IDEAS home Printed from https://ideas.repec.org/p/use/tkiwps/1013.html
   My bibliography  Save this paper

Strategic Network Disruption and Defense

Author

Listed:
  • K.J.M. De Jaegher
  • B. Hoyer

Abstract

Networks are one of the essential building blocks of society. Not only do firms cooperate in R&D networks, but firms themselves may be seen as networks of information-exchanging workers. Social movements increasingly make use of networks to exchange information, just as on the negative side criminal and terrorist networks use them. However, the literature on networks has mainly focused on the cooperative side of networks and has so far neglected the competition side of networks. Networks themselves may face competition from actors with opposing interests to theirs. Several R&D networks may compete with one another. The firm as a network of employees obviously faces competition. In particular, given the importance of connectivity for networks, competing networks may try to disrupt each other, by trying to convince key players in competing networks to defect, or to stop sponsoring key links (strategic network disruption). In response, networks that face competition will adapt their structure, and will avoid vulnerable network structures. Such network competition is what our paper is concerned with.

Suggested Citation

  • K.J.M. De Jaegher & B. Hoyer, 2010. "Strategic Network Disruption and Defense," Working Papers 10-13, Utrecht School of Economics.
  • Handle: RePEc:use:tkiwps:1013
    as

    Download full text from publisher

    File URL: https://dspace.library.uu.nl/bitstream/handle/1874/180051/10-13.pdf
    Download Restriction: no
    ---><---

    Other versions of this item:

    References listed on IDEAS

    as
    1. Marco J. van der Leij, 2003. "Competing Transport Networks," Tinbergen Institute Discussion Papers 03-009/1, Tinbergen Institute.
    Full references (including those not matched with items on IDEAS)

    Citations

    Citations are extracted by the CitEc Project, subscribe to its RSS feed for this item.
    as


    Cited by:

    1. B. Hoyer, 2012. "Network Disruption and the Common Enemy Effect," Working Papers 12-06, Utrecht School of Economics.
    2. Bravard, Christophe & Charroin, Liza & Touati, Corinne, 2017. "Optimal design and defense of networks under link attacks," Journal of Mathematical Economics, Elsevier, vol. 68(C), pages 62-79.
    3. Hans Haller, 2015. "Network Vulnerability: A Designer-Disruptor Game," Working Papers e07-50, Virginia Polytechnic Institute and State University, Department of Economics.
    4. McBride, Michael & Hewitt, David, 2013. "The enemy you can’t see: An investigation of the disruption of dark networks," Journal of Economic Behavior & Organization, Elsevier, vol. 93(C), pages 32-50.
    5. V. Masson & S. Choi & A. Moore & M. Oak, 2018. "A model of informal favor exchange on networks," Journal of Public Economic Theory, Association for Public Economic Theory, vol. 20(5), pages 639-656, October.
    6. Dan Kovenock & Brian Roberson, 2018. "The Optimal Defense Of Networks Of Targets," Economic Inquiry, Western Economic Association International, vol. 56(4), pages 2195-2211, October.
    7. Westbrock, Bastian & Bosker, Maarten, 2014. "A theory of trade in a global production network," CEPR Discussion Papers 9870, C.E.P.R. Discussion Papers.
    8. Billand, Pascal & Bravard, Christophe & Iyengar, Sitharama S. & Kumar, Rajnish & Sarangi, Sudipta, 2016. "Network connectivity under node failure," Economics Letters, Elsevier, vol. 149(C), pages 164-167.
    9. Toni Ahnert & Michael Brolley & David Cimon & Ryan Riordan, 2022. "Cyber Risk and Security Investment," Staff Working Papers 22-32, Bank of Canada.
    10. Britta Hoyer & Stephanie Rosenkranz, 2018. "Determinants of Equilibrium Selection in Network Formation: An Experiment," Games, MDPI, vol. 9(4), pages 1-25, November.
    11. Acemoglu, Daron & Malekian, Azarakhsh & Ozdaglar, Asu, 2016. "Network security and contagion," Journal of Economic Theory, Elsevier, vol. 166(C), pages 536-585.
    12. Lasse Kliemann & Elmira Shirazi Sheykhdarabadi & Anand Srivastav, 2017. "Swap Equilibria under Link and Vertex Destruction," Games, MDPI, vol. 8(1), pages 1-18, February.
    13. Block, Lukas, 2023. "Network formation with NIMBY constraints," Energy Economics, Elsevier, vol. 119(C).
    14. Tackseung Jun & Jeong-Yoo Kim, 2020. "A Note on Connectivity and Stability in Dynamic Network Formation," Games, MDPI, vol. 11(4), pages 1-10, October.
    15. Lukas Block, 2022. "Network formation with NIMBY constraints," Working Papers Dissertations 94, Paderborn University, Faculty of Business Administration and Economics.
    16. Landwehr, Jakob, 2015. "Network design and imperfect defense," Center for Mathematical Economics Working Papers 537, Center for Mathematical Economics, Bielefeld University.
    17. Kris De Jaegher, 2021. "Common‐Enemy Effects: Multidisciplinary Antecedents And Economic Perspectives," Journal of Economic Surveys, Wiley Blackwell, vol. 35(1), pages 3-33, February.
    18. Deutsch, Yael, 2021. "A polynomial-time method to compute all Nash equilibria solutions of a general two-person inspection game," European Journal of Operational Research, Elsevier, vol. 288(3), pages 1036-1052.
    19. Britta Hoyer & Kris De Jaegher, 2023. "Network disruption and the common-enemy effect," International Journal of Game Theory, Springer;Game Theory Society, vol. 52(1), pages 117-155, March.
    20. Djawadi, Behnud Mir & Endres, Angelika & Hoyer, Britta & Recker, Sonja, 2019. "Network formation and disruption - An experiment are equilibrium networks too complex?," Journal of Economic Behavior & Organization, Elsevier, vol. 157(C), pages 708-734.
    21. Haller, Hans & Hoyer, Britta, 2019. "The common enemy effect under strategic network formation and disruption," Journal of Economic Behavior & Organization, Elsevier, vol. 162(C), pages 146-163.

    Most related items

    These are the items that most often cite the same works as this one and are cited by the same works as this one.

      More about this item

      Keywords

      Strategic Network Disruption; Strategic Network Design; Non-cooperative Network Games; Ordered by external client;
      All these keywords.

      NEP fields

      This paper has been announced in the following NEP Reports:

      Statistics

      Access and download statistics

      Corrections

      All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:use:tkiwps:1013. See general information about how to correct material in RePEc.

      If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

      If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .

      If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

      For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Marina Muilwijk (email available below). General contact details of provider: https://edirc.repec.org/data/eiruunl.html .

      Please note that corrections may take a couple of weeks to filter through the various RePEc services.

      IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.