Risks faced by information system operators and users are not only determined by their own security posture, but are also heavily affected by the security-related decisions of others …
In current business climate, a firm's information systems security is no longer independent from the industry's broader security environment. A question arises, then, whether stock …
Cryptocurrencies have garnered much attention in recent years, both from the academic community and industry. One interesting aspect of cryptocurrencies is their explicit …
T Başar, Q Zhu - Dynamic Games and Applications, 2011 - Springer
The price of anarchy (PoA) has been widely used in static games to quantify the loss of efficiency due to noncooperation. Here, we extend this concept to a general differential …
Even the most well-motivated models of information security have application limitations due to the inherent uncertainties involving risk. This paper exemplifies a formal mechanism for …
Over the last few years, the vast progress in genome sequencing has highly increased the availability of genomic data. Today, individuals can obtain their digital genomic sequences …
Users of mobile networks can change their identifiers in regions called mix zones in order to defeat the attempt of third parties to track their location. Mix zones must be deployed …
A common assumption in security research is that more individual expertise unambiguously leads to a more secure overall network. We present a game-theoretic model in which this …
Risks faced by information system operators and users are not only determined by their own security posture, but are also heavily affected by the security-related decisions of others …