Kim Kaivanto

Many phish in the C: A coexisting-choice-criteria model of security behavior

Normative decision theory proves inadequate for modeling human responses to the social-engineering campaigns of Advanced Persistent Threat (APT) attacks. Behavioral decision theory fares better, but still falls short of capturing social-engineering …

A Fuel-Payload Ratio Based Flight-Segmentation Benchmark

Airlines and their customers have an interest in determining fuel- and emissions-minimizing flight segmentation. Starting from Kuchemann's Weight Model and the Breguet Range Equation for cruise-fuel consumption, we build an idealized model of optimal …

Community-Level Natural Resource Management Institutions: A Noncooperative Equilibrium Example

The Institutional Analysis and Development (IAD) literature finds that Nash equilibrium predictions are empirically falsified in the social dilemmas that arise in community-level natural resource management problems. However, Nash equilibrium is not …

Ensemble Prospectism

Incomplete preferences displaying ‘mildly sweetened’ structure are common, yet theoretically problematic. This paper examines the properties of the rankings induced by the set of all coherent completions of the mildly sweetened partial preference …

Risks and Transaction Costs of Distributed-Ledger Fintech: Boundary Effects and Consequences

Fintech business models based on distributed ledgers -- and their smart-contract variants in particular -- offer the prospect of democratizing access to faster, anywhere-accessible, lower cost, reliable-and-secure high-quality financial services. In …

Rank-order concordance among conflicting emissions estimates for informing flight choice

Air transport Greenhouse Gas (GHG) emissions estimates differ greatly, depending on the calculation method employed. Among the IPCC, ICAO, DEFRA, and BrighterPlanet calculation methods, the largest estimate may be up to 4.5 times larger than the …

The Effect of Decentralized Behavioral Decision Making on System-Level Risk

Certain classes of system-level risk depend partly on decentralized lay decision making. For instance, an organization's network security risk depends partly on its employees' responses to phishing attacks. On a larger scale, the risk within a …