Dash, Aishwarya ; Sarmah, S.P. ; Tiwari, M.K. ; Jena, Sarat Kumar ; Glock, Christoph H. (2024) Cybersecurity investments in supply chains with two-stage risk propagation Computers & Industrial Engineering, 197 . p. 110519. ISSN 0360-8352
Full text not available from this repository.
Official URL: https://doi.org/10.1016/j.cie.2024.110519
Related URL: http://dx.doi.org/10.1016/j.cie.2024.110519
Abstract
Cyber-attacks present a significant threat to supply chains as their nodes are directly or indirectly vulnerable to risk propagation at various stages. The risk level varies depending on the type of attack. A cybersecurity insurance offers a practical method to mitigate this risk, and it is crucial to determine optimal cybersecurity investments for all supply chain nodes. Previous studies have overlooked the joint impact of the attack type, two-stage risk propagation, and cybersecurity insurance in optimizing cybersecurity investments. This paper addresses this research gap by examining optimal investments under targeted and opportunistic attacks in a two-stage supply chain using game theory. The findings indicate that optimal investments differ based on the type of attack. For instance, retailers should invest more in cybersecurity under opportunistic attacks, while suppliers need to spend more under targeted attacks. Additionally, the results show that under opportunistic attacks, members should reduce their investments. Conversely, under targeted attacks, investments should initially increase and then stabilize. In the case of opportunistic attacks, suppliers and retailers should prioritize reconfiguring their systems over investing heavily in cybersecurity. The model presented in this paper demonstrates that not all cyber risks are worth defending against and that cybersecurity insurance for the entire supply chain can be more cost-effective than addressing cybersecurity risks individually. The paper also explores the impact of joint decisions on cybersecurity insurance when firms are unwilling to invest individually. The insights obtained enable supply chains to identify their optimal cybersecurity investment strategies effectively.
Item Type: | Article |
---|---|
Source: | Copyright of this article belongs to 2016 Elsevier Ltd. |
Keywords: | Supply Chain Management; Cyber-Attacks; Cybersecurity Investment; Cybersecurity Insurance; Indirect Risk Propagation; Direct And Indirect Attacks |
ID Code: | 139933 |
Deposited On: | 11 Sep 2025 12:39 |
Last Modified: | 11 Sep 2025 12:39 |
Repository Staff Only: item control page