The Community for Technology Leaders
RSS Icon
Issue No.04 - July/August (2008 vol.10)
pp: 14-19
C. Derrick Huang , Barry Kaye College of Business at Florida Atlantic University
Ravi S. Behara , Barry Kaye College of Business at Florida Atlantic University
Qing Hu , Barry Kaye College of Business at Florida Atlantic University
The weakest link in an information supply chain can lead to increased vulnerability for all partners in the network. Examining and controlling risk propagation from the network and supply-chain perspectives has become vital to overall network security.
Information security, Information supply chain, Extended enterprise, Risk management, Scale-free networks
C. Derrick Huang, Ravi S. Behara, Qing Hu, "Managing Risk Propagation in Extended Enterprise Networks", IT Professional, vol.10, no. 4, pp. 14-19, July/August 2008, doi:10.1109/MITP.2008.90
1. C.D. Huang, R.S. Behara, and Q. Hu, "Economics of Information Security Investment," National Security—Handbooks in Information Systems, vol. 2, H. Chen et al., eds., Elsevier, 2007, pp. 53–69.
2. H. Cavusoglu, B. Mishra, and S. Raghunathan, "A Model for Evaluating IT Security Investments," Comm. ACM, vol. 47, no. 7, 2004, pp. 87–92.
3. R. Sidel, "In Data Leaks, Culprits often are Mom, Pop," Wall Street J.,22–23 Sept. 2007, p. B1.
4. Network-Centric Naval Forces: A Transition Strategy for Enhancing Operational Capabilities Committee on Network-Centric Naval Forces, tech. report, US Naval Studies Board, Nat'l Research Council, 2000.
5. J. Pereira, "Bill Would Punish Retailers for Leaks of Personal Data," Wall Street J.,27 Feb. 2007, p. B1.
6. R. Albert, H. Jeong, and A.L. Barabási, "Diameter of the World-Wide Web," Nature, vol. 401, no. 6749, 1999, pp. 130–131.
7. R. Albert, H. Jeong, and A.L. Barabási, "Error and Attack Tolerance of Complex Networks," Nature, vol. 406, no. 6794, 2000, pp. 378–382.
8. D.B. Chang and C.S. Young, "Infection Dynamics on the Internet," Computer &Security, vol. 24, 2005, pp. 280–286.
9. A.L. Barabási and R. Albert, "Emergence of Scaling in Random Networks," Science, vol. 286, no. 5439, 1999, pp. 509–512.
10. C.W. Craighead et al., "The Severity of Supply Chain Disruptions: Design Characteristics and Mitigation Capabilities," Decision Sciences, vol. 38, no. 1, 2007, pp. 131–156.
11. H.L. Lee, V. Padmanabhan, and S. Whang, "The Bullwhip Effect in Supply Chains," Sloan Management Rev., vol. 38, no. 3, 1997, pp. 93–102.
3 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool