Skip to main content
  • 889 Accesses

Abstract

Communication network provides an important premise for the development of supply chain integration, but also brings more and more severe information security risks. Thus, the information security of each firm depends both on the firm’s own investment, as well as on the strategies of security made by supply chain firms. Using game theory model, this paper discusses the investment on security and sharing of the security information of the supply chain firms. Particularly, we analyze the impact of supply chain’s integration, and inherent vulnerability of network on firms’ security strategies. The results show that if a firm increases the investment on security, the other firm tends to free-riding. In addition, compared with the joint decision-making of firms, they will have less security investment when making decisions separately. Hence, firms should better form an information-sharing alliance to coordinate their security decisions.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD 169.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. T. Bandyopadhyay, V. Jacob, S. Raghunathan, Information security in networked supply chains: impact of network vulnerability and supply chain integration on incentives to invest. Inf. Technol. Manag. 11(1), 7–23 (2010)

    Article  Google Scholar 

  2. R. Anderson, Why cryptosystems fail, in Proceedings of the 1st ACM Conference on Computer and Communications Security, New York, USA, pp. 215–227, 1993

    Google Scholar 

  3. R. Anderson, T. Moore, The economics of information security. Science 314(5799), 610–613 (2006)

    Article  Google Scholar 

  4. L. Gordon, M. Loeb, W. Lucyshyn, Sharing information on computer systems security: an economic analysis. J. Account. Public Policy 22(6), 461–485 (2003)

    Article  Google Scholar 

  5. M.H.R. Khouzani, V. Pham, C. Cid, Strategic discovery and sharing of vulnerabilities in competitive environments, in International Conference on Decision and Game Theory for Security. Springer International Publishing, pp. 59–78 (2014)

    Google Scholar 

  6. H. Varian, System reliability and free riding. Econ. Inf. Secur. 2(5799), 1–15 (2004)

    Google Scholar 

  7. L. Gordon, M. Loeb, The economics of information security investment. ACM Trans. Inf. Syst. Secur. 5(4), 438–457 (2002)

    Article  Google Scholar 

  8. W. Novshek, H. Sonnenschein, Fulfilled expectations in Cournot duopoly with information acquisition and release. Bell J. Econ. 13(1), 214–218 (1982)

    Article  Google Scholar 

  9. D. Fried, Incentives for information production and disclosure in a duopolistic environment. Q. J. Econ. 99(2), 367–381 (1984)

    Article  Google Scholar 

  10. E. Gal-Or, Information sharing in oligopoly. Econometrica 53(2), 329–343 (1985)

    Article  Google Scholar 

  11. E. Gal-Or, A. Ghose, The economic incentives for sharing security information. Inf. Syst. Res. 16(2), 186–208 (2005)

    Article  Google Scholar 

  12. D. Liu, Y. Ji, V. Mookerjee, Knowledge sharing and investment decisions in information security. Decis. Support Syst. 52, 95–107 (2011)

    Article  Google Scholar 

  13. H. Ogut, N. Menon, S. Raghunathan, Cyber insurance and IT security investment: impact of interdependent risk, in Proceedings of Weis’, 2005

    Google Scholar 

  14. H. Kunreuther, G. Heal, Interdependent security. J. Risk Uncertain. 26(2–3), 231–249 (2003)

    Article  Google Scholar 

  15. K. Hausken, Income, interdependence, and substitution effects affecting incentives for security investment. J. Account. Public Policy 25(6), 629–665 (2006)

    Article  Google Scholar 

  16. X. Gao, W. Zhong, S. Mei, Security investment and information sharing under an alternative security breach probability function. Inf. Syst. Front. 17(2), 423–438 (2013)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Jing Xie .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Zhang, Hy., Xie, J. (2019). Security Decisions in a Networked Supply Chain with Integration. In: Huang, G., Chien, CF., Dou, R. (eds) Proceeding of the 24th International Conference on Industrial Engineering and Engineering Management 2018. Springer, Singapore. https://doi.org/10.1007/978-981-13-3402-3_51

Download citation

Publish with us

Policies and ethics