Please use this identifier to cite or link to this item: http://hdl.handle.net/11718/26608
Full metadata record
DC FieldValueLanguage
dc.contributor.authorGopalakrishnan, Sanjith-
dc.contributor.authorSankaranarayanan, Sriram-
dc.date.accessioned2023-08-04T04:24:52Z-
dc.date.available2023-08-04T04:24:52Z-
dc.date.issued2023-07-07-
dc.identifier.citationGopalakrishnan, S., & Sankaranarayanan, S. (2023). Cooperative security against interdependent risks. Production and Operations Management. https://doi.org/10.1111/poms.14047en_US
dc.identifier.issn19375956-
dc.identifier.urihttp://hdl.handle.net/11718/26608-
dc.description.abstractFirms in interorganizational networks are exposed to interdependent risks that are transferable across partner firms, such as contamination in food supply chains or data breaches in technology networks. They can be decomposed into intrinsic risks a firm faces from its own operations and extrinsic risks transferred from its partners. Firms have access to two security strategies: either they can independently eliminate both intrinsic and extrinsic risks by securing their links with partners or, alternatively, firms can cooperate with partners to eliminate sources of intrinsic risk in the network. We develop a graph-theoretic model of interdependent security and demonstrate that the network-optimal security strategy can be computed in polynomial time. Then, we use cooperative game-theoretic tools to examine, under different informational assumptions, whether firms can sustain the network-optimal security strategy via suitable cost-sharing mechanisms. We design a novel cost-sharing mechanism: a restricted variant of the well-known Shapley value, the agreeable allocation, that is easy to compute, bilaterally implementable, ensures stability, and is fair. However, the agreeable allocation need not always exist. Interestingly, we find that in networks with homogeneous cost parameters, the presence of locally dense clusters of connected firms precludes the existence of the agreeable allocation, while the absence of sufficiently dense clusters (formally, k-cores) guarantees its existence. Finally, using the SDC Platinum database, we consider all interfirm alliances formed in the food manufacturing sector from 2006 to 2020. Then, with simulated cost parameters, we examine the practical feasibility of identifying bilaterally implementable security cost-sharing arrangements in these alliances.en_US
dc.language.isoenen_US
dc.publisherWileyen_US
dc.relation.ispartofProduction and Operations Managementen_US
dc.subjectInterorganizational networksen_US
dc.subjectInterdependent risksen_US
dc.subjectContamination in food supply chainsen_US
dc.subjectData breaches in technology networksen_US
dc.subjectIntrinsic risksen_US
dc.subjectExtrinsic risksen_US
dc.subjectSecurity strategiesen_US
dc.subjectSecurity strategiesen_US
dc.subjectNetwork-optimal security strategyen_US
dc.subjectk-cores in networksen_US
dc.subjectStability in cost-sharingen_US
dc.subjectFair cost-sharingen_US
dc.subjectFood manufacturing sectoren_US
dc.titleCooperative security against interdependent risksen_US
dc.typeArticleen_US
Appears in Collections:Open Access Journal Articles

Files in This Item:
File Description SizeFormat 
Cooperative_security_against_interdependent_risks.pdf381 kBAdobe PDFView/Open


Items in IIMA Institutional Repository are protected by copyright, with all rights reserved, unless otherwise indicated.