Showing 1 - 10 of 12
Persistent link: https://www.econbiz.de/10012649667
Persistent link: https://www.econbiz.de/10012025127
Persistent link: https://www.econbiz.de/10011879355
Persistent link: https://www.econbiz.de/10011754562
A four period game between two firms and two hackers is analyzed. The firms first defend and the hackers thereafter attack and share information. Each hacker seeks financial gain, beneficial information exchange, and reputation gain. The two hackers’ attacks and the firms’ defenses are...
Persistent link: https://www.econbiz.de/10011708862
A game between a representative household and a government was analyzed. The household chose which fractions of two currencies to hold, e.g., a national currency such as a Central Bank Digital Currency (CBDC) and a global currency such as Bitcoin or Facebook's Diem, and chose the tax evasion...
Persistent link: https://www.econbiz.de/10012503796
Central Bank Digital Currencies (CBDCs) enable negative interest rates. A game is analyzed between a central bank (accounting for the government’s interest) and a representative household choosing to consume, hold CBDC, or hold non-CBDC. The central bank chooses negative interest rate when it...
Persistent link: https://www.econbiz.de/10013373143
A four period game between two firms and two hackers is analyzed. The firms first defend and the hackers thereafter attack and share information. Each hacker seeks financial gain, beneficial information exchange, and reputation gain. The two hackers' attacks and the firms' defenses are inverse...
Persistent link: https://www.econbiz.de/10011852689
A game between a representative household and a government was analyzed. The household chose which fractions of two currencies to hold, e.g., a national currency such as a Central Bank Digital Currency (CBDC) and a global currency such as Bitcoin or Facebook's Diem, and chose the tax evasion...
Persistent link: https://www.econbiz.de/10013200096
This paper models the situation where the attacker’s resources are unknown to the defender. Protecting assets presupposes that the defender has some information on the attacker’s resource capabilities. An attacker targets one of two assets. The attacker’s resources and...
Persistent link: https://www.econbiz.de/10011131891