592
Views
3
CrossRef citations to date
0
Altmetric
Articles

As strong as the weakest link. Transport and supply chain security

&
Pages 762-783 | Received 31 Jul 2020, Accepted 16 Mar 2022, Published online: 29 Mar 2022

References

  • Arce, D. G., Kovenock, D., & Roberson, B. (2012). Weakest-link attacker-defender games with multiple attack technologies. Naval Research Logistics (NRL), 59(6), 457–469. doi:10.1002/nav.21500
  • Arce, M. D. G., & Sandler, T. (2001). Transnational public goods: Strategies and institutions. European Journal of Political Economy, 17(3), 493–516. doi:10.1016/S0176-2680(01)00042-8
  • Arksey, H., & O’Malley, L. (2005). Scoping studies: Towards a methodological framework. International Journal of Social Research Methodology: Theory and Practice, 8(1), 19–32. doi:10.1080/1364557032000119616
  • Bakır, N. O. (2011). A stackelberg game model for resource allocation in cargo container security. Annals of Operations Research, 187(1), 5–22. doi:10.1007/s10479-010-0793-z
  • Bakshi, N., & Kleindorfer, P. (2009). Co-Opetition and investment for resilience in global supply chains. Production and Operations Management, 18(6), 583–603. doi:10.1111/j.1937-5956.2009.01031.x
  • Barbieri, S., & Malueg, D. A. (2014). On the voluntary provision of public goods with private information: The case of “weakest-link” public goods. SSRN Electronic Journal. doi:10.2139/ssrn.2426415
  • Barbieri, S., & Malueg, D. A. (2019). On the voluntary provision of “weakest-link” public goods: The case of private information. Journal of Public Economic Theory, 21(5), 866–894. doi:10.1111/jpet.12344
  • Bevilacqua, M., Ciarapica, F. E., Marcucci, G., & Mazzuto, G. (2018). Conceptual model for asnalysing domino effect among concepts affecting supply chain resilience. Supply Chain Forum, 19(4), 282–299. doi:10.1080/16258312.2018.1537504
  • Bier, V. (2005). Game-Theoretic And Reliability Methods In Counter-Terrorism And Security (pp. 17–28). doi:10.1142/9789812703378_0002
  • Bier, V. (2006). Game-Theoretic and Reliability Methods in Counterterrorism and Security. In: Wilson A.G., Wilson G.D., Olwell D.H. (eds) Statistical Methods in Counterterrorism (pp. 23–40). New York, NY: Springer. doi:10.1007/0-387-35209-0_3
  • Bier, V. M., Nagaraj, A., & Abhichandani, V. (2005). Protection of simple series and parallel systems with components of different values. Reliability Engineering and System Safety, 87(3), 315–323. doi:10.1016/j.ress.2004.06.003
  • Brück, T. (2004). Assessing the economic trade-offs of the security economy. In The security economy, Vol. 9789264107748 (pp. 101–125). Paris: OECD.
  • Brück, T. (2005). An Economic analysis Of security policies. Defence and Peace Economics, 16(5), 375–389. doi:10.1080/10242690500210864
  • Button, K.. (2016). The Economics and Political Economy of Transportation Security. Cheltenham, UK ; Northampton, MA, USA : Edward Elgar Publishing.
  • Button, K., & Thibault, M. (2005). The political economy of maritime container security. 46th Annual Transportation Research Forum 2005, 2.
  • Cats, O., Yap, M., & van Oort, N. (2016). Exposing the role of exposure: Public transport network risk analysis. Transportation Research Part A: Policy and Practice, 88, 1–14. doi:10.1016/j.tra.2016.03.015
  • Closs, D. (2004). Enhancing security throughout the supply chain. Special Report to the IBM Center For, April.
  • Conybeare, J. A. C., Murdoch, J. C., & Sandler, T. (1994). Alternative collective-goods models Of military alliances: Theory And empirics. Economic Inquiry, 32(4), 525–542. doi:10.1111/j.1465-7295.1994.tb01349.x
  • Cornes, R. (1993). Dyke maintenance and other stories: Some neglected types of public goods. The Quarterly Journal of Economics, 108(1), 259–271. doi:10.2307/2118503
  • Dulbecco, P., & Laporte, B. (2005). How can the security of international trade be financed in developing countries? A global public good approach. World Development, 33(8), 1201–1214. doi:10.1016/j.worlddev.2005.02.002
  • Ekwall, D. (2009). The displacement effect in cargo theft. International Journal of Physical Distribution and Logistics Management, 39(1), 47–62. doi:10.1108/09600030910929183
  • Ekwall, D. (2012). Antagonistic threats against supply chain activities are wicked problems. Journal of Transportation Security, 5, 123–140. doi:10.1007/s12198-012-0086-7
  • Fauchart, E., & Cowan, R. (2014). Weak links and the management of reputational interdependencies. Strategic Management Journal, 35(4), 532–549. doi:10.1002/smj.2122
  • Felson, M., Clarke, R. V., & Webb, B. (1998). Opportunity Makes the Thief: Practical theory for crime prevention. In Policing and Reducing Crime Unit: Police Research Series.
  • Fischer, R. J., Halibozek, E. P., & Walters, D. C. (2019). Origins and Development of 21st Century Security. In Introduction to Security. doi:10.1016/b978-0-12-805310-2.00001-9
  • Golany, B., Kaplan, E. H., Marmur, A., & Rothblum, U. G. (2009). Nature plays with dice - terrorists do not: Allocating resources to counter strategic versus probabilistic risks. European Journal of Operational Research, 192(1), 198–208. doi:10.1016/j.ejor.2007.09.001
  • Grainger, A. (2007). Supply chain security: Adding to a complex operational and institutional environment. World Customs Journal, 1(2), 17–30.
  • Gregor, M. (2011). Tradeoffs of foreign assistance for the weakest-link global public goods. International Tax and Public Finance, 18(2), 233–251. doi:10.1007/s10797-010-9153-9
  • Harrison, G. W., & Hirshleifer, J. (1989). An experimental evaluation of weakest link/best shot models of public goods. Journal of Political Economy, 97, 201–225. doi:10.2307/1831060
  • Hausken, K. (2006). Income, interdependence, and substitution effects affecting incentives for security investment. Journal of Accounting and Public Policy, 25(6), 629–665. doi:10.1016/j.jaccpubpol.2006.09.001
  • Hausken, K. (2011). Protecting complex infrastructures against multiple strategic attackers. International Journal of Systems Science, 42(1), 11–29. doi:10.1080/00207720903434789
  • Heal, G., & Kunreuther, H. (2003). You Only Die Once: Managing Discrete Interdependent Risks. doi:10.3386/w9885
  • Heal, G., & Kunreuther, H. (2005). IDS models of airline security. Journal of Conflict Resolution, 49(2), 201–217. doi:10.1177/0022002704272833
  • Hirshleifer, J. (1983). From weakest-link to best-shot: The voluntary provision of public goods. Public Choice, 41(3), 371–386. doi:10.1007/BF00141070
  • Hirshleifer, J., Glazer, A., & Hirshleifer, D. (2005). Price Theory and Applications. In Price Theory and Applications. doi:10.1017/cbo9780511813382
  • Ihori, T., & McGuire, M. C. (2007). Collective risk control and group security: The unexpected consequences of differential risk aversion. Journal of Public Economic Theory, 9(2), 231–263. doi:10.1111/j.1467-9779.2007.00306.x
  • Ivanov, D., & Sokolov, B. (2010). Adaptive supply chain management. In Adaptive Supply Chain Management. doi:10.1007/978-1-84882-952-7
  • Jain, S. C., & Grosse, R. (2009). Impact of terrorism and security measures on global business transactions: Some international business guidelines. Journal of Transnational Management, 14(1), 42–73. doi:10.1080/15475770802698540
  • Jażdżewska-Gutta, M. (2016). Who is responsible? The roles of the supply chain participants in the area of supply chain security. Proceedings of IAC-MEM 2016 in Bratislava, 73–86.
  • Johnson, B., Grossklags, J., Christin, N., & Chuang, J. (2010). Are security experts useful? Bayesian Nash equilibria for network security games with limited information. Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 6345 LNCS, 588–606. doi:10.1007/978-3-642-15497-3_36
  • Jonkeren, O., & Rietveld, P. (2016). Protection of critical waterborne transport infrastructures: An economic review. Transport Reviews, 36(4), 437–453. doi:10.1080/01441647.2015.1137654
  • Jüttner, U. (2005). Supply chain risk management: Understanding the business requirements from a practitioner perspective. The International Journal of Logistics Management, 16(1), 120–141. doi:10.1108/09574090510617385
  • Kanafani, A., & Huang, J. (2010). Securing linked transportation systems: Economic implications and investment strategies. Journal of Transportation Security, 3(4), 257–274. doi:10.1007/s12198-010-0051-2
  • Kaul, I., Grunberg, I., Stern, M., Kaul, I., Grunberg, I., & Stern, M. A. (1999). Defining Global Public Goods. In Global Public Goods (pp. 2–19). doi:10.1093/0195130529.003.0001
  • Kearns, M., & Ortiz, L. E. (2004). Algorithms for interdependent security games. In S. Thrun, L. Saul, & B. Schölkopf (Eds.), Advances in neural information processing systems, vol. 16 (pp. 561–568). Cambridge: MIT Press.
  • Kunreuther, H., & Heal, G. (2002). Interdependent Security: The Case of Identical Agents. Working Paper 8871, National Bureau of Economic Research, Cambridge.
  • Kunreuther, H., & Heal, G. (2003). Interdependent security. Journal of Risk and Uncertainty, 26(2–3), 231–249. doi:10.1023/A:1024119208153
  • Kunreuther, H. C., & Michel-Kerjan, E. O. (2007). Assessing, Managing and Benefiting from Global Interdependent Risks The Case of Terrorism and Natural Disasters. http://opim.wharton.upenn.edu/risk/
  • Kuper, G., Massacci, F., Shim, W., & Williams, J. (2020). Who should Pay for interdependent risk? Policy implications for security interdependence Among airports. Risk Analysis, 40(5), 1001–1019. doi:10.1111/risa.13454
  • Levac, D., Colquhoun, H., & O’Brien, K. K. (2010). Scoping studies: Advancing the methodology. Implementation Science, 5(69). doi:10.1186/1748-5908-5-69
  • Lorenc, A., Kuźnar, M., Lerher, T., & Szkoda, M. (2020). Predicting the probability of cargo theft for individual cases in railway transport. Tehnicki Vjesnik, 27(3), 773–780. doi:10.17559/TV-20190320194915
  • Munn, Z., Peters, M. D. J., Stern, C., Tufanaru, C., McArthur, A., & Aromataris, E. (2018). Systematic review or scoping review? Guidance for authors when choosing between a systematic or scoping review approach. BMC Medical Research Methodology, 18(143). doi:10.1186/s12874-018-0611-x
  • Naghizadeh, P., & Liu, M. (2014). Budget balance or voluntary participation? Incentivizing investments in interdependent security games. 2014 52nd Annual Allerton Conference on Communication, Control, and Computing, Allerton 2014, 1102–1109. doi:10.1109/ALLERTON.2014.7028578
  • Ohmori, S., & Yoshimoto, K. (2013). A framework of managing supply chain disruption risks using network reliability. Industrial Engineering and Management Systems, 12(2), 103–111. doi:10.7232/iems.2013.12.2.103
  • Pan, C., Zhong, W., & Mei, S. (2015). Finding the weakest link in the interdependent security chain using the analytic hierarchy process. Journal of Advances in Computer Networks, 3(4), 320–325. doi:10.18178/JACN.2015.3.4.190
  • Park, K., Min, H., & Min, S. (2016). Inter-relationship among risk taking propensity, supply chain security practices, and supply chain disruption occurrence. Journal of Purchasing and Supply Management, 22(2), 120–130. doi:10.1016/j.pursup.2015.12.001
  • Perea, F., & Puerto, J. (2013). Revisiting a game theoretic framework for the robust railway network design against intentional attacks. European Journal of Operational Research, 226(2), 286–292. doi:10.1016/j.ejor.2012.11.015
  • Peters, M. D. J., Godfrey, C. M., Khalil, H., McInerney, P., Parker, D., & Soares, C. B. (2015). Guidance for conducting systematic scoping reviews. International Journal of Evidence-Based Healthcare, 13(3), 141–146. doi:10.1097/XEB.0000000000000050
  • Prokop, D. (2012). Smart containers and the public goods approach to supply chain security. International Journal of Shipping and Transport Logistics, 4(2), 124–136. doi:10.1504/IJSTL.2012.046191
  • Sandler, T. (2006a). Regional public goods and international organizations. Review of International Organizations, 1(1), 5–25. doi:10.1007/s11558-006-6604-2
  • Sandler, T. (2006b). Hirshleifer’s social composition function In defense economics. Defence and Peace Economics, 17(6), 645–655. doi:10.1080/10242690601025583
  • Sandler, T., & Vicary, S. (2001). Weakest-link public goods: Giving in-kind or transferring money in a sequential game. Economics Letters, 74(1), 71–75. doi:10.1016/S0165-1765(01)00515-8
  • Shan, X., & Zhuang, J. (2018). Modeling cumulative defensive resource allocation against a strategic attacker in a multi-period multi-target sequential game. Reliability Engineering and System Safety, 179, 12–26. doi:10.1016/j.ress.2017.03.022
  • Shavell, S. (1991). Individual precautions to prevent theft: Private versus socially optimal behavior. International Review of Law and Economics, 11(2), 123–132. doi:10.1016/0144-8188(91)90014-5
  • Siqueira, K., & Sandler, T. (2001). Models of alliances: Internalizing externalities and financing. Defence and Peace Economics, 12(3), 249–270. doi:10.1080/10430710108404987
  • Urciuoli, L., Männistö, T., Hintsa, J., & Khan, T. (2013a). Supply chain cyber security – potential threats. Information & Security: An International Journal, 29(1), 51–68. doi:10.11610/isij.2904
  • Urciuoli, L., Paulraj, A., & Näslund, D. (2013b). The role of the law enforcement agencies in transport security, a survey with Swedish operators. Logistics Research, 6(4), 145–157. doi:10.1007/s12159-013-0102-8
  • Varian, H. (2003). System reliability And free riding. ACM press. In L. J. Camp, & S. Lewis (Eds.), Economics of information security. Advances in Information Security, vol 12 (pp. 1–15). Boston: Springer. doi:10.1007/1-4020-8090-5_1
  • Vicary, S. (1990). Transfers and the weakest-link: An extension of Hirshleifer’s analysis. Journal of Public Economics, 43(3), 375–394. doi:10.1016/0047-2727(90)90007-5
  • Vicary, S., & Sandler, T. (2002). Weakest-link public goods: Giving in-kind or transferring money. European Economic Review, 46(8), 1501–1520. doi:10.1016/S0014-2921(01)00103-9
  • Wee, B. V., & Banister, D. (2016). How to write a literature review paper? Transport Reviews, 36(2), 278–288. doi:10.1080/01441647.2015.1065456
  • Woo, G. (2002). Quantitative terrorism risk assessment. Journal of Risk Finance, 4(1), 7–14. doi:10.1108/eb022949
  • Zhang, D., Dadkhah, P., & Ekwall, D. (2011). How robustness and resilience support security business against antagonistic threats in transport network. Journal of Transportation Security, 4, 201–219. doi:10.1007/s12198-011-0067-2
  • Zhuang, J. (2010). Impacts of subsidized security on stability and total social costs of equilibrium solutions in an N-player game with errors. Engineering Economist, 55(2), 131–149. doi:10.1080/00137911003775107
  • Zhuang, J., Bier, V. M., & Gupta, A. (2007). Subsidies in interdependent security with heterogeneous discount rates. Engineering Economist, 52(1), 1–19. doi:10.1080/00137910601159722
  • Zimmerman, P. R. (2014). The deterrence of crime through private security efforts: Theory and evidence. International Review of Law and Economics, 37, 66–75. doi:10.1016/j.irle.2013.06.003

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.