Individual security and network design
|
|
|
- Jasmin Oliver
- 10 years ago
- Views:
Transcription
1 Individual security and network design Diego Cerdeiro Marcin Dziubiński Sanjeev Goyal FIT 2015
2 Motivation Networks often face external threats in form of strategic or random attacks The attacks can be prevented by protecting selected nodes of he network Decentralizing protection decisions leads to inefficiencies Can these inefficiencies be minimized by properly choosing the network topology?
3 Networks G = (V, E ): undirected graph over V, V set of nodes, V = n, E set of edges over V, E {ij : i, j V } Given U V, E [U] = {ij E : i, j U}, G [U] = (U, E [U]): subgraph induced by U G(U): set of all graphs over U Given X N, G X = G [V \ X ] Component in G is a maximal set of nodes C V s.t. for all i, j C, i and j are connected C(G ): the set of all components in G
4 Network value function (Network) value function Φ : U V G(U) R assigns numeric value Φ(G ) to network G U V G(U) We consider value functions of the form Φ(G ) = f ( C ), C C(G ) where f is strictly increasing, strictly convex and f (0) = 0 Example 1: f (x) = x 2 (Metcalfe s law) Example 2: f (x) = 2 x 1 ( Reed s law)
5 Defence and attack Defence is perfect: defended nodes cannot be removed Using defence has cost c > 0 Given network G and set of defended nodes V, G is called attack network Attack targets a single node x V This removes set of nodes { if x E x (G ) = C x (G ) otherwise
6 Defence and attack x g
7 Defence and attack x g
8 Defence and attack x g, E x (g Δ)
9 Defence and attack x g Δ
10 Defence and attack g E x (g Δ)
11 Exogenous network It is known that when the network is fixed, decentralization of defence decisions leads to inefficiencies Both underprotection and overprotection are possible in equilibrium of network defence game What happens when the designer can choose the network prior to network defence game?
12 The game There are n + 2 players: the designer (D), the nodes (V ) and the adversary (A) The game has three stages: 1. D chooses network G G(V ) 2. Nodes choose simultaneously whether to protect or not, this determines the set of defended nodes 3. A chooses a node x V to attack The attack spreads which leads to residual network G E x (G )
13 Preferences and payoffs: Designer Given network G G(V ), the set of defended nodes V and attack x V, payoff to D is Π D (G,, x) = Φ(G E x (G )) c
14 Preferences and payoffs: Nodes Given network G G(V ), the set of defended nodes V and attack x V, payoff to node i V is { f ( Ci Π i (G E x (G )) ) (G,, x) = C i (G E x [x ] c, if i = x (G )) 0, otherwise
15 Preferences and payoffs: Adversary Given network G G(V ), the set of defended nodes V and attack x V, payoff to A is Π A (G,, x) = Φ(G E x (G ))
16 First best Proposition (1) Let (G, ) be optimal defended network chosen by the designer and let If 0 < c < c 1 (n), then g is connected and = V If c 1 (n) < c < c 2 (n), then g is a star and = {i}, where i is the centre of g If c 2 (n) < c, then g has q 1 components of size and one of size n mod (q 1), = n q 1
17 Optimal network with decentralized defence Let Γ(G ) denote the nodes-adversary subgame ensuing after network G is chosen Lemma (1) For any G and c, Γ(G ) has an equilibrium in pure strategies Let E(G, c) denote the set of all equilibria of Γ(G )
18 Optimal network with decentralized defence Definition Given G G(n), equilibrium (, x) E(G, c) is welfare maximising iff Π D (G,, x) = max (,x ) E(G,c) ΠD (G,, x ) and (, x) E(G, c) is welfare minimising iff Π D (G,, x) = min (,x ) E(G,c) ΠD (G,, x )
19 Optimal network with decentralized defence There are three main reasons to inefficiencies due to decentralization
20 Optimal network with decentralized defence There are three main reasons to inefficiencies due to decentralization 1. Underprotection, due to positive externalities (e.g. f (x) = x 2, n < c < (n 1) 2 and centre of a star network)
21 Optimal network with decentralized defence There are three main reasons to inefficiencies due to decentralization 1. Underprotection, due to positive externalities (e.g. f (x) = x 2, n < c < (n 1) 2 and centre of a star network) 2. Overprotection, due to negative externalities (e.g. f (x) = x 2, 2n 1 n 1 < c < n 1 and all nodes of star network)
22 Optimal network with decentralized defence There are three main reasons to inefficiencies due to decentralization 1. Underprotection, due to positive externalities (e.g. f (x) = x 2, n < c < (n 1) 2 and centre of a star network) 2. Overprotection, due to negative externalities (e.g. f (x) = x 2, 2n 1 n 1 < c < n 1 and all nodes of star network) 3. Coordination on wrong equilibria (e.g. connected network and all- or no-nodes protect)
23 Optimal network with decentralized defence There are three main reasons to inefficiencies due to decentralization 1. Underprotection (e.g. f (x) = x 2, n < c < (n 1) 2 and centre of a star network) 2. Overprotection, due to negative externalities (e.g. f (x) = x 2, 2n 1 n 1 < c < n 1 and all nodes of star network) 3. Coordination on wrong equilibria (e.g. connected network and all- or no-nodes protect) Can the designer mitigate these problems by carefully choosing the network topology? How well can s/he do?
24 Optimal networks under welfare maximising equilibria What networks should be chosen assuming that the nodes and A choose a welfare maximising equilibrium in their subgame? The only problem is the range of costs (c 1 (n), c 2 (n)) with centrally protected star being first best We need to avoid overprotection reduce incentives to protect
25 Optimal networks under welfare maximising equilibria Example: f (x) = x 2, n = 96, c = nodes 83 nodes
26 Optimal networks under welfare minimising equilibria What networks should be chosen assuming that the nodes and A choose a welfare minimising equilibrium in their subgame? There is no problem for high costs Splitting the network still works for intermediate costs (the equilibrium outcome is unique on the split network) When costs of protection are low we need to avoid the coordination problem Equilibrium uniqueness can be obtained by properly choosing network topology
27 Optimal networks under welfare minimising equilibria Definition (k-critical node) Given a connected network G G(V ) node i V is k-critical iff max C C(G {i}) C = k k-critical node, if it protects, can secure at least n k nodes from being removed
28 Optimal networks under welfare minimising equilibria f (x) = x 2, n = 19, 9 < c < 10 i
29 Optimal networks under welfare minimising equilibria Lemma (7) Let G G(V ) be a connected network. If all nodes protect in every equilibrium of Γ(G ), then G has a k-critical node where k > c satisfies f (n k) n k Existence of k-critical node with f (n k) n k > c is a necessary but not sufficient condition for full protection in every equilibrium of Γ(G )
30 Optimal networks under welfare minimising equilibria f (x) = x 2, n = 19, 9 < c < 10 j i
31 Optimal networks under welfare minimising equilibria Lemma (8) Let G G(V ) be a connected network and k satisfy f (n k) n k > c. If for all i V, either i is k-critical or i has link to a k-critical node, then all nodes protect in every equilibrium of Γ(g)
32 Optimal networks under welfare minimising equilibria f (x) = x 2, n = 19, 9 < c < 10 i
33 Optimal networks under welfare minimising equilibria f (x) = x 2, n = 19, 9 < c < 10 i
34 Interaction design The presented problem is an example of a more general idea Given a type of local interactions (game) can we enforce desired outcomes by properly choosing connections between nodes?
21. Unverifiable Investment, Hold Up, Options and Ownership
21. Unverifiable Investment, Hold Up, Options and Ownership This chapter applies the tools of games with joint decisions and negotiation equilibrium to study the hold up problem in economics. We first
Modeling Internet Security Investments Tackling Topological Information Uncertainty
Modeling Internet Security Investments Tackling Topological Information Uncertainty Ranjan Pal Department of Computer Science University of Southern California, USA Joint Work with Pan Hui Deutsch Telekom
Computational Game Theory and Clustering
Computational Game Theory and Clustering Martin Hoefer [email protected] 1 Computational Game Theory? 2 Complexity and Computation of Equilibrium 3 Bounding Inefficiencies 4 Conclusion Computational
Network Security Validation Using Game Theory
Network Security Validation Using Game Theory Vicky Papadopoulou and Andreas Gregoriades Computer Science and Engineering Dep., European University Cyprus, Cyprus {v.papadopoulou,a.gregoriades}@euc.ac.cy
A Graph-Theoretic Network Security Game
A Graph-Theoretic Network Security Game Marios Mavronicolas 1, Vicky Papadopoulou 1, Anna Philippou 1, and Paul Spirakis 2 1 Department of Computer Science, University of Cyprus, Nicosia CY-1678, Cyprus.
6.207/14.15: Networks Lecture 15: Repeated Games and Cooperation
6.207/14.15: Networks Lecture 15: Repeated Games and Cooperation Daron Acemoglu and Asu Ozdaglar MIT November 2, 2009 1 Introduction Outline The problem of cooperation Finitely-repeated prisoner s dilemma
Microeconomic Theory Jamison / Kohlberg / Avery Problem Set 4 Solutions Spring 2012. (a) LEFT CENTER RIGHT TOP 8, 5 0, 0 6, 3 BOTTOM 0, 0 7, 6 6, 3
Microeconomic Theory Jamison / Kohlberg / Avery Problem Set 4 Solutions Spring 2012 1. Subgame Perfect Equilibrium and Dominance (a) LEFT CENTER RIGHT TOP 8, 5 0, 0 6, 3 BOTTOM 0, 0 7, 6 6, 3 Highlighting
How To Understand Network Security
Network Security: an Economic Perspective Marc Lelarge (INRIA-ENS) currently visiting STANFORD TRUST seminar, Berkeley 2011. Threats and Vulnerabilities Attacks are exogenous Contribution (1) Optimal security
Why Plaintiffs Attorneys Use Contingent and Defense Attorneys Fixed Fee Contracts
Why Plaintiffs Attorneys Use Contingent and Defense Attorneys Fixed Fee Contracts Winand Emons 1 Claude Fluet 2 1 Department of Economics University of Bern, CEPR, CIRPEE 2 Université du Québec à Montréal,
Econ 430 Lecture 9: Games on Networks
Alper Duman Izmir University Economics, May 10, 2013 Semi-Anonymous Graphical Games refer to games on networks in which agents observe what their neighbours do The number of agents taking a specific action
University of Oslo Department of Economics
University of Oslo Department of Economics Exam: ECON3200/4200 Microeconomics and game theory Date of exam: Tuesday, November 26, 2013 Grades are given: December 17, 2013 Duration: 14:30-17:30 The problem
5.1 Bipartite Matching
CS787: Advanced Algorithms Lecture 5: Applications of Network Flow In the last lecture, we looked at the problem of finding the maximum flow in a graph, and how it can be efficiently solved using the Ford-Fulkerson
The Max-Distance Network Creation Game on General Host Graphs
The Max-Distance Network Creation Game on General Host Graphs 13 Luglio 2012 Introduction Network Creation Games are games that model the formation of large-scale networks governed by autonomous agents.
Imperfect monitoring in communication networks
Journal of Economic Theory (00) www.elsevier.com/locate/jet Imperfect monitoring in communication networks Michael McBride University of California, Irvine, Social Science Plaza, Irvine, CA -00, USA Received
ECONOMICS OF DEBT COLLECTION: ENFORCEMENT OF CONSUMER CREDIT CONTRACTS
ECONOMICS OF DEBT COLLECTION: ENFORCEMENT OF CONSUMER CREDIT CONTRACTS Viktar Fedaseyeu Bocconi University Bob Hunt Federal Reserve Bank of Philadelphia BEROC, May 28, 2014 Debt collection Debt collection
Sequential lmove Games. Using Backward Induction (Rollback) to Find Equilibrium
Sequential lmove Games Using Backward Induction (Rollback) to Find Equilibrium Sequential Move Class Game: Century Mark Played by fixed pairs of players taking turns. At each turn, each player chooses
Chapter 7. Sealed-bid Auctions
Chapter 7 Sealed-bid Auctions An auction is a procedure used for selling and buying items by offering them up for bid. Auctions are often used to sell objects that have a variable price (for example oil)
ECON 40050 Game Theory Exam 1 - Answer Key. 4) All exams must be turned in by 1:45 pm. No extensions will be granted.
1 ECON 40050 Game Theory Exam 1 - Answer Key Instructions: 1) You may use a pen or pencil, a hand-held nonprogrammable calculator, and a ruler. No other materials may be at or near your desk. Books, coats,
Perfect Bayesian Equilibrium
Perfect Bayesian Equilibrium When players move sequentially and have private information, some of the Bayesian Nash equilibria may involve strategies that are not sequentially rational. The problem is
Compact Representations and Approximations for Compuation in Games
Compact Representations and Approximations for Compuation in Games Kevin Swersky April 23, 2008 Abstract Compact representations have recently been developed as a way of both encoding the strategic interactions
Working Paper Does retailer power lead to exclusion?
econstor www.econstor.eu Der Open-Access-Publikationsserver der ZBW Leibniz-Informationszentrum Wirtschaft The Open Access Publication Server of the ZBW Leibniz Information Centre for Economics Rey, Patrick;
A Simple Model of Price Dispersion *
Federal Reserve Bank of Dallas Globalization and Monetary Policy Institute Working Paper No. 112 http://www.dallasfed.org/assets/documents/institute/wpapers/2012/0112.pdf A Simple Model of Price Dispersion
RUHR. Commitment Problems and War in International Bargaining ECONOMIC PAPERS #403. Erwin Amann Nadine Leonhardt
RUHR ECONOMIC PAPERS Erwin Amann Nadine Leonhardt Commitment Problems and War in International Bargaining #403 Imprint Ruhr Economic Papers Published by Ruhr-Universität Bochum (RUB), Department of Economics
Backward Induction and Subgame Perfection
Backward Induction and Subgame Perfection In extensive-form games, we can have a Nash equilibrium profile of strategies where player 2 s strategy is a best response to player 1 s strategy, but where she
The Stability and Efficiency of Economic and Social Networks
The Stability and Efficiency of Economic and Social Networks Matthew O. Jackson March 2001 Revision: June 18, 2001 Forthcoming in Advances in Economic Design, edited by Murat Sertel Abstract This paper
Summary of Doctoral Dissertation: Voluntary Participation Games in Public Good Mechanisms: Coalitional Deviations and Efficiency
Summary of Doctoral Dissertation: Voluntary Participation Games in Public Good Mechanisms: Coalitional Deviations and Efficiency Ryusuke Shinohara 1. Motivation The purpose of this dissertation is to examine
Institution Formation in Public Goods Games
DISCUSSION PAPER SERIES IZA DP No. 2288 Institution Formation in Public Goods Games Michael Kosfeld Akira Okada Arno Riedl September 2006 Forschungsinstitut zur Zukunft der Arbeit Institute for the Study
Bargaining Solutions in a Social Network
Bargaining Solutions in a Social Network Tanmoy Chakraborty and Michael Kearns Department of Computer and Information Science University of Pennsylvania Abstract. We study the concept of bargaining solutions,
On the effect of taxation in the online sports betting market
On the effect of taxation in the online sports betting market Juan Vidal-Puga Research Group in Economic Analysis Departamento de Estatística e IO Universidade de Vigo, Spain June 8, 2 We analyze the effect
Screening by the Company You Keep: Joint Liability Lending and the Peer Selection Maitreesh Ghatak presented by Chi Wan
Screening by the Company You Keep: Joint Liability Lending and the Peer Selection Maitreesh Ghatak presented by Chi Wan 1. Introduction The paper looks at an economic environment where borrowers have some
When is Reputation Bad? 1
When is Reputation Bad? 1 Jeffrey Ely Drew Fudenberg David K Levine 2 First Version: April 22, 2002 This Version: November 20, 2005 Abstract: In traditional reputation theory, the ability to build a reputation
Credible Discovery, Settlement, and Negative Expected Value Suits
Credible iscovery, Settlement, and Negative Expected Value Suits Warren F. Schwartz Abraham L. Wickelgren Abstract: This paper introduces the option to conduct discovery into a model of settlement bargaining
Random graphs with a given degree sequence
Sourav Chatterjee (NYU) Persi Diaconis (Stanford) Allan Sly (Microsoft) Let G be an undirected simple graph on n vertices. Let d 1,..., d n be the degrees of the vertices of G arranged in descending order.
NETWORK DESIGN AND MANAGEMENT WITH STRATEGIC AGENTS
NETWORK DESIGN AND MANAGEMENT WITH STRATEGIC AGENTS A Dissertation Presented to the Faculty of the Graduate School of Cornell University in Partial Fulfillment of the Requirements for the Degree of Doctor
Price competition with homogenous products: The Bertrand duopoly model [Simultaneous move price setting duopoly]
ECON9 (Spring 0) & 350 (Tutorial ) Chapter Monopolistic Competition and Oligopoly (Part ) Price competition with homogenous products: The Bertrand duopoly model [Simultaneous move price setting duopoly]
Monitoring and the acceptability of bank money
Régis Breton Conference Bank liquidity, transparency and regulation Paris, 20/12/2013 The views expressed here are my own and should not necessarily be interpreted as those of the Banque de France or the
Intrusion Detection: Game Theory, Stochastic Processes and Data Mining
Intrusion Detection: Game Theory, Stochastic Processes and Data Mining Joseph Spring 7COM1028 Secure Systems Programming 1 Discussion Points Introduction Firewalls Intrusion Detection Schemes Models Stochastic
6.254 : Game Theory with Engineering Applications Lecture 2: Strategic Form Games
6.254 : Game Theory with Engineering Applications Lecture 2: Strategic Form Games Asu Ozdaglar MIT February 4, 2009 1 Introduction Outline Decisions, utility maximization Strategic form games Best responses
Who Should Pay the Sports Agent s Commission? An Economic Analysis of Setting the Legal Rules in the Regulation of Matchmakers
Who Should Pay the Sports Agent s Commission? An Economic Analysis of Setting the Legal Rules in the Regulation of Matchmakers Jean-François BROCARD Center for the Laws and Economics of Sport (CDES) Michel
Equilibrium computation: Part 1
Equilibrium computation: Part 1 Nicola Gatti 1 Troels Bjerre Sorensen 2 1 Politecnico di Milano, Italy 2 Duke University, USA Nicola Gatti and Troels Bjerre Sørensen ( Politecnico di Milano, Italy, Equilibrium
Théorie de la décision et théorie des jeux Stefano Moretti
héorie de la décision et théorie des jeux Stefano Moretti UMR 7243 CNRS Laboratoire d'analyse et Modélisation de Systèmes pour l'aide à la décision (LAMSADE) Université Paris-Dauphine email: [email protected]
Towards a compliance audit of SLAs for data replication in Cloud storage
Towards a compliance audit of SLAs for data replication in Cloud storage J. Leneutre B. Djebaili, C. Kiennert, J. Leneutre, L. Chen, Data Integrity and Availability Verification Game in Untrusted Cloud
All trees contain a large induced subgraph having all degrees 1 (mod k)
All trees contain a large induced subgraph having all degrees 1 (mod k) David M. Berman, A.J. Radcliffe, A.D. Scott, Hong Wang, and Larry Wargo *Department of Mathematics University of New Orleans New
CIS 700: algorithms for Big Data
CIS 700: algorithms for Big Data Lecture 6: Graph Sketching Slides at http://grigory.us/big-data-class.html Grigory Yaroslavtsev http://grigory.us Sketching Graphs? We know how to sketch vectors: v Mv
Role of Network Topology in Cybersecurity
Role of Network Topology in Cybersecurity Richard J. La Abstract We study how an underlying network property affects network security when nodes are rational and have four choices i) invest in protection,
Network Security A Decision and Game-Theoretic Approach
Network Security A Decision and Game-Theoretic Approach Tansu Alpcan Deutsche Telekom Laboratories, Technical University of Berlin, Germany and Tamer Ba ar University of Illinois at Urbana-Champaign, USA
Intellectual Property Right Protection in the Software Market
Intellectual Property Right Protection in the Software Market Yasuhiro Arai Aomori Public College 153-4, Yamazaki, Goushizawa, Aomori-city, Aomori 030-0196, Japan March 01 Abstract We discuss the software
Application of Game Theory in Inventory Management
Application of Game Theory in Inventory Management Rodrigo Tranamil-Vidal Universidad de Chile, Santiago de Chile, Chile [email protected] Abstract. Game theory has been successfully applied
Behavioural Economics: Introduction to Behavioral Game Theory and Game Experiments. University of Oxford, Michaelmas Term 2013.
Behavioural Economics: Introduction to Behavioral Game Theory and Game Experiments University of Oxford, Michaelmas Term 2013 and Asia Summer Institute in Behavioral Economics National University of Singapore,
Lecture 11: Sponsored search
Computational Learning Theory Spring Semester, 2009/10 Lecture 11: Sponsored search Lecturer: Yishay Mansour Scribe: Ben Pere, Jonathan Heimann, Alon Levin 11.1 Sponsored Search 11.1.1 Introduction Search
Social and Economic Networks: Lecture 1, Networks?
Social and Economic Networks: Lecture 1, Networks? Alper Duman Izmir University Economics, February 26, 2013 Conventional economics assume that all agents are either completely connected or totally isolated.
Liability Insurance as Protection Against Legal Error. Vickie Bajtelsmit Colorado State University. and
lipale.v2a 07-17-08 Liability Insurance as Protection Against Legal Error Vickie Bajtelsmit Colorado State University and Paul D. Thistle * University of Nevada Las Vegas Thistle s research was supported
Voluntary Participation in Cyber-insurance Markets
Voluntary Participation in Cyber-insurance Markets Parinaz aghizadeh and Mingyan Liu Abstract The study of cyber-insurance, both as a method for transferring residual cyber-security risks, and as an incentive
A Game Theoretical Framework for Adversarial Learning
A Game Theoretical Framework for Adversarial Learning Murat Kantarcioglu University of Texas at Dallas Richardson, TX 75083, USA muratk@utdallas Chris Clifton Purdue University West Lafayette, IN 47907,
Optimal Gateway Selection in Multi-domain Wireless Networks: A Potential Game Perspective
Optimal Gateway Selection in Multi-domain Wireless Networks: A Potential Game Perspective Yang Song, Starsky H.Y. Wong, and Kang-Won Lee Wireless Networking Research Group IBM T. J. Watson Research Center
Advanced Game Theory
Advanced Game Theory Herve Moulin Baker Hall 263; [email protected] Rice University ECO 440 Spring 2007 1 Two person zero sum games 1.1 Introduction: strategic interdependency In this section we study games
Buying and Selling Traffic: The Internet as an Advertising Medium
Buying and Selling Traffic: The Internet as an Advertising Medium A dissertation presented by Zsolt Katona to INSEAD faculty in partial fulfilment of the requirements for the degree of PhD in Management
Game-Theoretic Analysis of Attack and Defense in Cyber-Physical Network Infrastructures
Proceedings of the Industrial and Systems Engineering Research Conference G. Lim and J.W. Herrmann, eds. Game-Theoretic Analysis of Attack and Defense in Cyber-Physical Network Infrastructures Fei He,
1 Nonzero sum games and Nash equilibria
princeton univ. F 14 cos 521: Advanced Algorithm Design Lecture 19: Equilibria and algorithms Lecturer: Sanjeev Arora Scribe: Economic and game-theoretic reasoning specifically, how agents respond to economic
Computational Learning Theory Spring Semester, 2003/4. Lecture 1: March 2
Computational Learning Theory Spring Semester, 2003/4 Lecture 1: March 2 Lecturer: Yishay Mansour Scribe: Gur Yaari, Idan Szpektor 1.1 Introduction Several fields in computer science and economics are
Social Media Mining. Graph Essentials
Graph Essentials Graph Basics Measures Graph and Essentials Metrics 2 2 Nodes and Edges A network is a graph nodes, actors, or vertices (plural of vertex) Connections, edges or ties Edge Node Measures
Competition, Speculative Risks, and IT Security Outsourcing
Competition, Speculative Risks, and IT Security Outsourcing Asunur Cezar, Huseyin Cavusoglu, Srinivasan Raghunathan The School of Management, The University of Texas at Dallas Richardson, TX 75083 {asunur.cezar,huseyin,sraghu}@utdallas.edu
Oligopoly: How do firms behave when there are only a few competitors? These firms produce all or most of their industry s output.
Topic 8 Chapter 13 Oligopoly and Monopolistic Competition Econ 203 Topic 8 page 1 Oligopoly: How do firms behave when there are only a few competitors? These firms produce all or most of their industry
Game Theory: Supermodular Games 1
Game Theory: Supermodular Games 1 Christoph Schottmüller 1 License: CC Attribution ShareAlike 4.0 1 / 22 Outline 1 Introduction 2 Model 3 Revision questions and exercises 2 / 22 Motivation I several solution
Industry profit in an oligopoly (sum of all firms profits) < monopoly profit.
Collusion. Industry profit in an oligopoly (sum of all firms profits) < monopoly profit. Price lower and industry output higher than in a monopoly. Firms lose because of non-cooperative behavior : Each
Knowledge Transfer and Partial Equity Ownership
Knowledge Transfer and Partial Equity Ownership Arghya Ghosh and Hodaka Morita School of Economics, UNSW Business School University of New South Wales 2nd ATE Symposium, UNSW, December 2014 Introduction
Oligopoly and Strategic Pricing
R.E.Marks 1998 Oligopoly 1 R.E.Marks 1998 Oligopoly Oligopoly and Strategic Pricing In this section we consider how firms compete when there are few sellers an oligopolistic market (from the Greek). Small
Cybersecurity Games and Investments: A Decision Support Approach
Cybersecurity Games and Investments: A Decision Support Approach Emmanouil Panaousis 1, Andrew Fielder 2, Pasquale Malacaria 1, Chris Hankin 2, and Fabrizio Smeraldi 1 1 Queen Mary University of London
Equilibrium strategic overbuying
Equilibrium strategic overbuying Eric Avenel Clémence Christin December 011 Abstract We consider two firms competing both to sell their output and purchase their input from an upstream firm, to which they
Conference Paper Learning faster or more precisely? Strategic experimentation in networks
econstor www.econstor.eu Der Open-Access-Publikationsserver der ZBW Leibniz-Informationszentrum Wirtschaft The Open Access Publication Server of the ZBW Leibniz Information Centre for Economics Wuggenig,
Switching Cost, Competition, and Pricing in the Property/Casualty Insurance Market for Large Commercial Accounts
Switching Cost, Competition, and Pricing in the Property/Casualty Insurance Market for Large Commercial Accounts Lisa L. Posey * Abstract: With large commercial accounts, a small number of insurers negotiate
Alok Gupta. Dmitry Zhdanov
RESEARCH ARTICLE GROWTH AND SUSTAINABILITY OF MANAGED SECURITY SERVICES NETWORKS: AN ECONOMIC PERSPECTIVE Alok Gupta Department of Information and Decision Sciences, Carlson School of Management, University
Lottery versus all-pay auction models of lobbying
Public Choice 2: 35 37, 2002. 2002 Kluwer Academic Publishers. Printed in the Netherlands. 35 Lottery versus all-pay auction models of lobbying HANMING FANG Department of Economics, Yale University, New
Mitigating Hold-up Through Complementarities and Refunds
Mitigating Hold-up Through Complementarities and Refunds Jenny R. Hawkins Oberlin College, Department of Economics October 31, 212 Abstract: Many valuable composite goods or property rights exist only
Graph Theory and Complex Networks: An Introduction. Chapter 06: Network analysis
Graph Theory and Complex Networks: An Introduction Maarten van Steen VU Amsterdam, Dept. Computer Science Room R4.0, [email protected] Chapter 06: Network analysis Version: April 8, 04 / 3 Contents Chapter
