A common assumption in security research is that more individual expertise unambiguously leads to a more secure overall network. We present a game-theoretic model in which this common assumption is challenged. Our findings indicate that expert users can be not only invaluable contributors, but also free-riders, defectors, and narcissistic opportunists. A direct application is that user education needs to highlight the cooperative nature of security, and foster the community sense, in particular, of higher skilled computer users. As a technical contribution, this paper represents, to our knowledge, the first formal study to quantitatively assess the impact of different degrees of information security expertise on the overall security of a n...
This work addresses the challenge “how do we make better security decisions?” and it develops techni...
Together with the massive and rapid evolution of computer networks, there has been a surge of resear...
There have been various attempts to apply game theory to various aspects of security situations. Thi...
Abstract. A common assumption in security research is that more individual expertise unambiguously l...
A common assumption in security research is that more individual expertise unambiguously leads to a ...
Public reporting burden for the collection of information is estimated to average 1 hour per respons...
Abstract — Individuals in computer networks not only have to invest to secure their private resource...
The increased reliance on the Internet has made information and communication systems more vulnerabl...
A digital security breach, by which confidential information is leaked, does not only affect the age...
A digital security breach, by which confidential information is leaked, does not only affect the age...
While there are significant advances in information technology and infrastructure which offer new op...
We investigate the impacts of game-theoretic and behavioral decision-making in two broad classes of ...
Although people are frequently urged to protect the machines they use and oversee, the fact remains ...
Abstract. This paper presents a game-theoretic method for analyzing the security of computer network...
Entities of physical presence have always been susceptible to attacks. Entities of online presence a...
This work addresses the challenge “how do we make better security decisions?” and it develops techni...
Together with the massive and rapid evolution of computer networks, there has been a surge of resear...
There have been various attempts to apply game theory to various aspects of security situations. Thi...
Abstract. A common assumption in security research is that more individual expertise unambiguously l...
A common assumption in security research is that more individual expertise unambiguously leads to a ...
Public reporting burden for the collection of information is estimated to average 1 hour per respons...
Abstract — Individuals in computer networks not only have to invest to secure their private resource...
The increased reliance on the Internet has made information and communication systems more vulnerabl...
A digital security breach, by which confidential information is leaked, does not only affect the age...
A digital security breach, by which confidential information is leaked, does not only affect the age...
While there are significant advances in information technology and infrastructure which offer new op...
We investigate the impacts of game-theoretic and behavioral decision-making in two broad classes of ...
Although people are frequently urged to protect the machines they use and oversee, the fact remains ...
Abstract. This paper presents a game-theoretic method for analyzing the security of computer network...
Entities of physical presence have always been susceptible to attacks. Entities of online presence a...
This work addresses the challenge “how do we make better security decisions?” and it develops techni...
Together with the massive and rapid evolution of computer networks, there has been a surge of resear...
There have been various attempts to apply game theory to various aspects of security situations. Thi...