References
- Adidas Inc. 2019. “Global Factory Lists.” https://www.adidas-group.com/en/sustainability/compliance/supply-chain-structure/
- Amin, S., G. A. Schwartz, and S. S. Sastry. 2013. “Security of Interdependent and Identical Networked Control Systems.” Automatica 49 (1): 186–192. doi: 10.1016/j.automatica.2012.09.007
- Anderson, R., and T. Moore. 2006. “The Economics of Information Security.” Science (New York, NY) 314 (5799): 610–613. doi: 10.1126/science.1130992
- Apple Inc. 2019. “13th Annual Supplier Responsibility Progress Report.” https://www.apple.com/supplier-responsibility/pdf/Apple-Supplier-List.pdf
- Bandyopadhyay, T., V. Jacob, and S. Raghunathan. 2010. “Information Security in Networked Supply Chains: Impact of Network Vulnerability and Supply Chain Integration on Incentives to Invest.” Information Technology and Management 11 (1): 7–23. doi: 10.1007/s10799-010-0066-1
- Behara, R. S., and S. Bhattacharya. 2007. “Process-Centric Risk Management Framework for Information Security.” In National Security, edited by H. Chen, T. S. Raghu, R. Ramesh and D. Zeng, 349–365. Amsterdam: Elsevier.
- Böhme, R., and G. Schwartz. 2010. “Modeling Cyber-Insurance: Towards a Unifying Framework.” 9th Workshop on the Economics of Information Security (WEIS). Cambridge: Harvard University.
- Cavusoglu, H., S. Raghunathan, and W. T. Yue. 2008. “Decision-Theoretic and Game-Theoretic Approaches to IT Security Investment.” Journal of Management Information Systems 25 (2): 281–304. doi: 10.2753/MIS0742-1222250211
- Cezar, A., H. Cavusoglu, and S. Raghunathan. 2017. “Sourcing Information Security Operations: The Role of Risk Interdependency and Competitive Externality in Outsourcing Decisions.” Production and Operations Management 26 (5): 860–879. doi: 10.1111/poms.12681
- Cremonini, M., and D. Nizovtsev. 2009. “Risks and Benefits of Signaling Information System Characteristics to Strategic Attackers.” Journal of Management Information Systems 26 (3): 241–274. doi: 10.2753/MIS0742-1222260308
- Dolgui, A., D. Ivanov, and M. Rozhkov. 2019. “Does the Ripple Effect Influence the Bullwhip Effect? An Integrated Analysis of Structural and Operational Dynamics in the Supply Chain.” International Journal of Production Research. doi:10.1080/00207543.2019.1627438
- Dolgui, A., D. Ivanov, and B. Sokolov. 2018. “Ripple Effect in the Supply Chain: An Analysis and Recent Literature.” International Journal of Production Research 56 (1–2): 414–430. doi: 10.1080/00207543.2017.1387680
- Dou, W., W. Tang, X. Wu, L. Qi, X. Xu, X. Zhang, and C. Hu. 2018. “An Insurance Theory Based Optimal Cyber-Insurance Contract Against Moral Hazard.” Information Sciences. doi:10.1016/j.ins.2018.12.051
- Elsinger, H., A. Lehar, and M. Summer. 2006. “Risk Assessment for Banking Systems.” Journal of Management Information Systems 52 (9): 1301–1314.
- Ezhei, M., and B. Tork Ladani. 2018. “Interdependency Analysis in Security Investment Against Strategic Attacks.” Information Systems Frontiers. doi:10.1007/s10796-018-9845-8
- Feng, N., M. Wang, M. Li, and D. Li. 2019. “Decision-Theoretic and Game-Theoretic Approaches to IT Security Investment.” Electronic Commerce Research and Applications 35: 100843. doi: 10.1016/j.elerap.2019.100843
- Fielder, A., E. Panaousis, P. Malacaria, C. Hankin, and F. Smeraldi. 2016. “Decision Support Approaches for Cyber Security Investment.” Decision Support Systems 86: 13–23. doi: 10.1016/j.dss.2016.02.012
- Gal-Or, E., and A. Ghose. 2005. “The Economic Incentives for Sharing Security Information.” Information Systems Research 16 (2): 186–208. doi: 10.1287/isre.1050.0053
- Gartner, Inc. 2018. “Gartner Forecasts Worldwide Information Security Spending to Exceed $124 Billion in 2019.” https://www.gartner.com/en/newsroom/press-releases/2018-08-15-gartner-forecasts-worldwide-information-security-spending-to-exceed-124-billion-in-20192018
- Glicksberg, I. L. 1956. “A Further Generalization of the Kakutani Fixed Point Theorem, with Application to Nash Equilibrium Points.” Proceedings of the American Mathematical Society, 170–174. New York: American Mathematical Society (AMS).
- Gordon, L. A., and M. P. Loeb. 2002. “The Economics of Information Security Investment.” ACM Transactions on Information and System Security (TISSEC) 5 (4): 438–457. doi: 10.1145/581271.581274
- Gordon, L. A., M. P. Loeb, W. Lucyshyn, and L. Zhou. 2015. “The Impact of Information Sharing on Cybersecurity Underinvestment: A Real Options Perspective.” Journal of Accounting and Public Policy34 (5): 509–519. doi: 10.1016/j.jaccpubpol.2015.05.001
- Gupta, V., and D. Ivanov. 2020. “Dual Sourcing Under Supply Disruption with Risk-Averse Suppliers in the Sharing Economy.” International Journal of Production Research 58 (1): 291–307. doi: 10.1080/00207543.2019.1686189
- Hasheminasab, S. A., and B. T. Ladani. 2018. “Security Investment in Contagious Networks.” Risk Analysis 38 (6): 1559–1575. doi: 10.1111/risa.12966
- Hausken, K. 2006. “Returns to Information Security Investment: The Effect of Alternative Information Security Breach Functions on Optimal Investment and Sensitivity to Vulnerability.” Information Systems Frontiers 8 (5): 338–349. doi: 10.1007/s10796-006-9011-6
- He, J., F. Alavifard, D. Ivanov, and H. Jahani. 2019. “A Real-Option Approach to Mitigate Disruption Risk in the Supply Chain.” Omega 88: 133–149. doi: 10.1016/j.omega.2018.08.008
- He, M., L. Devine, and J. Zhuang. 2018. “Perspectives on Cybersecurity Information Sharing Among Multiple Stakeholders Using a Decision-Theoretic Approach.” Risk Analysis 38 (2): 215–225. doi: 10.1111/risa.12878
- Hosseini, S., D. Ivanov, and A. Dolgui. 2019a. “Review of Quantitative Methods for Supply Chain Resilience Analysis.” Transportation Research Part E: Logistics and Transportation Review 125: 285–307. doi: 10.1016/j.tre.2019.03.001
- Hosseini, S., D. Ivanov, and A. Dolgui. 2019b. “Ripple Effect Modelling of Supplier Disruption: Integrated Markov Chain and Dynamic Bayesian Network Approach.” International Journal of Production Research. doi:10.1080/00207543.2019.1661538
- Huang, C. D., Q. Hu, and R. S. Behara. 2008. “An Economic Analysis of the Optimal Information Security Investment in the Case of a Risk-Averse Firm.” International Journal of Production Economics114 (2): 793–804. doi: 10.1016/j.ijpe.2008.04.002
- Hui, K. L., W. Hui, and W. T. Yue. 2012. “Information Security Outsourcing with System Interdependency and Mandatory Security Requirement.” Journal of Management Information Systems29 (3): 117–156. doi: 10.2753/MIS0742-1222290304
- ITRC (Identity Theft Resource Center). 2018. “End-of-Year Data Breach Report.” https://www.idtheftcenter.org/2018-end-of-year-data-breach-report/
- Ivanov, D. 2018. “Revealing Interfaces of Supply Chain Resilience and Sustainability: A Simulation Study.” International Journal of Production Research 56 (10): 3507–3523. doi: 10.1080/00207543.2017.1343507
- Ivanov, D., and A. Dolgui. 2019. “Low-Certainty-Need (LCN) Supply Chains: A New Perspective in Managing Disruption Risks and Resilience.” International Journal of Production Research 57 (15–16): 5119–5136. doi: 10.1080/00207543.2018.1521025
- Ivanov, D., A. Dolgui, and B. Sokolov. 2019. “The Impact of Digital Technology and Industry 4.0 on the Ripple Effect and Supply Chain Risk Analytics.” International Journal of Production Research 57 (3): 829–846. doi: 10.1080/00207543.2018.1488086
- Ivanov, D., B. Sokolov, and A. Dolgui. 2014. “The Ripple Effect in Supply Chains: Trade-Off ‘Efficiency-Flexibility-Resilience’ in Disruption Management.” International Journal of Production Research 52 (7): 2154–2172. doi: 10.1080/00207543.2013.858836
- Jonathan, B. 2019. “Amazon Hit by Extensive Fraud With Hackers Siphoning Merchant Funds.” https://www.bloomberg.com/news/articles/2019-05-08/amazon-hit-by-extensive-fraud-as-hackers-siphoned-merchant-funds
- Kaspersky Lab. 2018. “IT Security: Cost Center or Strategic Investment?” https://go.kaspersky.com/rs/802-IJN-240/images/IT%20Security%20Econmics%20Report%209.18.17.pdf?aliId=488652022
- Kinra, A., D. Ivanov, A. Das, and A. Dolgui. 2019. “Ripple Effect Quantification by Supplier Risk Exposure Assessment.” International Journal of Production Research. doi:10.1080/00207543.2019.1675919
- Kunreuther, H., and G. Heal. 2003. “Interdependent Security.” Journal of Risk and Uncertainty 26 (2–3): 231–249. doi: 10.1023/A:1024119208153
- Laszka, A., M. Felegyhazi, and L. Buttyan. 2015. “A Survey of Interdependent Information Security Games.” ACM Computing Surveys (CSUR) 47 (2): 23.
- Lee, C. H., X. Geng, and S. Raghunathan. 2013. “Contracting Information Security in the Presence of Double Moral Hazard.” Information Systems Research 24 (2): 295–311. doi: 10.1287/isre.1120.0447
- Liu, X., X. Qian, J. Pei, and P. M. Pardalos. 2018. “Security Investment and Information Sharing in the Market of Complementary Firms: Impact of Complementarity Degree and Industry Size.” Journal of Global Optimization 70 (2): 413–436. doi: 10.1007/s10898-017-0585-y
- Nagurney, A., P. Daniele, and S. Shukla. 2017. “A Supply Chain Network Game Theory Model of Cybersecurity Investments with Nonlinear Budget Constraints.” Annals of Operations Research 248 (1–2): 405–427. doi: 10.1007/s10479-016-2209-1
- Nagurney, A., and S. Shukla. 2017. “Multifirm Models of Cybersecurity Investment Competition vs. Cooperation and Network Vulnerability.” European Journal of Operational Research 260 (2): 588–600. doi: 10.1016/j.ejor.2016.12.034
- Ogut, H., N. Menon, and S. Raghunathan. 2005. “Cyber Insurance and IT Security Investment: Impact of Interdependence Risk.” Proceedings of the 4th Workshop on the Economics of Information Security (WEIS'05), 296–300. Richardson: Elsevier.
- Pavlov, A., D. Ivanov, F. Werner, A. Dolgui, and B. Sokolov. 2019. “Integrated Detection of Disruption Scenarios, the Ripple Effect Dispersal and Recovery Paths in Supply Chains.” Annals of Operations Research. doi:10.1080/00207543.2019.1661538
- Ponemon, I. 2018a. “Cost of a Data Breach Study: Benchmark Research.” https://securityintelligence.com/ponemon-cost-of-a-data-breach-2018/
- Ponemon, I. 2018b. “Data Risk in the Third-Party Ecosystem.” https://securityintelligence.com/ponemon-cost-of-a-data-breach-2018/
- PwC. 2013. “The Global State of Information Security Survey 2013.” https://www.pwc.com/gx/en/consulting-services/information-security-survey/assets/2013-giss-report.pdf
- Qian, X., X. Liu, J. Pei, and P. M. Pardalos. 2017. “A New Game of Information Sharing and Security Investment Between Two Allied Firms.” International Journal of Production Research 56 (12): 4069–4086. doi: 10.1080/00207543.2017.1400704
- Schechter, S. E. 2005. “Toward Econometric Models of the Security Risk from Remote Attacks.” IEEE Security & Privacy 3 (1): 40–44. doi: 10.1109/MSP.2005.30
- Scott, M. 2018. “China's Topsports Rises 8% in Hong Kong Debut After $1 Billion IPO.” https://www.reuters.com/article/us-topsports-listing/chinas-topsports-rises-8-in-hong-kong-debut-after-1-billion-ipo-idUSKBN1WP07X
- Shetty, N., G. Schwartz, M. Felegyhazi, and J. Walrand. 2010. “Competitive Cyber-Insurance and Internet Security.” In Economics of Information Security and Privacy, edited by T. Moore, D. Pym and C. Ioannidis, 229–247. Boston, MA: Springer.
- Simonsen, I., L. Buzna, K. Peters, S. Bornholdt, and D Helbing. 2008. “Transient Dynamics Increasing Network Vulnerability to Cascading Failures.” Physical Review Letters 100 (21): 218701. doi: 10.1103/PhysRevLett.100.218701
- Tony, D. 2018. “Sees Record Number of Online Retail Data Breaches.” AT&T Cybersecurity. https://www.alienvault.com/blogs/security-essentials/2018-sees-record-number-of-online-retail-data-breaches
- U.S. White House. 2018. “National Cyber Strategy of the United States of America.” https://www.whitehouse.gov/wp-content/uploads/2018/09/National-Cyber-Strategy.pdf
- Varian, H. 2004. “System Reliability and Free Riding.” In Economics of Information Security, 1–15. Boston, MA: Springer.
- Wang, L., S. Noel, and S. Jajodia. 2006. “Minimum-Cost Network Hardening Using Attack Graphs.” Computer Communications 29 (18): 3812–3824. doi: 10.1016/j.comcom.2006.06.018
- Wu, Y., G. Feng, N. Wang, and H. Liang. 2015. “Game of Information Security Investment: Impact of Attack Types and Network Vulnerability.” Expert Systems with Applications 42 (15–16): 6132–6146. doi: 10.1016/j.eswa.2015.03.033
- Xu, Z., and J. Zhuang. 2019. “A Study on a Sequential One-Defender-N-Attacker Game.” Risk Analysis. doi:10.1111/risa.13257
- Zhao, X., L. Xue, and A. B. Whinston. 2013. “Managing Interdependent Information Security Risks: Cyberinsurance, Managed Security Services, and Risk Pooling Arrangements.” Journal of Management Information Systems 30 (1): 123–152. doi: 10.2753/MIS0742-1222300104