{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,8]],"date-time":"2026-04-08T11:15:49Z","timestamp":1775646949375,"version":"3.50.1"},"reference-count":62,"publisher":"Informa UK Limited","issue":"4","funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["71471073"],"award-info":[{"award-number":["71471073"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["www.tandfonline.com"],"crossmark-restriction":true},"short-container-title":["International Journal of Production Research"],"published-print":{"date-parts":[[2021,2,16]]},"DOI":"10.1080\/00207543.2020.1721591","type":"journal-article","created":{"date-parts":[[2020,2,7]],"date-time":"2020-02-07T04:39:46Z","timestamp":1581050386000},"page":"1216-1238","update-policy":"https:\/\/doi.org\/10.1080\/tandf_crossmark_01","source":"Crossref","is-referenced-by-count":40,"title":["Cybersecurity investments in a two-echelon supply chain with third-party risk propagation"],"prefix":"10.1080","volume":"59","author":[{"given":"Yanhui","family":"Li","sequence":"first","affiliation":[{"name":"School of Information Management, Central China Normal University, Wuhan, People's Republic of China"}]},{"given":"Lu","family":"Xu","sequence":"additional","affiliation":[{"name":"School of Information Management, Central China Normal University, Wuhan, People's Republic of China"}]}],"member":"301","published-online":{"date-parts":[[2020,2,6]]},"reference":[{"key":"CIT0001","unstructured":"Adidas Inc. 2019. \u201cGlobal Factory Lists.\u201d https:\/\/www.adidas-group.com\/en\/sustainability\/compliance\/supply-chain-structure\/"},{"key":"CIT0002","doi-asserted-by":"publisher","DOI":"10.1016\/j.automatica.2012.09.007"},{"key":"CIT0003","doi-asserted-by":"publisher","DOI":"10.1126\/science.1130992"},{"key":"CIT0004","unstructured":"Apple Inc. 2019. \u201c13th Annual Supplier Responsibility Progress Report.\u201d https:\/\/www.apple.com\/supplier-responsibility\/pdf\/Apple-Supplier-List.pdf"},{"key":"CIT0005","doi-asserted-by":"publisher","DOI":"10.1007\/s10799-010-0066-1"},{"key":"CIT0006","doi-asserted-by":"crossref","unstructured":"Behara, R. S., and S. Bhattacharya. 2007. \u201cProcess-Centric Risk Management Framework for Information Security.\u201d In National Security, edited by H. Chen, T. S. Raghu, R. Ramesh and D. Zeng, 349\u2013365. Amsterdam: Elsevier.","DOI":"10.1016\/S1574-0145(06)02015-0"},{"key":"CIT0007","unstructured":"B\u00f6hme, R., and G. Schwartz. 2010. \u201cModeling Cyber-Insurance: Towards a Unifying Framework.\u201d 9th Workshop on the Economics of Information Security (WEIS). Cambridge: Harvard University."},{"key":"CIT0008","doi-asserted-by":"publisher","DOI":"10.2753\/MIS0742-1222250211"},{"key":"CIT0009","doi-asserted-by":"publisher","DOI":"10.1111\/poms.12681"},{"key":"CIT0010","doi-asserted-by":"publisher","DOI":"10.2753\/MIS0742-1222260308"},{"key":"CIT0011","doi-asserted-by":"publisher","DOI":"10.1080\/00207543.2019.1627438"},{"key":"CIT0012","doi-asserted-by":"publisher","DOI":"10.1080\/00207543.2017.1387680"},{"key":"CIT0013","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2018.12.051"},{"issue":"9","key":"CIT0014","first-page":"1301","volume":"52","author":"Elsinger H.","year":"2006","journal-title":"Journal of Management Information Systems"},{"key":"CIT0015","doi-asserted-by":"publisher","DOI":"10.1007\/s10796-018-9845-8"},{"key":"CIT0016","doi-asserted-by":"publisher","DOI":"10.1016\/j.elerap.2019.100843"},{"key":"CIT0017","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2016.02.012"},{"key":"CIT0018","doi-asserted-by":"publisher","DOI":"10.1287\/isre.1050.0053"},{"key":"CIT0019","unstructured":"Gartner, Inc. 2018. \u201cGartner Forecasts Worldwide Information Security Spending to Exceed $124 Billion in 2019.\u201d https:\/\/www.gartner.com\/en\/newsroom\/press-releases\/2018-08-15-gartner-forecasts-worldwide-information-security-spending-to-exceed-124-billion-in-20192018"},{"key":"CIT0020","doi-asserted-by":"crossref","unstructured":"Glicksberg, I. L. 1956. \u201cA Further Generalization of the Kakutani Fixed Point Theorem, with Application to Nash Equilibrium Points.\u201d Proceedings of the American Mathematical Society, 170\u2013174. New York: American Mathematical Society (AMS).","DOI":"10.2307\/2032478"},{"key":"CIT0021","doi-asserted-by":"publisher","DOI":"10.1145\/581271.581274"},{"key":"CIT0022","doi-asserted-by":"publisher","DOI":"10.1016\/j.jaccpubpol.2015.05.001"},{"key":"CIT0023","doi-asserted-by":"publisher","DOI":"10.1080\/00207543.2019.1686189"},{"key":"CIT0024","doi-asserted-by":"publisher","DOI":"10.1111\/risa.12966"},{"key":"CIT0025","doi-asserted-by":"publisher","DOI":"10.1007\/s10796-006-9011-6"},{"key":"CIT0026","doi-asserted-by":"publisher","DOI":"10.1016\/j.omega.2018.08.008"},{"key":"CIT0027","doi-asserted-by":"publisher","DOI":"10.1111\/risa.12878"},{"key":"CIT0028","doi-asserted-by":"publisher","DOI":"10.1016\/j.tre.2019.03.001"},{"key":"CIT0029","doi-asserted-by":"publisher","DOI":"10.1080\/00207543.2019.1661538"},{"key":"CIT0030","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijpe.2008.04.002"},{"key":"CIT0031","doi-asserted-by":"publisher","DOI":"10.2753\/MIS0742-1222290304"},{"key":"CIT0032","unstructured":"ITRC (Identity Theft Resource Center). 2018. \u201cEnd-of-Year Data Breach Report.\u201d https:\/\/www.idtheftcenter.org\/2018-end-of-year-data-breach-report\/"},{"key":"CIT0033","doi-asserted-by":"publisher","DOI":"10.1080\/00207543.2017.1343507"},{"key":"CIT0034","doi-asserted-by":"publisher","DOI":"10.1080\/00207543.2018.1521025"},{"key":"CIT0035","doi-asserted-by":"publisher","DOI":"10.1080\/00207543.2018.1488086"},{"key":"CIT0036","doi-asserted-by":"publisher","DOI":"10.1080\/00207543.2013.858836"},{"key":"CIT0037","unstructured":"Jonathan, B. 2019. \u201cAmazon Hit by Extensive Fraud With Hackers Siphoning Merchant Funds.\u201d https:\/\/www.bloomberg.com\/news\/articles\/2019-05-08\/amazon-hit-by-extensive-fraud-as-hackers-siphoned-merchant-funds"},{"key":"CIT0038","unstructured":"Kaspersky Lab. 2018. \u201cIT Security: Cost Center or Strategic Investment?\u201d https:\/\/go.kaspersky.com\/rs\/802-IJN-240\/images\/IT%20Security%20Econmics%20Report%209.18.17.pdf?aliId=488652022"},{"key":"CIT0039","doi-asserted-by":"publisher","DOI":"10.1080\/00207543.2019.1675919"},{"key":"CIT0040","doi-asserted-by":"publisher","DOI":"10.1023\/A:1024119208153"},{"key":"CIT0041","doi-asserted-by":"publisher","DOI":"10.1145\/2635673"},{"key":"CIT0042","doi-asserted-by":"publisher","DOI":"10.1287\/isre.1120.0447"},{"key":"CIT0043","doi-asserted-by":"publisher","DOI":"10.1007\/s10898-017-0585-y"},{"key":"CIT0044","doi-asserted-by":"publisher","DOI":"10.1007\/s10479-016-2209-1"},{"key":"CIT0045","doi-asserted-by":"publisher","DOI":"10.1016\/j.ejor.2016.12.034"},{"key":"CIT0046","unstructured":"Ogut, H., N. Menon, and S. Raghunathan. 2005. \u201cCyber Insurance and IT Security Investment: Impact of Interdependence Risk.\u201d Proceedings of the 4th Workshop on the Economics of Information Security (WEIS'05), 296\u2013300. Richardson: Elsevier."},{"key":"CIT0047","doi-asserted-by":"publisher","DOI":"10.1007\/s10479-019-03454-1"},{"key":"CIT0048","unstructured":"Ponemon, I. 2018a. \u201cCost of a Data Breach Study: Benchmark Research.\u201d https:\/\/securityintelligence.com\/ponemon-cost-of-a-data-breach-2018\/"},{"key":"CIT0049","unstructured":"Ponemon, I. 2018b. \u201cData Risk in the Third-Party Ecosystem.\u201d https:\/\/securityintelligence.com\/ponemon-cost-of-a-data-breach-2018\/"},{"key":"CIT0050","unstructured":"PwC. 2013. \u201cThe Global State of Information Security Survey 2013.\u201d https:\/\/www.pwc.com\/gx\/en\/consulting-services\/information-security-survey\/assets\/2013-giss-report.pdf"},{"key":"CIT0051","doi-asserted-by":"publisher","DOI":"10.1080\/00207543.2017.1400704"},{"key":"CIT0052","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2005.30"},{"key":"CIT0053","unstructured":"Scott, M. 2018. \u201cChina's Topsports Rises 8% in Hong Kong Debut After $1 Billion IPO.\u201d https:\/\/www.reuters.com\/article\/us-topsports-listing\/chinas-topsports-rises-8-in-hong-kong-debut-after-1-billion-ipo-idUSKBN1WP07X"},{"key":"CIT0054","doi-asserted-by":"crossref","unstructured":"Shetty, N., G. Schwartz, M. Felegyhazi, and J. Walrand. 2010. \u201cCompetitive Cyber-Insurance and Internet Security.\u201d In Economics of Information Security and Privacy, edited by T. Moore, D. Pym and C. Ioannidis, 229\u2013247. Boston, MA: Springer.","DOI":"10.1007\/978-1-4419-6967-5_12"},{"key":"CIT0055","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevLett.100.218701"},{"key":"CIT0056","unstructured":"Tony, D. 2018. \u201cSees Record Number of Online Retail Data Breaches.\u201d AT&T Cybersecurity. https:\/\/www.alienvault.com\/blogs\/security-essentials\/2018-sees-record-number-of-online-retail-data-breaches"},{"key":"CIT0057","unstructured":"U.S. White House. 2018. \u201cNational Cyber Strategy of the United States of America.\u201d https:\/\/www.whitehouse.gov\/wp-content\/uploads\/2018\/09\/National-Cyber-Strategy.pdf"},{"key":"CIT0058","doi-asserted-by":"crossref","unstructured":"Varian, H. 2004. \u201cSystem Reliability and Free Riding.\u201d In Economics of Information Security, 1\u201315. Boston, MA: Springer.","DOI":"10.1007\/1-4020-8090-5_1"},{"key":"CIT0059","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2006.06.018"},{"key":"CIT0060","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2015.03.033"},{"key":"CIT0061","doi-asserted-by":"publisher","DOI":"10.1111\/risa.13257"},{"key":"CIT0062","doi-asserted-by":"publisher","DOI":"10.2753\/MIS0742-1222300104"}],"container-title":["International Journal of Production Research"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.tandfonline.com\/doi\/pdf\/10.1080\/00207543.2020.1721591","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,3,22]],"date-time":"2021-03-22T14:45:41Z","timestamp":1616424341000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.tandfonline.com\/doi\/full\/10.1080\/00207543.2020.1721591"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,2,6]]},"references-count":62,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2021,2,16]]}},"alternative-id":["10.1080\/00207543.2020.1721591"],"URL":"https:\/\/doi.org\/10.1080\/00207543.2020.1721591","relation":{},"ISSN":["0020-7543","1366-588X"],"issn-type":[{"value":"0020-7543","type":"print"},{"value":"1366-588X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,2,6]]},"assertion":[{"value":"The publishing and review policy for this title is described in its Aims & Scope.","order":1,"name":"peerreview_statement","label":"Peer Review Statement"},{"value":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=tprs20","URL":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=tprs20","order":2,"name":"aims_and_scope_url","label":"Aim & Scope"},{"value":"2019-10-03","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2020-01-15","order":2,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2020-02-06","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}