publication . Conference object . 2013

Measuring information security breach impact and uncertainties under various information sharing scenarios

Durowoju, Olatunde; Chan, Hing; Wang, Xiaojun;
Open Access English
  • Published: 19 Sep 2013
  • Publisher: Cranfield University Press
  • Country: United Kingdom
This study draws on information theory and aims to provide simulated evidence using real historical and statistical data to demonstrate how various levels of integration moderate the impact and uncertainties of information security breach on supply chain performance. We find that the supply chain behaves differently under various levels of integration when a security breach occurs. The entropy analysis revealed that the wholesaler experience the most uncertainty under system failure and data corruption. This sort of impact-uncertainty information will aid in designing and managing a resilient supply chain poised for minimal breach impact.
free text keywords: Supply chain integration, Supply chain disruption, Entropy, Simulation
Download from
Cranfield CERES
Conference object . 2013
18 references, page 1 of 2

Airoldi, E.M., Bai, X., Malin, B.A., 2011. An entropy approach to disclosure risk assessment: Lessons from real applications and simulated domains. Decision Support Systems 51, 10-20.

Bezzi, M., 2007. An entropy based method for measuring anonymity, Third International Conference on Security and Privacy in Communications Networks and the Workshops IEEE, pp. 28-32.

Chan, H.K., Chan, F.T.S., 2009. Effect of information sharing in supply chains with flexibility. International Journal of Production Research 47, 213-232.

Deng, Y., Pang, J., Wu, P., 2007. Measuring Anonymity with Relative Entropy, in: Dimitrakos, T., Martinelli, F., Ryan, P., Schneider, S. (Eds.), Formal Aspects in Security and Trust. Springer Berlin / Heidelberg, pp. 65-79.

Durowoju, O.A., Chan, H.K., Wang, X., 2012a. Entropy assessment of supply chain disruption. Journal of Manufacturing Technology Management 23, 998-1014.

Durowoju, O.A., Chan, H.K., Wang, X., 2012b. The Role of Integration in Information Security Breach Incidents, In: Seventeenth International Working Seminar on Production Economics 2012, 20-24 February, , Innsbruck, Austria.

Frizelle, G., Efstathiou, J., 2002. Seminar Notes on 'Measuring Complex Systems'. London School of Economics.

Frizelle, G., Woodcock, E., 1995. Measuring complexity as an aid to developing operational strategy. International Journal of Operations & Production Management 15, 26-39Internat. [OpenAIRE]

Huang, G.Q., Lau, S.K., Mak, K.L., 2003. Impacts of Sharing Production Information on Supply Chain Dynamics: A Review of the Literature. International Journal of Production Research 41, 1483-1517.

Kulp, S.C., Lee, H.L., Ofek, E., 2004. Manufacturer Benefits from Information Integration with Retail Customers. Management Science 50, 431-444. [OpenAIRE]

Li, J., Sikora, R., Shaw, M.J., Woo Tan, G., 2006. A strategic analysis of inter organizational information sharing. Decision Support Systems 42, 251-266.

Martínez-Olvera, C., 2008. Entropy as an assessment tool of supply chain information sharing. European Journal of Operational Research 185, 405-417. [OpenAIRE]

Potter, C., Beard, A., (2010). Information Security Breach Survey 2010, Information Security Breach Survey

Rees, L.P., Deane, J.K., Rakes, T.R., Baker, W.H., 2011. Decision support for Cybersecurity risk planning. Decision Support Systems In Press, Corrected Proof. [OpenAIRE]

Shannon, C.E., 1948. A Mathematical Theory of Communication. The Bell System Technical Journal 27, 379-423, 623-656.

18 references, page 1 of 2
Any information missing or wrong?Report an Issue