Predicted and Observed User Behavior in the Weakest-link Security Game
暂无分享,去创建一个
Nicolas Christin | Jens Grossklags | John C.-I. Chuang | Jens Grossklags | Nicolas Christin | J. Chuang
[1] Nicolas Christin,et al. Near rationality and competitive equilibria in networked systems , 2004, PINS '04.
[2] Bettina Berendt,et al. E-privacy in 2nd generation E-commerce: privacy preferences versus actual behavior , 2001, EC '01.
[3] Nicolas Christin,et al. Secure or insure?: a game-theoretic analysis of information security games , 2008, WWW.
[4] Scott Shenker,et al. An experiment on learning with limited information: nonconvergence, experimentation cascades, and the advantage of being slow , 2004, Games Econ. Behav..
[5] J. Hirshleifer. From weakest-link to best-shot: The voluntary provision of public goods , 1983 .
[6] Hal R. Varian,et al. System Reliability and Free Riding , 2004, Economics of Information Security.
[7] J. Huyck,et al. Tacit Coordination Games, Strategic Uncertainty, and Coordination Failure , 1990 .
[8] Alessandro Acquisti,et al. Privacy and rationality in individual decision making , 2005, IEEE Security & Privacy.
[9] Ross J. Anderson. Why information security is hard - an economic perspective , 2001, Seventeenth Annual Computer Security Applications Conference.