IDEAS home Printed from https://ideas.repec.org/a/eee/reensy/v138y2015icp93-104.html
   My bibliography  Save this article

Protection of warehouses and plants under capacity constraint

Author

Listed:
  • Bricha, Naji
  • Nourelfath, Mustapha

Abstract

While warehouses may be subjected to less protection effort than plants, their unavailability may have substantial impact on the supply chain performance. This paper presents a method for protection of plants and warehouses against intentional attacks in the context of the capacitated plant and warehouses location and capacity acquisition problem. A non-cooperative two-period game is developed to find the equilibrium solution and the optimal defender strategy under capacity constraints. The defender invests in the first period to minimize the expected damage and the attacker moves in the second period to maximize the expected damage. Extra-capacity of neighboring functional plants and warehouses is used after attacks, to satisfy all customers demand and to avoid the backorders. The contest success function is used to evaluate success probability of an attack of plants and warehouses. A numerical example is presented to illustrate an application of the model. The defender strategy obtained by our model is compared to the case where warehouses are subjected to less protection effort than the plants. This comparison allows us to measure how much our method is better, and illustrates the effect of direct investments in protection and indirect protection by warehouse extra-capacities to reduce the expected damage.

Suggested Citation

  • Bricha, Naji & Nourelfath, Mustapha, 2015. "Protection of warehouses and plants under capacity constraint," Reliability Engineering and System Safety, Elsevier, vol. 138(C), pages 93-104.
  • Handle: RePEc:eee:reensy:v:138:y:2015:i:c:p:93-104
    DOI: 10.1016/j.ress.2015.01.003
    as

    Download full text from publisher

    File URL: http://www.sciencedirect.com/science/article/pii/S0951832015000058
    Download Restriction: Full text for ScienceDirect subscribers only

    File URL: https://libkey.io/10.1016/j.ress.2015.01.003?utm_source=ideas
    LibKey link: if access is restricted and if your library uses this service, LibKey will redirect you to where you can use your library subscription to access this item
    ---><---

    As the access to this document is restricted, you may want to search for a different version of it.

    References listed on IDEAS

    as
    1. Konrad, Kai A., 2009. "Strategy and Dynamics in Contests," OUP Catalogue, Oxford University Press, number 9780199549603.
    2. Levitin, G. & Gertsbakh, I. & Shpungin, Y., 2013. "Evaluating the damage associated with intentional supply deprivation in multi-commodity network," Reliability Engineering and System Safety, Elsevier, vol. 119(C), pages 11-17.
    3. A Dasci & G Laporte, 2005. "An analytical approach to the facility location and capacity acquisition problem under demand uncertainty," Journal of the Operational Research Society, Palgrave Macmillan;The OR Society, vol. 56(4), pages 397-405, April.
    4. Kjell Hausken, 2011. "Protecting complex infrastructures against multiple strategic attackers," International Journal of Systems Science, Taylor & Francis Journals, vol. 42(1), pages 11-29.
    5. Verter, Vedat & Cemal Dincer, M., 1992. "An integrated evaluation of facility location, capacity acquisition, and technology selection for designing global manufacturing strategies," European Journal of Operational Research, Elsevier, vol. 60(1), pages 1-18, July.
    6. Jia, Hao & Skaperdas, Stergios & Vaidya, Samarth, 2013. "Contest functions: Theoretical foundations and issues in estimation," International Journal of Industrial Organization, Elsevier, vol. 31(3), pages 211-222.
    7. Vidal, Carlos J. & Goetschalckx, Marc, 1997. "Strategic production-distribution models: A critical review with emphasis on global supply chain models," European Journal of Operational Research, Elsevier, vol. 98(1), pages 1-18, April.
    8. Erenguc, S. Selcuk & Simpson, N. C. & Vakharia, Asoo J., 1999. "Integrated production/distribution planning in supply chains: An invited review," European Journal of Operational Research, Elsevier, vol. 115(2), pages 219-236, June.
    9. A. M. Geoffrion & G. W. Graves, 1974. "Multicommodity Distribution System Design by Benders Decomposition," Management Science, INFORMS, vol. 20(5), pages 822-844, January.
    10. Stergios Skaperdas, 1996. "Contest success functions (*)," Economic Theory, Springer;Society for the Advancement of Economic Theory (SAET), vol. 7(2), pages 283-290.
    11. S. Rajagopalan & Andreas C. Soteriou, 1994. "Capacity Acquisition and Disposal with Discrete Facility Sizes," Management Science, INFORMS, vol. 40(7), pages 903-917, July.
    12. Hausken, Kjell, 2006. "Income, interdependence, and substitution effects affecting incentives for security investment," Journal of Accounting and Public Policy, Elsevier, vol. 25(6), pages 629-665.
    13. Vicki Bier & Hoa Han & Lorna Zack, 2008. "Models of Interdependent Security along the Milk Supply Chain," American Journal of Agricultural Economics, Agricultural and Applied Economics Association, vol. 90(5), pages 1265-1271.
    14. Jack Hirshleifer, 1989. "Conflict and rent-seeking success functions: Ratio vs. difference models of relative success," Springer Books, in: Roger D. Congleton & Arye L. Hillman & Kai A. Konrad (ed.), 40 Years of Research on Rent Seeking 1, pages 251-262, Springer.
    15. Alexander Shulman, 1991. "An Algorithm for Solving Dynamic Capacitated Plant Location Problems with Discrete Expansion Sizes," Operations Research, INFORMS, vol. 39(3), pages 423-436, June.
    16. Beamon, Benita M., 1998. "Supply chain design and analysis:: Models and methods," International Journal of Production Economics, Elsevier, vol. 55(3), pages 281-294, August.
    17. Ramirez-Marquez, Jose E. & Rocco, Claudio M. & Levitin, Gregory, 2011. "Optimal network protection against diverse interdictor strategies," Reliability Engineering and System Safety, Elsevier, vol. 96(3), pages 374-382.
    18. Kunreuther, Howard & Heal, Geoffrey, 2003. "Interdependent Security," Journal of Risk and Uncertainty, Springer, vol. 26(2-3), pages 231-249, March-May.
    19. Baker, Peter & Canessa, Marco, 2009. "Warehouse design: A structured approach," European Journal of Operational Research, Elsevier, vol. 193(2), pages 425-436, March.
    20. Chan, Felix T.S. & Wang, Zheng & Zhang, Jie, 2007. "A two-level hedging point policy for controlling a manufacturing system with time-delay, demand uncertainty and extra capacity," European Journal of Operational Research, Elsevier, vol. 176(3), pages 1528-1558, February.
    21. Shanling Li & Devanath Tirupati, 1994. "Dynamic Capacity Expansion Problem with Multiple Products: Technology Selection and Timing of Capacity Additions," Operations Research, INFORMS, vol. 42(5), pages 958-976, October.
    22. Bricha, Naji & Nourelfath, Mustapha, 2013. "Critical supply network protection against intentional attacks: A game-theoretical model," Reliability Engineering and System Safety, Elsevier, vol. 119(C), pages 1-10.
    23. Nitzan, Shmuel, 1994. "Modelling rent-seeking contests," European Journal of Political Economy, Elsevier, vol. 10(1), pages 41-60, May.
    24. Hausken, Kjell & Levitin, Gregory, 2009. "Minmax defense strategy for complex multi-state systems," Reliability Engineering and System Safety, Elsevier, vol. 94(2), pages 577-587.
    Full references (including those not matched with items on IDEAS)

    Citations

    Citations are extracted by the CitEc Project, subscribe to its RSS feed for this item.
    as


    Cited by:

    1. Jalali, Sajjad & Seifbarghy, Mehdi & Niaki, Seyed Taghi Akhavan, 2018. "A risk-averse location-protection problem under intentional facility disruptions: A modified hybrid decomposition algorithm," Transportation Research Part E: Logistics and Transportation Review, Elsevier, vol. 114(C), pages 196-219.
    2. Starita, Stefano & Scaparra, Maria Paola, 2016. "Optimizing dynamic investment decisions for railway systems protection," European Journal of Operational Research, Elsevier, vol. 248(2), pages 543-557.
    3. Li, Qing & Li, Mingchu & Gong, Zhongqiang & Tian, Yuan & Zhang, Runfa, 2022. "Locating and protecting interdependent facilities to hedge against multiple non-cooperative limited choice attackers," Reliability Engineering and System Safety, Elsevier, vol. 223(C).

    Most related items

    These are the items that most often cite the same works as this one and are cited by the same works as this one.
    1. Bricha, Naji & Nourelfath, Mustapha, 2014. "Extra-capacity versus protection for supply networks under attack," Reliability Engineering and System Safety, Elsevier, vol. 131(C), pages 185-196.
    2. Bricha, Naji & Nourelfath, Mustapha, 2013. "Critical supply network protection against intentional attacks: A game-theoretical model," Reliability Engineering and System Safety, Elsevier, vol. 119(C), pages 1-10.
    3. Ewerhart, Christian, 2017. "Contests with small noise and the robustness of the all-pay auction," Games and Economic Behavior, Elsevier, vol. 105(C), pages 195-211.
    4. Kjell Hausken, 2012. "Game Theoretic Analysis of Standby Systems," Chapters, in: Yair Holtzman (ed.), Advanced Topics in Applied Operations Management, IntechOpen.
    5. Hausken, Kjell, 2017. "Defense and attack for interdependent systems," European Journal of Operational Research, Elsevier, vol. 256(2), pages 582-591.
    6. Jia, Hao & Skaperdas, Stergios & Vaidya, Samarth, 2013. "Contest functions: Theoretical foundations and issues in estimation," International Journal of Industrial Organization, Elsevier, vol. 31(3), pages 211-222.
    7. Kyung Hwan Baik & Jong Hwa Lee, 2013. "Endogenous Timing In Contests With Delegation," Economic Inquiry, Western Economic Association International, vol. 51(4), pages 2044-2055, October.
    8. Pelosse, Yohan, 2011. "Inter and intra-group conflicts as a foundation for contest success functions," MPRA Paper 31468, University Library of Munich, Germany.
    9. Samir Elhedhli & Jean-Louis Goffin, 2005. "Efficient Production-Distribution System Design," Management Science, INFORMS, vol. 51(7), pages 1151-1164, July.
    10. Stergios Skaperdas & Samarth Vaidya, 2012. "Persuasion as a contest," Economic Theory, Springer;Society for the Advancement of Economic Theory (SAET), vol. 51(2), pages 465-486, October.
    11. Martínez-Costa, Carme & Mas-Machuca, Marta & Benedito, Ernest & Corominas, Albert, 2014. "A review of mathematical programming models for strategic capacity planning in manufacturing," International Journal of Production Economics, Elsevier, vol. 153(C), pages 66-85.
    12. Sakshi Gupta & Ram Singh, 2018. "On Existence and Properties of Pure-strategy Equilibria under Contests," Working Papers id:12840, eSocialSciences.
    13. Qingqing Zhai & Rui Peng & Jun Zhuang, 2020. "Defender–Attacker Games with Asymmetric Player Utilities," Risk Analysis, John Wiley & Sons, vol. 40(2), pages 408-420, February.
    14. Cubel, María & Sanchez-Pages, Santiago, 2016. "An axiomatization of difference-form contest success functions," Journal of Economic Behavior & Organization, Elsevier, vol. 131(PA), pages 92-105.
    15. Pelosse, Yohan, 2011. "Equivalence of optimal noisy-ranking contests and Tullock contests," Journal of Mathematical Economics, Elsevier, vol. 47(6), pages 740-748.
    16. Alberto Vesperoni, 2016. "A contest success function for rankings," Social Choice and Welfare, Springer;The Society for Social Choice and Welfare, vol. 47(4), pages 905-937, December.
    17. Letina, Igor & Liu, Shuo & Netzer, Nick, 2023. "Optimal contest design: Tuning the heat," Journal of Economic Theory, Elsevier, vol. 213(C).
    18. Kjell Hausken & Fei He, 2016. "On the Effectiveness of Security Countermeasures for Critical Infrastructures," Risk Analysis, John Wiley & Sons, vol. 36(4), pages 711-726, April.
    19. Friedhelm Hentschel, 2022. "Third-party intervention in secessions," Economics of Governance, Springer, vol. 23(1), pages 65-82, March.
    20. Hausken, Kjell, 2008. "Strategic defense and attack for series and parallel reliability systems," European Journal of Operational Research, Elsevier, vol. 186(2), pages 856-881, April.

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:eee:reensy:v:138:y:2015:i:c:p:93-104. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Catherine Liu (email available below). General contact details of provider: https://www.journals.elsevier.com/reliability-engineering-and-system-safety .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.