|
|
The Information Sharing Incentive Mechanism of Industrial Internet Platform Under Digital Economy |
FENG Nan, REN Bin-bin, HUANG Zi-chen, LI Min-qiang |
College of Management and Economics, Tianjin University, Tianjin 300072, China |
|
|
Abstract Relying on strong scientific and technological innovation and rich manufacturing resources, the industrial Internet platform has built a core hub of information exchange in the industrial ecosystem. By connecting all factors of industrial production and rational allocation of resources, the platform promotes the efficient operation of the new supply chain under the digital economy. However, due to the existence of information disclosure risk, member enterprises show low willingness toward active participation in information sharing, resulting in the “free riding” phenomenon, and the role of industrial Internet platform will be greatly compromised. Therefore, this paper proposes an incentive strategy that combines information sharing subsidies and information value-added services to mobilize the enthusiasm of enterprises to participate in industrial Internet platform and information sharing. The effectiveness of the proposed incentive strategy is verified by the simulation method based on Agent model. On this basis, this paper analyzes the impact of various external environmental factors on the level of information sharing and social welfare, and provides suggestions for the dynamic adjustment of incentive strategy of industrial Internet platform.
|
Received: 23 November 2021
|
|
|
|
|
1 蔡呈伟,戚聿东.工业互联网对中国制造业的赋能路径研究[J].当代经济管理,2021,43(12):40-48.
2 延建林,孔德婧.解析“工业互联网”与“工业4.0”及其对中国制造业发展的启示[J].中国工程科学,2015,17(7):141-144.
3 樊佩茹,李俊,王冲华,等.工业互联网供应链安全发展路径研究[J].中国工程科学,2021,23(2):56-64.
4 LIU C Z, ZAFAR H, AU Y A. Rethinking FS-ISAC: An IT security information sharing network model for the financial services sector[J]. Communications of the Association for Information Systems, 2014, 34(1): 2.
5 WANG D, REN J, CHENG Y, et al. An aggregated-tasks oriented manufacturing services scheduling toward industrial Internet platforms[C]//2020 IEEE 16th International Conference on Automation Science and Engineering (CASE). IEEE, 2020: 716-721.
6 ZHANG Y, ZHANG P, TAO F, et al. Consensus aware manufacturing service collaboration optimization under blockchain based Industrial Internet platform[J]. Computers & Industrial Engineering, 2019, 135: 1025-1035.
7 WANG Y, ZHANG Y, TAO F, et al. Logistics-aware manufacturing service collaboration optimisation towards industrial internet platform[J]. International Journal of Production Research, 2019, 57(12): 4007-4026.
8 张延华,杨乐,李萌,等.基于Q-learning的工业互联网资源优化调度[J].北京工业大学学报,2020,46(11):1213-1221.
9 HAO R, CHENG Y, ZHANG Y, et al. Manufacturing service supply-demand optimization with dual diversities for industrial internet platforms[J]. Computers & Industrial Engineering,2021, 156.
10 刘祎.工业互联网平台情境下制造业企业服务化的适应性机制——基于系统动力学的仿真[J].当代经济管理,2021,43(9):29-39.
11 MENON K, K?RKK?INEN H, Wuest T. Industrial internet platform provider and end-user perceptions of platform openness impacts[J]. Industry and Innovation, 2020, 27(4): 363-389.
12 HUANG Y S, LI M C, HO J W. Determination of the optimal degree of information sharing in a two-echelon supply chain[J]. International Journal of Production Research, 2016, 54(5): 1518-1534.
13 SHANG W, HA A Y, TONG S. Information sharing in a supply chain with a common retailer[J]. Management Science, 2016, 62(1): 245-263.
14 GHOSHAL A, HAO J, MENON S, et al. Hiding Sensitive Information when Sharing Distributed Transactional Data[J]. Information systems research, 2020, 31(2): 473-490.
15 WEI L, ZHANG J, ZHU G. Incentive of retailer information sharing on manufacturer volume flexibility choice[J]. Omega, 2021, 100.
16 许明辉,杨东升.制造商成本削减策略对风险规避型零售商信息共享策略的影响[J].中国管理科学,2019,27(12):77-87.
17 李翀,刘思峰,方志耕,等.供应链网络系统的牛鞭效应时滞因素分析与库存控制策略研究[J].中国管理科学,2013,21(2):107-113.
18 李翀. 供应链网络牛鞭效应的形成机理及其控制机制研究[D].南京:南京航空航天大学经济与管理学院,2012.
19 SOLAK S, ZHUO Y. Optimal policies for information sharing in information system security[J]. European Journal of Operational Research, 2020, 284(3): 934-950.
20 刘阳,韩天宇,谢滨,等.基于工业互联网标识解析体系的数据共享机制[J].计算机集成制造系统,2019,25(12):3032-3042.
21 汪允敏,李挥,王菡,等.区块链在工业互联网标识数据管理策略研究[J].计算机工程与应用,2020,56(7):1-7.
22 苏彬庭,陈明志,许力,等.国密算法在工业互联网安全中的应用研究[J].信息技术与网络安全,2021,40(3):28-31.
23 王鹏.云计算信息共享平台数据服务安全实现策略[J].舰船科学技术,2017,39(2):150-152.
24 熊强,杨欣琦,李治文.网络安全漏洞信息披露中多元参与主体行为策略演化博弈分析[J].运筹与管理,2021,30(7):102-109.
25 GYENES R. A voluntary cybersecurity framework is unworkable-government must crack the whip[J]. Journal of Technology Law & Policy, 2013, 14: 293-314.
26 XIONG Q, CHEN X. Incentive mechanism design based on repeated game theory in security information sharing[C]. 2nd International Conference on Science and Social Research. Atlantis Press, 2013.
27 GAO X, ZHONG W, MEI S. Security investment and information sharing under an alternative security breach probability function[J]. Information Systems Frontiers, 2015, 17(2): 423-438.
28 LAUBE S, B?HME R. Mandatory security information sharing with authorities: Implications on investments in internal controls[C]. Proceedings of the 2nd ACM Workshop on Information Sharing and Collaborative Security, 2015.
29 胡东波,沈悦,衡如丹,等.B2B供应链全局需求信息共享价值的仿真研究[J].系统仿真学报,2017,29(7):1611-1616+1624.
30 EZHEI M, LADANI B. T. Information sharing vs. privacy: A game theoretic analysis[J]. Expert Systems with Applications, 2017, 88: 327-337.
31 肖广涛. 基于博弈论的工业互联网漏洞生命周期管理策略研究[D].镇江:江苏大学管理学院,2019.
32 韩普,顾亮,张嘉明.隐私保护视角下医疗数据共享意愿研究——基于三方演化博弈分析[J].现代情报,2021,41(3):148-158.
33 石硕,林喜军,于树松.面向数控机床产业集群区域网络协同制造的信息共享安全机制[J].制造业自动化,2021,43(10):131-133.
34 GORDON L A, LOEB M P. The economics of information security investment[J]. ACM Transactions on Information and System Security, 2002, 5(4): 438-457.
35 KANNAN, K, TELANG R. Market for software vulnerabilities? Think again[J]. Management science, 2005, 51(5): 726-740.
36 ARORA A, NANDKUMAR A, TELANG R. Does information security attack frequency increase with vulnerability disclosure? An empirical analysis[J]. Information Systems Frontiers, 2006, 8(5): 350-362.
37 CAVUSOGLU H, RAGHUNATHAN S, YUE W T. Decision-theoretic and game-theoretic approaches to IT security investment[J]. Journal of Management Information Systems, 2008, 25(2): 281-304.
38 EZHEI M, LADANI B T. Interdependency analysis in security investment against strategic attacks[J]. Information Systems Frontiers, 2020, 22 (1): 187-201.
39 EZHEI M, LADANI B. T. Information sharing vs. privacy: A game theoretic analysis[J]. Expert Systems with Applications, 2017, 88: 327-337.
40 GAL-OR E, GHOSE A. The economic incentives for sharing security information[J]. Information Systems Research, 2005, 16(2): 186-208.
41 LIU D, JI Y, MOOKERJEE V. Knowledge sharing and investment decisions in information security[J]. Decision Support Systems, 2011, 52(1): 95-107.
42 CHANG W S, SANCHEZ-LOOR D A. Downstream Information Leaking and Information Sharing between Partially Informed Retailers[J]. Journal of Industry, Competition and Trade, 2020, 20(4): 733-760.
43 GOLDENBERG J, LIBAI B, MULLER E. The chilling effects of network externalities[J]. International Journal of Research in Marketing, 2010, 27(1): 4-15. |
|
|
|