Agrawal & Das (2011)Agrawal, S., & Das, M. L. (2011). Internet of Things: a paradigm shift of future Internet applications. In Proceedings of the Nirma University International Conference on Engineering (pp. 1-7). Piscataway: IEEE. http://dx.doi.org/10.1109/NUiConE.2011.6153246. http://dx.doi.org/10.1109/NUiConE.2011.6...
|
|
|
|
|
|
|
x |
|
|
|
|
|
|
|
|
|
|
|
|
|
Ahram et al. (2017)Ahram, T., Sargolzaei, A., Sargolzaei, S., Daniels, J., & Amaba, B. (2017). Blockchain technology innovations. In Proceedings of the IEEE Technology & Engineering Management Conference (TEMSCON) (pp. 137-141). Piscataway: IEEE. http://dx.doi.org/10.1109/TEMSCON.2017.7998367. http://dx.doi.org/10.1109/TEMSCON.2017.7...
|
|
|
|
|
|
|
x |
|
|
|
|
|
|
|
|
|
|
|
|
|
Alotaibi & Mehmood (2017)Alotaibi, S., & Mehmood, R. (2017). Big data enabled healthcare supply chain management: opportunities and challenges. In Proceedings of the International Conference on Smart Cities, Infrastructure, Technologies and Applications (pp. 207-215). Cham: Springer.
|
|
|
|
|
x |
|
|
|
|
x |
|
x |
|
|
|
|
|
|
|
|
Amudhavel et al. (2015)Amudhavel, J., Padmapriya, V., Gowri, V., Lakshmipriya, K., Kumar, K. P., & Thiyagarajan, B. (2015). Perspectives, motivations and implications of big data analytics. In Proceedings of the International Conference on Advanced Research in Computer Science Engineering & Technology (ICARCSET 2015) (p. 34). New York: ACM. http://dx.doi.org/10.1145/2743065.2743099. http://dx.doi.org/10.1145/2743065.274309...
|
|
|
|
|
x |
|
x |
|
|
|
|
|
|
|
|
|
|
|
|
|
Arya et al. (2017)Arya, V., Sharma, P., Singh, A., & Silva, P. T. M. (2017). An exploratory study on supply chain analytics applied to spare parts supply chain. Benchmarking, 24(6), 1571-1580. http://dx.doi.org/10.1108/BIJ-04-2016-0053. http://dx.doi.org/10.1108/BIJ-04-2016-00...
|
|
|
x |
|
|
x |
|
|
|
|
|
x |
|
|
|
|
x |
|
|
|
Bailey et al. (2016)Bailey, G., Moss, C., Whittaker, J. F., & Millette, A. L. (2016). Digital supply chains: a frontside flip. New York: Digital Supply Chain Institute. Retrieved in 2018, July 21, from https://www.thecge.net/dsci/
https://www.thecge.net/dsci/...
|
|
|
|
|
|
|
x |
|
|
|
|
|
|
|
|
|
|
|
|
|
Barreto et al. (2017)Barreto, L., Amaral, A., & Pereira, T. (2017). Industry 4.0 implications in logistics: an overview. Procedia Manufacturing, 13, 1245-1252. http://dx.doi.org/10.1016/j.promfg.2017.09.045. http://dx.doi.org/10.1016/j.promfg.2017....
|
|
|
|
|
|
|
x |
|
|
|
|
|
|
|
|
|
|
|
|
|
Bhargava et al. (2013)Bhargava, B., Ranchal, R., & Othmane, L. B. (2013). Secure information sharing in digital supply chains. In Proceedings of the 3rd IEEE International Advance Computing Conference (IACC) (pp. 1636-1640). Piscataway: IEEE.
|
|
|
|
|
|
|
x |
|
|
|
|
|
|
|
|
|
|
|
|
|
Bienhaus & Haddud (2018)Bienhaus, F., & Haddud, A. (2018). Procurement 4.0: factors influencing the digitisation of procurement and supply chains. Business Process Management Journal, 24(4), 965-984. http://dx.doi.org/10.1108/BPMJ-06-2017-0139. http://dx.doi.org/10.1108/BPMJ-06-2017-0...
|
|
|
|
|
|
|
|
|
|
|
|
x |
|
x |
x |
|
|
|
|
|
Burmester et al. (2017)Burmester, M., Munilla, J., Ortiz, A., & Caballero-Gil, P. (2017). An RFID-based smart structure for the supply chain: resilient scanning proofs and ownership transfer with positive secrecy capacity channels. Sensors, 17(7), 1562. http://dx.doi.org/10.3390/s17071562. PMid:28677637. http://dx.doi.org/10.3390/s17071562...
|
|
|
|
|
|
|
x |
|
|
|
|
|
|
|
|
|
|
|
|
|
Büyüközkan & Göçer (2018)Büyüközkan, G., & Göçer, F. (2018). Digital supply chain: literature review and a proposed framework for future research. Computers in Industry, 97, 157-177. http://dx.doi.org/10.1016/j.compind.2018.02.010. http://dx.doi.org/10.1016/j.compind.2018...
|
|
|
|
x |
|
|
x |
|
x |
x |
|
|
|
|
|
x |
x |
|
x |
x |
Casey & Wong (2017)Casey, M., & Wong, P. (2017, 13 march). Global supply chains are about to get better, thanks to blockchain. Harvard Business Review.
|
|
|
|
|
|
|
|
|
|
x |
|
|
|
|
|
|
|
|
|
|
National Cyber Security Centre (2015)National Cyber Security Centre – NCSC. (2015) Cert-UK: cyber-security risks in the supply chain. London. Retrieved in 2018, May 7, from https://www.ncsc.gov.uk/content/files/protected_files/guidance_files/Cyber-security-risks-in-the-supply-chain.pdf
https://www.ncsc.gov.uk/content/files/pr...
|
|
|
|
|
|
|
x |
|
|
|
|
|
|
|
|
|
|
|
|
|
Kumar Ch & Kameswara Rao (2018)Kumar Ch, M., & Kameswara Rao, M. (2018). Critical review attacks and countermeasures in internet of things enabled environments. IACSIT International Journal of Engineering and Technology, 7(2.7), 163-167. http://dx.doi.org/10.14419/ijet.v7i2.7.10284. http://dx.doi.org/10.14419/ijet.v7i2.7.1...
|
|
|
|
|
|
|
x |
|
|
|
|
|
|
|
|
|
|
|
|
|
Chang et al. (2017)Chang, P. Y., Hwang, M. S., & Yang, C. C. (2017). A blockchain-based traceable certification system. In Proceedings of the International Conference on Security with Intelligent Computing and Big-data Services (pp. 363-369). Cham: Springer.
|
|
|
|
|
|
|
x |
|
|
|
|
|
|
|
|
|
|
|
|
|
Chamekh et al. (2017)Chamekh, M., Hamdi, M., & El Asmi, S. (2017). A new architecture for supply-chain management. In Proceedings of the 14th IEEE Annual Consumer Communications & Networking Conference (CCNC) (pp. 77-82). Piscataway: IEEE. http://dx.doi.org/10.1109/CCNC.2017.7983085. http://dx.doi.org/10.1109/CCNC.2017.7983...
|
|
|
|
|
|
|
x |
|
|
|
|
|
|
|
|
|
|
|
|
|
Chen (2018)Chen, R. Y. (2018). Intelligent predictive food traceability cyber physical system in agriculture food supply chain. Journal of Physics: Conference Series, 1026(1), 012017. http://dx.doi.org/10.1088/1742-6596/1026/1/012017. http://dx.doi.org/10.1088/1742-6596/1026...
|
|
|
|
x |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Chen et al. (2017)Chen, H., Xue, G., & Wang, Z. (2017). Efficient and reliable missing tag identification for large-scale RFID systems with unknown tags. IEEE Internet of Things Journal, 4(3), 736-748. http://dx.doi.org/10.1109/JIOT.2017.2664810. http://dx.doi.org/10.1109/JIOT.2017.2664...
|
|
|
|
x |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Choi et al. (2018)Choi, T. M., Wallace, S. W., & Wang, Y. (2018). Big data analytics in operations management. Production and Operations Management, 27(10), 1868-1883. http://dx.doi.org/10.1111/poms.12838. http://dx.doi.org/10.1111/poms.12838...
|
x |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Chugh et al. (2016)Chugh, N., Kumar, A., & Aggarwal, A. (2016). Security aspects of a RFID-sensor integrated low-powered devices for internet-of-things. In Proceedings of the Fourth International Conference on Parallel, Distributed and Grid Computing (PDGC) (pp. 759-763). Piscataway: IEEE. http://dx.doi.org/10.1109/PDGC.2016.7913223. http://dx.doi.org/10.1109/PDGC.2016.7913...
|
|
|
|
|
|
|
x |
|
|
|
|
|
|
|
|
|
|
|
|
|
Clancy (2017)Clancy, H. (2017, 6 february). The blockchain's emerging role in sustainability. GreenBiz.
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
x |
|
|
|
|
Corici et al. (2016)Corici, A. A., Emmelmann, M., Luo, J., Shrestha, R., Corici, M., & Magedanz, T. (2016). IoT inter-security domain trust transfer and service dispatch solution. In Proceedings of the IEEE 3rd World Forum on Internet of Things (WF-IoT) (pp. 694-699). Piscataway: IEEE.
|
|
|
|
|
|
|
x |
|
|
|
|
|
|
|
|
|
|
|
|
|
Das (2015)Das, M. L. (2015). Privacy and security challenges in internet of things (pp. 33-48). In Proceedings of the International Conference on Distributed Computing and Internet Technology. Cham: Springer.
|
|
|
|
|
|
|
x |
|
|
|
|
|
|
|
|
|
|
|
|
|
Fraj et al. (2017)Fraj, R. B., Beroulle, V., Fourty, N., & Meddeb, A. (2017). A global approach for the improvement of UHF RFID safety and security. In Proceedings of the 12th International Conference on Design & Technology of Integrated Systems in Nanoscale Era (DTIS) (pp. 1-2). Piscataway: IEEE.
|
|
|
|
x |
|
|
x |
|
|
|
|
|
|
|
|
|
|
|
|
|
Gu (2018)Gu, C. (2018). Fast discrepancy identification for RFID-enabled IoT networks. IEEE Access: Practical Innovations, Open Solutions, 6, 6194-6204. http://dx.doi.org/10.1109/ACCESS.2017.2785810. http://dx.doi.org/10.1109/ACCESS.2017.27...
|
|
|
|
x |
x |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Haddud et al. (2017)Haddud, A., DeSouza, A., Khare, A., & Lee, H. (2017). Examining potential benefits and challenges associated with the Internet of Things integration in supply chains. Journal of Manufacturing Technology Management, 28(8), 1055-1085. http://dx.doi.org/10.1108/JMTM-05-2017-0094. http://dx.doi.org/10.1108/JMTM-05-2017-0...
|
|
x |
x |
|
x |
x |
x |
|
x |
|
x |
|
|
x |
x |
|
x |
|
x |
x |
Hallman et al. (2014)Hallman, S., Rakhimov, J., Plaisent, M., & Bernard, P. (2014) Big data: preconditions to productivity. In Proceedings of the IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom) (pp. 727-731). Piscataway: IEEE.
|
|
|
|
|
|
|
x |
|
|
|
|
x |
|
|
|
|
|
|
|
|
Harrison et al. (2016)Harrison, R., Vera, D., & Ahmad, B. (2016). Engineering methods and tools for cyber-physical automation systems. Proceedings of the IEEE, 104(5), 973-985. http://dx.doi.org/10.1109/JPROC.2015.2510665. http://dx.doi.org/10.1109/JPROC.2015.251...
|
|
x |
|
|
|
|
|
|
x |
|
|
|
|
|
|
|
|
|
|
|
He et al. (2016)He, H., Maple, C., Watson, T., Tiwari, A., Mehnen, J., Jin, Y., & Gabrys, B. (2016). The security challenges in the IoT enabled cyber-physical systems and opportunities for evolutionary computing & other computational intelligence. In Proceedings of the IEEE Congress on Evolutionary Computation (CEC) (pp. 1015-1021). Piscataway: IEEE. http://dx.doi.org/10.1109/CEC.2016.7743900. http://dx.doi.org/10.1109/CEC.2016.77439...
|
|
|
|
|
|
|
x |
|
|
|
|
|
|
|
|
|
|
|
|
|
Hiromoto et al. (2017)Hiromoto, R. E., Haney, M., & Vakanski, A. (2017). A secure architecture for IoT with supply chain risk management. In Proceedings of the 9th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS) (pp. 431-435). Piscataway: IEEE.
|
|
|
|
|
|
|
x |
|
|
|
|
|
|
|
|
|
|
|
|
|
Isasi et al. (2015)Isasi, N. K. G., Frazzon, E. M., & Uriona, M. (2015). Big data and business analytics in the supply chain: a review of the literature. IEEE Latin America Transactions, 13(10), 3382-3391. http://dx.doi.org/10.1109/TLA.2015.7387245. http://dx.doi.org/10.1109/TLA.2015.73872...
|
|
|
|
|
x |
|
|
|
|
x |
|
|
|
|
|
x |
|
|
|
|
Ivanov et al. (2016)Ivanov, D., Dolgui, A., Sokolov, B., Werner, F., & Ivanova, M. (2016). A dynamic model and an algorithm for short-term supply chain scheduling in the smart factory industry 4.0. International Journal of Production Research, 54(2), 386-402. http://dx.doi.org/10.1080/00207543.2014.999958. http://dx.doi.org/10.1080/00207543.2014....
|
|
|
|
|
|
|
|
|
|
|
x |
|
|
|
|
|
|
|
|
|
Ivanov et al. (2016)Ivanov, D., Dolgui, A., Sokolov, B., Werner, F., & Ivanova, M. (2016). A dynamic model and an algorithm for short-term supply chain scheduling in the smart factory industry 4.0. International Journal of Production Research, 54(2), 386-402. http://dx.doi.org/10.1080/00207543.2014.999958. http://dx.doi.org/10.1080/00207543.2014....
|
|
|
|
|
|
|
|
|
|
|
x |
|
|
|
|
|
|
|
|
|
Jeske et al. (2013)Jeske, M., Grüner, M., & Weiß, F. (2013). Big data in logistics: a DHL perspective on how to move beyond the hype. Troisdorf: DHL Customer Solutions & Innovation.
|
|
|
|
|
|
|
x |
|
|
|
|
|
x |
|
|
|
x |
|
|
|
Kache & Seuring (2017)Kache, F., & Seuring, S. (2017). Challenges and opportunities of digital information at the intersection of Big Data Analytics and supply chain management. International Journal of Operations & Production Management, 37(1), 10-36. http://dx.doi.org/10.1108/IJOPM-02-2015-0078. http://dx.doi.org/10.1108/IJOPM-02-2015-...
|
|
x |
x |
|
|
|
x |
|
x |
|
|
|
|
|
x |
x |
x |
|
|
|
Kapoor et al. (2011)Kapoor, G., Zhou, W., & Piramuthu, S. (2011). Multi-tag and multi-owner RFID ownership transfer in supply chains. Decision Support Systems, 52(1), 258-270. http://dx.doi.org/10.1016/j.dss.2011.08.002. http://dx.doi.org/10.1016/j.dss.2011.08....
|
|
|
|
|
|
|
x |
|
|
|
|
|
|
|
|
|
|
|
|
|
Khanna & Sharma (2017)Khanna, P., & Sharma, A. (2017, march). Integrating SCM with internet of things: implication on HR management. In Proceedings of the 2nd International Conference on Internet of things and Cloud Computing (p. 170). New York: ACM. http://dx.doi.org/10.1145/3018896.3056787. http://dx.doi.org/10.1145/3018896.305678...
|
|
|
x |
|
|
|
x |
|
|
x |
|
|
|
|
x |
|
|
|
|
x |
Kshetri (2017a)Kshetri, N. (2017a). Blockchain’s roles in strengthening cybersecurity and protecting privacy. Telecommunications Policy, 41(10), 1027-1038. http://dx.doi.org/10.1016/j.telpol.2017.09.003. http://dx.doi.org/10.1016/j.telpol.2017....
|
|
|
|
|
|
|
x |
|
|
|
|
|
|
|
|
|
|
|
|
|
Kshetri (2017b)Kshetri, N. (2017b). Can blockchain strengthen the internet of things? IT Professional, 19(4), 68-72. http://dx.doi.org/10.1109/MITP.2017.3051335. http://dx.doi.org/10.1109/MITP.2017.3051...
|
|
|
|
|
|
|
x |
|
|
|
|
|
|
|
|
|
|
|
|
|
Kshetri (2018)Kshetri, N. (2018). 1 Blockchain’s roles in meeting key supply chain management objectives. International Journal of Information Management, 39, 80-89. http://dx.doi.org/10.1016/j.ijinfomgt.2017.12.005. http://dx.doi.org/10.1016/j.ijinfomgt.20...
|
x |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Kenny (2017)Kenny, S. (2017). Strengthening the network security supply chain. Computer Fraud & Security, 2017(12), 11-14. http://dx.doi.org/10.1016/S1361-3723(17)30108-2. http://dx.doi.org/10.1016/S1361-3723(17)...
|
|
|
|
|
|
|
x |
|
|
|
|
|
|
|
|
|
|
|
|
|
Kumar et al. (2017)Kumar, K. S., Rao, G. H., Sahoo, S., & Mahapatra, K. K. (2017). Secure split test techniques to prevent IC piracy for IoT devices. Integration, 58, 390-400. http://dx.doi.org/10.1016/j.vlsi.2016.09.004. http://dx.doi.org/10.1016/j.vlsi.2016.09...
|
|
|
|
|
|
|
x |
|
|
|
|
|
|
|
|
|
|
|
|
|
Kumar et al. (2013)Kumar, A., Niu, F., & Ré, C. (2013). Hazy: making it easier to build and maintain big-data analytics. Communications of the ACM, 56(3), 40-49. http://dx.doi.org/10.1145/2428556.2428570. http://dx.doi.org/10.1145/2428556.242857...
|
|
|
x |
|
|
|
|
|
|
|
|
|
|
|
|
|
x |
|
|
|
Kynast & Marjanovic (2016)Kynast, M., & Marjanovic, O. (2016). Big data in supply chain management-applications, challenges and benefits. In Proceedings of the 22nd Americas Conference on Information Systems. San Diego: AMCIS.
|
|
|
x |
|
|
|
|
|
x |
|
|
x |
x |
|
x |
|
|
|
|
|
Lee & Kwon (2016)Lee, J., & Kwon, T. (2016). Secure dissemination of software updates for intelligent mobility in future wireless networks. EURASIP Journal on Wireless Communications and Networking, 2016(1), 250. http://dx.doi.org/10.1186/s13638-016-0746-6. http://dx.doi.org/10.1186/s13638-016-074...
|
|
|
|
|
|
|
x |
|
|
|
|
|
|
|
|
|
|
|
|
|
Lee & Lee (2015)Lee, I., & Lee, K. (2015). The Internet of Things (IoT): applications, investments, and challenges for enterprises. Business Horizons, 58(4), 431-440. http://dx.doi.org/10.1016/j.bushor.2015.03.008. http://dx.doi.org/10.1016/j.bushor.2015....
|
|
|
x |
|
x |
|
x |
|
|
|
|
|
|
|
|
|
x |
|
|
|
Sánchez López et al. (2012)Sánchez López, T., Ranasinghe, D. C., Harrison, M., & McFarlane, D. (2012). Adding sense to the internet of things: an architecture framework for smart object systems. Personal and Ubiquitous Computing, 16(3), 291-308. http://dx.doi.org/10.1007/s00779-011-0399-8. http://dx.doi.org/10.1007/s00779-011-039...
|
|
|
|
|
|
x |
x |
|
x |
|
|
|
|
|
|
|
|
|
|
|
Lu et al. (2013)Lu, T., Guo, X., Xu, B., Zhao, L., Peng, Y., & Yang, H. (2013, september). Next big thing in big data: the security of the ICT supply chain. In Proceedings of the International Conference on Social Computing (pp. 1066-1073). Piscataway: IEEE. http://dx.doi.org/10.1109/SocialCom.2013.172. http://dx.doi.org/10.1109/SocialCom.2013...
|
|
|
|
|
|
|
x |
|
|
|
|
|
|
|
|
|
|
|
|
|
Luszcz (2017)Luszcz, J. (2017). How maverick developers can create risk in the software and IoT supply chain. Network Security, 2017(8), 5-7. http://dx.doi.org/10.1016/S1353-4858(17)30080-6. http://dx.doi.org/10.1016/S1353-4858(17)...
|
|
|
|
|
|
|
x |
|
|
|
|
|
|
|
|
|
|
|
|
|
Makhdoom et al. (2019)Makhdoom, I., Abolhasan, M., Lipman, J., Liu, R. P., & Ni, W. (2019). Anatomy of threats to the internet of things. IEEE Communications Surveys and Tutorials, 21(2), 1636-1675. http://dx.doi.org/10.1109/COMST.2018.2874978. http://dx.doi.org/10.1109/COMST.2018.287...
|
|
|
|
|
|
|
x |
|
|
|
|
|
|
|
|
|
|
|
|
|
Mamun et al. (2018)Mamun, M. S. I., Ghorbani, A. A., Miyaji, A., & Nguyen, U. T. (2018). SupAUTH: a new approach to supply chain authentication for the IoT. Computational Intelligence, 34(2), 582-602. http://dx.doi.org/10.1111/coin.12164. http://dx.doi.org/10.1111/coin.12164...
|
|
|
|
|
|
|
x |
|
|
|
|
|
|
|
|
|
|
|
|
|
McDonald et al. (2016)McDonald, J. T., Kim, Y. C., Andel, T. R., Forbes, M. A., & McVicar, J. (2016). Functional polymorphism for intellectual property protection. In Proceedings of the IEEE International Symposium on Hardware Oriented Security and Trust (HOST) (pp. 61-66). Piscataway: IEEE. http://dx.doi.org/10.1109/HST.2016.7495557. http://dx.doi.org/10.1109/HST.2016.74955...
|
|
|
|
|
|
|
x |
|
|
|
|
|
|
|
|
|
|
|
|
|
Miao & Zhang (2014)Miao, X., & Zhang, D. (2014). The opportunity and challenge of Big Data’s application in distribution grids. In Proceedings of the China International Conference on Electricity Distribution (CICED) (pp. 962-964). Piscataway: IEEE. http://dx.doi.org/10.1109/CICED.2014.6991847. http://dx.doi.org/10.1109/CICED.2014.699...
|
|
|
|
|
|
|
x |
x |
|
|
|
|
|
|
|
|
|
|
|
|
Mikavicaa et al. (2015)Mikavicaa, B., Kostić-Ljubisavljevića, A., & Radonjić, V. (2015). Big data: challenges and opportunities in logistics systems. In Proceedings of the 2nd Logistics International Conference (pp. 185-90). Belgrade: LOGIC.
|
|
|
|
|
x |
|
x |
|
|
|
|
|
|
|
|
|
|
|
|
|
Mohr & Khan (2015)Mohr, S., & Khan, O. (2015). 3D printing and its disruptive impacts on supply chains of the future. Technology Innovation Management Review, 5(11), 20-25. http://dx.doi.org/10.22215/timreview/942. http://dx.doi.org/10.22215/timreview/942...
|
|
|
|
|
|
|
x |
|
|
x |
|
|
|
|
|
|
|
|
|
|
Moniem et al. (2017)Moniem, S. A., Taha, S., & Hamza, H. S. (2017). An anonymous mutual authentication scheme for healthcare RFID systems. In Proceedings of the IEEE SmartWorld, Ubiquitous Intelligence & Computing, Advanced & Trusted Computed, Scalable Computing & Communications, Cloud & Big Data Computing, Internet of People and Smart City Innovation (SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI) (pp. 1-6). Piscataway: IEEE.
|
|
|
|
|
|
|
x |
|
|
|
|
|
|
|
|
|
|
|
|
|
Moyne et al. (2018)Moyne, J., Mashiro, S., & Gross, D. (2018). Determining a security roadmap for the microelectronics industry. In Proceedings of the 29th Annual SEMI Advanced Semiconductor Manufacturing Conference (ASMC) (pp. 291-294). Piscataway: IEEE.
|
|
|
|
|
|
|
x |
|
|
|
|
|
|
|
|
|
|
|
|
|
Mylrea & Gourisetti (2018)Mylrea, M., & Gourisetti, S. N. G. (2018). Blockchain for supply chain cybersecurity, optimization and compliance. In Proceedings of the 2018 Resilience Week (RWS) (pp. 70-76). Piscataway: IEEE.
|
|
|
|
x |
|
|
x |
|
|
|
|
|
|
|
|
|
|
|
|
|
Omitola & Wills (2018)Omitola, T., & Wills, G. (2018). Towards mapping the security challenges of the Internet of Things (IoT) supply chain. Procedia Computer Science, 126, 441-450. http://dx.doi.org/10.1016/j.procs.2018.07.278. http://dx.doi.org/10.1016/j.procs.2018.0...
|
|
|
|
|
|
|
x |
|
|
|
|
|
|
|
|
|
|
|
|
|
Ong et al. (2016)Ong, B. Y., Wen, R., & Zhang, A. N. (2016, december). Data blending in manufacturing and supply chains. In Proceedings of the IEEE International Conference on Big Data (Big Data) (pp. 3773-3778). Piscataway: IEEE.
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
x |
|
|
|
Pearsall (2016)Pearsall, K. (2016). Manufacturing supply chain challenges-globalization and IOT. In Proceedings of the 6th Electronic System-Integration Technology Conference (ESTC) (pp. 1-5). Piscataway: IEEE.
|
|
|
|
|
|
|
|
|
|
|
|
x |
|
|
|
|
|
|
|
|
Pirpilidis et al. (2016)Pirpilidis, F., Voyiatzis, A. G., Pyrgas, L., & Kitsos, P. (2016). An efficient reconfigurable ring oscillator for hardware Trojan detection. In Proceedings of the 20th Pan-Hellenic Conference on Informatics (p. 66). New York: ACM. http://dx.doi.org/10.1145/3003733.3003808. http://dx.doi.org/10.1145/3003733.300380...
|
|
|
|
|
|
|
x |
|
|
|
|
|
|
|
|
|
|
|
|
|
Pishdar et al. (2018)Pishdar, M., Ghasemzadeh, F., Antucheviciene, J., & Saparauskas, J. (2018). Internet of things and its challenges in supply chain management: a rough strength-relation analysis method. Economics and Management, 21(2), 208-222. http://dx.doi.org/10.15240/tul/001/2018-2-014. http://dx.doi.org/10.15240/tul/001/2018-...
|
|
|
|
x |
x |
x |
x |
x |
x |
x |
|
|
|
x |
x |
x |
x |
|
|
|
Queiroz & Telles (2018)Queiroz, M. M., & Telles, R. (2018). Big data analytics in supply chain and logistics: an empirical approach. International Journal of Logistics Management, 29(2), 767-783. http://dx.doi.org/10.1108/IJLM-05-2017-0116. http://dx.doi.org/10.1108/IJLM-05-2017-0...
|
|
|
|
|
|
|
|
|
x |
|
|
x |
|
|
|
|
|
|
|
|
Qian et al. (2018)Qian, Y., Zeng, P., Shen, Z., & Choo, K. K. R. (2018). A lightweight path authentication protocol for RFID-based supply chains. In Proceedings of the 17th IEEE International Conference on Trust, Security and Privacy in Computing and Communications; 12th IEEE International Conference on Big Data Science and Engineering (TrustCom/BigDataSE) (pp. 1297-1302). Piscataway: IEEE.
|
x |
|
|
|
|
|
x |
|
|
|
|
|
|
|
|
|
|
|
|
|
Ray & Bhadra (2016)Ray, S., & Bhadra, J. (2016). Security challenges in mobile and IoT systems. In Proceedings of the 29th IEEE International System-on-Chip Conference (SOCC) (pp. 356-361). Piscataway: IEEE.
|
|
|
|
|
|
|
x |
|
|
|
|
|
|
|
|
|
|
|
|
|
Ray et al. (2018b)Ray, S., Chen, W., & Cammarota, R. (2018b). Protecting the supply chain for automotives and IoTs. In Proceedings of the 55th ACM/ESDA/IEEE Design Automation Conference (DAC) (pp. 1-4). Piscataway: IEEE.
|
|
|
|
|
|
|
x |
|
|
|
|
|
|
|
|
|
|
|
|
|
Ray et al. (2018a)Ray, B., Abawajy, J., Chowdhury, M., & Alelaiwi, A. (2018a). Universal and secure object ownership transfer protocol for the Internet of Things. Future Generation Computer Systems, 78, 838-849. http://dx.doi.org/10.1016/j.future.2017.02.020. http://dx.doi.org/10.1016/j.future.2017....
|
|
|
|
|
|
|
x |
|
|
|
|
|
|
|
|
|
|
|
|
|
Ray et al. (2015)Ray, B., Howdhury, M., Abawajy, J., & Jesmin, M. (2015). Secure object tracking protocol for Networked RFID Systems. In Proceedings of the IEEE/ACIS 16th International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD) (pp. 1-7). Piscataway: IEEE.
|
|
|
|
|
|
|
x |
|
|
|
|
|
|
|
|
|
|
|
|
|
Richey et al. (2016)Richey, R. G., Jr., Morgan, T. R., Lindsey-Hall, K., & Adams, F. G. (2016). A global exploration of big data in the supply chain. International Journal of Physical Distribution & Logistics Management, 46(8), 710-739. http://dx.doi.org/10.1108/IJPDLM-05-2016-0134. http://dx.doi.org/10.1108/IJPDLM-05-2016...
|
|
|
|
|
|
|
x |
|
|
|
|
|
|
|
|
|
|
|
|
|
Schneider et al. (2018)Schneider, G., Keil, S., & Luhn, G. (2018). Opportunities, challenges and use cases of digitization within the semiconductor industry. In Proceedings of the 29th Annual SEMI Advanced Semiconductor Manufacturing Conference (ASMC) (pp. 307-312). Piscataway: IEEE.
|
|
|
|
x |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Song et al. (2018)Song, M. L., Fisher, R., Wang, J. L., & Cui, L. B. (2018). Environmental performance evaluation with big data: theories and methods. Annals of Operations Research, 270(1-2), 459-472. http://dx.doi.org/10.1007/s10479-016-2158-8. http://dx.doi.org/10.1007/s10479-016-215...
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
x |
|
|
|
Spanaki et al. (2018)Spanaki, K., Gürgüç, Z., Adams, R., & Mulligan, C. (2018). Data supply chain (DSC): research synthesis and future directions. International Journal of Production Research, 56(13), 4447-4466. http://dx.doi.org/10.1080/00207543.2017.1399222. http://dx.doi.org/10.1080/00207543.2017....
|
|
|
|
|
|
|
x |
|
|
|
|
|
|
|
|
|
x |
|
|
|
Szozda (2017)Szozda, N. (2017). Industry 4.0 and its impact on the functioning of supply chains. Logforum, 13(4), 401-414.
|
|
|
|
|
x |
|
x |
|
|
|
|
|
|
|
|
|
|
|
|
|
Tjahjono et al. (2017)Tjahjono, B., Esplugues, C., Ares, E., & Pelaez, G. (2017). What does industry 4.0 mean to supply chain? Procedia Manufacturing, 13, 1175-1182. http://dx.doi.org/10.1016/j.promfg.2017.09.191. http://dx.doi.org/10.1016/j.promfg.2017....
|
|
|
|
|
|
|
|
|
|
x |
|
|
|
|
|
|
|
|
x |
|
Tu (2018)Tu, M. (2018). An exploratory study of Internet of Things (IoT) adoption intention in logistics and supply chain management: a mixed research approach. International Journal of Logistics Management, 29(1), 131-151. http://dx.doi.org/10.1108/IJLM-11-2016-0274. http://dx.doi.org/10.1108/IJLM-11-2016-0...
|
|
|
|
|
|
|
|
|
x |
|
|
|
|
|
|
|
|
|
|
|
Tuptuk & Hailes (2018)Tuptuk, N., & Hailes, S. (2018). Security of smart manufacturing systems. Journal of Manufacturing Systems, 47, 93-106. http://dx.doi.org/10.1016/j.jmsy.2018.04.007. http://dx.doi.org/10.1016/j.jmsy.2018.04...
|
|
|
|
|
|
|
x |
|
|
|
|
|
|
|
|
|
|
|
|
|
Urquhart & McAuley (2018)Urquhart, L., & McAuley, D. (2018). Avoiding the internet of insecure industrial things. Computer Law & Security Review, 34(3), 450-466. http://dx.doi.org/10.1016/j.clsr.2017.12.004. http://dx.doi.org/10.1016/j.clsr.2017.12...
|
|
|
|
|
|
|
x |
|
|
x |
|
|
|
|
|
|
|
|
|
|
Xu et al. (2013)Xu, R., Yang, L., & Yang, S. H. (2013). Architecture design of internet of things in logistics management for emergency response. In Proceedings of the IEEE International Conference on Green Computing and Communications and IEEE Internet of Things and IEEE Cyber, Physical and Social Computing (pp. 395-402). Piscataway: IEEE. http://dx.doi.org/10.1109/GreenCom-iThings-CPSCom.2013.85. http://dx.doi.org/10.1109/GreenCom-iThin...
|
|
x |
x |
|
x |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Wang et al. (2016)Wang, Y., Hulstijn, J., & Tan, Y. H. (2016). Data quality assurance in international supply chains: an application of the value cycle approach to customs reporting. International Journal of Advanced Logistics, 5(2), 76-85. http://dx.doi.org/10.1080/2287108X.2016.1178501. http://dx.doi.org/10.1080/2287108X.2016....
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
x |
|
|
|
Wazid et al. (2018)Wazid, M., Das, A. K., Odelu, V., Kumar, N., Conti, M., & Jo, M. (2018). Design of secure user authenticated key management protocol for generic iot networks. IEEE Internet of Things Journal, 5(1), 269-282. http://dx.doi.org/10.1109/JIOT.2017.2780232. http://dx.doi.org/10.1109/JIOT.2017.2780...
|
|
|
|
|
|
|
x |
|
|
|
|
|
|
|
|
|
|
|
|
|
Weber (2010)Weber, R. H. (2010). Internet of Things-New security and privacy challenges. Computer Law & Security Review, 26(1), 23-30. http://dx.doi.org/10.1016/j.clsr.2009.11.008. http://dx.doi.org/10.1016/j.clsr.2009.11...
|
|
|
|
|
|
|
x |
|
|
x |
|
|
|
|
|
|
|
|
|
|
Wilding & Wheatley (2015)Wilding, R., & Wheatley, M. (2015). Q&A: how can i secure my digital supply chain? Technology Innovation Management Review, 5(4), 40-43. http://dx.doi.org/10.22215/timreview/890. http://dx.doi.org/10.22215/timreview/890...
|
|
|
|
|
|
|
x |
|
|
|
|
|
|
|
|
|
|
|
|
|
Wolfert et al. (2017)Wolfert, S., Ge, L., Verdouw, C., & Bogaardt, M. J. (2017). Big data in smart farming: a review. Agricultural Systems, 153, 69-80. http://dx.doi.org/10.1016/j.agsy.2017.01.023. http://dx.doi.org/10.1016/j.agsy.2017.01...
|
|
|
|
|
x |
|
x |
|
|
|
|
|
|
|
|
|
x |
|
|
|
Wu et al. (2016)Wu, L., Yue, X., Jin, A., & Yen, D. C. (2016). Smart supply chain management: a review and implications for future research. International Journal of Logistics Management, 27(2), 395-417. http://dx.doi.org/10.1108/IJLM-02-2014-0035. http://dx.doi.org/10.1108/IJLM-02-2014-0...
|
|
|
|
|
|
|
|
|
|
|
|
x |
x |
|
|
|
|
x |
|
|
Yang et al. (2015)Yang, K., Forte, D., & Tehranipoor, M. M. (2015). Protecting endpoint devices in IoT supply chain. In Proceedings of the IEEE/ACM International Conference on Computer-Aided Design (pp. 351-356). Piscataway: IEEE. http://dx.doi.org/10.1109/ICCAD.2015.7372591. http://dx.doi.org/10.1109/ICCAD.2015.737...
|
|
|
|
|
|
|
x |
|
|
|
|
|
|
|
|
|
|
|
|
|
Yang et al. (2017)Yang, K., Forte, D., & Tehranipoor, M. M. (2017). Cdta: a comprehensive solution for counterfeit detection, traceability, and authentication in the iot supply chain. ACM Transactions on Design Automation of Electronic Systems, 22(3), 42. http://dx.doi.org/10.1145/3005346. http://dx.doi.org/10.1145/3005346...
|
|
|
|
x |
|
|
x |
|
|
|
|
|
|
|
|
|
|
|
|
|
Yang et al. (2018)Yang, K., Forte, D., & Tehranipoor, M. (2018). ReSC: an RFID-enabled solution for defending ioT supply chain. ACM Transactions on Design Automation of Electronic Systems, 23(3), 29. http://dx.doi.org/10.1145/3174850. http://dx.doi.org/10.1145/3174850...
|
|
|
|
|
|
|
x |
|
|
|
|
|
|
|
|
|
|
|
|
|
Zhong et al. (2016)Zhong, R. Y., Newman, S. T., Huang, G. Q., & Lan, S. (2016). Big Data for supply chain management in the service and manufacturing sectors: challenges, opportunities, and future perspectives. Computers & Industrial Engineering, 101, 572-591. http://dx.doi.org/10.1016/j.cie.2016.07.013. http://dx.doi.org/10.1016/j.cie.2016.07....
|
|
|
|
x |
x |
x |
x |
|
|
|
|
|
|
|
|
|
|
|
|
|