Coordination of strategic responses to security threats: Laboratory evidence
Abstract Laboratory experiments are used to evaluate the extent to which players in games can coordinate investments that diminish the probability of losses due to security breaches or terrorist attacks. In this environment, economically sensible investments may be foregone if their potential benefi...
Ausführliche Beschreibung
Autor*in: |
Hess, Rachel O. [verfasserIn] |
---|
Format: |
Artikel |
---|---|
Sprache: |
Englisch |
Erschienen: |
2007 |
---|
Schlagwörter: |
---|
Anmerkung: |
© Economic Science Association 2007 |
---|
Übergeordnetes Werk: |
Enthalten in: Experimental economics - Springer US, 1998, 10(2007), 3 vom: 09. Aug., Seite 235-250 |
---|---|
Übergeordnetes Werk: |
volume:10 ; year:2007 ; number:3 ; day:09 ; month:08 ; pages:235-250 |
Links: |
---|
DOI / URN: |
10.1007/s10683-007-9176-y |
---|
Katalog-ID: |
OLC2073983820 |
---|
LEADER | 01000caa a22002652 4500 | ||
---|---|---|---|
001 | OLC2073983820 | ||
003 | DE-627 | ||
005 | 20230503055101.0 | ||
007 | tu | ||
008 | 200819s2007 xx ||||| 00| ||eng c | ||
024 | 7 | |a 10.1007/s10683-007-9176-y |2 doi | |
035 | |a (DE-627)OLC2073983820 | ||
035 | |a (DE-He213)s10683-007-9176-y-p | ||
040 | |a DE-627 |b ger |c DE-627 |e rakwb | ||
041 | |a eng | ||
082 | 0 | 4 | |a 330 |q VZ |
100 | 1 | |a Hess, Rachel O. |e verfasserin |4 aut | |
245 | 1 | 0 | |a Coordination of strategic responses to security threats: Laboratory evidence |
264 | 1 | |c 2007 | |
336 | |a Text |b txt |2 rdacontent | ||
337 | |a ohne Hilfsmittel zu benutzen |b n |2 rdamedia | ||
338 | |a Band |b nc |2 rdacarrier | ||
500 | |a © Economic Science Association 2007 | ||
520 | |a Abstract Laboratory experiments are used to evaluate the extent to which players in games can coordinate investments that diminish the probability of losses due to security breaches or terrorist attacks. In this environment, economically sensible investments may be foregone if their potential benefits are negated by failures to invest in security at other sites. The result is a coordination game with a desirable high-payoff, high-security equilibrium and an undesirable low-security equilibrium that may result if players do not expect others to invest in security. One unique feature of this coordination situation is that investment in security by one player generates a positive externality such that all other players’ expected payoffs are increased, regardless of those other players’ investment decisions. Coordination failures are pervasive in a baseline experiment with simultaneous decisions, but coordination is improved if players are allowed to move in an endogenously determined sequence. In addition, coordinated security investments are observed more often when the largest single security threat to individuals is preventable by their own decisions to invest in security. The security coordination game is a “potential game,” and the success of coordination on the more secure equilibrium is related to the notion of potential function maximization and basin of attraction. | ||
650 | 4 | |a Coordination games | |
650 | 4 | |a Laboratory experiments | |
650 | 4 | |a Potential games | |
650 | 4 | |a Security | |
700 | 1 | |a Holt, Charles A. |4 aut | |
700 | 1 | |a Smith, Angela M. |4 aut | |
773 | 0 | 8 | |i Enthalten in |t Experimental economics |d Springer US, 1998 |g 10(2007), 3 vom: 09. Aug., Seite 235-250 |w (DE-627)230492959 |w (DE-600)1386451-8 |w (DE-576)072172029 |x 1386-4157 |7 nnns |
773 | 1 | 8 | |g volume:10 |g year:2007 |g number:3 |g day:09 |g month:08 |g pages:235-250 |
856 | 4 | 1 | |u https://doi.org/10.1007/s10683-007-9176-y |z lizenzpflichtig |3 Volltext |
912 | |a GBV_USEFLAG_A | ||
912 | |a SYSFLAG_A | ||
912 | |a GBV_OLC | ||
912 | |a SSG-OLC-WIW | ||
912 | |a GBV_ILN_24 | ||
912 | |a GBV_ILN_26 | ||
912 | |a GBV_ILN_39 | ||
912 | |a GBV_ILN_4012 | ||
912 | |a GBV_ILN_4028 | ||
912 | |a GBV_ILN_4318 | ||
912 | |a GBV_ILN_4322 | ||
951 | |a AR | ||
952 | |d 10 |j 2007 |e 3 |b 09 |c 08 |h 235-250 |
author_variant |
r o h ro roh c a h ca cah a m s am ams |
---|---|
matchkey_str |
article:13864157:2007----::oriainftaeirsossoeuiyhet |
hierarchy_sort_str |
2007 |
publishDate |
2007 |
allfields |
10.1007/s10683-007-9176-y doi (DE-627)OLC2073983820 (DE-He213)s10683-007-9176-y-p DE-627 ger DE-627 rakwb eng 330 VZ Hess, Rachel O. verfasserin aut Coordination of strategic responses to security threats: Laboratory evidence 2007 Text txt rdacontent ohne Hilfsmittel zu benutzen n rdamedia Band nc rdacarrier © Economic Science Association 2007 Abstract Laboratory experiments are used to evaluate the extent to which players in games can coordinate investments that diminish the probability of losses due to security breaches or terrorist attacks. In this environment, economically sensible investments may be foregone if their potential benefits are negated by failures to invest in security at other sites. The result is a coordination game with a desirable high-payoff, high-security equilibrium and an undesirable low-security equilibrium that may result if players do not expect others to invest in security. One unique feature of this coordination situation is that investment in security by one player generates a positive externality such that all other players’ expected payoffs are increased, regardless of those other players’ investment decisions. Coordination failures are pervasive in a baseline experiment with simultaneous decisions, but coordination is improved if players are allowed to move in an endogenously determined sequence. In addition, coordinated security investments are observed more often when the largest single security threat to individuals is preventable by their own decisions to invest in security. The security coordination game is a “potential game,” and the success of coordination on the more secure equilibrium is related to the notion of potential function maximization and basin of attraction. Coordination games Laboratory experiments Potential games Security Holt, Charles A. aut Smith, Angela M. aut Enthalten in Experimental economics Springer US, 1998 10(2007), 3 vom: 09. Aug., Seite 235-250 (DE-627)230492959 (DE-600)1386451-8 (DE-576)072172029 1386-4157 nnns volume:10 year:2007 number:3 day:09 month:08 pages:235-250 https://doi.org/10.1007/s10683-007-9176-y lizenzpflichtig Volltext GBV_USEFLAG_A SYSFLAG_A GBV_OLC SSG-OLC-WIW GBV_ILN_24 GBV_ILN_26 GBV_ILN_39 GBV_ILN_4012 GBV_ILN_4028 GBV_ILN_4318 GBV_ILN_4322 AR 10 2007 3 09 08 235-250 |
spelling |
10.1007/s10683-007-9176-y doi (DE-627)OLC2073983820 (DE-He213)s10683-007-9176-y-p DE-627 ger DE-627 rakwb eng 330 VZ Hess, Rachel O. verfasserin aut Coordination of strategic responses to security threats: Laboratory evidence 2007 Text txt rdacontent ohne Hilfsmittel zu benutzen n rdamedia Band nc rdacarrier © Economic Science Association 2007 Abstract Laboratory experiments are used to evaluate the extent to which players in games can coordinate investments that diminish the probability of losses due to security breaches or terrorist attacks. In this environment, economically sensible investments may be foregone if their potential benefits are negated by failures to invest in security at other sites. The result is a coordination game with a desirable high-payoff, high-security equilibrium and an undesirable low-security equilibrium that may result if players do not expect others to invest in security. One unique feature of this coordination situation is that investment in security by one player generates a positive externality such that all other players’ expected payoffs are increased, regardless of those other players’ investment decisions. Coordination failures are pervasive in a baseline experiment with simultaneous decisions, but coordination is improved if players are allowed to move in an endogenously determined sequence. In addition, coordinated security investments are observed more often when the largest single security threat to individuals is preventable by their own decisions to invest in security. The security coordination game is a “potential game,” and the success of coordination on the more secure equilibrium is related to the notion of potential function maximization and basin of attraction. Coordination games Laboratory experiments Potential games Security Holt, Charles A. aut Smith, Angela M. aut Enthalten in Experimental economics Springer US, 1998 10(2007), 3 vom: 09. Aug., Seite 235-250 (DE-627)230492959 (DE-600)1386451-8 (DE-576)072172029 1386-4157 nnns volume:10 year:2007 number:3 day:09 month:08 pages:235-250 https://doi.org/10.1007/s10683-007-9176-y lizenzpflichtig Volltext GBV_USEFLAG_A SYSFLAG_A GBV_OLC SSG-OLC-WIW GBV_ILN_24 GBV_ILN_26 GBV_ILN_39 GBV_ILN_4012 GBV_ILN_4028 GBV_ILN_4318 GBV_ILN_4322 AR 10 2007 3 09 08 235-250 |
allfields_unstemmed |
10.1007/s10683-007-9176-y doi (DE-627)OLC2073983820 (DE-He213)s10683-007-9176-y-p DE-627 ger DE-627 rakwb eng 330 VZ Hess, Rachel O. verfasserin aut Coordination of strategic responses to security threats: Laboratory evidence 2007 Text txt rdacontent ohne Hilfsmittel zu benutzen n rdamedia Band nc rdacarrier © Economic Science Association 2007 Abstract Laboratory experiments are used to evaluate the extent to which players in games can coordinate investments that diminish the probability of losses due to security breaches or terrorist attacks. In this environment, economically sensible investments may be foregone if their potential benefits are negated by failures to invest in security at other sites. The result is a coordination game with a desirable high-payoff, high-security equilibrium and an undesirable low-security equilibrium that may result if players do not expect others to invest in security. One unique feature of this coordination situation is that investment in security by one player generates a positive externality such that all other players’ expected payoffs are increased, regardless of those other players’ investment decisions. Coordination failures are pervasive in a baseline experiment with simultaneous decisions, but coordination is improved if players are allowed to move in an endogenously determined sequence. In addition, coordinated security investments are observed more often when the largest single security threat to individuals is preventable by their own decisions to invest in security. The security coordination game is a “potential game,” and the success of coordination on the more secure equilibrium is related to the notion of potential function maximization and basin of attraction. Coordination games Laboratory experiments Potential games Security Holt, Charles A. aut Smith, Angela M. aut Enthalten in Experimental economics Springer US, 1998 10(2007), 3 vom: 09. Aug., Seite 235-250 (DE-627)230492959 (DE-600)1386451-8 (DE-576)072172029 1386-4157 nnns volume:10 year:2007 number:3 day:09 month:08 pages:235-250 https://doi.org/10.1007/s10683-007-9176-y lizenzpflichtig Volltext GBV_USEFLAG_A SYSFLAG_A GBV_OLC SSG-OLC-WIW GBV_ILN_24 GBV_ILN_26 GBV_ILN_39 GBV_ILN_4012 GBV_ILN_4028 GBV_ILN_4318 GBV_ILN_4322 AR 10 2007 3 09 08 235-250 |
allfieldsGer |
10.1007/s10683-007-9176-y doi (DE-627)OLC2073983820 (DE-He213)s10683-007-9176-y-p DE-627 ger DE-627 rakwb eng 330 VZ Hess, Rachel O. verfasserin aut Coordination of strategic responses to security threats: Laboratory evidence 2007 Text txt rdacontent ohne Hilfsmittel zu benutzen n rdamedia Band nc rdacarrier © Economic Science Association 2007 Abstract Laboratory experiments are used to evaluate the extent to which players in games can coordinate investments that diminish the probability of losses due to security breaches or terrorist attacks. In this environment, economically sensible investments may be foregone if their potential benefits are negated by failures to invest in security at other sites. The result is a coordination game with a desirable high-payoff, high-security equilibrium and an undesirable low-security equilibrium that may result if players do not expect others to invest in security. One unique feature of this coordination situation is that investment in security by one player generates a positive externality such that all other players’ expected payoffs are increased, regardless of those other players’ investment decisions. Coordination failures are pervasive in a baseline experiment with simultaneous decisions, but coordination is improved if players are allowed to move in an endogenously determined sequence. In addition, coordinated security investments are observed more often when the largest single security threat to individuals is preventable by their own decisions to invest in security. The security coordination game is a “potential game,” and the success of coordination on the more secure equilibrium is related to the notion of potential function maximization and basin of attraction. Coordination games Laboratory experiments Potential games Security Holt, Charles A. aut Smith, Angela M. aut Enthalten in Experimental economics Springer US, 1998 10(2007), 3 vom: 09. Aug., Seite 235-250 (DE-627)230492959 (DE-600)1386451-8 (DE-576)072172029 1386-4157 nnns volume:10 year:2007 number:3 day:09 month:08 pages:235-250 https://doi.org/10.1007/s10683-007-9176-y lizenzpflichtig Volltext GBV_USEFLAG_A SYSFLAG_A GBV_OLC SSG-OLC-WIW GBV_ILN_24 GBV_ILN_26 GBV_ILN_39 GBV_ILN_4012 GBV_ILN_4028 GBV_ILN_4318 GBV_ILN_4322 AR 10 2007 3 09 08 235-250 |
allfieldsSound |
10.1007/s10683-007-9176-y doi (DE-627)OLC2073983820 (DE-He213)s10683-007-9176-y-p DE-627 ger DE-627 rakwb eng 330 VZ Hess, Rachel O. verfasserin aut Coordination of strategic responses to security threats: Laboratory evidence 2007 Text txt rdacontent ohne Hilfsmittel zu benutzen n rdamedia Band nc rdacarrier © Economic Science Association 2007 Abstract Laboratory experiments are used to evaluate the extent to which players in games can coordinate investments that diminish the probability of losses due to security breaches or terrorist attacks. In this environment, economically sensible investments may be foregone if their potential benefits are negated by failures to invest in security at other sites. The result is a coordination game with a desirable high-payoff, high-security equilibrium and an undesirable low-security equilibrium that may result if players do not expect others to invest in security. One unique feature of this coordination situation is that investment in security by one player generates a positive externality such that all other players’ expected payoffs are increased, regardless of those other players’ investment decisions. Coordination failures are pervasive in a baseline experiment with simultaneous decisions, but coordination is improved if players are allowed to move in an endogenously determined sequence. In addition, coordinated security investments are observed more often when the largest single security threat to individuals is preventable by their own decisions to invest in security. The security coordination game is a “potential game,” and the success of coordination on the more secure equilibrium is related to the notion of potential function maximization and basin of attraction. Coordination games Laboratory experiments Potential games Security Holt, Charles A. aut Smith, Angela M. aut Enthalten in Experimental economics Springer US, 1998 10(2007), 3 vom: 09. Aug., Seite 235-250 (DE-627)230492959 (DE-600)1386451-8 (DE-576)072172029 1386-4157 nnns volume:10 year:2007 number:3 day:09 month:08 pages:235-250 https://doi.org/10.1007/s10683-007-9176-y lizenzpflichtig Volltext GBV_USEFLAG_A SYSFLAG_A GBV_OLC SSG-OLC-WIW GBV_ILN_24 GBV_ILN_26 GBV_ILN_39 GBV_ILN_4012 GBV_ILN_4028 GBV_ILN_4318 GBV_ILN_4322 AR 10 2007 3 09 08 235-250 |
language |
English |
source |
Enthalten in Experimental economics 10(2007), 3 vom: 09. Aug., Seite 235-250 volume:10 year:2007 number:3 day:09 month:08 pages:235-250 |
sourceStr |
Enthalten in Experimental economics 10(2007), 3 vom: 09. Aug., Seite 235-250 volume:10 year:2007 number:3 day:09 month:08 pages:235-250 |
format_phy_str_mv |
Article |
institution |
findex.gbv.de |
topic_facet |
Coordination games Laboratory experiments Potential games Security |
dewey-raw |
330 |
isfreeaccess_bool |
false |
container_title |
Experimental economics |
authorswithroles_txt_mv |
Hess, Rachel O. @@aut@@ Holt, Charles A. @@aut@@ Smith, Angela M. @@aut@@ |
publishDateDaySort_date |
2007-08-09T00:00:00Z |
hierarchy_top_id |
230492959 |
dewey-sort |
3330 |
id |
OLC2073983820 |
language_de |
englisch |
fullrecord |
<?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01000caa a22002652 4500</leader><controlfield tag="001">OLC2073983820</controlfield><controlfield tag="003">DE-627</controlfield><controlfield tag="005">20230503055101.0</controlfield><controlfield tag="007">tu</controlfield><controlfield tag="008">200819s2007 xx ||||| 00| ||eng c</controlfield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1007/s10683-007-9176-y</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627)OLC2073983820</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-He213)s10683-007-9176-y-p</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rakwb</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2="4"><subfield code="a">330</subfield><subfield code="q">VZ</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Hess, Rachel O.</subfield><subfield code="e">verfasserin</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Coordination of strategic responses to security threats: Laboratory evidence</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="c">2007</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">ohne Hilfsmittel zu benutzen</subfield><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Band</subfield><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">© Economic Science Association 2007</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Abstract Laboratory experiments are used to evaluate the extent to which players in games can coordinate investments that diminish the probability of losses due to security breaches or terrorist attacks. In this environment, economically sensible investments may be foregone if their potential benefits are negated by failures to invest in security at other sites. The result is a coordination game with a desirable high-payoff, high-security equilibrium and an undesirable low-security equilibrium that may result if players do not expect others to invest in security. One unique feature of this coordination situation is that investment in security by one player generates a positive externality such that all other players’ expected payoffs are increased, regardless of those other players’ investment decisions. Coordination failures are pervasive in a baseline experiment with simultaneous decisions, but coordination is improved if players are allowed to move in an endogenously determined sequence. In addition, coordinated security investments are observed more often when the largest single security threat to individuals is preventable by their own decisions to invest in security. The security coordination game is a “potential game,” and the success of coordination on the more secure equilibrium is related to the notion of potential function maximization and basin of attraction.</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Coordination games</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Laboratory experiments</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Potential games</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Security</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Holt, Charles A.</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Smith, Angela M.</subfield><subfield code="4">aut</subfield></datafield><datafield tag="773" ind1="0" ind2="8"><subfield code="i">Enthalten in</subfield><subfield code="t">Experimental economics</subfield><subfield code="d">Springer US, 1998</subfield><subfield code="g">10(2007), 3 vom: 09. Aug., Seite 235-250</subfield><subfield code="w">(DE-627)230492959</subfield><subfield code="w">(DE-600)1386451-8</subfield><subfield code="w">(DE-576)072172029</subfield><subfield code="x">1386-4157</subfield><subfield code="7">nnns</subfield></datafield><datafield tag="773" ind1="1" ind2="8"><subfield code="g">volume:10</subfield><subfield code="g">year:2007</subfield><subfield code="g">number:3</subfield><subfield code="g">day:09</subfield><subfield code="g">month:08</subfield><subfield code="g">pages:235-250</subfield></datafield><datafield tag="856" ind1="4" ind2="1"><subfield code="u">https://doi.org/10.1007/s10683-007-9176-y</subfield><subfield code="z">lizenzpflichtig</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_USEFLAG_A</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">SYSFLAG_A</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_OLC</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">SSG-OLC-WIW</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_24</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_26</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_39</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4012</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4028</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4318</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4322</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">AR</subfield></datafield><datafield tag="952" ind1=" " ind2=" "><subfield code="d">10</subfield><subfield code="j">2007</subfield><subfield code="e">3</subfield><subfield code="b">09</subfield><subfield code="c">08</subfield><subfield code="h">235-250</subfield></datafield></record></collection>
|
author |
Hess, Rachel O. |
spellingShingle |
Hess, Rachel O. ddc 330 misc Coordination games misc Laboratory experiments misc Potential games misc Security Coordination of strategic responses to security threats: Laboratory evidence |
authorStr |
Hess, Rachel O. |
ppnlink_with_tag_str_mv |
@@773@@(DE-627)230492959 |
format |
Article |
dewey-ones |
330 - Economics |
delete_txt_mv |
keep |
author_role |
aut aut aut |
collection |
OLC |
remote_str |
false |
illustrated |
Not Illustrated |
issn |
1386-4157 |
topic_title |
330 VZ Coordination of strategic responses to security threats: Laboratory evidence Coordination games Laboratory experiments Potential games Security |
topic |
ddc 330 misc Coordination games misc Laboratory experiments misc Potential games misc Security |
topic_unstemmed |
ddc 330 misc Coordination games misc Laboratory experiments misc Potential games misc Security |
topic_browse |
ddc 330 misc Coordination games misc Laboratory experiments misc Potential games misc Security |
format_facet |
Aufsätze Gedruckte Aufsätze |
format_main_str_mv |
Text Zeitschrift/Artikel |
carriertype_str_mv |
nc |
hierarchy_parent_title |
Experimental economics |
hierarchy_parent_id |
230492959 |
dewey-tens |
330 - Economics |
hierarchy_top_title |
Experimental economics |
isfreeaccess_txt |
false |
familylinks_str_mv |
(DE-627)230492959 (DE-600)1386451-8 (DE-576)072172029 |
title |
Coordination of strategic responses to security threats: Laboratory evidence |
ctrlnum |
(DE-627)OLC2073983820 (DE-He213)s10683-007-9176-y-p |
title_full |
Coordination of strategic responses to security threats: Laboratory evidence |
author_sort |
Hess, Rachel O. |
journal |
Experimental economics |
journalStr |
Experimental economics |
lang_code |
eng |
isOA_bool |
false |
dewey-hundreds |
300 - Social sciences |
recordtype |
marc |
publishDateSort |
2007 |
contenttype_str_mv |
txt |
container_start_page |
235 |
author_browse |
Hess, Rachel O. Holt, Charles A. Smith, Angela M. |
container_volume |
10 |
class |
330 VZ |
format_se |
Aufsätze |
author-letter |
Hess, Rachel O. |
doi_str_mv |
10.1007/s10683-007-9176-y |
dewey-full |
330 |
title_sort |
coordination of strategic responses to security threats: laboratory evidence |
title_auth |
Coordination of strategic responses to security threats: Laboratory evidence |
abstract |
Abstract Laboratory experiments are used to evaluate the extent to which players in games can coordinate investments that diminish the probability of losses due to security breaches or terrorist attacks. In this environment, economically sensible investments may be foregone if their potential benefits are negated by failures to invest in security at other sites. The result is a coordination game with a desirable high-payoff, high-security equilibrium and an undesirable low-security equilibrium that may result if players do not expect others to invest in security. One unique feature of this coordination situation is that investment in security by one player generates a positive externality such that all other players’ expected payoffs are increased, regardless of those other players’ investment decisions. Coordination failures are pervasive in a baseline experiment with simultaneous decisions, but coordination is improved if players are allowed to move in an endogenously determined sequence. In addition, coordinated security investments are observed more often when the largest single security threat to individuals is preventable by their own decisions to invest in security. The security coordination game is a “potential game,” and the success of coordination on the more secure equilibrium is related to the notion of potential function maximization and basin of attraction. © Economic Science Association 2007 |
abstractGer |
Abstract Laboratory experiments are used to evaluate the extent to which players in games can coordinate investments that diminish the probability of losses due to security breaches or terrorist attacks. In this environment, economically sensible investments may be foregone if their potential benefits are negated by failures to invest in security at other sites. The result is a coordination game with a desirable high-payoff, high-security equilibrium and an undesirable low-security equilibrium that may result if players do not expect others to invest in security. One unique feature of this coordination situation is that investment in security by one player generates a positive externality such that all other players’ expected payoffs are increased, regardless of those other players’ investment decisions. Coordination failures are pervasive in a baseline experiment with simultaneous decisions, but coordination is improved if players are allowed to move in an endogenously determined sequence. In addition, coordinated security investments are observed more often when the largest single security threat to individuals is preventable by their own decisions to invest in security. The security coordination game is a “potential game,” and the success of coordination on the more secure equilibrium is related to the notion of potential function maximization and basin of attraction. © Economic Science Association 2007 |
abstract_unstemmed |
Abstract Laboratory experiments are used to evaluate the extent to which players in games can coordinate investments that diminish the probability of losses due to security breaches or terrorist attacks. In this environment, economically sensible investments may be foregone if their potential benefits are negated by failures to invest in security at other sites. The result is a coordination game with a desirable high-payoff, high-security equilibrium and an undesirable low-security equilibrium that may result if players do not expect others to invest in security. One unique feature of this coordination situation is that investment in security by one player generates a positive externality such that all other players’ expected payoffs are increased, regardless of those other players’ investment decisions. Coordination failures are pervasive in a baseline experiment with simultaneous decisions, but coordination is improved if players are allowed to move in an endogenously determined sequence. In addition, coordinated security investments are observed more often when the largest single security threat to individuals is preventable by their own decisions to invest in security. The security coordination game is a “potential game,” and the success of coordination on the more secure equilibrium is related to the notion of potential function maximization and basin of attraction. © Economic Science Association 2007 |
collection_details |
GBV_USEFLAG_A SYSFLAG_A GBV_OLC SSG-OLC-WIW GBV_ILN_24 GBV_ILN_26 GBV_ILN_39 GBV_ILN_4012 GBV_ILN_4028 GBV_ILN_4318 GBV_ILN_4322 |
container_issue |
3 |
title_short |
Coordination of strategic responses to security threats: Laboratory evidence |
url |
https://doi.org/10.1007/s10683-007-9176-y |
remote_bool |
false |
author2 |
Holt, Charles A. Smith, Angela M. |
author2Str |
Holt, Charles A. Smith, Angela M. |
ppnlink |
230492959 |
mediatype_str_mv |
n |
isOA_txt |
false |
hochschulschrift_bool |
false |
doi_str |
10.1007/s10683-007-9176-y |
up_date |
2024-07-03T20:29:07.681Z |
_version_ |
1803591140175249408 |
fullrecord_marcxml |
<?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01000caa a22002652 4500</leader><controlfield tag="001">OLC2073983820</controlfield><controlfield tag="003">DE-627</controlfield><controlfield tag="005">20230503055101.0</controlfield><controlfield tag="007">tu</controlfield><controlfield tag="008">200819s2007 xx ||||| 00| ||eng c</controlfield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1007/s10683-007-9176-y</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627)OLC2073983820</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-He213)s10683-007-9176-y-p</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rakwb</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2="4"><subfield code="a">330</subfield><subfield code="q">VZ</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Hess, Rachel O.</subfield><subfield code="e">verfasserin</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Coordination of strategic responses to security threats: Laboratory evidence</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="c">2007</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">ohne Hilfsmittel zu benutzen</subfield><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Band</subfield><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">© Economic Science Association 2007</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Abstract Laboratory experiments are used to evaluate the extent to which players in games can coordinate investments that diminish the probability of losses due to security breaches or terrorist attacks. In this environment, economically sensible investments may be foregone if their potential benefits are negated by failures to invest in security at other sites. The result is a coordination game with a desirable high-payoff, high-security equilibrium and an undesirable low-security equilibrium that may result if players do not expect others to invest in security. One unique feature of this coordination situation is that investment in security by one player generates a positive externality such that all other players’ expected payoffs are increased, regardless of those other players’ investment decisions. Coordination failures are pervasive in a baseline experiment with simultaneous decisions, but coordination is improved if players are allowed to move in an endogenously determined sequence. In addition, coordinated security investments are observed more often when the largest single security threat to individuals is preventable by their own decisions to invest in security. The security coordination game is a “potential game,” and the success of coordination on the more secure equilibrium is related to the notion of potential function maximization and basin of attraction.</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Coordination games</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Laboratory experiments</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Potential games</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Security</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Holt, Charles A.</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Smith, Angela M.</subfield><subfield code="4">aut</subfield></datafield><datafield tag="773" ind1="0" ind2="8"><subfield code="i">Enthalten in</subfield><subfield code="t">Experimental economics</subfield><subfield code="d">Springer US, 1998</subfield><subfield code="g">10(2007), 3 vom: 09. Aug., Seite 235-250</subfield><subfield code="w">(DE-627)230492959</subfield><subfield code="w">(DE-600)1386451-8</subfield><subfield code="w">(DE-576)072172029</subfield><subfield code="x">1386-4157</subfield><subfield code="7">nnns</subfield></datafield><datafield tag="773" ind1="1" ind2="8"><subfield code="g">volume:10</subfield><subfield code="g">year:2007</subfield><subfield code="g">number:3</subfield><subfield code="g">day:09</subfield><subfield code="g">month:08</subfield><subfield code="g">pages:235-250</subfield></datafield><datafield tag="856" ind1="4" ind2="1"><subfield code="u">https://doi.org/10.1007/s10683-007-9176-y</subfield><subfield code="z">lizenzpflichtig</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_USEFLAG_A</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">SYSFLAG_A</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_OLC</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">SSG-OLC-WIW</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_24</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_26</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_39</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4012</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4028</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4318</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4322</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">AR</subfield></datafield><datafield tag="952" ind1=" " ind2=" "><subfield code="d">10</subfield><subfield code="j">2007</subfield><subfield code="e">3</subfield><subfield code="b">09</subfield><subfield code="c">08</subfield><subfield code="h">235-250</subfield></datafield></record></collection>
|
score |
7.4003916 |