Modeling and mitigating the effects of supply chain disruption in a defender–attacker game

被引:0
作者
Jie Xu
Jun Zhuang
Zigeng Liu
机构
[1] SUNY at Buffalo,Department of Industrial and Systems Engineering
[2] Northwestern University,Department of Physics and Astronomy
来源
Annals of Operations Research | 2016年 / 236卷
关键词
Supply chain disruption; Defender–attacker game; Pre-disruption protection;
D O I
暂无
中图分类号
学科分类号
摘要
The outcomes of a defender–attacker game depend on the defender’s resources delivered through military supply chains. These are subject to disruptions from various sources, such as natural disasters, social disasters, and terrorism. The attacker and defender are at war; the defender needs resources to defeat the attacker, but those resources may not be available due to a supply chain disruption that occurs exogenously to the game. In this paper, we integrate a defender–attacker game with supply chain risk management, and study the defender’s optimal preparation strategy. We provide analytical solutions, conduct numerical analysis, and compare the combined strategy with other protection strategies. Our results indicate that: (a) the defender benefits in a defender–attacker game by utilizing supply chain risk management tools; and (b) the attacker’s best response resource allocation would not be deterred by capacity backup protection and/or inventory protection. The feature of this paper is that the defender, being the downstream user of the supply chain, is involved in a strategic contest against the attacker. This model is different than game theory applied to private-sector supply chains because most game theoretic models of private sector supply chains usually explore relationships between suppliers and firms in the same supply chain or between multiple firms competing in the marketplace for customers. Therefore, supply chain risk management for such a military application imposes effects that have not been studied before.
引用
收藏
页码:255 / 270
页数:15
相关论文
共 37 条
[1]  
Bier VM(2011)Analytical method to identify the number of containers to inspect at us ports to deter terrorist attacks Annals of Operations Research 187 137-158
[2]  
Haphuriwat N(2005)Protection of simple series and parallel systems with components of different values Reliability Engineering and System Safety 87 315-323
[3]  
Bier VM(2007)The importance of decoupling recurrent and disruption risks in a supply chain Naval Research Logistics 54 544-555
[4]  
Nagaraj A(2004)Managing risk to avoid supply-chain breakdown MIT Sloan Management Review 46 53-61
[5]  
Abhichandani V(2004)Mitigating supply chain risk through improved confidence International Journal of Physical Distribution and Logistics Management 34 388-396
[6]  
Chopra S(2004)Building the resilient supply chain International Journal of Logistics Management 15 1-13
[7]  
Reinhardt G(2009)Adversarial risk analysis Journal of the American Statistical Association 104 841-854
[8]  
Mohan U(2013)Technology adoption, accumulation, and competition in multi-period attacker–defender games Military Operations Research 18 33-47
[9]  
Chopra S(2012)Modeling armed conflicts Science 336 865-869
[10]  
Sodhi MS(2012)Location-allocation planning of stockpiles for effective disaster mitigation Annals of Operations Research 196 469-490