首页> 外文会议>Americas conference on information systems >Information Security Investment Strategies in Supply Chain Firms: Interplay between Breach Propagation, Shared information Assets and Chain Topology
【24h】

Information Security Investment Strategies in Supply Chain Firms: Interplay between Breach Propagation, Shared information Assets and Chain Topology

机译:供应链公司的信息安全投资策略:违规传播,共享信息资产和链拓扑之间的相互作用

获取原文

摘要

Firms in a supply chain share information assets among them, and make use of inter-firm network connections to enable quick information sharing. Both of these approaches have significant implications when a security breach occurs. One, the interconnections may become conduits for security breach propagation. Two, shared information assets now become vulnerable at the owner as well as at the partner firms’ sites. Therefore, an effective security investment strategy in a supply chain must take into account vulnerability issues arising out of propagation of security breaches and sharing of information assets. Investments in perimeter security technologies reduce direct vulnerability of information assets, but are ineffective in countering indirect breaches, which originate from partnering firms. Our research investigates interdependent security investment strategies of supply chain firms in a game-theoretic framework, and analyze non-cooperative and centrally administered investment equilibria. We also provide comparative static of these investments under specific value chain topologies.
机译:在供应链中的公司在供应链中共享信息资产,并利用公司间网络连接以实现快速信息共享。当发生安全漏洞时,这两种方法都具有显着的影响。一个,互连可以成为安全突破传播的导管。二,共享信息资产现在在所有者以及合作伙伴公司的网站上变得脆弱。因此,供应链中有效的安全投资策略必须考虑出现在安全违约和信息资产分享中产生的漏洞问题。围栏安全技术的投资减少了信息资产的直接脆弱性,但在对抗间接违规行动的情况下是无效的,这起源于合作公司。我们的研究在游戏理论框架中调查了供应链公司的相互依存安全投资策略,并分析了非合作和集中的投资均衡。我们还在特定价值链拓扑下提供了这些投资的比较静态。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号