1,874
Views
29
CrossRef citations to date
0
Altmetric
Articles

A linear model for optimal cybersecurity investment in Industry 4.0 supply chains

ORCID Icon
Pages 1368-1385 | Received 26 Jul 2020, Accepted 12 Nov 2020, Published online: 08 Dec 2020

References

  • Blackhurst, J., A. Das, and D. Ivanov. 2020. “Supply Chain Resilience and Its Interplay with Digital Technologies: Making Innovations Work in Emergency Situations.” International Journal of Physical Distribution & Logistics Management. Call for papers (in press).
  • Deane, J. K., C. T. Ragsdale, T. R. Rakes, and L. P. Rees. 2009. “Managing Supply Chain Risk and Disruption From IT Security Incidents.” Operations Management Research 2 (1): 4–12. doi: 10.1007/s12063-009-0018-2
  • Dolgui, A., D. Ivanov, and B. Sokolov. 2020. “Reconfigurable Supply Chain: The X-Network.” International Journal of Production Research 58 (13): 4138–4163. doi: 10.1080/00207543.2020.1774679
  • Falco, G., M. Eling, D. Jablanski, M. Weber, V. Miller, L. A. Gordon, and S. S. Wang, et al. 2019. “Cyber Risk Research Impeded by Disciplinary Barriers.” Science 366 (6469): 1066–1069. doi: 10.1126/science.aaz4795
  • Fielder, A., E. Panaousis, P. Malacaria, C. Hankin, and F. Smeraldi. 2016. “Decision Support Approaches for Cyber Security Investment.” Decision Support Systems 86: 13–23. doi: 10.1016/j.dss.2016.02.012
  • Ghadge, A., M. E. Kara, H. Moradlou, and M. Goswami. 2020b. “The Impact of Industry 4.0 Implementation on Supply Chains.” Journal of Manufacturing Technology Management 31 (3): 669–686. doi:10.1108/JMTM-10-2019-0368.
  • Ghadge, A., M. Weis, N. D. Caldwell, and R. Wilding. 2020a. “Managing Cyber Risk in Supply Chains: A Review and Research Agenda.” Supply Chain Management 25 (2): 223–240. https://doi.org/10.1108/SCM-10-2018-0357
  • Gordon, L. A., and M. P. Loeb. 2002. “The Economics of Information Security Investment.” ACM Transactions on Information and System Security 5: 438–457. doi: 10.1145/581271.581274
  • Hausken, K. 2006. “Returns to Information Security Investment: The Effect of Alternative Information Security Breach Functions on Optimal Investment and Sensitivity to Vulnerability.” Information Systems Frontiers 8: 338–349. doi: 10.1007/s10796-006-9011-6
  • Identity Theft Resource Center. 2018. End-of-Year Data Breach Report 2018. https://www.idtheftcenter.org/2018-end-of-year-databreach-report/
  • Ivanov, D. 2020. “Viable Supply Chain Model: Integrating Agility, Resilience and Sustainability Perspectives – Lessons From and Thinking Beyond the COVID-19 Pandemic.” Annals of Operations Research. https://doi.org/10.1007/s10479-020-03640-6
  • Ivanov, D., and A. Dolgui. 2020. “Viability of Intertwined Supply Networks: Extending the Supply Chain Resilience Angles Towards Survivability. A Position Paper Motivated by COVID-19 Outbreak.” International Journal of Production Research 58 (10): 2904–2915. doi: 10.1080/00207543.2020.1750727
  • Ivanov, D., C. S. Tang, A. Dolgui, D. Battini, and A. Das. 2020. “Researchers' Perspectives on Industry 4.0: Multi-disciplinary Analysis and Opportunities for Operations Management.” International Journal of Production Research, in press. doi:10.1080/00207543.2020.1798035
  • Kott, A., and I. Linkov, eds. 2019. Cyber Resilience of Systems and Networks. Cham: Springer.
  • Lee, H., M. S. Kim, and K. K. Kim. 2014. “Interorganizational Information Systems Visibility and Supply Chain Performance.” International Journal of Information Management 34: 285–295. doi: 10.1016/j.ijinfomgt.2013.10.003
  • Li, Y., K. Chen, S. Collignon, and D. Ivanov.. 2020. “Ripple Effect in the Supply Chain Network: Forward and Backward Disruption Propagation, Network Health and Firm Vulnerability.” European Journal of Operational Research, in press. https://doi.org/10.1016/j.ejor.2020.09.053
  • Li, Y., and L. Xu. 2020. “Cybersecurity Investments in a Two-Echelon Supply Chain with Third-Party Risk Propagation.” International Journal of Production Research, in press. doi:10.1080/00207543.2020.1721591
  • Llanso, T., G. Tally, M. Silberglitt, and T. Anderson. 2013. “Mission-Based Analysis for Assessing Cyber Risk IX in Critical Infrastructure Systems.” In IFIP – Critical Infrastructure Protection, edited by J. Butts and S. Shenoi VII, 135–148; New York: Springer.
  • Luce, R. D., and H. Raiffa. 1957. Games and Decisions: Introduction and Critical Survey. New York: Wiley.
  • McNeil, M. W. 2019. “Matching Possible Mitigations to Cyber Threats: A Document-Driven Decision Support Systems Approach.” Masters thesis & Doctoral diss., Dakota State University. https://scholar.dsu.edu/theses/330
  • National Institute of Standards and Technology. 2012. Special Publication 800-30 R1: Guide for Conducting Risk Assessments. NIST.
  • Oztemel, E., and S. Gursev. 2020. “Literature Review of Industry 4.0 and Related Technologies.” Journal of Intelligent Manufacturing 31: 127–182. doi: 10.1007/s10845-018-1433-8
  • Rakes, T. R., J. K. Deane, and L. P. Rees. 2012. “IT Security Planning Under Uncertainty for High-Impact Events.” Omega 40 (1): 79–88. doi: 10.1016/j.omega.2011.03.008
  • Sawik, T. 2013. “Selection of Optimal Countermeasure Portfolio in IT Security Planning.” Decision Support Systems 55: 156–164. doi: 10.1016/j.dss.2013.01.001
  • Sawik, T. 2019. “Disruption Mitigation and Recovery in Supply Chains Using Portfolio Approach.” Omega 84 (4): 232–248. doi: 10.1016/j.omega.2018.05.006
  • Sawik, T. 2020a. Supply Chain Disruption Management: Using Stochastic Mixed Integer Programming. 2nd ed. Springer: New York.
  • Sawik, T. 2020b. “On the Risk-Averse Selection of Resilient Multi-tier Supply Portfolio.” Omega, in press. https://doi.org/10.1016/j.omega.2020.102267
  • Sawik, T. 2020c. “A Two-Period Model for Selection of Resilient Multi-tier Supply Portfolio.” International Journal of Production Research 58 (19): 6043–6060. doi: 10.1080/00207543.2019.1665204
  • Sawik, B. 2020d. “Selected Multiple Criteria Supply Chain Optimization Problems.” In Applications of Management Science, Vol. 20, edited by K. D. Lawrence and D. R. Pai, 31–58. Emerald: Bingley.
  • Schilling, A., and B. Werners. 2016. “Optimal Selection of IT Security Safeguards from an Existing Knowledge Base.” European Journal of Operational Research 248 (1): 318–327. doi: 10.1016/j.ejor.2015.06.048
  • Simon, J., and A. Omar. 2020. “Cybersecurity Investments in the Supply Chain: Coordination and a Strategic Attacker.” European Journal of Operational Research 282: 161–171. doi: 10.1016/j.ejor.2019.09.017
  • Verizon.2017. 2017. “Data Breach Investigations Report.” Verizon Business Journal 1: 1–48.
  • Viduto, V., C. Maple, W. Huang, and D. Lopez-Perez. 2012. “A Novel Risk Assessment and Optimisation Model for a Multi-objective Network Security Countermeasure Selection Problem.” Decision Support Systems 53 (3): 599–610. doi: 10.1016/j.dss.2012.04.001
  • Yevseyeva, I., V. Basto-Fernandes, M. Emmerich, and A. Van Moorsel. 2015. “Selecting Optimal Subset of Security Controls.” Procedia Computer Science 64: 1035–1042. doi: 10.1016/j.procs.2015.08.625

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.