Related references
Note: Only part of the references are listed.Interdependency Analysis in Security Investment against Strategic Attacks
Mansooreh Ezhei et al.
INFORMATION SYSTEMS FRONTIERS (2020)
Does the ripple effect influence the bullwhip effect? An integrated analysis of structural and operational dynamics in the supply chain†
Alexandre Dolgui et al.
INTERNATIONAL JOURNAL OF PRODUCTION RESEARCH (2020)
Ripple effect modelling of supplier disruption: integrated Markov chain and dynamic Bayesian network approach
Seyedmohsen Hosseini et al.
INTERNATIONAL JOURNAL OF PRODUCTION RESEARCH (2020)
Ripple effect quantification by supplier risk exposure assessment
Aseem Kinra et al.
INTERNATIONAL JOURNAL OF PRODUCTION RESEARCH (2020)
Dual sourcing under supply disruption with risk-averse suppliers in the sharing economy
Varun Gupta et al.
INTERNATIONAL JOURNAL OF PRODUCTION RESEARCH (2020)
An insurance theory based optimal cyber-insurance contract against moral hazard
Wanchun Dou et al.
INFORMATION SCIENCES (2020)
The impact of digital technology and Industry 4.0 on the ripple effect and supply chain risk analytics
Dmitry Ivanov et al.
INTERNATIONAL JOURNAL OF PRODUCTION RESEARCH (2019)
Low-Certainty-Need (LCN) supply chains: a new perspective in managing disruption risks and resilience
Dmitry Ivanov et al.
INTERNATIONAL JOURNAL OF PRODUCTION RESEARCH (2019)
A real-option approach to mitigate disruption risk in the supply chain
Jian He et al.
OMEGA-INTERNATIONAL JOURNAL OF MANAGEMENT SCIENCE (2019)
Effect of security investment strategy on the business value of managed security service providers
Nan Feng et al.
ELECTRONIC COMMERCE RESEARCH AND APPLICATIONS (2019)
Review of quantitative methods for supply chain resilience analysis
Seyedmohsen Hosseini et al.
TRANSPORTATION RESEARCH PART E-LOGISTICS AND TRANSPORTATION REVIEW (2019)
Integrated detection of disruption scenarios, the ripple effect dispersal and recovery paths in supply chains
Alexander Pavlov et al.
ANNALS OF OPERATIONS RESEARCH (2019)
A Study on a Sequential One-Defender-N-Attacker Game
Zhiheng Xu et al.
RISK ANALYSIS (2019)
A new game of information sharing and security investment between two allied firms
Xiaofei Qian et al.
INTERNATIONAL JOURNAL OF PRODUCTION RESEARCH (2018)
Ripple effect in the supply chain: an analysis and recent literature
Alexandre Dolgui et al.
INTERNATIONAL JOURNAL OF PRODUCTION RESEARCH (2018)
Revealing interfaces of supply chain resilience and sustainability: a simulation study
Dmitry Ivanov
INTERNATIONAL JOURNAL OF PRODUCTION RESEARCH (2018)
Security investment and information sharing in the market of complementary firms: impact of complementarity degree and industry size
Xinbao Liu et al.
JOURNAL OF GLOBAL OPTIMIZATION (2018)
Perspectives on Cybersecurity Information Sharing among Multiple Stakeholders Using a Decision-Theoretic Approach
Meilin He et al.
RISK ANALYSIS (2018)
Security Investment in Contagious Networks
Seyed Alireza Hasheminasab et al.
RISK ANALYSIS (2018)
A supply chain network game theory model of cybersecurity investments with nonlinear budget constraints
Anna Nagurney et al.
ANNALS OF OPERATIONS RESEARCH (2017)
Multifirm models of cybersecurity investment competition vs. cooperation and network vulnerability
Anna Nagurney et al.
EUROPEAN JOURNAL OF OPERATIONAL RESEARCH (2017)
Sourcing Information Security Operations: The Role of Risk Interdependency and Competitive Externality in Outsourcing Decisions
Asunur Cezar et al.
PRODUCTION AND OPERATIONS MANAGEMENT (2017)
Decision support approaches for cyber security investment
Andrew Fielder et al.
DECISION SUPPORT SYSTEMS (2016)
Game of information security investment: Impact of attack types and network vulnerability
Yong Wu et al.
EXPERT SYSTEMS WITH APPLICATIONS (2015)
A Survey of Interdependent Information Security Games
Aron Laszka et al.
ACM COMPUTING SURVEYS (2015)
The impact of information sharing on cybersecurity underinvestment: A real options perspective
Lawrence A. Gordon et al.
JOURNAL OF ACCOUNTING AND PUBLIC POLICY (2015)
The Ripple effect in supply chains: trade-off 'efficiency-flexibility-resilience' in disruption management
Dmitry Ivanov et al.
INTERNATIONAL JOURNAL OF PRODUCTION RESEARCH (2014)
Security of interdependent and identical networked control systems
Saurabh Amin et al.
AUTOMATICA (2013)
Managing Interdependent Information Security Risks: Cyberinsurance, Managed Security Services, and Risk Pooling Arrangements
Xia Zhao et al.
JOURNAL OF MANAGEMENT INFORMATION SYSTEMS (2013)
Contracting Information Security in the Presence of Double Moral Hazard
Chul Ho Lee et al.
INFORMATION SYSTEMS RESEARCH (2013)
Information Security Outsourcing with System Interdependency and Mandatory Security Requirement
Kai-Lung Hui et al.
JOURNAL OF MANAGEMENT INFORMATION SYSTEMS (2012)
Information security in networked supply chains: impact of network vulnerability and supply chain integration on incentives to invest
Tridib Bandyopadhyay et al.
INFORMATION TECHNOLOGY & MANAGEMENT (2010)
Risks and Benefits of Signaling Information System Characteristics to Strategic Attackers
Marco Cremonini et al.
JOURNAL OF MANAGEMENT INFORMATION SYSTEMS (2009)
An economic analysis of the optimal information security investment in the case of a risk-averse firm
C. Derrick Huang et al.
INTERNATIONAL JOURNAL OF PRODUCTION ECONOMICS (2008)
Transient dynamics increasing network vulnerability to cascading failures
Ingve Simonsen et al.
PHYSICAL REVIEW LETTERS (2008)
Returns to information security investment: The effect of alternative information security breach functions on optimal investment and sensitivity to vulnerability
Kjell Hausken
INFORMATION SYSTEMS FRONTIERS (2006)
Minimum-cost network hardening using attack graphs
Lingyu Wang et al.
COMPUTER COMMUNICATIONS (2006)
The economics of information security
Ross Anderson et al.
SCIENCE (2006)
The economic incentives for sharing security information
E Gal-Or et al.
INFORMATION SYSTEMS RESEARCH (2005)
Toward econometric models of the security risk from remote attacks
SE Schechter
IEEE SECURITY & PRIVACY (2005)
Interdependent security
H Kunreuther et al.
JOURNAL OF RISK AND UNCERTAINTY (2003)