Boyson, S., Corsi, T. M., & Paraskevas, J.-P. (2021). Defending digital supply chains: Evidence from a decade-long research program. Technovation. https://doi.org/10.1016/j.technovation.2021.102380 In this journal article, the authors' analysis determined that there were specific Framework activity areas and sets of policies/practices within those activity areas that strongly correlated with more effective control of specific breach types. These findings lay the foundation for an evidence-based approach to mastering IT network vulnerabilities and defending global digital supply chains.
Howard, D., & Harris, C. R. (2019, July 1). Cybersecurity: What leaders must know. Physician Leadership Journal, 6(4), 49. This journal article highlights the need for the healthcare industry leaders to assume responsibility to act in the interest of their organizations, making cyber-security should be a primary concern. Risk assessment, security policies, and "cyber hygiene" make up a secure organization. The dynamics of multiple touchpoints based on dependency relationships with suppliers, providers, and the vast healthcare network are discussed.
Kunz, I., Casola, V., Schneider, A., Banse, C., & Schutte, J. (2020). Towards tracking data flows in cloud architectures. 2020 IEEE 13th International Conference on, CLOUD, 445–452. https://doi.org/10.1109/CLOUD49709.2020.00066 This journal article discusses the current cloud architectures and that they neither provide the means to holistically track data flows across different services nor to enforce policies on data flows. In this paper, the authors point out the deficits in the data flow tracking functionalities of major cloud providers using a set of practical experiments and reiterate the need for the creation of policy to ensure that compliance and privacy regulations are met.