CYBER SUPPLY CHAIN RESILIENCE MANUFACTURING IMPACT ON THE ECONOMIC SECURITY
Main Article Content
Abstract
Article Details
The authors published in this journal agree with following conditions:
1. The authors reserve to themselves the right to the authorship of their works and transfer the right of their first publication to the journal on the terms of Creatіve Common Attrіbutіon Lіcense which allows to freely extend to other persons the published work with an obligatory reference to the authors of the original work and its first publication in this journal.
2. The authors have the right to complete independent additional agreements concerning the not exclusive distribution of their work in the form in which it was published in this journal (for example, to place the work in the electronic storehouse of an establishment or to publish as a monograph component), under the condition of the preservation of the reference to the first publication of the work in this journal.
3. The journal’s policy allows and encourage the authors to place their manuscripts into the Internet (for example, in depositories of establishments or on personal web-sites) either before submitting of the manuscript for publication or during its editorial processing as it assists the occurrence of a productive scientific discussion and positively affects the efficiency and dynamics of citing of the published work.
AGREEMENT
ABOUT TRANSMISSION OF COPYRIGHT
I, the author of the article / We, the authors of the manuscript _______________________________________________________________________
in case of its acceptance for publication, we transfer the following rights to the founders and editorial boards of the scientific publication "BULLETIN OF THE CHERKASY BOHDAN KHMELNYTSKY NATIONAL UNIVERSITY. ECONOMIC SCIENCES. SERIES "ECONOMIC SCIENCES":
1. Publication of this article in Ukrainian (English, Russian, Polish) and distribution of its printed version.
2. Dissemination of the electronic version of the article through any electronic means (placing on the official journal web site, in electronic databases, repositories, etc.).
At the same time we reserve the right without consent of the editorial board and the founders:
1. Use the materials of the article in whole or in part for educational purposes.
2. To use the materials of the article in whole or in part for writing your own theses.
3. Use article materials to prepare abstracts, conference reports, and oral presentations.
4. Post electronic copies of the article (including the final electronic version downloaded from the journal's official website) to:
a. personal web-pecypcax of all authors (web sites, web pages, blogs, etc.);
b. web-pecypcax of the institutions where the authors work (including electronic institutional repositories);
with. non-profit, open-source web-pecypcax (such as arXiv.org).
With this agreement, we also certify that the submitted manuscript meets the following criteria:
1. Does not contain calls for violence, incitement of racial or ethnic enmity, which are disturbing, threatening, shameful, libelous, cruel, indecent, vulgar, etc.
2. Does not infringe the copyrights and intellectual property rights of others or organizations; contains all the references to the cited authors and / or publications envisaged by applicable copyright law, as well as the results and facts used in the article by other authors or organizations.
3. It has not been previously published in other publishers and has not been published in other publications.
4. Does not include materials that are not subject to publication in the open press, in accordance with applicable law.
____________________ ___________________
First name, Last name, signature of the author
"___" __________ 20__
References
Cascio J. (2009). The next big thing: resilience. Foreign Policy, 172, 92.
Darkreading [Electronic resource]. - Access mode: http://www.darkreading.com/vulnerabilities---threats/manufacturers-suffer-increase-in-cyberattacks/d/d-id/1325209.
National Institute of Standards and Technology. NISTIR 7298, revision 2, glossary of key information security terms (2013) [Electronic resource]. - Access mode: http://csrc.nist.gov/publications: National Institute of Standards and Technology Interagency or Internal Report 7298r2.
Nolan R. & Gibson C. (1974) Managing the Four Stages of EDP Growth, Harvard Business Review, 52/1 (Jan-Feb), 76-78
Nolan R. (1979). Managing the Crises in Data Processing, Harvard Business Review, 57/2 (Mar-Apr), 115-126
Exponentialtraining. com ‘Greiner’s Growth Model’ [Electronic resource]. - Access mode: http://www.exponentialtraining.com/Downloads/Resources/Example%20Module%20-%20CBS/page_08.htm.
NCSC ‘A New Approach for Cyber Security in the U’K (13 Sept 2016) [Electronic resource]. - Access mode : https://www.ncsc.gov.uk/news/new-approach-cyber-security-uk.
UK Manufacturing Statistics [Electronic resource]. - Access mode : http://www.themanufacturer.com/uk-manufacturing-statistics/.
Delotte [Electronic resource]. - Access mode: http://www.cyberintelligencecentre.com/news/global-cyber-executive-briefing/manufacturing.aspx
Sikich 2016 Manufacturing Report [Electronic resource]. - Access mode: http://files.clickdimensions.com/sikichcom-achbg/files/sikich_manufacturing_report_2016.pdf?_cldee=dGhlbWVobGluZ3NAZ21haWwuY29t
Qatalyst Global (2016) The State of Cyber Secirty in Critical Manufacturing Industries [Electronic resource]. - Access mode: http://www.qatalystglobal.com/the-state-of-cyber-security-in-critical-manufacturing-industries/.
National Cyber Security (2009) Research Development and Challenges: Related to Economics, Physical Infrastructure and Human Behavior.
Cyber Essentials ‘Protect your business against cyber threats’ [Electronic resource]. - Access mode: https://www.cyberaware.gov.uk/cyberessentials/.