A system dynamics case study of resilient response to IP theft from a cyber-attack

D. A. Sepulveda, O. Q. Khan

Research output: Contribution to book/anthology/report/conference proceedingArticle in proceedingResearchpeer-review

4 Citations (Scopus)

Abstract

Undesirable changes in supply chain physical operations derived from disruptions in the transmission or storage of digital information are reported daily despite the Information Technology (IT) protection available. Once a disruption materializes, the company losses will depend on the coherence and swiftness of the supply chain response (resilience). However, current resilience frameworks are qualitative, do not address evolution over time as a relevant aspect, and thus do not provide indications on how to design a resilient response. This paper contributes to closing this gap by developing a system dynamics model from an actual case of resilient response after a cyber-attack. Both case-specific and generic structures are extracted from the case data analysis, and a reaction mechanism is proposed that results in the observed behavior. The identification of these structures should eventually aid decision makers in the process of designing a resilient supply chain response.

Original languageEnglish
Title of host publication2017 IEEE International Conference on Industrial Engineering and Engineering Management, IEEM 2017
Number of pages5
Volume2017-December
PublisherIEEE Computer Society Press
Publication date9 Feb 2018
Pages1291-1295
ISBN (Electronic)9781538609484
DOIs
Publication statusPublished - 9 Feb 2018
Event2017 IEEE International Conference on Industrial Engineering and Engineering Management, IEEM 2017 - Singapore, Singapore
Duration: 10 Dec 201713 Dec 2017

Conference

Conference2017 IEEE International Conference on Industrial Engineering and Engineering Management, IEEM 2017
Country/TerritorySingapore
CitySingapore
Period10/12/201713/12/2017

Keywords

  • Cyber-risk
  • Resilience
  • System Dynamics

Fingerprint

Dive into the research topics of 'A system dynamics case study of resilient response to IP theft from a cyber-attack'. Together they form a unique fingerprint.

Cite this