Cybersecurity investments in supply chains with two-stage risk propagation

被引:0
|
作者
Dash, Aishwarya [1 ]
Sarmah, S. P. [1 ]
Tiwari, M. K. [1 ]
Jena, Sarat Kumar [2 ]
Glock, Christoph H. [3 ]
机构
[1] Indian Inst Technol Kharagpur, Ind & Syst Engn, Kharagpur, West Bengal, India
[2] XIM Univ, Xavier Inst Management, Operat Management, Bhubaneswar, India
[3] Tech Univ Darmstadt, Inst Prod & Supply Chain Management, Darmstadt, Germany
关键词
Supply chain management; Cyber-attacks; Cybersecurity investment; Cybersecurity insurance; Indirect risk propagation; Direct and indirect attacks; INFORMATION SECURITY INVESTMENT; GAME; IMPACT; INTERDEPENDENCY;
D O I
10.1016/j.cie.2024.110519
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Cyber-attacks present a significant threat to supply chains as their nodes are directly or indirectly vulnerable to risk propagation at various stages. The risk level varies depending on the type of attack. A cybersecurity insurance offers a practical method to mitigate this risk, and it is crucial to determine optimal cybersecurity investments for all supply chain nodes. Previous studies have overlooked the joint impact of the attack type, two- stage risk propagation, and cybersecurity insurance in optimizing cybersecurity investments. This paper addresses this research gap by examining optimal investments under targeted and opportunistic attacks in a two- stage supply chain using game theory. The findings indicate that optimal investments differ based on the type of attack. For instance, retailers should invest more in cybersecurity under opportunistic attacks, while suppliers need to spend more under targeted attacks. Additionally, the results show that under opportunistic attacks, members should reduce their investments. Conversely, under targeted attacks, investments should initially increase and then stabilize. In the case of opportunistic attacks, suppliers and retailers should prioritize reconfiguring their systems over investing heavily in cybersecurity. The model presented in this paper demonstrates that not all cyber risks are worth defending against and that cybersecurity insurance for the entire supply chain can be more cost-effective than addressing cybersecurity risks individually. The paper also explores the impact of joint decisions on cybersecurity insurance when firms are unwilling to invest individually. The insights obtained enable supply chains to identify their optimal cybersecurity investment strategies effectively.
引用
收藏
页数:19
相关论文
共 50 条
  • [41] Assessing sustainability of supply chains by chance-constrained two-stage DEA model in the presence of undesirable factors
    Izadikhah, Mohammad
    Saen, Reza Farzipoor
    COMPUTERS & OPERATIONS RESEARCH, 2018, 100 : 343 - 367
  • [42] Developing a coordinated vendor-buyer model in two-stage supply chains with stochastic lead-times
    Sajadieh, Mohsen S.
    Jokar, Mohammad R. Akbari
    Modarres, Mohammad
    COMPUTERS & OPERATIONS RESEARCH, 2009, 36 (08) : 2484 - 2489
  • [43] Resource allocation for supply chains based on Pareto-optimal two-stage cross-efficiency model
    Zhao, Yuanyuan
    Fang, Lei
    RAIRO-OPERATIONS RESEARCH, 2022, 56 (02) : 891 - 910
  • [44] A STATE-SPACE BASED STUDY OF STABILITY, BULLWHIP EFFECT AND TOTAL COSTS IN TWO-STAGE SUPPLY CHAINS
    Zhang, Chong
    Wang, Haiyan
    INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING INFORMATION AND CONTROL, 2012, 8 (5A): : 3399 - 3410
  • [45] Block two-stage methods for singular systems and Markov chains
    Migallon, V
    Penades, J
    Szyld, DB
    NUMERICAL LINEAR ALGEBRA WITH APPLICATIONS, 1996, 3 (05) : 413 - 426
  • [46] On the Two-Stage Supply Chain Network Design Problem with Risk-Pooling and Lead Times
    Cosma, Ovidiu
    Pop, Petrica
    Sabo, Cosmin
    CYBERNETICS AND SYSTEMS, 2023, 54 (03) : 321 - 338
  • [47] Research on green supply chain finance risk identification based on two-stage deep learning
    Liu, Ying
    Li, Sizhe
    Yu, Chunmei
    Lv, Mingli
    OPERATIONS RESEARCH PERSPECTIVES, 2024, 13
  • [48] Two-stage nonparametric kernel leaning: From label propagation to kernel propagation
    Hu, Enliang
    Chen, Songcan
    Yu, Jiankun
    Qiao, Lishan
    NEUROCOMPUTING, 2011, 74 (17) : 2725 - 2733
  • [49] Decision support model for cybersecurity risk planning: A two-stage stochastic programming framework featuring firms, government, and attacker
    Paul, Jomon A.
    Zhang, Minjiao
    EUROPEAN JOURNAL OF OPERATIONAL RESEARCH, 2021, 291 (01) : 349 - 364
  • [50] Technical efficiency analysis of information technology investments: a two-stage empirical investigation
    Shao, BBM
    Lin, WT
    INFORMATION & MANAGEMENT, 2002, 39 (05) : 391 - 401