Supply Chain Security in Information Systems: A Survey
Keywords:
supply chain security, information systems;, cybersecurity, risk management, digital threats, data protectionAbstract
Supply chain security in information systems is a vital topic in the digital age, as it faces many challenges related to protecting data and information transmitted across supply networks. This economic study aims to analyze the potential risks that information systems may face in the context of the supply chain, in addition to the prevention strategies that can be adopted to reduce those risks. It also highlights the relationship between securing the supply chain and achieving economic efficiency in companies, which enhances the stability of business operations and increases their effectiveness. Supply chain security in information systems is also a topic of utmost mportance in light of the rapid technological transformations that the world is witnessing today. Information systems contribute to facilitating business operations and achieving efficiency, but the exposure of these systems to security risks such as hacking and digital threats may significantly affect the stability and reputation of companies. This economic study aims to analyze the challenges facing information systems in the supply chain, identify their
economic impacts on institutional performance, and review the strategies that companies can adopt to enhance security and data protection, and achieve a balance between cost and security to maintain business continuity.
References
Keeper security. (2021). Supply Chain Security Solutions. Retrieved from Keeper Security website.
Telecome Review Arabia. (2020). Cybersecurity in Supply Chain Management. Telecome Review Arabia Journal.
Cyberbedia blog. (2021). Supply Chain Attacks and Defense Strategies. Cyberbedia Publications.
Zalud, B. (2016, April 1). Supply chain security challenges in the digital age. Security Magazine.
Sharma, A., & Jain, D.K. (2020). A Roadmap to Industry 4.0: Smart Production, Sharp Business and Sustainable Development (pp. 23–38). Springer: Cham, Switzerland.
Korpela, K., Hallikas, J., & Dahlberg, T. (2017). Digital supply chain transformation toward blockchain integration. In Proceedings of the 50th Hawaii International Conference on System Sciences.
Nakamoto, S. (2009). Bitcoin: A peer-to-peer electronic cash system.
Ashenden, D. (2008). Information security management: a human challenge. Information Security Technical Report, 13(4), 195-201.
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2025 PLOMS AI

This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.
PLOMS Journals Copyright Statement
PLOMS LLC. grants you a non-exclusive, royalty-free, revocable license to:
- Academic Journals licenses all works published under the Creative Commons Attribution 4.0 International License. This license grants anybody the right to reproduce, redistribute, remix, transmit, and modify the work, as long as the original work and source are properly cited.
- PLOMS LLC. grants you no further rights in respect to this website or its content.
Without the prior consent of PLOMS LLC, this website and its content (in any form or medium) may not be changed or converted in any manner. To avoid doubt, you must not modify, edit, alter, convert, publish, republish, distribute, redistribute, broadcast, rebroadcast, display, or play in public any of the content on this website (in any form or medium) without PLOMS LLC's prior written approval.
Permissions
Permission to use the copyright content on this website may be obtained by emailing to:
PLOMS LLC. takes copyright protection very seriously. If PLOMS LLC. discovers that you have violated the license above by using its copyright materials, PLOMS LLC. may pursue legal action against you, demanding monetary penalties and an injunction to prevent you from using such materials. Additionally, you may be required to pay legal fees.
If you become aware of any unauthorized use of PLOMS LLC. copyright content that violates or may violate the license above, please contact :
Infringing content
If you become aware of any content on the website that you feel violates your or another person's copyright, please notify [email protected].