The literature agrees that the major threat to IS security is constituted by careless employees who do not comply with organizations’ IS security policies and procedures. To add...
We utilize evolutionary game theory to study the evolution of cooperative societies and the behaviors of individual agents (i.e., players) in such societies. We present a novel pla...
Kan-Leung Cheng, Inon Zuckerman, Ugur Kuter, Dana ...
The focus of the work in this paper is the evaluation of a model of human decision making relative to experimental data. In sequential two-alternative forced choice decision tasks,...
Caleb Woodruff, Kristi A. Morgansen, Linh Vu, Damo...
Abstract—Social conventions are useful self-sustaining protocols for groups to coordinate behavior without a centralized entity enforcing coordination. We perform an in-depth stu...
To gain insights into the neural basis of such adaptive decision-making processes, we investigated the nature of learning process in humans playing a competitive game with binary ...