Information Security Investment Strategies in Supply Chain Firms: Interplay Between Breach Propagation, Shared Information Assets and Chain Topology
نویسندگان
چکیده
Firms in a supply chain share information assets among them, and make use of inter-firm network connections to enable quick information sharing. Both of these approaches have significant implications when a security breach occurs. One, the interconnections may become conduits for security breach propagation. Two, shared information assets now become vulnerable at the owner as well as at the partner firms’ sites. Therefore, an effective security investment strategy in a supply chain must take into account vulnerability issues arising out of propagation of security breaches and sharing of information assets. Investments in perimeter security technologies reduce direct vulnerability of information assets, but are ineffective in countering indirect breaches, which originate from partnering firms. Our research investigates interdependent security investment strategies of supply chain firms in a game-theoretic framework, and analyze non-cooperative and centrally administered investment equilibria. We also provide comparative static of these investments under specific value chain topologies.
منابع مشابه
Integrating Business Sustainability into Supply Chain Management
Companies today face the challenge of adopting proper supply chain sustainability (SCS) strategies and practices to respond effectively to emerging global sustainability initiatives. Business sustainability has become a strategic imperative, with a focus on both financial and non-financial sustainability performance, which creates shared value for all stakeholders. This paper examines the integ...
متن کاملCoordination of Information Sharing and Cooperative Advertising in a Decentralized Supply Chain with Competing Retailers Considering Free Riding Behavior
This paper studies a decentralized supply chain in which a manufacturer sells a common generic product through two traditional and online retailers under free riding market. We assume that the traditional retailer provides the value added services but the online retailer does not. Factors such as retail prices, local advertising of the retailers, global advertising of the manufacturer and servi...
متن کاملInformation Security Investment with Different Information Types: A Two-Firm Analysis
We analyze information security investment decisions by two firms that possess imperfectly substitutable information assets. Information assets are imperfectly substitutable if information at each firm is valuable and becomes more valuable when combined. When compared to optimal investment decisions made by a central planner, we find diametrically opposite results in the case where these decisi...
متن کاملCo-Investment Games between Supply Chain Parties with Interdependent Infrastructure
The ability to collect detailed information about customer behavior and the ease of communication due to new technologies (including Internet and IT) have motivated extensive research into dynamic decision making in general and continuous-time production, pricing and investment strategies in particular. The carry over to investments in supply chain infrastructures by interacting firms, sharing ...
متن کاملPROVIDING A MODEL FOR THE SUPPLIER SELECTION PROCESS IN THE SUPPLY CHAIN MANAGEMENT WITH HYBRID MODEL OF DECISION MAKING
<span style="color: #000000; font-family: Tahoma, sans-serif; font-size: 13px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; orphans: auto; text-align: -webkit-left; text-indent: 0px; text-transform: none; white-space: normal; widows: auto; word-spacing: 0px; -webkit-text-stroke-width: 0px; display: inline !important; float: none; ba...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2005