Please use this identifier to cite or link to this item:
http://hdl.handle.net/11718/26608
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Gopalakrishnan, Sanjith | - |
dc.contributor.author | Sankaranarayanan, Sriram | - |
dc.date.accessioned | 2023-08-04T04:24:52Z | - |
dc.date.available | 2023-08-04T04:24:52Z | - |
dc.date.issued | 2023-07-07 | - |
dc.identifier.citation | Gopalakrishnan, S., & Sankaranarayanan, S. (2023). Cooperative security against interdependent risks. Production and Operations Management. https://doi.org/10.1111/poms.14047 | en_US |
dc.identifier.issn | 19375956 | - |
dc.identifier.uri | http://hdl.handle.net/11718/26608 | - |
dc.description.abstract | Firms in interorganizational networks are exposed to interdependent risks that are transferable across partner firms, such as contamination in food supply chains or data breaches in technology networks. They can be decomposed into intrinsic risks a firm faces from its own operations and extrinsic risks transferred from its partners. Firms have access to two security strategies: either they can independently eliminate both intrinsic and extrinsic risks by securing their links with partners or, alternatively, firms can cooperate with partners to eliminate sources of intrinsic risk in the network. We develop a graph-theoretic model of interdependent security and demonstrate that the network-optimal security strategy can be computed in polynomial time. Then, we use cooperative game-theoretic tools to examine, under different informational assumptions, whether firms can sustain the network-optimal security strategy via suitable cost-sharing mechanisms. We design a novel cost-sharing mechanism: a restricted variant of the well-known Shapley value, the agreeable allocation, that is easy to compute, bilaterally implementable, ensures stability, and is fair. However, the agreeable allocation need not always exist. Interestingly, we find that in networks with homogeneous cost parameters, the presence of locally dense clusters of connected firms precludes the existence of the agreeable allocation, while the absence of sufficiently dense clusters (formally, k-cores) guarantees its existence. Finally, using the SDC Platinum database, we consider all interfirm alliances formed in the food manufacturing sector from 2006 to 2020. Then, with simulated cost parameters, we examine the practical feasibility of identifying bilaterally implementable security cost-sharing arrangements in these alliances. | en_US |
dc.language.iso | en | en_US |
dc.publisher | Wiley | en_US |
dc.relation.ispartof | Production and Operations Management | en_US |
dc.subject | Interorganizational networks | en_US |
dc.subject | Interdependent risks | en_US |
dc.subject | Contamination in food supply chains | en_US |
dc.subject | Data breaches in technology networks | en_US |
dc.subject | Intrinsic risks | en_US |
dc.subject | Extrinsic risks | en_US |
dc.subject | Security strategies | en_US |
dc.subject | Security strategies | en_US |
dc.subject | Network-optimal security strategy | en_US |
dc.subject | k-cores in networks | en_US |
dc.subject | Stability in cost-sharing | en_US |
dc.subject | Fair cost-sharing | en_US |
dc.subject | Food manufacturing sector | en_US |
dc.title | Cooperative security against interdependent risks | en_US |
dc.type | Article | en_US |
Appears in Collections: | Open Access Journal Articles |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
Cooperative_security_against_interdependent_risks.pdf | 381 kB | Adobe PDF | View/Open |
Items in IIMA Institutional Repository are protected by copyright, with all rights reserved, unless otherwise indicated.