901294708}],"concepts":[{"id":"https://openalex.org/C165696696","wikidata":"https://www.wikidata.org/wiki/Q11287","display_name":"Exploit","level":2,"score":0.6646000146865845},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.6414999961853027},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6283000111579895},{"id":"https://openalex.org/C2779585090","wikidata":"https://www.wikidata.org/wiki/Q3457762","display_name":"Resilience (materials science)","level":2,"score":0.6151000261306763},{"id":"https://openalex.org/C32896092","wikidata":"https://www.wikidata.org/wiki/Q189447","display_name":"Risk management","level":2,"score":0.605400025844574},{"id":"https://openalex.org/C112930515","wikidata":"https://www.wikidata.org/wiki/Q4389547","display_name":"Risk analysis (engineering)","level":1,"score":0.5677000284194946},{"id":"https://openalex.org/C108713360","wikidata":"https://www.wikidata.org/wiki/Q1824206","display_name":"Supply chain","level":2,"score":0.5509999990463257},{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.5134999752044678},{"id":"https://openalex.org/C83163435","wikidata":"https://www.wikidata.org/wiki/Q3954104","display_name":"Security management","level":2,"score":0.4065999984741211},{"id":"https://openalex.org/C2780378061","wikidata":"https://www.wikidata.org/wiki/Q25351891","display_name":"Service (business)","level":2,"score":0.4027000069618225},{"id":"https://openalex.org/C2780771206","wikidata":"https://www.wikidata.org/wiki/Q3271761","display_name":"Safeguard","level":2,"score":0.39739999175071716},{"id":"https://openalex.org/C29852176","wikidata":"https://www.wikidata.org/wiki/Q373338","display_name":"Critical infrastructure","level":2,"score":0.38530001044273376},{"id":"https://openalex.org/C116537","wikidata":"https://www.wikidata.org/wiki/Q2169973","display_name":"Service provider","level":3,"score":0.3840999901294708},{"id":"https://openalex.org/C192639820","wikidata":"https://www.wikidata.org/wiki/Q1114469","display_name":"Supply chain risk management","level":5,"score":0.3808000087738037},{"id":"https://openalex.org/C165609540","wikidata":"https://www.wikidata.org/wiki/Q1172486","display_name":"Data breach","level":2,"score":0.3790000081062317},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.3488999903202057},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.34310001134872437},{"id":"https://openalex.org/C167063184","wikidata":"https://www.wikidata.org/wiki/Q1400839","display_name":"Vulnerability assessment","level":3,"score":0.34290000796318054},{"id":"https://openalex.org/C29983905","wikidata":"https://www.wikidata.org/wiki/Q7445066","display_name":"Security service","level":3,"score":0.33970001339912415},{"id":"https://openalex.org/C123403432","wikidata":"https://www.wikidata.org/wiki/Q654068","display_name":"Visibility","level":2,"score":0.3328999876976013},{"id":"https://openalex.org/C12174686","wikidata":"https://www.wikidata.org/wiki/Q1058438","display_name":"Risk assessment","level":2,"score":0.319599986076355},{"id":"https://openalex.org/C2778143579","wikidata":"https://www.wikidata.org/wiki/Q831801","display_name":"Business continuity","level":2,"score":0.3131999969482422},{"id":"https://openalex.org/C9652623","wikidata":"https://www.wikidata.org/wiki/Q190109","display_name":"Field (mathematics)","level":2,"score":0.3093999922275543},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.30660000443458557},{"id":"https://openalex.org/C527648132","wikidata":"https://www.wikidata.org/wiki/Q189900","display_name":"Information security","level":2,"score":0.30070000886917114},{"id":"https://openalex.org/C195094911","wikidata":"https://www.wikidata.org/wiki/Q14167904","display_name":"Process management","level":1,"score":0.2773999869823456},{"id":"https://openalex.org/C154908896","wikidata":"https://www.wikidata.org/wiki/Q2167404","display_name":"Security policy","level":2,"score":0.27379998564720154},{"id":"https://openalex.org/C44104985","wikidata":"https://www.wikidata.org/wiki/Q492886","display_name":"Supply chain management","level":3,"score":0.26739999651908875},{"id":"https://openalex.org/C207209096","wikidata":"https://www.wikidata.org/wiki/Q848268","display_name":"Enterprise risk management","level":3,"score":0.2662000060081482},{"id":"https://openalex.org/C2779033394","wikidata":"https://www.wikidata.org/wiki/Q5186733","display_name":"Critical infrastructure protection","level":3,"score":0.26409998536109924},{"id":"https://openalex.org/C129230348","wikidata":"https://www.wikidata.org/wiki/Q1140205","display_name":"Disaster recovery","level":2,"score":0.262800008058548},{"id":"https://openalex.org/C71745522","wikidata":"https://www.wikidata.org/wiki/Q2476929","display_name":"Confidentiality","level":2,"score":0.26249998807907104},{"id":"https://openalex.org/C95609273","wikidata":"https://www.wikidata.org/wiki/Q5975208","display_name":"IT risk management","level":3,"score":0.2621000111103058},{"id":"https://openalex.org/C56739046","wikidata":"https://www.wikidata.org/wiki/Q192060","display_name":"Knowledge management","level":1,"score":0.2614000141620636},{"id":"https://openalex.org/C2777667771","wikidata":"https://www.wikidata.org/wiki/Q926331","display_name":"Ransomware","level":3,"score":0.2597000002861023},{"id":"https://openalex.org/C48840187","wikidata":"https://www.wikidata.org/wiki/Q689042","display_name":"Service management","level":4,"score":0.2533000111579895}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1007/s10207-025-01207-9","is_oa":true,"landing_page_url":"https://doi.org/10.1007/s10207-025-01207-9","pdf_url":"https://link.springer.com/content/pdf/10.1007/s10207-025-01207-9.pdf","source":{"id":"https://openalex.org/S164062316","display_name":"International Journal of Information Security","issn_l":"1615-5262","issn":["1615-5262","1615-5270"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Information Security","raw_type":"journal-article"}],"best_oa_location":{"id":"doi:10.1007/s10207-025-01207-9","is_oa":true,"landing_page_url":"https://doi.org/10.1007/s10207-025-01207-9","pdf_url":"https://link.springer.com/content/pdf/10.1007/s10207-025-01207-9.pdf","source":{"id":"https://openalex.org/S164062316","display_name":"International Journal of Information Security","issn_l":"1615-5262","issn":["1615-5262","1615-5270"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Information Security","raw_type":"journal-article"},"sustainable_development_goals":[{"score":0.4728556275367737,"id":"https://metadata.un.org/sdg/9","display_name":"Industry, innovation and infrastructure"}],"awards":[],"funders":[{"id":"https://openalex.org/F4320331361","display_name":"University of Piraeus Research Centre","ror":null}],"has_content":{"grobid_xml":false,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W7125397281.pdf"},"referenced_works_count":23,"referenced_works":["https://openalex.org/W1933618497","https://openalex.org/W1998200814","https://openalex.org/W2012270501","https://openalex.org/W2041894339","https://openalex.org/W2069700160","https://openalex.org/W2134850531","https://openalex.org/W2726910570","https://openalex.org/W2947032870","https://openalex.org/W2972705049","https://openalex.org/W3005102823","https://openalex.org/W3124641002","https://openalex.org/W4200617506","https://openalex.org/W4290697838","https://openalex.org/W4293117570","https://openalex.org/W4306959132","https://openalex.org/W4366988324","https://openalex.org/W4368240987","https://openalex.org/W4384030663","https://openalex.org/W4385288180","https://openalex.org/W4386065249","https://openalex.org/W4390821185","https://openalex.org/W4398175315","https://openalex.org/W4401698164"],"related_works":[],"abstract_inverted_index":{"Abstract":[0],"Information":[1],"security":[2,26],"is":[3,42,71],"becoming":[4],"an":[5,17],"increasingly":[6],"critical":[7],"concern":[8],"for":[9,170,173,190],"organizations":[10,87,105],"with":[11],"IT":[12,91],"infrastructures.":[13],"The":[14,74],"assets":[15],"of":[16,67,137,176],"organization":[18],"are":[19,55,119],"vulnerable":[20],"to":[21,44,58,90,96,114,153,199],"both":[22],"internal":[23],"and":[24,47,61,69,98,143,148,167,178,193],"external":[25],"threats,":[27,146],"which":[28],"exploit":[29],"potential":[30,111],"vulnerabilities,":[31,147],"whether":[32],"identified":[33],"or":[34,116],"not.":[35],"As":[36],"a":[37],"result,":[38],"effective":[39],"Risk":[40,140],"Management":[41,141],"essential":[43],"safeguard":[45],"data":[46],"assets.":[48],"In":[49,84],"the":[50,59,65,128,135,145,164,182,188,196,201],"digital":[51,94,159],"age,":[52],"where":[53],"individuals":[54],"constantly":[56],"connected":[57],"internet":[60],"share":[62],"personal":[63],"information,":[64],"likelihood":[66],"cyber-attacks":[68],"threats":[70],"significantly":[72],"higher.":[73],"COVID-19":[75],"pandemic":[76],"has":[77],"further":[78,191],"amplified":[79],"cybersecurity":[80],"risks":[81,112,149,172],"within":[82],"organizations.":[83],"response,":[85],"many":[86],"have":[88,124],"turned":[89],"outsourcing,":[92],"accelerating":[93],"adoption":[95],"recover":[97],"build":[99],"resilience":[100],"against":[101],"future":[102],"disruptions.":[103],"However,":[104],"now":[106],"face":[107],"increased":[108],"concerns":[109],"regarding":[110],"linked":[113],"products":[115],"services":[117],"that":[118],"outsourced,":[120],"as":[121],"they":[122,130],"often":[123],"limited":[125],"visibility":[126],"into":[127],"technology":[129],"acquire.":[131],"This":[132],"paper":[133],"researches":[134],"field":[136],"Supply":[138],"Chain":[139],"(SCRM)":[142],"explores":[144],"faced":[150],"by":[151],"SCRM,":[152],"identify":[154],"its":[155],"criticality":[156],"in":[157,181,195],"today\u2019s":[158],"world.":[160],"Also,":[161],"it":[162,186],"identifies":[163],"methods,":[165],"principles,":[166],"standards":[168],"available":[169],"managing":[171],"different":[174],"types":[175],"suppliers":[177],"service":[179],"providers":[180],"supply":[183],"chain.":[184],"Finally,":[185],"emphasizes":[187],"need":[189],"research":[192],"development":[194],"SCRM":[197],"field,":[198],"address":[200],"evolving":[202],"challenges.":[203]},"counts_by_year":[],"updated_date":"2026-03-27T05:58:40.876381","created_date":"2026-01-23T00:00:00"}
