This paper mainly studies the result of framing and
managing cybersecurity as a public good, rather than
specifically predicting the agents behavior in the envi-
ronment. Therefore, we only test replicative validity
(i.e. comparison to other models and determining the
internal stochastic variability in the model).
There are four levels of model performance for
replication validity (Axtell and Epstein, 1994). Since,
it would not be realistic to achieve the highest level
(i.e. the model behavior is in quantitative agreement
with empirical micro-structures, actual human behav-
ior) due to inherent uncertainty in human behavior
and the random events in reality, we satisfy the crite-
ria of the third level which is quantitative agreement
with empirical macro-structures. The results of this
simulation model are compared with empirical data
from previous studies (Falk and Fischbacher, 2001;
Fischbacher and Gachter, 2010; Lacomba and L
´
opez-
P
´
erez, 2015). The evidence shows that the agents be-
havior in this model under all the conditions (i.e. with
punishment, without punishment and reciprocity) is
in line with the empirical data.
5 CONCLUSION
This study shows that agent-based modeling of com-
plex socio-technical systems can be valuable for test-
ing fundamental theories which are difficult to in-
spect mathematically and experimentally. We pre-
sented a model to explore the interdependence of in-
dividual decisions in a repeated public goods game
that treats cybersecurity as a public good. This model
maps agents’ preferences to choices of contribution
and punishment. Repeated interactions among the de-
fenders that are able to remember their experience of
cyber attacks, punishments and contributions by oth-
ers lead to a convergence of individual preferences
and emergence of a cooperative behavior as a result.
Heterogeneity of agents is represented by heteroge-
neous social preferences with different reciprocal be-
havior, various level of resources and different source
of incentives. All these parameters affect on the prob-
ability of the contribution and punishment of non-
contributors.
We acknowledge that numerous externalities in
the context of cybersecurity and difficulty in assess-
ing the cybersecurity value and cyber risks cause mis-
aligned incentives and information asymmetry which
all contribute to poor cybersecurity investment and
management. However, this study suggests that the
theory of public goods should play a more significant
role in how we treat cybersecurity in the fast devel-
oping societies to maintain robust and resilient digital
ecosystems. Moreover, it shows that the maintaining
the resilience of the systems promotes the collective
actions among the defenders to combat the future at-
tacks. This highlights the importance of experience
and strongly interdependent decisions that changes
the status of the environment radically.
This is the first implementation of a public goods
game in the context of cybersecurity to investigate
whether the theory of public goods complies with this
domain. This study is meant as a starting point for
research in quantitatively analysis of the doctrine of
public cybersecurity. In future, we investigate the dif-
ferent types of economic efficiencies in this domain
and explore the factors that define the efficient situa-
tions in this context.
REFERENCES
Asllani, A., White, C. S., and Ettkin, L. (2013). Viewing
cybersecurity as a public good: The role of govern-
ments, businesses, and individuals. Journal of Legal,
Ethical and Regulatory Issues, 16(1):7.
Axtell, R. and Epstein, J. (1994). Agent-based modeling:
Understanding our creations. The Bulletin of the Santa
Fe Institute, 9(4):28–32.
Bissell, K., LaSalle, R., and Cin, P. (2019). Ninth annual
cost of cybercrime study. Ponemon Institute: Dublin,
Ireland, 6.
Bolton, G. E. and Ockenfels, A. (2000). Erc: A theory of
equity, reciprocity, and competition. American eco-
nomic review, 90(1):166–193.
Dufwenberg, M., Heidhues, P., Kirchsteiger, G., Riedel, F.,
and Sobel, J. (2011). Other-regarding preferences in
general equilibrium. The Review of Economic Studies,
78(2):613–639.
Etzioni, A. (2011). Cybersecurity in the private sector. Is-
sues in Science and Technology, 28(1):58–62.
Falk, A. and Fischbacher, U. (2001). A theory of reci-
procity.
Fehr, E. and Schmidt, K. M. (1999). A theory of fairness,
competition, and cooperation. The quarterly journal
of economics, 114(3):817–868.
Fischbacher, U. and Gachter, S. (2010). Social prefer-
ences, beliefs, and the dynamics of free riding in pub-
lic goods experiments. American economic review,
100(1):541–56.
Herrmann, B., Th
¨
oni, C., and G
¨
achter, S. (2008).
Antisocial punishment across societies. Science,
319(5868):1362–1367.
Isaac, R. M., McCue, K. F., and Plott, C. R. (1982). Public
goods provision in an experimental environment.
Kianpour, M., Øverby, H., Kowalski, S. J., and Frantz, C.
(2019). Social preferences in decision making under
cybersecurity risks and uncertainties. In International
Conference on Human-Computer Interaction, pages
149–163. Springer.
ICAART 2021 - 13th International Conference on Agents and Artificial Intelligence
420