1. Introduction
Emerging information technologies (EITs) and significant ongoing problems have resulted in the digitalization process acting as a complement to the adoption of digital supply chain management (SCM) and more cutting-edge strategies [
1]. In today’s globalized era, a supply chain perspective has emerged as the primary unit serving as an organizational principle [
2]. This SCM perspective faces multiple challenges, including cybersecurity, which companies have to properly and progressively manage to be able to broaden their SCM activities beyond their borders [
3]. Cybersecurity in SCM has recently gained considerable relevance because unmanned aerial vehicles (UAVs) make it possible for supply chain stakeholders to gather, transport, store, and analyze a massive quantity of data at a low cost while also being able to share facts and information [
4,
5,
6]. In addition, UAV implementation in SCM operations exhibits a significant improvement in process capability, a decrease in costs, and an enhancement in the quality of decision-making in order to improve cybersecurity practices. Cyber threat intelligence and advanced analytics techniques are embedded to successfully anticipate cyberattack trends in cyber SCM [
5].
UAVs are increasingly utilized for security and protection at mega sporting events such as those held in Qatar [
7], enhancing spectator participation [
8]. Effective cybersecurity management at these events is crucial for creating a positive atmosphere and achieving event goals [
9]. Cybersecurity risks involve attempts to disrupt digital systems, steal data, or damage resources [
7,
10]. The 2014 FIFA World Cup revealed the potential impact of cybersecurity issues on sporting events, such as IT system intrusions, phishing emails, cyberattacks, and cyber espionage [
11]. Although security threats have gained more attention after tragic incidents in 2015 [
7,
12], cybersecurity at sporting events has often been overlooked. Rapid technological advancements and their integration into event planning contribute to cybersecurity concerns [
13]; Yaacoub et al. [
4] explored these in the context of technology use in SCM. In addition, Ardito et al. [
1] examined the integration of digital technologies into SCM and marketing, which they argued was essential for organizations to transition towards Industry 4.0. In addition, Tiwari et al. (2018) [
2] and Patnayakuni et al. [
3] conducted studies of big data analytics in SCM between 2010 and 2016, aiming to provide insights into industry applications. The authors highlighted the increasing importance of big data analytics for enhancing decision-making, improving operational efficiency, and reducing costs in SCM.
Fernández-Caramés [
14] declared that unmanned aerial vehicles are used to store, process, and exchange data with equipment stationed in a facility and with SCM. Hopkins [
15], Raji et al. [
16], and Haji et al. [
17] reported on UAVs and drone aircraft for the shortest delivery in the supply chain system, particularly security issues. Abbas et al. [
18] presented a blockchain-based SCM of a secure SCM to trace the drug distribution process, handle difficulties relating to faking, and make delivery times shorter; this could be because businesses are digitizing their internal systems through door-to-door SCM so that they can later use UAVs as part of SCM [
1,
19]. Furthermore, using UAVs, IT professionals track and monitor the security conditions in the supply chain, as well as the upstream, midstream, and downstream data and substitute them into an evaluation model to assess UASs. Using the latest technology of IoT and artificial intelligence (AI), UAVs are now used to handle the SCM of city security [
20], particularly in relation to cybersecurity challenges for the SCM of mega sporting events. The chain of valuing UAVs in SCM is based further upstream in the SCM levels, while the point further downstream tracks the information and data operations that are already happening or are going to occur downstream [
21,
22]. Under the circumstances of UAV supply chain management, even though it is possible to maintain the stability of upstream operation costs, this would result in high-security equipment carrying costs downstream whenever errors are expected or markets are altered. As such, the quality of services would be compromised [
21]. On the contrary, SCM is more involved in the real world, and each operation of the upstream, middle, and downstream stages can supply one another [
23,
24]. Therefore, UAVs help in three SCM stages: upstream, midstream, and downstream. When used at mega sporting events, UAVs present several challenges that should be solved in each SCM stage (
Figure 1).
Problems further upstream are referred to as “upstream” problems, which arise before an event. The regulatory framework for UAVs is one of the most significant upstream challenges. There needs to be more harmonization among the regulations governing UAV use at mega sporting events. The regulations vary from country to country [
25], which results in uncertainty for both the event organizers and the UAV operators, ultimately affecting the planning and execution of UAV operations. Issues that arise in the middle of an event are called “midstream problems.” One of the most significant issues during the midstream concerns the security of UAV operations. According to Lopez et al. [
26], the use of UAVs in crowded and confined spaces, such as stadiums, can pose a safety risk to the spectators and players, or could collide with other UAVs or objects. Another issue that needs to be addressed in the middle of the process is the potential for cyberattacks that target UAVs or the data they collect [
27]. Meanwhile, downstream problems arise because of the event that has already taken place. The protection of the spectators’ and players’ personal information and privacy is one of the most significant issues that arise due to this. Using UAVs to record video footage and collect data can result in privacy concerns, mainly if the data needs to be adequately secured or used for purposes that are not authorized [
27]. Whether or not using UAVs at mega sporting events is cost-effective raises another issue further down the line. The cost of purchasing and operating UAVs, in addition to the cost of training and certifying operators, can be a significant investment for event organizers. The proposed SCM perspective to manage cybersecurity challenges at mega sporting events is shown in
Figure 1.
The use of UAVs at mega sporting events offers many benefits, including providing new perspectives, analyzing data in real time, and improving the overall experience for both players and spectators. In contrast, it imposes several challenges upstream, midstream, and downstream that must be resolved. A coordinated and harmonized regulatory framework, advanced safety measures, and robust privacy and data protection policies are required to guarantee the safe, secure, and efficient use of UAVs during mega sporting events. The use of UAVs in the SCM stages is growing, and with it comes advantages for sports and games. However, it increases the complexity of scalability and cybersecurity, as well as the SCM of security and preventive measures for sporting events. Each of these streams in the security of mega sporting events is simultaneously responsible for managing security measures (i.e., cameras, sensors, and flying capacities), safety assurance, and information using UAVs. This procedure calls for an integrated supply chain strategy to handle the difficulties that exist throughout the entire chain and to increase the efficiency of complicated supply chain networks [
28]. The best way to capture the factors behind the difficulties and possibilities in cybersecurity ahead of the impact of future mega sporting events is to understand the motives that lead Qatar to organize such an event. Talavera et al. [
12] conducted a study on Qatar’s mega sporting events and found several challenges in providing measures to secure these events. As a result, the most important challenge for public policy is to enhance cybersecurity by eliminating the present drawbacks inherent to the cybersecurity issues that link Qatar to mega sporting events [
29]. Therefore, Ganji [
29] offered an “unmanned aerial system (UAS)” for automating cybersecurity measures in order to secure mega sporting event processes. This system can detect cybersecurity threats and cyberattacks more quickly than human operators can, and can locate objects in a warehouse based on the signal from their tags.
Due to the growing need for more modern security measures, using unmanned aerial vehicles (UAVs) for cybersecurity purposes at large athletic events, concerts, and playgrounds has received much attention recently. Several nations’ event management procedures have incorporated UAV-based cybersecurity strategies, which have been adopted and implemented. According to Cooper et al. [
10], unmanned aerial vehicles (UAVs) in the United States have been used to deliver real-time situational awareness and threat identification around the perimeter of large-scale events such as the Super Bowl. Similarly, law enforcement agencies in the United Kingdom have begun using unmanned aerial vehicles (UAVs) to monitor security at high-profile events such as the Glastonbury Festival and the London Marathon [
27]. This has increased both public safety and improved coordination among security professionals. According to Abbas et al. [
18], the New South Wales Police Force in Australia has successfully integrated unmanned aerial vehicles (UAVs) into its security measures for large events such as the celebrations held in Sydney on New Year’s Eve and the Australian Open. Even if SCM practices are becoming increasingly commonplace, the cybersecurity of UAVs is still a challenge [
30]. Investigators at Johns Hopkins University have discovered vulnerabilities in UAV technology, including those that might be exploited by hijackers, man-in-the-middle attackers, and injection hackers during sporting events [
29]. Because of this, numerous challenges regarding the safety, security, and dependability of using UAVs for SCM have been voiced. As a result, there is a need to alleviate the concerns regarding the safety and security of UAVs via monitoring their every movement in the cybersecurity supply chain.
This study relied on UAV-based cybersecurity to bring drones back to sporting events if they began to deviate from their intended path. We identified the challenges in implementing a proper UAV framework and have proposed opportunities to handle security issues and cyberattacks in the SCM at mega sporting events. In particular, we developed a new UAV-based cybersecurity framework that assesses the performance of UAVs at mega sporting events. This UAV framework offers the possibility of the SCM of cybersecurity supplies. In addition, UAVs may fly on their own using the digital security and safety built into them or can be controlled remotely using a controller. This study developed a testable UAS-based security model to enhance the SCM-carrying UAVs that guarantee the supply of security and safety measures at mega sporting events. Specifically, we aimed to cover the following objectives when designing a model that measures SCM:
To identify the challenges in the SCM process;
To propose a research framework for the implementation of UAS-based cybersecurity for SCM at Qatar’s mega sporting events;
To assess the upstream, midstream, and downstream stages in the implementation of the UAS-based cybersecurity model for SCM at Qatar’s mega sporting events;
To develop a testable UAV-based security framework for the SCM of security and safety measures.
5. Discussion
UAVs are now used to capture FIFA World Cup games in countries such as Qatar. The purpose of this study was to develop a UAV-based cybersecurity framework in order to ensure the SCM of security and safety measures in FIFA mega sporting events. The study was conducted in two stages, with the first stage focused on SLR and the second on developing and testing a UAV-based cybersecurity framework in FIFA mega sporting events. Using a survey questionnaire, the 66.85% response rate to the drone security survey indicates significant interest and relevance among IT professionals. The high rate may be due to the growing importance of drones in various industries and the need for robust security measures. The 33.15% non-response could be due to reasons like time constraints or lack of interest, or these individuals may not view drone security as a priority. The survey provides valuable insights into IT experts’ opinions and experiences related to drone security. Understanding these perspectives is crucial for developing effective policies and practices as drone usage increases. Using this UAV-based framework, the potential benefits posed by UAVs will continue to diversify and intensify throughout the upcoming years. In this way, UAVs will frequently avoid detection due to their physical and operational qualities, which presents the community responsible for vital infrastructure with several issues [
4,
5]. Several studies have been conducted on using technology-based UAVs [
7,
8,
20,
21], UAV-based security supplies [
4,
10,
11,
15,
16,
17], and SCM 4.0 [
1,
3,
5,
12,
18,
21,
24]. However, this study developed a valid and reliable UAV-based cybersecurity framework for FIFA mega sporting events. Furthermore, this study investigated the use of UAVs at mega sporting events from a supply chain perspective to explore the cybersecurity challenges at these events. A framework was proposed and developed across two stages. In the first stage, an SLR was conducted to identify the challenges and issues faced by UAVs based on the mega sports event supply chain. In the second phase, an empirical study was conducted using a survey questionnaire based on 20 of the previously identified challenges and issues from the SLR. These 20 items were categorized into five factors: Traceability, security and privacy, trust, acceptability, and preparedness. This study was conducted through statistical analysis that included EFA using IBM SPSS and CFA using IBM AMOS to ensure the validity and reliability of the newly developed framework. All five factors had good validity and reliability.
A good correlation was found among the factors of the UAV-based cybersecurity framework for mega sporting events. Traceability was found to be significantly and positively related to security and privacy (r = 0.389), trust (r = 0.380), acceptability (r = 0.468), and preparedness (r = 0.404). Security and privacy were significantly and positively related to trust (r = 0.395), acceptability (r = 0.352), and preparedness (r = 0.403). Trust was also positively and significantly related to acceptability (r = 0.373) and preparedness (r = 0.480). Finally, acceptability was positively and significantly related to preparedness (r = 0.345). This means that all five factors were significantly and positively correlated with one another, which will determine the security measures employed at mega sporting events. Such dependency also points to the complexity of managing such security systems and the importance of understanding the design and operation of FIFA mega sporting events.
5.1. Managerial Implications
The proposed framework offers some practical and managerial implications across the three stages for implementing UAVs (i.e., upstream, midstream, and downstream) of mega sporting events. They can be summarized as the flow of three stages at mega sporting events.
Upstream—According to the upstream stage, traceability plays the role of identifying weak areas that hackers/terrorists can use for attacks. Because of traceability, quality is necessary at each step of the process, and UAV navigation must have traceability in each activity that pertains to sports areas. UAVs could use such technology to trace cybersecurity threats. UAVs have undergone considerable technological advancements to their control units, sensors, and security options and have experience with significant traceable objects. Thus, UAVs have the potential to assist professional IT and security experts, such as those that must be completed consistently, to determine security needs and to maintain the traceability of a particular area. Using traceability sensors, it is possible to track drones that communicate using radio frequency, while, when using radar detection, it is possible to track drones that have been pre-programmed using GPS to travel to a specific location. The acceptability of UAV technology at mega sporting events for use in security operations is the second factor in the upstream stage, allowing users to implement it as part of the security measures. It has been estimated that delivery UAVs and users have an average acceptance rate of 62% across various industries. Acceptability is at the heart of research using a UAV-based supply chain. It is proposed that a user’s perception of the danger posed by the operation of UAVs plays a role in whether or not they will accept the new technology. The results demonstrate that social and economic considerations are components of perceived risk, determining how users feel about using UAV technology as part of the security of mega sporting events. This proposal is pertinent to the present line of research examining social and economic issues regarding the use of UAVs. It implies a relationship between concerns and the adoption of UAVs, which has never been proposed.
Midstream—An analysis of the trust in using UAVs that are subsequently coupled with AI technology was performed with the assistance of a behavior-based and local scheme. Trust in a UAV-based supply chain model determines behavioral and local trust in adopting UAVs in the SCM at mega sporting events. UAVs with higher trust are considered legitimate devices and are granted permission to communicate and carry out surveillance within the network. In addition, the trust factor updates the technology and surveillance network, enabling regular analysis and monitoring of areas [
86]. The goal is to establish confidence among all UAVs in the area while simultaneously monitoring the network and power levels of any adjacent UAVs to provide a more in-depth understanding of how security measures based on UAVs assist users and security managers in combating security threats and vulnerabilities caused by hackers, terrorists, and others by improving the core productivity of security practices in the UAV-based supply chain. Similarly, managers can improve their ability to predict supply through UAVs by embedding sensors into their containers, cars, and products. On the other side, the utilization of UAVs will potentially increase the traceability, security, and accuracy of transactions and collaboration between stakeholders in the supply chain.
Downstream—Preparedness is the last factor of the downstream stage, where it is necessary to implement UAVs in the supply chains of security and privacy measures. In this stage, managers and users prepare themselves to tackle the problems faced by sports organizers. This also helps managers to increase measures so that security and privacy measures are provided on time. Furthermore, managers and users ensure the safety and security of the public because they show their preparedness, skills, and capabilities with necessary security measures.
5.2. Limitations and Future Directions
This study has some limitations regarding the generalizability of adopting UAV-based cybersecurity systems at mega sporting events. First, the framework was developed and proposed with high emphasis on Qatar’s recent FIFA events and other concerts and religious events, so whether and how it can be used in other contexts of supply and to maintain security practices are very important. Second, the proposed framework included five factors that are not exclusive, and other cybersecurity issues and challenges can be added in future work. This can include testing the behaviors of the public (i.e., satisfaction, awareness, and safety compliance) and the performance of security measures (i.e., sustainability performance, loyalty behaviors, and IT performance). Furthermore, future studies may use different dependent/outcome variables to check the effect of the included factors in the proposed framework. Future studies should be conducted on integrating AI and machine learning algorithms in UAVs, improving threat detection, analysis, and response capabilities, and enabling faster and more accurate real-time decision-making [
87]. UAVs also become more prevalent; there is a growing need for counter-UAV systems to detect, track, and neutralize potential rogue drones that pose security threats during mega events [
88].