SlideShare a Scribd company logo
1 of 16
1
JĀNIS GRABIS
Winter Simulation Conference 2020
Simulation Drives Innovation
December 14-18
Product Life-Cycle
Perspective on ICT Product
Supply Chain Resilience
Institute of Information Technology, Riga Technical University, Latvia
22
 Background & Related Work
 Objective
 Supply chain configuration model
 Experiments
 Conclusion
Outline
33
Background
Software component no
longer update > Security
threat
ICT product using unsecured
component
 ICT product supply
chain have tight
coupling between
product design and
supply chain
configuration
 ICT products have
a limited life cycle,
and security
updates are
provided for a
limited period of
time
 Supply chain configuration defines
supply chain participants and
relationships among them
 Resilient supply chains are able to
cope with disturbances efficiently
44
 Network theory
– Perera et al. (2017)
– Arora and Ventresca (2018)
– Mari et al. (2015a)
 Simulation
– Cigolini et al. (2014)
– Pero et al. (2010)
– Carvalho et al. (2012)
 Information systems
– Cigolini et al. (2014)
– Mari et al. (2015b)
Related Work
55
 To identify relationships between the ICT
product supply chain configuration and its
resilience to vulnerabilities discovered in
components provided by suppliers
– Analysis by means of simulation
– Experimentation as a step towards theory
building on ICT product supply chain
resilience
Objective
66
Supply Chain Configuration
77
 The ICT product has a fixed-length life cycle
 Vulnerabilities are discovered at random time periods
 Vulnerabilities are eliminated by applying a patch
 If a vulnerability concerns a component, then only this
component is patched
 If a vulnerability concerns the supplier, then all
components provided by the supplier are patched (or
replaced)
 A company can opt for not patching the vulnerabilities
and accepting penalty for that
 In order to discover vulnerabilities, suppliers should be
monitored resulting in the monitoring cost per supplier
Model: Assumptions
88
 The ICT product supply chain D consists of
the focal company F and its suppliers
– X and Y represents occurrence of vulnerabilities
 The cost of running a resilient supply chain
– Cost of patching (PC)
– Penalty for running
unpatched system
(NP)
– Cost of monitoring
the suppliers (MC)
Model: Formulation
TC PC NC MC  
 1 1 1 1
T J I I
t ij jt itt j i i
PC v Z c Y X   
    
  1 1 1 1
1
T J I I
t ij jt itt j i i
NC p T t c Y X   
       
MC m J 
99
1. The model parameters are initialized.
2. For each time period proceed with Step 3.
3. For each supplier generate supplier failure
with probability p1 taking into account the
number of periods. If not failed then Yjt = 0
and go to Step 4, otherwise Yjt = 1 and:
If Zt is true as calculated in (5), then all components for the
given supplier are patched and the patching cost are
applied;
If Zt is not true (i.e., Ωt is true), then ignore the vulnerability and
incur the not-patching penalty for all components provided
by the given supplier.
4. For each component generate a
component failure with probability p2
taking into account the number of periods.
If not failed, then Xit=0 and go to Step 5,
otherwise Xit=1 and:
If Zt is true, then patch the given component and incur the
patching cost;
If Zt is not true, then ignore the vulnerability and incur the not-
patching penalty for the component.
5. Go back to Step 3 unless all suppliers are
considered.
6. Go back to Step 2 unless the end of the
product life cycle is reached.
7. Calculate the final values of the
performance measures (1).
Model: Simulation
Time
ICT product
Supplier
vulnerability
Component
vulnerability
Patch all supplier’s
components
Patch component
Time
ICT product
Patch
Not patch
Patched product
version
Original product
version
1010
 What is the impact of patching cost, not-patching penalty, and monitoring
cost on the total cost of treating vulnerabilities?
 Which ICT product supply chain configuration type is the most resilient
according to its ability to deal with vulnerabilities?
 Is the choice between patching and not patching affected by the
configuration?
Experiments
# Factor Values Description
1 D D1, D2, D3 Supply chain configuration
2 l 2.5, 5 Not-patching penalty
multiplier
3 m 0.25, 0.5 Monitoring cost multiplier
4 p1 0.05, 0.1, 0.2 Supplier failure probability
5 p 2 0.1, 0.25, 0.5 Component failure probability
11
Cost distribution according to the
configuration
D1 - dominant supplier configuration
D2 - flexible configuration
D3 - dedicated suppliers configuration
MC – the monitoring cost
SC – the cost due to suppliers' failure
CC – the cost due to components' failure
1212
Monitoring Cost
13
By component failure
probability
By supplier failure
probability
Failure Probability
14
D1 configuration, low patching and
monitoring cost
D3 configuration, low patching and
high monitoring cost
Dynamics of patching and not-
patching cost over the life cycle
PC – the cost of patching vulnerabilities
NC – the penalty for not-patching vulnerabilities
MC – the monitoring cost
1515
 Flexible configurations are the most resilient
 Supplier failures cause more significant variations in
supply chain performance
– Trustworthiness of partners
 Monitoring
– Component trustworthiness
– Supplier trustworthiness
 Extensions
– More complex supply chain configuration
– More complex product structures to account for
interdependencies among the components
– Exploitation of vulnerabilities to better understand relations
between patching and not-patching options
Conclusion
16
grabis@rtu.lv
http://iti.rtu.lv/vitk/lv/katedra/darbinieki/janis-grabis
Thank you!

More Related Content

Similar to Product Life-Cycle Perspective on ICT Product Supply Chain Resilience

Product complexity and supply chain design.
 Product complexity and supply chain design. Product complexity and supply chain design.
Product complexity and supply chain design.mohammad beykzadeh
 
New Microsoft Office PowerPoint Presentation
New Microsoft Office PowerPoint PresentationNew Microsoft Office PowerPoint Presentation
New Microsoft Office PowerPoint Presentationmohammad beykzadeh
 
Estimating Reliability of Power Factor Correction Circuits: A Comparative Study
Estimating Reliability of Power Factor Correction Circuits: A Comparative StudyEstimating Reliability of Power Factor Correction Circuits: A Comparative Study
Estimating Reliability of Power Factor Correction Circuits: A Comparative StudyIJERA Editor
 
CLASS 2018 - Palestra de Julio Oliveira (Gerente de Tecnologia, Power Grids G...
CLASS 2018 - Palestra de Julio Oliveira (Gerente de Tecnologia, Power Grids G...CLASS 2018 - Palestra de Julio Oliveira (Gerente de Tecnologia, Power Grids G...
CLASS 2018 - Palestra de Julio Oliveira (Gerente de Tecnologia, Power Grids G...TI Safe
 
Vibration Analysis for condition Monitoring & Predictive Maintenance using Em...
Vibration Analysis for condition Monitoring & Predictive Maintenance using Em...Vibration Analysis for condition Monitoring & Predictive Maintenance using Em...
Vibration Analysis for condition Monitoring & Predictive Maintenance using Em...IRJET Journal
 
Digital Procurement in the Nuclear Industry: Tips on Embracing New Technologies
Digital Procurement in the Nuclear Industry: Tips on Embracing New TechnologiesDigital Procurement in the Nuclear Industry: Tips on Embracing New Technologies
Digital Procurement in the Nuclear Industry: Tips on Embracing New TechnologiesATC
 
Sensor Fault Detection in IoT System Using Machine Learning
Sensor Fault Detection in IoT System Using Machine LearningSensor Fault Detection in IoT System Using Machine Learning
Sensor Fault Detection in IoT System Using Machine LearningIRJET Journal
 
Industrial Mains Power Monitoring and Alert System Over LAN Network
Industrial Mains Power Monitoring and Alert System Over LAN NetworkIndustrial Mains Power Monitoring and Alert System Over LAN Network
Industrial Mains Power Monitoring and Alert System Over LAN NetworkIRJET Journal
 
Guidelines to Understanding to estimate MTBF
Guidelines to Understanding to estimate MTBFGuidelines to Understanding to estimate MTBF
Guidelines to Understanding to estimate MTBFijsrd.com
 
TRAFFIC LIGHT PRIORITY FOR EMERGENCY VEHICLE
TRAFFIC LIGHT PRIORITY FOR EMERGENCY VEHICLETRAFFIC LIGHT PRIORITY FOR EMERGENCY VEHICLE
TRAFFIC LIGHT PRIORITY FOR EMERGENCY VEHICLEIRJET Journal
 
Incorporation of IoT in Assembly Line Monitoring System
Incorporation of IoT in Assembly Line Monitoring SystemIncorporation of IoT in Assembly Line Monitoring System
Incorporation of IoT in Assembly Line Monitoring SystemIRJET Journal
 
5 Techniques to Achieve Functional Safety for Embedded Systems
5 Techniques to Achieve Functional Safety for Embedded Systems5 Techniques to Achieve Functional Safety for Embedded Systems
5 Techniques to Achieve Functional Safety for Embedded SystemsAngela Hauber
 
5 Techniques to Achieve Functional Safety for Embedded Systems
5 Techniques to Achieve Functional Safety for Embedded Systems5 Techniques to Achieve Functional Safety for Embedded Systems
5 Techniques to Achieve Functional Safety for Embedded SystemsMEN Mikro Elektronik GmbH
 
5 Techniques to Achieve Functional Safety for Embedded Systems
5 Techniques to Achieve Functional Safety for Embedded Systems5 Techniques to Achieve Functional Safety for Embedded Systems
5 Techniques to Achieve Functional Safety for Embedded SystemsMEN Micro
 
IRJET- Secure Scheme For Cloud-Based Multimedia Content Storage
IRJET-  	  Secure Scheme For Cloud-Based Multimedia Content StorageIRJET-  	  Secure Scheme For Cloud-Based Multimedia Content Storage
IRJET- Secure Scheme For Cloud-Based Multimedia Content StorageIRJET Journal
 
"How Pirelli uses Domino and Plotly for Smart Manufacturing" by Alberto Arrig...
"How Pirelli uses Domino and Plotly for Smart Manufacturing" by Alberto Arrig..."How Pirelli uses Domino and Plotly for Smart Manufacturing" by Alberto Arrig...
"How Pirelli uses Domino and Plotly for Smart Manufacturing" by Alberto Arrig...Data Science Milan
 
Monte Carlo simulation convergences’ percentage and position in future relia...
Monte Carlo simulation convergences’ percentage and position  in future relia...Monte Carlo simulation convergences’ percentage and position  in future relia...
Monte Carlo simulation convergences’ percentage and position in future relia...IJECEIAES
 
IRJET- Windows Log Investigator System for Faster Root Cause Detection of a D...
IRJET- Windows Log Investigator System for Faster Root Cause Detection of a D...IRJET- Windows Log Investigator System for Faster Root Cause Detection of a D...
IRJET- Windows Log Investigator System for Faster Root Cause Detection of a D...IRJET Journal
 

Similar to Product Life-Cycle Perspective on ICT Product Supply Chain Resilience (20)

Product complexity and supply chain design.
 Product complexity and supply chain design. Product complexity and supply chain design.
Product complexity and supply chain design.
 
New Microsoft Office PowerPoint Presentation
New Microsoft Office PowerPoint PresentationNew Microsoft Office PowerPoint Presentation
New Microsoft Office PowerPoint Presentation
 
MANET
MANETMANET
MANET
 
Estimating Reliability of Power Factor Correction Circuits: A Comparative Study
Estimating Reliability of Power Factor Correction Circuits: A Comparative StudyEstimating Reliability of Power Factor Correction Circuits: A Comparative Study
Estimating Reliability of Power Factor Correction Circuits: A Comparative Study
 
CLASS 2018 - Palestra de Julio Oliveira (Gerente de Tecnologia, Power Grids G...
CLASS 2018 - Palestra de Julio Oliveira (Gerente de Tecnologia, Power Grids G...CLASS 2018 - Palestra de Julio Oliveira (Gerente de Tecnologia, Power Grids G...
CLASS 2018 - Palestra de Julio Oliveira (Gerente de Tecnologia, Power Grids G...
 
Vibration Analysis for condition Monitoring & Predictive Maintenance using Em...
Vibration Analysis for condition Monitoring & Predictive Maintenance using Em...Vibration Analysis for condition Monitoring & Predictive Maintenance using Em...
Vibration Analysis for condition Monitoring & Predictive Maintenance using Em...
 
Digital Procurement in the Nuclear Industry: Tips on Embracing New Technologies
Digital Procurement in the Nuclear Industry: Tips on Embracing New TechnologiesDigital Procurement in the Nuclear Industry: Tips on Embracing New Technologies
Digital Procurement in the Nuclear Industry: Tips on Embracing New Technologies
 
Costing ass4
Costing ass4Costing ass4
Costing ass4
 
Sensor Fault Detection in IoT System Using Machine Learning
Sensor Fault Detection in IoT System Using Machine LearningSensor Fault Detection in IoT System Using Machine Learning
Sensor Fault Detection in IoT System Using Machine Learning
 
Industrial Mains Power Monitoring and Alert System Over LAN Network
Industrial Mains Power Monitoring and Alert System Over LAN NetworkIndustrial Mains Power Monitoring and Alert System Over LAN Network
Industrial Mains Power Monitoring and Alert System Over LAN Network
 
Guidelines to Understanding to estimate MTBF
Guidelines to Understanding to estimate MTBFGuidelines to Understanding to estimate MTBF
Guidelines to Understanding to estimate MTBF
 
TRAFFIC LIGHT PRIORITY FOR EMERGENCY VEHICLE
TRAFFIC LIGHT PRIORITY FOR EMERGENCY VEHICLETRAFFIC LIGHT PRIORITY FOR EMERGENCY VEHICLE
TRAFFIC LIGHT PRIORITY FOR EMERGENCY VEHICLE
 
Incorporation of IoT in Assembly Line Monitoring System
Incorporation of IoT in Assembly Line Monitoring SystemIncorporation of IoT in Assembly Line Monitoring System
Incorporation of IoT in Assembly Line Monitoring System
 
5 Techniques to Achieve Functional Safety for Embedded Systems
5 Techniques to Achieve Functional Safety for Embedded Systems5 Techniques to Achieve Functional Safety for Embedded Systems
5 Techniques to Achieve Functional Safety for Embedded Systems
 
5 Techniques to Achieve Functional Safety for Embedded Systems
5 Techniques to Achieve Functional Safety for Embedded Systems5 Techniques to Achieve Functional Safety for Embedded Systems
5 Techniques to Achieve Functional Safety for Embedded Systems
 
5 Techniques to Achieve Functional Safety for Embedded Systems
5 Techniques to Achieve Functional Safety for Embedded Systems5 Techniques to Achieve Functional Safety for Embedded Systems
5 Techniques to Achieve Functional Safety for Embedded Systems
 
IRJET- Secure Scheme For Cloud-Based Multimedia Content Storage
IRJET-  	  Secure Scheme For Cloud-Based Multimedia Content StorageIRJET-  	  Secure Scheme For Cloud-Based Multimedia Content Storage
IRJET- Secure Scheme For Cloud-Based Multimedia Content Storage
 
"How Pirelli uses Domino and Plotly for Smart Manufacturing" by Alberto Arrig...
"How Pirelli uses Domino and Plotly for Smart Manufacturing" by Alberto Arrig..."How Pirelli uses Domino and Plotly for Smart Manufacturing" by Alberto Arrig...
"How Pirelli uses Domino and Plotly for Smart Manufacturing" by Alberto Arrig...
 
Monte Carlo simulation convergences’ percentage and position in future relia...
Monte Carlo simulation convergences’ percentage and position  in future relia...Monte Carlo simulation convergences’ percentage and position  in future relia...
Monte Carlo simulation convergences’ percentage and position in future relia...
 
IRJET- Windows Log Investigator System for Faster Root Cause Detection of a D...
IRJET- Windows Log Investigator System for Faster Root Cause Detection of a D...IRJET- Windows Log Investigator System for Faster Root Cause Detection of a D...
IRJET- Windows Log Investigator System for Faster Root Cause Detection of a D...
 

More from Jānis Grabis

Workplace Topology Model for Assessment of Static and Dynamic Interactions Am...
Workplace Topology Model for Assessment of Static and Dynamic Interactions Am...Workplace Topology Model for Assessment of Static and Dynamic Interactions Am...
Workplace Topology Model for Assessment of Static and Dynamic Interactions Am...Jānis Grabis
 
Workplace Topology Model for Assessment of Static and Dynamic Interactions Am...
Workplace Topology Model for Assessment of Static and Dynamic Interactions Am...Workplace Topology Model for Assessment of Static and Dynamic Interactions Am...
Workplace Topology Model for Assessment of Static and Dynamic Interactions Am...Jānis Grabis
 
Endurant Ecosystems: Model-based Assessment of Resilience of Digital Business...
Endurant Ecosystems: Model-based Assessment of Resilience of Digital Business...Endurant Ecosystems: Model-based Assessment of Resilience of Digital Business...
Endurant Ecosystems: Model-based Assessment of Resilience of Digital Business...Jānis Grabis
 
IoT Data Analytics in Retail: Framework and Implementation
IoT Data Analytics in Retail: Framework and ImplementationIoT Data Analytics in Retail: Framework and Implementation
IoT Data Analytics in Retail: Framework and ImplementationJānis Grabis
 
Blockchain Enabled Distributed Storage and Sharing of Personal Data Assets
Blockchain Enabled Distributed Storage and Sharing of Personal Data AssetsBlockchain Enabled Distributed Storage and Sharing of Personal Data Assets
Blockchain Enabled Distributed Storage and Sharing of Personal Data AssetsJānis Grabis
 
RTU Informācijas tehnoloģijas studiju programmas bakalaura darba izstrādes 2....
RTU Informācijas tehnoloģijas studiju programmas bakalaura darba izstrādes 2....RTU Informācijas tehnoloģijas studiju programmas bakalaura darba izstrādes 2....
RTU Informācijas tehnoloģijas studiju programmas bakalaura darba izstrādes 2....Jānis Grabis
 
Simulation Based Evaluation and Tuning of Distributed Fraud Detection Algorithm
Simulation Based Evaluation and Tuning of Distributed Fraud Detection AlgorithmSimulation Based Evaluation and Tuning of Distributed Fraud Detection Algorithm
Simulation Based Evaluation and Tuning of Distributed Fraud Detection AlgorithmJānis Grabis
 
Optimization of Gaps Resolution Strategy in Implementation of ERP Systems
Optimization of Gaps Resolution Strategy in Implementation of ERP SystemsOptimization of Gaps Resolution Strategy in Implementation of ERP Systems
Optimization of Gaps Resolution Strategy in Implementation of ERP SystemsJānis Grabis
 
Maģistra studijas informācijas tehnoloģijā
Maģistra studijas informācijas tehnoloģijāMaģistra studijas informācijas tehnoloģijā
Maģistra studijas informācijas tehnoloģijāJānis Grabis
 
A Mathematical Model for Evaluation of Data Analytics Implementation Alternat...
A Mathematical Model for Evaluation of Data Analytics Implementation Alternat...A Mathematical Model for Evaluation of Data Analytics Implementation Alternat...
A Mathematical Model for Evaluation of Data Analytics Implementation Alternat...Jānis Grabis
 
Near real-time big-data processing for data driven applications
Near real-time big-data processing for data driven applicationsNear real-time big-data processing for data driven applications
Near real-time big-data processing for data driven applicationsJānis Grabis
 
Promoting Collaborative Studies with Microsoft Dynamics Lifecycle Services
Promoting Collaborative Studies with Microsoft Dynamics Lifecycle ServicesPromoting Collaborative Studies with Microsoft Dynamics Lifecycle Services
Promoting Collaborative Studies with Microsoft Dynamics Lifecycle ServicesJānis Grabis
 
Design of Vehicle Routing Capability (ASDENCA 2017)
Design of Vehicle Routing Capability (ASDENCA 2017)Design of Vehicle Routing Capability (ASDENCA 2017)
Design of Vehicle Routing Capability (ASDENCA 2017)Jānis Grabis
 
Context-aware Customizable Routing Solution for Fleet Management
Context-aware Customizable Routing Solution for Fleet ManagementContext-aware Customizable Routing Solution for Fleet Management
Context-aware Customizable Routing Solution for Fleet ManagementJānis Grabis
 
Context-Aware Adaption of Software Entities Using Rules
Context-Aware Adaption of Software Entities Using RulesContext-Aware Adaption of Software Entities Using Rules
Context-Aware Adaption of Software Entities Using RulesJānis Grabis
 
Uzņemšana RTU Informācijas tehnoloģijas studiju programmā
Uzņemšana RTU Informācijas tehnoloģijas studiju programmāUzņemšana RTU Informācijas tehnoloģijas studiju programmā
Uzņemšana RTU Informācijas tehnoloģijas studiju programmāJānis Grabis
 
Design of Capability Delivery Adjustments @ASDENCA
Design of Capability Delivery Adjustments @ASDENCADesign of Capability Delivery Adjustments @ASDENCA
Design of Capability Delivery Adjustments @ASDENCAJānis Grabis
 
Selection and Evolutionary Development of Software-Service Bundles: a Capabil...
Selection and Evolutionary Development of Software-Service Bundles: a Capabil...Selection and Evolutionary Development of Software-Service Bundles: a Capabil...
Selection and Evolutionary Development of Software-Service Bundles: a Capabil...Jānis Grabis
 
CaaS Industry Day 2016
CaaS Industry Day 2016CaaS Industry Day 2016
CaaS Industry Day 2016Jānis Grabis
 

More from Jānis Grabis (20)

Workplace Topology Model for Assessment of Static and Dynamic Interactions Am...
Workplace Topology Model for Assessment of Static and Dynamic Interactions Am...Workplace Topology Model for Assessment of Static and Dynamic Interactions Am...
Workplace Topology Model for Assessment of Static and Dynamic Interactions Am...
 
Workplace Topology Model for Assessment of Static and Dynamic Interactions Am...
Workplace Topology Model for Assessment of Static and Dynamic Interactions Am...Workplace Topology Model for Assessment of Static and Dynamic Interactions Am...
Workplace Topology Model for Assessment of Static and Dynamic Interactions Am...
 
Endurant Ecosystems: Model-based Assessment of Resilience of Digital Business...
Endurant Ecosystems: Model-based Assessment of Resilience of Digital Business...Endurant Ecosystems: Model-based Assessment of Resilience of Digital Business...
Endurant Ecosystems: Model-based Assessment of Resilience of Digital Business...
 
PoEM 2020 Opening
PoEM 2020 OpeningPoEM 2020 Opening
PoEM 2020 Opening
 
IoT Data Analytics in Retail: Framework and Implementation
IoT Data Analytics in Retail: Framework and ImplementationIoT Data Analytics in Retail: Framework and Implementation
IoT Data Analytics in Retail: Framework and Implementation
 
Blockchain Enabled Distributed Storage and Sharing of Personal Data Assets
Blockchain Enabled Distributed Storage and Sharing of Personal Data AssetsBlockchain Enabled Distributed Storage and Sharing of Personal Data Assets
Blockchain Enabled Distributed Storage and Sharing of Personal Data Assets
 
RTU Informācijas tehnoloģijas studiju programmas bakalaura darba izstrādes 2....
RTU Informācijas tehnoloģijas studiju programmas bakalaura darba izstrādes 2....RTU Informācijas tehnoloģijas studiju programmas bakalaura darba izstrādes 2....
RTU Informācijas tehnoloģijas studiju programmas bakalaura darba izstrādes 2....
 
Simulation Based Evaluation and Tuning of Distributed Fraud Detection Algorithm
Simulation Based Evaluation and Tuning of Distributed Fraud Detection AlgorithmSimulation Based Evaluation and Tuning of Distributed Fraud Detection Algorithm
Simulation Based Evaluation and Tuning of Distributed Fraud Detection Algorithm
 
Optimization of Gaps Resolution Strategy in Implementation of ERP Systems
Optimization of Gaps Resolution Strategy in Implementation of ERP SystemsOptimization of Gaps Resolution Strategy in Implementation of ERP Systems
Optimization of Gaps Resolution Strategy in Implementation of ERP Systems
 
Maģistra studijas informācijas tehnoloģijā
Maģistra studijas informācijas tehnoloģijāMaģistra studijas informācijas tehnoloģijā
Maģistra studijas informācijas tehnoloģijā
 
A Mathematical Model for Evaluation of Data Analytics Implementation Alternat...
A Mathematical Model for Evaluation of Data Analytics Implementation Alternat...A Mathematical Model for Evaluation of Data Analytics Implementation Alternat...
A Mathematical Model for Evaluation of Data Analytics Implementation Alternat...
 
Near real-time big-data processing for data driven applications
Near real-time big-data processing for data driven applicationsNear real-time big-data processing for data driven applications
Near real-time big-data processing for data driven applications
 
Promoting Collaborative Studies with Microsoft Dynamics Lifecycle Services
Promoting Collaborative Studies with Microsoft Dynamics Lifecycle ServicesPromoting Collaborative Studies with Microsoft Dynamics Lifecycle Services
Promoting Collaborative Studies with Microsoft Dynamics Lifecycle Services
 
Design of Vehicle Routing Capability (ASDENCA 2017)
Design of Vehicle Routing Capability (ASDENCA 2017)Design of Vehicle Routing Capability (ASDENCA 2017)
Design of Vehicle Routing Capability (ASDENCA 2017)
 
Context-aware Customizable Routing Solution for Fleet Management
Context-aware Customizable Routing Solution for Fleet ManagementContext-aware Customizable Routing Solution for Fleet Management
Context-aware Customizable Routing Solution for Fleet Management
 
Context-Aware Adaption of Software Entities Using Rules
Context-Aware Adaption of Software Entities Using RulesContext-Aware Adaption of Software Entities Using Rules
Context-Aware Adaption of Software Entities Using Rules
 
Uzņemšana RTU Informācijas tehnoloģijas studiju programmā
Uzņemšana RTU Informācijas tehnoloģijas studiju programmāUzņemšana RTU Informācijas tehnoloģijas studiju programmā
Uzņemšana RTU Informācijas tehnoloģijas studiju programmā
 
Design of Capability Delivery Adjustments @ASDENCA
Design of Capability Delivery Adjustments @ASDENCADesign of Capability Delivery Adjustments @ASDENCA
Design of Capability Delivery Adjustments @ASDENCA
 
Selection and Evolutionary Development of Software-Service Bundles: a Capabil...
Selection and Evolutionary Development of Software-Service Bundles: a Capabil...Selection and Evolutionary Development of Software-Service Bundles: a Capabil...
Selection and Evolutionary Development of Software-Service Bundles: a Capabil...
 
CaaS Industry Day 2016
CaaS Industry Day 2016CaaS Industry Day 2016
CaaS Industry Day 2016
 

Recently uploaded

Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Neo4j
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDGMarianaLemus7
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 

Recently uploaded (20)

Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDG
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 

Product Life-Cycle Perspective on ICT Product Supply Chain Resilience

  • 1. 1 JĀNIS GRABIS Winter Simulation Conference 2020 Simulation Drives Innovation December 14-18 Product Life-Cycle Perspective on ICT Product Supply Chain Resilience Institute of Information Technology, Riga Technical University, Latvia
  • 2. 22  Background & Related Work  Objective  Supply chain configuration model  Experiments  Conclusion Outline
  • 3. 33 Background Software component no longer update > Security threat ICT product using unsecured component  ICT product supply chain have tight coupling between product design and supply chain configuration  ICT products have a limited life cycle, and security updates are provided for a limited period of time  Supply chain configuration defines supply chain participants and relationships among them  Resilient supply chains are able to cope with disturbances efficiently
  • 4. 44  Network theory – Perera et al. (2017) – Arora and Ventresca (2018) – Mari et al. (2015a)  Simulation – Cigolini et al. (2014) – Pero et al. (2010) – Carvalho et al. (2012)  Information systems – Cigolini et al. (2014) – Mari et al. (2015b) Related Work
  • 5. 55  To identify relationships between the ICT product supply chain configuration and its resilience to vulnerabilities discovered in components provided by suppliers – Analysis by means of simulation – Experimentation as a step towards theory building on ICT product supply chain resilience Objective
  • 7. 77  The ICT product has a fixed-length life cycle  Vulnerabilities are discovered at random time periods  Vulnerabilities are eliminated by applying a patch  If a vulnerability concerns a component, then only this component is patched  If a vulnerability concerns the supplier, then all components provided by the supplier are patched (or replaced)  A company can opt for not patching the vulnerabilities and accepting penalty for that  In order to discover vulnerabilities, suppliers should be monitored resulting in the monitoring cost per supplier Model: Assumptions
  • 8. 88  The ICT product supply chain D consists of the focal company F and its suppliers – X and Y represents occurrence of vulnerabilities  The cost of running a resilient supply chain – Cost of patching (PC) – Penalty for running unpatched system (NP) – Cost of monitoring the suppliers (MC) Model: Formulation TC PC NC MC    1 1 1 1 T J I I t ij jt itt j i i PC v Z c Y X           1 1 1 1 1 T J I I t ij jt itt j i i NC p T t c Y X            MC m J 
  • 9. 99 1. The model parameters are initialized. 2. For each time period proceed with Step 3. 3. For each supplier generate supplier failure with probability p1 taking into account the number of periods. If not failed then Yjt = 0 and go to Step 4, otherwise Yjt = 1 and: If Zt is true as calculated in (5), then all components for the given supplier are patched and the patching cost are applied; If Zt is not true (i.e., Ωt is true), then ignore the vulnerability and incur the not-patching penalty for all components provided by the given supplier. 4. For each component generate a component failure with probability p2 taking into account the number of periods. If not failed, then Xit=0 and go to Step 5, otherwise Xit=1 and: If Zt is true, then patch the given component and incur the patching cost; If Zt is not true, then ignore the vulnerability and incur the not- patching penalty for the component. 5. Go back to Step 3 unless all suppliers are considered. 6. Go back to Step 2 unless the end of the product life cycle is reached. 7. Calculate the final values of the performance measures (1). Model: Simulation Time ICT product Supplier vulnerability Component vulnerability Patch all supplier’s components Patch component Time ICT product Patch Not patch Patched product version Original product version
  • 10. 1010  What is the impact of patching cost, not-patching penalty, and monitoring cost on the total cost of treating vulnerabilities?  Which ICT product supply chain configuration type is the most resilient according to its ability to deal with vulnerabilities?  Is the choice between patching and not patching affected by the configuration? Experiments # Factor Values Description 1 D D1, D2, D3 Supply chain configuration 2 l 2.5, 5 Not-patching penalty multiplier 3 m 0.25, 0.5 Monitoring cost multiplier 4 p1 0.05, 0.1, 0.2 Supplier failure probability 5 p 2 0.1, 0.25, 0.5 Component failure probability
  • 11. 11 Cost distribution according to the configuration D1 - dominant supplier configuration D2 - flexible configuration D3 - dedicated suppliers configuration MC – the monitoring cost SC – the cost due to suppliers' failure CC – the cost due to components' failure
  • 13. 13 By component failure probability By supplier failure probability Failure Probability
  • 14. 14 D1 configuration, low patching and monitoring cost D3 configuration, low patching and high monitoring cost Dynamics of patching and not- patching cost over the life cycle PC – the cost of patching vulnerabilities NC – the penalty for not-patching vulnerabilities MC – the monitoring cost
  • 15. 1515  Flexible configurations are the most resilient  Supplier failures cause more significant variations in supply chain performance – Trustworthiness of partners  Monitoring – Component trustworthiness – Supplier trustworthiness  Extensions – More complex supply chain configuration – More complex product structures to account for interdependencies among the components – Exploitation of vulnerabilities to better understand relations between patching and not-patching options Conclusion

Editor's Notes

  1. Perera et al. (2017) review research on supply chain configuration from the network theory perspective. They discuss basic network, analytical, and simulation models. The simulation models are found suitable for modeling random failures and targeted attacks. Modularity and disassortativity are identified as common features of real-world supply chain networks. An action-based model to deal with disruptions in the network is proposed by Arora and Ventresca (2018). It analyzes supply availability subject to removal of nodes in the supply chain. The networks have different levels of resilience depending on industry. The network theory is also employed by Mari et al. (2015a). An agent-based simulation modeling is performed to determine supply availability after targeted and random disruptions. They found that an efficient and resilient supply chain should have the Power law as an underlying degree distribution, short characteristic path length, and a high clustering coefficient. Furthermore, it should be robust to both targeted and random disruption. However, none of the typical network models meets these requirements. Mari et al. (2015b) identify information systems as one of the causes of disruptions in supply chains. . Cigolini et al. (2014) simulate the impact of various supply chain configuration attributes, such as the number of stages on its performance. The model considers specific manufacturing and ordering policies. The importance of information sharing is emphasized. Similarly, Pero et al. (2010) use system dynamics and Petri net models to analyze relations between the topological features of a supply chain and its performance. They focus on inventory management aspects and find that the results depend on the number of suppliers in a stage, while the number of stages is not a significant aspect. Carvalho et al. (2012) simulate an automotive supply chain to analyze its resilience. Resilience strategies based on flexibility and redundancy are particularly considered, and flexibility is shown to increase the resilience. Lead time and cost are used as the key performance measures.