组织信息安全投资中的博弈问题研究
详细信息    本馆镜像全文|  推荐本文 |  |   获取CNKI官网全文
摘要
信息安全是当前世界范围内各种机构组织亟待解决的问题之一。与以往只关注信息安全的技术研究不同,信息安全问题实际上是包括技术、管理和法律在内的系统工程,其中的信息安全投资问题就是管理领域的重要问题之一。信息安全投资具有独特的策略依存性的特点,这种策略依存性正是博弈论的基本特征,因而本文利用博弈理论研究组织的信息安全投资问题,为解决组织的信息安全投资难题提供了新的思路。
     本文首先利用有限策略博弈分析了组织的信息安全投资决策问题,然后利用无限策略博弈分析了组织的信息安全投资的具体额度问题,并且考虑到现实社会中信息安全投资主体的有限理性问题,以及预测信息安全投资的长期稳定趋势的需要,利用演化博弈论研究了防守博弈和攻防博弈两种情况下信息安全投资的演化博弈。本文的主要研究内容及成果如下:
     1.提出了组织信息安全投资决策的有限策略博弈分析方法,为组织正确制定信息安全投资决策提供决策支持。根据得益矩阵建立的两组织及多组织信息安全投资决策博弈模型全面考虑了信息安全投资所产生的价值效益,不仅包括预防信息安全事故产生的直接价值效益,也考虑了信息安全投资为组织带来的提升品牌价值、增加组织声誉等间接价值效益。对于两组织信息安全投资决策博弈模型,纯策略和混合策略纳什均衡分析的结果显现出两种纳什均衡分析的一致性,当信息安全投资成本较高时,惩罚变量的引入则有助于重新实现理想的纳什均衡,并且,通过算例简要说明了两组织信息安全投资决策的博弈分析。在建立的多组织信息安全投资决策博弈模型中,对影响成本阈值的因素进行详细讨论,提出多组织信息安全投资的两项命题,得出信息安全投资成本对于博弈均衡的影响规律,进一步寻找到促使组织“投资”信息安全成为均衡结果的必要条件,并通过仿真进行验证分析。
     2.提出了组织信息安全投资额度的无限策略博弈分析方法,为组织合理确定信息安全投资的额度提供科学依据。信息安全投资不足无法保证足够的安全,而投资过多则会造成不必要的浪费,因而必须合理确定信息安全的具体投资额度。根据信息安全投资额度的策略依存性建立信息安全投资额度博弈模型,模型中关系参数的变化反映了两组织间博弈关系的变化。对于模型中关系参数取值的不同情况,根据反应函数法进行博弈的均衡分析。在攻防博弈关系的情况下,推导出防守方均衡成本与关系参数相关关系的命题,并通过仿真进行验证。而且,通过算例简要说明了组织信息安全投资额度的博弈分析。
     3.提出了防守博弈和攻防博弈两种情况下信息安全投资的演化博弈分析方法,预测了博弈方有限理性下信息安全投资的长期稳定趋势。考虑到现实社会中信息安全投资主体的有限理性问题,以及预测信息安全投资的长期稳定趋势的需要,利用演化博弈论进行防守博弈与攻防博弈两种情况下信息安全投资的研究。在防守博弈下信息安全投资的演化博弈分析中,根据信息安全投资的演化博弈模型,通过复制动态分析防守博弈下信息安全投资演化博弈的进化稳定策略,并且通过REPAST的多agent仿真平台进行演化博弈的仿真验证,实验结果验证了演化博弈的进化稳定策略。对于攻防博弈下信息安全投资的演化博弈问题,首先建立信息安全攻防的博弈模型,分析防守方和攻击方的复制动态及进化稳定策略,进而根据攻防两群体复制动态的关系,得出攻防对抗的规律和长期稳定趋势,既从原理上解释了信息安全攻防循环的问题,也从演化博弈的分析中得出了解决信息安全问题的策略建议。
     本文从博弈论的全新角度研究信息安全投资问题,为解决组织的信息安全投资难题进行了有益探索,取得了一些创新性的研究成果。本文的研究对这一前沿领域的开拓具有重要的理论意义,同时对于减少组织在信息安全投资问题中的盲目性,指导组织科学合理地进行信息安全投资具有重要的实践意义。
Information security is an urgent problem for all kinds of organizations all over the world. Information security is not just a research field of technology, but a systematical engineering of technology, management and law. Information security investment problem is the research field of management. The distinct characteristic of information security investment is strategy interdependence, and strategy interdependence is just the basic characteristic of Game Theory. This doctoral dissertation has made scientific researches on information security problem based on game theory, and provides new methods to solve information security problem for organizations.
     This doctoral dissertation analyzes information security investment decision problem of the organizations by finite strategy game first, then analyzes the investment quantity of information security by infinite strategy game. Also, in view of bounded rationality and the need to predict the long-term stable trend, this doctoral dissertation studies information security investment under defenders game and attacker-defender game by evolutionary game theory. The main works are as follows:
     1. The finite strategy game analysis method of information security investment decision for organizations is proposed, and it provides the decision support for the correct information security investment. The information security investment decision game model is set up based on payoff matrix, and this game model contains all the value benefits of information security investment including the direct value benefits of preventing information security disaster and the indirect value benefits such as improving brand value and organization reputation. For information security investment decision game model between two organizations, the contrast of pure strategies and mixed strategies Nash Equilibrium shows the consistency of two analyses. In addition, when the information security investment cost is relatively high, the introduction of penalty parameter can achieve ideal Nash Equilibrium again. The example illustrates the information security investment game of two organizations. For the information security investment game model among organizations, the factors influencing cost threshold are discussed, and two propositions of information security investment are brought forward. The necessary conditions to achieve the equilibrium of investment are deduced, and the simulation analysis is made.
     2. The infinite strategy game analysis method of information security investment quantity for organizations is proposed, and it provides scientific reference for the proper investment quantity of information security. Insufficient investment of information security can not ensure enough security, and overabundant of investment induces the waste, so it is necessary to analyze the proper investment quantity of information security. The information security investment quantity game model is set up based on the strategy independence, and the relation parameter in the model reflects the game relation of the two organizations. According to the different value of the relation parameter, the equilibrium analysis is made based on reaction function method. In particular, for the attack-defence game, the correlation proposition of the defender's equilibrium cost and the relation parameter is set up, and verified by the simulation. The example illustrates the investment quantity game analysis.
     3. The evolutionary game analysis methods of information security investment under defenders game and attacker-defender game are proposed, solve the hard problem of bounded rationality of information security investment subject, and predict the long-term stable trend of information security investment. In view of the bounded rationality of information security investment subject in the real world and the need to predict the long-term stable trend of information security investment, the evolutionary game researches of information security investment under defenders game and attacker-defender game are made in order to strengthen the reality basis of information security investment game. In the evolutionary game analysis of information security investment under defenders game, based on the evolutionary game model of information security investment, Evolutionary Stable Strategy is analyzed by Replicator Dynamics. The REPAST simulation on the multi-agent platform verifies the Evolutionary Stable Strategy. For the evolutionary game of information security investment under attacker-defender game, the attacker-defender game model of information security is set up, and the Replicator Dynamics and Evolutionary Stable Strategy are analyzed. The law and long-term stable trend of attack and defence are studied based on the relation of Replicator Dynamics of the attacker colony and Replicator Dynamics of the defender colony. The research results explain the circle of attack and defence in information security, and put forward the strategy suggestions to settle information security problem.
     This doctoral dissertation has made scientific researches on information security problem for organizations from the new angle of game theory, explored the hard problem of information security investment, and achieved some innovative research results. This doctoral dissertation has important theoretical significance for this new research field, and also has important practical significance to reduce the blindness of the investment, and to direct information security investment scientifically.
引文
[1]《2007年全国信息网络安全状况与计算机病毒疫情调查报告》.公安部公共信息网络安全监察局,2007.
    [2]http://www.it.com.cn/f/market/0611/15/349357.htm
    [3]http://fund.jrj.com.cn/news/2007-08-18/000002566820.html
    [4]德勤.2007年全球安全调查.http://it.hexun.com/2007-09-28/100809807.html
    [5]Whitman,Michael E.Enemy at the gate:Threats to information security.Communications of the ACM,2003,46(8):91-95.
    [6]Ross Anderson.Why Information Security is Hard——An Economic Perspective.Proceedings of 17th Annual Computer Security Applications Conference,IEEE Computer Society,2001.
    [7]Fudenberg D,Tirole J.Game Theory.USA:MIT Press,1991.
    [8]Aumann R.On the centipede game.Games and Economic Behavior,1998,23(1):97-105.
    [9]Aumann R.Backward induction and common knowledge of rationality.Games and Economic Behavior,1995,8(1):6-19.
    [10]Aumann R,Michael Maschler.Game theoretic analysis of a bankruptcy problem from the Taimud.Journal of Economic Theory,1985,36(2):195-213.
    [11]Aumann R.Rationality and bounded rationality.Games and Economic Behavior,1997,21(1-2):2-14.
    [12]Schelling T.Intergenerational discounting.Energy Policy,1995,23(4-5):395-401.
    [13]Schelling T.Global environmental forces.Technological Forecasting and Social Change,1990,38(3):257-264.
    [14]程凌.罗伯特·奥曼和托马斯·谢林的贡献——2005年诺贝尔经济学奖述评.经济评论,2006,27(1):64-69.
    [15]朱小斌,夏国风.罗伯特·奥曼和托马斯·谢林对博弈论的贡献:对冲突与合作的分析.外国经济与管理,2005,27(12):58-63.
    [16](美) 约翰·纳什著.张良桥,王晓刚译.纳什博弈论论文集.北京:首都经济贸易大学出版社.2000.
    [17]Harsanyi J.A newtheory of equilibrium selection for games with complete information.Games and Economic Behavior,1995,8(1):91-122.
    [18]Harsanyi J.A new theory of equilibrium selection for games with incomplete information.Games and Economic Behavior,1995,10(2):318-332.
    [19]Harsanyi J.Solutions for some bargaining games under the Harsanyi-Selten solution theory,part Ⅰ:Theoretical preliminaries.Mathematical Social Sciences,1982,3(2):179-191.
    [20] Harsanyi J. Solutions for some bargaining games under the Harsanyi-Selten solution theory, part II Analysis of specific bargaining games. Mathematical Social Sciences, 1982,3(3): 259-279.
    
    [21] Selten R, Wooders M. Cyclic games: an introduction and some examples. Games and Economic Behavior, 2001, 34(1): 138-152.
    [22] Selten R, Ockenfels A. An experimental solidarity game. Journal of Economic Behavior & Organization, 1998, 34(4): 517-539.
    [23] Selten R. Evolutionary stability in extensive two-person games. Mathematical Social Sciences, 1983, 5(3): 269-363.
    [24] Ockenfels A, Selten R. Impulse balance equilibrium and feedback in first price auctions. Games and Economic Behavior, 2005, 51(1): 155-170.
    [25] Wooders M, Cartwright E, Selten R. Behavioral conformity in games with many players. Games and Economic Behavior, 2006, 57(2): 347-360.
    [26] Mirrlees J. Optimal tax theory: a synthesis. Journal of Public Economics, 1976, 6(4): 327-358.
    [27] 谢识予. 经济博弈论. 上海:复旦大学出版社, 2004.
    [28] Hamilton S, Miller W, Ott A, Saydjari S. The Role of Game Theory in Information Warfare. In 4th Information survivability workshop (ISW-2001/2002), Vancouver, Canada, 2002.
    
    [29] Ryan J, Ryan D. Expected benefits of information security investment. Computers & Security. 2006, 25: 579-588.
    [30] Rodewald G. Aligning Information Security Investments with a Firm's Risk Tolerance. 2nd Annual Conference on Information Security Curriculum Development, Georgia, 2005: 139-141.
    [31] Rok B, Borka J. Standard Approach for Quantification of the ICT Security Investment for Cybercrime Prevention. Second International Conference on the Digital Society, Sainte Luce, 2008: 7-14.
    [32] Sonnenreich W. Return on Security Investment(ROSI): A Practical Quantitative Model. Journal of Research and Practice in Information Technology. 2006, 38(1): 55-66.
    [33] Locher C. Methodologies for Evaluating Information Security Investments-What Basel Two Can Change in the Financial Industry. 13th European Conference on Information Systems, Germany, 2005.
    [34] Wang Z, Song H. Towards and optimal information security investment strategy. IEEE International Conference on Networking, Sensing and Control, China, 2008: 756-761.
    [35] Baker W, Rees L, Tippett P. Metric-driven information security risk assessment and decision making. Communications of The ACM. 2007, 50(10): 101-106.
    [36] Piper J. Security Risk Management and Investment Decisions. http://www. fpri. org/pubs/200612. piper. securityriskmanagementinvestment. pdf, 2006.
    [37]Huang C,Hu Q,Behara R.An economic analysis of the optimal information security investment in the case of a risk-averse firm.International Journal of Production Economics.2008,114:793-804.
    [38]Mercuri R.Analyzing Security Costs.Communications of The ACM.2003,46(6):15-18.
    [39]Huang C,Hu Q,Behara R.Economics of Information Security Investment in the Case of Simultaneous Attacks.The Fifth Workshop on the Economics of Information Security,England,2006.
    [40]Mizzi A.Return on Information Security Investment.http://www.infosecwriters.com/text_resources/pdf/ROISI.pdf,2005.
    [41]Cremonini M,Nizovtsev D.Understanding and influencing attackers' Decisions:Implications for Security Investment Strategies.Fifth Workshop on the Economics of Information Security,England,2006.
    [42]Duffany J.Optimal resource allocation for securing an enterprise information infrastructure.The 4th international IFIP/ACM Latin American conference on Networking,Costa Rica,2007:35-42.
    [43]Kim Sangkyun,Lee H.Cost-Benefit Analysis of Security Investment:Methodology and Case Study.International Conference on Computational Science and its Applications,Singapore,2005:1239-1248.
    [44]Buck K,Hanf D.Applying ROI Analysis to Support SOA Information Security Investment Decisions.IEEE International Conference on Technologies for Homeland Security,Greater Boston,2008:359-366.
    [45]Gordon L,Loeb M.The Economics of Information Security Investment.ACM Transactions on Information and System Security,2002,5(4):438-457.
    [46]Bodin L,Gordon L,Loeb M.Evaluating Information Security Investments Using the Analytic Hierarchy Process.Communicatoins of The ACM.2005,48(2):79-83.
    [47]Gordon L,Loeb M.Budgeting Process for Information Security Expenditures.Communicatoins of The ACM.2006,49(1):121-125.
    [48]Hausken K.Returns to information security investment:The effect of alternative information security breach functions on optimal investment and sensitivity to vulnerability.Information Systems Frontiers,2006,8:338-349.
    [49]Willemson J.On the Gordon&Loeb Model for Information Security Investment.The Fifth Workshop on the Economics of Information Security,England:University of Cambridge,2006.
    [50]孙薇,何德全,孔祥维,尤新刚.数字版权风险的模糊数学分析模型.哈尔滨工业大学学报,2006.
    [51]孙薇,孔祥维,尤新刚.数字版权管理对信息技术采纳模型的正向驱动效应研究.信息“技术采纳:理论发展与中国实践”学术研讨会(CNAIS),2006.
    [52] Farahmand F, Navathe S, Sharp G et al. Evaluating Damages Caused by Information Systems Security Incidents. 2nd Workshop on Economics and Information Security, Berkeley, 2003.
    [53] Adkins R. An Insurance Style Model for Determining the Appropriate Investment Level against Maximum Loss arising from an Information Security Breach. 3rd Workshop on Economics and Information Security, Berkeley, 2004.
    [54] Schechter S. Toward Econometric Models of the Security Risk from Remote Attacks. 3rd Workshop on Economics and Information Security, Berkeley, 2004.
    [55] Kannan K, Telang R. An Economic Analysis of Market for Software Vulnerabilities. 3rd Workshop on Economics and Information Security, Berkeley, 2004.
    [56] Gehring R. Softwawre Development, Intellectual Property Rights, and IT Security. 1st Workshop on Economics and Information Security, Berkeley, 2002.
    [57] Feigenbaum J, Freedman M, Sandre T et al. Economic Barriers to the Deployment of Existing Privacy Technologies. 1st Workshop on Economics and Information Security, Berkeley, 2002.
    [58] Acquisti A, Grossklags J. An Experimental Approach to Information Security Attitudes and Behavior. 2nd Workshop on Economics and Information Security, Berkeley, 2003.
    [59] Gal E, Ghose A. The Economic Consequences of Sharing Security Information. 2nd Workshop on Economics and Information Security, Berkeley, 2003.
    [60] Cavusoglu H, Cavusoglu H, Zhang J. Economics of Security Patch Management. Workshop on Economics and Information Security, Berkeley, 2006.
    [61] Gupta A, Zhdanov D. Growth and Sustainability of Managed Security Services Networks: An Economic Perspective. Workshop on Economics and Information Security, Berkeley, 2007.
    [62] Honeyman P. Interdependence of Reliability and Security. Workshop on Economics and Information Security, Berkeley, 2007.
    [63] Acohido B, Berinato S, Grow B. Communicating Security-The Role of Media: A Journalistic Perspective. Workshop on Economics and Information Security, Berkeley, 2008.
    [64] Desmedt Y. Using economics to model theats and security in distributed computing. 1st Workshop on Economics and Information Security, Berkeley, 2002.
    [65] Bergemann D, Feigenbaum J. Towards an Economic Analysis of Trusted Systems. 3rd Workshop on Economics and Information Security, Berkeley, 2004.
    [66] Rowe B. Will Outsourcing IT Security Lead to a Higher Social Level of Security? Workshop on Economics and Information Security, Berkeley, 2007.
    [67] Cachon G, Zipkin P. Competitive and Cooperative Inventory Policiesin a Two stage Supply Chain. Management Science, 1999, 45(7): 936-953.
    [68] Chen F, Federgruen A, Zheng Y. Near optimal Pricing Replenishment Strategies for a Retail distribution System. Operation research, 2001, 49(6): 839-853.
    [69]Sterman J.Modeling Managerial Behavior:Misperceptions of Feed back in a Dynamic Decision Making Experiment.Management Science,1989,35(3):321-339.
    [70]Chen F.Decentralized Supply Chains Subject to Information Delays.Management Science,1999,45(8):1076-1090.
    [71]Kimbrough S,WuD,Zhong F.Computers Play the Beer Game:Can Artificial agents Manage Supply Chains? Decision Support Systems,2002,33:323-333.
    [72]Cachon G,Lariviere M.Contracting to Assure Supply:How to Share Demand Forecasts in a Supply Chain.Management Science,2001,47(5):629-646.
    [73]Van J.Coordinating Investment,Production and Subcontracting.Management Science,1999,45(7):954-971.
    [74]Huang Z.Co-op Advertising Models in Manufacture retailer Supply Chains:A Game Theory Approach.European Journal of Operational Research,2001,135:527-544.
    [75]Brandenburger,Stuart A,Jr H.Value-Based Business Strategy.Journal of Economic Management Strategy,1996,5(1):52-54.
    [76]何德忠,孟卫东.期权博弈理论发展综述.生产力研究,2007,2:148-150.
    [77]袁惠英.期权博弈综述.现代商业,2007,12:15-17.
    [78]段静静.国内外期权博弈研究评述.发展研究,2007,9:62-64.
    [79]Thijssen J,Huisman K.Strategic Investment under Uncertainty and Information Spillovers:[dissertation].Tilburg:Tilburg University,2001.
    [80]Grenadier,Steven R.Option Exercise Games:An Application to the Equilibrium Investment Strategies of Firms.Review of Financial Studies,2002,15(3):691-721.
    [81]Pauli M,Keppo J.A Game model of Irreversible Investment Under Uncertainty.International Game Theory Review,2002,4(2):127-140.
    [82]Dean P,Pinto H.Competition Games in Duopoly Settings with Two Stochastic Factors.Working Paper,2003.
    [83]Smit H,Trigeorgis L.R&D Option Strategies.Working Paper,1997.
    [84]Kulatilaka,Nalin,Enrico C,Perotti.Strategic Growth Options.Management Science,1998,44(8):1021-1031.
    [85]安瑛晖,张维.期权博弈理论的方法模型分析与发展.管理科学学报,2001,4(1):38-43.
    [86]杨明,李楚霖.双头博弈中R&D项目从者的投资期权.青岛大学学报,2004,17:70-77.
    [87]余冬平,邱菀华.R&D投资决策的不对称双头垄断期权博弈模型.系统工程,2005,23(2):31-34.
    [88]Black F.The Dividend Puzzle.Journal of Portolio Management,1976,634-639.
    [89]Bhattacharyao S.Imperfact information Divident Policy and the bird in the Hand Fallacy.Bell Journal of Economic,1979,10(1):259-270.
    [90]Ross S.The Ditermination of Financial Structure:The incentive Signalling Approach.Bell Journal of Economica,1977,8(1):23-40.
    [91]Jesen,Meckling W.Theory of the Firm Managerial Agency Costs san Capital Structure.Journal of Financial Economics,1976,3(4):305-360.
    [92]Myers S,Majlfu.Corporate Financial and Investment Decisions When Firms Have information that investors do not Have.Journal of Financial Economics,1987,13(2):187-221.
    [93]Aoki,Masahiko.A model of the firm as a stockholder-employee cooperative game.American Economic Review,1980,70(4):600-610.
    [94]焦笑南.公司治理博弈分析:(博士学位论文).天津:天津大学,2004.
    [95]刘康兴,李海.关于博弈论在人力资源管理中的应用综述.时代金融,2007,4:42-44.
    [96]雷亚萍.人力资源绩效评估中的博弈分析.系统工程,2005,23(8):96-98.
    [97]沙志成.基于博弈论的发电厂竞价策略综述.东方电气评论.2004,18(4):222-226.
    [98]Singh H.Introduction to Game Theory and Its Application in Electric Power Markets.IEEE Computer Applications in Power,1999,12(4):18-20.
    [99]吴世勇.基于博弈论的水电竞价策略研究:(博士学位论文).四川:四川大学,2006.
    [100]Wen E,David S.Oligopoly electricity market production under incomplete information.IEEE Power Engineering Review,2001,21(4):58-61.
    [101]Haili S,Chen-Ching L.Hash Equilibrium Bidding Strategies in a Bilateral Electricity Market.Transactions on Power Systems,2002,17(1):73-79
    [102]谢宏标,李家伟.博弈论在IPO市场上的应用文献综述.科技情报开发与经济,2008,18(4):129-130.
    [103]邹斌.我国上市公司并购方式的博弈分析:(博士学位论文).成都:西南财经大学,2006.
    [104]马畅,孙莹.医药企业的营销博弈与博弈营销.武汉理工大学学报(信息与管理工程版)2004,26(4):146-149.
    [105]朱秀君,戚译.从博弈论看营销渠道的冲突与合作.商业经济与管理,2002,4:14-17.
    [106]陈洁,何伟.营销渠道经销商战略联盟动态和静态博弈形成机理比较.上海交通大学学报,2006,40(4):641-643.
    [107]陈洁,吕巍.营销渠道战略联盟形成的博弈分析.系统管理学报,2007,16(1):65-68.
    [108]Cavusoglu H,Mishra B,Raghunathan S.A Model for Evaluating IT Security Investments.Communications of the ACM,2004,47(7):87-92.
    [109]Kunreuther H,Heal G.Interdependent Security.Journal of Risk and Uncertainty,2003,26(2-3):231-249.
    [110]Varian n.System Reliability and Free Riding.Working paper,Economics of Information Security,University of California,Berkeley,CA.2004.
    [111]Tanaka H,Matsuura K,Sudoh O.Yulnerabilityand information security investment:An empirical analysis of e-local government in Japan.Journal of Accounting and Public Policy,2005,24(1):37-59.
    [112]Grossklags J,Christin N,Chuang J.Secure or Insure? A Game-Theoretic Analysis of Information Security Games.Proceedings of the 17th International World Wide Web Conference,China,2008:209-218.
    [113]Jiang L,Anantharam V,Walrand J.Efficiency of Selfish Investment in Network Security.Proceedings of the 3rd international workshop on Economics of networked systems,USA,2008:31-36.
    [114]冯·诺依曼,奥斯·摩根斯坦.博弈论与经济行为.上海:上海三联书店,2004.
    [115]海萨尼著.郝朝艳,魏军锋,平新乔译.海萨尼博弈论论文集.北京:首都经济贸易大学出版社,2003.
    [116]李永刚.基于演化博弈分析的跨国国际战略联盟构建研究:(博士学位论文).天津:天津大学,2006.
    [117]Nash J.Equilibrium points in N-person games.Proceedings of the National Academy of Science of the United States of America,1950,36:48-49.
    [118]Nash J.Non-cooperative games.Annals of Mathematics,1951,54:286-295.
    [119]Nash J.The bargaining problem.Econometrica,1950,18:155-162.
    [120]Nash J.Two person cooperative games.Econometrica,1953,18:155-162.
    [121]罗杰·迈尔森.博弈论.北京:中国经济出版社,2001.
    [122]Shapley L.Contributions to the Theory of Games.Princeton:Princeton University Press,1953.
    [123]Selten R.Spieltheoretische Behandlung eines Oligopolmodells mit Nachfagetragheit.Xeitschrift fur die gesamte Staatswissenschaft,1965,12:301-324.
    [124]Selten R.Re-examinnation of the Perfectness Concept for Equilibrium Points in Extensive Games.International Journal of Game,1975,4:25-55.
    [125]Harsanyi J.Games with incomplete information played by Bayesian players.Management Science,1967,14:489.
    [126]Harsanyi.Game with randomly disturbed payoffs:a new rationale for mixed strategy equilibrium points.International Journal of Game Theory,1973,2:1-23.
    [127]陈泰锋.世界贸易体制的博弈论:(博士学位论文).北京:对外经济贸易大学,2006.
    [128]王文举.博弈论应用与经济学发展.北京:首都经济贸易大学出版社,2003.
    [129]泰勒尔著.张维迎译.产业组织理论.北京:中国人民大学出版社,1997.
    [130]Smith M.The theory of Games and the evolution of animal conflicts.Journal of Theoretical Biology,1973,47:209-221.
    [131]Kreps D,Wilson R.Reputation and imperfect information.Journal of Economic Theory,1982,27:179-253.
    [132]张贞智,创业投资的博弈分析:(博士学位论文).厦门:厦门大学,2005.
    [133]Putnam R.Diplomacy and domestic politics:the logic of two-level games.International Organization,1988,42(4):427-460.
    [134]Smith M.Evolution and the theory of game.England:Cambridge University Press,1982.
    [135]罗素·W·库珀著.张军,李池译.协调博弈——互补性与宏观经济学.北京:中国人民大学出版社,2001.
    [136]尚宇红.博弈论前史研究:(博士学位论文).西安:西北大学,2003.
    [137]廖家平.电力市场的博弈论研究及决策支持系统的实现:(博士学位论文).武汉:华中科技大学,2006.
    [138]吴世勇.基于博弈论的水电竞价策略研究:(博士学位论文).成都:四川大学,2006.
    [139]王若平.银行监管行为的博弈研究:(博士学位论文).厦门:厦门大学,2004.
    [140]王家辉.中国证券市场监管的博弈研究:(博士学位论文).厦门:厦门大学,2006.
    [141]Neubauer T,Klemen M,Biffl S.Business Process-based Valuation of IT-Security.ACM SIGSOFT Software Engineering Notes,2005,30(4):1-5.
    [142]Osborne M,Rubinstein A.A Course In Game Theory.Beijing:China Social Sciences Press,2000.
    [143]Varian H.System reliability and free riding.Working paper,Economics of Information Security,Berkeley:University of California,2004.
    [144]Nash J.Non-Cooperative Games:[dissertation].NewJersey:Princeton University,1950.
    [145]Weibull J.Evolutionary Game Theory.Cambridge:MIT Press,1995.
    [146]Maynard S.The Theory of Games and the Evolution of Animal Conflict.Journal of Theory Biology,1973,47(1):209-221.
    [147]Maynard S,Price G.The Logic of Animal Conflicts.Nature,1973,246(5427):15-18.
    [148]Kosfeld M.Why Shops Close Again:An Evolutionary Perspective on the Deregulation of Shopping Hours.European Economic Review,2002,46(1):51-72.
    [149]Bester H,Guth W.Is Altruism Evolutionarily Stable.Journal of Economic Behavior &Organization,1998,34(2):193-209.
    [150]Skyrms,Brian.Deliberational Equilibria.Topoi,1986,5(1):59-67.
    [151]Friedman D,Fung K.International Trade and the Internal Organization of Firms:An Evolutionary Approach.Journal of International Economics,1996,41(1-2):113-137.
    [152]Friedman D.Evolutionary Games in Economics.Econometrica,1991,59(2):637-666.
    [153]谢识予.有限理性条件下的进化博弈理论.上海财经大学学报,2001,3(5):3-9.
    [154]Taylor P D,Jonker L B.Evolutionarily Stable Strategies and Game Dynamics.Mathematical Bioscience,1978,40:145-156.
    [155]Borgers T,Sarin R.Learning through Reinforcement and Replicator Dynamics.Journal of Economic Theory,1997,77(1):1-14.
    [156]邓宏钟,谭跃进.多人混合博弈的仿真分析.管理科学学报,2002,5(4):77-82.
    [157]赵纯均,华立.Multiagent仿真与资源稀缺下的适应行为.管理科学学报,1999,2(4):1-7.
    [158]李宏亮,程华,金士尧.基于Agent的复杂系统分布仿真建模方法的研究.计算机工程与应用,2007,43(8):209-213.
    [159]Holland J.Emergence from chaos to order.California:Addison-Wesley Publishing Company,1998.
    [160]Holland J.Hidden order how adaptation builds complexity.California:Addison-Wesley Publishing Company,1995.
    [161]Standish R.On complexity and emergence,High Performance Computing Support Unit University of New South Wales[EB].http://parallel.hpc.unsw.edu.ar/rks.
    [162]郝柏林.复杂性的刻画与“复杂性科学”.科学(上海),1999,51(3):3-8.
    [163]谭跃进,高世楫,周曼殊.系统学原理.长沙:国防科技大学出版社,1996.
    [164]王正中.复杂系统仿真方法及应用.计算机仿真,2001,18(1):3-6.
    [165]赵光武.还原论与整体论相结合探索复杂性.北京大学学报(哲学社会科学版),2002,39(6):14-19.
    [166]方美琪,张树人.复杂系统建模与仿真.中国人民大学出版社,2005.
    [167]傅星,林寅.分布式多主体仿真的开发环境研究.计算机工程与应用,2005,2:100-103.
    [168]王利.基于主体的仿真建模工具.计算机教育,2005,2:48-51.
    [169]http://www.swarm.org/[EB].
    [170]曹慕昆,冯玉强.基于多Agent计算机仿真实验平台Swarm的综述.计算机应用研究,2005,9:1-3.
    [171]Swarm Development Group.A Tutorial Introduction to Swarm[EB].http://www.swarm.org/csss-tutorial/frames.html.
    [172]http://repast.sourceforge.net/[EB].
    [173]Tobias R,Hofmann C.Evaluation of Free Java-libraries for Social-scientific Agent Based Simulation.Journal of Artificial Societies and Social Simulation,2004,7(1):1-33.
    [174]郝成民,刘湘伟,郭世杰.Repast:基于Agent建模仿真的可扩展平台.计算机仿真,2007,24(11):285-288.
    [175]North M,Collier N,Vos J.Experiences Creating Three Implementations of the Repast Agent Modeling Toolkit.ACM Transactions on Modeling and Computer Simulation,2006,16(1):1-25.
    [176]http://ccl.northwestern.edu/netlogo/[EB].
    [177]StarLogo on the web.http://education.mit.edu/starlogo/[EB].
    [178]TNGLab Overview.http://www.econ.iastate.edu/tesfatsi/tnghome.htm[EB].
    [179]http://web.econ.unito.it/terna/jes/[EB].
    [180]http://ascape.sourceforge.net/[EB].
    [181]姜昌华,韩伟,胡幼华.REPASTm—个多Agent仿真平台.系统仿真学报,2006,18(8):2319-2322.
    [182]赵剑冬,林健.基于Agent的Repast仿真分析与实现.计算机仿真,2007,24(9):265-268.

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700