11,985 research outputs found

    Platform Competition as Network Contestability

    Full text link
    Recent research in industrial organisation has investigated the essential place that middlemen have in the networks that make up our global economy. In this paper we attempt to understand how such middlemen compete with each other through a game theoretic analysis using novel techniques from decision-making under ambiguity. We model a purposely abstract and reduced model of one middleman who pro- vides a two-sided platform, mediating surplus-creating interactions between two users. The middleman evaluates uncertain outcomes under positional ambiguity, taking into account the possibility of the emergence of an alternative middleman offering intermediary services to the two users. Surprisingly, we find many situations in which the middleman will purposely extract maximal gains from her position. Only if there is relatively low probability of devastating loss of business under competition, the middleman will adopt a more competitive attitude and extract less from her position.Comment: 23 pages, 3 figure

    Game Theory Meets Network Security: A Tutorial at ACM CCS

    Full text link
    The increasingly pervasive connectivity of today's information systems brings up new challenges to security. Traditional security has accomplished a long way toward protecting well-defined goals such as confidentiality, integrity, availability, and authenticity. However, with the growing sophistication of the attacks and the complexity of the system, the protection using traditional methods could be cost-prohibitive. A new perspective and a new theoretical foundation are needed to understand security from a strategic and decision-making perspective. Game theory provides a natural framework to capture the adversarial and defensive interactions between an attacker and a defender. It provides a quantitative assessment of security, prediction of security outcomes, and a mechanism design tool that can enable security-by-design and reverse the attacker's advantage. This tutorial provides an overview of diverse methodologies from game theory that includes games of incomplete information, dynamic games, mechanism design theory to offer a modern theoretic underpinning of a science of cybersecurity. The tutorial will also discuss open problems and research challenges that the CCS community can address and contribute with an objective to build a multidisciplinary bridge between cybersecurity, economics, game and decision theory

    How Effective are Electronic Reputation Mechanisms? An Experimental Investigation

    Get PDF
    Electronic reputation or "feedback" mechanisms aim to mitigate the moral hazard problems associated with exchange among strangers by providing the type of information available in more traditional close-knit groups, where members are frequently involved in one another's dealings. In this paper, we compare trading in a market with online feedback (as implemented by many Internet markets) to a market without feedback, as well as to a market in which the same people interact with one another repeatedly (partners market). We find that, while the feedback mechanism induces quite a substantial improvement in transaction efficiency, it also exhibits a kind of public goods problem in that, unlike in the partners market, the benefits of trust and trustworthy behavior go to the whole community and are not completely internalized. We discuss the implications of this perspective for improving feedback systems.

    Regional and Sub-Global Climate Blocs.A Game-Theoretic Perspective on Bottom-up Climate Regimes

    Get PDF
    No international regime on climate change is going to be fully effective in controlling GHG emissions without the involvement of countries such as China, India, the United States, Australia, and possibly other developing countries. This highlights an unambiguous weakness of the Kyoto Protocol, where the aforementioned countries either have no binding emission targets or have decided not to comply with their targets. Therefore, when discussing possible post-Kyoto scenarios, it is crucial to prioritise participation incentives for all countries, especially those without explicit or with insufficient abatement targets. This paper offers a bottom-up game-theoretic perspective on participation incentives. Rather than focusing on issue linkage, transfers or burden sharing as tools to enhance the incentives to participate in a climate agreement, this paper aims at exploring whether a different policy approach could lead more countries to adopt effective climate control policies. This policy approach is explicitly bottom-up, namely it gives each country the freedom to sign agreements and deals, bilaterally or multilaterally, with other countries, without being constrained by any global protocol or convention. This study provides a game-theoretic assessment of this policy approach and then evaluates empirically the possible endogenous emergence of single or multiple climate coalitions. Welfare and technological consequences of different multiple bloc climate regimes will be assessed and their overall environmental effectiveness will be discussed.Agreements, Climate, Incentives, Negotiations, Policy

    Regional and sub-global climate blocs. A game-theoretic perspective on bottom-up climate regimes

    Get PDF
    controlling GHG emissions without the involvement of countries such as China, India, the United States, Aust rali a, and possibly other developing countries. This highlights an unambiguous weakness of the Kyoto Protocol, where the aforementioned countries either have no binding emission targets or have decided not to comply with their targets . Therefore, when discussing possible post-Kyoto scenarios, it is crucial to priori tise part icipation incentives for all countries, especially those without explicit or with insufficient abatement targets. This paper offers a bottom-up game-theoretic perspective on participation incentives. Rather than focusing on issue linkage, t ransfers or burden sharing as tools to enhance the incentives to par t icipate in a climate agreement, thi s paper aims at exploring whether a di fferent policy approach could lead more count ries to adopt ef fective climate cont rol policies. This policy approach is explicitly bottom-up, namely i t gives each country the freedom to sign agreements and deals, bilateral ly or multila terally, with other countries, without being constrained by any globa l protocol or convention. This study provides a game-theoretic assessment of this policy approach and then evaluates empirically the possible endogenous emergence of single or multi ple climate coalitions. Welfare and technological consequences of different mul tiple bloc climate regimes will be assessed and their overall environmental effectiveness will be discussed.Agreements, Climate, Incentives, Negotiations, Policy

    After the Bubble: The Survival and Ownership of Internet Marketplaces for Farmers and Agribusiness

    Get PDF
    This paper presents a theory of how industry structure and beliefs about Internet marketplace use have driven choice and ownership of marketplaces. The theory's predictions suggest that surviving Internet marketplaces will be those with strong historical linkages in an industry and those owned by or affiliated with major commodity buyers. Comparisons of these predictions with actual outcomes provide validation of the theory. Where predictions differ from results, observations are made as to the nature of the deviations.agricultural markets, electronic commerce, Internet markets, network externalities, technology adoption, Agribusiness,

    Computable Rationality, NUTS, and the Nuclear Leviathan

    Get PDF
    This paper explores how the Leviathan that projects power through nuclear arms exercises a unique nuclearized sovereignty. In the case of nuclear superpowers, this sovereignty extends to wielding the power to destroy human civilization as we know it across the globe. Nuclearized sovereignty depends on a hybrid form of power encompassing human decision-makers in a hierarchical chain of command, and all of the technical and computerized functions necessary to maintain command and control at every moment of the sovereign's existence: this sovereign power cannot sleep. This article analyzes how the form of rationality that informs this hybrid exercise of power historically developed to be computable. By definition, computable rationality must be able to function without any intelligible grasp of the context or the comprehensive significance of decision-making outcomes. Thus, maintaining nuclearized sovereignty necessarily must be able to execute momentous life and death decisions without the type of sentience we usually associate with ethical individual and collective decisions
    corecore