IDEAS home Printed from https://ideas.repec.org/a/eee/transe/v197y2025ics1366554525000845.html
   My bibliography  Save this article

Coopetitive Resilience: Integrating Cyber Threat Intelligence Platforms in Critical Supply Chains

Author

Listed:
  • Arisian, Sobhan
  • Halat, Kourosh
  • Hafezalkotob, Ashkan
  • Maskey, Reenu

Abstract

This study proposes a novel contractual framework that integrates flexible cooperative procurement strategies within a Cyber Threat Intelligence Platform (CTIP) to address cyber-attack-induced disruptions in critical supply chains (CSCs). The framework examines the role of government in moderating CTIPs to facilitate information sharing, incentivize cybersecurity investments, and promote collaboration among competing CSCs. Our findings demonstrate the effectiveness of this approach in enhancing operational resilience while balancing profitability and economic welfare (EW). To validate these insights, we conduct a case study on cyber disruptions affecting Australia’s health and medical procurement sector. The results reveal that flexible minimum order quantity (MOQ) contracts provide greater EW benefits, particularly in high-risk environments, compared to fixed-quantity separate procurement models. Furthermore, this mechanism fosters coopetitive resilience by enabling CSCs to balance competition with cooperation, thereby strengthening their cyber readiness and collective ability to mitigate disruptions. Adjusting MOQ thresholds, government subsidies, and the level of cyber intelligence sharing may further enhance these benefits. Aligning CTIP regulations and targeted interventions with the distinct risk profiles of firms is crucial for optimizing outcomes in the face of cyber disruptions. This approach is particularly vital in critical sectors such as food, pharmaceuticals, and healthcare, where the timely availability of products is essential to safeguarding public safety and health.

Suggested Citation

  • Arisian, Sobhan & Halat, Kourosh & Hafezalkotob, Ashkan & Maskey, Reenu, 2025. "Coopetitive Resilience: Integrating Cyber Threat Intelligence Platforms in Critical Supply Chains," Transportation Research Part E: Logistics and Transportation Review, Elsevier, vol. 197(C).
  • Handle: RePEc:eee:transe:v:197:y:2025:i:c:s1366554525000845
    DOI: 10.1016/j.tre.2025.104043
    as

    Download full text from publisher

    File URL: http://www.sciencedirect.com/science/article/pii/S1366554525000845
    Download Restriction: Full text for ScienceDirect subscribers only

    File URL: https://libkey.io/10.1016/j.tre.2025.104043?utm_source=ideas
    LibKey link: if access is restricted and if your library uses this service, LibKey will redirect you to where you can use your library subscription to access this item
    ---><---

    As the access to this document is restricted, you may want to search for a different version of it.

    References listed on IDEAS

    as
    1. Schilling, Andreas & Werners, Brigitte, 2016. "Optimal selection of IT security safeguards from an existing knowledge base," European Journal of Operational Research, Elsevier, vol. 248(1), pages 318-327.
    2. Yanhui Li & Lu Xu, 2021. "Cybersecurity investments in a two-echelon supply chain with third-party risk propagation," International Journal of Production Research, Taylor & Francis Journals, vol. 59(4), pages 1216-1238, February.
    3. Rezaei Somarin, Aghil & Chen, Songlin & Asian, Sobhan & Wang, David Z.W., 2017. "A heuristic stock allocation rule for repairable service parts," International Journal of Production Economics, Elsevier, vol. 184(C), pages 131-140.
    4. Anderson, Simon P. & Renault, Regis, 2003. "Efficiency and surplus bounds in Cournot competition," Journal of Economic Theory, Elsevier, vol. 113(2), pages 253-264, December.
    5. Pinar Keskinocak & Seçil Savaşaneril, 2008. "Collaborative procurement among competing buyers," Naval Research Logistics (NRL), John Wiley & Sons, vol. 55(6), pages 516-540, September.
    6. Ali Pala & Jun Zhuang, 2019. "Information Sharing in Cybersecurity: A Review," Decision Analysis, INFORMS, vol. 16(3), pages 172-196, September.
    7. Esther Gal-Or & Anindya Ghose, 2005. "The Economic Incentives for Sharing Security Information," Information Systems Research, INFORMS, vol. 16(2), pages 186-208, June.
    8. Cheung, Kam-Fung & Bell, Michael G.H. & Bhattacharjya, Jyotirmoyee, 2021. "Cybersecurity in logistics and supply chain management: An overview and future research directions," Transportation Research Part E: Logistics and Transportation Review, Elsevier, vol. 146(C).
    9. Ravi Anupindi & Ram Akella, 1993. "Diversification Under Supply Uncertainty," Management Science, INFORMS, vol. 39(8), pages 944-963, August.
    10. Tadeusz Sawik, 2022. "Balancing cybersecurity in a supply chain under direct and indirect cyber risks," International Journal of Production Research, Taylor & Francis Journals, vol. 60(2), pages 766-782, January.
    11. Krishnan S. Anand & Ravi Aron, 2003. "Group Buying on the Web: A Comparison of Price-Discovery Mechanisms," Management Science, INFORMS, vol. 49(11), pages 1546-1562, November.
    12. Julia Graf, 2014. "The effects of rebate contracts on the health care system," The European Journal of Health Economics, Springer;Deutsche Gesellschaft für Gesundheitsökonomie (DGGÖ), vol. 15(5), pages 477-487, June.
    13. Cheung, Kam-Fung & Bell, Michael G.H., 2021. "Attacker–defender model against quantal response adversaries for cyber security in logistics management: An introductory study," European Journal of Operational Research, Elsevier, vol. 291(2), pages 471-481.
    14. Kjell Hausken, 2006. "Returns to information security investment: The effect of alternative information security breach functions on optimal investment and sensitivity to vulnerability," Information Systems Frontiers, Springer, vol. 8(5), pages 338-349, December.
    15. Simon, Jay & Omar, Ayman, 2020. "Cybersecurity investments in the supply chain: Coordination and a strategic attacker," European Journal of Operational Research, Elsevier, vol. 282(1), pages 161-171.
    16. Bo He & He Huang & Kaifu Yuan, 2016. "Managing supply disruption through procurement strategy and price competition," International Journal of Production Research, Taylor & Francis Journals, vol. 54(7), pages 1980-1999, April.
    17. Luyi Gui & Christopher S. Tang & Shuya Yin, 2019. "Improving Microretailer and Consumer Welfare in Developing Economies: Replenishment Strategies and Market Entries," Service Science, INFORMS, vol. 21(1), pages 231-250, January.
    18. Xiaomeng Luo & Jia Ren, 2020. "Optimal Supply Diversification Strategy under Supply Disruption," Mathematical Problems in Engineering, Hindawi, vol. 2020, pages 1-18, August.
    19. Berger, Paul D. & Gerstenfeld, Arthur & Zeng, Amy Z., 2004. "How many suppliers are best? A decision-analysis approach," Omega, Elsevier, vol. 32(1), pages 9-15, February.
    20. Linh Nguyen Khanh Duong & Josephine Chong, 2020. "Supply chain collaboration in the presence of disruptions: a literature review," International Journal of Production Research, Taylor & Francis Journals, vol. 58(11), pages 3488-3507, June.
    21. Silbermayr, Lena & Minner, Stefan, 2014. "A multiple sourcing inventory model under disruption risk," International Journal of Production Economics, Elsevier, vol. 149(C), pages 37-46.
    22. Kamalahmadi, Masoud & Parast, Mahour Mellat, 2017. "An assessment of supply chain disruption mitigation strategies," International Journal of Production Economics, Elsevier, vol. 184(C), pages 210-230.
    23. Yong Wu & Mengyao Xu & Dong Cheng & Tao Dai, 2022. "Information Security Strategies for Information-Sharing Firms Considering a Strategic Hacker," Decision Analysis, INFORMS, vol. 19(2), pages 99-122, June.
    24. Yang, Yu-Chen & Cheng, Hsing Kenneth & Ding, Chao & Li, Shengli, 2017. "To join or not to join group purchasing organization: A vendor's decision," European Journal of Operational Research, Elsevier, vol. 258(2), pages 581-589.
    25. Anna Nagurney & Patrizia Daniele & Shivani Shukla, 2017. "A supply chain network game theory model of cybersecurity investments with nonlinear budget constraints," Annals of Operations Research, Springer, vol. 248(1), pages 405-427, January.
    26. Zeng, Amy Z. & Xia, Yu, 2015. "Building a mutually beneficial partnership to ensure backup supply," Omega, Elsevier, vol. 52(C), pages 77-91.
    27. Xu Chen & Xiaojun Wang & Yusen Xia, 2019. "Production Coopetition Strategies for Competing Manufacturers that Produce Partially Substitutable Products," Production and Operations Management, Production and Operations Management Society, vol. 28(6), pages 1446-1464, June.
    28. Gordon, Lawrence A. & Loeb, Martin P. & Lucyshyn, William, 2003. "Sharing information on computer systems security: An economic analysis," Journal of Accounting and Public Policy, Elsevier, vol. 22(6), pages 461-485.
    29. Aghil Rezaei Somarin & Sobhan Asian & Fariborz Jolai & Songlin Chen, 2018. "Flexibility in service parts supply chain: a study on emergency resupply in aviation MRO," International Journal of Production Research, Taylor & Francis Journals, vol. 56(10), pages 3547-3562, May.
    30. Zhibin (Ben) Yang & Göker Ayd{i}n & Volodymyr Babich & Damian R. Beil, 2009. "Supply Disruptions, Asymmetric Information, and a Backup Production Option," Management Science, INFORMS, vol. 55(2), pages 192-209, February.
    31. Ozge Tuncel & Niyazi Taneri & Sameer Hasija, 2022. "Why Are Minimum Order Quantity Contracts Popular in Practice? A Behavioral Investigation," Manufacturing & Service Operations Management, INFORMS, vol. 24(4), pages 2166-2182, July.
    32. Yu, Haisheng & Zeng, Amy Z. & Zhao, Lindu, 2009. "Single or dual sourcing: decision-making in the presence of supply chain disruption risks," Omega, Elsevier, vol. 37(4), pages 788-800, August.
    33. Yixin Zhang & Xifu Wang, 2019. "Procurement Strategy with Backup Sourcing under Stochastic Supply Risk," Complexity, Hindawi, vol. 2019, pages 1-15, March.
    34. Paul, Jomon A. & Zhang, Minjiao, 2021. "Decision support model for cybersecurity risk planning: A two-stage stochastic programming framework featuring firms, government, and attacker," European Journal of Operational Research, Elsevier, vol. 291(1), pages 349-364.
    35. Sheu, Jiuh-Biing & Gao, Xiao-Qin, 2014. "Alliance or no alliance—Bargaining power in competing reverse supply chains," European Journal of Operational Research, Elsevier, vol. 233(2), pages 313-325.
    36. Gyöngyi Kovács & Ioanna Falagara Sigala, 2021. "Lessons learned from humanitarian logistics to manage supply chain disruptions," Journal of Supply Chain Management, Institute for Supply Management, vol. 57(1), pages 41-49, January.
    37. Sting, Fabian J. & Huchzermeier, Arnd, 2010. "Ensuring responsive capacity: How to contract with backup suppliers," European Journal of Operational Research, Elsevier, vol. 207(2), pages 725-735, December.
    38. Asian, Sobhan & Wang, Jian & Dickson, Geoff, 2020. "Trade disruptions, behavioral biases, and social influences: Can luxury sporting goods supply chains be immunized?," Transportation Research Part E: Logistics and Transportation Review, Elsevier, vol. 143(C).
    39. Lawrence V. Snyder & Zümbül Atan & Peng Peng & Ying Rong & Amanda J. Schmitt & Burcu Sinsoysal, 2016. "OR/MS models for supply chain disruptions: a review," IISE Transactions, Taylor & Francis Journals, vol. 48(2), pages 89-109, February.
    40. Soroush Saghafian & Mark Van Oyen, 2012. "The value of flexible backup suppliers and disruption risk information: newsvendor analysis with recourse," IISE Transactions, Taylor & Francis Journals, vol. 44(10), pages 834-867.
    41. Sarang Deo & Charles J. Corbett, 2009. "Cournot Competition Under Yield Uncertainty: The Case of the U.S. Influenza Vaccine Market," Manufacturing & Service Operations Management, INFORMS, vol. 11(4), pages 563-576, July.
    Full references (including those not matched with items on IDEAS)

    Most related items

    These are the items that most often cite the same works as this one and are cited by the same works as this one.
    1. Kaur, Harpreet & Gupta, Mahima & Singh, Surya Prakash, 2024. "Integrated model to optimize supplier selection and investments for cyber resilience in digital supply chains," International Journal of Production Economics, Elsevier, vol. 275(C).
    2. Svoboda, Josef & Minner, Stefan & Yao, Man, 2021. "Typology and literature review on multiple supplier inventory control models," European Journal of Operational Research, Elsevier, vol. 293(1), pages 1-23.
    3. Paul, Jomon A. & Zhang, Minjiao, 2021. "Decision support model for cybersecurity risk planning: A two-stage stochastic programming framework featuring firms, government, and attacker," European Journal of Operational Research, Elsevier, vol. 291(1), pages 349-364.
    4. Hausken, Kjell, 2024. "Fifty Years of Operations Research in Defense," European Journal of Operational Research, Elsevier, vol. 318(2), pages 355-368.
    5. Zeng, Amy Z. & Xia, Yu, 2015. "Building a mutually beneficial partnership to ensure backup supply," Omega, Elsevier, vol. 52(C), pages 77-91.
    6. Gupta, Varun & Ivanov, Dmitry & Choi, Tsan-Ming, 2021. "Competitive pricing of substitute products under supply disruption," Omega, Elsevier, vol. 101(C).
    7. Hosseini, Seyedmohsen & Ivanov, Dmitry & Dolgui, Alexandre, 2019. "Review of quantitative methods for supply chain resilience analysis," Transportation Research Part E: Logistics and Transportation Review, Elsevier, vol. 125(C), pages 285-307.
    8. Basu, Preetam & Avittathur, Balram, 2018. "Pricing and sourcing strategies for competing retailers in supply chains under disruption riskAuthor-Name: Kumar, Milan," European Journal of Operational Research, Elsevier, vol. 265(2), pages 533-543.
    9. Gökçe Esenduran & John V. Gray & Burcu Tan, 2022. "A Dynamic Analysis of Supply Chain Risk Management and Extended Payment Terms," Production and Operations Management, Production and Operations Management Society, vol. 31(3), pages 1394-1417, March.
    10. Faiza Hamdi & Ahmed Ghorbel & Faouzi Masmoudi & Lionel Dupont, 2018. "Optimization of a supply portfolio in the context of supply chain risk management: literature review," Journal of Intelligent Manufacturing, Springer, vol. 29(4), pages 763-788, April.
    11. Du, Shaofu & Sun, Xiahui & Hu, Li & Choi, Tsan-Ming, 2025. "Does the quantity discount mechanism offer a loophole for retailer collusion? Impacts and responses," European Journal of Operational Research, Elsevier, vol. 323(3), pages 999-1012.
    12. Xiaodan Jin & Hong Zhou, 2022. "Incentives to Enhance Production Reliability against Disruption: Cost-Sharing vs. Penalty," Sustainability, MDPI, vol. 14(15), pages 1-18, July.
    13. Yixin Zhang & Xifu Wang, 2019. "Procurement Strategy with Backup Sourcing under Stochastic Supply Risk," Complexity, Hindawi, vol. 2019, pages 1-15, March.
    14. Levitin, Gregory & Hausken, Kjell & Taboada, Heidi A. & Coit, David W., 2012. "Data survivability vs. security in information systems," Reliability Engineering and System Safety, Elsevier, vol. 100(C), pages 19-27.
    15. Süleyman Demirel & Roman Kapuscinski & Man Yu, 2018. "Strategic Behavior of Suppliers in the Face of Production Disruptions," Management Science, INFORMS, vol. 64(2), pages 533-551, February.
    16. Alessandro Fedele & Cristian Roner, 2022. "Dangerous games: A literature review on cybersecurity investments," Journal of Economic Surveys, Wiley Blackwell, vol. 36(1), pages 157-187, February.
    17. Zhitao Xu & Adel Elomri & Roberto Baldacci & Laoucine Kerbache & Zhenyong Wu, 2024. "Frontiers and trends of supply chain optimization in the age of industry 4.0: an operations research perspective," Annals of Operations Research, Springer, vol. 338(2), pages 1359-1401, July.
    18. Lu Xu & Yanhui Li & Qi Yao, 2022. "Information security investment and purchase decision for personalized products," Managerial and Decision Economics, John Wiley & Sons, Ltd., vol. 43(6), pages 2619-2635, September.
    19. Huang, He & Xu, Hongyan, 2015. "Dual sourcing and backup production: Coexistence versus exclusivity," Omega, Elsevier, vol. 57(PA), pages 22-33.
    20. Yong Wu & Mengyao Xu & Dong Cheng & Tao Dai, 2022. "Information Security Strategies for Information-Sharing Firms Considering a Strategic Hacker," Decision Analysis, INFORMS, vol. 19(2), pages 99-122, June.

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:eee:transe:v:197:y:2025:i:c:s1366554525000845. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Catherine Liu (email available below). General contact details of provider: http://www.elsevier.com/wps/find/journaldescription.cws_home/600244/description#description .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.