Enhancing Cybersecurity in Logistics Networks in Oman

  IJRES-book-cover  International Journal of Recent Engineering Science (IJRES)          
  
© 2024 by IJRES Journal
Volume-11 Issue-5
Year of Publication : 2024
Authors : Ali S al Kalbani, Hajar R al Kalbani
DOI : 10.14445/23497157/IJRES-V11I5P105

How to Cite?

Ali S al Kalbani, Hajar R al Kalbani, "Enhancing Cybersecurity in Logistics Networks in Oman," International Journal of Recent Engineering Science, vol. 11, no. 5, pp. 40-50, 2024. Crossref, https://doi.org/10.14445/23497157/IJRES-V11I5P105

Abstract
The logistics industry in Oman relies heavily on digital networks, increasing its vulnerability to cyber threats. This study examines the current cybersecurity state within Oman's logistics networks, focusing on implementing and assessing cybersecurity measures. The present study combines elements of both qualitative and quantitative research through interviews and surveys with supply chain and logistics professionals. Key areas explored include cybersecurity measures, employee training, adherence to cybersecurity standards, and incident response plans. Findings reveal widespread adoption of essential cybersecurity technologies but highlight the need for increased investment, training, and security audits. This study provides insights and recommendations to enhance cybersecurity resilience in Oman's logistics sector.

Keywords
Cybersecurity, Data breaches, Logistics networks, Oman, Supply chain security

Reference
[1] Gabriela Ioana Enache, “Logistics Security in the Era of Big Data, Cloud Computing and IoT,” Proceedings of the International Conference on Business Excellence, vol. 17, no. 1, pp. 188-199, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[2] Theresa Sobb, Benjamin Turnbull, and Nour Moustafa, “Supply Chain 4.0: A Survey of Cyber Security Challenges, Solutions and Future Directions,” Electronics, vol. 9, no. 11, pp. 1-31, 2020.
[CrossRef] [Google Scholar] [Publisher Link]
[3] Xavi Masip-Bruin et al., “Cybersecurity in ICT Supply Chains: Key Challenges and a Relevant Architecture,” Sensors, vol. 21, no. 18, pp. 1-24, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[4] Sergeja Slapničar et al., “Effectiveness of Cybersecurity Audit,” International Journal of Accounting Information Systems, vol. 44, pp. 1- 21, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[5] Mário Antunes, Marisa Maximiano, and Ricardo Gomes, “A Client-Centered Information Security and Cybersecurity Auditing Framework,” Applied Sciences, vol. 12, no. 9, pp. 1-15, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[6] Jay Simon, and Ayman Omar, “Cybersecurity Investments in the Supply Chain: Coordination and a Strategic Attacker,” European Journal of Operational Research, vol. 282, no. 1, pp. 161-171, 2020.
[CrossRef] [Google Scholar] [Publisher Link]
[7] Sebastian Heierhoff, and Nils Hoffmann, “Cybersecurity vs. Digital Innovation: A Trade-off for Logistics Companies?,” Proceedings of the 55th Hawaii International Conference on System Sciences, pp. 1-10, 2022.
[Google Scholar] [Publisher Link]
[8] Dawit Negussie Tolossa, “Importance of Cybersecurity Awareness Training for Employees in Business,” Vidya - A Journal of Gujarat University, vol. 2, no. 2, pp. 104-107, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[9] Munene Hellen Muthoni, and Karungani Walter, “Effect of Risk Management Strategies on Supply Chain Performance of Cybersecurity Firms in Kenya,” International Journal of Strategic Management, vol. 4, no. 2, pp. 407-420, 2021.
[Google Scholar] [Publisher Link]
[10] Monica Canepa et al., “Effectiveness of Cybersecurity Training and Awareness Raising within the Maritime Logistics Domain,” DEVPORT International Conference, 2020.
[Google Scholar] [Publisher Link]
[11] Fai Ben Salamah et al., “An Adaptive Cybersecurity Training Framework for the Education of Social Media Users at Work,” Applied Sciences, vol. 13, no. 17, pp. 1-18, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[12] Hamed Taherdoost, “Understanding Cybersecurity Frameworks and Information Security Standards-A Review and Comprehensive Overview,” Electronics, vol. 11, no. 14, pp. 1-20, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[13] Melwin Syafrizal, Siti Rahayu Selamat, and Nurul Azma Zakaria, “Analysis of Cybersecurity Standard and Framework Components,” International Journal of Communication Networks and Information Security, vol. 12, no. 3, pp. 417-432, 2020.
[CrossRef] [Google Scholar] [Publisher Link]
[14] Henock Mulugeta Melaku, “A Dynamic and Adaptive Cybersecurity Governance Framework,” Journal of Cybersecurity and Privacy, vol. 3, no. 3, pp. 327-350, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[15] Yuchong Li, and Qinghui Liu, “A Comprehensive Review Study of Cyber-Attacks and Cyber Security; Emerging Trends and Recent Developments,” Energy Reports, vol. 7, pp. 8176-8186, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[16] Alin Zamfiroiu, and Ramesh C Sharma, “Cybersecurity Management for Incident Response,” Romanian Cyber Security Journal, vol. 4, no. 1, pp. 69-75, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[17] Ayesha Naseer et al., “Moving Towards Agile Cybersecurity Incident Response: A Case Study Exploring the Enabling Role of Big Data Analytics-Embedded Dynamic Capabilities,” Computers and Security, vol. 135, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[18] Clare M. Patterson, Jason R.C. Nurse, and Virginia N.L. Franqueira, “Learning from Cyber Security Incidents: A Systematic Review and Future Research Agenda,” Computers and Security, vol. 132, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[19] Dan Blum, Institute Resilience through Detection, Response, and Recovery, Rational Cybersecurity for Business, pp. 259-295, 2020.
[CrossRef] [Google Scholar] [Publisher Link]
[20] Hamed Taherdoost, “Data Collection Methods and Tools for Research; a Step-by-Step Guide to Choose Data Collection Technique for Academic and Business Research Projects,” International Journal of Academic Research in Management, vol. 10, no. 1, pp. 10-38, 2021.
[Google Scholar] [Publisher Link]
[21] Judith Schoonenboom, and R. Burke Johnson, “How to Construct A Mixed Methods Research Design,” KZfSS Cologne Journal for Sociology and Social Psychology, vol. 69, pp. 107-131, 2017.
[CrossRef] [Google Scholar] [Publisher Link]
[22] Haradhan Mohajan, “Two Criteria for Good Measurements in Research: Validity and Reliability,” Annals of Spiru Haret University. Economic Series, vol. 17, no. 4, pp. 56-82, 2017.
[Google Scholar] [Publisher Link]
[23] Ashraf Mishrif, Alessandro Antimiani, and Asharul Khan, “Examining the Contribution of Logistics and Supply Chain in Boosting Oman's Trade Network,” Economies, vol. 12, no. 3, pp. 1-25, 2024.
[CrossRef] [Google Scholar] [Publisher Link]