Vis enkel innførsel

dc.contributor.authorAarland, Mari
dc.contributor.authorGjøsæter, Terje
dc.date.accessioned2023-02-21T12:46:53Z
dc.date.available2023-02-21T12:46:53Z
dc.date.created2022-11-29T14:43:13Z
dc.date.issued2022
dc.identifier.citationAarland, M. & Gjøsæter, T. (2022). Digital Supply Chain Vulnerabilities in Critical Infrastructure: A Systematic Literature Review on Cybersecurity in the Energy Sector. Proceedings of the International Conference on Information Systems Security and Privacy (ICISSP), 1, 326-333.en_US
dc.identifier.issn2184-4356
dc.identifier.urihttps://hdl.handle.net/11250/3052765
dc.description.abstractThe main purpose of this paper is to identify the current state of the art on digital supply chain cybersecurity risks in critical infrastructure and how the term resilience is used in this context. To achieve this objective, the authors applied a systematic literature review method that summarises and analyses the studies relevant for the research topic. In total 33 papers were identified. The results show that limited research is done on supply chain risks in critical infrastructure. Relevant frameworks and methods for resilience of supply chains have also been identified. These frameworks and methods could be very beneficial for a more holistic management of cybersecurity risks in the increasingly complex supply chains within critical infrastructure.en_US
dc.language.isoengen_US
dc.publisherSciTePressen_US
dc.rightsAttribution-NonCommercial-NoDerivatives 4.0 Internasjonal*
dc.rights.urihttp://creativecommons.org/licenses/by-nc-nd/4.0/deed.no*
dc.titleDigital Supply Chain Vulnerabilities in Critical Infrastructure: A Systematic Literature Review on Cybersecurity in the Energy Sectoren_US
dc.typePeer revieweden_US
dc.typeJournal articleen_US
dc.description.versionpublishedVersionen_US
dc.rights.holder© 2022 SCITEPRESSen_US
dc.subject.nsiVDP::Samfunnsvitenskap: 200::Biblioteks- og informasjonsvitenskap: 320::Informasjons- og kommunikasjonssystemer: 321en_US
dc.subject.nsiVDP::Samfunnsvitenskap: 200en_US
dc.source.pagenumber326-333en_US
dc.source.volume1en_US
dc.source.journalProceedings of the International Conference on Information Systems Security and Privacy (ICISSP)en_US
dc.identifier.doihttps://doi.org/10.5220/0010803800003120
dc.identifier.cristin2084263
dc.description.localcodePaid open accessen_US
cristin.qualitycode1


Tilhørende fil(er)

Thumbnail

Denne innførselen finnes i følgende samling(er)

Vis enkel innførsel

Attribution-NonCommercial-NoDerivatives 4.0 Internasjonal
Med mindre annet er angitt, så er denne innførselen lisensiert som Attribution-NonCommercial-NoDerivatives 4.0 Internasjonal