It has been repeatedly pointed out that security problems in multi-agent systems are a manifestation of improper economic incentives provided for agents through mechanisms that are supposed to provide such incentives. This paper provides initial insight on how economics tools of utility theory and welfare economics may be used to analyze the behaviors of economic agents with respect to security choices. We consider a case where security can be produced in organization by using access to information systems as a production factor. There are important tradeoffs between access and security of information that leads to provisioning of additional amount of security being increasingly costly. We provide structural results that characterize these ...
A digital security breach, by which confidential information is leaked, does not only affect the age...
We study the security of interaction protocols when incentives of participants are taken into accoun...
The level of firms\u27 information security investment has recently become a critical issue in the m...
Traditionally, security has been understood in terms of technological advances. This paper argues th...
We investigate the impacts of game-theoretic and behavioral decision-making in two broad classes of ...
Abstract. Assured information sharing among different organizations in a coalitional environment is ...
<p>Information security economics, an emerging and thriving research topic, attempts to address the ...
Given that Information Technology (IT) security has emerged as an important issue in the last few ye...
Part 11: Security EconomicsInternational audienceData breaches represents a major source of worries ...
We investigate a mixed economy of an individual rational expert and several naı̈ve near-sighted agen...
2019-01-11This thesis considers the following question: in systems with self-interested agents (a.k....
Security is one of the main concerns in current telecommunication net- works: the service providers ...
In the realm of information security, lack of information about other users’ incentives in a network...
In the realm of information security, lack of information about other users’ incentives in a network...
The paper uses a game-theoretic setting to examine the interaction between strategic attackers who t...
A digital security breach, by which confidential information is leaked, does not only affect the age...
We study the security of interaction protocols when incentives of participants are taken into accoun...
The level of firms\u27 information security investment has recently become a critical issue in the m...
Traditionally, security has been understood in terms of technological advances. This paper argues th...
We investigate the impacts of game-theoretic and behavioral decision-making in two broad classes of ...
Abstract. Assured information sharing among different organizations in a coalitional environment is ...
<p>Information security economics, an emerging and thriving research topic, attempts to address the ...
Given that Information Technology (IT) security has emerged as an important issue in the last few ye...
Part 11: Security EconomicsInternational audienceData breaches represents a major source of worries ...
We investigate a mixed economy of an individual rational expert and several naı̈ve near-sighted agen...
2019-01-11This thesis considers the following question: in systems with self-interested agents (a.k....
Security is one of the main concerns in current telecommunication net- works: the service providers ...
In the realm of information security, lack of information about other users’ incentives in a network...
In the realm of information security, lack of information about other users’ incentives in a network...
The paper uses a game-theoretic setting to examine the interaction between strategic attackers who t...
A digital security breach, by which confidential information is leaked, does not only affect the age...
We study the security of interaction protocols when incentives of participants are taken into accoun...
The level of firms\u27 information security investment has recently become a critical issue in the m...