<?xml version="1.0" encoding="UTF-8"?><xml><records><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Matthias Klaus</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Trusting ICT Providers – Can Corporate Cyber Confidence-Building Measures Help?</style></title><secondary-title><style face="normal" font="default" size="100%">Connections: The Quarterly Journal</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">cyber confidence-building measures</style></keyword><keyword><style  face="normal" font="default" size="100%">cyber risk</style></keyword><keyword><style  face="normal" font="default" size="100%">ICT infrastructure</style></keyword><keyword><style  face="normal" font="default" size="100%">supply chain security</style></keyword><keyword><style  face="normal" font="default" size="100%">trust</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2021</style></year><pub-dates><date><style  face="normal" font="default" size="100%">Spring 2021</style></date></pub-dates></dates><volume><style face="normal" font="default" size="100%">20</style></volume><pages><style face="normal" font="default" size="100%">21-31</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">Trust in cyberspace is essential for increasing security and even more important when nations rely on private companies to develop, construct, maintain and operate their Information and Communication Technology infrastructures. This article proposes a redesigned form of Cyber Confidence-Building Measures to achieve this goal by including the private sector as a peer actor. Nations can use this method to vet their potential suppliers, so they may reduce their risk perception and establish and maintain a trustful relationship with them.</style></abstract><issue><style face="normal" font="default" size="100%">2</style></issue><section><style face="normal" font="default" size="100%">21</style></section></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Luca Urciuoli</style></author><author><style face="normal" font="default" size="100%">Toni Männistö</style></author><author><style face="normal" font="default" size="100%">Juha Hintsa</style></author><author><style face="normal" font="default" size="100%">Tamanna Khan</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Supply Chain Cyber Security – Potential Threats</style></title><secondary-title><style face="normal" font="default" size="100%">Information &amp; Security: An International Journal</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">cyber threats</style></keyword><keyword><style  face="normal" font="default" size="100%">cybercrime</style></keyword><keyword><style  face="normal" font="default" size="100%">Cybersecurity</style></keyword><keyword><style  face="normal" font="default" size="100%">supply chain crime</style></keyword><keyword><style  face="normal" font="default" size="100%">supply chain security</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2013</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2013</style></date></pub-dates></dates><volume><style face="normal" font="default" size="100%">29</style></volume><pages><style face="normal" font="default" size="100%">51-68</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">The same Information and Communication Technologies (ICT) that have contributed tremendously to the productivity of supply chain companies and gov¬ernments alike, as well as to the global competitiveness of the European Union, ex¬pose modern societies to a range of cyber threats. ICT systems are fundamental to ensure that undisrupted flows of merchandise and critical supplies, such as oil, minerals, rare earths, pharmaceuticals and food are moved in and out of the EU ter¬ritory. Past events have revealed the vulnerability of global supply chains to crime and terrorism. However, previous research does not highlight how these threats may be affected with the support of cyber attacks. Hence, by means of a literature review and experts’ validation, this study develops a set of three scenarios that outline how cybercrime could jeopardize security of supply chains and, consequently, the well-being of European citizens. Fi¬nally, implications for managers and EU agencies are discussed.</style></abstract><issue><style face="normal" font="default" size="100%">1</style></issue><section><style face="normal" font="default" size="100%">51</style></section></record></records></xml>