Cybersecurity investments in the supply chain: Coordination and a strategic attacker

被引:44
|
作者
Simon, Jay [1 ]
Omar, Ayman [1 ]
机构
[1] Amer Univ, Kogod Sch Business, 4400 Massachusetts Ave NW, Washington, DC 20016 USA
关键词
Supply chain management; Cybersecurity; Supply chain coordination; Attacker-defender model; Interdependent security; RESOURCE-ALLOCATION; SECURITY; DEFENSE; GAME; MANAGEMENT; TERRORIST; COMPLEX; IMPACT; FACE;
D O I
10.1016/j.ejor.2019.09.017
中图分类号
C93 [管理学];
学科分类号
12 ; 1201 ; 1202 ; 120202 ;
摘要
Cybersecurity poses a difficult challenge to supply chains, as a firm may be affected by an attack on another firm in the supply chain. For example, a retailer's consumer data might be compromised via an attack on a supplier. In general, individual nodes in a supply chain bear the entire cost of their own cybersecurity investments, but some of the benefits of the investments may be enjoyed by the other nodes as well. We analyze the differences between coordinated and uncoordinated cybersecurity investments, as well as the differences resulting from a strategic and a non-strategic attacker. We find that lack of coordination leads to underinvestment with a non-strategic attacker, but that this is somewhat counterbalanced by an attacker being strategic. Lack of coordination may lead to either underinvestment or overinvestment with a strategic attacker, depending on how large the indirect damages from attacks are relative to the direct damages; overinvestment is more likely if indirect damages are relatively minor. A numerical example is provided to illustrate the impacts of and relationships between coordinated investments and a strategic attacker. (C) 2019 Elsevier B.V. All rights reserved.
引用
收藏
页码:161 / 171
页数:11
相关论文
共 50 条
  • [21] Coordination in the Supply Chain
    Pawlewski, Pawel
    [J]. 10TH INTERNATIONAL CONFERENCE ON SOFT COMPUTING MODELS IN INDUSTRIAL AND ENVIRONMENTAL APPLICATIONS, 2015, 368 : 439 - 450
  • [22] INL advocates attacker thinking for cybersecurity
    Montague, Jim
    [J]. Control, 2020, 33 (11):
  • [23] A Supply Chain Service Cybersecurity Certification Scheme based on the Cybersecurity Act
    Michota, Alexandra
    Polemi, Nineta
    [J]. 2022 IEEE INTERNATIONAL CONFERENCE ON CYBER SECURITY AND RESILIENCE (IEEE CSR), 2022, : 382 - 387
  • [24] Cybersecurity Breaches in the Supply Chain and Earnings Management
    He, Zhijian
    HuangFu, JiangBo
    Walton, Stephanie
    [J]. JOURNAL OF INFORMATION SYSTEMS, 2022, 36 (03) : 83 - 113
  • [25] Cybersecurity in process control, operations, and supply chain
    Parker, Sandra
    Wu, Zhe
    Christofides, Panagiotis D.
    [J]. COMPUTERS & CHEMICAL ENGINEERING, 2023, 171
  • [26] Cybersecurity Certification Requirements for Supply Chain Services
    Kyranoudi, Pinelopi
    Kalogeraki, Eleni-Maria
    Michota, Alexandra
    Polemi, Nineta
    [J]. 26TH IEEE SYMPOSIUM ON COMPUTERS AND COMMUNICATIONS (IEEE ISCC 2021), 2021,
  • [27] Blockchain for Supply Chain Cybersecurity, Optimization and Compliance
    Mylrea, Michael
    Gourisetti, Sri Nikhil Gupta
    [J]. 2018 RESILIENCE WEEK (RWS), 2018, : 70 - 76
  • [28] Cybersecurity investments in supply chains with two-stage risk propagation
    Dash, Aishwarya
    Sarmah, S. P.
    Tiwari, M. K.
    Jena, Sarat Kumar
    Glock, Christoph H.
    [J]. COMPUTERS & INDUSTRIAL ENGINEERING, 2024, 197
  • [29] Does organizational strategic fit in supply chain relations affect the propensity for strategic change? Evidence from Taiwanese investments in China
    Tsai, Chang-yen
    Tien, Chengli
    [J]. CHINESE MANAGEMENT STUDIES, 2011, 5 (02) : 164 - 180
  • [30] Strategic Supply Chain Management
    Ghiannakis, Mihalis
    [J]. JOURNAL OF PURCHASING AND SUPPLY MANAGEMENT, 2012, 18 (03) : 199 - 199