Please use this identifier to cite or link to this item: https://doi.org/10.15480/882.1491
This item is licensed with a CreativeCommons licence by-sa/4.0
DC FieldValueLanguage
dc.contributor.authorSchauer, Stefan-
dc.contributor.authorStamer, Martin-
dc.contributor.authorBosse, Claudia-
dc.contributor.authorPavlidis, Michalis-
dc.contributor.authorMouratidis, Haralambos-
dc.contributor.authorKönig, Sandra-
dc.contributor.authorPapastergiou, Spyros-
dc.contributor.editorKersten, Wolfgangde_DE
dc.contributor.editorBlecker, Thorstende_DE
dc.contributor.editorRingle, Christian M.de_DE
dc.date.accessioned2017-11-30T13:44:27Z-
dc.date.available2017-11-30T13:44:27Z-
dc.date.issued2017-10-
dc.identifier.citationDigitalization in supply chain management and logisticsde_DE
dc.identifier.isbn9783745043280de_DE
dc.identifier.issn2365-5070de_DE
dc.identifier.urihttp://tubdok.tub.tuhh.de/handle/11420/1494-
dc.description.abstractMaritime information infrastructures have developed to highly interrelated cyber ecosystems, where ports as well as their partners are connected in dynamic Information and Communication Technology (ICT)-based maritime supply chains. This makes them open and vulnerable to the rapidly changing ICT threat landscape. Hence, attacks on a seemingly isolated system of one business partner may propagate through the whole supply chain, causing cascading effects and resulting in large-scale impacts. In this article, we want to present a novel risk management methodology to assess the risk level of an entire maritime supply chain. This methodology builds upon publicly available information, well-defined mathematical approaches and best practices to automatically identify and assess vulnerabilities and potential threats of the involved cyber assets. This leads to a constantly updated risk evaluation of each business partner’s cyber assets together with their cyber interconnections with other business partners. The presented risk management methodology is based on qualitative risk scales, which makes the assessment as well as the results more intuitive. Furthermore, it enables a holistic view on all of the integrated ICT-systems as well as their interdependencies and thus can increase the security level of both a whole supply chain and every participating business partner.en
dc.language.isoende_DE
dc.publisherepublide_DE
dc.relation.ispartofProceedings of the Hamburg International Conference of Logistics (HICL)de_DE
dc.relation.ispartofseriesProceedings of the Hamburg International Conference of Logistics (HICL);23-
dc.rightsinfo:eu-repo/semantics/openAccess-
dc.subjectIT securityde_DE
dc.subjectcyber risk managementde_DE
dc.subjectcyber risk assessmentde_DE
dc.subjectmaritime supply chainsde_DE
dc.subject.ddc330: Wirtschaftde_DE
dc.titleAn adaptive supply chain cyber risk management methodologyde_DE
dc.typeinProceedingsde_DE
dc.identifier.urnurn:nbn:de:gbv:830-88217359-
dc.identifier.doi10.15480/882.1491-
dc.type.dinicontributionToPeriodical-
dc.subject.ddccode330-
dcterms.DCMITypeText-
tuhh.identifier.urnurn:nbn:de:gbv:830-88217359de_DE
tuhh.oai.showtrue-
dc.identifier.hdl11420/1494-
tuhh.abstract.englishMaritime information infrastructures have developed to highly interrelated cyber ecosystems, where ports as well as their partners are connected in dynamic Information and Communication Technology (ICT)-based maritime supply chains. This makes them open and vulnerable to the rapidly changing ICT threat landscape. Hence, attacks on a seemingly isolated system of one business partner may propagate through the whole supply chain, causing cascading effects and resulting in large-scale impacts. In this article, we want to present a novel risk management methodology to assess the risk level of an entire maritime supply chain. This methodology builds upon publicly available information, well-defined mathematical approaches and best practices to automatically identify and assess vulnerabilities and potential threats of the involved cyber assets. This leads to a constantly updated risk evaluation of each business partner’s cyber assets together with their cyber interconnections with other business partners. The presented risk management methodology is based on qualitative risk scales, which makes the assessment as well as the results more intuitive. Furthermore, it enables a holistic view on all of the integrated ICT-systems as well as their interdependencies and thus can increase the security level of both a whole supply chain and every participating business partner.de_DE
tuhh.publisher.urlhttps://www.epubli.de/shop/buch/2000000069144-
tuhh.identifier.doi10.15480/882.1491-
tuhh.type.opusInProceedings (Aufsatz / Paper einer Konferenz etc.)de
tuhh.gvk.hasppnfalse-
tuhh.hasurnfalse-
tuhh.series.id15de_DE
tuhh.series.nameProceedings of the Hamburg International Conference of Logistics (HICL)-
openaire.rightsinfo:eu-repo/semantics/openAccessde_DE
dc.type.drivercontributionToPeriodical-
dc.rights.ccby-sade_DE
dc.rights.ccversion4.0de_DE
dc.type.casraiConference Paperen
tuhh.container.startpage405de_DE
tuhh.container.endpage425de_DE
dc.relation.conferenceHamburg International Conference of Logistics (HICL) 2017de_DE
tuhh.relation.ispartofseriesnumber23de
item.fulltextWith Fulltext-
item.creatorOrcidSchauer, Stefan-
item.creatorOrcidStamer, Martin-
item.creatorOrcidBosse, Claudia-
item.creatorOrcidPavlidis, Michalis-
item.creatorOrcidMouratidis, Haralambos-
item.creatorOrcidKönig, Sandra-
item.creatorOrcidPapastergiou, Spyros-
item.creatorGNDSchauer, Stefan-
item.creatorGNDStamer, Martin-
item.creatorGNDBosse, Claudia-
item.creatorGNDPavlidis, Michalis-
item.creatorGNDMouratidis, Haralambos-
item.creatorGNDKönig, Sandra-
item.creatorGNDPapastergiou, Spyros-
item.grantfulltextopen-
crisitem.author.deptMaritime Logistik W-12-
crisitem.author.orcid0000-0001-5395-3866-
Appears in Collections:Publications (tub.dok)
Files in This Item:
File Description SizeFormat
schauer_stamer_bosse_pavlidis_mouratidis_könig_papastergiou_cyber_risk_management_hicl_2017.pdfAn Adaptive Supply Chain Cyber Risk Management Methodology1,14 MBAdobe PDFThumbnail
View/Open
Show simple item record

Page view(s)

194
Last Week
2
Last month
5
checked on Apr 23, 2019

Download(s)

162
checked on Apr 23, 2019

Google ScholarTM

Check

Export

This item is licensed under a Creative Commons License Creative Commons