Supply Chain Threats and Countermeasures: From Elicitation through Optimization

Weihong Guo, Paul Kantor, Elsayed A. Elsayed, Eric Rosenberg, Rong Lei, Sachin Patel, Brendan Ruskey, Fred S. Roberts

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2 Scopus citations

Abstract

There are many checklists for improving supply chain resilience under different threats, but a lack of concrete procedures to rigorously assess and select among countermeasures (CMs). We present a novel process and method to elicit the needed information to identify CMs and assess their ability to reduce risk. We report on the fine-grained analysis underlying an effective simulation developed to model both the impact of threats and the impact of alternative CMs in the information and communication technology supply chain subject to disruptions due to natural hazards. We also describe the coarse-grained descriptions needed to elicit risk reduction estimates from subject matter experts, and the problems of integrating these two approaches, bottom up, and top down, to support management decisions to choose an optimal set of CMs given a limited budget.

Original languageEnglish (US)
Title of host publicationProceedings of the 55th Annual Hawaii International Conference on System Sciences, HICSS 2022
EditorsTung X. Bui
PublisherIEEE Computer Society
Pages2300-2309
Number of pages10
ISBN (Electronic)9780998133157
StatePublished - 2022
Event55th Annual Hawaii International Conference on System Sciences, HICSS 2022 - Virtual, Online, United States
Duration: Jan 3 2022Jan 7 2022

Publication series

NameProceedings of the Annual Hawaii International Conference on System Sciences
Volume2022-January
ISSN (Print)1530-1605

Conference

Conference55th Annual Hawaii International Conference on System Sciences, HICSS 2022
Country/TerritoryUnited States
CityVirtual, Online
Period1/3/221/7/22

All Science Journal Classification (ASJC) codes

  • General Engineering

Fingerprint

Dive into the research topics of 'Supply Chain Threats and Countermeasures: From Elicitation through Optimization'. Together they form a unique fingerprint.

Cite this