Interdependent Security: A General Model

نویسنده

  • Geoffrey Heal
چکیده

In an interdependent world the risks faced by any one agent depend not only on its choices but also on those of all others. Expectations about others’ choices will influence investments in risk-management, and the outcome can be suboptimal for everyone. We model this as the Nash equilibrium of a game and give conditions for such a sub-optimal equilibrium to be tipped to an optimal one. We also characterize the smallest coalition to tip an equilibrium, the minimum critical coalition, and show that this is also the cheapest critical coalition, so that there is no less expensive way to move the system from the sub-optimal to the optimal equilibrium. We illustrate these results by reference to airline security, the control of infectious diseases via vaccination and investment in research and development.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Interdependent Security Game Design over Constrained Linear Influence Networks

In today's highly interconnected networks, security of the entities are often interdependent. This means security decisions of the agents are not only influenced by their own costs and constraints, but also are affected by their neighbors’ decisions. Game theory provides a rich set of tools to analyze such influence networks. In the game model, players try to maximize their utilities through se...

متن کامل

Interdependent Defense Games: Modeling Interdependent Security under Deliberate Attacks

We propose interdependent defense (IDD) games, a computational game-theoretic framework to study aspects of the interdependence of risk and security in multi-agent systems under deliberate external attacks. Our model builds upon interdependent security (IDS) games, a model due to Heal and Kunreuther that considers the source of the risk to be the result of a fixed randomizedstrategy. We adapt I...

متن کامل

Subsidies in Interdependent Security with Heterogeneous Discount Rates

Optimizing resource allocation in interdependent security problems is a serious challenge for homeland security. In this article, we present the equilibrium strategies for multiple interdependent defenders in a model where threats occur over time. We show that the existence of myopic agents can make it undesirable for non-myopic agents to invest in security when it would otherwise be in their i...

متن کامل

Becoming Cybercriminals: Incentives in Networks with Interdependent Security - Incentives in Networks with Interdependent Security

We study users’ incentives to become cybercriminals when network security is interdependent. We present a game-theoretic model in which each player (i.e., network user) decides his type, honest or malicious. Honest users represent law-abiding network users, while malicious users represent cybercriminals. After deciding on their types, the users make their security choices. We will follow [29], ...

متن کامل

A Survey of Interdependent Security Games

Risks faced by information system operators and users are not only determined by their own security posture, but are also heavily affected by the security-related decisions of others. This interdependence between information system operators and users is a fundamental property that shapes the efficiency of security defense solutions. Game theory is the most appropriate method to model the strat...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2004