Cyber Supply Chain Risk Management (CSCRM) is a novel risk management approach with Cyber Security (CS) being its crucial component. In the age of digitalization, CS has become a major concern worldwide. This study investigates the influence of CSCRM on Supply Chain 4.0 (SC 4.0) using a causal model to evaluate the connection between CS, CSCRM, and SC 4.0. The research investigates the link between CS and CSCRM, and between CSCRM and the levers of SC 4.0. The results highlight that CSCRM significantly influences various supply chain activities. The findings show that the integration of CSCRM, supported by CS is essential for improving the performance of SC 4.0. The “Statistical Package for the Social Sciences’’ was employed after administering a questionnaire to stakeholders in the Moroccan automotive and aeronautic industries.
Supply Chain 4.0, Cyber Supply Chain Risk Management, Cyber Security, Causal model
Aamer, A., Sahara, C.R. and Al-Awlaqi, M. A., (2023) Digitalization of the supply chain: transformation factors. Journal of Science and Technology Policy Management, 14(4), pp. 713–733. Available at: https://doi.org/10.1108/JSTPM-01-2021-0001.
Aarland, M., (2025) Cybersecurity in digital supply chains in the procurement process: introducing the digital supply chain management framework, Information &Computer Security, 33(1), pp. 5–24. Available at: https://doi.org/10.1108/ICS-10-2023-0198.
Azouzi, M., Iqqi, I. and Amri, M., (2023) Safety and security as risk management factors in supply chains. Journal of Operations Management, 3(1), pp. 1-10.
Boyson, S., Corsi, T. M. and Paraskevas, J.-P., (2022) Defending digital supply chains: Evidence from a decade-long research program. Technovation, 118, p. 102380. Available at: https://doi.org/10.1016/j.technovation.2021.102380.
Churchill, G. A., (1979) A Paradigm for Developing Better Measures of Marketing Constructs. Journal of Marketing Research, 16(1), pp. 64–73. Available at: https://doi.org/10.1177/002224377901600110.
Colicchia, C., Creazza, A. and Menachof, D. A., (2019) Managing cyber and information risks in supply chains: insights from an exploratory analysis. Supply Chain Management: An International Journal, 24(2), pp. 215–240. Available at: https://doi.org/10.1108/SCM-09-2017-0289.
Creazza, A. et al., (2022) Who cares? Supply chain managers’ perceptions regarding cyber supply chain risk management in the digital transformation era. Supply Chain Management: An International Journal, 27(1), pp. 30–53. Available at: https://doi.org/10.1108/SCM-02-2020-0073.
Eggers, S., (2021) A novel approach for analyzing the nuclear supply chain cyber-attack surface. Nuclear Engineering and Technology, 53(3), pp. 879–887. Available at: https://doi.org/10.1016/j.net.2020.08.021.
Firth, R., Srivastava, M., (2024) Identifying Critical Success Factors (CSF) for Cyber Supply Chain Risk Management (CSCRM): A Qualitative Study Using Agency Theory, in K.S. Soliman (ed.) Artificial intelligence and Machine Learning. Cham: Springer Nature Switzerland (Communications in Computer and Information Science), pp. 173–186. Available at: https://doi.org/10.1007/978-3-031-62843-6_19.
Foli, S. et al., (2022) Supply Chain Risk Management in Young and Mature SMEs. Journal of Risk and Financial Management, 15(8), p. 328. Available at: https://doi.org/10.3390/jrfm15080328.
Fornell, C., Bookstein, F. L., (1982) Two Structural Equation Models: LISREL and PLS Applied to Consumer Exit-Voice Theory. Journal of Marketing Research, 19(4), p. 440. Available at: https://doi.org/10.2307/3151718.
Gani, A. B. D., Fernando, Y., (2024) Ten-year review of cyber supply chain security: driving productivity with visibility. International Journal of Productivity and Quality Management, 42(2), pp. 153–169. Available at: https://doi.org/10.1504/IJPQM.2024.139156.
Handfield, R., Earp, J. and Sadeghi, A. H., (2025) Reducing cybersecurity vulnerabilities in the supply base: Insights from cyber experts, Technology in Society, 82, p. 102947. Available at: https://doi.org/10.1016/j.techsoc.2025.102947.
Ivanov, D. et al., (2021) Researchers’ perspectives on Industry 4.0: multi-disciplinary analysis and opportunities for operations management. International Journal of Production Research, 59(7), pp. 2055–2078. Available at: https://doi.org/10.1080/00207543.2020.1798035.
Kern, E. Szanto, A., (2022) Cyber Supply Chain Attacks, in Tim H. Stuchtey (eds). BIGS Policy Paper Brandenburg Institute for Society and Security, p. 10.
Kessler, M. et al., (2022) Curse or Blessing? Exploring risk factors of digital technologies in industrial operations. International Journal of Production Economics, 243, p.108323. Available at: https://doi.org/10.1016/j.ijpe.2021.108323.
Kline, R. B., (1999) Book Review: Psychometric theory (3rd ed.). Journal of Psychoeducational Assessment, 17(3), pp. 275–280. Available at: https://doi.org/10.1177/073428299901700307.
Kohnke, O., (2017) It’s Not Just About Technology: The People Side of Digitization, in G. Oswald and M. Kleinemeier (eds). Shaping the Digital Enterprise. Cham: Springer International Publishing, pp. 69–91. Available at: https://doi.org/10.1007/978-3-319-40967-2_3.
La fédération de l’automobile, (2023) Annuaire du secteur automobile au Maroc. Available at: https://cgem.ma/structures/federations-statutaires/federation-delautomobile-fa/ (Accessed: 15 August 2023).
Larriva-Novo, X. A. et al., (2020) Evaluation of Cybersecurity Data Set Characteristics for Their Applicability to Neural Networks Algorithms Detecting Cybersecurity Anomalies. IEEE Access, 8, pp. 9005–9014. Available at: https://doi.org/10.1109/ACCESS.2019.2963407.
Likert, R., (1932) A technique for the measurement of attitudes. Academic Dissertation. Columbia University.
Martins, F. D. C., Simon, A. T. and Campos, R. S. D., (2020) Supply Chain 4.0 challenges. Gestao & Produçao, 27(3), p. e5427. Available at: https://doi.org/10.1590/0104-530x5427-20.
Ministry of Industry and Trade, (2023) Aeronautic. [Online] Available at: https://www.mcinet.gov.ma/fr/content/aeronautique. Consulted: May 2023.
Ministry of Industry and Trade, (2023) Automobile. [Online] Available at: https://www.mcinet.gov.ma/fr/content/aeronautique. Consulted: May 2023.
Moroccan High Commission for Planning, (2019) Classification criteria of Moroccan companies. 19 Novembre 2019, 19 November, p. 28.
Muller, S. R., (2022) Analyzing Deficits in Awareness Among Chief Supply Chain Officers Who Have Not Adopted Cybersecurity as a Threat to Supply Chains, in 2022 IEEE International Conference on Machine Learning and Applied Network Technologies (ICMLANT). 2022 IEEE International Conference on Machine Learning and Applied Network Technologies (ICMLANT), Soyapango. El Salvador:
IEEE, pp. 1–6. Available at: https://doi.org/10.1109/ICMLANT56191.2022.9996456.
Nygard, A. R., Katsikas, S., (2022) SoK: Combating threats in the digital supply chain, in Proceedings of the 17th International Conference on Availability, Reliability and Security. ARES 2022: The 17th International Conference on Availability, Reliability and Security, Vienna Austria: ACM, pp. 1–8. Available at: https://doi.org/10.1145/3538969.3544421 .
Oullada, O. et al. ,(2023) Model for measuring the impact of good pharmacovigilance practices of COVID-19 patients on hcp reactivity: Morocco case study. Statistics in Transition new series, 24(5), pp. 63–88. Available at: https://doi.org/10.59170/stattrans-2023-064.
Pandey, S. et al., (2020) Cyber security risks in globalized supply chains: conceptual framework. Journal of Global Operations and Strategic Sourcing, 13(1), pp. 103–128. Available at: https://doi.org/10.1108/JGOSS-05-2019-0042.
Pandey, S., Singh, R. K. and Gunasekaran, A., (2021) Supply chain risks in Industry 4.0 environment: review and analysis framework. Production Planning & Control, pp. 1–28. Available at: https://doi.org/10.1080/09537287.2021.2005173.
Politeknik Mukah Sarawak, Sarawak, Malaysia et al., (2021) Cyber security in supply chain management: A systematic review. Logforum, 17(1), pp. 49–57. Available at: https://doi.org/10.17270/J.LOG.2021555.
Salem, I. E., Al-Saedi, K. H., (2023) Intensive Malware Detection Approach based on Data Mining. Journal of Applied Engineering and Technological Science (JAETS), 5(1), pp. 414–424. Available at: https://doi.org/10.37385/jaets.v5i1.2865.
Sassi, A. et al., (2021) The relation between Industry 4.0 and Supply Chain 4.0 and the impact of their implementation on companies. International Journal of Innovation and Applied Studies. performance: State of the Art’, 31(4), p. 820-828.
Sassi, A. et al., (2024) Model for Assessing the Impact of Internet of Things on Supply Chain 4.0: Moroccan Case, in Y. Mejdoub and A. Elamri (eds) Proceeding of the International Conference on Connected Objects and Artificial Intelligence (COCIA2024). Cham: Springer Nature Switzerland (Lecture Notes in Networks and Systems), pp. 252–258. Available at: https://doi.org/10.1007/978-3-031-70411-6_39.
Sassi, A. et al., (2025) A causal model to assess the influence of supply chain 4.0 on Moroccan companies’ performance. International Journal of Advances in Applied Sciences, 14(1), p. 111. Available at: https://doi.org/10.11591/ijaas.v14.i1.pp111-122.
Serhane, A., Hamzaoui, E.-M. and Ibrahimi, K., (2023) IA Applied to IIoT Intrusion Detection: An Overview, in 2023 10th International Conference on Wireless Networks and Mobile Communications (WINCOM). 2023 10th International Conference on Wireless Networks and Mobile Communications (WINCOM), Istanbul. Turkiye: IEEE, pp. 1–6. Available at: https://doi.org/10.1109/WINCOM59760.2023.10323032.
Tamy, S. et al., (2020) Cyber security based machine learning algorithms applied to industry 4.0 application case: Development of network intrusion detection system using hybrid method. Journal of Theoretical and Applied Information Technology, 98(12), pp. 2078–2091.
Tatt*, D. Y. B., Ganesan, Y. and Fernando, Y., (2019) ‘The Effects of Cyber Supply Chain Risk Management in Financial Industry’. ICBSI 2018 - International Conference on Business Sustainability and Innovation, pp. 512–521. Available at: https://doi.org/10.15405/epsbs.2019.08.51.
Zhang, Y. et al., (2019) ‘PCCN: Parallel Cross Convolutional Neural Network for Abnormal Network Traffic Flows Detection in Multi-Class Imbalanced Network Traffic Flows’. IEEE Access, 7, pp. 119904–119916. Available at: https://doi.org/10.1109/ACCESS.2019.2933165.