41,917 research outputs found

    Farsighted Stable Sets

    Get PDF
    A coalition is usually called stable if nobody has an immediate incentive to leave or to enter the coalition since he does not improve his payoff. This myopic behaviour does not consider further deviations which can take place after the first move. Chwe (1994) incorporated the idea of a farsighted behaviour in his definition of large consistent set (LCS). In some respects, we propose a different idea of dominance relation based on indirect dominance and on a different concept of belief on moving coalitions' behavior. A notion of stability for a coalitional game is introduced by taking into account the different degree of risk/safety of any player participating in a move. Some results about uncovered sets, internal stability are investigated. By exploiting our dominance and stability concepts, the prisoner's dilemma in coalitional form and its Nash equilibrium are studied. Some examples illustrating the differences between the largest consistent set, our stable set and stable set due to von Neumann and Morgenstern (1947) are presented.

    Understanding reciprocity

    Get PDF
    This paper surveys the evolutionary game theoretic literature on reciprocity in human interactions, dealing both with long-term relationships and with sporadic interactions. Four basic themes, repetition, commitment, assortation, and parochialism, appear repeatedly throughout the literature. Repetition can give rise to the evolution of behavior that exhibits reciprocity-like features but a vast array of other behaviors are also stable. In sporadic interactions, reciprocity can be stable if the propensity to punish selfish actions can induce opportunists to cooperate, if reciprocators themselves behave opportunistically when they expect others to do so, or if matching is sufficiently assortative.Reciprocity, Evolution, Assortation, Commitment, Parochialism

    Pricing and Investments in Internet Security: A Cyber-Insurance Perspective

    Full text link
    Internet users such as individuals and organizations are subject to different types of epidemic risks such as worms, viruses, spams, and botnets. To reduce the probability of risk, an Internet user generally invests in traditional security mechanisms like anti-virus and anti-spam software, sometimes also known as self-defense mechanisms. However, such software does not completely eliminate risk. Recent works have considered the problem of residual risk elimination by proposing the idea of cyber-insurance. In this regard, an important research problem is the analysis of optimal user self-defense investments and cyber-insurance contracts under the Internet environment. In this paper, we investigate two problems and their relationship: 1) analyzing optimal self-defense investments in the Internet, under optimal cyber-insurance coverage, where optimality is an insurer objective and 2) designing optimal cyber-insurance contracts for Internet users, where a contract is a (premium, coverage) pair

    Collusion in Peer-to-Peer Systems

    Get PDF
    Peer-to-peer systems have reached a widespread use, ranging from academic and industrial applications to home entertainment. The key advantage of this paradigm lies in its scalability and flexibility, consequences of the participants sharing their resources for the common welfare. Security in such systems is a desirable goal. For example, when mission-critical operations or bank transactions are involved, their effectiveness strongly depends on the perception that users have about the system dependability and trustworthiness. A major threat to the security of these systems is the phenomenon of collusion. Peers can be selfish colluders, when they try to fool the system to gain unfair advantages over other peers, or malicious, when their purpose is to subvert the system or disturb other users. The problem, however, has received so far only a marginal attention by the research community. While several solutions exist to counter attacks in peer-to-peer systems, very few of them are meant to directly counter colluders and their attacks. Reputation, micro-payments, and concepts of game theory are currently used as the main means to obtain fairness in the usage of the resources. Our goal is to provide an overview of the topic by examining the key issues involved. We measure the relevance of the problem in the current literature and the effectiveness of existing philosophies against it, to suggest fruitful directions in the further development of the field

    First Steps Towards an Ethics of Robots and Artificial Intelligence

    Get PDF
    This article offers an overview of the main first-order ethical questions raised by robots and Artificial Intelligence (RAIs) under five broad rubrics: functionality, inherent significance, rights and responsibilities, side-effects, and threats. The first letter of each rubric taken together conveniently generates the acronym FIRST. Special attention is given to the rubrics of functionality and inherent significance given the centrality of the former and the tendency to neglect the latter in virtue of its somewhat nebulous and contested character. In addition to exploring some illustrative issues arising under each rubric, the article also emphasizes a number of more general themes. These include: the multiplicity of interacting levels on which ethical questions about RAIs arise, the need to recognise that RAIs potentially implicate the full gamut of human values (rather than exclusively or primarily some readily identifiable sub-set of ethical or legal principles), and the need for practically salient ethical reflection on RAIs to be informed by a realistic appreciation of their existing and foreseeable capacities
    • …
    corecore