Cybersecurity investments in a two-echelon supply chain with third-party risk propagation
Published 2020 View Full Article
- Home
- Publications
- Publication Search
- Publication Details
Title
Cybersecurity investments in a two-echelon supply chain with third-party risk propagation
Authors
Keywords
-
Journal
INTERNATIONAL JOURNAL OF PRODUCTION RESEARCH
Volume -, Issue -, Pages 1-23
Publisher
Informa UK Limited
Online
2020-02-07
DOI
10.1080/00207543.2020.1721591
References
Ask authors/readers for more resources
Related references
Note: Only part of the references are listed.- Effect of Security Investment Strategy on the Business Value of Managed Security Service Providers
- (2019) Nan Feng et al. Electronic Commerce Research and Applications
- Review of quantitative methods for supply chain resilience analysis
- (2019) Seyedmohsen Hosseini et al. TRANSPORTATION RESEARCH PART E-LOGISTICS AND TRANSPORTATION REVIEW
- Does the ripple effect influence the bullwhip effect? An integrated analysis of structural and operational dynamics in the supply chain
- (2019) Alexandre Dolgui et al. INTERNATIONAL JOURNAL OF PRODUCTION RESEARCH
- Dual sourcing under supply disruption with risk-averse suppliers in the sharing economy
- (2019) Varun Gupta et al. INTERNATIONAL JOURNAL OF PRODUCTION RESEARCH
- The impact of digital technology and Industry 4.0 on the ripple effect and supply chain risk analytics
- (2018) Dmitry Ivanov et al. INTERNATIONAL JOURNAL OF PRODUCTION RESEARCH
- Security Investment in Contagious Networks
- (2018) Seyed Alireza Hasheminasab et al. RISK ANALYSIS
- Low-Certainty-Need (LCN) supply chains: a new perspective in managing disruption risks and resilience
- (2018) Dmitry Ivanov et al. INTERNATIONAL JOURNAL OF PRODUCTION RESEARCH
- A real-option approach to mitigate disruption risk in the supply chain
- (2018) Jian He et al. OMEGA-INTERNATIONAL JOURNAL OF MANAGEMENT SCIENCE
- Multifirm models of cybersecurity investment competition vs. cooperation and network vulnerability
- (2017) Anna Nagurney et al. EUROPEAN JOURNAL OF OPERATIONAL RESEARCH
- A new game of information sharing and security investment between two allied firms
- (2017) Xiaofei Qian et al. INTERNATIONAL JOURNAL OF PRODUCTION RESEARCH
- Ripple effect in the supply chain: an analysis and recent literature
- (2017) Alexandre Dolgui et al. INTERNATIONAL JOURNAL OF PRODUCTION RESEARCH
- Revealing interfaces of supply chain resilience and sustainability: a simulation study
- (2017) Dmitry Ivanov INTERNATIONAL JOURNAL OF PRODUCTION RESEARCH
- Security investment and information sharing in the market of complementary firms: impact of complementarity degree and industry size
- (2017) Xinbao Liu et al. JOURNAL OF GLOBAL OPTIMIZATION
- Sourcing Information Security Operations: The Role of Risk Interdependency and Competitive Externality in Outsourcing Decisions
- (2017) Asunur Cezar et al. PRODUCTION AND OPERATIONS MANAGEMENT
- Perspectives on Cybersecurity Information Sharing among Multiple Stakeholders Using a Decision-Theoretic Approach
- (2017) Meilin He et al. RISK ANALYSIS
- A supply chain network game theory model of cybersecurity investments with nonlinear budget constraints
- (2016) Anna Nagurney et al. ANNALS OF OPERATIONS RESEARCH
- Decision support approaches for cyber security investment
- (2016) Andrew Fielder et al. DECISION SUPPORT SYSTEMS
- Game of information security investment: Impact of attack types and network vulnerability
- (2015) Yong Wu et al. EXPERT SYSTEMS WITH APPLICATIONS
- The Ripple effect in supply chains: trade-off ‘efficiency-flexibility-resilience’ in disruption management
- (2013) Dmitry Ivanov et al. INTERNATIONAL JOURNAL OF PRODUCTION RESEARCH
- Information Security Outsourcing with System Interdependency and Mandatory Security Requirement
- (2013) Kai-Lung Hui et al. JOURNAL OF MANAGEMENT INFORMATION SYSTEMS
- Managing Interdependent Information Security Risks: Cyberinsurance, Managed Security Services, and Risk Pooling Arrangements
- (2013) Xia Zhao et al. JOURNAL OF MANAGEMENT INFORMATION SYSTEMS
- Security of interdependent and identical networked control systems
- (2012) Saurabh Amin et al. AUTOMATICA
- Risks and Benefits of Signaling Information System Characteristics to Strategic Attackers
- (2010) Marco Cremonini et al. JOURNAL OF MANAGEMENT INFORMATION SYSTEMS
- An economic analysis of the optimal information security investment in the case of a risk-averse firm
- (2008) C. Derrick Huang et al. INTERNATIONAL JOURNAL OF PRODUCTION ECONOMICS
- Decision-Theoretic and Game-Theoretic Approaches to IT Security Investment
- (2008) Huseyin Cavusoglu et al. JOURNAL OF MANAGEMENT INFORMATION SYSTEMS
- Transient Dynamics Increasing Network Vulnerability to Cascading Failures
- (2008) Ingve Simonsen et al. PHYSICAL REVIEW LETTERS
Create your own webinar
Interested in hosting your own webinar? Check the schedule and propose your idea to the Peeref Content Team.
Create NowAsk a Question. Answer a Question.
Quickly pose questions to the entire community. Debate answers and get clarity on the most important issues facing researchers.
Get Started