Abstract
Communication network provides an important premise for the development of supply chain integration, but also brings more and more severe information security risks. Thus, the information security of each firm depends both on the firm’s own investment, as well as on the strategies of security made by supply chain firms. Using game theory model, this paper discusses the investment on security and sharing of the security information of the supply chain firms. Particularly, we analyze the impact of supply chain’s integration, and inherent vulnerability of network on firms’ security strategies. The results show that if a firm increases the investment on security, the other firm tends to free-riding. In addition, compared with the joint decision-making of firms, they will have less security investment when making decisions separately. Hence, firms should better form an information-sharing alliance to coordinate their security decisions.
Keywords
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
T. Bandyopadhyay, V. Jacob, S. Raghunathan, Information security in networked supply chains: impact of network vulnerability and supply chain integration on incentives to invest. Inf. Technol. Manag. 11(1), 7–23 (2010)
R. Anderson, Why cryptosystems fail, in Proceedings of the 1st ACM Conference on Computer and Communications Security, New York, USA, pp. 215–227, 1993
R. Anderson, T. Moore, The economics of information security. Science 314(5799), 610–613 (2006)
L. Gordon, M. Loeb, W. Lucyshyn, Sharing information on computer systems security: an economic analysis. J. Account. Public Policy 22(6), 461–485 (2003)
M.H.R. Khouzani, V. Pham, C. Cid, Strategic discovery and sharing of vulnerabilities in competitive environments, in International Conference on Decision and Game Theory for Security. Springer International Publishing, pp. 59–78 (2014)
H. Varian, System reliability and free riding. Econ. Inf. Secur. 2(5799), 1–15 (2004)
L. Gordon, M. Loeb, The economics of information security investment. ACM Trans. Inf. Syst. Secur. 5(4), 438–457 (2002)
W. Novshek, H. Sonnenschein, Fulfilled expectations in Cournot duopoly with information acquisition and release. Bell J. Econ. 13(1), 214–218 (1982)
D. Fried, Incentives for information production and disclosure in a duopolistic environment. Q. J. Econ. 99(2), 367–381 (1984)
E. Gal-Or, Information sharing in oligopoly. Econometrica 53(2), 329–343 (1985)
E. Gal-Or, A. Ghose, The economic incentives for sharing security information. Inf. Syst. Res. 16(2), 186–208 (2005)
D. Liu, Y. Ji, V. Mookerjee, Knowledge sharing and investment decisions in information security. Decis. Support Syst. 52, 95–107 (2011)
H. Ogut, N. Menon, S. Raghunathan, Cyber insurance and IT security investment: impact of interdependent risk, in Proceedings of Weis’, 2005
H. Kunreuther, G. Heal, Interdependent security. J. Risk Uncertain. 26(2–3), 231–249 (2003)
K. Hausken, Income, interdependence, and substitution effects affecting incentives for security investment. J. Account. Public Policy 25(6), 629–665 (2006)
X. Gao, W. Zhong, S. Mei, Security investment and information sharing under an alternative security breach probability function. Inf. Syst. Front. 17(2), 423–438 (2013)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Zhang, Hy., Xie, J. (2019). Security Decisions in a Networked Supply Chain with Integration. In: Huang, G., Chien, CF., Dou, R. (eds) Proceeding of the 24th International Conference on Industrial Engineering and Engineering Management 2018. Springer, Singapore. https://doi.org/10.1007/978-981-13-3402-3_51
Download citation
DOI: https://doi.org/10.1007/978-981-13-3402-3_51
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-13-3401-6
Online ISBN: 978-981-13-3402-3
eBook Packages: Business and ManagementBusiness and Management (R0)