Affiliation:
1. Kennesaw State University, USA
Abstract
Managers often decide to integrate supply chains of collaborating firms. Whether such decisions are for competitive posture, cost saving or operational efficiencies, it is important to understand that supply chains integrate not only the flow of goods but also the information processes and assets and more often than not, the IT networks of the firms. Thus two developments occur. First, IT security losses of one firm collocate at the other firm's servers as information assets like demand forecasts are shared. Second, the Intranets of both firms get connected with the help of VPN or similar technologies, making it possible that a breach can travel from one firm to the other. This in turn makes IT security risks of SC firms strategically interdependent. This chapter analyzes such interdependent IT security risks and provides insights for SC and IT managers who are poised to collaborate with other downstream or upstream partner firms.
Reference29 articles.
1. Anderson, R. (2001, December). Why information security is hard - an economic perspective. In Proceedings of the 17th annual Computer security applications conference ACSAC ’01 (pp. 358-365). IEEE.
2. A model for B2B IT security: multilayer defense facing interdependent cyber risk.;T.Bandyopadhyay;Proceedings of the Southern Association of Information Systems Conference,2011
3. Employing Cost Effective Internet-Based Networking Technologies to Manage B2B Relationship
4. Information security in networked supply chains: impact of network vulnerability and supply chain integration on incentives to invest
5. Influence of information overload on IT security behavior: a theoretical framework;T.Bandyopadhyay;Proceedings of,2017