Abstract — Individuals in computer networks not only have to invest to secure their private resources from potential attackers, but have to be aware of the existing interdependencies that exist with other network participants. Indeed, a user’s security is frequently negatively impacted by protection failures of even just one other individual, the weakest link. In this paper, we are interested in the impact of bounded ra-tionality and limited information on user payoffs and strategies in the presence of strong weakest-link externalities. As a first contribution, we address the problem of bounded rationality by proposing a simple but novel modeling approach. We anticipate the vast majority of users to be unsophisticated and to apply approxima...
While there are significant advances in information technology and infrastructure which offer new op...
This paper experimentally examines behavior in a two-player game of attack and defense of a weakest-...
We experimentally test the qualitatively different equilibrium predictions of two theoretical models...
In the realm of information security, lack of information about other users’ incentives in a network...
In the realm of information security, lack of information about other users’ incentives in a network...
A digital security breach, by which confidential information is leaked, does not only affect the age...
Abstract. A common assumption in security research is that more individual expertise unambiguously l...
A digital security breach, by which confidential information is leaked, does not only affect the age...
A common assumption in security research is that more individual expertise unambiguously leads to a ...
A common assumption in security research is that more individual expertise unambiguously leads to a ...
Although people are frequently urged to protect the machines they use and oversee, the fact remains ...
We introduce a two-player stochastic game for modeling secure team selection to add resilience again...
The increased reliance on the Internet has made information and communication systems more vulnerabl...
We investigate the impacts of game-theoretic and behavioral decision-making in two broad classes of ...
We investigate a mixed economy of an individual rational expert and several naı̈ve near-sighted agen...
While there are significant advances in information technology and infrastructure which offer new op...
This paper experimentally examines behavior in a two-player game of attack and defense of a weakest-...
We experimentally test the qualitatively different equilibrium predictions of two theoretical models...
In the realm of information security, lack of information about other users’ incentives in a network...
In the realm of information security, lack of information about other users’ incentives in a network...
A digital security breach, by which confidential information is leaked, does not only affect the age...
Abstract. A common assumption in security research is that more individual expertise unambiguously l...
A digital security breach, by which confidential information is leaked, does not only affect the age...
A common assumption in security research is that more individual expertise unambiguously leads to a ...
A common assumption in security research is that more individual expertise unambiguously leads to a ...
Although people are frequently urged to protect the machines they use and oversee, the fact remains ...
We introduce a two-player stochastic game for modeling secure team selection to add resilience again...
The increased reliance on the Internet has made information and communication systems more vulnerabl...
We investigate the impacts of game-theoretic and behavioral decision-making in two broad classes of ...
We investigate a mixed economy of an individual rational expert and several naı̈ve near-sighted agen...
While there are significant advances in information technology and infrastructure which offer new op...
This paper experimentally examines behavior in a two-player game of attack and defense of a weakest-...
We experimentally test the qualitatively different equilibrium predictions of two theoretical models...