Book contents
- Frontmatter
- Contents
- Foreword
- Preface
- Contributors
- I Computing in Games
- II Algorithmic Mechanism Design
- III Quantifying the Inefficiency of Equilibria
- IV Additional Topics
- 22 Incentives and Pricing in Communications Networks
- 23 Incentives in Peer-to-Peer Systems
- 24 Cascading Behavior in Networks: Algorithmic and Economic Issues
- 25 Incentives and Information Security
- 26 Computational Aspects of Prediction Markets
- 27 Manipulation-Resistant Reputation Systems
- 28 Sponsored Search Auctions
- 29 Computational Evolutionary Game Theory
- Index
25 - Incentives and Information Security
from IV - Additional Topics
Published online by Cambridge University Press: 31 January 2011
- Frontmatter
- Contents
- Foreword
- Preface
- Contributors
- I Computing in Games
- II Algorithmic Mechanism Design
- III Quantifying the Inefficiency of Equilibria
- IV Additional Topics
- 22 Incentives and Pricing in Communications Networks
- 23 Incentives in Peer-to-Peer Systems
- 24 Cascading Behavior in Networks: Algorithmic and Economic Issues
- 25 Incentives and Information Security
- 26 Computational Aspects of Prediction Markets
- 27 Manipulation-Resistant Reputation Systems
- 28 Sponsored Search Auctions
- 29 Computational Evolutionary Game Theory
- Index
Summary
Abstract
Many interesting and important new applications of game theory have been discovered over the past 7 years in the context of research into the economics of information security. Many systems fail not ultimately for technical reasons but because incentives are wrong. For example, the people who guard a system often are not the people who suffer the full costs of failure, and as a result they make less effort than would be socially optimal. Some aspects of information security are public goods, like clean air or water; externalities often decide which security products succeed in the marketplace; and some information risks are not insurable because they are correlated in ways that cause insurance markets to fail.
Deeper applications of game-theoretic ideas can be found in the games of incomplete information that occur when critical information, such as about software quality or defender efforts, is hidden from some principals. An interesting application lies in the analysis of distributed system architectures; it took several years of experimentation for designers of peer-to-peer systems to understand incentive issues that we can now analyze reasonably well. Evolutionary game theory has recently allowed us to tie together a number of ideas from network analysis and elsewhere to explain why basing peer-to-peer systems on rings is a bad idea, and why revolutionaries use cells instead. The economics of distributed systems looks like being a very fruitful field of research.
- Type
- Chapter
- Information
- Algorithmic Game Theory , pp. 633 - 650Publisher: Cambridge University PressPrint publication year: 2007
- 9
- Cited by