A common assumption in security research is that more individual expertise unambiguously leads to a more secure overall network. We present a game-theoretic model in which this common assumption does not hold. Our find-ings indicate that expert users can be not only invaluable contributors, but also free-riders, defectors, and narcissistic opportunists. A direct application is that user education needs to highlight the cooperative nature of security, and foster the community sense, in particular, of higher skilled computer users. As a technical contribution, this paper represents, to our knowledge, the first for-mal study to quantitatively assess the impact of different degrees of information security expertise on the overall security of a ...
Together with the massive and rapid evolution of computer networks, there has been a surge of resear...
We investigate the impacts of game-theoretic and behavioral decision-making in two broad classes of ...
Although people are frequently urged to protect the machines they use and oversee, the fact remains ...
Abstract. A common assumption in security research is that more individual expertise unambiguously l...
A common assumption in security research is that more individual expertise unambiguously leads to a ...
Public reporting burden for the collection of information is estimated to average 1 hour per respons...
Abstract — Individuals in computer networks not only have to invest to secure their private resource...
The increased reliance on the Internet has made information and communication systems more vulnerabl...
A digital security breach, by which confidential information is leaked, does not only affect the age...
A digital security breach, by which confidential information is leaked, does not only affect the age...
While there are significant advances in information technology and infrastructure which offer new op...
Abstract. This paper presents a game-theoretic method for analyzing the security of computer network...
Abstract—In the Internet-of-Things (IoT), users might share part of their data with different IoT pr...
Entities of physical presence have always been susceptible to attacks. Entities of online presence a...
We study the problem of allocating limited security countermeasures to protect network data from cyb...
Together with the massive and rapid evolution of computer networks, there has been a surge of resear...
We investigate the impacts of game-theoretic and behavioral decision-making in two broad classes of ...
Although people are frequently urged to protect the machines they use and oversee, the fact remains ...
Abstract. A common assumption in security research is that more individual expertise unambiguously l...
A common assumption in security research is that more individual expertise unambiguously leads to a ...
Public reporting burden for the collection of information is estimated to average 1 hour per respons...
Abstract — Individuals in computer networks not only have to invest to secure their private resource...
The increased reliance on the Internet has made information and communication systems more vulnerabl...
A digital security breach, by which confidential information is leaked, does not only affect the age...
A digital security breach, by which confidential information is leaked, does not only affect the age...
While there are significant advances in information technology and infrastructure which offer new op...
Abstract. This paper presents a game-theoretic method for analyzing the security of computer network...
Abstract—In the Internet-of-Things (IoT), users might share part of their data with different IoT pr...
Entities of physical presence have always been susceptible to attacks. Entities of online presence a...
We study the problem of allocating limited security countermeasures to protect network data from cyb...
Together with the massive and rapid evolution of computer networks, there has been a surge of resear...
We investigate the impacts of game-theoretic and behavioral decision-making in two broad classes of ...
Although people are frequently urged to protect the machines they use and oversee, the fact remains ...