Individual security, contagion, and network design
Author
Abstract
Suggested Citation
DOI: 10.1016/j.jet.2017.05.006
Download full text from publisher
As the access to this document is restricted, you may want to search for a different version of it.
References listed on IDEAS
- Sanjeev Goyal & Adrien Vigier, 2014.
"Attack, Defence, and Contagion in Networks,"
The Review of Economic Studies, Review of Economic Studies Ltd, vol. 81(4), pages 1518-1542.
- Sanjeev Goyal & Adrien Vigier, 2014. "Attack, Defense and Contagion in Networks," Cambridge Working Papers in Economics 1451, Faculty of Economics, University of Cambridge.
- Mariagiovanna Baccara & Heski Bar-Isaac, 2008. "How to Organize Crime -super-1," The Review of Economic Studies, Review of Economic Studies Ltd, vol. 75(4), pages 1039-1067.
- anonymous, 2000. "Release of a report on a survey of web site privacy," Federal Reserve Bulletin, Board of Governors of the Federal Reserve System (U.S.), issue Jan, pages 1-42.
- Acemoglu, Daron & Malekian, Azarakhsh & Ozdaglar, Asu, 2016.
"Network security and contagion,"
Journal of Economic Theory, Elsevier, vol. 166(C), pages 536-585.
- Daron Acemoglu & Azarakhsh Malekian & Asuman E. Ozdaglar, 2013. "Network Security and Contagion," Levine's Working Paper Archive 786969000000000797, David K. Levine.
- Daron Acemoglu & Azarakhsh Malekian & Asuman Ozdaglar, 2013. "Network Security and Contagion," NBER Working Papers 19174, National Bureau of Economic Research, Inc.
- Kunreuther, Howard & Heal, Geoffrey, 2003. "Interdependent Security," Journal of Risk and Uncertainty, Springer, vol. 26(2-3), pages 231-249, March-May.
- anonymous, 2000. "Annual report highlights the Atlanta Fed at work," Financial Update, Federal Reserve Bank of Atlanta, vol. 13(Jul), pages 1-5.
- Unknown, 2000. "Annual Report On Cotton Economics Research 1999/00," Cotton Economics Research Institute CER Series 31253, Texas Tech University, Department of Agricultural and Applied Economics.
- Tyler Moore & Richard Clayton & Ross Anderson, 2009. "The Economics of Online Crime," Journal of Economic Perspectives, American Economic Association, vol. 23(3), pages 3-20, Summer.
Citations
Citations are extracted by the CitEc Project, subscribe to its RSS feed for this item.
Cited by:
- Cerdeiro, Diego A., 2017.
"Contagion exposure and protection technology,"
Games and Economic Behavior, Elsevier, vol. 105(C), pages 230-254.
- Diego Cerdeiro, 2015. "Contagion Exposure and Protection Technology," Cambridge Working Papers in Economics 1557, Faculty of Economics, University of Cambridge.
- Bloch, Francis & Chatterjee, Kalyan & Dutta, Bhaskar, 2023.
"Attack and interception in networks,"
Theoretical Economics, Econometric Society, vol. 18(4), November.
- Bloch, Francis & Chatterjee, Kalyan & Dutta, Bhaskar, 2021. "Attack and Interception in Networks," CRETA Online Discussion Paper Series 68, Centre for Research in Economic Theory and its Applications CRETA.
- Bloch, Francis & Chatterjee, Kalyan & Dutta, Bhaskar, 2021. "Attack and Interception in Networks," The Warwick Economics Research Paper Series (TWERPS) 1338, University of Warwick, Department of Economics.
- Francis Bloch & Kalyan Chatterjee & Bhaskar Dutta, 2021. "Attack and Interception in Networks," Working Papers 57, Ashoka University, Department of Economics.
- Bloch, Francis & Dutta, Bhaskar & Dziubiński, Marcin, 2020.
"A game of hide and seek in networks,"
Journal of Economic Theory, Elsevier, vol. 190(C).
- Bloch, Francis & Dutta, Bhaskar & Dziubinski, Marcin, 2019. "A Game of Hide and Seek in Networks," CRETA Online Discussion Paper Series 53, Centre for Research in Economic Theory and its Applications CRETA.
- Francis Bloch & Bhaskar Dutta & Marcin Dziubinski, 2020. "A game of hide and seek in networks," Papers 2001.03132, arXiv.org.
- Francis Bloch & Bhaskar Dutta & Marcin Dziubiński, 2020. "A game of hide and seek in networks," Post-Print halshs-03230063, HAL.
- Francis Bloch & Bhaskar Dutta & Marcin Dziubiński, 2020. "A game of hide and seek in networks," PSE-Ecole d'économie de Paris (Postprint) halshs-03230063, HAL.
- Francis Bloch & Bhaskar Dutta & Marcin Dziubi´nski, 2019. "A Game of Hide and Seek in Networks," Working Papers 21, Ashoka University, Department of Economics.
- Bloch, Francis & Dutta, Bhaskar & Dziubinski, Marcin, 2019. "A Game of Hide and Seek in Networks," The Warwick Economics Research Paper Series (TWERPS) 1226, University of Warwick, Department of Economics.
- Alessandro Fedele & Cristian Roner, 2022.
"Dangerous games: A literature review on cybersecurity investments,"
Journal of Economic Surveys, Wiley Blackwell, vol. 36(1), pages 157-187, February.
- Alessandro Fedele & Cristian Roner, 2020. "Dangerous Games: A Literature Review on Cybersecurity Investments," BEMPS - Bozen Economics & Management Paper Series BEMPS75, Faculty of Economics and Management at the Free University of Bozen.
- Britta Hoyer & Kris De Jaegher, 2023. "Network disruption and the common-enemy effect," International Journal of Game Theory, Springer;Game Theory Society, vol. 52(1), pages 117-155, March.
- Pinar Yildirim & Yanhao Wei & Christophe Bulte & Joy Lu, 2020. "Social network design for inducing effort," Quantitative Marketing and Economics (QME), Springer, vol. 18(4), pages 381-417, December.
- Mehmet Bac, 2023. "Transnational crimes: how nations should cooperate and why they don't," Scandinavian Journal of Economics, Wiley Blackwell, vol. 125(4), pages 860-899, October.
Most related items
These are the items that most often cite the same works as this one and are cited by the same works as this one.- Cerdeiro, Diego & Dziubinski, Marcin & Goyal, Sanjeev, 2015.
"Contagion Risk and Network Design,"
Climate Change and Sustainable Development
206416, Fondazione Eni Enrico Mattei (FEEM).
- Diego Cerdeiro & Marcin Dziubinski & Sanjeev Goyal, 2015. "Contagion Risk and Network Design," Working Papers 2015.56, Fondazione Eni Enrico Mattei.
- Diego Cerdeiro & Marcin Dziubinski & Sanjeev Goyal, 2015. "Contagion Risk and Network Design," Cambridge Working Papers in Economics 1547, Faculty of Economics, University of Cambridge.
- Bravard, Christophe & Charroin, Liza & Touati, Corinne, 2017.
"Optimal design and defense of networks under link attacks,"
Journal of Mathematical Economics, Elsevier, vol. 68(C), pages 62-79.
- Christophe Bravard & Liza Charroin & Corinne Touati, 2015. "Optimal design and defense of networks under link attacks," Working Papers 1519, Groupe d'Analyse et de Théorie Economique Lyon St-Étienne (GATE Lyon St-Étienne), Université de Lyon.
- Christophe Bravard & Liza Charroin & Corinne Touati, 2017. "Optimal Design and Defense of Networks Under Link Attacks," Post-Print hal-01384998, HAL.
- Christophe Bravard & Liza Charroin & Corinne Touati, 2016. "Optimal design and defense of networks under link attacks," Post-Print halshs-01411520, HAL.
- Christophe Bravard & Liza Charroin & Corinne Touati, 2015. "Optimal design and defense of networks under link attacks," Working Papers halshs-01176928, HAL.
- Lam, Wing Man Wynne, 2016. "Attack-prevention and damage-control investments in cybersecurity," Information Economics and Policy, Elsevier, vol. 37(C), pages 42-51.
- Lam, Wing Man Wynne, 2014. "Ex Ante and Ex Post Investments in Cybersecurity," TSE Working Papers 14-519, Toulouse School of Economics (TSE).
- Marcin Dziubinski & Sanjeev Goyal, 2014. "How to Defend a Network?," Cambridge Working Papers in Economics 1450, Faculty of Economics, University of Cambridge.
- Marcin Dziubinski & Sanjeev Goyal & Adrien Vigier, 2015. "Conflict and Networks," Cambridge Working Papers in Economics 1565, Faculty of Economics, University of Cambridge.
- Dziubiński, Marcin Konrad & Goyal, Sanjeev, 2017. "How do you defend a network?," Theoretical Economics, Econometric Society, vol. 12(1), January.
- Alessandro Fedele & Cristian Roner, 2022.
"Dangerous games: A literature review on cybersecurity investments,"
Journal of Economic Surveys, Wiley Blackwell, vol. 36(1), pages 157-187, February.
- Alessandro Fedele & Cristian Roner, 2020. "Dangerous Games: A Literature Review on Cybersecurity Investments," BEMPS - Bozen Economics & Management Paper Series BEMPS75, Faculty of Economics and Management at the Free University of Bozen.
- Richard B. Coffin & Christopher L. Osburn & Rebecca E. Plummer & Joseph P. Smith & Paula S. Rose & Kenneth S. Grabowski, 2015. "Deep Sediment-Sourced Methane Contribution to Shallow Sediment Organic Carbon: Atwater Valley, Texas-Louisiana Shelf, Gulf of Mexico," Energies, MDPI, vol. 8(3), pages 1-23, February.
- Lam, W., 2015. "Attack-Deterring and Damage-Control Investments in Cybersecurity," LIDAM Discussion Papers CORE 2015023, Université catholique de Louvain, Center for Operations Research and Econometrics (CORE).
- Phang, Sock-Yong & Wong, Wing-Keung & Chia, Ngee-Choon, 1996. "Singapore's experience with car quotas : Issues and policy processes," Transport Policy, Elsevier, vol. 3(4), pages 145-153, October.
- Daniel Woods & Mustafa Abdallah & Saurabh Bagchi & Shreyas Sundaram & Timothy Cason, 2022.
"Network defense and behavioral biases: an experimental study,"
Experimental Economics, Springer;Economic Science Association, vol. 25(1), pages 254-286, February.
- Timothy N. Cason & Daniel Woods & Mustafa Abdallah & Saurabh Bagechi & Shreyas Sundaram, 2021. "Network Defense and Behavior Biases: An Experimental Study," Purdue University Economics Working Papers 1328, Purdue University, Department of Economics.
- Bloch, Francis & Dutta, Bhaskar & Dziubiński, Marcin, 2020.
"A game of hide and seek in networks,"
Journal of Economic Theory, Elsevier, vol. 190(C).
- Bloch, Francis & Dutta, Bhaskar & Dziubinski, Marcin, 2019. "A Game of Hide and Seek in Networks," CRETA Online Discussion Paper Series 53, Centre for Research in Economic Theory and its Applications CRETA.
- Francis Bloch & Bhaskar Dutta & Marcin Dziubinski, 2020. "A game of hide and seek in networks," Papers 2001.03132, arXiv.org.
- Francis Bloch & Bhaskar Dutta & Marcin Dziubiński, 2020. "A game of hide and seek in networks," Post-Print halshs-03230063, HAL.
- Francis Bloch & Bhaskar Dutta & Marcin Dziubiński, 2020. "A game of hide and seek in networks," PSE-Ecole d'économie de Paris (Postprint) halshs-03230063, HAL.
- Francis Bloch & Bhaskar Dutta & Marcin Dziubi´nski, 2019. "A Game of Hide and Seek in Networks," Working Papers 21, Ashoka University, Department of Economics.
- Bloch, Francis & Dutta, Bhaskar & Dziubinski, Marcin, 2019. "A Game of Hide and Seek in Networks," The Warwick Economics Research Paper Series (TWERPS) 1226, University of Warwick, Department of Economics.
- Sanjeev Goyal & Adrien Vigier, 2014.
"Attack, Defence, and Contagion in Networks,"
Review of Economic Studies,
Oxford University Press, vol. 81(4), pages 1518-1542.
- S. Goyal & A. Vigier, 2013. "Attack, Defense and Contagion in Networks," Cambridge Working Papers in Economics 1327, Faculty of Economics, University of Cambridge.
- Sanjeev Goyal & Adrien Vigier, 2014. "Attack, Defense and Contagion in Networks," Cambridge Working Papers in Economics 1451, Faculty of Economics, University of Cambridge.
- Acemoglu, Daron & Malekian, Azarakhsh & Ozdaglar, Asu, 2016.
"Network security and contagion,"
Journal of Economic Theory, Elsevier, vol. 166(C), pages 536-585.
- Daron Acemoglu & Azarakhsh Malekian & Asuman Ozdaglar, 2013. "Network Security and Contagion," NBER Working Papers 19174, National Bureau of Economic Research, Inc.
- Daron Acemoglu & Azarakhsh Malekian & Asuman E. Ozdaglar, 2013. "Network Security and Contagion," Levine's Working Paper Archive 786969000000000797, David K. Levine.
- Belhaj, Mohamed & Deroïan, Frédéric, 2018.
"Targeting the key player: An incentive-based approach,"
Journal of Mathematical Economics, Elsevier, vol. 79(C), pages 57-64.
- Mohamed Belhaj & Frédéric Deroïan, 2018. "Targeting the Key Player: An Incentive-Based Approach," Working Papers halshs-01699849, HAL.
- Mohamed Belhaj & Frédéric Deroïan, 2018. "Targeting the key player: An incentive-based approach," Post-Print hal-01981885, HAL.
- Mohamed Belhaj & Frédéric Deroïan, 2018. "Targeting the Key Player: An Incentive-Based Approach," AMSE Working Papers 1804, Aix-Marseille School of Economics, France.
- Fabrizio Adriani, 2020. "Social distance, speed of containment, and crowding in/out in a network model of contagion," Discussion Papers 2020-10, The Centre for Decision Research and Experimental Economics, School of Economics, University of Nottingham.
- Michel Grabisch & Agnieszka Rusinowska & Xavier Venel, 2019.
"Diffusion in countably infinite networks,"
Documents de travail du Centre d'Economie de la Sorbonne
19017, Université Panthéon-Sorbonne (Paris 1), Centre d'Economie de la Sorbonne.
- Michel Grabisch & Agnieszka Rusinowska & Xavier Venel, 2019. "Diffusion in countably infinite networks," Post-Print halshs-02340011, HAL.
- Michel Grabisch & Agnieszka Rusinowska & Xavier Venel, 2019. "Diffusion in countably infinite networks," Université Paris1 Panthéon-Sorbonne (Post-Print and Working Papers) halshs-02340011, HAL.
- Koroneos, C. & Fokaidis, P. & Moussiopoulos, N., 2005. "Cyprus energy system and the use of renewable energy sources," Energy, Elsevier, vol. 30(10), pages 1889-1901.
- Tefera, TL & Kirsten, JF & Perret, S, 2003. "Market Incentives, Farmers’ Response And A Policy Dilemma: A Case Study Of Chat Production In The Eastern Ethiopian Highlands," Agrekon, Agricultural Economics Association of South Africa (AEASA), vol. 42(3).
More about this item
Keywords
Network design; Individual security; Inefficiencies; Networks;All these keywords.
JEL classification:
- D85 - Microeconomics - - Information, Knowledge, and Uncertainty - - - Network Formation
- D62 - Microeconomics - - Welfare Economics - - - Externalities
- C72 - Mathematical and Quantitative Methods - - Game Theory and Bargaining Theory - - - Noncooperative Games
Statistics
Access and download statisticsCorrections
All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:eee:jetheo:v:170:y:2017:i:c:p:182-226. See general information about how to correct material in RePEc.
If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.
If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .
If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.
For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Catherine Liu (email available below). General contact details of provider: http://www.elsevier.com/locate/inca/622869 .
Please note that corrections may take a couple of weeks to filter through the various RePEc services.