4.7 Article

Cybersecurity investments in a two-echelon supply chain with third-party risk propagation

Related references

Note: Only part of the references are listed.
Article Computer Science, Information Systems

Interdependency Analysis in Security Investment against Strategic Attacks

Mansooreh Ezhei et al.

INFORMATION SYSTEMS FRONTIERS (2020)

Article Engineering, Industrial

Does the ripple effect influence the bullwhip effect? An integrated analysis of structural and operational dynamics in the supply chain†

Alexandre Dolgui et al.

INTERNATIONAL JOURNAL OF PRODUCTION RESEARCH (2020)

Article Engineering, Industrial

Ripple effect modelling of supplier disruption: integrated Markov chain and dynamic Bayesian network approach

Seyedmohsen Hosseini et al.

INTERNATIONAL JOURNAL OF PRODUCTION RESEARCH (2020)

Article Engineering, Industrial

Ripple effect quantification by supplier risk exposure assessment

Aseem Kinra et al.

INTERNATIONAL JOURNAL OF PRODUCTION RESEARCH (2020)

Article Engineering, Industrial

Dual sourcing under supply disruption with risk-averse suppliers in the sharing economy

Varun Gupta et al.

INTERNATIONAL JOURNAL OF PRODUCTION RESEARCH (2020)

Article Computer Science, Information Systems

An insurance theory based optimal cyber-insurance contract against moral hazard

Wanchun Dou et al.

INFORMATION SCIENCES (2020)

Article Engineering, Industrial

The impact of digital technology and Industry 4.0 on the ripple effect and supply chain risk analytics

Dmitry Ivanov et al.

INTERNATIONAL JOURNAL OF PRODUCTION RESEARCH (2019)

Review Engineering, Industrial

Low-Certainty-Need (LCN) supply chains: a new perspective in managing disruption risks and resilience

Dmitry Ivanov et al.

INTERNATIONAL JOURNAL OF PRODUCTION RESEARCH (2019)

Article Management

A real-option approach to mitigate disruption risk in the supply chain

Jian He et al.

OMEGA-INTERNATIONAL JOURNAL OF MANAGEMENT SCIENCE (2019)

Article Business

Effect of security investment strategy on the business value of managed security service providers

Nan Feng et al.

ELECTRONIC COMMERCE RESEARCH AND APPLICATIONS (2019)

Review Economics

Review of quantitative methods for supply chain resilience analysis

Seyedmohsen Hosseini et al.

TRANSPORTATION RESEARCH PART E-LOGISTICS AND TRANSPORTATION REVIEW (2019)

Article Operations Research & Management Science

Integrated detection of disruption scenarios, the ripple effect dispersal and recovery paths in supply chains

Alexander Pavlov et al.

ANNALS OF OPERATIONS RESEARCH (2019)

Article Public, Environmental & Occupational Health

A Study on a Sequential One-Defender-N-Attacker Game

Zhiheng Xu et al.

RISK ANALYSIS (2019)

Article Engineering, Industrial

A new game of information sharing and security investment between two allied firms

Xiaofei Qian et al.

INTERNATIONAL JOURNAL OF PRODUCTION RESEARCH (2018)

Article Engineering, Industrial

Ripple effect in the supply chain: an analysis and recent literature

Alexandre Dolgui et al.

INTERNATIONAL JOURNAL OF PRODUCTION RESEARCH (2018)

Article Engineering, Industrial

Revealing interfaces of supply chain resilience and sustainability: a simulation study

Dmitry Ivanov

INTERNATIONAL JOURNAL OF PRODUCTION RESEARCH (2018)

Article Operations Research & Management Science

Security investment and information sharing in the market of complementary firms: impact of complementarity degree and industry size

Xinbao Liu et al.

JOURNAL OF GLOBAL OPTIMIZATION (2018)

Article Public, Environmental & Occupational Health

Perspectives on Cybersecurity Information Sharing among Multiple Stakeholders Using a Decision-Theoretic Approach

Meilin He et al.

RISK ANALYSIS (2018)

Article Public, Environmental & Occupational Health

Security Investment in Contagious Networks

Seyed Alireza Hasheminasab et al.

RISK ANALYSIS (2018)

Article Operations Research & Management Science

A supply chain network game theory model of cybersecurity investments with nonlinear budget constraints

Anna Nagurney et al.

ANNALS OF OPERATIONS RESEARCH (2017)

Article Management

Multifirm models of cybersecurity investment competition vs. cooperation and network vulnerability

Anna Nagurney et al.

EUROPEAN JOURNAL OF OPERATIONAL RESEARCH (2017)

Article Engineering, Manufacturing

Sourcing Information Security Operations: The Role of Risk Interdependency and Competitive Externality in Outsourcing Decisions

Asunur Cezar et al.

PRODUCTION AND OPERATIONS MANAGEMENT (2017)

Article Computer Science, Artificial Intelligence

Decision support approaches for cyber security investment

Andrew Fielder et al.

DECISION SUPPORT SYSTEMS (2016)

Article Computer Science, Artificial Intelligence

Game of information security investment: Impact of attack types and network vulnerability

Yong Wu et al.

EXPERT SYSTEMS WITH APPLICATIONS (2015)

Article Computer Science, Theory & Methods

A Survey of Interdependent Information Security Games

Aron Laszka et al.

ACM COMPUTING SURVEYS (2015)

Article Business, Finance

The impact of information sharing on cybersecurity underinvestment: A real options perspective

Lawrence A. Gordon et al.

JOURNAL OF ACCOUNTING AND PUBLIC POLICY (2015)

Review Engineering, Industrial

The Ripple effect in supply chains: trade-off 'efficiency-flexibility-resilience' in disruption management

Dmitry Ivanov et al.

INTERNATIONAL JOURNAL OF PRODUCTION RESEARCH (2014)

Article Automation & Control Systems

Security of interdependent and identical networked control systems

Saurabh Amin et al.

AUTOMATICA (2013)

Article Computer Science, Information Systems

Managing Interdependent Information Security Risks: Cyberinsurance, Managed Security Services, and Risk Pooling Arrangements

Xia Zhao et al.

JOURNAL OF MANAGEMENT INFORMATION SYSTEMS (2013)

Article Information Science & Library Science

Contracting Information Security in the Presence of Double Moral Hazard

Chul Ho Lee et al.

INFORMATION SYSTEMS RESEARCH (2013)

Article Computer Science, Information Systems

Information Security Outsourcing with System Interdependency and Mandatory Security Requirement

Kai-Lung Hui et al.

JOURNAL OF MANAGEMENT INFORMATION SYSTEMS (2012)

Article Information Science & Library Science

Information security in networked supply chains: impact of network vulnerability and supply chain integration on incentives to invest

Tridib Bandyopadhyay et al.

INFORMATION TECHNOLOGY & MANAGEMENT (2010)

Article Computer Science, Information Systems

Risks and Benefits of Signaling Information System Characteristics to Strategic Attackers

Marco Cremonini et al.

JOURNAL OF MANAGEMENT INFORMATION SYSTEMS (2009)

Article Engineering, Industrial

An economic analysis of the optimal information security investment in the case of a risk-averse firm

C. Derrick Huang et al.

INTERNATIONAL JOURNAL OF PRODUCTION ECONOMICS (2008)

Article Physics, Multidisciplinary

Transient dynamics increasing network vulnerability to cascading failures

Ingve Simonsen et al.

PHYSICAL REVIEW LETTERS (2008)

Article Computer Science, Information Systems

Minimum-cost network hardening using attack graphs

Lingyu Wang et al.

COMPUTER COMMUNICATIONS (2006)

Review Multidisciplinary Sciences

The economics of information security

Ross Anderson et al.

SCIENCE (2006)

Article Information Science & Library Science

The economic incentives for sharing security information

E Gal-Or et al.

INFORMATION SYSTEMS RESEARCH (2005)

Article Computer Science, Information Systems

Toward econometric models of the security risk from remote attacks

SE Schechter

IEEE SECURITY & PRIVACY (2005)

Article Business, Finance

Interdependent security

H Kunreuther et al.

JOURNAL OF RISK AND UNCERTAINTY (2003)