You Only Die Once: Managing Discrete Interdependent Risks

This paper extends our earlier analysis of interdependent security issues to a general class of problems involving discrete interdependent risks with heterogeneous agents. There is a threat of an event that can only happen once, and the risk depends on actions taken by others. Any agent's incentive to invest in managing the risk depends on the actions of others. Security problems at airlines and in computer networks come into this category, as do problems of risk management in organizations facing the possibility of bankruptcy, and individuals' choices about whether to be vaccinated against an infectious disease. Surprisingly the framework also covers certain aspects of investment in R&D. Here we characterize Nash equilibria with heterogeneous agents and give conditions for tipping and cascading of equilibria.

[1]  T. Schelling Micromotives and Macrobehavior , 1978 .

[2]  P. Dasgupta,et al.  Uncertainty, Industrial Structure, and the Speed of R&D , 1980 .

[3]  Partha Dasgupta,et al.  Resource Depletion under Technological Uncertainty , 1981 .

[4]  J. Hirshleifer From weakest-link to best-shot: The voluntary provision of public goods , 1983 .

[5]  Philip H. Dybvig,et al.  Bank Runs, Deposit Insurance, and Liquidity , 1983, Journal of Political Economy.

[6]  J. Geanakoplos,et al.  Multimarket Oligopoly: Strategic Substitutes and Complements , 1985, Journal of Political Economy.

[7]  Carl Shapiro,et al.  Dynamic R&D Competition , 1985 .

[8]  Joseph Farrell,et al.  Standardization, Compatibility, and Innovation , 1985 .

[9]  Ravi Jagannathan,et al.  Banking Panics, Information, and Rational Expectations Equilibrium , 1988 .

[10]  Avinash Dixit,et al.  A General Model of R&D Competition and Policy , 1988 .

[11]  V. Rich Personal communication , 1989, Nature.

[12]  V. Crawford,et al.  Learning How to Cooperate: Optimal Play in Repeated Coordination Games , 1990 .

[13]  C. Shapiro,et al.  Systems Competition and Network Effects , 1994 .

[14]  G. Heal,et al.  Formation of International Environmental Agreements , 1994 .

[15]  P. Howitt,et al.  Endogenous Growth Theory , 1999 .

[16]  S. Bikhchandani,et al.  Learning from the behavior of others : conformity, fads, and informational cascades , 1998 .

[17]  J. Polonchek,et al.  CONTAGION EFFECTS IN THE INSURANCE INDUSTRY , 1999 .

[18]  Charles W. Calomiris U.S. Bank Deregulation in Historical Perspective , 2000 .

[19]  Ross J. Anderson Why information security is hard - an economic perspective , 2001, Seventeenth Annual Computer Security Applications Conference.

[20]  T. Sandler,et al.  Weakest-link public goods: giving in-kind or transferring money in a sequential game , 2001 .

[21]  Gesine Reinert,et al.  Small worlds , 2001, Random Struct. Algorithms.

[22]  G. Woo Quantitative Terrorism Risk Assessment , 2002 .

[23]  T. Sandler,et al.  Weakest-link public goods: Giving in-kind or transferring money , 2002 .

[24]  David L. Craft,et al.  Emergency response to a smallpox attack: The case for mass vaccination , 2002, Proceedings of the National Academy of Sciences of the United States of America.

[25]  Jon M. Huntsman,et al.  Wharton Risk Management and Decision Processes Center , 2002 .

[26]  Lawrence M Wein,et al.  Analyzing bioterror response logistics: the case of smallpox. , 2003, Mathematical biosciences.

[27]  T. Sandler,et al.  Collective Action and Transnational Terrorism , 2003 .

[28]  Avinash Dixit,et al.  Clubs with Entrapment , 2003 .

[29]  Scott Barrett,et al.  GLOBAL DISEASE ERADICATION , 2003 .

[30]  R. Zeckhauser,et al.  The Ecology of Terror Defense , 2003 .