A system dynamics case study of resilient response to IP theft from a cyber- attack

    Research output: Chapter in Book/Report/Conference proceedingArticle in proceedingsResearchpeer-review

    294 Downloads (Pure)

    Abstract

    Undesirable changes in supply chain physical operations derived from disruptions in the transmission or storage of digital information are reported daily despite the Information Technology (IT) protection available. Once a disruption materializes, the company losses will depend on the coherence and swiftness of the supply chain response (resilience). However, current resilience frameworks are qualitative, do not address evolution over time as a relevant aspect, and thus do not provide indications on how to design a resilient response. This paper contributes to closing this gap by developing a system dynamics model from an actual case of resilient response after a cyber-attack. Both casespecific and generic structures are extracted from the case data analysis, and a reaction mechanism is proposed that results in the observed behavior. The identification of these structures should eventually aid decision makers in the process of designing a resilient supply chain response.
    Original languageEnglish
    Title of host publicationProceedings of the 2017 IEEE International Conference on Industrial Engineering and Engineering Management (IEEM)
    PublisherIEEE
    Publication date2017
    Pages1291-1295
    ISBN (Electronic)978-1-5386-0948-4
    DOIs
    Publication statusPublished - 2017
    Event2017 International Conference on Industrial Engineering and Engineering Management (IEEM) - SUNTEC Singapore, Suntec City, Singapore
    Duration: 10 Dec 201713 Dec 2017
    http://www.ieem.org

    Conference

    Conference2017 International Conference on Industrial Engineering and Engineering Management (IEEM)
    LocationSUNTEC Singapore
    CountrySingapore
    CitySuntec City
    Period10/12/201713/12/2017
    Internet address

    Fingerprint Dive into the research topics of 'A system dynamics case study of resilient response to IP theft from a cyber- attack'. Together they form a unique fingerprint.

    Cite this