Who cares? Supply chain managers' perceptions regarding cyber supply chain risk management in the digital transformation era

A Creazza, C Colicchia, S Spiezia… - … Chain Management: An …, 2022 - emerald.com
Purpose The purpose of this paper is to explore the perceptions of supply chain managers
regarding the elements that make up cyber supply chain risk management (CSCRM) and …

Systematically understanding cybersecurity economics: A survey

M Kianpour, SJ Kowalski, H Øverby - Sustainability, 2021 - mdpi.com
Insights in the field of cybersecurity economics empower decision makers to make informed
decisions that improve their evaluation and management of situations that may lead to …

An information security performance measurement tool for senior managers: Balanced scorecard integration for security governance and control frameworks

TC Herath, HSB Herath, D Cullum - Information Systems Frontiers, 2023 - Springer
As organizations have become increasingly reliant on information systems, senior managers
are keen in assessing the progress of implemented information security strategies. Although …

Cybersecurity investments in a two-echelon supply chain with third-party risk propagation

Y Li, L Xu - International Journal of Production Research, 2021 - Taylor & Francis
Cybersecurity presents a monumental challenge for interconnected supply chains, as an
attack on one node can compromise an entire business. In this paper, we propose a game …

Decision making of optimal investment in information security for complementary enterprises based on game theory

X Li - Technology Analysis & Strategic Management, 2021 - Taylor & Francis
With the development of information technology and the deepening of enterprise
informatization, there are new challenges of enterprise information security investment …

An evolutionary game‐theoretic analysis of enterprise information security investment based on information sharing platform

X Li - Managerial and Decision Economics, 2022 - Wiley Online Library
The threat to enterprise information security is growing through advancing in information and
communications technology; in order to enhance the efficiency of information security …

Reconciliation of privacy with preventive cybersecurity: The bright internet approach

JK Lee, Y Chang, HY Kwon, B Kim - Information Systems Frontiers, 2020 - Springer
The emergence of a preventive cybersecurity paradigm that aims to eliminate the sources of
cybercrime threats is becoming an increasingly necessary complement to the current self …

An economic analysis of information security investment decision making for substitutable enterprises

X Li, Q Xue - Managerial and Decision Economics, 2021 - Wiley Online Library
As the competition among enterprises is increasingly fierce, the substitution of information
assets makes the behavior of hackers and enterprises more complicated in the information …

Embracing and controlling risk dependency in cyber-insurance policy underwriting

MM Khalili, M Liu, S Romanosky - Journal of Cybersecurity, 2019 - academic.oup.com
This article highlights how cyber risk dependencies can be taken into consideration when
underwriting cyber-insurance policies. This is done within the context of a base rate …

Managing cloud security in the presence of strategic hacker and joint responsibility

Y Wu, Z Kang, T Dai, D Cheng - Journal of the Operational …, 2024 - Taylor & Francis
The widespread use of cloud computing has brought cloud security to the forefront. The
cloud provider and the firm assume varying degrees of joint responsibility for cloud security …