scholarly journals Humans Against Virus or Humans Against Humans: A Game Theory Approach to the COVID-19 Pandemic

2021 ◽  
Author(s):  
Santiago Forero-Alvarado ◽  
Nicolás Moreno-Arias ◽  
Juan J. Ospina-Tejeiro

Externalities and private information are key characteristics of an epidemic like the Covid-19 pandemic. We study the welfare costs stemming from the incomplete information environment that these characteristics foster. We develop a framework that embeds a game theory approach into a macro SIR model to analyze the role of information in determining the extent of the health-economy trade-off of a pandemic. We apply the model to the Covid-19 epidemic in the US and find that the costs of keeping health information private are between USD $5.9$ trillion and USD $6.7$ trillion. We then find an optimal policy of disclosure and divulgation that, combined with testing and containment measures, can improve welfare. Since it is private information about individuals' health what produces the greatest welfare losses, finding ways to make such information known as precisely as possible, would result in significantly fewer deaths and significantly higher economic activity.

2015 ◽  
Vol 14 (4) ◽  
pp. 828-870 ◽  
Author(s):  
Ufuk Akcigit ◽  
Qingmin Liu

Abstract Innovation is typically a trial-and-error process. While some research paths lead to the innovation sought, others result in dead ends. Because firms benefit from their competitors working in the wrong direction, they do not reveal their dead-end findings. Time and resources are wasted on projects that other firms have already found to be fruitless. We offer a simple model with two firms and two research lines to study this prevalent problem. We characterize the equilibrium in a decentralized environment that necessarily entails significant efficiency losses due to wasteful dead-end replication and an information externality that leads to an early abandonment of the risky project. We show that different types of firms follow different innovation strategies and create different kinds of welfare losses. In an extension of the core model, we also study a centralized mechanism whereby firms are incentivized to disclose their actions and share their private information in a timely manner.


2017 ◽  
Vol 107 (3) ◽  
pp. 897-930 ◽  
Author(s):  
Lukasz A. Drozd ◽  
Ricardo Serrano-Padial

We investigate the role of information technology (IT) in the collection of delinquent consumer debt. We argue that the widespread adoption of IT by the debt collection industry in the 1990s contributed to the observed expansion of unsecured risky lending such as credit cards. Our model stresses the importance of delinquency and private information about borrower solvency. The prevalence of delinquency implies that the costs of debt collection must be borne by lenders to sustain incentives to repay debt. IT mitigates informational asymmetries, allowing lenders to concentrate collection efforts on delinquent borrowers who are more likely to repay. (JEL D14, D82, G21, L84, M15, O33)


2019 ◽  
Vol 34 (6) ◽  
pp. 629-640 ◽  
Author(s):  
Pierluigi Musarò

Taking as a starting point studies on the biopolitics of bordering, as well as media studies, this article explores how information campaigns deter potential migrants and refugees from leaving their countries depict them in very specific ways, operating as ‘new bordering practices’ that are in conjunction with extraterritorial border policies. This article probes this question through the example of a specific information campaign – Aware Migrants (2016) – funded by the Italian Government and managed by International Organization for Migration (IOM) to dissuade potential newcomers from attempting the journey across the Mediterranean Sea. As the analysis of Aware Migrants makes clear, it contributes to normalizing a transnational imaginary into a militarized borderscape comprising places of violence and death, exploitation and detention, which is part of the complex dichotomies of care and control, proper of contemporary border regimes. Finally, the article sheds light on how these symbolic bordering practices contribute to nurturing a ‘compassionate repression’ that increasingly and silently legitimizes the difference between the ‘us’ (the figure of the citizen) and the ‘them’ (the figure of the foreigner).


2020 ◽  
Vol 110 ◽  
pp. 162-166
Author(s):  
Bibek Adhikari ◽  
James Alm ◽  
Timothy F. Harris

Ensuring tax compliance is an enduring problem for governments in all countries. In this paper, we examine the role of information reporting in increasing tax compliance. We first discuss the practice of information reporting in the US, including a recent IRS initiative that implemented information reporting for income received through debit and credit cards via the new Form 1099-K. We then review the literature on the compliance effects of information reporting. Finally, we report some new evidence that indicates that Form 1099-K information reporting had significant--but heterogeneous--impacts on compliance rates of different types of business reporting.


2016 ◽  
Vol 40 (2) ◽  
pp. 265-281 ◽  
Author(s):  
Brynne Harrison ◽  
Elena Svetieva ◽  
Arun Vishwanath

Purpose – The purpose of this paper is to explore user susceptibility to phishing by unpacking the mechanisms that may influence individual victimization. The focus is on the characteristics of the e-mail message, users’ knowledge and experience with phishing, and the manner in which these interact and influence how users cognitively process phishing e-mails. Design/methodology/approach – A field experiment was conducted where 194 subjects were exposed to a real phishing attack. The experimenters manipulated the contents of the message and measures of user traits and user processing were obtained after the phishing attack. Findings – Of the original list of targets, 47 percent divulged their private information to a bogus form page. Phishing susceptibility was predicted by a particular combination of both low attention to the e-mail elements and high elaboration of the phishing message. The presence of a threat or reward-based phishing message did not affect these processes, nor did it affect subsequent phishing susceptibility. Finally, individual factors such as knowledge and experience with e-mail increased resilience to the phishing attack. Research limitations/implications – The findings are generalizable to students who are a particularly vulnerable target of phishing attacks. Practical implications – The results presented in this study provide pragmatic recommendations for developing user-centered interventions to thwart phishing attacks. Lastly the authors suggest more effective educational efforts to protect individuals from such online fraud. Originality/value – This study provides novel insight into why phishing is successful, the human factor in susceptibility to online deception as well the role of information processing in effective decision making in this context. Based on the findings, the authors dispel common misconceptions about phishing and discuss more effective educational efforts to protect individuals from such online fraud.


2020 ◽  
Vol 76 (4) ◽  
pp. 869-891 ◽  
Author(s):  
Ana Ndumu

PurposeImmigration dominates much of the current US sociopolitical discourse. The research on US-based immigrant information behavior, however, remains scant. To understand the role of information in immigration, this study explores information overload among Black immigrants in the US.Design/methodology/approachThe researcher developed a literature-derived information overload scale to investigate participants' information access along with experiences and response to information overload.FindingsResults suggest that participants experience information overload due to behavioral (e.g. the demands of needing, seeking, or using information), quantitative (i.e. volume or length), and qualitative (e.g. authority, diversity, or urgency) indicators. Most participants mitigate information overload by turning to intermediaries and filtering resources.Research limitations/implicationsThe information overload scale can advance knowledge of the role of information in immigrant acculturative stress.Social implicationsLIS researchers and practitioners can utilize findings to foster social inclusion and well-being among immigrants.Originality/valueScholarship on immigrant information behavior must reflect the centrality of information in migration and how it shapes integration and acculturation.


2006 ◽  
Vol 96 (5) ◽  
pp. 1720-1736 ◽  
Author(s):  
George-Marios Angeletos ◽  
Iván Werning

Crises are volatile times when endogenous sources of information are closely monitored. We study the role of information in crises by introducing a financial market in a coordination game with imperfect information. The asset price aggregates dispersed private information acting as a public noisy signal. In contrast to the case with exogenous information, our main result is that uniqueness may not obtain as a perturbation from perfect information: multiplicity is ensured with small noise. In addition, we show that: (a) multiplicity may emerge in the financial price itself; (b) less noise may contribute toward nonfundamental volatility even when the equilibrium is unique; and (c) similar results obtain for a model where individuals observe one another's actions, highlighting the importance of endogenous information more generally.


2021 ◽  
Vol 13 (16) ◽  
pp. 9162
Author(s):  
Hui Yan ◽  
Haixiang Wei ◽  
Min Wei

This study aims to explore the process of tourism recovery in the post-COVID-19 period and the role of stakeholders in promoting such a process. Using evolutionary game theory, this study analyzes the behavior interactions and game equilibrium of stakeholders in the development of tourism by constructing an evolutionary game model amongst governments, tourists and tourism enterprises. Then, the influences of different evolution paths and major parameters affecting stakeholders’ strategy selection are discussed. With the aim of illustrating the role of the stakeholders in the tourism sector’s economic recovery under the impact of the coronavirus pandemic, the numerical experiment was conducted using the MATLAB 2016 software. The results show that the development and change of the emergent public health events affect tourism stakeholders’ behavior strategy. Moreover, the strategic choices of each player, including governments, tourism enterprises and tourists, are also constantly evolving at different stages of the pandemic.


2019 ◽  
Vol 41 (1) ◽  
pp. 5-13
Author(s):  
Henryk Spustek ◽  
Tomasz Dukiewicz

GAME THEORY AND CONTEMPORARY CONFLICTSThe article presents the application of game theory in the context of civil and military security. Game theory is used to study conflict situations involving more than one decision-maker. Special emphasis was given to the significant role of information in modern military operations. The article contains examples illustrating similarities between civil and military problems.


Sign in / Sign up

Export Citation Format

Share Document