A Trusted Global Data Supply Chain

  • Chapter
  • First Online:
Data, Security, and Trust in Smart Cities

Part of the book series: Signals and Communication Technology ((SCT))

Abstract

The global data supply chain is in transformation and in need of a reset due to a post-COVID world. This stark reality has accelerated digitization by decades, necessitating supply-chain resiliency due to greater hemispheric and regional ties. This realignment is aimed at offsetting dependency on Chinese infrastructure, manufacturing, and supplies and cybersecurity intrusions. Business-to-Business (B2B) integration remains the backbone of supply chains in which access to data files must be authorized, intended, instant, precise, accurate, and actionable to address business priorities seeking control, faster time to market, interoperability, chain visibility, and operational analytics.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Springer+ Basic
EUR 32.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or Ebook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now
Chapter
EUR 29.95
Price includes VAT (Germany)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
EUR 72.75
Price includes VAT (Germany)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
EUR 128.39
Price includes VAT (Germany)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free ship** worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. C. Svensson (2023). The Blockchain Multiverse: The Future of Public and Private Networks. https://www.linkedin.com/pulse/blockchain-multiverse-future-public-private-networks-conor-svensson Accessed Dec 2023.

  2. Y. Sheffi (2023). The Magic Conveyor Belt: Supply Chains, A.I., and the Future of Work. MIT CTL Media. ISBN 978-1735766188.

    Google Scholar 

  3. P. Diamandis, S. Kotler (2020). The Future is Faster Than You Think. Simon, and Schuster.

    Google Scholar 

  4. Decision Intelligence (2013). Gartner Information Technology Glossary. https://www.gartner.com/en/information-technology/glossary/decision-intelligence Accessed Dec 2023.

  5. Team Zuar (2022). Cloud Based Data Management: Concepts & Tips for Businesses. https://www.zuar.com/blog/cloud-based-data-management-concepts-and-tips-for-businesses/ Accessed Dec 2023.

  6. M. Patel, J. Shangkuan, C. Thomas (2017). What’s New with the Internet of Things. https://www.mckinsey.com/industries/semiconductors/our-insights/whats-new-with-the-internet-of-things Accessed Dec 2023.

  7. C. Miller (2022). Chip War: The Fight for the World’s Most Critical Technology. Scribner. ISBN 978-1982172008

    Google Scholar 

  8. S. Ellis, T. Eide, R. Gaines (2023). Next Generation B2B Integration Enables a Digital-First, Resilient Supply Chain. IDC Doc. #CA49778622

    Google Scholar 

  9. Supply Chain Disruption – Thematic Research (2022). Global Data Report GDTMT-TR-S366-TH. https://www.globaldata.com/store/report/supply-chain-disruption-theme-analysis/ Accessed Dec 2023.

  10. L. Sly, J. Ledur (2023). China has acquired a global network of strategically vital ports. https://www.washingtonpost.com/world/interactive/2023/china-ports-trade-military-navy/ Accessed Dec 2023.

  11. W. Holstein, M. McLaughlin (2023). Battlefield Cyber: How China and Russia are Undermining Our Democracy and National Security., Prometheus. ISBN 978-1633889019

    Google Scholar 

  12. J. Biden (2021). Remarks by President Biden at a Virtual CEO Summit on Semiconductor and Supply Chain Resilience. https://www.whitehouse.gov/briefing-room/speeches-remarks/2021/04/12/remarks-by-president-biden-at-a-virtual-ceo-summit-on-semiconductor-and-supply-chain-resilience/ Accessed Dec 2023.

  13. H.R.3684 - 117th Congress (2021–2022). Public Law No: 117-58. Infrastructure Investment and Jobs Act. https://www.congress.gov/bill/117th-congress/house-bill/3684 Accessed Dec 2023.

  14. J. Neuffer, T. Younkin (2021). Decadal Plan for Semiconductors. Semiconductor Research Corporation (SRC). https://www.src.org/about/decadal-plan/ Accessed Dec 2023.

  15. H.R.4346 - 117th Congress (2021–2022). Public Law No: 117-167. Chips and Science Act. https://www.congress.gov/bill/117th-congress/house-bill/4346 Accessed Dec 2023.

  16. S. Morgan (2020). Cybercrime To Cost The World $10.5 Trillion Annually By 2025. Cybercrime Magazine. https://cybersecurityventures.com/cybercrime-damage-costs-10-trillion-by-2025/ Accessed Dec 2023.

  17. J. Biden (2021). Executive Order on Improving the Nation’s Cybersecurity. Executive Order 14280. https://www.whitehouse.gov/briefing-room/presidential-actions/2021/05/12/executive-order-on-improving-the-nations-cybersecurity/ Accessed Dec 2023.

  18. D. Gardner (2023). Mitigate Enterprise Software Supply Chain Security Risks. Gartner Report 4893131. https://www.gartner.com/en/documents/4893131 Accessed Dec 2023.

  19. J. Reed (2023). High-Impact Attacks on Critical Infrastructure Climb 140%. Security Intelligence. https://securityintelligence.com/news/high-impact-attacks-on-critical-infrastructure-climb-140/ Accessed Dec 2023.

  20. S. Anderson (2020). Interview with Thomas Sasala, DON Chief Data Officer Talks about Building an Enterprise Data Architecture. CHIPS. https://www.doncio.navy.mil/CHIPS/ArticleDetails.aspx?ID=13186 Accessed Dec 2023.

  21. Data Breach Investigations Report (2023). Verizon. https://www.verizon.com/business/resources/reports/dbir/ Accessed Dec 2023.

  22. M. DeLisi, C. Howley (2023). Gartner Forecasts Worldwide IT Spending to Grow 8% in 2024. https://www.gartner.com/en/newsroom/press-releases/2023-10-18-gartner-forecasts-worldwide-it-spending-to-grow-8-percent-in-2024 Accessed Dec 2023.

  23. V. Smil (2021). Numbers Don’t Lie: 71 Stories to Help Us Understand the Modern World. Penguin Books. ISBN 9780143136224

    Google Scholar 

  24. G. Bueermann, S. Doyle, et al. (2023). Global Cybersecurity Outlook 2023. World Economic Forum. https://www3.weforum.org/docs/WEF_Global_Security_Outlook_Report_2023.pdf Accessed Dec 2023.

  25. Smart Grid Market by Component (Software, Hardware, Services), Application (Generation, Transmission, Distribution, Consumption/End Use), Communication Technology (Wireline, Wireless), and Region – Global Forecast to 2026. Markets and Markets. Report EP 7997. https://www.marketsandmarkets.com/ResearchInsight/smart-grid-market.asp Accessed Dec 2023.

  26. H. Kissinger, E. Schmidt, D. Huttenlocher (2021). The Age of AI: and Our Human Future. Little Brown and Company. ISBN 978-0316273800

    Google Scholar 

  27. Data and Trust Alliance (2023). https://dataandtrustalliance.org/ Accessed Dec 2023.

  28. B. Collins (2024). “You can’t prevent the unpreventable” – Rubrik CEO on reframing the conversation on cybersecurity. TechRadar. https://www.techradar.com/pro/you-cant-prevent-the-unpreventable-rubrik-ceo-on-reframing-the-conversation-on-cybersecurity Accessed Dec 2023.

  29. Simplified Cybersecurity Analytics (2023). GuardDog. www.guarddog.ai Accessed Dec 2023.

  30. Everynet operates the largest, neutral-host, Low Power Wide Area (LPWA) networks in the world (2023). Everynet. www.everynet.com Accessed Dec 2023.

  31. Anterix is where utility meets connectivity (2023). Anterix. www.anterix.com Accessed Dec 2023.

  32. Powered By Stealth (2023). SecureCo. www.sercureco.com Accessed Dec 2023.

  33. Multi-Cloud Data Services from Edge to Cloud (2023). CTERA Networks. www.ctera.com Accessed Dec 2023.

  34. AI starts with trusted data (2023). Collibra. www.collibra.com Accessed Dec 2023.

  35. Cybeats SBOM Studio (2023). Cybeats. www.cybeats.com Accessed Dec 2023.

  36. Comprehensive solutions in all domains (2023). ELTA Systems. www.iai.co.il Accessed Dec 2023.

  37. Industrial cybersecurity for OT environments (2023). Dragos. www.dragos.com Accessed Dec 2023.

  38. Secure your cyber-physical systems (2023). Claroty. www.claroty.com Accessed Dec 2023.

  39. AE before AI (2023). Quiddity Systems. https://www.myquiddity.org/ Accessed Dec 2023.

  40. A. Garfinkle (2023). Microsoft’s near-term fate is in OpenAI’s hands – for better or worse. Yahoo Finance. https://finance.yahoo.com/news/microsofts-near-term-fate-is-in-openais-hands%2D%2Dfor-better-or-worse-205250812.html Accessed Dec 2023.

  41. Privacy made certain (2023). Sertainty. www.sertainty.com Accessed Dec 2023.

  42. R. Gradwohl, M. Sullivan (2020). Applied Materials Charts a Course for Enabling a More Sustainable Company, Industry, and World. https://ir.appliedmaterials.com/node/23626/pdf Accessed Dec 2023.

  43. Industry 4.0 (2023). Applied Materials. https://www.appliedmaterials.com/us/en/solar/specialties/industry-4-0.html Accessed Dec 2023.

  44. B. Nadji (2020). UXP – Access Tracking & Reporting. In UXP - Unbreakable eXchange Protocol: An Intelligent Sertainty™ Self-Protecting-Data SDK Library Technical Overview. Sertainty Corporation Presentation.

    Google Scholar 

  45. This is NEOM (2023). NEOM. https://www.neom.com Accessed Dec 2023.

  46. Schneider Electric (2013). What is Modbus and How does it work? https://www.se.com/us/en/faqs/FA168406/ Accessed Dec 2023.

  47. A. Alissa, et al. (2023). How to Enhance the Operational Technology Environment. McKinsey Cyber Security Practice. https://www.mckinsey.com/capabilities/risk-and-resilience/our-insights/cybersecurity/how-to-enhance-the-cybersecurity-of-operational-technology-environments Accessed Dec 2023.

  48. D. Collins (2022). What are Digital Twins and How They are Used in Industrial Manufacturing. Motion Control Tips. https://www.motioncontroltips.com/what-are-digital-twins-how-are-they-used-in-industrial-manufacturing/ Accessed Dec 2023.

  49. U.S. Department of Defense (2022). Department of Defense Announces Joint Warfighting Cloud Capability Procurement. https://www.defense.gov/News/Contracts/Contract/Article/3239197/ https://www.defense.gov/News/Releases/Release/Article/3239378/department-of-defense-announces-joint-warfighting-cloud-capability-procurement/ Accessed Dec 2023.

  50. P. Scharre (2023). Four Battlegrounds: Power in the Age of Artificial Intelligence. W.W. Norton. ISBN 978-1-324-07477-9

    Google Scholar 

  51. R. Ferrell (2016). Sha** the Army Network: 2025–2040. Office of the Army Chief Information Officer/G6. https://www.hsdl.org/?view&did=791846 Accessed Dec 2023.

  52. A. Sternhell (2020). Interoperability Stack. In Interoperability Utilizing the Data-Layer. Sertainty Corporation Presentation.

    Google Scholar 

  53. W. Owens, J. Kasich (2023). America’s Military is Unprepared for Our Age of Advanced Technology. Time Magazine. https://time.com/6272728/americas-military-unprepared-advanced-technology/ Accessed Dec 2023.

  54. J. Biden (2021). Executive Order 14017. https://www.whitehouse.gov/briefing-room/presidential-actions/2021/02/24/executive-order-on-americas-supply-chains/ Accessed Dec 2023.

  55. S. Condon (2021). Google gives predictions for the future of security. ZDNET. https://www.zdnet.com/article/google-gives-predictions-for-the-future-of-security/ Accessed Dec 2023.

  56. A. Haines (2023). National Intelligence Strategy. Office of the Director of National Intelligence. https://www.odni.gov/files/ODNI/documents/National_Intelligence_Strategy_2023.pdf Accessed Dec 2023.

  57. J. Butler, D. Gibson eds. (2011). Global Perspectives on Technology Transfer and Commercialization: Building Innovative Ecosystems. Edward Elgar Publishing. ISBN 978-1-84980-977-1

    Google Scholar 

  58. M. Pomerleau (2023). Army network design for 2025 to focus on division level for first time. DefenseScoop. https://defensescoop.com/2023/01/12/army-network-design-for-2025-to-focus-on-division-level-for-first-time/ Accessed Dec 2023.

  59. P. Shor (1994). Algorithms for quantum computation: Discrete logarithms and factoring. Proc 35th Annual Symp on Foundations of Computer Science. IEEE Computer. Soc. Press. pp. 124–134. https://doi.org/10.1109/sfcs.1994.365700. ISBN 08-8665807. S2CID 15291489.

  60. Sertainty (2020). Self-Protecting-Data vs. Standard File Encryption: The Three Differentiators. Whitepaper.

    Google Scholar 

  61. National Counterintelligence and Security Center (NCSC). https://www.dni.gov/index.php/ncsc-home Accessed Dec 2023.

  62. A. Sternhell (2020). Generating Interoperability and Superior Situational Awareness. In Interoperability Utilizing the Data-Layer. Sertainty Corporation Presentation.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Amir Sternhell .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2024 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Sternhell, A. (2024). A Trusted Global Data Supply Chain. In: McClellan, S. (eds) Data, Security, and Trust in Smart Cities. Signals and Communication Technology. Springer, Cham. https://doi.org/10.1007/978-3-031-61117-9_1

Download citation

  • DOI: https://doi.org/10.1007/978-3-031-61117-9_1

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-031-61116-2

  • Online ISBN: 978-3-031-61117-9

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics

Navigation