{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T23:22:23Z","timestamp":1725837743049},"publisher-location":"Cham","reference-count":32,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319255934"},{"type":"electronic","value":"9783319255941"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-25594-1_9","type":"book-chapter","created":{"date-parts":[[2015,11,10]],"date-time":"2015-11-10T21:03:13Z","timestamp":1447189393000},"page":"150-169","source":"Crossref","is-referenced-by-count":3,"title":["Interdependent Security Games Under Behavioral Probability Weighting"],"prefix":"10.1007","author":[{"given":"Ashish R.","family":"Hota","sequence":"first","affiliation":[]},{"given":"Shreyas","family":"Sundaram","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,11,12]]},"reference":[{"key":"9_CR1","unstructured":"Baddeley, M.: Information security: lessons from behavioural economics. In: Security and Human Behavior (2011)"},{"issue":"1","key":"9_CR2","doi-asserted-by":"publisher","first-page":"173","DOI":"10.1257\/jep.27.1.173","volume":"27","author":"NC Barberis","year":"2013","unstructured":"Barberis, N.C.: Thirty years of prospect theory in economics: a review and assessment. J. Econ. Perspect. 27(1), 173\u2013196 (2013)","journal-title":"J. Econ. Perspect."},{"key":"9_CR3","unstructured":"B\u00f6hme, R., Schwartz, G.: Modeling cyber-insurance: towards a unifying framework. In: Workshop on the Economics of Information Security (WEIS) (2010)"},{"key":"9_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"23","DOI":"10.1007\/978-3-319-12601-2_2","volume-title":"Decision and Game Theory for Security","author":"M Brown","year":"2014","unstructured":"Brown, M., Haskell, W.B., Tambe, M.: Addressing scalability and robustness in security games with multiple boundedly rational adversaries. In: Saad, W., Poovendran, R. (eds.) GameSec 2014. LNCS, vol. 8840, pp. 23\u201342. Springer, Heidelberg (2014)"},{"key":"9_CR5","volume-title":"Advances in Behavioral Economics","author":"CF Camerer","year":"2011","unstructured":"Camerer, C.F., Loewenstein, G., Rabin, M.: Advances in Behavioral Economics. Princeton University Press, Princeton (2011)"},{"key":"9_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"4","DOI":"10.1007\/978-3-642-25280-8_2","volume-title":"Decision and Game Theory for Security","author":"N Christin","year":"2011","unstructured":"Christin, N.: Network security games: combining game theory, behavioral economics, and network measurements. In: Katz, J., Baras, J.S., Altman, E. (eds.) GameSec 2011. LNCS, vol. 7037, pp. 4\u20136. Springer, Heidelberg (2011)"},{"key":"9_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1007\/978-3-642-27576-0_2","volume-title":"Financial Cryptography and Data Security","author":"N Christin","year":"2012","unstructured":"Christin, N., Egelman, S., Vidas, T., Grossklags, J.: It\u2019s all about the benjamins: an empirical study on incentivizing users to ignore security advice. In: Danezis, G. (ed.) FC 2011. LNCS, vol. 7035, pp. 16\u201330. Springer, Heidelberg (2012)"},{"issue":"1","key":"9_CR8","doi-asserted-by":"publisher","first-page":"129","DOI":"10.1006\/cogp.1998.0710","volume":"38","author":"R Gonzalez","year":"1999","unstructured":"Gonzalez, R., Wu, G.: On the shape of the probability weighting function. Cogn. Psychol. 38(1), 129\u2013166 (1999)","journal-title":"Cogn. Psychol."},{"key":"9_CR9","doi-asserted-by":"crossref","unstructured":"Grossklags, J., Christin, N., Chuang, J.: Secure or insure?: a game-theoretic analysis of information security games. In: Proceedings of the 17th International Conference on World Wide Web, pp. 209\u2013218. ACM (2008)","DOI":"10.1145\/1367497.1367526"},{"key":"9_CR10","doi-asserted-by":"crossref","unstructured":"Grossklags, J., Christin, N., Chuang, J.: Security and insurance management in networks with heterogeneous agents. In: Proceedings of the 9th ACM Conference on Electronic Commerce, pp. 160\u2013169. ACM (2008)","DOI":"10.1145\/1386790.1386818"},{"key":"9_CR11","doi-asserted-by":"publisher","first-page":"9","DOI":"10.1007\/978-1-4419-6967-5_2","volume-title":"Economics of Information Security and Privacy","author":"J Grossklags","year":"2010","unstructured":"Grossklags, J., Johnson, B., Christin, N.: The price of uncertainty in security games. In: Moore, T., Pym, D., Ioannidis, C. (eds.) Economics of Information Security and Privacy, pp. 9\u201332. Springer, Heidelberg (2010)"},{"key":"9_CR12","unstructured":"Hota, A.R., Garg, S., Sundaram, S.: Fragility of the commons under prospect-theoretic risk attitudes. (2014, arXiv preprint). arXiv:1408.5951"},{"key":"9_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"119","DOI":"10.1007\/978-3-319-02786-9_8","volume-title":"Decision and Game Theory for Security","author":"AX Jiang","year":"2013","unstructured":"Jiang, A.X., Nguyen, T.H., Tambe, M., Procaccia, A.D.: Monotonic maximin: a robust stackelberg solution against boundedly rational followers. In: Das, S.K., Nita-Rotaru, C., Kantarcioglu, M. (eds.) GameSec 2013. LNCS, vol. 8252, pp. 119\u2013139. Springer, Heidelberg (2013)"},{"issue":"2","key":"9_CR14","doi-asserted-by":"publisher","first-page":"549","DOI":"10.1109\/TNET.2010.2071397","volume":"19","author":"L Jiang","year":"2011","unstructured":"Jiang, L., Anantharam, V., Walrand, J.: How bad are selfish investments in network security? IEEE\/ACM Trans. Netw. 19(2), 549\u2013560 (2011)","journal-title":"IEEE\/ACM Trans. Netw."},{"key":"9_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"117","DOI":"10.1007\/978-3-642-25280-8_11","volume-title":"Decision and Game Theory for Security","author":"B Johnson","year":"2011","unstructured":"Johnson, B., B\u00f6hme, R., Grossklags, J.: Security games with market insurance. In: Altman, E., Baras, J.S., Katz, J. (eds.) GameSec 2011. LNCS, vol. 7037, pp. 117\u2013130. Springer, Heidelberg (2011)"},{"issue":"2","key":"9_CR16","first-page":"263","volume":"47","author":"D Kahneman","year":"1979","unstructured":"Kahneman, D., Tversky, A.: Prospect theory: an analysis of decision under risk. Econom. J. Econom. Soc. 47(2), 263\u2013291 (1979)","journal-title":"Econom. J. Econom. Soc."},{"key":"9_CR17","unstructured":"Kar, D., Fang, F., Delle Fave, F., Sintov, N., Tambe, M.: A game of thrones: when human behavior models compete in repeated Stackelberg security games. In: Proceedings of the 2015 International Conference on Autonomous Agents and Multiagent Systems, pp. 1381\u20131390 (2015)"},{"issue":"2\u20133","key":"9_CR18","doi-asserted-by":"publisher","first-page":"231","DOI":"10.1023\/A:1024119208153","volume":"26","author":"H Kunreuther","year":"2003","unstructured":"Kunreuther, H., Heal, G.: Interdependent security. J. Risk Uncertain. 26(2\u20133), 231\u2013249 (2003)","journal-title":"J. Risk Uncertain."},{"key":"9_CR19","unstructured":"La, R.J.: Interdependent security with strategic agents and cascades of infection. IEEE Trans. Netw. (2015, To appear)"},{"issue":"2","key":"9_CR20","doi-asserted-by":"publisher","first-page":"23:1","DOI":"10.1145\/2635673","volume":"47","author":"A Laszka","year":"2014","unstructured":"Laszka, A., Felegyhazi, M., Buttyan, L.: A survey of interdependent information security games. ACM Comput. Surveys (CSUR) 47(2), 23:1\u201323:38 (2014)","journal-title":"ACM Comput. Surveys (CSUR)"},{"key":"9_CR21","doi-asserted-by":"crossref","unstructured":"Lelarge, M., Bolot, J.: A local mean field analysis of security investments in networks. In: Proceedings of the 3rd International Workshop on Economics of Networked Systems, pp. 25\u201330. ACM (2008)","DOI":"10.1145\/1403027.1403034"},{"issue":"1","key":"9_CR22","doi-asserted-by":"publisher","first-page":"37","DOI":"10.1145\/1384529.1375463","volume":"36","author":"M Lelarge","year":"2008","unstructured":"Lelarge, M., Bolot, J.: Network externalities and the deployment of security features and protocols in the Internet. ACM SIGMETRICS Perform. Eval. Rev. 36(1), 37\u201348 (2008)","journal-title":"ACM SIGMETRICS Perform. Eval. Rev."},{"key":"9_CR23","unstructured":"Naghizadeh, P., Liu, M.: Voluntary participation in cyber-insurance markets. In: Workshop on the Economics of Information Security (WEIS) (2014)"},{"key":"9_CR24","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511800481","volume-title":"Algorithmic Game Theory","author":"N Nisan","year":"2007","unstructured":"Nisan, N., Roughgarden, T., Tardos, E., Vazirani, V.V.: Algorithmic Game Theory. Cambridge University Press, Cambridge (2007)"},{"key":"9_CR25","doi-asserted-by":"crossref","unstructured":"Pal, R., Golubchik, L., Psounis, K., Hui, P.: Will cyber-insurance improve network security? A market analysis. In: 2014 Proceedings IEEE INFOCOM, pp. 235\u2013243. IEEE (2014)","DOI":"10.1109\/INFOCOM.2014.6847944"},{"issue":"3","key":"9_CR26","doi-asserted-by":"publisher","first-page":"497","DOI":"10.2307\/2998573","volume":"66","author":"D Prelec","year":"1998","unstructured":"Prelec, D.: The probability weighting function. Econometrica 66(3), 497\u2013527 (1998)","journal-title":"Econometrica"},{"issue":"4","key":"9_CR27","doi-asserted-by":"publisher","first-page":"517","DOI":"10.1007\/s10669-013-9473-2","volume":"33","author":"H Rosoff","year":"2013","unstructured":"Rosoff, H., Cui, J., John, R.S.: Heuristics and biases in cyber security dilemmas. Environ. Syst. Decis. 33(4), 517\u2013529 (2013)","journal-title":"Environ. Syst. Decis."},{"key":"9_CR28","doi-asserted-by":"crossref","unstructured":"Schwartz, G.A., Sastry, S.S.: Cyber-insurance framework for large scale interdependent networks. In: Proceedings of the 3rd International Conference on High Confidence Networked Systems, pp. 145\u2013154. ACM (2014)","DOI":"10.1145\/2566468.2566481"},{"issue":"4","key":"9_CR29","doi-asserted-by":"publisher","first-page":"297","DOI":"10.1007\/BF00122574","volume":"5","author":"A Tversky","year":"1992","unstructured":"Tversky, A., Kahneman, D.: Advances in prospect theory: cumulative representation of uncertainty. J. Risk Uncertain. 5(4), 297\u2013323 (1992)","journal-title":"J. Risk Uncertain."},{"key":"9_CR30","series-title":"Advances in Information Security","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/1-4020-8090-5_1","volume-title":"Economics of Information Security","author":"H Varian","year":"2004","unstructured":"Varian, H.: System reliability and free riding. In: Camp, L.J., Lewis, S. (eds.) Economics of Information Security. AIS, pp. 1\u201315. Springer, Heidelberg (2004)"},{"key":"9_CR31","doi-asserted-by":"publisher","first-page":"440","DOI":"10.1016\/j.artint.2012.11.004","volume":"195","author":"R Yang","year":"2013","unstructured":"Yang, R., Kiekintveld, C., Ord\u00f3\u00f1ez, F., Tambe, M., John, R.: Improving resource allocation strategies against human adversaries in security games: an extended study. Artif. Intell. 195, 440\u2013469 (2013)","journal-title":"Artif. Intell."},{"key":"9_CR32","unstructured":"Zhuang, J.: Modeling attacker-defender games with risk preference. Current Research Project Synopses. Paper 69 (2014). http:\/\/research.create.usc.edu\/current_synopses\/69"}],"container-title":["Lecture Notes in Computer Science","Decision and Game Theory for Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-25594-1_9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,1]],"date-time":"2019-09-01T08:12:36Z","timestamp":1567325556000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-25594-1_9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319255934","9783319255941"],"references-count":32,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-25594-1_9","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2015]]}}}