Analyzing information security investment in networked supply chains
Title | Analyzing information security investment in networked supply chains |
Publication Type | Conference Paper |
Year of Publication | 2015 |
Authors | Jianqiang, Gu, Shue, Mei, Weijun, Zhong |
Conference Name | 2015 International Conference on Logistics, Informatics and Service Sciences (LISS) |
Keywords | Computer hacking, Economics, equilibrium levels, firms, game theory, game theory-based model, Games, infectious risks, Information security, information security investment, information security risk, interdependent risks, Investment, networked supply chains, noncooperative game condition, optimal strategy, optimisation, organisational aspects, pubcrawl170112, risk management, security attacks, security breaches, socially optimal solutions, supply chain management, Supply chains, trust risks, Trusted Computing |
Abstract | Security breaches and attacks are becoming a more critical and, simultaneously, a challenging problems for many firms in networked supply chains. A game theory-based model is developed to investigate how interdependent feature of information security risk influence the optimal strategy of firms to invest in information security. The equilibrium levels of information security investment under non-cooperative game condition are compared with socially optimal solutions. The results show that the infectious risks often induce firms to invest inefficiently whereas trust risks lead to overinvest in information security. We also find that firm's investment may not necessarily monotonous changes with infectious risks and trust risks in a centralized case. Furthermore, relative to the socially efficient level, firms facing infectious risks may invest excessively depending on whether trust risks is large enough. |
DOI | 10.1109/LISS.2015.7369701 |
Citation Key | jianqiang_analyzing_2015 |
- networked supply chains
- Trusted Computing
- trust risks
- supply chains
- supply chain management
- socially optimal solutions
- security breaches
- security attacks
- risk management
- pubcrawl170112
- organisational aspects
- optimisation
- optimal strategy
- noncooperative game condition
- Computer hacking
- Investment
- interdependent risks
- information security risk
- information security investment
- information security
- infectious risks
- Games
- game theory-based model
- game theory
- firms
- equilibrium levels
- Economics