Skip to main content

The Effect of Risk Perceived Payoffs in Iterated Interdependent Security Games

  • Conference paper
  • First Online:
Artificial Life and Computational Intelligence (ACALCI 2016)

Part of the book series: Lecture Notes in Computer Science ((LNAI,volume 9592))

  • 1227 Accesses

Abstract

Interdependent security (IDS) refers to a class of problems that involve making security investment decisions under uncertainty arising from the interdependency between the actions of different decision making entities in the system. Such problems arise in many real world situations such as cyber, airline and homeland security and epidemics. IDS games provide a framework to study the behaviour of decision-makers in such environments. This paper presents a study of the IDS game dynamics in a simulation setting when the payoffs are varied based on different risk attitude functions using the concept of expected utilities. A special case of iterated IDS games is considered where the assumption of complete loss immunity, in the case where all agents cooperate in investing in their own security, is relaxed by introducing a small stochastic loss term in the payoff. The simulations are carried out using an evolutionary game-theoretic framework where strategies are evolved based on the payoffs accumulated over homogeneous iterated encounters. The results of the simulations suggest that the level of investments are reduced when agents take a risk-averse or risk-taking view of the game in comparison to risk-neutral view.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    This decision tree does not represent a sequential game where the opponent takes its decision after knowing the decision of the player. We assume a simultaneous game.

References

  1. Axelrod, R.: The evolution of strategies in the iterated prisoner’s dilemma. In: Davis, L. (ed.) Genetic Algorithms and Simulated Annealing. Pitman/Morgan Kaufman, London/Los Altos, pp. 32–41 (1987)

    Google Scholar 

  2. Bernoulli, D.: Exposition of a new theory on the measurement of risk (translated, original 1738). Econometrica J. Econometric Soc. 22, 23–36 (1954)

    Article  MathSciNet  MATH  Google Scholar 

  3. Cramer, G.: Letter to Nicolas Bernoulli. Reprinted in Bernoulli (1738). see ref for Bernoulli, D., 1728

    Google Scholar 

  4. Darwen, P., Yao, X.: Why more choices cause less cooperation in iterated prisoner’s dilemma. In: Proceedings of the 2001 Congress on Evolutionary Computation, pp. 987–994. IEEE Press, Piscataway, May 2001

    Google Scholar 

  5. Ghoneim, A., Barlow, M., Abbass, H.A.: Rounds effect in evolutionary games. In: Randall, M., Abbass, H.A., Wiles, J. (eds.) ACAL 2007. LNCS (LNAI), vol. 4828, pp. 72–83. Springer, Heidelberg (2007)

    Chapter  Google Scholar 

  6. Goeree, J.K., Holt, C.A., Palfrey, T.R.: Risk averse behavior in generalized matching pennies games. Games Econ. Behav. 45(1), 97–113 (2003)

    Article  MathSciNet  MATH  Google Scholar 

  7. Kahneman, D., Tversky, A.: Prospect theory: an analysis of decision under risk. Econometrica J. Econometric Soc. 47, 263–291 (1979)

    Article  MATH  Google Scholar 

  8. Kersting, K., Toussaint, M.: Adopting a risk-aware utility model for repeated games of chance. In: Proceedings of the Sixth Starting AI Researchers Symposium, STAIRS 2012, vol. 241, p. 113. IOS Press (2012)

    Google Scholar 

  9. Kirkwood, C.W.: Notes on attitude toward risk taking and the exponential utility function. Technical report AZ 85287–4006, Arizona State University (1991)

    Google Scholar 

  10. Kunreuther, H., Heal, G.: Interdependent security. J. Risk Uncertainty 26(2), 231–249 (2003)

    Article  MATH  Google Scholar 

  11. Lindgren, K.: Evolutionary phenomena in simple dynamics. Artif. Life II(10), 295–312 (1991)

    Google Scholar 

  12. McKelvey, R.D., Palfrey, T.R., Weber, R.A.: The effects of payoff magnitude and heterogeneity on behavior in 2\(\times \) 2 games with unique mixed strategy equilibria. J. Econ. Behav. Organ. 42(4), 523–548 (2000)

    Article  Google Scholar 

  13. Neumann, L.J., Morgenstern, O.: Theory of Games and Economic Behavior. Princeton University Press, Princeton (1947)

    MATH  Google Scholar 

  14. Shafi, K., Bender, A., Abbass, H., et al.: Evolutionary dynamics of interdependent exogenous risks. In: IEEE Congress on Evolutionary Computation (CEC), pp. 1–8. IEEE (2010)

    Google Scholar 

  15. Shafi, K., Bender, A., Zhong, W., Abbass, H.A.: Spatio-temporal dynamics of security investments in an interdependent risk environment. Physica A Stat. Mech. Appl. 391(20), 5004–5017 (2012)

    Article  Google Scholar 

  16. Weber, M., Camerer, C.: Recent developments in modelling preferences under risk. Oper. Res. Spektrum 9(3), 129–151 (1987)

    Article  MathSciNet  MATH  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Kamran Shafi .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer International Publishing Switzerland

About this paper

Cite this paper

Ghoneim, A., Shafi, K. (2016). The Effect of Risk Perceived Payoffs in Iterated Interdependent Security Games. In: Ray, T., Sarker, R., Li, X. (eds) Artificial Life and Computational Intelligence. ACALCI 2016. Lecture Notes in Computer Science(), vol 9592. Springer, Cham. https://doi.org/10.1007/978-3-319-28270-1_29

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-28270-1_29

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-28269-5

  • Online ISBN: 978-3-319-28270-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics