E‐commerce supply chains with considerations of cyber‐security: Should governments play a role?

S Luo, TM Choi - Production and Operations Management, 2022 - journals.sagepub.com
E‐commerce supply chains and their members face risks from cyber‐attacks. Consumers
who purchase goods online also risk having their private information stolen. Thus …

Cybersecurity research from a management perspective: A systematic literature review and future research agenda

FT Lohrke… - Journal of General …, 2023 - journals.sagepub.com
Firms continue to face increasing threats of financial and reputational damage from
cybersecurity events. Despite increasing scholarly attention, our 25-year review of studies …

A hybrid framework using explainable AI (XAI) in cyber-risk management for defence and recovery against phishing attacks

B Biswas, A Mukhopadhyay, A Kumar… - Decision Support Systems, 2024 - Elsevier
Phishing and social engineering contribute to various cyber incidents such as data breaches
and ransomware attacks, financial frauds, and denial of service attacks. Often, phishers …

Robust condition‐based production and maintenance planning for degradation management

Q Sun, P Chen, X Wang, ZS Ye - Production and …, 2023 - journals.sagepub.com
We study the robust production and maintenance control for a production system subject to
degradation. A periodic maintenance scheme is considered, and the system production rate …

Dynamic order allocation in a duopoly hybrid workforce of competition: A machine learning approach

X Wang, Y Zhang, S Zhang - European Journal of Operational Research, 2024 - Elsevier
We develop a continuous-time stochastic differential game model that aims to capture
market demand and stochastic cross-network effects, and we seek to find equilibrium order …

Vulnerability diffusions in software product networks

M Kang, G Templeton, SY Um - Journal of Operations …, 2023 - Wiley Online Library
During software product development, the combination of digital resources (such as
application programming interfaces and software development kits) establishes loose and …

An inductive analysis of collaborative cybersecurity management capabilities, relational antecedents and supply chain cybersecurity parameters

D Friday, SA Melnyk, M Altman, N Harrison… - International Journal of …, 2024 - emerald.com
Purpose The vulnerability of customers to malware attacks through weak supplier links has
prompted a need for collaboration as a strategic alternative in improving supply chain …

Security defense against long-term and stealthy cyberattacks

K Han, JH Choi, Y Choi, GM Lee, AB Whinston - Decision Support Systems, 2023 - Elsevier
Modern cyberattacks such as advanced persistent threats have become sophisticated.
Hackers can stay undetected for an extended time and defenders do not have sufficient …

Can It Clean Up Your Inbox? Evidence from South Korean Anti‐spam Legislation

J Ju, D Cho, JK Lee, JH Ahn - Production and Operations …, 2021 - journals.sagepub.com
Although spam email messages have been the primary source of cybercrime since the early
Internet era, there is no quick fix to this problem. Governments have established anti‐spam …

Impact of Data Breach on IT Investment: Embracing Both Failure Learning and Threat Rigidity

Q Wang, CH Peng, Y Jin… - Production and …, 2024 - journals.sagepub.com
<? show [AQ ID= GQ2 POS=-20pt]?><? show [AQ ID= GQ4]?><? show [AQ ID= GQ5 POS=
12pt]?> The extant literature has provided valuable insights into the post-failure behavior of …