2017
DOI: 10.1016/j.jet.2017.05.006
|View full text |Cite
|
Sign up to set email alerts
|

Individual security, contagion, and network design

Abstract: Individuals derive benefits from their connections, but these may expose them to external threats. Agents therefore invest in security to protect themselves. What are the network architectures that maximize collective welfare? We propose a model to explore the tension between connectivity and exposure to an external threat when security choices are decentralized. We find that both over-investment and underinvestment in security are possible, and that optimal network architectures depend on the prevailing sourc… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
15
0

Year Published

2017
2017
2022
2022

Publication Types

Select...
7
1

Relationship

3
5

Authors

Journals

citations
Cited by 16 publications
(15 citation statements)
references
References 11 publications
0
15
0
Order By: Relevance
“…This is the reason why, in general, under random attack, decentralized and centralized defence allocations are likely to not coincide (Proposition 4). , Acemoglu et al (2016), Goyal & Vigier (2014), and Cerdeiro et al (2017) are among the closest papers to ours. They study a sequential game in which a designer moves first and chooses a defence allocation, and in a second stage the adversary chooses how to allocate attack-resources across the nodes.…”
Section: Introductionmentioning
confidence: 72%
See 2 more Smart Citations
“…This is the reason why, in general, under random attack, decentralized and centralized defence allocations are likely to not coincide (Proposition 4). , Acemoglu et al (2016), Goyal & Vigier (2014), and Cerdeiro et al (2017) are among the closest papers to ours. They study a sequential game in which a designer moves first and chooses a defence allocation, and in a second stage the adversary chooses how to allocate attack-resources across the nodes.…”
Section: Introductionmentioning
confidence: 72%
“…More recently, new contributions have analyzed these games in a network setting (Acemoglu et al 2016, , Goyal & Vigier (2014) and Cerdeiro et al (2017)). In these models, payoff of the players is generally tied to a network structure which connects some of them.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…Cerdeir et al presented a partial characterization of the network to analyze welfare under equilibrium and then induced full protection [6]. Wu et al studied the security detection in fusion-based methods.…”
Section: Related Workmentioning
confidence: 99%
“…One of the key findings is that the externalities resulting from security decisions made by selfish agents lead to, potentially significant, inefficiencies. This motivates research on methods for improving information security, such as insurance [BS10] and network design [CDG14,CDG17]. We study the problem of network design for interdependent security in the setup where a strategic adversary collaborates with some nodes in order to disrupt the network.…”
Section: Introductionmentioning
confidence: 99%