Games with espionage
نویسندگان
چکیده
We consider normal form games in which two players decide on their strategies before the start of play and Player 1 can purchase noisy information about his opponent’s decisions concerning future response policies (i.e., spy on his opponent). We give a full characterization of the set of distributions over the players’ payo¤s that can be induced by such equilibria, as well as describe their welfare and Pareto properties. In 2 £ 2 games we ...nd three equilibrium phenomena: (i) when the game is non-degenerate, the information purchased is independent of its cost. The cost determines only whether information is purchased or not, (ii) the player who spies treats his information as if it were deterministic, even though it is correct only probabilistically, and (iii) in chain store models, espionage is used if and only if the perfect equilibrium payo¤ di¤ers from the Stackelberg equilibrium payo¤ with Player 2 being the Stackelberg leader. Journal of Economic Literature Classi...cation Numbers: C72, D81, L10.
منابع مشابه
Entry and espionage with noisy signals
We analyze industrial espionage in the context of entry deterrence. We consider a monopoly incumbent, who may expand capacity to deter entry, and a potential entrant who owns an inaccurate Intelligence System. The Intelligence System generates a noisy signal on incumbent's actions and the potential entrant decides whether to enter based on this signal. If the precision of the Intelligence Syste...
متن کاملDynamic Deception *
We model dynamic deception exercises in Ponzi schemes, war, terrorism, industrial/political espionage, and insider trading. We introduce a new class of competitive continuous time games with an informed player having an unbounded action intensity, whose actions are partially observed by a rival, or sequence of rivals. We find extremely strong square-root logarithm decreasing returns to deceptio...
متن کاملCyber Espionage and Illegitimate Information Retrieval
One of the most serious threats to a modern country’s trade, industry and long-term economic development is cyber espionage and insiders. The activities are directed against high-technological industries and companies with advanced basic research. The defence and telecoms sectors are of particular interest, just as biotechnics, medical and material technology. Behind this kind of espionage ther...
متن کاملThe Role of Malware in Reported Cyber Espionage: A Review of the Impact and Mechanism
The recent emergence of the targeted use of malware in cyber espionage versus industry requires a systematic review for better understanding of its impact and mechanism. This paper proposes a basic taxonomy to document major cyber espionage incidents, describing and comparing their impacts (geographic or political targets, origins and motivations) and their mechanisms (dropper, propagation, typ...
متن کاملSocio-Technical Influences of Cyber Espionage: A Case Study of the GhostNet System
Technoethical inquiry deals with a variety of social, legal, cultural, economic, political, and ethical implications of new technological applications which can threaten important aspects of contemporary life and society. GhostNet is a large-scale cyber espionage network which has infiltrated important political, economic, and media institutions including embassies, foreign ministries and other...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- Games and Economic Behavior
دوره 47 شماره
صفحات -
تاریخ انتشار 2004