Back to Results
First PageMeta Content
Security / Public safety / Environmental economics / Computer security / Anti-spam techniques / Network effect / Externality / Investment / Information security / Spamming / Economics / Email


Security decision-making among interdependent organizations R. Ann Miura-Ko, Benjamin Yolken, John Mitchell, and Nicholas Bambos Stanford University Abstract In various settings, such as when customers use the same
Add to Reading List

Document Date: 2010-03-09 22:02:41


Open Document

File Size: 169,08 KB

Share Result on Facebook

City

Sender / /

Company

Classmates.com / Customer Education Consider / Yahoo! / 2 Phishing / Microsoft / CallerID / Citibank / /

Event

M&A / Environmental Issue / /

Holiday

Assumption / /

IndustryTerm

particular bank / large bank / convergent algorithm / product groups / lowsecurity site / bank customers / bank products / e.g. public relations firms / web authentication example / linear influence networks / bank / Web Authentication Consider / email communications / asynchronous algorithm / security services / synchronous algorithm / natural iterative algorithm / retail sites / web site security / Example linear influence network / web security / Internet users / school reunion web site / airline baggage security / through advertising / online merchants / /

Organization

Stanford University / /

Person

Nash Equilibrium / R. Ann Miura-Ko / John Mitchell / Benjamin Yolken / Nash Equilibria / Nicholas Bambos / /

Position

author / central planner / affected player / general model for network games / autonomous player / W. Player / players player / player / /

Product

Sender ID Whitepaper / /

ProvinceOrState

Nebraska / /

Technology

following algorithm / public key / DNS / natural iterative algorithm / synchronous algorithm / convergent algorithm / ABRD algorithm / digital signature / corresponding asynchronous algorithm / computed using an ABRD algorithm / /

URL

www.nytimes.com / www.companyname.com / /

SocialTag