Strategic Interdependent Security Systems

dc.contributor.authorWeber, Thomas
dc.date.accessioned2021-12-24T18:24:39Z
dc.date.available2021-12-24T18:24:39Z
dc.date.issued2022-01-04
dc.description.abstractWe develop a model of investments in interdependent security systems in the presence of a strategizing opponent, who attempts to infiltrate at least one of the systems with a harmful device. In the first stage, a finite number of targets decide about their respective investments in direct and indirect security systems by choosing appropriate detection probabilities minimizing expected losses. In the second stage, infiltration of a target's security system with the harmful device is directed by the agent from the outside and may occur either directly by a target's failing to detect the device at its entry level or indirectly by first passing undetected through the other target's entry screening and subsequently clearing the cross-screening device.
dc.format.extent14 pages
dc.identifier.doi10.24251/HICSS.2022.852
dc.identifier.isbn978-0-9981331-5-7
dc.identifier.urihttp://hdl.handle.net/10125/80193
dc.language.isoeng
dc.relation.ispartofProceedings of the 55th Hawaii International Conference on System Sciences
dc.rightsAttribution-NonCommercial-NoDerivatives 4.0 International
dc.rights.urihttps://creativecommons.org/licenses/by-nc-nd/4.0/
dc.subjectStrategy, Information, Technology, Economics, and Society (SITES)
dc.subjectall-pay auction
dc.subjectinterdependent security
dc.subjectsafety standards
dc.subjectsecurity systems
dc.titleStrategic Interdependent Security Systems
dc.type.dcmitext

Files

Original bundle
Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
0691.pdf
Size:
1.37 MB
Format:
Adobe Portable Document Format