Supply Chain Cybersecurity and Small and Medium-Sized Enterprises (SMEs): Exploring Shortcomings in Third Party Risk Management of SMEs

被引:0
作者
Kwong, Jillian K. [1 ]
Pearlson, Keri [1 ]
机构
[1] MIT, Cambridge, MA 02139 USA
来源
PROCEEDINGS OF THE 57TH ANNUAL HAWAII INTERNATIONAL CONFERENCE ON SYSTEM SCIENCES | 2024年
关键词
Cybersecurity; Small and Medium-Sized Enterprises; Third Party Risk Assessments; Supply Chains; Cyber Risk Management; CYBER;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Small and medium-sized enterprises (SMEs) have long been known to be a weak link in supply chain cybersecurity. Despite their crucial role in the global supply chain, SMEs and their struggle to increase cyber resiliency and improve their defenses is understudied in academic literature. This paper uses qualitative research methods to conduct an empirical study of the challenges SMEs encounter when participating in third party cybersecurity risk assessments. Using interviews with cybersecurity and supply chain practitioners, this study provides an overview of four major risk assessment methods (i.e., questionnaires, audits and certifications, security rating services, and direct testing) and the problems that arise when companies apply tools designed for large corporations to SMEs. Results discuss how and why traditional methods fail and offers insights on how to improve third party risk of SMEs moving forward.
引用
收藏
页码:6656 / 6664
页数:9
相关论文
共 30 条
[1]   Cybersecurity Risk Management in Small and Medium-Sized Enterprises: A Systematic Review of Recent Evidence [J].
Alahmari, Abdulmajeed ;
Duncan, Bob .
2020 INTERNATIONAL CONFERENCE ON CYBER SITUATIONAL AWARENESS, DATA ANALYTICS AND ASSESSMENT (CYBER SA 2020), 2020,
[2]  
Alshboul Y, 2015, AMCIS 2015 PROCEEDINGS
[3]   Information systems for supply chain management: uncertainties, risks and cyber security [J].
Boiko, Andrii ;
Shendryk, Vira ;
Boiko, Olha .
ICTE IN TRANSPORTATION AND LOGISTICS 2018 (ICTE 2018), 2019, 149 :65-70
[4]   Defending digital supply chains: Evidence from a decade-long research program [J].
Boyson, Sandor ;
Corsi, Thomas M. ;
Paraskevas, John -Patrick .
TECHNOVATION, 2022, 118
[5]   Cyber supply chain risk management: Revolutionizing the strategic control of critical IT systems [J].
Boyson, Sandor .
TECHNOVATION, 2014, 34 (07) :342-353
[6]   Risk management practices in information security: Exploring the status quo in the DACH region [J].
Brunner, Michael ;
Sauerwein, Clemens ;
Felderer, Michael ;
Breu, Ruth .
COMPUTERS & SECURITY, 2020, 92
[7]   Cascading information on best practice: Cyber security risk management in UK micro and small businesses and the role of IT companies [J].
Cartwright, Anna ;
Cartwright, Edward ;
Edun, Esther Solomon .
COMPUTERS & SECURITY, 2023, 131
[8]  
Charmaz K., 2006, Constructing Grounded Theory
[9]   Managing cyber and information risks in supply chains: insights from an exploratory analysis [J].
Colicchia, Claudia ;
Creazza, Alessandro ;
Menachof, David A. .
SUPPLY CHAIN MANAGEMENT-AN INTERNATIONAL JOURNAL, 2019, 24 (02) :215-240
[10]  
Crowdstrike, 2021, WHAT IS SUPPL CHAIN