|
[1]
|
Masip-Bruin, X., Marín-Tordera, E., Ruiz, J., Jukan, A., Trakadas, P., Cernivec, A., et al. (2021) Cybersecurity in ICT Supply Chains: Key Challenges and a Relevant Architecture. Sensors, 21, Article 6057. [Google Scholar] [CrossRef] [PubMed]
|
|
[2]
|
Deane, J., Baker, W. and Rees, L. (2022) Cybersecurity in Supply Chains: Quantifying Risk. Journal of Computer Information Systems, 63, 507-521. [Google Scholar] [CrossRef]
|
|
[3]
|
Xu, L., Li, Y., Lin, Y., Tang, C. and Yao, Q. (2023) Supply Chain Cybersecurity Investments with Interdependent Risks under Different Information Exchange Modes. International Journal of Production Research, 62, 2034-2059. [Google Scholar] [CrossRef]
|
|
[4]
|
ISBuzz Team (2020) 8 Million UK Shopping Records Exposed. https://informationsecuritybuzz.com/8-million-uk-shopping-records-exposed/
|
|
[5]
|
Gong, C., Ignatius, J., Song, H., Chai, J. and Day, S.J. (2024) The Impact of Platform’s Information Sharing on Manufacturer Encroachment and Selling Format Decision. European Journal of Operational Research, 317, 141-155. [Google Scholar] [CrossRef]
|
|
[6]
|
Ha, A.Y., Luo, H. and Shang, W. (2022) Supplier Encroachment, Information Sharing, and Channel Structure in Online Retail Platforms. Production and Operations Management, 31, 1235-1251. [Google Scholar] [CrossRef]
|
|
[7]
|
(2021) Today at Amazon Accelerate: Amazon Announces Product Opportunity Explorer to Help Third-Party Sellers Identify New Products to Sell in Amazon’s Store. https://press.aboutamazon.com/2021/10/today-at-amazon-accelerate-amazon-announces-product-opportunity-explorer-to-help-third-party-sellers-identify-new-products-to-sell-in-amazons-store
|
|
[8]
|
Colicchia, C., Creazza, A., Noè, C. and Strozzi, F. (2019) Information Sharing in Supply Chains: A Review of Risks and Opportunities Using the Systematic Literature Network Analysis (SLNA). Supply Chain Management: An International Journal, 24, 5-21. [Google Scholar] [CrossRef]
|
|
[9]
|
Kamiya, S., Kang, J., Kim, J., Milidonis, A. and Stulz, R.M. (2021) Risk Management, Firm Reputation, and the Impact of Successful Cyberattacks on Target Firms. Journal of Financial Economics, 139, 719-749. [Google Scholar] [CrossRef]
|
|
[10]
|
Crosignani, M., Macchiavelli, M. and Silva, A.F. (2023) Pirates without Borders: The Propagation of Cyberattacks through Firms’ Supply Chains. Journal of Financial Economics, 147, 432-448. [Google Scholar] [CrossRef]
|
|
[11]
|
Li, Y. and Xu, L. (2020) Cybersecurity Investments in a Two-Echelon Supply Chain with Third-Party Risk Propagation. International Journal of Production Research, 59, 1216-1238. [Google Scholar] [CrossRef]
|
|
[12]
|
Chen, K., Liu, J., Huang, Z. and Wang, S. (2024) Information Sharing Strategy and Channel Selection with Substitutable Products. International Journal of Production Economics, 268, Article ID: 109129. [Google Scholar] [CrossRef]
|
|
[13]
|
尤明钏, 张智勇, 石永强. 数据驱动营销使能下信息共享与渠道扩张策略研究[J]. 管理学报, 2025, 22(5): 928-937.
|
|
[14]
|
Dash, A., Sarmah, S.P., Tiwari, M.K., Jena, S.K. and Glock, C.H. (2024) Cybersecurity Investments in Supply Chains with Two-Stage Risk Propagation. Computers & Industrial Engineering, 197, Article ID: 110519. [Google Scholar] [CrossRef]
|
|
[15]
|
Wu, Y., Feng, G. and Fung, R.Y.K. (2018) Comparison of Information Security Decisions under Different Security and Business Environments. Journal of the Operational Research Society, 69, 747-761. [Google Scholar] [CrossRef]
|
|
[16]
|
王文隆, 姚锐, 张涑贤. 考虑制造商创新的供应链双向需求信息共享研究[J]. 中国管理科学, 2022, 30(5): 226-235.
|