IDEAS home Printed from https://ideas.repec.org/a/inm/ordeca/v1y2004i3p131-148.html
   My bibliography  Save this article

Configuration of Detection Software: A Comparison of Decision and Game Theory Approaches

Author

Listed:
  • Huseyin Cavusoglu

    (A. B. Freeman School of Business, Tulane University, New Orleans, Louisiana 70118)

  • Srinivasan Raghunathan

    (School of Management, The University of Texas at Dallas, Richardson, Texas 75083)

Abstract

Firms are increasingly relying on software to detect fraud in domains such as security, financial services, tax, and auditing. A fundamental problem in using detection software for fraud detection is achieving the optimal balance between the detection and false-positive rates. Many firms use decision theory to address the configuration problem. Decision theory is based on the presumption that the firm's actions do not influence the behavior of fraudsters. Game theory recognizes the fact that fraudsters do modify their strategies in response to firms' actions. In this paper, we compare decision and game theory approaches to the detection software configuration problem when firms are faced with strategic users. We find that under most circumstances firms incur lower costs when they use the game theory as opposed to the decision theory because the decision theory approach frequently either over- or underconfigures the detection software. However, firms incur the same or lower cost under the decision theory approach compared with the game theory approach in a simultaneous-move game if configurations under decision theory and game theory are sufficiently close. A limitation of the game theory approach is that it requires user-specific utility parameters, which are difficult to estimate. Decision theory, in contrast to game theory, requires the fraud probability estimate, which is more easily obtained.

Suggested Citation

  • Huseyin Cavusoglu & Srinivasan Raghunathan, 2004. "Configuration of Detection Software: A Comparison of Decision and Game Theory Approaches," Decision Analysis, INFORMS, vol. 1(3), pages 131-148, September.
  • Handle: RePEc:inm:ordeca:v:1:y:2004:i:3:p:131-148
    DOI: 10.1287/deca.1040.0022
    as

    Download full text from publisher

    File URL: http://dx.doi.org/10.1287/deca.1040.0022
    Download Restriction: no

    File URL: https://libkey.io/10.1287/deca.1040.0022?utm_source=ideas
    LibKey link: if access is restricted and if your library uses this service, LibKey will redirect you to where you can use your library subscription to access this item
    ---><---

    References listed on IDEAS

    as
    1. John C. Harsanyi, 1967. "Games with Incomplete Information Played by "Bayesian" Players, I-III Part I. The Basic Model," Management Science, INFORMS, vol. 14(3), pages 159-182, November.
    2. Jacob W. Ulvila & John E. Gaffney, 2004. "A Decision Analysis Method for Evaluating Computer Intrusion Detection Systems," Decision Analysis, INFORMS, vol. 1(1), pages 35-50, March.
    3. Sumit Sarkar & Ram S. Sriram, 2001. "Bayesian Models for Early Warning of Bank Failures," Management Science, INFORMS, vol. 47(11), pages 1457-1475, November.
    4. John C. Harsanyi, 1968. "Games with Incomplete Information Played by "Bayesian" Players Part II. Bayesian Equilibrium Points," Management Science, INFORMS, vol. 14(5), pages 320-334, January.
    5. John C. Harsanyi, 1968. "Games with Incomplete Information Played by `Bayesian' Players, Part III. The Basic Probability Distribution of the Game," Management Science, INFORMS, vol. 14(7), pages 486-502, March.
    Full references (including those not matched with items on IDEAS)

    Most related items

    These are the items that most often cite the same works as this one and are cited by the same works as this one.
    1. Matata Ponyo Mapon & Jean-Paul K. Tsasa, 2019. "The artefact of the Natural Resources Curse," Papers 1911.09681, arXiv.org.
    2. Karthik N. Kannan, 2012. "Effects of Information Revelation Policies Under Cost Uncertainty," Information Systems Research, INFORMS, vol. 23(1), pages 75-92, March.
    3. Xie, Yinxi & Xie, Yang, 2017. "Machiavellian experimentation," Journal of Comparative Economics, Elsevier, vol. 45(4), pages 685-711.
    4. von Wangenheim, Georg & Müller, Stephan, 2014. "Evolution of cooperation in social dilemmas: signaling internalized norms," VfS Annual Conference 2014 (Hamburg): Evidence-based Economic Policy 100340, Verein für Socialpolitik / German Economic Association.
    5. Derbyshire, James & Giovannetti, Emanuele, 2017. "Understanding the failure to understand New Product Development failures: Mitigating the uncertainty associated with innovating new products by combining scenario planning and forecasting," Technological Forecasting and Social Change, Elsevier, vol. 125(C), pages 334-344.
    6. David Rios Insua & David Banks & Jesus Rios, 2016. "Modeling Opponents in Adversarial Risk Analysis," Risk Analysis, John Wiley & Sons, vol. 36(4), pages 742-755, April.
    7. Elselt, H. A., 1998. "Perception and information in a competitive location model," European Journal of Operational Research, Elsevier, vol. 108(1), pages 94-105, July.
    8. Bin Xie & David M. Dilts & Mikhael Shor, 2006. "The physician–patient relationship: the impact of patient‐obtained medical information," Health Economics, John Wiley & Sons, Ltd., vol. 15(8), pages 813-833, August.
    9. Richard Makadok & Jay B. Barney, 2001. "Strategic Factor Market Intelligence: An Application of Information Economics to Strategy Formulation and Competitor Intelligence," Management Science, INFORMS, vol. 47(12), pages 1621-1638, December.
    10. Robert J. Aumann, 2005. "Musings on Information and Knowledge," Econ Journal Watch, Econ Journal Watch, vol. 2(1), pages 88-96, April.
    11. Roger B. Myerson, 2004. "Comments on "Games with Incomplete Information Played by 'Bayesian' Players, I--III Harsanyi's Games with Incoplete Information"," Management Science, INFORMS, vol. 50(12_supple), pages 1818-1824, December.
    12. Figuieres, Charles & Tidball, Mabel & Jean-Marie, Alain, 2004. "On the effects of conjectures in a symmetric strategic setting," Research in Economics, Elsevier, vol. 58(1), pages 75-102, March.
    13. Güth, Werner & Pezanis-Christou, Paul, 2015. "Believing in correlated types in spite of independence: An indirect evolutionary analysis," Economics Letters, Elsevier, vol. 134(C), pages 1-3.
    14. Sonja Brangewitz & Claus-Jochen Haake, 2013. "Cooperative Transfer Price Negotiations under Incomplete Information," Working Papers CIE 64, Paderborn University, CIE Center for International Economics.
    15. Erim Kardeş & Fernando Ordóñez & Randolph W. Hall, 2011. "Discounted Robust Stochastic Games and an Application to Queueing Control," Operations Research, INFORMS, vol. 59(2), pages 365-382, April.
    16. Giovanni Paolo Crespi & Davide Radi & Matteo Rocca, 2017. "Robust games: theory and application to a Cournot duopoly model," Decisions in Economics and Finance, Springer;Associazione per la Matematica, vol. 40(1), pages 177-198, November.
    17. Zonderland, Maartje E. & Timmer, Judith, 2012. "Optimal allocation of MRI scan capacity among competing hospital departments," European Journal of Operational Research, Elsevier, vol. 219(3), pages 630-637.
    18. Tomohiro Hayashida & Ichiro Nishizaki & Shinya Sekizaki & Junya Okabe, 2023. "Data Envelopment Analysis Approaches for Multiperiod Two-Level Production and Distribution Planning Problems," Mathematics, MDPI, vol. 11(21), pages 1-25, October.
    19. Michael Perry & Hadi El-Amine, 2019. "Computational Efficiency in Multivariate Adversarial Risk Analysis Models," Decision Analysis, INFORMS, vol. 16(4), pages 314-332, December.
    20. Garrouste, Christelle & Loi, Massimo, 2009. "Applications De La Theorie Des Jeux A L'Education: Pour Quels Types Et Niveaux D'Education, Quels Modeles, Quels Resultats? [Applications of Game Theory in Education - What Types and At What Levels," MPRA Paper 31825, University Library of Munich, Germany.

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:inm:ordeca:v:1:y:2004:i:3:p:131-148. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Chris Asher (email available below). General contact details of provider: https://edirc.repec.org/data/inforea.html .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.