This Article 
   
 Share 
   
 Bibliographic References 
   
 Add to: 
 
Digg
Furl
Spurl
Blink
Simpy
Google
Del.icio.us
Y!MyWeb
 
 Search 
   
Managing Risk Propagation in Extended Enterprise Networks
July/August 2008 (vol. 10 no. 4)
pp. 14-19
C. Derrick Huang, Barry Kaye College of Business at Florida Atlantic University
Ravi S. Behara, Barry Kaye College of Business at Florida Atlantic University
Qing Hu, Barry Kaye College of Business at Florida Atlantic University
The weakest link in an information supply chain can lead to increased vulnerability for all partners in the network. Examining and controlling risk propagation from the network and supply-chain perspectives has become vital to overall network security.

1. C.D. Huang, R.S. Behara, and Q. Hu, "Economics of Information Security Investment," National Security—Handbooks in Information Systems, vol. 2, H. Chen et al., eds., Elsevier, 2007, pp. 53–69.
2. H. Cavusoglu, B. Mishra, and S. Raghunathan, "A Model for Evaluating IT Security Investments," Comm. ACM, vol. 47, no. 7, 2004, pp. 87–92.
3. R. Sidel, "In Data Leaks, Culprits often are Mom, Pop," Wall Street J.,22–23 Sept. 2007, p. B1.
4. Network-Centric Naval Forces: A Transition Strategy for Enhancing Operational Capabilities Committee on Network-Centric Naval Forces, tech. report, US Naval Studies Board, Nat'l Research Council, 2000.
5. J. Pereira, "Bill Would Punish Retailers for Leaks of Personal Data," Wall Street J.,27 Feb. 2007, p. B1.
6. R. Albert, H. Jeong, and A.L. Barabási, "Diameter of the World-Wide Web," Nature, vol. 401, no. 6749, 1999, pp. 130–131.
7. R. Albert, H. Jeong, and A.L. Barabási, "Error and Attack Tolerance of Complex Networks," Nature, vol. 406, no. 6794, 2000, pp. 378–382.
8. D.B. Chang and C.S. Young, "Infection Dynamics on the Internet," Computer &Security, vol. 24, 2005, pp. 280–286.
9. A.L. Barabási and R. Albert, "Emergence of Scaling in Random Networks," Science, vol. 286, no. 5439, 1999, pp. 509–512.
10. C.W. Craighead et al., "The Severity of Supply Chain Disruptions: Design Characteristics and Mitigation Capabilities," Decision Sciences, vol. 38, no. 1, 2007, pp. 131–156.
11. H.L. Lee, V. Padmanabhan, and S. Whang, "The Bullwhip Effect in Supply Chains," Sloan Management Rev., vol. 38, no. 3, 1997, pp. 93–102.

Index Terms:
Information security, Information supply chain, Extended enterprise, Risk management, Scale-free networks
Citation:
C. Derrick Huang, Ravi S. Behara, Qing Hu, "Managing Risk Propagation in Extended Enterprise Networks," IT Professional, vol. 10, no. 4, pp. 14-19, July-Aug. 2008, doi:10.1109/MITP.2008.90
Usage of this product signifies your acceptance of the Terms of Use.