Journal
ANNALS OF OPERATIONS RESEARCH
Volume 248, Issue 1-2, Pages 405-427Publisher
SPRINGER
DOI: 10.1007/s10479-016-2209-1
Keywords
Cybersecurity; Investments; Game theory; Nash equilibrium; Information asymmetry; Variational inequalities; Supply chain network vulnerability
Categories
Funding
- National Science Foundation (NSF) Grant CISE [1111276]
- Advanced Cyber Security Center through the Grant: Cybersecurity Risk Analysis for Enterprise Security
Ask authors/readers for more resources
In this paper, we develop a supply chain network game theory model consisting of retailers and demand markets with retailers competing noncooperatively in order to maximize their expected profits by determining their optimal product transactions as well as cybersecurity investments subject to nonlinear budget constraints that include the cybersecurity investment cost functions. The consumers at the demand markets reflect their preferences through the demand price functions, which depend on the product demands and on the average level of cybersecurity in the supply chain network. We identify the supply chain network vulnerability to cyberattacks as well as that of the individual retailers. We demonstrate that the governing Nash equilibrium conditions can be formulated as a variational inequality problem and we provide a novel alternative formulation, along with the accompanying theory. We also propose an algorithm for the alternative formulation, which yields, at each iteration, closed form expressions in product transactions, security levels, and Lagrange multipliers associated with the budget constraints. We then apply the algorithm to compute solutions to a spectrum of numerical supply chain network cybersecurity investment examples. The examples broaden our understanding of the impacts of the addition of retailers, changes in budgets, demand price functions, and financial damages, on equilibrium product transactions and cybersecurity investments, as well as on the supply chain network vulnerability and retailer vulnerability under budget constraints.
Authors
I am an author on this paper
Click your name to claim this paper and add it to your profile.
Reviews
Recommended
No Data Available