不确定网络安全环境下考虑制造商渠道入侵的平台供应链信息共享策略研究
Research on Platform Supply Chain Information Sharing Strategies Considering Manufacturer Channel Encroachment under Uncertain Cybersecurity Environment
摘要: 在不确定的网络安全环境下,电商平台不仅要面对数据安全风险,还要应对上游制造商的渠道入侵,这加剧了信息共享策略的制定难度。基于此,本文针对单个制造商和单个电商平台构成的二级供应链,考虑数据安全风险传播对制造商渠道入侵下的电商平台信息共享策略的影响。研究发现:(1) 在制造商以转售形式进行渠道入侵的情形下,电商平台会隐藏信息。(2) 在制造商以代销形式进行渠道入侵的情形下,当佣金率较小且数据安全风险影响较小或佣金率较大且网络攻击造成的损失较小时电商平台会共享信息。(3) 考虑制造商渠道入侵的平台供应链,数据安全风险传播对制造商信息共享价值的负向影响大于对电商平台信息共享价值的负向影响。本文的研究结论可为不确定网络安全环境下考虑制造商渠道入侵的电商平台最优信息共享决策制定提供参考。
Abstract: In an uncertain network security environment, e-commerce platforms not only face data security risks, but also deal with channel intrusion by upstream manufacturers, which aggravates the difficulty of formulating information sharing strategies. Based on this, this paper considers the impact of data security risk propagation on the information sharing strategy of the e-commerce platform under the manufacturer’s channel intrusion for the secondary supply chain composed of a single manufacturer and a single e-commerce platform. The study found that: (1) In the case of channel intrusion by the manufacturer in the form of resale, the e-commerce platform hides information. (2) In the case of manufacturer’s channel intrusion in the form of consignment, when the commission rate is low and the impact of data security risk is small or the commission rate is large and the loss caused by hacker attack is small, the e-commerce platform will share information. (3) Considering the platform supply chain with manufacturer channel intrusion, the negative impact of data security risk communication on the value of manufacturer information sharing is greater than that on the value of e-commerce platform information sharing. The research conclusions of this paper can provide reference for the optimal information sharing decision-making of e-commerce platform considering manufacturer channel intrusion under uncertain network security environment.
文章引用:张涑贤, 钟园景. 不确定网络安全环境下考虑制造商渠道入侵的平台供应链信息共享策略研究[J]. 电子商务评论, 2026, 15(3): 96-106. https://doi.org/10.12677/ecl.2026.153252

参考文献

[1] Masip-Bruin, X., Marín-Tordera, E., Ruiz, J., Jukan, A., Trakadas, P., Cernivec, A., et al. (2021) Cybersecurity in ICT Supply Chains: Key Challenges and a Relevant Architecture. Sensors, 21, Article 6057. [Google Scholar] [CrossRef] [PubMed]
[2] Deane, J., Baker, W. and Rees, L. (2022) Cybersecurity in Supply Chains: Quantifying Risk. Journal of Computer Information Systems, 63, 507-521. [Google Scholar] [CrossRef
[3] Xu, L., Li, Y., Lin, Y., Tang, C. and Yao, Q. (2023) Supply Chain Cybersecurity Investments with Interdependent Risks under Different Information Exchange Modes. International Journal of Production Research, 62, 2034-2059. [Google Scholar] [CrossRef
[4] ISBuzz Team (2020) 8 Million UK Shopping Records Exposed.
https://informationsecuritybuzz.com/8-million-uk-shopping-records-exposed/
[5] Gong, C., Ignatius, J., Song, H., Chai, J. and Day, S.J. (2024) The Impact of Platform’s Information Sharing on Manufacturer Encroachment and Selling Format Decision. European Journal of Operational Research, 317, 141-155. [Google Scholar] [CrossRef
[6] Ha, A.Y., Luo, H. and Shang, W. (2022) Supplier Encroachment, Information Sharing, and Channel Structure in Online Retail Platforms. Production and Operations Management, 31, 1235-1251. [Google Scholar] [CrossRef
[7] (2021) Today at Amazon Accelerate: Amazon Announces Product Opportunity Explorer to Help Third-Party Sellers Identify New Products to Sell in Amazon’s Store.
https://press.aboutamazon.com/2021/10/today-at-amazon-accelerate-amazon-announces-product-opportunity-explorer-to-help-third-party-sellers-identify-new-products-to-sell-in-amazons-store
[8] Colicchia, C., Creazza, A., Noè, C. and Strozzi, F. (2019) Information Sharing in Supply Chains: A Review of Risks and Opportunities Using the Systematic Literature Network Analysis (SLNA). Supply Chain Management: An International Journal, 24, 5-21. [Google Scholar] [CrossRef
[9] Kamiya, S., Kang, J., Kim, J., Milidonis, A. and Stulz, R.M. (2021) Risk Management, Firm Reputation, and the Impact of Successful Cyberattacks on Target Firms. Journal of Financial Economics, 139, 719-749. [Google Scholar] [CrossRef
[10] Crosignani, M., Macchiavelli, M. and Silva, A.F. (2023) Pirates without Borders: The Propagation of Cyberattacks through Firms’ Supply Chains. Journal of Financial Economics, 147, 432-448. [Google Scholar] [CrossRef
[11] Li, Y. and Xu, L. (2020) Cybersecurity Investments in a Two-Echelon Supply Chain with Third-Party Risk Propagation. International Journal of Production Research, 59, 1216-1238. [Google Scholar] [CrossRef
[12] Chen, K., Liu, J., Huang, Z. and Wang, S. (2024) Information Sharing Strategy and Channel Selection with Substitutable Products. International Journal of Production Economics, 268, Article ID: 109129. [Google Scholar] [CrossRef
[13] 尤明钏, 张智勇, 石永强. 数据驱动营销使能下信息共享与渠道扩张策略研究[J]. 管理学报, 2025, 22(5): 928-937.
[14] Dash, A., Sarmah, S.P., Tiwari, M.K., Jena, S.K. and Glock, C.H. (2024) Cybersecurity Investments in Supply Chains with Two-Stage Risk Propagation. Computers & Industrial Engineering, 197, Article ID: 110519. [Google Scholar] [CrossRef
[15] Wu, Y., Feng, G. and Fung, R.Y.K. (2018) Comparison of Information Security Decisions under Different Security and Business Environments. Journal of the Operational Research Society, 69, 747-761. [Google Scholar] [CrossRef
[16] 王文隆, 姚锐, 张涑贤. 考虑制造商创新的供应链双向需求信息共享研究[J]. 中国管理科学, 2022, 30(5): 226-235.