Modeling and mitigating the effects of supply chain disruption in a defender–attacker game
详细信息    查看全文
  • 作者:Jie Xu ; Jun Zhuang ; Zigeng Liu
  • 关键词:Supply chain disruption ; Defender–attacker game ; Pre ; disruption protection
  • 刊名:Annals of Operations Research
  • 出版年:2016
  • 出版时间:January 2016
  • 年:2016
  • 卷:236
  • 期:1
  • 页码:255-270
  • 全文大小:1,395 KB
  • 参考文献:Bier, V. M., & Haphuriwat, N. (2011). Analytical method to identify the number of containers to inspect at us ports to deter terrorist attacks. Annals of Operations Research, 187(1), 137–158.CrossRef
    Bier, V. M., Nagaraj, A., & Abhichandani, V. (2005). Protection of simple series and parallel systems with components of different values. Reliability Engineering and System Safety, 87(3), 315–323.CrossRef
    Chopra, S., Reinhardt, G., & Mohan, U. (2007). The importance of decoupling recurrent and disruption risks in a supply chain. Naval Research Logistics, 54(5), 544–555.CrossRef
    Chopra, S., & Sodhi, M. S. (2004). Managing risk to avoid supply-chain breakdown. MIT Sloan Management Review, 46(1), 53–61.
    Christopher, M., & Lee, H. (2004). Mitigating supply chain risk through improved confidence. International Journal of Physical Distribution and Logistics Management, 34(5), 388–396.CrossRef
    Christopher, M., & Peck, H. (2004). Building the resilient supply chain. International Journal of Logistics Management, 15(2), 1–13.CrossRef
    Dutta, P. K. (1999). Strategies and games: Theory and practice. Cambridge, MA: MIT Press.
    Hopp, J. W., Liu, M., & Liu, Z. (2010). Protecting supply chain networks against catastrophic failures. Working paper, Department of Operations and Information Management, Wisconsin School of Business, University of Wisconsin-Madison.
    Insua, D. R., Rios, J., & Banks, D. (2009). Adversarial risk analysis. Journal of the American Statistical Association, 104(486), 841–854.CrossRef
    Jin, S., Liu, Z., & Zhuang, J. (2010). Monte carlo simulation-based supply chain disruption management for wargames. In Proceedings of the 2010 winter simulation conference (pp. 2682–2693).
    Jose, V. R. R., & Zhuang, J. (2013). Technology adoption, accumulation, and competition in multi-period attacker–defender games. Military Operations Research, 18(2), 33–47.CrossRef
    Kane, T. M. (2001). Military logistics and strategic performance (Vol. 1). Taylor: Psychology Press.
    Kress, M. (2012). Modeling armed conflicts. Science, 336(6083), 865–869.CrossRef
    Mas-Colell, A., Whinston, M. D., & Green, J. R. (1995). Microeconomic theory. New York, NY: Oxford University Press.
    National Public Radio. (2011). Among the costs of war: Billions a year in A.C.? http://​www.​npr.​org/​2011/​06/​25/​137414737/​among-the-costs-of-war-20b-in-air-conditioning/​ . Accessed in January, 2015.
    Paul, J. A., & Hariharan, G. (2012). Location-allocation planning of stockpiles for effective disaster mitigation. Annals of Operations Research, 196(1), 469–490.CrossRef
    Sandler, T., & Siqueira, K. (2006). Global terrorism: Deterrence versus pre-emption. Canadian Journal of Economics, 39(4), 1370–1387.CrossRef
    Shan, X., & Zhuang, J. (2013a). Cost of equity in homeland security resource allocation in the face of a strategic attacker. Risk Analysis, 33(6), 1083–1099.CrossRef
    Shan, X., & Zhuang, J. (2013b). Hybrid defensive resource allocations in the face of partially strategic attackers in a sequential defender–attacker game. European Journal of Operational Research, 228(1), 262–272.CrossRef
    Simon, S. J. (2001). The art of military logistics. Communications of the ACM, 44(6), 62–66.CrossRef
    Skaperdas, S. (1996). Contest success functions. Economic Theory, 7(2), 283–290.CrossRef
    von Clausewitz, C. (2004). On war. Boston: Digireads.com Publishing.
    Wang, X., & Zhuang, J. (2011). Balancing congestion and security in the presence of strategic applicants with private information. European Journal of Operational Research, 212(1), 100–111.CrossRef
    Zhuang, J., & Bier, V. M. (2007). Balancing terrorism and natural disasters—Defensive strategy with endogenous attacker effort. Operations Research, 55(5), 976–991.CrossRef
    Zhuang, J., Saxton, G. D., & Wu, H. (2014). Publicity vs. impact in nonprofit disclosures and donor preferences: A sequential game with one nonprofit organization and N donors. Annals of Operations Research, 221(1), 469–491.CrossRef
  • 作者单位:Jie Xu (1)
    Jun Zhuang (1)
    Zigeng Liu (2)

    1. Department of Industrial and Systems Engineering, SUNY at Buffalo, Buffalo, NY, 14260, USA
    2. Department of Physics and Astronomy, Northwestern University, Evanston, IL, 60208, USA
  • 刊物类别:Business and Economics
  • 刊物主题:Economics
    Operation Research and Decision Theory
    Combinatorics
    Theory of Computation
  • 出版者:Springer Netherlands
  • ISSN:1572-9338
文摘
The outcomes of a defender–attacker game depend on the defender’s resources delivered through military supply chains. These are subject to disruptions from various sources, such as natural disasters, social disasters, and terrorism. The attacker and defender are at war; the defender needs resources to defeat the attacker, but those resources may not be available due to a supply chain disruption that occurs exogenously to the game. In this paper, we integrate a defender–attacker game with supply chain risk management, and study the defender’s optimal preparation strategy. We provide analytical solutions, conduct numerical analysis, and compare the combined strategy with other protection strategies. Our results indicate that: (a) the defender benefits in a defender–attacker game by utilizing supply chain risk management tools; and (b) the attacker’s best response resource allocation would not be deterred by capacity backup protection and/or inventory protection. The feature of this paper is that the defender, being the downstream user of the supply chain, is involved in a strategic contest against the attacker. This model is different than game theory applied to private-sector supply chains because most game theoretic models of private sector supply chains usually explore relationships between suppliers and firms in the same supply chain or between multiple firms competing in the marketplace for customers. Therefore, supply chain risk management for such a military application imposes effects that have not been studied before.

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700