منابع مشابه
Security Games and Contagion
Many real-world situations involve attempts to spread influence through a social network. For example, viral marketing is when a marketer selects a few people to receive some initial advertisement in the hopes that these ‘seeds’ will spread the news. Even peacekeeping operations in one area have been shown to have a contagious effect on the neighboring vicinity. Each of these domains also featu...
متن کاملContagion of Fire Sale on Security-Trader Network
This paper studies the contagion of fire sale across asset markets through the price effect. When a distressed trader liquidates her stock holding quickly, the fire sale will depress the asset price and other shareholders will incur mark-to-market losses. If the losses are large enough, these shareholders may also have to liquidate other assets they hold, and the liquidation can spread out and ...
متن کاملSecurity Games for Controlling Contagion
Many strategic actions carry a ‘contagious’ component beyond the immediate locale of the effort itself. Viral marketing and peacekeeping operations have both been observed to have a spreading effect. In this work, we use counterinsurgency as our illustrative domain. Defined as the effort to block the spread of support for an insurgency, such operations lack the manpower to defend the entire pop...
متن کاملContagion Risk and Network Design
Individuals derive benefits from their connections, but these may, at the same time, transmit external threats. Individuals therefore invest in security to protect themselves. However, the incentives to invest in security depend on their network exposures. We study the problem of designing a network that provides the right individual incentives. Motivated by cybersecurity, we first study the si...
متن کاملSecurity games with contagion: handling asymmetric information
Counterinsurgency, which is the effort to mitigate support for an opposing organization, is one such domain that has been studied recently and past work has modeled the problem as an influence blocking maximization that features an influencer and a mitigator. While past work has introduced scalable heuristic techniques for generating effective strategies using a double oracle algorithm, it has ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: SSRN Electronic Journal
سال: 2013
ISSN: 1556-5068
DOI: 10.2139/ssrn.2285816