메뉴 건너뛰기




Volumn 6345 LNCS, Issue , 2010, Pages 588-606

Are security experts useful? Bayesian Nash equilibria for network security games with limited information

Author keywords

Bounded Rationality; Game Theory; Limited Information; Security Economics

Indexed keywords

NETWORK SECURITY;

EID: 78049362316     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-15497-3_36     Document Type: Conference Paper
Times cited : (20)

References (38)
  • 1
    • 3242812017 scopus 로고    scopus 로고
    • Privacy in electronic commerce and the economics of immediate gratification
    • New York, NY, May 2004
    • Acquisti, A.: Privacy in electronic commerce and the economics of immediate gratification. In: Proceedings of the 5th ACM Conference on Electronic Commerce (EC 2004), New York, NY, May 2004, pp. 21-29 (2004)
    • (2004) Proceedings of the 5th ACM Conference on Electronic Commerce (EC 2004) , pp. 21-29
    • Acquisti, A.1
  • 2
    • 14744275332 scopus 로고    scopus 로고
    • Privacy and rationality in individual decision making
    • Acquisti, A., Grossklags, J.: Privacy and rationality in individual decision making. IEEE Security & Privacy 3(1), 26-33 (2005)
    • (2005) IEEE Security & Privacy , vol.3 , Issue.1 , pp. 26-33
    • Acquisti, A.1    Grossklags, J.2
  • 3
    • 14744280530 scopus 로고    scopus 로고
    • Conditioning prices on purchase history
    • Summer
    • Acquisti, A., Varian, H.: Conditioning prices on purchase history. Marketing Science 24(3), 367-381 (Summer 2005)
    • (2005) Marketing Science , vol.24 , Issue.3 , pp. 367-381
    • Acquisti, A.1    Varian, H.2
  • 5
    • 33744944324 scopus 로고    scopus 로고
    • Introductions of invasive species: Failure of the weaker link
    • Burnett, K.: Introductions of invasive species: Failure of the weaker link. Agricultural and Resource Economics Review 35(1), 21-28 (2006)
    • (2006) Agricultural and Resource Economics Review , vol.35 , Issue.1 , pp. 21-28
    • Burnett, K.1
  • 6
    • 0037599474 scopus 로고    scopus 로고
    • The economic cost of publicly announced information security breaches: Empirical evidence from the stock market
    • Campbell, K., Gordon, L., Loeb, M., Zhou, L.: The economic cost of publicly announced information security breaches: Empirical evidence from the stock market. Journal of Computer Security 11(3), 431-448 (2003)
    • (2003) Journal of Computer Security , vol.11 , Issue.3 , pp. 431-448
    • Campbell, K.1    Gordon, L.2    Loeb, M.3    Zhou, L.4
  • 7
    • 0019532104 scopus 로고
    • Untraceable electronic mail, return addresses, and digital pseudonyms
    • Chaum, D.: Untraceable electronic mail, return addresses, and digital pseudonyms. Communications of the ACM 24(2), 84-90 (1981)
    • (1981) Communications of the ACM , vol.24 , Issue.2 , pp. 84-90
    • Chaum, D.1
  • 8
    • 79951914093 scopus 로고
    • Dyke maintenance and other stories: Some neglected types of public goods
    • Cornes, R.: Dyke maintenance and other stories: Some neglected types of public goods. Quarterly Journal of Economics 108(1), 259-271 (1993)
    • (1993) Quarterly Journal of Economics , vol.108 , Issue.1 , pp. 259-271
    • Cornes, R.1
  • 9
    • 0003553457 scopus 로고    scopus 로고
    • Network ingress filtering: Defeating denial of service attacks which employ IP source address spoofing
    • January
    • Ferguson, P., Senie, D.: Network ingress filtering: Defeating denial of service attacks which employ IP source address spoofing, RFC 2267 (January 1998)
    • (1998) RFC 2267
    • Ferguson, P.1    Senie, D.2
  • 11
    • 30344462995 scopus 로고    scopus 로고
    • The economic incentives for sharing security information
    • Gal-Or, E., Ghose, A.: The economic incentives for sharing security information. Information Systems Research 16(2), 186-208 (2005)
    • (2005) Information Systems Research , vol.16 , Issue.2 , pp. 186-208
    • Gal-Or, E.1    Ghose, A.2
  • 12
    • 0344899914 scopus 로고    scopus 로고
    • Sharing information on computer systems security: An economic analysis
    • Gordon, L. A., Loeb, M., Lucyshyn, W.: Sharing information on computer systems security: An economic analysis. Journal of Accounting and Public Policy 22(6), 461-485 (2003)
    • (2003) Journal of Accounting and Public Policy , vol.22 , Issue.6 , pp. 461-485
    • Gordon, L.A.1    Loeb, M.2    Lucyshyn, W.3
  • 18
    • 0000071449 scopus 로고
    • From weakest-link to best-shot: The voluntary provision of public goods
    • Hirshleifer, J.: From weakest-link to best-shot: The voluntary provision of public goods. Public Choice 41(3), 371-386 (1983)
    • (1983) Public Choice , vol.41 , Issue.3 , pp. 371-386
    • Hirshleifer, J.1
  • 19
    • 0000125532 scopus 로고
    • Prospect theory: An analysis of decision under risk
    • Kahneman, D., Tversky, A.: Prospect theory: An analysis of decision under risk. Econometrica XLVII, 263-291 (1979)
    • (1979) Econometrica , vol.47 , pp. 263-291
    • Kahneman, D.1    Tversky, A.2
  • 21
    • 85020616309 scopus 로고
    • Network externalities, competition, and compatibility
    • Katz, M., Shapiro, C.: Network externalities, competition, and compatibility. American Economic Review 75(3), 424-440 (1985)
    • (1985) American Economic Review , vol.75 , Issue.3 , pp. 424-440
    • Katz, M.1    Shapiro, C.2
  • 22
    • 0000620127 scopus 로고    scopus 로고
    • Rules of thumb versus dynamic programming
    • Lettau, M., Uhlig, H.: Rules of thumb versus dynamic programming. American Economic Review 89(1), 148-174 (1999)
    • (1999) American Economic Review , vol.89 , Issue.1 , pp. 148-174
    • Lettau, M.1    Uhlig, H.2
  • 24
    • 70349294321 scopus 로고    scopus 로고
    • Alliances and negotiations: An incomplete information example
    • Manzini, P., Mariotti, M.: Alliances and negotiations: An incomplete information example. Review of Economic Design 13(3), 195-203 (2009)
    • (2009) Review of Economic Design , vol.13 , Issue.3 , pp. 195-203
    • Manzini, P.1    Mariotti, M.2
  • 25
    • 33646433706 scopus 로고    scopus 로고
    • Testing social theories in computer-mediated communication through gaming and simulation
    • Noy, A., Raban, D., Ravid, G.: Testing social theories in computer-mediated communication through gaming and simulation. Simulation & Gaming 37(2), 174-194 (2006)
    • (2006) Simulation & Gaming , vol.37 , Issue.2 , pp. 174-194
    • Noy, A.1    Raban, D.2    Ravid, G.3
  • 28
    • 0036264347 scopus 로고    scopus 로고
    • A perspective on psychology and economics
    • Rabin, M.: A perspective on psychology and economics. European Economic Review 46 (4-5), 657-685 (2002)
    • (2002) European Economic Review , vol.46 , Issue.4-5 , pp. 657-685
    • Rabin, M.1
  • 29
    • 0002569430 scopus 로고
    • Characterizing effective trading strategies: Insights from a computerized double auction tournament
    • Rust, J., Miller, J., Palmer, R.: Characterizing effective trading strategies: Insights from a computerized double auction tournament. Journal of Economic Dynamics and Control 18(1), 61-96 (1994)
    • (1994) Journal of Economic Dynamics and Control , vol.18 , Issue.1 , pp. 61-96
    • Rust, J.1    Miller, J.2    Palmer, R.3
  • 32
    • 1542401733 scopus 로고
    • An Introduction to Privacy in Economics and Politics
    • Stigler, G.: An Introduction to Privacy in Economics and Politics. The Journal of Legal Studies 4(9), 623-644 (1980)
    • (1980) The Journal of Legal Studies , vol.4 , Issue.9 , pp. 623-644
    • Stigler, G.1
  • 33
    • 34547100991 scopus 로고    scopus 로고
    • An empirical analysis of the impact of software vulnerability announcements on firm stock price
    • Telang, R., Wattal, S.: An empirical analysis of the impact of software vulnerability announcements on firm stock price. IEEE Transactions on Software Engineering 33(8), 544-557 (2007)
    • (2007) IEEE Transactions on Software Engineering , vol.33 , Issue.8 , pp. 544-557
    • Telang, R.1    Wattal, S.2
  • 34
    • 0000470297 scopus 로고
    • Tacit coordination games, strategic uncertainty, and coordination failure
    • Van Huyck, J., Battallio, R., Beil, R.: Tacit coordination games, strategic uncertainty, and coordination failure. American Economic Review 80(1), 234-248 (1990)
    • (1990) American Economic Review , vol.80 , Issue.1 , pp. 234-248
    • Van Huyck, J.1    Battallio, R.2    Beil, R.3
  • 35
    • 33750482906 scopus 로고    scopus 로고
    • System reliability and free riding
    • Camp, L. J., Lewis, S. eds., Kluwer Academic Publishers, Dordrecht
    • Varian, H. R.: System reliability and free riding. In: Camp, L. J., Lewis, S. (eds.) Economics of Information Security. Advances in Information Security, vol. 12, pp. 1-15. Kluwer Academic Publishers, Dordrecht (2004)
    • (2004) Economics of Information Security. Advances in Information Security , vol.12 , pp. 1-15
    • Varian, H.R.1
  • 36
    • 24144443188 scopus 로고    scopus 로고
    • Revealed preferences in intertemporal decision making
    • von Auer, L.: Revealed preferences in intertemporal decision making. Theory and Decision 56(3), 269-290 (2004)
    • (2004) Theory and Decision , vol.56 , Issue.3 , pp. 269-290
    • Von Auer, L.1
  • 38
    • 0041908334 scopus 로고    scopus 로고
    • Group size and the private supply of a best-shot public good
    • Xu, X.: Group size and the private supply of a best-shot public good. European Journal of Political Economy 17(4), 897-904 (2001)
    • (2001) European Journal of Political Economy , vol.17 , Issue.4 , pp. 897-904
    • Xu, X.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.