In January 2012, President Obama released the National Strategy for Global Supply Chain Security. International trade has been and continues to be a powerful engine of the United States and global economic growth. The many cybersecurity challenges facing the U.S. include one of which many Americans are unaware – the serious threat posed by vulnerabilities in the cyber supply chain. Of the many components – including hardware, firmware, and software – that compose a technological product, most contain elements stemming from a broad global market, making it difficult to ascertain the complete security of an end product. With the market for technological goods and components continuing to rapidly grow every year, and with everything from missiles to smartphones relying on these information products, the need for mutual trust cyber supply chain security has never been more critical.
Enhancing the security of any national interests’ technological supply chain must not destroy the well- functioning international market for technology. Instead of the two extremes of “intrusive government mandates” or “do nothing,” the U.S. government is promoting development of private-sector systems for securing and accrediting technology companies that would allow customers – from the federal government to small businesses – to make more informed and risk- based decisions.
Organizations of all types (business, academia, government, etc.) are facing risks resulting from their ever- increasing reliance on the information infrastructure. Decision and policy makers managing these risks are challenged by a lack of information intelligence concerning the risks and consequences of cyber events (e.g., Sarbanes-Oxley Act, HIPAA, and Gramm-Leach-Bliley ACT). They need to understand the implications of cyber security risks and solutions related to their information infrastructure and business. Risk management investment decisions, within the context of mutual trust among supply chains should involve: (i) a comprehensive approach to cyber security risk management, (ii) credible appropriate data needed to support intelligent decisions, and (iii) assessment of the impacts resulting from the various investment alternatives. Sound, rational IT/business decisions require a comprehensive understanding of the dynamics of information intelligence and the likely effects of cyber security investment choices.
As our dependence on the cyber infrastructure and their associated supply chains grow ever larger, more complex, and more distributed, the systems that compose them become more prone to failures and/or exploitation. Trusted Supply Chains values currency and relevance over detail and accuracy. Information explosion describes the pervasive abundance of (public/private) information and the effects of such. Gathering, analyzing, and making use of information constitutes a business- / sociopolitical- / military-intelligence gathering activity and ultimately poses significant advantages and liabilities to the survivability of "our" society. The combination of increased vulnerability, increased stakes and increased threats make supply chains and their associated processes one of the most important emerging challenges in the evolution of modern cyberspace "mechanization." The goal of this minitrack is to challenge, establish and debate a far-reaching agenda that broadly and comprehensively outlines a strategy for mutual trust, cyber security, efficiency, and resilience of our vital global supply chain infrastructure research that is founded on sound principles and technologies.
Frederick Sheldon, Ph.D. is Professor and Department Chair, Department of Computer Science, University of Idaho. He is a senior member of the IEEE Computer and Reliability Societies, and member of ACM, Tau Beta Pi, Upsilon Pi Epsilon. He was the former chair of the Cyber Security and Information Intelligence Research Workshop held annually at ORNL.
Robert K. Abercrombie, Ph.D. is an Affiliated Research Professor, Department of Computer Science, University of Memphis, and Director, Cybernomics Laboratory, Center for Information Assurance, FedEx Institute of Technology. He is a senior member of the IEEE Computational Intelligence Society and member of ACM. He currently is the co-chair IEEE Symposium on Computational Intelligence in Cyber Security.
Xiaohui Cui, Ph.D. is Professor and Dean, International School of Software, Wuhan University. He has held previous appointments at New York Institute of Technology and Oak Ridge National Laboratory. Last summer, he chaired the China-US Mutual Trust on Information Products (MTIP) Workshop at Wuhan University, China.
Frederick T. Sheldon
(Primary Contact)
Department of Computer Science
875 Perimeter Drive MS 1010
Moscow, ID 83844-1010, USA
Phone: +1-208-885-6501
Fax: 208-885-9052
Email: sheldon@idaho.edu
Robert K. Abercrombie
University of Memphis
Department of Computer Science
Dunn Hall 375
Memphis, TN 38152-3240, USA
Phone: +1-865-966-7031
Fax: +1-901-678-1506
Email: abercrombier@ieee.org
Xiaohui Cui
Wuhan University
International School of Software
Hubei, PR China
Phone: +86 133-0714-6750
Email: cuixhui@gmail.com