Match!
Timothy N. Cason
Purdue University
Coordination gameEconomicsMicroeconomicsRepeated gameIndustrial organization
143Publications
36H-index
5,110Citations
What is this?
Publications 136
Newest
#1Timothy N. Cason (Purdue University)H-Index: 36
#2Tridib Sharma (ITAM: Instituto Tecnológico Autónomo de México)H-Index: 8
Last. Radovan Vadovič (Carleton University)H-Index: 2
view all 3 authors...
Abstract Studies of strategic sophistication in experimental normal form games commonly assume that subjects' beliefs are consistent with independent choice. This paper examines whether beliefs are consistent with correlated choice. Players play a sequence of 2×2 normal form games with distinct opponents and no feedback. Another set of players, called predictors, report a likelihood ranking over possible outcomes. A substantial proportion of the reported rankings are consistent with the predicto...
Source
#1Mustafa Abdallah (Purdue University)H-Index: 2
#2Daniel C. Woods (Purdue University)H-Index: 3
Last. Saurabh BagchiH-Index: 36
view all 7 authors...
We study the security of large-scale cyber-physical systems (CPS) consisting of multiple interdependent subsystems, each managed by a different defender. Defenders invest their security budgets with the goal of thwarting the spread of cyber attacks to their critical assets. We model the security investment decisions made by the defenders as a security game. While prior work has used security games to analyze such scenarios, we propose behavioral security games, in which defenders exhibit charact...
#1Mustafa Abdallah (Purdue University)H-Index: 2
#2Parinaz Naghizadeh (Purdue University)H-Index: 9
Last. Shreyas Sundaram (Purdue University)H-Index: 27
view all 6 authors...
We consider a system consisting of multiple interdependent assets, and a set of defenders, each responsible for securing a subset of the assets against an attacker. The interdependencies between the assets are captured by an attack graph, where an edge from one asset to another indicates that if the former asset is compromised, an attack can be launched on the latter asset. Each edge has an associated probability of successful attack, which can be reduced via security investments by the defender...
We consider a system consisting of multiple interdependent assets, and a set of defenders, each responsible for securing a subset of the assets against an attacker. The interdependencies between the assets are captured by an attack graph, where an edge from one asset to another indicates that if the former asset is compromised, an attack can be launched on the latter asset. Each edge has an associated probability of successful attack, which can be reduced via security investments by the defender...
Source
Dec 1, 2019 in CDC (Conference on Decision and Control)
#1Mustafa Abdallah (Purdue University)H-Index: 2
#2Parinaz Naghizadeh (Purdue University)H-Index: 9
Last. Shreyas Sundaram (Purdue University)H-Index: 27
view all 5 authors...
We consider a security setting involving a defender who is required to invest (subject to a budget constraint) in protecting a given set of nodes against attacks. Each node has a certain value to the defender, along with a probability of being successfully compromised, which is a function of the investment in that node by the defender. In this setting, we consider the impacts of behavioral probability weighting (vis-a-vis the probability of successful attack) on the investment strategies; such p...
2 CitationsSource
#1Timothy N. Cason (Purdue University)H-Index: 36
#2Sau-Him Paul Lau (HKU: University of Hong Kong)H-Index: 13
Last. Vai-Lam Mui (Monash University)H-Index: 13
view all 3 authors...
Abstract This paper studies theoretically and experimentally how success in prior interaction affects cooperation in the one-shot Inter-group Prisoner's Dilemma (IPD). We develop a model of the IPD that incorporates group-contingent social preferences and bounded rationality to derive conditions under which an increase in pro-social concerns for an out-group will increase cooperation. We then report an experiment that shows the cooperation rate increases from 8 percent in a baseline one-shot IPD...
2 CitationsSource
#1Timothy N. Cason (Purdue University)H-Index: 36
#2Robertas Zubrickas (University of Bath)H-Index: 3
Abstract We study donation-based crowdfunding for threshold public good provision. Our main focus is on an extension with refund bonuses aimed at resolving the problems of equilibrium coordination and free riding. In the case of insufficient contributions, contributors not only have their contributions refunded but they also receive refund bonuses proportional to their pledged contributions. Thus, refund bonuses encourage more contributions but ultimately enough is raised given sufficient prefer...
3 CitationsSource
#1Charles R. Plott (California Institute of Technology)H-Index: 56
#2Timothy N. Cason (Purdue University)H-Index: 36
Last. Travis Maron (California Institute of Technology)H-Index: 1
view all 5 authors...
The paper reports on the theory, design, laboratory experimental testing, field implementation and results of a large, multiple market and policy constrained auction. The auction involved the sale of 18,788 ten-year entitlements for the use of electronic gaming machines in 176 interconnected markets to 363 potential buyers representing licensed gaming establishments. The auction was conducted in one day and produced over $600M in revenue. The experiments and revealed dynamics of the multi-round ...
Source
#1Mustafa Abdallah (Purdue University)H-Index: 2
#2Parinaz Naghizadeh (Purdue University)H-Index: 9
Last. Shreyas Sundaram (Purdue University)H-Index: 27
view all 6 authors...
We consider a system consisting of multiple interdependent assets, and a set of defenders, each responsible for securing a subset of the assets against an attacker. The interdependencies between assets are captured by an attack graph, where an edge from one asset to another indicates that if the former asset is compromised, an attack can be launched on the latter asset. Each edge has an associated probability of successful attack, which can be reduced via security investments by the defender res...
2 CitationsSource
#1Timothy N. Cason (Purdue University)H-Index: 36
#2Steven Y. Wu (Purdue University)H-Index: 7
The use of student subjects and deception in experiments are two controversial issues that often raise concerns among editors and reviewers, which might prevent quality research from being published in agricultural and resource economics (ARE) journals. We provide a self-contained methodological discussion of these issues. We argue that field professionals are the most appropriate subjects for questions related to policy or measurement, and students are the most appropriate subjects for scientif...
6 CitationsSource
12345678910