A system dynamics case study of resilient response to IP theft from a cyber- attack

Daniel Alberto Sepúlveda Estay, Omera Khan

    Research output: Chapter in Book/Report/Conference proceedingArticle in proceedingsResearchpeer-review

    498 Downloads (Pure)

    Abstract

    Undesirable changes in supply chain physical operations derived from disruptions in the transmission or storage of digital information are reported daily despite the Information Technology (IT) protection available. Once a disruption materializes, the company losses will depend on the coherence and swiftness of the supply chain response (resilience). However, current resilience frameworks are qualitative, do not address evolution over time as a relevant aspect, and thus do not provide indications on how to design a resilient response. This paper contributes to closing this gap by developing a system dynamics model from an actual case of resilient response after a cyber-attack. Both casespecific and generic structures are extracted from the case data analysis, and a reaction mechanism is proposed that results in the observed behavior. The identification of these structures should eventually aid decision makers in the process of designing a resilient supply chain response.
    Original languageEnglish
    Title of host publicationProceedings of the 2017 IEEE International Conference on Industrial Engineering and Engineering Management (IEEM)
    PublisherIEEE
    Publication date2017
    Pages1291-1295
    ISBN (Electronic)978-1-5386-0948-4
    DOIs
    Publication statusPublished - 2017
    Event2017 IEEE International Conference on Industrial Engineering and Engineering Management - SUNTEC Singapore, Singapore, Singapore
    Duration: 10 Dec 201713 Dec 2017
    https://ieeexplore.ieee.org/xpl/conhome/8279571/proceeding
    http://www.ieem.org

    Conference

    Conference2017 IEEE International Conference on Industrial Engineering and Engineering Management
    LocationSUNTEC Singapore
    Country/TerritorySingapore
    CitySingapore
    Period10/12/201713/12/2017
    Internet address

    Fingerprint

    Dive into the research topics of 'A system dynamics case study of resilient response to IP theft from a cyber- attack'. Together they form a unique fingerprint.

    Cite this