Showing 1 - 10 of 5,674
Persistent link: https://www.econbiz.de/10010485854
Persistent link: https://www.econbiz.de/10010187567
We develop a theoretical model of security investments in a network of interconnected agents. Network connections … strategic substitutes. In a general (non-symmetric) network, this implies that underinvestment by some agents will encourage … symmetric or locally tree-like. We also characterize the impact of network structure on equilibrium and optimal investments …
Persistent link: https://www.econbiz.de/10012459488
We develop a theoretical model of security investments in a network of interconnected agents. Network connections … strategic substitutes. In a general (non-symmetric) network, this implies that underinvestment by some agents will encourage … symmetric or locally tree-like. We also characterize the impact of network structure on equilibrium and optimal investments …
Persistent link: https://www.econbiz.de/10013079755
We develop a theoretical model of security investments in a network of interconnected agents. Network connections … strategic substitutes. In a general (non-symmetric) network, this implies that under-investment by some agents will encourage … networks that are either symmetric or locally tree-like. We also characterize the impact of network structure on equilibrium …
Persistent link: https://www.econbiz.de/10013079890
Persistent link: https://www.econbiz.de/10014392936
Persistent link: https://www.econbiz.de/10014317654
Attacks against computers and the internet are in the news every week. These primarily take the form of malicious code such as viruses and worms, or denial of service attacks. Less commonly reported are attacs with gain access to computers, either for the purpose of producing damage (such as...
Persistent link: https://www.econbiz.de/10003024230
Persistent link: https://www.econbiz.de/10009408665
Persistent link: https://www.econbiz.de/10010196410