The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper is concerned with the problem of strategic information acquisition and information transmission. In our model, a decision maker delegates multiple experts to acquire information concerning a binary decision under uncertainty. The decision maker and experts have different utility functions with respect to the decision problem, which are their private information. We derive the optimal number...
During the cyber security construction process, how to set proper security standard and investment quota in accordance with the important degree of its information is a universal problem of enterprises. We propose a dynamic Invest-Attack Model based on Information Asymmetry between the protectors and attackers of cyber security and make RD analysis to the proposed model with Evolutionary Game Theory...
Game theory orients to the formulation and solution of various game issues, has undergone over half a century of fast development, and has gained a series of achievement milestones. So it has played a great positive role in the development of economics and relevant fields. This paper focuses on analyzing the game model of the cadres' management, introduces game theory and researches the level of using...
In various settings, such as when customers use the same passwords at several independent web sites, security decisions by one organization may have a significant impact on the security of another. We develop a model for security decision-making in such settings, using a variation of linear influence networks. The linear influence model uses a matrix to represent linear dependence between security...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.