Volume 39 Issue 4
Jul.  2024
Turn off MathJax
Article Contents
CUI Zi-bin, DU Cheng-ming, FENG Ze-hua. Government Regulation Analysis in Smart Product Supply Chains under Cybersecurity Risks[J]. Journal of Guangdong University of Finance & Economics, 2024, 39(4): 85-96.
Citation: CUI Zi-bin, DU Cheng-ming, FENG Ze-hua. Government Regulation Analysis in Smart Product Supply Chains under Cybersecurity Risks[J]. Journal of Guangdong University of Finance & Economics, 2024, 39(4): 85-96.

Government Regulation Analysis in Smart Product Supply Chains under Cybersecurity Risks

  • Received Date: 2024-04-11
    Available Online: 2024-08-27
  • Publish Date: 2024-07-28
  • With the widespread application of the Internet of Things (IoT) technology and the popularity of smart products, issues related to cybersecurity and user data privacy have garnered widespread societal attention, making it crucial for governments to adopt appropriate regulatory strategies to mitigate cybersecurity risks. This paper considers a smart product supply chain composed of a manufacturer and an e-tailing platform. A game-theoretic model was employed to investigate the government's regulatory strategies (punishing or subsidizing) and its impact on firms and consumers under cybersecurity risks. The findings indicate that the cyber defense level under the subsidizing policy is higher than that under the punishing policy only when the subsidy ratio is significantly high; both punishing and subsidizing policies can achieve an all-win situation for the manufacturer, the platform, and consumers, contingent on two parameters: the marginal information value and the unit penalty; moreover, the government should choose the punishing policy when both the marginal information value and the unit penalty are high, and choose the subsidizing policy when either the marginal information value or the unit penalty is low. It is found that both high penalties and subsidies are beneficial to societal welfare. This research provides a theoretical basis and policy implications for government regulation, emphasizing the need to consider various influencing factors when choosing regulatory strategies to foster the healthy development of the smart product supply chain and enhance cybersecurity levels.
  • loading
  • [1]
    杨燕红, 何大安. 中国物联网产业政策演变、内在逻辑与发展趋向——基于政策文本计量分析的方法[J]. 经济与管理, 2022(2): 27-35. https://www.cnki.com.cn/Article/CJFDTOTAL-JJGL202202004.htm
    [2]
    郭艳光. 零售供应链中物联网技术采纳的影响因素测度[J]. 商业经济研究, 2023(21): 89-92. doi: 10.3969/j.issn.1002-5863.2023.21.022
    [3]
    徐春秋, 李欣欣. 电商企业销售模式选择及直播开通条件分析[J]. 经济与管理, 2022(2): 69-76. https://www.cnki.com.cn/Article/CJFDTOTAL-JJGL202202009.htm
    [4]
    刘百灵, 孙文静. 沟通隐私管理理论整体视角下移动用户信息披露决策的过程研究[J]. 管理科学, 2021(6): 76-87. https://www.cnki.com.cn/Article/CJFDTOTAL-JCJJ202106009.htm
    [5]
    潘崇霞, 仲伟俊, 梅姝娥. 不同攻击类型下风险厌恶型企业信息安全投资策略[J]. 系统工程学报, 2019(4): 497-510. https://www.cnki.com.cn/Article/CJFDTOTAL-XTGC201904006.htm
    [6]
    LIU W, LONG S, XIE D, et al. How to govern the big data discriminatory pricing behavior in the platform service supply chain? an examination with a three-party evolutionary game model[J]. International Journal of Production Economics, 2021, 231: 107910. doi: 10.1016/j.ijpe.2020.107910
    [7]
    NIU B, CHEN L, ZHANG J. Punishing or subsidizing? regulation analysis of sustainable fashion procurement strategies[J]. Transportation Research Part E: Logistics and Transportation Review, 2017, 107: 81-96. doi: 10.1016/j.tre.2017.09.010
    [8]
    崔淑洁. 数据权属界定及"卡-梅框架"下数据保护利用规则体系构建[J]. 广东财经大学学报, 2020(6): 78-87. http://xb.gdufe.edu.cn/article/id/751e7e9d-169f-4b33-b6db-00e1da9317c8
    [9]
    许国艺. 政府研发补贴的差异化互补效应及政策启示[J]. 广东财经大学学报, 2015(2): 15-21, 35. https://www.cnki.com.cn/Article/CJFDTOTAL-SONG201502002.htm
    [10]
    门中敬, 李瑾. 数据安全风险的社会自我规制及其合宪性控制[J]. 法学论坛, 2024(2): 80-92. https://www.cnki.com.cn/Article/CJFDTOTAL-SDFX202402007.htm
    [11]
    曹鑫, 欧阳桃花, 黄江明. 智能互联产品重塑企业边界研究: 小米案例[J]. 管理世界, 2022(4): 125-142. https://www.cnki.com.cn/Article/CJFDTOTAL-GLSJ202204009.htm
    [12]
    董晓松, 曹雯莉, 吴雪. 制造业智能产品生态系统协同机制与升级路径研究[J]. 管理工程学报, 2023(6): 8-19. https://www.cnki.com.cn/Article/CJFDTOTAL-GLGU202306002.htm
    [13]
    ZHANG J, SHU H. Research on the sales mode selection of smart homing firms considering carbon neutrality and digital privacy[J]. Journal of Cleaner Production, 2023, 422: 138530.
    [14]
    YANG M, JACOB V S, RAGHUNATHAN S. Cloud service model's role in provider and user security investment incentives[J]. Production and Operations Management, 2021, 30(2): 419-437.
    [15]
    SIMON J, OMAR A. Cybersecurity investments in the supply chain: Coordination and a strategic attacker[J]. European Journal of Operational Research, 2020, 282(1): 161-171.
    [16]
    CHEUNG K-F, BELL M G. Attacker-defender model against quantal response adversaries for cyber security in logistics management: an introductory study[J]. European Journal of Operational Research, 2021, 291(2): 471-481.
    [17]
    李秀峰, 李波, 李勇建. 智能产品创新中物联网平台转移支付与政府补贴策略研究[J]. 系统工程理论与实践, 2024(1): 356-373. https://www.cnki.com.cn/Article/CJFDTOTAL-XTLL202401018.htm
    [18]
    JIANG Z-Z, HE N, HUANG S. Government penalty provision and contracting with asymmetric quality information in a bioenergy supply chain[J]. Transportation Research Part E: Logistics and Transportation Review, 2021, 154: 102481.
    [19]
    YU J J, TANG C S, SHEN Z-J M. Improving consumer welfare and manufacturer profit via government subsidy programs: sbsidizing consumers or manufacturers?[J]. Manufacturing & service operations management, 2018, 20(4): 752-766.
    [20]
    NIE F, LI X, ZHOU C. Impact of privacy regulation involving information collection on the ride-hailing market[J]. Omega, 2024: 103077.
    [21]
    SUN C, JI Y. For better or for worse: impacts of IoT technology in e-commerce channel[J]. Production and Operations Management, 2022, 31(3): 1353-1371.
    [22]
    顾建强, 梅姝娥, 仲伟俊. 基于网络安全保险的信息系统安全投资激励机制[J]. 系统工程理论与实践, 2015(4): 1057-1062. https://www.cnki.com.cn/Article/CJFDTOTAL-XTLL201504029.htm
    [23]
    LUO S, CHOI T M. E-commerce supply chains with considerations of cyber-security: should governments play a role?[J]. Production and Operations Management, 2022, 31(5): 2107-2126.
    [24]
    YU L, HE X, ZHANG J, et al. Horizontal cooperative advertising with advertising threshold effects[J]. Omega, 2021, 98: 102104.
    [25]
    ZHANG X, LI G, LIU M, et al. Online platform service investment: a bane or a boon for supplier encroachment[J]. International Journal of Production Economics, 2021, 235: 108079.
    [26]
    PUN H, SWAMINATHAN J M, HOU P. Blockchain adoption for combating deceptive counterfeits[J]. Production and Operations Management, 2021, 30(4): 864-882.
    [27]
    HE P, HE Y, XU H. Buy-online-and-deliver-from-store strategy for a dual-channel supply chain considering retailer's location advantage[J]. Transportation Research Part E: Logistics and Transportation Review, 2020, 144: 102127.
    [28]
    LIANG Y, LIU W, LI K W, et al. A co-opetitive game analysis of platform compatibility strategies under add-on services[J]. Production and Operations Management, 2023, 32(11): 3541-3558.
    [29]
    柳键, 曾剑锋. 征收补偿政策对家电逆向供应链运营策略与绩效的影响[J]. 广东财经大学学报, 2014(5): 27-39. https://www.cnki.com.cn/Article/CJFDTOTAL-SONG201405005.htm
    [30]
    ZHONG Y, YANG T, YU H, et al. Impacts of blockchain technology with government subsidies on a dual-channel supply chain for tracing product information[J]. Transportation Research Part E: Logistics and Transportation Review, 2023, 171: 103032.
    [31]
    柴泽阳, 孔令丞. 从共建到共赢: 长三角开发区合作的经济效应研究[J]. 安徽师范大学学报(人文社会科学版), 2023(6): 125-135. https://www.cnki.com.cn/Article/CJFDTOTAL-AHSD202306014.htm
  • 加载中

Catalog

    通讯作者: 陈斌, bchen63@163.com
    • 1. 

      沈阳化工大学材料科学与工程学院 沈阳 110142

    1. 本站搜索
    2. 百度学术搜索
    3. 万方数据库搜索
    4. CNKI搜索

    Figures(5)  / Tables(1)

    Article Metrics

    Article Views(122) PDF Downloads(14) Cited by()
    Proportional views
    Related

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return