Who cares? Supply chain managers' perceptions regarding cyber supply chain risk management in the digital transformation era
A Creazza, C Colicchia, S Spiezia… - … Chain Management: An …, 2022 - emerald.com
Purpose The purpose of this paper is to explore the perceptions of supply chain managers
regarding the elements that make up cyber supply chain risk management (CSCRM) and …
regarding the elements that make up cyber supply chain risk management (CSCRM) and …
Systematically understanding cybersecurity economics: A survey
Insights in the field of cybersecurity economics empower decision makers to make informed
decisions that improve their evaluation and management of situations that may lead to …
decisions that improve their evaluation and management of situations that may lead to …
An information security performance measurement tool for senior managers: Balanced scorecard integration for security governance and control frameworks
TC Herath, HSB Herath, D Cullum - Information Systems Frontiers, 2023 - Springer
As organizations have become increasingly reliant on information systems, senior managers
are keen in assessing the progress of implemented information security strategies. Although …
are keen in assessing the progress of implemented information security strategies. Although …
Cybersecurity investments in a two-echelon supply chain with third-party risk propagation
Y Li, L Xu - International Journal of Production Research, 2021 - Taylor & Francis
Cybersecurity presents a monumental challenge for interconnected supply chains, as an
attack on one node can compromise an entire business. In this paper, we propose a game …
attack on one node can compromise an entire business. In this paper, we propose a game …
Decision making of optimal investment in information security for complementary enterprises based on game theory
X Li - Technology Analysis & Strategic Management, 2021 - Taylor & Francis
With the development of information technology and the deepening of enterprise
informatization, there are new challenges of enterprise information security investment …
informatization, there are new challenges of enterprise information security investment …
An evolutionary game‐theoretic analysis of enterprise information security investment based on information sharing platform
X Li - Managerial and Decision Economics, 2022 - Wiley Online Library
The threat to enterprise information security is growing through advancing in information and
communications technology; in order to enhance the efficiency of information security …
communications technology; in order to enhance the efficiency of information security …
Reconciliation of privacy with preventive cybersecurity: The bright internet approach
The emergence of a preventive cybersecurity paradigm that aims to eliminate the sources of
cybercrime threats is becoming an increasingly necessary complement to the current self …
cybercrime threats is becoming an increasingly necessary complement to the current self …
An economic analysis of information security investment decision making for substitutable enterprises
X Li, Q Xue - Managerial and Decision Economics, 2021 - Wiley Online Library
As the competition among enterprises is increasingly fierce, the substitution of information
assets makes the behavior of hackers and enterprises more complicated in the information …
assets makes the behavior of hackers and enterprises more complicated in the information …
Embracing and controlling risk dependency in cyber-insurance policy underwriting
This article highlights how cyber risk dependencies can be taken into consideration when
underwriting cyber-insurance policies. This is done within the context of a base rate …
underwriting cyber-insurance policies. This is done within the context of a base rate …
Managing cloud security in the presence of strategic hacker and joint responsibility
Y Wu, Z Kang, T Dai, D Cheng - Journal of the Operational …, 2024 - Taylor & Francis
The widespread use of cloud computing has brought cloud security to the forefront. The
cloud provider and the firm assume varying degrees of joint responsibility for cloud security …
cloud provider and the firm assume varying degrees of joint responsibility for cloud security …