Curriculum Vitae - Vanderbilt University

advertisement
Sunghoon Hong
Curriculum Vitae, January 2011
E-mail: sunghoon.hong@vanderbilt.edu
Cell: (615) 339–7325
Office: (615) 322–6243
Department of Economics
VU Station B #351819
Vanderbilt University
Nashville, TN 37235
http://people.vanderbilt.edu/~sunghoon.hong/
Graduate Education
Vanderbilt University, Department of Economics
Ph.D. Candidate in Economics
Undergraduate Education
Seoul National University, B.A. in Economics, 2003
Research and Teaching Fields
Primary: Game Theory
Secondary: Public Economics, Experimental Economics
Honors and Fellowships
Vanderbilt University, Department of Economics, Kirk Dornbush Summer Research Grants, 2010
Vanderbilt University, Summer Research Award, 2009
Vanderbilt University, University Graduate Fellowship, 2007-2011
Teaching Experience
Vanderbilt University, Teaching Assistant
Microeconomic Theory II: 2010 Spring, 2011 Spring
Public Finance: 2011 Spring
Social Choice Theory: 2010 Spring
Game Theory: 2009 Fall, 2010 Fall
Industrial Organization: 2009 Fall, 2010 Fall
Intermediate Macroeconomic Theory: 2009 Spring
Mathematics for Economists: 2008 Fall
Research Papers
“Efficiency and Stability in a Model of Wireless Communication Networks” (with Youngsub Chun)
Social Choice and Welfare (2010) 34:441 – 454
We introduce a model of (wireless communication) networks: a group of agents want to
communicate with each other; an agent has his own position and chooses his communication
range; any two agents can directly communicate if each agent is located within another agent’s
communication range. Also, they can indirectly communicate if two agents are connected through
a sequence of direct communications between agents. An agent benefits from the communication
and pays for his communication range. Although efficiency and stability are not compatible in a
general context, we identify interesting subclasses of problems where an efficient and stable
network exists: the uniform interval model, the uniform circle model, and the communication
favorable domain. Also, we investigate the consequence of allowing agents to relocate their
positions. For a certain network, relocation-proofness is equivalent to stability.
1
“Hacking-Proofness and Stability in a Model of Information Security Networks”
A group of players form directed links and set up security systems called firewalls. Each player
benefits from direct and indirect information obtained via his links. Firewalls may be beneficial
since setting up a firewall will ensure that a player cannot be attacked by a hacker. Maintaining
both links and firewalls is costly. The hacker enjoys destroying the information of players but
hacking is costly. The hacker knows the cost of hacking but the players have subjective beliefs
about this cost, described by a given probability distribution. Each player has the same beliefs.
The probability of a player being hacked is defined as the probability that the cost of hacking is
no more than the benefit the player may lose if hacked. In our model, for a given network,
stability requires that each player maximize his expected utility while hacking-proofness requires
that no player be attacked with positive probability. We first investigate the conditions under
which stability implies hacking-proofness. We then provide a probability upper bound of being
hacked over all stable networks.
“Enhancing Transportation Security Against Terrorist Attacks”
We study a model of strategic interaction between a terrorist organization and a security agency
in a transportation network. By carrying bads to a target through the transportation network, the
terrorist organization can damage the target and disrupt the operation of the network. While
gaining utility from the damage of the target and from the disruption of the network, the terrorist
organization incurs the cost of carrying bads. A security agency is informed of the terrorist attack.
By shutting down some transportation routes in the network, the security agency can protect the
target from the attack. Since the shutdown of routes disrupts the operation of the network, the
security agency incurs the cost of shutting down transportation routes. The security agency also
loses utility from the damage of the target. In this model we find an optimal security policy under
which the security agency can protect the target from devastating terrorism and effectively
operate the network. To understand how the terrorist organization commits terrorism under the
optimal security policy, we find a class of subgame perfect equilibria of this model. We also
introduce algorithms to find a maximum flow and a minimum cut in a transportation network.
“Strategic Network Interdiction”
We develop a strategic model of network interdiction in a non-cooperative game of flow. A
security agency operates a network with arc capacities. An adversary, endowed with a bounded
quantity of bads, chooses a flow that specifies a plan for carrying bads through the network from
a base to a target. Simultaneously, the agency chooses a blockage, which specifies a plan for
blocking the transport of bads through arcs in the network. However, the blockage of arcs
disrupts the operation of the network. The adversary gains and the agency loses from the target
damage and the network disruption. The adversary incurs the expense of carrying bads. We
characterize the Nash equilibria in terms of the primitives of our model. Our model contributes to
the literature of game theory by introducing non-cooperative behavior into a Kalai-Zemel type
mode of a (cooperative) game of flow. Our research also advances models and results on
network interdiction.
Professional Activities
Presentations of Research
Strategic Network Interdiction
Second Brazilian Workshop of the Game Theory Society, 2010
Summer Meeting of the Korean Econometric Society, 2010
Behavioral and Quantitative Game Theory: Conference on Future Directions, 2010
2
Enhancing Transportation Security Against Terrorist Attacks
WCU/BK Summer Economics Program at Yonsei University, 2009
20th Stony Brook Game Theory Festival of the Game Theory Society, 2009
Hacking-Proofness and Stability in a Model of Information Security Networks
9th International Meeting of the Society of Social Choice and Welfare, 2008
PET 08 Seoul, 2008
Efficiency and Stability in a Model of Wireless Communication Networks
Summer Meeting of the Korean Econometric Society, 2007
PET 07 Vanderbilt, 2007
3rd Pan-Pacific Game Theory Conference, 2006
The Society for Economic Design, 2006
8th International Meeting of the Society of Social Choice and Welfare, 2006
3
Download