Neuman, W. L. (2000).社會研究方法-質化與量化取向。(朱柔若譯)。台北市。揚智。(原作出版於1997年)
日本內閣府(防災擔當)(2011年6月24日)。東日本大震災における被害額の推計について(記者発表資料)。日本內閣府。 http://www.bousai.go.jp/2011daishinsai/pdf/110624-1kisya.pdf
王石番(1993)。傳播內容分析法—理論與實證。台北市。幼獅。
王波、劉秋平(2008),《採購與供應管理》,北京大學出版社。
行政院國家資通安全會報(2021年2月)。國家資通安全發展方案。行政院。https://nicst.ey.gov.tw/File/D55C6E61DC0BE23?A=C
呂晨煒(2016)。供應鏈風險管理與專案績效關聯性之實證研究〔未出版之碩士論文〕。國立臺南大學經營與管理學系科技管理碩士在職專班碩士論文。台南市。供應鏈管理專業協會(CSCMP)(2018)。CSCMP Supply Chain Management Definitions and Glossary. Council of Supply Chain Management Professionals. Glossary. Council of Supply Chain Management Professionals.https://cscmp.org/CSCMP/Academia/SCM _Definitions_andGlossary_of_Terms/CSCMP/Educate/SCM_Definitions_and_Glossary_of_Terms.aspx?hkey=60879588-f65f-4ab5-8c4b-6878815ef921
林士彥,郭幸福,鄭心瑩,& 柳婉郁(2018)。天然災害損失之經濟評估。林業研究季刊。40(3), 161-177.
林美華(1997)。「企業應變速度的大考驗:製造業快速回應策略之導入及衝擊」。資訊應用導航,18,2-11。
林靜芬(2000)。我國成人教育研究所碩士論文內容分析之研究〔未出版之碩士論文〕。淡江大學資料科學學系碩士論文。臺北縣。邱潤容(2002)。保險學理論與實務。台北:三民書局。
符麗齡(2021)。跨國公司供應鏈風險控管與危機應變規劃執行的成功關鍵因素– COVID-19影響汽車供應鏈個案研究〔未出版之碩士論文〕。輔仁大學國際創業與經營管理學程碩士在職專班碩士論文,新北市。陳旭耀(1997)。臺灣地區圖書資訊學碩士論文及其引用文獻之研究〔未出版之碩士論文〕。輔仁大學圖書資訊學系碩士論文,新北市。陳雅文(1995)。圖書館學與資訊科學大辭典。國家教育研究院。http://terms.naer.edu.tw/detail/1683205/
楊達鑫(2012)。東日本大震災後亞洲主要國家經貿情勢之探討與啟示。經濟研究年刊。201203 (12期) 265-288頁。
經濟部工業局(2012)。製造業安全供應鏈AEO技術手冊。經濟部。https://www.moeaidb.gov.tw/ctlr?PRO=filepath.DownloadFile&f=publication&t=f&id=1181
經濟部標準檢驗局(2007)。ISO 28000供應鏈安全管理系統標準簡介。經濟部。http://www.bsmi.gov.tw/wSite/public/Data/f1388125037366.pdf
賈凱傑、張朝能、張世龍、謝承憲、黃裕凱、胡凱傑、黃台生、陳振楠、徐純芳、呂明穎、黃丹嬿、林惠萍、林妮徵、謝宜臻、李依真、陳郁欣、謝孟樺(2016)。運輸物流供應鏈恢復力之研究。交通部運輸研究所。
蔡明月, & 邱琦茹. (2014). 臺灣人文學文獻引用類型分析研究. 教育資料與圖書館學, 51(3), a1-37.
蔡淑芬(2022年1月27日)。六大關鍵左右2022全球供應鏈。工商時報。https://readers.ctee.com.tw/cm/20220127/a13aa13/1167665/share
衛生福利部疾病管制署(2022)。COVID-19。https://www.cdc.gov.tw/
鄧家駒(1998)。風險管理,台北:華泰出版。
鄭燦堂(1998)。風險管理理論與實務,初版,台北:五南出版。
繆其浩(1986)。內容分析技術評述。情報科學4。69-71頁。
羅正漢(2021年12月30日)。產業法令開始納入資安要求, 供應鏈與身分冒用威脅加劇。iThome。https://www.ithome.com.tw/news/148649
Abrahamson, M. (1983). Social research methods. Prentice Hall.
Al Sabbagh, B., & Kowalski, S. (2015). A socio-technical framework for threat modeling a software supply chain. IEEE Security & Privacy, 13(4), 30-39.
Al-Farsi, S., Rathore, M. M., & Bakiras, S. (2021). Security of blockchain-based supply chain management systems: challenges and opportunities. Applied Sciences, 11(12), 5585.
Alshuwaier, F., Areshey, .A., & Poon, J. (2022). Applications and Enhancement of Document-Based Sentiment Analysis in Deep learning Methods: Systematic Literature Review. Intelligent Systems with Applications, 200090.
Alves, A. C., & Lee, S. H. (2022). China’s BRI developmental agency in its own words: A content analysis of key policy documents. World Development, 150, 105715.
Ana Pais and Cecilia Tombesi(September 10, 2021)。911事件20週年:改變歷史的那天早上分分秒秒都發生了什麼。BBC。https://www.bbc.com/zhongwen/trad/world-58511295
Aron, R., Clemons, E. K., & Reddi, S. (2005). Just right outsourcing: Understanding and managing risk. Journal of management information systems, 22(2), 37-55.
Asamoah, D., Agyei-Owusu, B., & Ashun, E. (2020). Social network relationship, supply chain resilience and customer-oriented performance of small and medium enterprises in a developing economy. Benchmarking: An International Journal, 27(5), 1793-1813.
Asamoah, D., Nuertey, D., Agyei-Owusu, B., & Acquah, I. N. (2021). Antecedents and outcomes of supply chain security practices: the role of organizational security culture and supply chain disruption occurrence. International Journal of Quality & Reliability Management. 39(4), 1059-1082.
Asante, M., Epiphaniou, G., Maple, C., Al-Khateeb, H., Bottarelli, M., & Ghafoor, K. Z. (2021). Distributed ledger technologies in supply chain security management: a comprehensive survey. IEEE Transactions on Engineering Management. doi: 10.1109/TEM.2021.3053655.
Atkinson, P., & Coffey, A. (2004). Analysing documentary realities. Qualitative research, 3, 77-92.
Autry, C. W., & Bobbitt, L. M. (2008). Supply chain security orientation: conceptual development and a proposed framework. The International Journal of Logistics Management. 19(1), 42-64
Bai, C., & Satir, A. (2022). A critical content-analysis of sustainable supplier development literature and future research directions. Journal of Cleaner Production, 132443.
Banomyong*, R. (2005). The impact of port and trade security initiatives on maritime supply-chain management. Maritime Policy & Management, 32(1), 3-13.
Batista, L., Bourlakis, M., Smart, P., & Maull, R. (2018). In search of a circular supply chain archetype–a content-analysis-based literature review. Production Planning & Control, 29(6), 438-451.
Baumgarten, H., & Wieland, A. (2008). Lieferkettensicherheit. Jahrbuch Logistik, 190-193.
Beach, R., Enciso, P., Harste, J., Jenkins, C., Raina, S. A., Rogers, R., ... & Yenika-Agbaw, V. (2009). Exploring the “critical” in critical content analysis of children’s literature. In 58th yearbook of the National Reading Conference (pp. 129-143). Oak Creek, WI: National Reading Conference.
Belussi, F., Orsi, L., & Savarese, M. (2019). Mapping business model research: A document bibliometric analysis. Scandinavian Journal of Management, 35(3), 101048.
Bertram, S. J. K. (1970). The relationship between intra-document citation location and citation level. University of Illinois at Urbana-Champaign.
Binmakhashen, G. M., & Mahmoud, S. A. (2019). Document layout analysis: a comprehensive survey. ACM Computing Surveys (CSUR), 52(6), 1-36.
Birkel, H. S., & Hartmann, E. (2020). Internet of Things–the future of managing supply chain risks. Supply Chain Management: An International Journal, 25(5), 535-548.
Bob, Fernandez(September 22, 2001) "U.S. markets decline again". KRTBN Knight Ridder Tribune Business News.
Bogataj, D., & Bogataj, M. (2007). Measuring the supply chain risk and vulnerability in frequency space. International Journal of Production Economics, 108(1-2), 291-301.
Bonzi, S., & Snyder, H. W. (1990, January). Patterns of self citation across fields of inquiry. In Proceedings of the ASIS annual meeting (Vol. 27, pp. 204-207). 143 OLD MARLTON PIKE, MEDFORD, NJ 08055-8750 USA: INFORMATION TODAY INC.
Boone, A. (2017). Cyber-security must be a C-suite priority. Computer Fraud & Security, 2017(2), 13-15.
Bowen, G. A. (2009). Document analysis as a qualitative research method. Qualitative research journal. 9(2), 27-40
Boyack, K. W., & Klavans, R. (2010). Co‐citation analysis, bibliographic coupling, and direct citation: Which citation approach represents the research front most accurately?. Journal of the American Society for information Science and Technology, 61(12), 2389-2404.
Braun, V., Clarke, V., & Weate, P. (2016). Using thematic analysis in sport and exercise research. In Routledge handbook of qualitative research in sport and exercise (pp. 213-227). Routledge.
Brunzel, J. (2021). Making use of quantitative content analysis: Insights from academia and business practice. Business Horizons, 64(4), 453-464.
Brusset, X., & Teller, C. (2017). Supply chain capabilities, risks, and resilience. International Journal of Production Economics, 184, 59-68.
Bukhari, S. S., Breuel, T. M., Asi, A., & El-Sana, J. (2012, September). Layout analysis for arabic historical document images using machine learning. In 2012 International Conference on Frontiers in Handwriting Recognition (pp. 639-644). IEEE.
Busha, C. H., & Harter, S. P. (1980). Research methods in librarianship; techniques and interpretation (No. 020 B88).
Casey, R. G., & Lecolinet, E. (1996). A survey of methods and strategies in character segmentation. IEEE transactions on pattern analysis and machine intelligence, 18(7), 690-706.
Cavinato, J. L. (2004). Supply chain logistics risks: From the back room to the board room. International journal of physical distribution & logistics management. 34(5), 383-387.
Chowdhury, M. M. H., & Quaddus, M. (2016). Supply chain readiness, response and recovery for resilience. Supply Chain Management: An International Journal. 21(6), 709-731.
Christopher, M. (2016). Logistics & supply chain management. Pearson Uk.
Christopher, M., & Peck, H. (2004). Building the resilient supply chain. 15(2), 1-13, 2004
Cigolini, R., Pero, M., & Sianesi, A. (2016). Reinforcing supply chain security through organizational and cultural tools within the intermodal rail and road industry. The International Journal of Logistics Management. 27(3), 816-836
Closs, D. J. (2008). A framework for protecting your supply chain. Supply Chain Management Review, 12(2).
Closs, D. J., & McGarrell, E. F. (2004). Enhancing security throughout the supply chain (pp. 10-12). Washington, DC: IBM Center for the Business of Government.
Coffman, J. W. (1985). A Bibliometric Analysis of a Selected Literature Dealing with the Humanities from" The Dictionary of the History of Ideas". Case Western Reserve University.
Colicchia, C., & Strozzi, F. (2012). Supply chain risk management: a new methodology for a systematic literature review. Supply Chain Management: An International Journal. 17(4), 403-418.
Colicchia, C., Creazza, A., & Menachof, D. A. (2018). Managing cyber and information risks in supply chains: insights from an exploratory analysis. Supply Chain Management: An International Journal. 24(2), 215-240.
Cooper, M. C., Lambert, D. M., & Pagh, J. D. (1997). Supply chain management: more than a new name for logistics. The international journal of logistics management, 8(1), 1-14.
Cucchiella, F., & Gastaldi, M. (2006). Risk management in supply chain: a real option approach. Journal of Manufacturing Technology Management. 17(6), 700-720.
Devaraj, D., Syron, E., & Donnellan, P. (2021). Diversification of gas sources to improve security of supply using an integrated Multiple Criteria Decision Making approach. Cleaner and Responsible Consumption, 3, 100042.
Donan, S., Rauwald, C., Deaux, J. and King, I. (2020), “A covid-19 supply chain shock born in China is going global”, available at: https://www.bloomberg.com/news/articles/2020-03-20/a-covid-19- supply-chain-shock-born-in-china-is-going-global.
Downe‐Wamboldt, B. (1992). Content analysis: method, applications, and issues. Health care for women international, 13(3), 313-321.
Duong, N. H., & Ha, Q. A. (2021). The links between supply chain risk management practices, supply chain integration and supply chain performance in Southern Vietnam: A moderation effect of supply chain social sustainability. Cogent Business & Management, 8(1), 1999556.
Eggers, W. (2004), Prospering in the Secure Economy, Deloitte Research Study, Deloitte Touche Tohmatsu, New York, NY.
Ellegaard, C. (2008). Supply risk management in a small company perspective. Supply chain management: An international journal. 13(6), 425-434.
Ellis, S. C., Shockley, J., & Henry, R. M. (2011). Making sense of supply disruption risk research: A conceptual framework grounded in enactment theory. Journal of Supply Chain Management, 47(2), 65-96.
Elo, S., & Kyngäs, H. (2008). The qualitative content analysis process. Journal of advanced nursing, 62(1), 107-115.
Eric LACHAPELLE, Mustafe BISLIMI, & Bardha AJVAZI, PECB. (2007) ISO28000:2007白皮書。https://pecb.com/whitepaper/iso-28000-supply-chain-security-management-systemsISO
Erickson F (1986) Qualitative methods in research on teaching. In: Wittrock MC (ed.) Handbook of Research on Teaching, 3rd edn. New York: Macmillan, 119–161.
European Commission (2007), European Parliament’s Committee on Transport and Tourism, Organized Theft of Commercial Vehicles and Their Loads in the European Union, European Parliament, Brussels.
Ezra Klein (May 3, 2011). "Osama bin Laden didn’t win, but he was ‘enormously successful’". The Washington Post. https://www.washingtonpost.com/business/economy/osama-bin-laden-didnt-win-but-he-was-enormously-successful/2011/05/02/AFexZjbF_story.html
Fan, H., Cheng, T. C. E., Li, G., & Lee, P. K. (2016). The effectiveness of supply chain risk information processing capability: an information processing perspective. IEEE Transactions on Engineering Management, 63(4), 414-425.
Fan, H., Li, G., Sun, H., & Cheng, T. C. E. (2017). An information processing perspective on supply chain risk management: Antecedents, mechanism, and consequences. International Journal of Production Economics, 185, 63-75.
Fan, Y., & Stevenson, M. (2018). A review of supply chain risk management: definition, theory, and research agenda. International Journal of Physical Distribution & Logistics Management. 48(3), 205-230.
Flick, U. (2018). An introduction to qualitative research. sage.
Fonseca, A., Macdonald, A., Dandy, E., & Valenti, P. (2011). The state of sustainability reporting at Canadian universities. International Journal of Sustainability in Higher Education. 12(1), 22-40.
Frankel, E. G. (2005, June). Maritime security, management, technology and impact on maritime operations and economics. In International Association of Maritime Economists (IAME) Annual Conference (pp. 22-25).
Frost, C. O. (1989). The Literature of Online Public Access Catalogs, 1980-85: An Analysis of Citation Patterns. Library Resources and Technical Services, 33(4), 344-57.
Giunipero, L. C., & Eltantawy, R. A. (2004). Securing the upstream supply chain: a risk management approach. International Journal of Physical Distribution & Logistics Management. 34 No. 9, pp. 698-713.
Goh, M., Lim, J. Y., & Meng, F. (2007). A stochastic model for risk management in global supply chain networks. European Journal of Operational Research, 182(1), 164-173.
Gorichanaz, T. (2015). For every document, a person: A co-created view of documents. Proceedings from the Document Academy, 2(1), 9.
Gorichanaz, T., & Latham, K. F. (2016). Document phenomenology: a framework for holistic analysis. Journal of Documentation. 72(6), 1114-1133.
Gould, J. E., Macharis, C., & Haasis, H. D. (2010). Emergence of security in supply chain management literature. Journal of Transportation Security, 3(4), 287-302.
Graneheim, U. H., Lindgren, B. M., & Lundman, B. (2017). Methodological challenges in qualitative content analysis: A discussion paper. Nurse education today, 56, 29-34.
Guo, D. (2021). Internet of Things Based Network Security for Supply Chain Management in the Business Environment. Wireless Personal Communications, 1-22.
Gutierrez, X., & Hintsa, J. (2007). Voluntary supply chain security programs: a systematic comparison. In The International Conference on Information Systems, Logistics and Supply Chain, Lyon, France.
Hajek, P., Youssef, A., & Hajkova, V. (2022). Recent developments in smart city assessment: A bibliometric and content analysis-based literature review. Cities, 103709.
Hammersley, M. (2006). Ethnography: problems and prospects. Ethnography and education, 1(1), 3-14.
Hassija, V., Chamola, V., Gupta, V., Jain, S., & Guizani, N. (2020). A survey on supply chain security: Application areas, security threats, and solution architectures. IEEE Internet of Things Journal, 8(8), 6222-6246.
Heckmann, I., Comes, T., & Nickel, S. (2015). A critical review on supply chain risk–Definition, measure and modeling. Omega, 52, 119-132.
Hintsa, J. (2010). A comprehensive framework for analysis and design of supply chain security standards. Journal of Transportation Security, 3(2), 105-125.
Ho, W., Zheng, T., Yildiz, H. and Talluri, S. (2015), “Supply chain risk management: a literature review”, International Journal of Production Research, 53(16), 5031-5069.
Hoffmann, P., Schiele, H., & Krabbendam, K. (2013). Uncertainty, supply risk management and their impact on performance. Journal of purchasing and supply management, 19(3), 199-211.
Hohenstein, N. O., Feisel, E., Hartmann, E., & Giunipero, L. (2015). Research on the phenomenon of supply chain resilience: a systematic review and paths for further investigation. International Journal of Physical Distribution & Logistics Management. 45(1/2), 90-117.
Holsti, O. R. (1969). Content analysis for the social sciences and humanities. Reading. MA: Addison-Wesley (content analysis).
Hsieh, H. F., & Shannon, S. E. (2005). Three approaches to qualitative content analysis. Qualitative health research, 15(9), 1277-1288.
Jażdżewska-Gutta, M., & Borkowski, P. (2022). As strong as the weakest link. Transport and supply chain security. Transport Reviews, 1-22.
Junior, M. L., & Godinho Filho, M. (2010). Variations of the kanban system: Literature review and classification. International Journal of Production Economics, 125(1), 13-21.
Jüttner, U., Peck, H., & Christopher, M. (2003). Supply chain risk management: outlining an agenda for future research. International Journal of Logistics: research and applications, 6(4), 197-210.
Kalogirou, M. R., Dahlke, S., Davidson, S., & Yamamoto, S. (2021). Integrating planetary health into healthcare: A document analysis. Health Policy, 125(6), 799-806.
Kauppi, K., Longoni, A., Caniato, F., & Kuula, M. (2016). Managing country disruption risks and improving operational performance: risk management along integrated supply chains. International Journal of Production Economics, 182, 484-495.
Kern, D., Moser, R., Hartmann, E., & Moder, M. (2012). Supply risk management: model development and empirical analysis. International Journal of Physical Distribution & Logistics Management. 42(1), 60-82.
Kleindorfer, P. R., & Saad, G. H. (2005). Managing disruption risks in supply chains. Production and operations management, 14(1), 53-68.
Kleinheksel, A. J., Rockich-Winston, N., Tawfik, H., & Wyatt, T. R. (2020). Demystifying content analysis. American journal of pharmaceutical education, 84(1).
Knemeyer, A. M., Zinn, W., & Eroglu, C. (2009). Proactive planning for catastrophic events in supply chains. Journal of operations management, 27(2), 141-153.
Kohlbacher, F. (2006). The use of qualitative content analysis in case study research. In Forum Qualitative Sozialforschung/Forum: Qualitative Social Research. 7(1), 1-30. Institut für Qualitative Forschung.
Kress, G. (2009). Multimodality: A social semiotic approach to contemporary communication. Routledge.
Krippendorff, K. (2004). Content analysis: An introduction to its methodology (2 nd Thousand Oaks.
Kumar, K. (1989). Conducting key informant interviews in developing countries (p. 1). Washington DC: Agency for International Development.
Kusrini, E., & Hanim, K. (2021). Analysis of Compliance and Supply Chain Security Risks Based on ISO 28001 in a Logistic Service Provider in Indonesia. Journal homepage: http://iieta. org/journals/ijsse, 11(2), 135-142.
Lee, E. S., & Song, D. W. (2010). Knowledge management for maritime logistics value: discussing conceptual issues. Marit. Pol. Mgmt., 37(6), 563-583.
Lee, H. L., & Billington, C. (1993). Material management in decentralized supply chains. Operations research, 41(5), 835-847.
Lee, H. L., & Whang, S. (2005). Higher supply chain security with lower cost: Lessons from total quality management. International Journal of production economics, 96(3), 289-300.
Lee, H. L., Padmanabhan, V., & Whang, S. (1997). Information distortion in a supply chain: The bullwhip effect. Management science, 43(4), 546-558.
Li, M. (2019). Visualizing the studies on smart cities in the past two decades: A two-dimensional perspective. Scientometrics, 120(2), 683-705.
Li, T. S. (2014). Establishing an integrated framework for security capability development in a supply chain. International Journal of Logistics Research and Applications, 17(4), 283-303.
Lin, Q., Wang, H., Pei, X., & Wang, J. (2019). Food safety traceability system based on blockchain and EPCIS. IEEE access, 7, 20698-20707.
Lincoln YS and Guba EG (1985) Naturalistic Inquiry, Thousand Oaks, CA: Sage.
Lu, G., Koufteros, X., & Lucianetti, L. (2017). Supply chain security: A classification of practices and an empirical study of differential effects and complementarity. IEEE Transactions on Engineering Management, 64(2), 234-248.
Lu, G., Koufteros, X., Talluri, S., & Hult, G. T. M. (2019). Deployment of supply chain security practices: Antecedents and consequences. Decision sciences, 50(3), 459-497.
Manuj, I., & Mentzer, J. T. (2008). Global supply chain risk management. Journal of business logistics, 29(1), 133-155.
Manuj, I., Esper, T. L., & Stank, T. P. (2014). Supply chain risk management approaches under different conditions of risk. Journal of Business Logistics, 35(3), 241-258.
March, J. G., & Shapira, Z. (1987). Managerial perspectives on risk and risk taking. Management science, 33(11), 1404-1418.
Markmann, C., Darkow, I. L., & Von Der Gracht, H. (2013). A Delphi-based risk analysis—Identifying and assessing future challenges for supply chain security in a multi-stakeholder environment. Technological Forecasting and Social Change, 80(9), 1815-1833.
Martens, B. J., Crum, M. R., & Poist, R. F. (2011). Examining antecedents to supply chain security effectiveness: an exploratory study. Journal of business logistics, 32(2), 153-166.
Mayring, P. (2004). Qualitative content analysis. A companion to qualitative research, 1(2), 159-176.
McNicholas, M. (2016). Maritime security: an introduction. Butterworth-Heinemann.
Mentzer, J. T., DeWitt, W., Keebler, J. S., Min, S., Nix, N. W., Smith, C. D., & Zacharia, Z. G. (2001). Defining supply chain management. Journal of Business logistics, 22(2), 1-25.
Merriam, S. B., & Tisdell, E. J. (2016). Qualitative Research: A Guide to Design and Implementation; Kindle Edition. Retrieved from Amazon. com.
Miller, K. D. (1992). A framework for integrated risk management in international business. Journal of international business studies, 23(2), 311-331.
Modarress, B., Ansari, A., & Lockwood, D. (2007). Raising the alarm for logistics networks security. Int. J. Bus. Res, 7, 221-225.
Mora, L., Deakin, M., & Reid, A. (2019). Combining co-citation clustering and text-based analysis to reveal the main development paths of smart cities. Technological Forecasting and Social Change, 142, 56-69.
Morgan, H. (2022). Conducting a Qualitative Document Analysis. Qualitative Report, 27(1).
Murphy, P.R. and Wood, D.F. (2008), Contemporary Logistics, 9th ed., Pearson Education, Upper Saddle River, NJ.
Ofori-Yeboah, A., Addo-Quaye, R., Oseni, W., Amorin, P., & Agangmikre, C. (2021, December). Cyber supply chain security: a cost benefit analysis using net present value. In 2021 International Conference on Cyber Security and Internet of Things (ICSIoT) (pp. 49-54). IEEE.
Ogbuke, N. J., Yusuf, Y. Y., Dharma, K., & Mercangoz, B. A. (2022). Big data supply chain analytics: ethical, privacy and security challenges posed to business, industries and society. Production Planning & Control, 33(2-3), 123-137.
Okafor, C., Schorlemmer, T. R., Torres-Arias, S., & Davis, J. C. (2022). SoK: Analysis of Software Supply Chain Security by Establishing Secure Design Properties.
Olson, D. L., & Wu, D. D. (2010). A review of enterprise risk management in supply chain. Kybernetes.
Omar, I. A., Jayaraman, R., Salah, K., Debe, M., & Omar, M. (2020). Enhancing vendor managed inventory supply chain operations using blockchain smart contracts. IEEE Access, 8, 182704-182719.
Organization for Economic Cooperation and Development (2003), Security in Maritime Transport: Risk Factors and Economic Factor, Organization for Economic Cooperation and Development, Paris.
Pandey, S., Singh, R. K., Gunasekaran, A., & Kaushik, A. (2020). Cyber security risks in globalized supply chains: conceptual framework. Journal of Global Operations and Strategic Sourcing. 13(1), 103-128.
Parast, M. M., & Subramanian, N. (2021). An examination of the effect of supply chain disruption risk drivers on organizational performance: evidence from Chinese supply chains. Supply Chain Management: An International Journal. 26(4), 548-562.
Park, K., Min, H., & Min, S. (2016). Inter-relationship among risk taking propensity, supply chain security practices, and supply chain disruption occurrence. Journal of Purchasing and Supply Management, 22(2), 120-130.
Patton, M. Q. (2014). Qualitative research & evaluation methods: Integrating theory and practice. Sage publications.
Peleg-Gillai, B., Bhat, G., & Sept, L. (2006). Innovators in supply chain security: better security drives business value (pp. 1-33). Washington, DC: Manufacturing Institute.
Peritz, B. C. (1983). A classification of citation roles for the social sciences and related fields. Scientometrics, 5(5), 303-312.
Pesch, H., Hamdani, M., Forster, J., & Ney, H. (2012, September). Analysis of preprocessing techniques for Latin handwriting recognition. In 2012 International Conference on Frontiers in Handwriting Recognition (pp. 280-284). IEEE.
Plamondon, R., & Srihari, S. N. (2000). Online and off-line handwriting recognition: a comprehensive survey. IEEE Transactions on pattern analysis and machine intelligence, 22(1), 63-84.
Plötz, T., & Fink, G. A. (2009). Markov models for offline handwriting recognition: a survey. International Journal on Document Analysis and Recognition (IJDAR), 12(4), 269-298.
Prokop, D. (2004). Smart and safe borders: the logistics of inbound cargo security. The International Journal of Logistics Management, 15(2), 65-76.
Raab, V., Petersen, B., & Kreyenschmidt, J. (2011). Temperature monitoring in meat supply chains. British Food Journal. 113(10), 1267-1289.
Rantasila, K., Pilli-Sihvola, E., Permala, A., & Scholliers, J. (2012). Technologies enabling efficient transport monitoring. In 5th European Conference on ICT and Logistics, ECITL'12.
Rao, S., & Goldsby, T. J. (2009). Supply chain risks: a review and typology. The International Journal of Logistics Management. 20(1), 97-123.
Reis, J., Santo, P. E., & Melão, N. (2019, April). Artificial intelligence in government services: A systematic literature review. In World conference on information systems and technologies (pp. 241-252). Springer, Cham.
Rejeb, A., Keogh, J. G., & Treiblmaier, H. (2019). Leveraging the internet of things and blockchain technology in supply chain management. Future Internet, 11(7), 161.
Ribeiro, J. P., & Barbosa-Povoa, A. (2018). Supply Chain Resilience: Definitions and quantitative modelling approaches–A literature review. Computers & Industrial Engineering, 115, 109-122.
Rice Jr, J. B., & Spayd, P. W. (2005). Investing in supply chain security: collateral benefits. Special Report Series: IBM Center for the Business of Government, 1-34.
Rice, J. B., & Caniato, F. (2003). Building a secure and resilient supply network. SUPPLY CHAIN MANAGEMENT REVIEW, 7(5) (SEPT./OCT. 2003), P. 22-30: ILL.
Riley, J. M., Klein, R., Miller, J., & Sridharan, V. (2016). How internal integration, information sharing, and training affect supply chain risk management capabilities. International Journal of Physical Distribution & Logistics Management, 46(10), 953-980.
Ruiz-Parrado, V., Heradio, R., Aranda-Escolastico, E., Sánchez, Á., & Vélez, J. F. (2021). A bibliometric analysis of off-line handwritten document analysis literature (1990-2020). Pattern Recognition, 108513.
Ryan, G. W., & Bernard, H. R. (2000). Data management and analysis methods. Handbook of qualitative research, 2, 769-802.
Saheb, T., Dehghani, M., & Saheb, T. (2022). Artificial intelligence for sustainable energy: A contextual topic modeling and content analysis. Sustainable Computing: Informatics and Systems, 35, 100699.
Salah, K., Nizamuddin, N., Jayaraman, R., & Omar, M. (2019). Blockchain-based soybean traceability in agricultural supply chain. Ieee Access, 7, 73295-73305.
Sarathy, R. (2006). Security and the global supply chain. Transportation journal, 45(4), 28-51.
Schoenherr, T., & Swink, M. (2012). Revisiting the arcs of integration: Cross-validations and extensions. Journal of operations management, 30(1-2), 99-115.
Schoenherr, T., Tummala, V. R., & Harrison, T. P. (2008). Assessing supply chain risks with the analytic hierarchy process: Providing decision support for the offshoring decision by a US manufacturing company. Journal of purchasing and supply management, 14(2), 100-111.
Scholliers, J., Permala, A., Toivonen, S., & Salmela, H. (2016). Improving the security of containers in port related supply chains. Transportation research procedia, 14, 1374-1383.
Schreier, M. (2012). Qualitative content analysis in practice. Sage publications.
Serafini, F. (2015). The appropriation of fine art into contemporary narrative picturebooks. Children's Literature in Education, 46(4), 438-453.
Serafini, F., & Reid, S. F. (2019). Multimodal content analysis: expanding analytical approaches to content analysis. Visual Communication, 1470357219864133.
Serafini, F., & Reid, S. F. (2020). Crossing boundaries: Exploring metaleptic transgressions in contemporary picturebooks. Children's Literature in Education, 51(2), 261-284.
Seuring, S., & Gold, S. (2012). Conducting content‐analysis based literature reviews in supply chain management. Supply Chain Management: An International Journal. 17(5), 544-555.
Sharifi, A., Allam, Z., Feizizadeh, B., & Ghamari, H. (2021). Three decades of research on smart cities: Mapping knowledge structure and trends. Sustainability, 13(13), 7140.
Sharma, R., Nigam, S., & Jain, R. (2014). Opinion mining of movie reviews at document level. arXiv preprint arXiv:1408.3829.
Sheffi, Y. (2001). Supply chain management under the threat of international terrorism. The International Journal of logistics management, 12(2), 1-11.
Sheu, C., Lee, L., & Niehoff, B. (2006). A voluntary logistics security program and international supply chain partnership. Supply chain management: An international journal. 11(4), 363-374.
Smith, G. E., Watson, K. J., Baker, W. H., & Pokorski Ii, J. A. (2007). A critical balance: collaboration and security in the IT-enabled supply chain. International journal of production research, 45(11), 2595-2613.
Speier, C., Whipple, J. M., Closs, D. J., & Voss, M. D. (2011). Global supply chain design considerations: Mitigating product safety and security risks. Journal of operations management, 29(7-8), 721-736.
Sreedevi, R., Saranga, H., & Gouda, S. K. (2021). Impact of a country’s logistical capabilities on supply chain risk. Supply Chain Management: An International Journal.
Stock, J. R., & Boyer, S. L. (2009). Developing a consensus definition of supply chain management: a qualitative study. International Journal of Physical Distribution & Logistics Management. 39(8), 690-711.
Strauss, A., & Corbin, J. (1990). Basics of qualitative research. Sage publications.
Syed, N. F., Shah, S. W., Trujillo-Rasua, R., & Doss, R. (2022). Traceability in supply chains: A Cyber security analysis. Computers & Security, 112, 102536.
Tang, C. S. (2006). Perspectives in supply chain risk management. International journal of production economics, 103(2), 451-488.
Tang, O., & Musa, S. N. (2011). Identifying risk issues and research advancements in supply chain risk management. International journal of production economics, 133(1), 25-34.
Thai, V. V. (2009). Effective maritime security: conceptual model and empirical evidence. Maritime Policy & Management, 36(2), 147-163.
THE WHITE HOUSE (JUNE 08, 2021). FACT SHEET: Biden-Harris Administration Announces Supply Chain Disruptions Task Force to Address Short-Term Supply Chain Discontinuities.https://www.whitehouse.gov/briefing-room/statements-releases/2021/06/08/fact-sheet-biden-harris-administration-announces-supply-chain-disruptions-task-force-to-address-short-term-supply-chain-discontinuities/
Thibault, M., Brooks, M. R., & Button, K. J. (2006). The response of the US maritime industry to the new container security initiatives. Transportation Journal, 45(1), 5-15.
Thun, J. H., & Hoenig, D. (2011). An empirical analysis of supply chain risk management in the German automotive industry. International journal of production economics, 131(1), 242-249.
Thun, J. H., Drüke, M., & Hoenig, D. (2011). Managing uncertainty–an empirical analysis of supply chain risk management in small and medium-sized enterprises. International Journal of Production Research, 49(18), 5511-5525.
Thyme, K. E., Wiberg, B., Lundman, B., & Graneheim, U. H. (2013). Qualitative content analysis in art psychotherapy research: Concepts, procedures, and measures to reveal the latent meaning in pictures and the words attached to the pictures. The Arts in Psychotherapy, 40(1), 101-107.
Tomlin, B. (2006). On the value of mitigation and contingency strategies for managing supply chain disruption risks. Management science, 52(5), 639-657.
Tong, X., Lai, K. H., Lo, C. K., & Cheng, T. C. E. (2022). Supply chain security certification and operational performance: The role of upstream complexity. International Journal of Production Economics, 247, 108433.
Trier, Ø. D., Jain, A. K., & Taxt, T. (1996). Feature extraction methods for character recognition-a survey. Pattern recognition, 29(4), 641-662.
Trkman, P., & McCormack, K. (2009). Supply chain risk in turbulent environments—A conceptual model for managing supply chain network risk. International Journal of Production Economics, 119(2), 247-258.
Tsoukas, V., Gkogkidis, A., Kampa, A., Spathoulas, G., & Kakarountas, A. (2022). Enhancing Food Supply Chain Security through the Use of Blockchain and TinyML. Information, 13(5), 213.
Tummala, R., & Schoenherr, T. (2011). Assessing and managing risks using the supply chain risk management process (SCRMP). Supply Chain Management: An International Journal, 16(6), 474-483.
U.S. Department of Homeland Security(2022) CTPAT: Customs Trade Partnership Against Terrorism. U.S. Customs and Border Protection. https://www.cbp.gov/border-security/ports-entry/cargo-security/CTPAT
Um, J., & Han, N. (2020). Understanding the relationships between global supply chain risk and supply chain resilience: the role of mitigating strategies. Supply Chain Management: An International Journal. 26(2), 240-255.
United Nations Conference on Trade and Development (2006), Maritime Security: Elements of an Analytical Framework for Compliance Measurement and Risk Assessment, United Nations, New York, NY and Geneva, UNCTAD/SDTE/TLB/2006.
Van Leeuwen, T., & Jewitt, C. (Eds.). (2001). The handbook of visual analysis. Sage.
Varzandeh, J., Farahbod, K., & Zhu, J. J. (2016). Global logistics and supply chain risk management. Journal of Business and Behavioral Sciences, 28(1), 124.
Vedula N et al. (2017) Multimodal content analysis for effective advertisements on YouTube. IEEE International Conference on Data Mining (ICDM), 2017, pp. 1123-1128, doi: 10.1109/ICDM.2017.149.
Venkatesan, S. P., & Kumanan, S. (2012). Supply chain risk prioritisation using a hybrid AHP and PROMETHEE approach. International Journal of Services and Operations Management, 13(1), 19-41.
Voisin, P. B. W. (1996). Supply chain management: A time-based strategy. Industrial Management, 38(5).
Voss, M. D., Closs, D. J., Calantone, R. J., Helferich, O. K., & Speier, C. (2009). The role of security in the food supplier selection decision. Journal of Business Logistics, 30(1), 127-155.
Wagner, S. M., & Bode, C. (2008). An empirical examination of supply chain performance along several dimensions of risk. Journal of business logistics, 29(1), 307-325.
Wang, X., Zhang, D., He, M., Su, D., & Tehranipoor, M. (2017). Secure scan and test using obfuscation throughout supply chain. IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, 37(9), 1867-1880.
Whipple, J. M., Voss, M. D., & Closs, D. J. (2009). Supply chain security practices in the food industry: Do firms operating globally and domestically differ?. International Journal of Physical Distribution & Logistics Management. 39(7), 574-594.
White, M. D., & Marsh, E. E. (2006). Content analysis: A flexible methodology. Library trends, 55(1), 22-45.
Wieland, A., & Wallenburg, C. M. (2013). The influence of relational competencies on supply chain resilience: a relational view. International journal of physical distribution & logistics management. 43(4), 300-320.
Wiengarten, F., Humphreys, P., Gimenez, C., & McIvor, R. (2016). Risk, risk management practices, and the success of supply chain integration. International Journal of Production Economics, 171, 361-370.
Williams, Z., Lueg, J. E., & LeMay, S. A. (2008). Supply chain security: an overview and research agenda. The International Journal of Logistics Management. 19(2), 254-281.
Williams, Z., Lueg, J. E., Taylor, R. D., & Cook, R. L. (2009a). Why all the changes? An institutional theory approach to exploring the drivers of supply chain security (SCS). International Journal of Physical Distribution & Logistics Management. 39(7), 595-618.
Williams, Z., Ponder, N., & Autry, C. W. (2009b). Supply chain security culture: measure development and validation. The International Journal of Logistics Management. 20(2), 243-260.
Willis, H. H., & Ortiz, D. S. (2004). Evaluating the security of the global containerized supply chain. RAND CORP SANTA MONICA CA.
Wilson, R. (2005), “Security report card – not making the grade; 16th annual state of logistics report”, White Paper, Council of Supply Chain Management Professionals, Lombard, IL, available at: www.cscmp.org
Witt, C.E.(2006). Supply chain security update. Modern Handling Management, 61(11), 40-1.
Yang, B., & Yang, Y. (2010). Postponement in supply chain risk management: a complexity perspective. International Journal of Production Research, 48(7), 1901-1912.
Yang, C. C., & Wei, H. H. (2013). The effect of supply chain security management on security performance in container shipping operations. Supply Chain Management: An International Journal. 18(1). 74-85.
Yang, M.H. (2006), Application of the International Ship and Port Facility Security Code (ISPS) in the Keelung Port, National Taiwan Ocean University, Keelung, an unpublished Master thesis.
Yang, Y. C. (2011). Risk management of Taiwan’s maritime supply chain security. Safety science, 49(3), 382-393.
Yeboah-Ofori, A., Islam, S., Lee, S. W., Shamszaman, Z. U., Muhammad, K., Altaf, M., & Al-Rakhami, M. S. (2021). Cyber threat predictive analytics for improving cyber supply chain security. IEEE Access, 9, 94318-94337.
Yeboah-Ofori, A., Ismail, U. M., Swidurski, T., & Opoku-Boateng, F. (2021, July). Cyberattack ontology: A knowledge representation for cyber supply chain security. In 2021 International Conference on Computing, Computational Modelling and Applications (ICCMA) (pp. 65-70). IEEE.
Zailani, S. H., Subaramaniam, K. S., Iranmanesh, M., & Shaharudin, M. R. (2015). The impact of supply chain security practices on security operational performance among logistics service providers in an emerging economy: Security culture as moderator. International Journal of Physical Distribution & Logistics Management. 45(7), 652-673.
Zhang, D., Wang, X., Rahman, M. T., & Tehranipoor, M. (2018). An on-chip dynamically obfuscated wrapper for protecting supply chain against IP and IC piracies. IEEE Transactions on Very Large Scale Integration (VLSI) Systems, 26(11), 2456-2469.
Zhao, J., & Li, Y. (2022). Supply chain security evaluation model and index system based on a 5G information system. Neural Computing and Applications, 34(15), 12271-12281.
Zhao, Y., Dong, S., & Li, L. (2014). Sentiment analysis on news comments based on supervised learning method.
Zhou, N., Su, H., Wu, Q., Hu, S., Xu, D., Yang, D., & Cheng, J. (2022). China's lithium supply chain: Security dynamics and policy countermeasures. Resources Policy, 78, 102866.
Zsidisin, G. A., Melnyk, S. A., & Ragatz, G. L. (2005). An institutional theory perspective of business continuity planning for purchasing and supply management. International journal of production research, 43(16), 3401-3420.