Supply Chain Disruption Risk Management with Blockchain: A Dynamic Literature Review

: The purpose of this review is to describe the landscape of scientiﬁc literature enriched by an author’s keyword analysis to develop and test blockchain’s capabilities for enhancing supply chain resilience in times of increased risk and uncertainty. This review adopts a dynamic quantitative bibliometric method called systematic literature network analysis (SLNA) to extract and analyze the papers. The procedure consists of two methods: a systematic literature review (SLR) and bibliometric network analysis (BNA). This paper provides an important contribution to the literature in applying blockchain as a key component of cyber supply chain risk management (CSRM), manage and predict disruption risks that lead to resilience and robustness of the supply chain. This systematic review also sheds light on different research areas such as the potential of blockchain for privacy and security challenges, security of smart contracts, monitoring counterfeiting, and traceability database systems to ensure food safety and security.


Introduction
Disruption has always existed in the supply chain even before the term supply chain management (SCM) became part of our world. Disruptions have evolved over centuries from supply chain disruptions due to ecosystem changes, business model transformation, to cyberattacks by emerging technologies. (Deloitte). The fragility of international supply chains is increasing due to disruption risks that directly or indirectly endanger the stability and security of society. As an example, the spread of COVID-19 around the world has affected the movement of people and materials globally. The resulting supply chain disruptions have led to delivery delays and shortages of products and items. Simultaneously, requests for specific items utilized for epidemic control have increased dramatically, and the forecasting of demand patterns for many consumer goods has become more challenging. After the disruptions caused by the need to control the spread of the virus, the biggest challenge facing companies is restarting their supply chains. Of the many different types of risk involved in supply chain disruptions, those related to cyberattacks have gained the attention of the research community over recent years. The vulnerability of the supply chain is evidenced by cyber-attacks, for example, companies engaged in counterfeiting, theft, fraud, data manipulation, or falsification. As an example of a cybersecurity breach [1], reported Stuxnet computer worm externally taking control of Iran's Natanz uranium enrichment plant's controllers in November 2010. As stated by [2], "A cyber-event is any disturbance to this interdependent network that leads to loss of functionality, connectivity, or capacity" [2]. Based on another definition by [3], "Cyber risk is an issue that exists at the intersection of business risk, regulation, and technology". Deloitte reported that the In the first phase, SLR can be defined as "a specific methodology that locates existing studies, selects and evaluates contributions, analyses and synthesizes data" [13].
It was conducted through three steps, which defined the scope of the analysis to have a niche for the literature review. Second, the literature was located by tools of identified keywords, time of the retrieved papers, language, and document type in Scopus. Third, a literature selection was carried out, based on explicit criteria to include and exclude papers, which will form the input for the second phase (BNA). The BNA phase implies a bibliographic network analysis and visualization, which in this paper produces a citation network, a global citation score, and a keywords co-occurrence network.
The building networks were the product of the software VoSviewer (https://www.vosviewer.com/ (accessed on 7 February 2021)), which was used to create bibliometric networks, and, in this study, this software was applied to study author keywords analysis [14]. Pajek [15] is another software for social network analysis (http://mrvar.fdv.uni-lj.si/pajek/ (accessed on 7 February 2021)), and in this study, it was applied for creating, visualizing, and exploring citation networks following the method proposed by [16].
As a result, a dataset of selected papers was collected to construct an exhaustive literature review in the area of blockchain implications in managing cyber and disruption risks in the supply chain. The papers are available on the Scopus bibliographic database, which is the largest abstract and citation database in academia, covering the most important publishers, such as Springer, Elsevier, Taylor and Francis, IEEE, and Emerald. Moreover, Scopus encompasses a wider range of journals and thus offers a greater possibility for citation analysis in comparison to its peers [17].

Scope of the Analysis
In this paper, all the literature reviews include conference papers, articles, review papers, book chapters, were analyzed based on all types of applications of blockchain technology that can be used to manage cyber and disruption risks in the supply chain. It tries to capture meaningful information from a systematic literature network analysis (SLNA). It uncovers the current trends regarding cyber risks, disruptions, and blockchain paradigms and paves the way for newcomers in aiming to adopt any of the identified themes as their research focus. The trends of research in this area started in 2018 and have In the first phase, SLR can be defined as "a specific methodology that locates existing studies, selects and evaluates contributions, analyses and synthesizes data" [13].
It was conducted through three steps, which defined the scope of the analysis to have a niche for the literature review. Second, the literature was located by tools of identified keywords, time of the retrieved papers, language, and document type in Scopus. Third, a literature selection was carried out, based on explicit criteria to include and exclude papers, which will form the input for the second phase (BNA). The BNA phase implies a bibliographic network analysis and visualization, which in this paper produces a citation network, a global citation score, and a keywords co-occurrence network.
The building networks were the product of the software VoSviewer (https://www. vosviewer.com/ (accessed on 7 February 2021)), which was used to create bibliometric networks, and, in this study, this software was applied to study author keywords analysis [14].
As a result, a dataset of selected papers was collected to construct an exhaustive literature review in the area of blockchain implications in managing cyber and disruption risks in the supply chain. The papers are available on the Scopus bibliographic database, which is the largest abstract and citation database in academia, covering the most important publishers, such as Springer, Elsevier, Taylor and Francis, IEEE, and Emerald. Moreover, Scopus encompasses a wider range of journals and thus offers a greater possibility for citation analysis in comparison to its peers [17].

Scope of the Analysis
In this paper, all the literature reviews include conference papers, articles, review papers, book chapters, were analyzed based on all types of applications of blockchain technology that can be used to manage cyber and disruption risks in the supply chain. It tries to capture meaningful information from a systematic literature network analysis (SLNA). It uncovers the current trends regarding cyber risks, disruptions, and blockchain paradigms and paves the way for newcomers in aiming to adopt any of the identified themes as their research focus. The trends of research in this area started in 2018 and have gained attention and interest from scientific communities in recent years. Through this paper, the research questions were addressed in the following: : What are the latest blockchain applications focused on disruption risk management? RQ2: How is blockchain solutions used to identify potential disruption risks?

Locating Studies
All the search terms and their combinations were selected to promote the emergence of concepts, issues, and trends that would help address the research questions. A set of different synonyms of "blockchain", "risks", "supply chain" was created in Scopus and then confirmed by a team of academics and industrial communities. This step of the analysis is very crucial, as where different sets of an applied query are used, this may affect the results.

Study Selection and Evaluation
The identified keywords were used as search terms in Scopus at the end of July 2020 to find relevant publications. In addition, only articles in different reference types, such as conferences, journals, review papers, and book chapters, were included in the document type. We do not consider the limitation on publication year while setting "all years" in the data range field. The search with unique keywords led to obtaining 192 English publications from 2017 to 2020. Satoshi Nakamoto [18] invented the term blockchain with Bitcoin in 2008, but no primary research papers were retrieved before 2017. This may highlight the novelty of ideas in the field of the potential of blockchain technology and its implications for cyber risk and disruption risk management. Figure 2 shows the distribution over time of the retrieved papers by publication year. As can be seen, most studies were published after the year 2018 in either theoretical or practical applications of blockchain to supply chain management. In fact, an increasing number of contributions published in recent years also shows that the field under study experienced a growth in popularity in different sectors.

Locating Studies
All the search terms and their combinations were selected to promote the emergence of concepts, issues, and trends that would help address the research questions. A set of different synonyms of "blockchain", "risks", "supply chain" was created in Scopus and then confirmed by a team of academics and industrial communities. This step of the analysis is very crucial, as where different sets of an applied query are used, this may affect the results.
In order to have wide coverage, database research string was obtained in the following: TITLE-ABS-KEY ("block-chain" OR "blockchain" OR "block chain" OR "distributed ledger") AND TITLE ("cyber risk" OR "security" OR "risk" OR "protection" OR "threat" OR "disruption" OR "resilience" OR "crime" OR "attack" OR "breach" OR "failure") OR KEY ("cyber risk" OR "security" OR "risk" OR "protection" OR "threat" OR "disruption" OR "resilience" OR "crime" OR "attack" OR "breach" OR "failure") AND TITLE-ABS-KEY ("supply chain" OR "supply network")

Study Selection and Evaluation
The identified keywords were used as search terms in Scopus at the end of July 2020 to find relevant publications. In addition, only articles in different reference types, such as conferences, journals, review papers, and book chapters, were included in the document type. We do not consider the limitation on publication year while setting "all years" in the data range field. The search with unique keywords led to obtaining 192 English publications from 2017 to 2020. Satoshi Nakamoto [18] invented the term blockchain with Bitcoin in 2008, but no primary research papers were retrieved before 2017. This may highlight the novelty of ideas in the field of the potential of blockchain technology and its implications for cyber risk and disruption risk management. Figure 2 shows the distribution over time of the retrieved papers by publication year. As can be seen, most studies were published after the year 2018 in either theoretical or practical applications of blockchain to supply chain management. In fact, an increasing number of contributions published in recent years also shows that the field under study experienced a growth in popularity in different sectors.

Second Phase of SLNA Methodology: BNA
The method used in this work is a bibliometric analysis; it consists of two different parts of the SLNA, which were introduced by [16] and further developed by [10], these being a citation network analysis and author keywords co-occurrence network analysis.

Second Phase of SLNA Methodology: BNA
The method used in this work is a bibliometric analysis; it consists of two different parts of the SLNA, which were introduced by [16] and further developed by [10], these being a citation network analysis and author keywords co-occurrence network analysis. The SLR allowed for identifying a set of papers and helped to examine the procedure of main concepts and search strings. The 192 works resulting from the SLR phase constituted the input in the CNA to build and study bibliometric networks.

Citation Network Analysis (CNA)
A citation network is a network in which the nodes are articles and the connections being their citations [10,16]. In this case, the flow of knowledge is depicted by arrows from the cited to citing papers. From Figure 3, a network consisting of 192 nodes was constructed with the software Pajek composed of 131 isolated nodes and four connected components. The biggest connected component includes 54 papers, and the other four include three and two papers. Based on more structured information from the biggest component, only the biggest connected component was analyzed, and the "isolated" nodes, which are papers not connected in the network, were excluded from analyses. The SLR allowed for identifying a set of papers and helped to examine the procedure of main concepts and search strings. The 192 works resulting from the SLR phase constituted the input in the CNA to build and study bibliometric networks.

Citation Network Analysis (CNA)
A citation network is a network in which the nodes are articles and the connections being their citations [10,16]. In this case, the flow of knowledge is depicted by arrows from the cited to citing papers. From Figure 3, a network consisting of 192 nodes was constructed with the software Pajek composed of 131 isolated nodes and four connected components. The biggest connected component includes 54 papers, and the other four include three and two papers. Based on more structured information from the biggest component, only the biggest connected component was analyzed, and the "isolated" nodes, which are papers not connected in the network, were excluded from analyses.

The Biggest Connected Component
As shown in Figure 4, the biggest connected component consists of 54 nodes exists. The layout of the nodes is obtained through the Kamada-Kawai algorithm [19] available in the Pajek software package.

The Biggest Connected Component
As shown in Figure 4, the biggest connected component consists of 54 nodes exists. The layout of the nodes is obtained through the Kamada-Kawai algorithm [19] available in the Pajek software package.  For holistic analysis of the components, two different analyses were selected: the Louvain community detection method and the main path analysis. Louvain community detection method is an efficient algorithm to identify and map groups of papers into smaller sub-units or communities that allow us to study the structure of large networks [20]. The results from this algorithm are visualized through a graphical representation of For holistic analysis of the components, two different analyses were selected: the Louvain community detection method and the main path analysis. Louvain community detection method is an efficient algorithm to identify and map groups of papers into smaller sub-units or communities that allow us to study the structure of large networks [20]. The results from this algorithm are visualized through a graphical representation of the network of eight communities with different colors, which each color represents one community.
The main path analysis detects the existence of a main development trend of the field, extracting the main path component [21]. The main path represents the "backbone of the research tradition" [16,21]. As mentioned by [10], "the main path highlights the articles that build on prior articles, but continue to act as hubs in reference to later works". Indeed, in this work, the connection was on the key-route main path, where key-route is the link that has the highest transversal weights [22]. Its extraction was performed by setting the rank numbers of key routes from 1 to 10 and using Pajek.
The eight Louvain community ( Figure 5), as well as the main path ( Figure 6) of the connected componnets, are discussed in the subsequent subsections. the intrusion detection systems (IDSs) in conjunction with blockchain to manage data and trust. Reference [60] declared that safety and security are motivational drivers to blockchain adoption. To this purpose, they extended blockchain technology with other methods like encryption and business rules for improving the information available for risk analysis, safety, and security control in cross border activities. Some scholars [61,62] incorporated resilient and trusted security technologies with blockchain approaches while presenting integrated models/frameworks to avoid the complexity and vulnerability of the whole supply chain so that reliability and trustworthiness of processes can be achieved and the defects of a centralized network will be solved. Figure 6 depicts the main path of the biggest connected component, which includes 18 nodes from 2017 to 2020. Table 1 shows the analyses of the papers of the main path in order to highlight the main current research trends and the gaps that need to be addressed.

Authors Topic Main Issues Contribution
Integration of blockchain • Analysis and description of a trustless and decentralized system with a combination of blockchain and cloud-based IoT plat-

The Louvain Communities' Analysis
As stated earlier, this analysis enabled us to obtain eight communities labeled A-H in Figure 5.

Community A-Disruption Risk Management by Blockchain
The majority of papers in this community are connected with providing insights into the supply chain (SC) disruption risk management and examines how to combine blockchain technology with other digital technologies that can manage and predict disruptions and lead to resilience and robustness of the supply chain. Despite a few efforts to explore new insights into the effect of digital technologies on supply chain risks, our understanding of the human contribution and interplay of various digital technologies in terms of their impact on SC disruption risk management is still not clear.
Reference [23] Noted that the advent of digital technologies (e.g., big data analytics, artificial intelligence, blockchain, and Internet of things) brings a potential new benefit in increasing quality in the real-time flow of data and material in order to manage severe disruptions, resilience, and the ripple effect. The ripple effect in the supply chain occurs if severe disruptions affect SC performance such as demand, sales, stock return, service level, and costs [24]. In addition, Reference [25] continued their research at a more proactive level in order to evaluate severe SC risks and the ripple effect by presenting an SC digitalization framework in four important SC stages, including planning, manufacturing, sourcing, and logistics. Their findings indicate that cutting-edge technologies like blockchain and AI techniques are becoming increasingly important in response to outbreak-related disruptions by increasing operational supply chain flexibility and improving response traceability, realtime coordination, and the ability to reconfigure resources at the recovery stages and provide a robust and resilient supply chain.
From the perspective of environmental concerns, Reference [26] also developed a blockchain framework for a multi-echelon sustainable supply chain within a policy of carbon taxation in monitoring supply chain performance. Smart contracts enabled consumers to access information and details about standards and environmental concerns exhibited in the product, with the effect of diminishing costs and time and increasing the efficiency of the entire supply chain. Their proposed model can be applied to other sectors, including transportation networks, pharmaceutical services, and government services. For instance, blockchain, in conjunction with proper algorithms, can manage patient data and prescriptions.
Since blockchain has achieved significant success in the financial sectors, practitioners and researchers have started deploying blockchain in other sectors. Currently, humanitarian logistics and supply chains are increasingly adopting advanced technologies to support operations; however, the use of blockchain in this sector is at the beginning stages. Food supply chain, healthcare sectors, and government institutions are increasingly calling for more collaboration among various humanitarian actors in both the public and private sectors for real-time response to demands in order to facilitate the transparency and traceability on the flow of material, information, and financing in the supply chain. Finally, within a humanitarian setting, Reference [27] presented a theoretical model to explore the influence of blockchain on the transparency of the operational supply chain and improve collaboration by building swift trust between key partners who participated in disaster relief supply chains. Indeed, collaboration encourages joint efforts among stakeholders, contributes to effective and efficient real-time information sharing between partners, and brings several advantages such as higher transparency, flexibility, and reduces lead-time, and finally helps to enhance supply chain resilience [27].

Community B-Shared and Trusted Information by Blockchain Technology
Reference [28] Submitted the idea of blockchain adoption in terms of improvements in the entire supply chain, ranging from safe, efficient, and transparent transactions to the improvement of the level of trust and reliability between supply chain members by sharing all transactions and related information across all the network. Reference [29] focused on weakening the resilience of the supply chain in the era of information asymmetry, which means that one of the members in the supply chain has a large amount of efficient information than the others [30]. They acknowledged that this inaccuracy or inconsistency of information could lead to take wrong decisions and increase technical risks such as cybercrime, hacking, and theft that damage the reputation of the company [29]. Among these problems, the authors emphasized the establishment of "trust" among participants in the supply chain with a decentralized information sharing mechanism based on blockchain technology.
The other papers in this community predominantly presented different mechanisms and models of blockchain technology, their adoption as well as the impact on SC performance outcomes in terms of enhancing security, trust, and information sharing. For example, to overcome some challenges such as low-performance and lack of ability to protect recorded information on the ledger, Reference [31] proposed a unified distributed ledger that satisfies the requirements of a distributed supply chain system for cargo tracing capability and different supply chain management tasks. Reference [32] conducted their studies by proposing a "blockchain-based construction supply chain framework" to eliminate some limitations in traditional systems such as extra delays, transmission costs, and information wastages and create a new mechanism towards guarantee security of share transmission and private-key protection. To mitigate the concerns associated with security threats arising from distributed ledgers, Reference [33] proposed a new architecture of the "FPGALedger" based decentralized ledger platform by relying on its security features such as bitstream encryption and tamper-resistant feature to prevent unauthorized access to sensitive data. The authors also evaluated its performance to show it is practical for enterprise applications.
In exploratory survey research, Reference [34] investigated the security and trust challenges, including software attack, i.e., stealing information stored on the servers, or other devices, installing malware code on a server for malicious activities, and hardware attacks, i.e., modifying the blueprint design, or inserting the spy chips into the hardware. The authors discussed the improvement of total performance into the supply chain management, i.e., transparency, visibility, accountability, traceability, and reliability, by applying some smart technologies such as the Internet of things, cloud computing and blockchain by participating the validated users in transactions.

Community C-A Digital Record of Every Transaction and Interaction
Papers in this community talk basically about the security and privacy of all the information of products stored in a shared and transparent system. Blockchain technology [35] has received attention from both practitioners and academics since the creation of Bitcoin. Reference [36] revealed some applications to supply chain security and a multitude of managerial benefits behind blockchain technology. For example, blockchain can contribute to lowering the cost of transactions, visibility of supply chain via open platforms, and improved the integrity of the global network of partners through digital and physical connectivity. They also discussed to show the potential of this technology in times of increased risks and uncertainty for enhancing supply chain resilience. In the recent paper, Reference [37] discussed how blockchain technology could be applied to explore risks in air-logistics operations. The authors proposed the literature from different areas, including "demand management", "supply management", "air-logistics operations", "supply-demand coordination". They also proposed the implementation of mean-variance risk analysis, which can be supported by blockchain technology. Observations show that blockchain technology is also related to information disclosure [38][39][40]. In fact, Reference [41] established that blockchain technology-based information disclosure can make use of rental service platforms to achieve the attractions of consumers. Reference [42] by developing a provenance knowledge framework demonstrated how blockchain technology could enhance assurance and authenticity in a transparent way through information visi- bility for all involved parties and traceability of the products and consequently decrease perceived risks while protecting data privacy. Similar to the above study, the paper by [43] also focused on the application of blockchain technology for improving traceability performance by providing all transaction information about the origin of products with security and transparency.
Community D-Integration of Blockchain with IoT to Solve Privacy and Security Vulnerabilities The focus of the papers in this community is on attacks, security issues, and blockchain solutions with the combination of IoT. For example, Reference [44], while attempting to describe a better comprehension of how blockchain can be integrated with IoT and realtime sensors into the pharmaceutical supply chain, studied a set of benefits and challenges of deploying the blockchain in the supply chain. Their results corroborated not only consideration of a suitable blockchain platform is important before choosing it for our business, but also we need to take into account the reliability of collected data. In the paper by [45], an RFID-based end-to-end blockchain architecture is proposed for creating a transparent food supply chain. The authors employed a new IoT-based food monitoring architecture, which updates a real-time tamper-proof of information at different retailing, logistics, and warehouse stages, to guarantee immunity against cyber attacks and making blockchain efficient from a cost perspective due to removing unnecessary transactions. Furthermore, Reference [46] conducted a comprehensive survey on security vulnerabilities and attacks in an IoT system and highlighted the advantages of integrating blockchain with different IoT and Industrial IoT applications containing cryptographic transactions, the robustness of decentralized systems, the provenance of data, and the trustworthiness of the entire system.

Community E-Transparency and Traceability in Information Exchange by Blockchain Technology
Several works in this community suggested that the exchange of information is one of the most important benefits of blockchain adoption. The study conducted by [47] discussed transparency and traceability in information exchange and the use of blockchain technology as an innovative solution to record and transfer transactions with authenticity, safety, and security among relevant parties in the SC. Reference [48] examined the relationship between SCM and blockchain from a theoretical perspective to provide relevant topics from frequently used theories such as principle agent theory (PAT) and transaction cost analysis (TCA) in the implications of blockchain on SCM and logistics. In this regard, for example, based on the PAT theory, the problem of information asymmetry between the principal and agent can be improved by blockchain technology, and the design, execution, and supervision of contracts can be done efficiently by the principle. Simultaneously, Reference [49] proposed a permissioned blockchain framework that facilitates transparent information sharing across the whole supply chain due to its remarkable features, namely immutability, auditability, and decentralization. In analyzing the applications of blockchain in the food sector, Reference [50] also reported the high level of coordination and collaboration of all supply chain participants in guaranteeing exchanges of information, security, reliability, transparency, and traceability.

Community F-Anti-Counterfeiting by Blockchain
Central to this community is the consideration of monitoring counterfeited products in the supply chain. In this vein, some authors have recently focused on counterfeiting in the medicine supply chain. For instance, one blockchain-based traceability system with RFID tags was proposed in the post supply chain by [51]. Authors tried to keep ownership information of manufactured products on the blockchain with RFID tags to prevent counterfeiting during the traceability process from manufacture to retailers. Reference [52] proposed a new solution using blockchain and encrypted QR (quick response) for traceability of drugs, all information from manufacture to end consumer is transmitted to the chain, where smart contracts are applied to completely assess and identify the properties of medicines. Technical research based on blockchain Ethereum and IPFS networks for the traceability of medicine proposed by [53], their implementation on a small-scale showed that the proposed system in this work could be useful for the anti-counterfeit medicine supply chain. As presented by [54], the concept of "physically unclonable functions" used along with blockchain for preventing counterfeits and strengthen the security of IoT devices. The contribution of the paper by [55] is to present a secure ultralightweight RFID protocol and blockchain technology together to track attacks across the supply chain and prevent counterfeiting.

Community G-Information Privacy by Blockchain
The papers in this community mainly conducted research on blockchain from security perspectives and presented schemes on information privacy protection based on blockchain technology. In this respect, Reference [28], in a research about the security of information in IoT devices, established that through blockchain technology, IoT security challenges such as those related to IP spoofing and forgery attacks could be prevented. Because it is difficult to alter records in the approved blockchains, and it is impossible for malicious devices to connect to a network. Similarly, Reference [56] presented a scheme for data sharing in the supply chain by the industrial Internet of things (IIoT). They tried to show the ability of blockchain in avoiding data leakage among unauthorized members in the supply chain and the privacy protection of the chain. Likewise, Reference [57] for spacecraft supply chain, established that the use of blockchain is necessary for security and overall profit of the supply chain to address the issue of information asymmetry among the supply chain members and to mitigate costs of transactions. In addition, Reference [58], in a study on the use of blockchain technology in risk avoidance and coordination of supply chain, found that this technology has real potential to reduce transaction costs among members of the supply chain and improve information sharing among supply chain members.

Community H-Safety and Security Aspects of the Blockchain
The papers in this community predominantly focus on privacy and security issues and review the security aspects of the blockchain. In the paper by [6], blockchain is considered as an opportunity for enhancing the security aspects and mitigating cyber risks in endto-end supply chains. In the paper by [59], the authors presented a review regarding the intrusion detection systems (IDSs) in conjunction with blockchain to manage data and trust. Reference [60] declared that safety and security are motivational drivers to blockchain adoption. To this purpose, they extended blockchain technology with other methods like encryption and business rules for improving the information available for risk analysis, safety, and security control in cross border activities. Some scholars [61,62] incorporated resilient and trusted security technologies with blockchain approaches while presenting integrated models/frameworks to avoid the complexity and vulnerability of the whole supply chain so that reliability and trustworthiness of processes can be achieved and the defects of a centralized network will be solved. Figure 6 depicts the main path of the biggest connected component, which includes 18 nodes from 2017 to 2020. Table 1 shows the analyses of the papers of the main path in order to highlight the main current research trends and the gaps that need to be addressed. • Proposed a theoretical model to explore the influence of blockchain on improving swift-trust, collaboration, and supply chain resilience

Main Path Analysis
The first stream was addressed by focusing on a considerable number of studies that appeared from 2017 and which started to investigate the capabilities and strategies of supply chains in using blockchain as a key component of cyber supply chain risk management (CSRM) across various sectors, such as agriculture, livestock, food processing, energy systems, and e-commerce. The oldest paper in this stream focuses on the combination of blockchain with cloud-based IoT platforms for improving cybersecurity in supply chain networks; this happens through the development of a trustless and decentralized system, which executes cryptographic transactions autonomously in a secure environment through smart contracts or via the detection and prevention of malicious actions with interlocked devices [6]. A potential solution to mitigate cyber risks in end-to-end supply chains is the implementation of blockchain into IoT devices to securely store information about the provenance of products, identity, credentials, and digital rights, with the aim to prevent safety and security vulnerabilities [28].
Following [6,28], the emerging literature on blockchain began to expound on different benefits and advantages of this technology which can have a direct effect on the supply chain, including a range of features, such as overall system transparency; software, hardware, and firmware traceable and tamper-resistant records; accessibility and visibility of data provenance; reliability and accountability of cyber supply chain assets [63]. In particular, a seminal work or milestone on the impacts of blockchain on various supply chain activities is that by [28]. This is the most frequently cited paper and has been cited by other authors among the selected papers in the main path. This paper focuses on the potential of blockchain on the elements such as cost, quality, risk reduction, and flexibility, and sustainability in meeting key supply chain management purposes. Moreover, many achievements are reachable by blockchain's ability in terms of improvements in the entire supply chain, ranging from safe, efficient, and transparent transactions to the improvement of the level of trust and reliability between supply chain members by sharing all transactions and related information across the entire network [64].
The following studies by [44,46] continued the involvement stream, focusing on the advantages of applying the blockchain for controlling cyber attacks and security vulnerabilities in the supply chain and also the new challenges posed by integrating the blockchain into the supply chain ecosystem. The authors in [44] have developed a blockchain platform with the combination of IoT and real-time sensors for the reliability of collected data during the pharmaceutical supply chain. The proposed system also ensures the transparency and tracking of products' information to enable counterfeiting detection. Furthermore, Reference [46] conducted a comprehensive survey on security vulnerabilities and attacks in Industrial IoT based systems, including (i) tampering; (ii) malicious code injection; (iii) Sybil attack; (iv) denial/distributed denial of service (Dos/DDOS); (v) data breach; (vi) malware and the countermeasures adopted to deal with each of these attacks.
The emerging literature on the blockchain, risks, and supply chain marked the development of blockchain research focused on the models, conceptual frameworks, and methods used to deal with protecting against typical problems and critical attacks. In this context, the paper by [65] presented an empirical investigation in India and the USA while taking into account the behavior of users regarding the adoption of blockchain in the supply chain field. Their results showed significant differences in performance expectancy, social influence, facilitating conditions, transparency, and trust of supply chain stakeholders in user behavior intentions towards this advanced technology across the countries under study. This paper is a source of various literature reviews [26,50,66] and a sink to [67] from the food sector.
The year 2017 is also marked by a scholarly interest in the application of blockchain technology in the agri-food chain through the work of [67]. This involves real-time food tracing with a traceability system based on hazard analysis and critical control point (HACCP), blockchain, and the Internet of things for guaranteeing safety and quality of the food and reducing many problems, such as tampering and falsifying of information. The proposed decentralized distributed system integrated with other technologies, such as WSN, GPS, RFID, to share and transfer information through the BigchainDB for data storage of products in food supply chains. The additional papers continue the debate on the application of blockchain to the food sector and agriculture from a traceability perspective. For example, Reference [66] introduced a blockchain-based framework, with a multichain structure model, focusing on product traceability problems in the field of "cross-border e-commerce supply chain management". The research analysis results show that the proposed framework can effectively tackle critical recovery problems and defend against attacks such as clone attack, counterfeit tag attack, and counterfeit product attack. Simultaneously [50] reported the high-level of coordination and collaboration of all supply chain participants in guaranteeing security, reliability, transparency, and traceability through the adoption of blockchain technology. In the considered time window, other contributions appeared to deal with information sharing and trust issues in the supply chain through smart contracts. Reference [68] grasped the impact of information sharing on security issues and trust in data accessing processes between stakeholders in the supply chain by presenting a conceptual framework based on blockchain technology and automation of transaction processes through smart contracts. In the transaction process, the payment will be done automatically with the confirmation of the buyer to the supplier with the details of an order ID, time, and date of shipment, and the data accessing process can be stored on-chain or off-chain for tracking purposes. Subsequently, Reference [69] proposed a framework with the use of blockchain technology to improve the level of truthful information shared across users while interacting with the fertilizer distribution systems for ensuring soil fertility and crop production.
Currently, the supply chain is becoming more sensitive to disruptions than in the past due to the growth of sophistication in the supply chain processes, or poor coordination, fraud, complex deals, different government policies, cultural and behavioral diversifications among supply chain entities. For example, the rapid spread of COVID-19 caused serious vulnerabilities in demand and disruptions in international supply chains. First, there was the big issue of supplying medical equipment, including special devices for diagnostic tests and personal protective supplies, such as masks and protective clothing, etc., to address the challenges related to treatment, protection, and control [70]. Second, it was similarly difficult to meet the daily needs of customers for food and other necessary items under lockdown during the COVID-19 pandemic [71].
The second stream of research referred to a new perspective in the supply chain (SC) disruption risk management and examines how to combine blockchain technology with other digital technologies can manage and predict disruptions and lead to resilience and robustness of the supply chain.
This stream of the main path is, as earlier discussed, in community A.

General Comments on the Connected Components' Analyses
In conclusion, the two analyses conducted allowed a comprehensive review of the connected component. Specifically, an overview of the main path analysis enabled us to see how the applications, integration, and implementation of blockchain technology are connected and collaborative for an effective, secure supply chain. Similarly, the Louvain communities allowed us to uncover further research streams that are not considered by the works in the main path analysis, e.g., a digital record of every transaction and interaction, transparency and traceability in information exchange by blockchain technology, anti-Counterfeiting by blockchain, etc.
As mentioned in the citation network, some papers among the retrieved set of scientific works were excluded from the analysis because they are not connected in the network, and no citations are linking them. To overcome this drawback, the forthcoming additional analyses such as GCS and Co-occurrence of author keywords compensated for this limitation.

Global Citation Score Analysis
The information provided by the citation network must be expanded by an additional analysis, which is called global citation score analysis (GCS). Recent main studies can be identified using GCS analysis. The whole number of citations to a paper in the Scopus database will appear with this analysis, regardless of their belonging to a connected component of a citation network. The most cited papers with high GCS retrieved from the Scopus database are considered as seminal or prominent papers in the evolution of knowledge [10,72]. The ten most cited papers ranked based on their GCS in Table 2. Indeed, 4 out of the 10 most cited papers that are not present in the main path analysis are found to belong to one of the Louvain community earlier discussed, and this supports the capability of the CNA to detect recent chief tendencies for conducting works in the era of blockchain. It is thus safe to state that both the main path analysis and the Louvain community affirm the significance of CNA analysis.

Co-Occurrence Analysis of Author Keywords
"The co-occurrence of a similar word or couple of words may signify a research theme. This perhaps implies the presence of patterns and trends in a particular field" [11,73]. The network map (Figure 7) and the cluster items (Table 3) are the results of the VoSviewer software that performed this method. The software created seven clusters, with different colors, grouping a set of 29 keywords, which was the result of the initial 465 keywords after setting a threshold of the minimum number of occurrences of a keyword at 4. We selected this threshold because the expected results of a too low value of threshold would not be enough significance in the analysis. In addition, selecting a too high value of threshold would cause the elimination of a number enough of keywords. n's roles in strengthening cybersecurity cloud computing; cryptography; cybersecurity; Internet of things nd security challenges and blockchain solu-Blockchain; distributed ledger; privacy; security f smart contracts in Ethereum platforms Ethereum; smart contract g counterfeited products in the supply Counterfeit; supply chain Note that the software considers neither difference between singular and plural terms nor between words with the same roots; therefore, the keywords with the same meanings (e.g., "blockchain" and "block chain" or "smart contract" and "smart contracts") were merged.
A discussion of the whole set of works contained in the author's keywords network is presented in the following.

Cluster 1: Digitalization for Improved Supply Chain Resilience
The papers in this community appear to be focused on issues of the protection of supply chains from threats and disruptions to enhance risk management practices and improved supply chain resilience, as highlighted by the keywords "supply chain risk management" and "supply chain resilience". The importance of supply chain resilience in the body of literature was already mentioned in the main path analysis. This cluster adds other shades of attempts carried out to control disruptions in the supply chain. The most common disruption risks affecting the supply chain and significantly its performance stem from natural disasters (e.g., earthquakes, hurricanes, and floods), cyber threats (human errors, failures, and terrorism), and disruptions of environmental regulations [8,24,74,75]. Recently, attempts to enhance supply chain resilience by emerging technologies in times of increased risks and uncertainty have become increasingly popular, Figure 7. Authors keywords' co-occurrence network. Table 3. Authors keywords' co-occurrence network. Note that the software considers neither difference between singular and plural terms nor between words with the same roots; therefore, the keywords with the same meanings (e.g., "blockchain" and "block chain" or "smart contract" and "smart contracts") were merged.

Main Subjects Keywords
A discussion of the whole set of works contained in the author's keywords network is presented in the following.

Cluster 1: Digitalization for Improved Supply Chain Resilience
The papers in this community appear to be focused on issues of the protection of supply chains from threats and disruptions to enhance risk management practices and improved supply chain resilience, as highlighted by the keywords "supply chain risk management" and "supply chain resilience". The importance of supply chain resilience in the body of literature was already mentioned in the main path analysis. This cluster adds other shades of attempts carried out to control disruptions in the supply chain. The most common disruption risks affecting the supply chain and significantly its performance stem from natural disasters (e.g., earthquakes, hurricanes, and floods), cyber threats (human errors, failures, and terrorism), and disruptions of environmental regulations [8,24,74,75]. Recently, attempts to enhance supply chain resilience by emerging technologies in times of increased risks and uncertainty have become increasingly popular, including blockchain [36], digital innovations and Industry 4.0 [25] and 3D printing/additive manufacturing [76]. For example, the benefits of additive manufacturing, also known as 3D printing, are to increase flexibility and resilience in the manufacturing and supply chain with quick response to demand and reduction of storage of finished goods as well as to identify supplier risk exposure, since there is no intermediate inventory in between the stages [25]. One of the most highly exploited cases for 3D printing facilities can be during the COVID-19 pandemic in that it allows for efficient and timely deployment of medical equipment or replacement of urgent missing supplies [77]. However, the need for the rapid delivery of spare parts by 3D printing may lead to counterfeit products or fake parts during the delivery [76]. Based on these challenges, the application of digital rights management can be a successful solution for implementation in the area of additive manufacturing and protection against intellectual property theft with blockchain technology [76].

Cluster 2: Employing Blockchain Technology with Smart Contracts in Supply Chain Management
This cluster is focused on the development of smart contracts, enabling and fostering the traditional supply chain, as shown by the keywords "supply chain management" and "smart contracts". A smart contract is a self-sufficient decentralized code deployed in the blockchain node to digitally execute a special transaction when certain conditions of a business process are met [78].
The literature discusses these applications and opportunities associated with smart contracts. For instance, Reference [79] proposed an efficient solution to automate the supply chain processes by applying a blockchain network based on Ethereum, with smart contracts also known as cryptocontract, keeping the whole data of a company. This proposed system based on blockchain, IoT and smart contracts improve traditional supply chain management systems by replacing the standard contract with smart contracts.
Studies also focus on specific sectors, such as the food supply chain and healthcare, where blockchain technology represents an opportunity to ensure the monitoring and traceability of food and pharmaceutical products. The authors of [33] analyzed a new blockchain ontology with the integration of IoT devices and translated it into a smart contract to achieve supply chain provenance tracing. According to Internet technologies, this blockchain technology was built using a natural interface web browser. Interaction between JavaScript interface with the deployed smart contract in the truffle framework by ConsenSys to execute source tracking and traceability. This object-oriented design of the traceability data model was implemented in the Ethereum platform.
The authors of [80] highlighted the opportunities that the advent of blockchain technology and the concept of smart contracts open up for pharmacies, hospitals, or other healthcare stakeholders, to effectively and efficiently respond to epidemic relief. Likewise, epidemics such as disease and its spreading can be monitored through smart contract capabilities with automated responses or warnings.
In addition, recent literature also proposed a theoretical design and practical implementation of unmanned aerial vehicles (UAVs) in the warehouse for inventory and traceability applications. This system is integrated with RFID and a blockchain to collect, and process validated data and send them to trusted parties. Moreover, smart contracts applied to this system lead to automating certain tasks as the result of less human intervention and provide cybersecurity, redundancy, and data integrity [81].

Cluster 3: Traceability Database Systems to Ensure Food Safety and Security
This cluster of keywords appears to be focused mainly on the use of blockchain for assuring traceability and transparency to reduce food safety risks and to evaluate the health risks of food processing at all stages of the food supply chain. Transparency of a supply chain refers to the accessibility of all the information of food products through shared and transaction systems, providing a trusted source of information without loss, noise, delay, and distortion [82,83]. The authors of [84] define traceability in terms of "what, how, where, why, and when aspects of underlying product along a supply chain". Blockchain technology facilitates safe information sharing across the whole supply chain [49]. The information stored on the blockchain platforms can be accessed, and it is not possible to manipulate by anyone, and from the customer perspective, they can monitor food information by anyone, and from the customer perspective, they can monitor food information from smartphones more accurately, which reinforce their confidence. According to [85], trust, security, and transparency in Wal-Mart's food supply chain increased thanks to the adoption of blockchain technology, which requires parties who access blockchain to present documents and register data. Subsequently, food waste can be controlled, and the chance of corruption and risk of food fraud can be minimized significantly [86,87].

Cluster 4: Blockchain's Benefits in Strengthening Cybersecurity and Cryptography
This cluster of keywords appears to address the use of blockchain, cloud computing, and the Internet of things in cybersecurity and cryptography. Examples include the study by [28], who proposed the implementation of blockchain or distributed ledger technologies (DLTs) to execute cryptographic transactions by providing superior data integrity to mitigate cyber risks in the end-to-end supply chain. The authors of [88] examined the opportunities of applying blockchain technology to secure critical energy and electricity infrastructures and their range of vulnerable energy delivery systems and IoT-based systems through a cryptographic signed distributed ledger that helps in enhancing data security, provenance, and audibility. The authors of [89] supported existing literature on current themes in information technology, including blockchain and cybersecurity solutions for repulsing attacks and threats. They listed types of direct attacks at blockchain implementation that can be summarized into the following: (1) Double-spending threats; (2) Mining/pool threats; (3) Wallet threats; (4) Network threats; (5) Smart contract threats, and in order to improve the security of blockchain technology, they also suggested new security solutions such as digital identity; authentication and access management; security platforms; privacy management; and DDoS protection. The content of the exploratory paper by [34] also focused on the "security and trust issues on digital supply chain management" with an application of some new information technologies, i.e., Internet of Things, cloud computing and blockchain, to boost different performance and properties of the system, such as the transparency, visibility, trust, traceability, and efficiency of information.

Cluster 5: Privacy and Security Challenges and Blockchain Solutions
Cluster 5 focuses mainly on privacy and security issues and reviews the security aspects of the blockchain. The main goal of the paper by [90] is to define an authentication security protocol with blockchain to ensure the privacy and security of departments and companies against potential attacks. The authors of [91] furthermore presented a "privacy sharing" on an innovative blockchain system for the protection of IoT data securely and privately. The privacy of data is maintained by the blockchain platform to limited connected participants in a distributed way; data within a channel is encrypted and managed by embedding access control systems.
There are papers that give special emphasis to possible applications in the healthcare industry [92], drug supply chain [93] and e-voting [94]. The authors of [95] applied the decentralized blockchain technology with an Ethereum platform in IoT systems to deal with security and privacy challenges in the healthcare insurance sector. The results are proved by showing trust management, security, and privacy data. Blockchain or distributed ledger technologies (DLT) also have great potential for collecting and integrating data from medical records and clinical technologies to provide real-time information for patients and providers [96]. In another study, Reference [97] presented a systematic literature review of blockchain-based 5G-enabled IoT for tracing various transactions and databases that can prove authenticity, consistency, security, and privacy in future Industrial automation such as smart homes, smart cities, healthcare, agriculture and autonomous vehicles.

Cluster 6: Security of Smart Contracts in Ethereum Platforms
The security against vulnerabilities of smart contracts in a blockchain system is a new research area being dealt with. Another definition of the smart contract put forward by [98] is "a piece of code that executes a specific business logic when a certain condition is met". Smart contracts have been applied to a wide range of industries, including supply chain, healthcare, intellectual property, electronic voting, and have many benefits ranging from traceability, transparency, data provenance to reducing costs and time expenditures. However, many security issues in smart contracts have been reported by practitioners and researchers, mostly causing major economic losses. According to [99], the common issues in Ethereum smart contracts include the following: risk to unprotected self-destruct, which relates to the permits access to an unauthorized actor; the risk to locked money, which relates to the immaturity of blockchain platforms; and risk to timestamp dependence, which relates to malicious miners. The security solutions for smart contracts offer different phases based on secure design [100,101], secure implementation [102], testing before deployment [103][104][105], and monitoring and analysis [106,107].

Cluster 7: Monitoring Counterfeited Products in the Supply Chain
Product Counterfeiting is a type of customer fraud: a product consisting of bad or unsafe quality ingredients or with false information on the package is produced and sold. Counterfeited products can be applied to every industry sector, including food, pharmaceuticals, cosmetics, electronics, and vehicle parts. Some authors have focused on counterfeiting on different products. Concerns about the above-mentioned problems have become front and center for companies worldwide. For example, a European medicine agency is warning about buying falsified/substandard medicines from unauthorized websites or other suppliers during the ongoing pandemic of coronavirus disease COVID-19 [108].
Some authors have recently focused on counterfeiting in specific sectors. The authors of [109] proposed a new solution based on blockchain implemented on the Hyperledger Fabric platform for exploring counterfeiting and improving visibility and traceability in the pharma supply chain. The authors of [110] introduced a blockchain-based technology known as counterchain for increasing the authenticity of drugs and consumer confidence in products. Another study by [111] proposed a model based on simulation in Hyperledger Fabric that can be applied to a vehicle supply chain to solve issues related to counterfeiting in vehicle parts.

Discussion of Findings and Future Research Directions
Below we summarize the research gaps and future research directions in the field of blockchain technology proposed by various researchers in managing cyber and disruption risks in the supply chain and based on a bibliometric review of the literature. Based on the various analyses (Louvain community detection, main path extraction, Global citation score analysis, as well as Co-occurrence all keywords analysis) of 192 works, we obtained a holistic view of the state of the art of research trajectories, thereby enabling us to explore the main trends and the recent research streams on blockchain adoption for the supply chain risk management.
A new trend emerging in the literature referred to the key role of emerging technologies, including digital technology, Industry 4.0 [25], and blockchain [27], in supply chain (Sc) disruption risk management. It examines how these advanced technologies can manage and predict disruptions and lead to resilience and robustness of the supply chain. The findings examine the application of advanced technologies such as RFID, IoT, blockchain, big data, and artificial intelligence in order to reduce information disruption risks as the result of real-time identification and material tracing, to reduce supply and time risks due to real-time coordination, to increase the ability to reconfigure resources at the recovery stages and to improve collaboration through swift trust between the different actors participating in disaster relief efforts. However, despite receiving attention from scientific communities, the emerging technologies still have a huge opportunity for improvement with regard to the field of supply chain disruption risk management.
Therefore, future research can concentrate on investigating how to design and implement different mechanisms and methods, mainly in response to different types of disruptions. Major research efforts also should focus on identifying the current classifications of potential disruptions, reassessment of laws and regulations towards a more efficient approach, and the emergence of smart platforms and architectures in response to these disruptions. In particular, it is necessary to refine the efficiency of current studies that categorize disruptions as those by natural disasters like acts of nature or technological disasters like acts of humans. For example, how can blockchain technology and AI techniques contribute to developing control actions to recover Sc operability, or how can these technologies be integrated into a traceability system to avoid or decrease the pandemic's impacts from a shortage of supplies.
As we see from the works of [23][24][25], the ripple effect has drawn attention to the field of disruption risk management and the impact of opportunities and benefits of blockchain on it, regarding response to outbreak-related disruptions by increasing operation supply chain flexibility and improving response traceability, real-time coordination, and the ability to reconfigure resources at the recovery stages and provide a robust and resilient supply chain. We believe that further theoretical and empirical effort is required to understand what technological developments and how can contribute to enhancing ripple effect control.
Interestingly, several contributions also highlight the opportunities from collaboration and trust perspectives in both public and private sectors among various humanitarian actors in terms of real-time response to demands, facilitating transparency and traceability in the flow of material, information and financing in the supply chain, so that firms can obtain the essential knowledge and rapidly react to disruptions and cyber threats and real-time information sharing to all supply chain partners to enhance awareness and create knowledge to empower firms to deal with these threats [27,50,112]. Therefore, more publications are needed to deal with the lack of awareness and knowledge about blockchain technology adoption decisions throughout industry sectors, corporate cultures, government intervention, and the behavior of actual and potential users on the adoption or non-adoption of blockchain solutions in the supply chain field. This could give us clear answers to this challenge. Future research should also study the role of third-party regulators and authority organizations in order to consider standardization, compliance, and forensics as a priority to promote blockchain adoption by firms.
In the context of capabilities and strategies of the supply chain in applying blockchain as a key component of cyber supply chain risk management (CSRM), various researchers (e.g., [6,49,68,91]) proposed different blockchain systems, models, and architectures alone or in combination with other technologies to manage privacy and security challenges, the security of smart contracts, monitoring counterfeiting, and traceability database systems to ensure food safety and security. However, future research is required to consider some challenges concerning an assessment of network latency, high-energy consumption, standardization of data, and low-performance of blockchain-based IoT networks during the implementation of blockchain in the supply chain.
Building on former research (e.g., [98,100]), further insights may also consider a review of different methods in which blockchain-based Ethereum platforms and smart contracts can be used for innovative cybersecurity solutions.
An important body of research explores security and safety in IoT networks as a most important priority, despite the majority of studies on blockchain cybersecurity referred that the security of IoT networks could be improved if it is integrated by blockchain technology, which for instance appears in the community D (i.e., [46]) and cluster 2 (i.e., [79]). Yet, a few studies discussed the critical success factors for blockchain adoption in a cyber-secure supply chain to mitigate IoT security risks/threats. Thus, future research should apply guidelines and tools that can help fill this gap in the literature.
Additionally, in the last few years, blockchain technology is growing to gain attention to address traceability and transparency issues within the agri-food supply chain (e.g., [82,83,85]); even most of the articles have been paid to the advantages of blockchain adoption and a few studies have explored the obstacles of adoption in the food supply chain. A further investigation on the barriers may provide more insights regarding blockchain adoption for researchers and practitioners.
Finally, most of the proposed blockchain systems are still in the academic stage, and more efforts are required from developers to present more applicative cybersecurity models, tools, and architectures in industries and startups. On the other hand, when more blockchain solutions are adopted with a larger number of organizations, more research is needed to address technical and behavioral challenges and limitations in the adoption of this technology. For example, looking deeper into issues such as storage capacity, the security and privacy of blockchain, the high investment of adoption, less collaboration and trust among key stakeholders, and behavioral intentions would accelerate adoption by providing some proper solutions for future studies in the area of blockchain technology.

Conclusions
In this study, we conducted an SLNA to answer the research question of the study: what are the main trends and the recent research streams in managing cyber and disruption risks in the supply chain with blockchain, taking into account their evolution over time?
The result of this quantitative bibliometric analysis indicates that blockchain is a rather new technology with an increase in the number of publications over the past few years. First, based on SLNA analysis of 192 articles, two main streams were identified: one devoted to the capabilities and strategies of the supply chain to apply blockchain as a key component of cyber supply chain risk management (CSRM); the other one referred to a perspective in managing supply chain (SC) disruption risks, examining how to combine blockchain technology with other digital technologies and how smart operations can manage and predict disruptions and lead to resilience and robustness of the supply chain. Second, this systematic review sheds light on different research areas, such as the blockchain's role as a solution for privacy and security challenges, security of smart contracts, monitoring counterfeiting, and traceability database systems to ensure food safety and security.
In terms of implications, this study contributes to the body of knowledge in determining and analyzing the development of trajectories and research areas within the topic. This has resulted in several quantitative bibliometric studies based on algorithms and software tools that have allowed us to detect the flow of information, and it is dynamic over time. This enabled us to provide a comprehensive picture of the knowledge on the subject, to identify some directions in research, and to build a future agenda that covers the dynamic development of the subject. An additional contribution is represented by depicting a landscape of the scientific literature enriched by an author keywords analysis in order to develop and understand blockchain's capabilities as a new technology for cyber-risk and disruption risk prevention in international supply chains. Finally, there are some criticisms in this work that need to be addressed in future research. The main limitation is related to data collection from a single source, Scopus, which is not able alone to cover all scientific contributions in the studied fields. Future studies may extend the data sources to include more publications and compare the results on the evolving research trends. Moreover, due to the "Matthew effect", authors are interested in citing papers with a high number of citations because of their reputation and popularity.
Notwithstanding the discussed limitations, this study contributes an overview of the most established study areas regarding disruptions, cyber risks, and blockchain paradigms, and how these are changing and evolving over time, thereby assisting newcomers in aiming to adopt any of the identified themes as their research focus.