dc.contributor.author | Acemoglu, K. Daron | |
dc.contributor.author | Malekian, Azarakhsh | |
dc.contributor.author | Koksal, Asuman E. | |
dc.date.accessioned | 2018-12-17T17:51:23Z | |
dc.date.available | 2018-12-17T17:51:23Z | |
dc.date.issued | 2016-11 | |
dc.identifier.issn | 00220531 | |
dc.identifier.uri | http://hdl.handle.net/1721.1/119662 | |
dc.description.abstract | We develop a theoretical model of security investments in a network of interconnected agents. Network connections introduce the possibility of cascading failures due to an exogenous or endogenous attack depending on the profile of security investments by the agents. We provide a tractable decomposition of individual payoffs into an own effect and an externality, which also enables us to characterize individual investment incentives recursively (by considering the network with one agent removed at a time). Using this decomposition, we provide characterization of equilibrium and socially optimal investment levels as a function of the structure of the network, highlighting the role of a new set of network centrality measures in shaping the levels of equilibrium and optimal investments. When the attack location is endogenized (by assuming that the attacker chooses a probability distribution over the location of the attack in order to maximize damage), similar forces still operate, but now because greater investment by an agent shifts the attack to other parts of the network, the equilibrium may involve too much investment relative to the social optimum. | en_US |
dc.publisher | Elsevier BV | en_US |
dc.relation.isversionof | http://dx.doi.org/10.1016/J.JET.2016.09.009 | en_US |
dc.rights | Creative Commons Attribution-Noncommercial-Share Alike | en_US |
dc.rights.uri | http://creativecommons.org/licenses/by-nc-sa/4.0/ | en_US |
dc.source | NBER | en_US |
dc.title | Network security and contagion | en_US |
dc.type | Article | en_US |
dc.identifier.citation | Acemoglu, Daron, Azarakhsh Malekian, and Asu Ozdaglar. “Network Security and Contagion.” Journal of Economic Theory 166 (November 2016): 536–585. | en_US |
dc.contributor.department | Massachusetts Institute of Technology. Department of Economics | en_US |
dc.contributor.department | Massachusetts Institute of Technology. Department of Electrical Engineering and Computer Science | en_US |
dc.contributor.department | Massachusetts Institute of Technology. Laboratory for Information and Decision Systems | en_US |
dc.contributor.mitauthor | Acemoglu, K. Daron | |
dc.contributor.mitauthor | Malekian, Azarakhsh | |
dc.contributor.mitauthor | Koksal, Asuman E. | |
dc.relation.journal | Journal of Economic Theory | en_US |
dc.eprint.version | Original manuscript | en_US |
dc.type.uri | http://purl.org/eprint/type/JournalArticle | en_US |
eprint.status | http://purl.org/eprint/status/NonPeerReviewed | en_US |
dc.date.updated | 2018-12-04T13:33:02Z | |
dspace.orderedauthors | Acemoglu, Daron; Malekian, Azarakhsh; Ozdaglar, Asu | en_US |
dspace.embargo.terms | N | en_US |
dc.identifier.orcid | https://orcid.org/0000-0003-0908-7491 | |
dc.identifier.orcid | https://orcid.org/0000-0003-4033-9490 | |
dc.identifier.orcid | https://orcid.org/0000-0002-1827-1285 | |
mit.license | OPEN_ACCESS_POLICY | en_US |