A conceptual framework for information-leakage-resilience

Wai Peng Wong, Kim Hua Tan, Kannan Govindan, Di Li, Ajay Kumar*

*Corresponding author for this work

Research output: Contribution to journalJournal articleResearchpeer-review

Abstract

In today’s dynamic and competitive business environment, it is critical for firms to share information selectively and develop organizational resilience. However, only a few existing studies examine the relationships between information management and supply chain resilience. Aiming to bridge the gaps between both domains, we propose a model encompassing information security culture, information leakage, information sharing effectiveness and supply chain resilience and to derive insights from their inter-relationships in this research. A cross-sectional survey of the multi-national corporations and small and medium enterprises among their senior managers in the United Kingdom was carried out for data collection. The data set was analysed using a structural equation modelling approach. The results obtained validate the proposed model. The findings ascertain that information security culture and information leakage are negatively correlated, which influence the supply chain resilience. Specifically, information security and information leakage affect the effectiveness of information sharing, which in turn positively and negatively influence the supply chain resilience, respectively. This study posits that information security culture is instrumental to mitigate information leakage and foster effective information sharing to strengthen supply chain resilience.

Original languageEnglish
JournalAnnals of Operations Research
Volume329
Issue number1-2
Pages (from-to)931-951
ISSN0254-5330
DOIs
Publication statusPublished - Oct 2023

Keywords

  • Information leakage
  • Information security culture
  • Information sharing effectiveness
  • Supply chain resilience

Fingerprint

Dive into the research topics of 'A conceptual framework for information-leakage-resilience'. Together they form a unique fingerprint.

Cite this