- Game Theory and Applications
- Economic theories and models
- Evolutionary Game Theory and Cooperation
- Decision-Making and Behavioral Economics
- Experimental Behavioral Economics Studies
- Network Security and Intrusion Detection
- Game Theory and Voting Systems
- Information and Cyber Security
- Digital Platforms and Economics
- Mathematical and Theoretical Epidemiology and Ecology Models
- Evolution and Genetic Dynamics
- Consumer Market Behavior and Pricing
- Auction Theory and Applications
- Bayesian Modeling and Causal Inference
- Economic and Environmental Valuation
- Economic Theory and Policy
- Merger and Competition Analysis
- Monetary Policy and Economic Impact
- Internet Traffic Analysis and Secure E-voting
- Ecosystem dynamics and resilience
- Economic Theory and Institutions
- Law, Economics, and Judicial Systems
- Cybercrime and Law Enforcement Studies
- Knowledge Management and Technology
- Global Financial Crisis and Policies
University of Twente
2014-2025
Max Planck Society
2005-2009
Maastricht University
1995-1998
United Nations University – Maastricht Economic and Social Research Institute on Innovation and Technology
1996
Purpose The purpose of this paper is to assess whether or not electroencephalography (EEG) provides a valuable and substantial contribution the prediction consumer behaviour their preferences during product consumption. In study, authors especially focus on individual wine tasting experience. Design/methodology/approach A neuroscience experiment was carried out with 26 participants that evaluated different red wines while brain activity recorded EEG. within-subjects design employed in two...
Distributed Denial of Service (DDoS) attacks provide an easy option for these criminals to disrupt the business online platforms. We analyse economic impact DDoS on a crypto-currency exchange using event analysis. Our contributions are fourfold: Firstly, we develop estimation model utilising ideas from behavioural finance predict volume traded basis changes in price. Secondly, perform analysis evaluate whether there is attack 17 different cases. Thirdly, find that 13 cases negative due...
Reliable availability to the internet and internet-based services is crucial in today’s world. DDoS attacks pose a severe threat of such online resources – especially owing booters virtually everyone can execute them nowadays. In order appropriately protect oneself against attacks, it essential have good insight into threats that exist. This paper proposes novel hybrid model combines postulates from various models on crime opportunity, analyzing targeted victim infrastructure conjunction. We...
Abstract We model advertising with effects on different time scales for a duopoly in imperfect substitutes using elements from Contest Theory. Firms additionally compete short-run strategic variable, here price or quantity, allowing simultaneous sequential decisions, collusion endogenously changing stage games. Strategic variables range ‘slow’ (advertising), over ‘moderate’ (quantities) to ‘fast’ (prices). find feasible rewards and equilibria the limiting average reward criterion. Uniqueness...
We analyze effects of rarity value on the sustainability a natural resource. Rarity means that under extreme scarcity resource unit profits increase 'explosively.' focus equilibrium behavior very patient agents in Small Fish War. Agents interacting body water have two options: they can fish with restraint or without. Fishing allows stock to recover; fishing without yields higher immediate but lower future catches. distinguish weak and strong value; for (weak) variant, total symmetric...
DDoS attacks are increasingly used by 'hackers' and 'hacktivists' for various purposes. A number of on-line tools available to launch an attack significant intensity. These lead a variety losses at the victim's end. We analyse impact Distributed Denial-of-Service (DDoS) announcements over period 5 years on stock prices victim firms. propose method event studies that does not assume cumulative abnormal returns be normally distributed, instead we use empirical distribution testing In most...
We introduce the ray-projection dynamics in evolutionary game theory by employing a ray projection of relative fitness (vector) function, i.e., unto unit simplex along through origin. Ray-projection are weakly compatible terminology Friedman (Econometrica 59:637–666, 1991), each their interior fixed points is an equilibrium and one its points. Furthermore, every evolutionarily stable strategy asymptotically point, strict state equilibrium. also employ on set functions related to function...
A two-person general-sum repeated game with vanishing actions is an infinitely where the players face following restrictions. Each action must be used by player k ∈ {1,2} at least once in every r ℕ consecutive stages, otherwise vanishes for remaining play. We assume that wish to maximize their limiting average rewards over entire time-horizon. strategy-pair jointly convergent if each pair a number exists which relative frequency this chosen, converges probability one. of feasible called...
The attack intensity of distributed denial service (DDoS) attacks is increasing every year. Botnets based on internet things (IOT) devices are now being used to conduct DDoS attacks. estimation direct and indirect economic damages caused by these a complex problem. One the damage can be market value victim firm. In this article we analyze impact 45 different announcements victim's stock prices. We find that previous studies have mixed conclusion price. Hence, in evaluate using three...
We model and analyze strategic interaction over time in a duopoly. Each period the firms independently simultaneously take two sequential decisions. First, they decide whether or not to advertise, then set prices for goods which are imperfect substitutes. Not only own, but also other firm's past advertisement efforts affect current "sales potential" of each firm. How much this potential materializes as immediate sales, depends on If both turns into demand, otherwise part it "evaporates" does...