Team for Research in
Ubiquitous Secure Technology

Are Security Experts Useful? Bayesian Nash Equilibria for Network Security Games with Limited Information
Benjamin Johnson

Citation
Benjamin Johnson. "Are Security Experts Useful? Bayesian Nash Equilibria for Network Security Games with Limited Information". Talk or presentation, 11, November, 2010.

Abstract
A common assumption in security research is that more individual expertise unambiguously leads to a more secure overall network. We present a game-theoretic model in which this common assumption does not hold. Our findings indicate that expert users can be not only invaluable contributors, but also free-riders, defectors, and narcissistic opportunists. A direct application is that user education needs to highlight the cooperative nature of security, and foster the community sense of higher skilled computer users.

Electronic downloads

Citation formats  
  • HTML
    Benjamin Johnson. <a
    href="http://www.truststc.org/pubs/778.html"
    ><i>Are Security Experts Useful? Bayesian Nash
    Equilibria for Network Security Games with Limited
    Information</i></a>, Talk or presentation,  11,
    November, 2010.
  • Plain text
    Benjamin Johnson. "Are Security Experts Useful?
    Bayesian Nash Equilibria for Network Security Games with
    Limited Information". Talk or presentation,  11,
    November, 2010.
  • BibTeX
    @presentation{Johnson10_AreSecurityExpertsUsefulBayesianNashEquilibriaForNetwork,
        author = {Benjamin Johnson},
        title = {Are Security Experts Useful? Bayesian Nash
                  Equilibria for Network Security Games with Limited
                  Information},
        day = {11},
        month = {November},
        year = {2010},
        abstract = {A common assumption in security research is that
                  more individual expertise unambiguously leads to a
                  more secure overall network. We present a
                  game-theoretic model in which this common
                  assumption does not hold. Our findings indicate
                  that expert users can be not only invaluable
                  contributors, but also free-riders, defectors, and
                  narcissistic opportunists. A direct application is
                  that user education needs to highlight the
                  cooperative nature of security, and foster the
                  community sense of higher skilled computer users.},
        URL = {http://www.truststc.org/pubs/778.html}
    }
    

Posted by Larry Rohrbough on 7 Dec 2010.
Groups: trust
For additional information, see the Publications FAQ or contact webmaster at www truststc org.

Notice: This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All persons copying this information are expected to adhere to the terms and constraints invoked by each author's copyright.