A Supply Chain Game Theory Framework for Cybersecurity Investments Under Network Vulnerability

نویسندگان

  • Anna Nagurney
  • Shivani Shukla
چکیده

In this paper, we develop a supply chain game theory framework consisting of retailers and consumers who engage in electronic transactions via the Internet and, hence, may be susceptible to cyberattacks. The retailers compete noncooperatively in order to maximize their expected profits by determining their optimal product transactions as well as cybersecurity investments in the presence of network vulnerability. The consumers reveal their preferences via the demand price functions, which depend on the product demands and on the average level of security in the supply chain network. We prove that the governing Nash equilibrium conditions of this model can be formulated as a variational inequality problem, provide qualitative properties of the equilibrium product transaction and security investment pattern, and propose an algorithm with nice features for implementation. The algorithm is then applied to two sets of numerical examples that reveal the impacts on the equilibrium product transactions, the security levels, the product prices, the expected profits, and the retailer vulnerability as well as the supply chain network vulnerability, of such issues as: increased competition, changes in the demand price functions, and changes in the security investment cost functions.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A supply chain network game theory model of cybersecurity investments with nonlinear budget constraints

Abstract: In this paper, we develop a supply chain network game theory model consisting of retailers and demand markets with retailers competing noncooperatively in order to maximize their expected profits by determining their optimal product transactions as well as cybersecurity investments subject to nonlinear budget constraints that include the cybersecurity investment cost functions. The co...

متن کامل

Distribution Design of Two Rival Decenteralized Supply Chains: a Two-person Nonzero Sum Game Theory Approach

We consider competition between two decentralized supply chains network under demand uncertainty. Each chain consists of one risk-averse manufacturer and a group of risk-averse retailers. These two chains present substitutable products to the geographical dispensed markets. The markets’ demands are contingent upon prices, service levels, and advertising efforts of two supply chains. We formulat...

متن کامل

Information Security Investment Strategies in Supply Chain Firms: Interplay Between Breach Propagation, Shared Information Assets and Chain Topology

Firms in a supply chain share information assets among them, and make use of inter-firm network connections to enable quick information sharing. Both of these approaches have significant implications when a security breach occurs. One, the interconnections may become conduits for security breach propagation. Two, shared information assets now become vulnerable at the owner as well as at the par...

متن کامل

Impact of Service on Customers’ Demand and Members’ Profit in Supply Chain

This paper investigates the impact of provided service by the retailers and manufacturers on customers’ demand and members’ profit in a supply chain. It focuses on a supply chain structure with one manufacturer and a common retailer. The demand of customers depends on retailer price and service level. A game-theoretic framework is applied to obtain the equilibrium solutions for each entity in s...

متن کامل

Investments with Nonlinear Budget Constraints : Analysis of the Marginal Expected

In this paper, we consider a recently introduced cybersecurity investment supply chain game theory model consisting of retailers and consumers at demand markets with the retailers being faced with nonlinear budget constraints on their cybersecurity investments. We construct a novel reformulation of the derived variational inequality formulation of the governing Nash equilibrium conditions. The ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2015