Skip to main content
Elsevier - PMC COVID-19 Collection logoLink to Elsevier - PMC COVID-19 Collection
. 2021 Feb 5;93:102486. doi: 10.1016/j.jmateco.2021.102486

Social interactions and the prophylaxis of SI epidemics on networks

Géraldine Bouveret a,, Antoine Mandel b
PMCID: PMC7863793  PMID: 33583996

Abstract

We investigate the containment of epidemic spreading in networks from a normative point of view. We consider a susceptible/infected model in which agents can invest in order to reduce the contagiousness of network links. In this setting, we study the relationships between social efficiency, individual behaviours and network structure. First, we characterise individual and socially efficient behaviour using the notions of communicability and exponential centrality. Second we show, by computing the Price of Anarchy, that the level of inefficiency can scale up linearly with the number of agents. Third, we prove that policies of uniform reduction of interactions satisfy some optimality conditions in a vast range of networks. In setting where no central authority can enforce such stringent policies, we consider as a type of second-best policy the implementation of cooperation frameworks that allow agents to subsidise prophylactic investments in the global rather than in the local network. We then characterise the scope for Pareto improvement opened by such policies through a notion of Price of Autarky, measuring the ratio between social welfare at a global and a local equilibrium. Overall, our results show that individual behaviours can be extremely inefficient in the face of epidemic propagation but that policy can take advantage of the network structure to design welfare improving containment policies.

Keywords: Network, Epidemic spreading, Public good, Price of Anarchy

1. Introduction

In the context of the 2020 COVID-19 pandemic, very strong policy measures have been implemented to contain epidemic diffusion. State of emergency has been declared in certain countries and certain civil liberties (e.g. freedom of assembly) have been suspended. The implementation of such stringent policies, labelled as social distancing measures, has been justified by the role of social interactions in epidemic diffusion. In economic terms, the premise is that individual behaviour is extremely inefficient in the presence of disease/network externalities. Yet, there is, to our knowledge, no normative analysis of the challenges posed by the containment of epidemic spreading in a network. This is the issue we address in this paper.

The containment of epidemic processes defines a specific class of externality problems: through prophylactic investment, agents can reduce not only their own contamination risk but also reduce the risk of contagion of their peers in the network. The external effect hence created has certain features of a public good as the investment of each agent benefits to all the agents to whom it is connected. However, the magnitude of the effect depends on the specific connectivity between each pair of agents and thus on the structure of the network. In this setting, our first aim is to characterise, as a function of the network structure, individual and socially efficient behaviours. Second, we measure, using the notion of Price of Anarchy (PoA), the inefficiency induced by individual behaviours. Third, we investigate policy measures that can be implemented to overcome these inefficiencies.

We place ourselves in a setting where the network structure is given, each agent can be initially contaminated with a certain probability, and contagion spreads through network links proportionally to their contagiousness. Once infected, agents remain so permanently, i.e. we consider a susceptible/infected type of model according to the epidemiological terminology. In this context, agents aim at minimising their probability of contagion before a given date. In a narrow interpretation, this date can be seen as the expected date at which a treatment will be available. In a broader sense, the objective of each individual is to reduce the speed of incoming epidemic propagation. We assume that agents can invest in the network to reduce the speed of contagion. More precisely, they can decrease the contagiousness of links at a fixed linear cost. As the impact of individual investments depends on global contagiousness, and hence on the investment of other players, the situation defines a non-cooperative game. We consider two variants of the game. The local game in which an agent can only invest in the links through which it is connected. The global game in which an agent can invest in each link of the network. The local game naturally applies to settings where agents are individuals that can take individual and costly measures to limit their social interactions. The global game corresponds to a more complex setting where agents are usually organisations (regions, countries) that are involved in a scheme that allows one agent to subsidise, directly or indirectly, the investment of other agents in the reduction of contagiousness.

Our main results characterise the relationships between social efficiency, individual behaviours and network structure. First, we show that individually rational and socially efficient behaviours can be characterised using the notions of communicability and exponential centrality (Estrada and Hatano, 2008, Estrada and Higham, 2010). It is individually rational to invest in a link proportionally to the communicability between the investor and the edges of the link while it is socially efficient to invest in a link proportionally to the total communicability/exponential centrality of its edges. Second, we derive a quantitative measure of the inefficiency induced by individual behaviours using the notion of PoA. We show that in worst cases the level of inefficiency can scale up linearly with the number of agents. This strongly calls for public policy interventions. In this respect, we show the ε-optimality of a policy of uniform reduction of interactions in a wide range of networks. This latter result provides normative foundations for the social distancing policies implemented during the COVID-19 pandemic. The implementation of such policies nevertheless requires the existence of an authority with sufficient legitimacy to implement such coercive measures. It can be thus implemented in a domestic context but is much harder to implement at the global scale, unless all agents/countries have individual incentives to do so. If this is not the case, we regard the shift from a local to a global game as a type of second-best policy. In the latter game, agents can subsidise investments towards contagiousness reduction in the global rather than in the local network. The scope for Pareto improvement generated by such policies is then characterised through a notion of Price of Autarky (PoK), which assesses the ratio between social welfare at a global and a local equilibrium. We derive a lower bound on this PoK, as a function of the network structure and thus give sufficient conditions under which a shift to the global game actually improves social welfare. Overall, our results underline not only the possible extreme inefficiency of individual behaviours to limit epidemic propagation, but also the possibility to design efficient containment policies taking into account the network structure.

The remaining of this paper is organised as follows. Section 2 reviews the related literature. Section 3 introduces epidemic dynamics as well as our behavioural model of the containment of epidemic spreading. Section 4 provides our main results on the relationship between individual behaviours, social efficiency and network structure. Section 5 investigates the social efficiency of policy measures aiming at reducing epidemic diffusion. Section 6 concludes the paper. All proofs are given in the Appendix.

2. Related literature

The paper builds on the very large literature on the optimal design and defence of networks (see, e.g., Bravard et al. (2017)) and on epidemic spreading in networks. The latter literature has been extensively reviewed in Pastor-Satorras et al. (2015) and generally combines an epidemiological model with a diffusion model. The epidemiological model describes the characteristics of the disease via the set of states each agent can assume, e.g., susceptible/infected (SI), susceptible/infected/susceptible (SIS), susceptible/infected/removed (SIR), and the probabilities of transition between these. The diffusion model considers that the set of agents is embedded in a network structure through which the disease spreads in a stochastic manner. Overall, the micro-level epidemic diffusion model is a continuous-time Markov chain model whose state–space corresponds to the complete epidemiological status of the population. This state–space is however too large for the full model to be computationally or analytically tractable. A large strand of the literature has thus focused on the development of good approximations of the dynamics, see, e.g., Chakrabarti et al., 2008, Draief et al., 2006, Ganesh et al., 2005, Mei et al., 2017, Prakash et al., 2012, Ruhi et al., 2016, Van Mieghem et al., 2009 and Wang et al. (2003). To the best of our knowledge, the most precise approximation of the dynamics in the SIS/SIR setting is the N-intertwined model of Van Mieghem et al. (2009). This model uses one (mean-field) approximation in the exact SIS model to convert the exact model into a set of N non-linear differential equations. This transformation allows analytic computations that remain impossible with other more precise SIS models and renders the model relevant for any arbitrary graph. The N-intertwined model upper bounds the exact model for finite networks of size N and its accuracy improves with N. Van Mieghem and Omic (2008) have extended the model to the heterogeneous case where the infection and curing rates depend on the node. Later, Van Mieghem (2013) has analytically derived the decay rate of SIS epidemics on a complete graph, while Van Mieghem (2014) has proposed an exact Markovian SIS and SIR epidemics on networks together with an upper bound for the epidemic threshold.

Most of this literature has focused on SIS/SIR models in which there exists an epidemic threshold above which the disease spreads exponentially. A key concern has thus been the approximation of the epidemic threshold as a function of the characteristics of the network, and subsequently the determination of immunisation policies that allow to reach thebelow-the-threshold regime (see, e.g., Chen et al., 2016, Chen et al., 2015, Holme et al., 2002, Preciado et al., 2013, Preciado et al., 2014, Saha et al., 2015, Schneider et al., 2011, Van Mieghem et al., 2011).

A handful of studies has adopted a normative approach to the issue using a game-theoretic setting. Omic et al. (2009) consider a N-intertwined SIS epidemic model, in which agents can invest in their curing rate. They prove the existence of a Nash Equilibrium and derive its characteristics as a function of the network structure. They provide a measure of social efficiency through the PoA. They also investigate two types of policies to reduce contagiousness. The first one plays with the influence of the relative prices of protection while the second one relies on the enforcement of an upper bound on infection probabilities. Hayel et al. (2014) have also analysed decentralised optimal protection strategies in a SIS epidemic model. However, in their case, the curing and infection rates are fixed and each node can either invest in an antivirus to be fully protected or invest in a recovery software once infected. They show that the game is a potential one, expressed the pure Nash Equilibrium for a single community/fully-mesh network in a closed form, and establish the existence and uniqueness of a mixed Nash Equilibrium. They also provide a characterisation of the PoA. Finally, Goyal and Vigier (2015) examine, in a two-period model, the trade-off faced by individuals between reducing interaction and buying protection, and its impacts on infection rates. They analyse the equilibrium levels of interaction and protection as well as the infection rate of the population, and show the existence of a unique equilibrium. They highlight that individuals investing in protection are more willing to interact than those who do not invest, and establish the non-monotonic effects of changes in the contagiousness of a disease.

Yet, most of these contributions focus on situations where (i) some form of vaccine or treatment is available and (ii) dynamics are of the SIS/SIR type. Our attention is rather on situations where there is no known cure to the epidemic and where the objective is to delay its propagation through investments in the reduction of contagiousness. Therefore, we focus on the transient dynamics of the SI model. In this respect, we build on the recent contribution of Lee et al. (2019) who provide an analytical framework to represent the transient dynamics of the SI epidemic dynamics on an arbitrary network. In particular, they derive a tight approximation in closed-form of the solution to the SI epidemic dynamics over all time t. The latter overcomes the shortfalls of the existing linearised approximation (see Canright and Engø-Monsen, 2006, Mei et al., 2017 and Newman (2010)) by means of a thorough mathematical transformation of the system governing the SI dynamics. Lee et al. (2019) have also derived vaccination policies to mitigate the risks of potential attacks or to minimise the consequences of an existing epidemic spread with a limited number of available patches or vaccines over the network.

From an economic perspective, a number of contributions have investigated the integration of epidemiological models into dynamic general equilibrium models, including: Geoffard and Philipson (1996), Gersovitz and Hammer (2004), Goenka and Liu (2012), Goenka et al. (2014) and Goenka and Liu (2019) and, more recently, Eichenbaum et al., 2020, Jones et al., 2020 and Farboodi et al. (2020). These “epi macro“ contributions generally consider a representative agent and focus on the negative externality induced on economic dynamics by individual reaction to epidemic processes. We rather focus on the containment of epidemic spreading per se and the role of social interactions in this setting. In this respect, our contribution relates to the recent work of Acemoglu et al. (2020) on targeted lockdown and to that of Garibaldi et al. (2020) on individual vs social incentives for prophylactic measures. In line with the latter analysis as well as ours, Bayham et al. (2015) provide empirical evidences on behavioural changes during epidemics.

Our contribution also relates to the growing literature on the private provision of public goods on network. This literature mostly focuses on the relationship between the network structure and the individual provision of public goods. It generally considers a fixed network and that the public good/effort provision of an agent only affects its neighbours. In particular, Allouch (2015) shows the existence of a Nash Equilibrium in this setting under very general conditions. Bramoullé and Kranton (2007) prove, in a more specific setting, that Nash Equilibria generically have a specialised structure in which some individuals contribute and others free ride. A more recent contribution by Kinateder and Merlino (2017) extends the models of private provision of public goods to a setting with an endogenous network formation process. Yet, the network is formed in view of the benefits provided by the public good/effort offered by connections. Hence, although related, our focus differs from this strand of literature as, in our setting, the process of link formation per se is the source of external effects, and effects propagate throughout the network. Another related contribution is (Elliott and Golub, 2019) which provides a more conceptual view on the relationship between the network structure and public goods. It focuses on the network of external effects per se and characterises efficient cooperation/bargaining institutions in this framework. Our model could be subsumed into an extended version of their model which considers multi-dimensional actions. However, their framework abstracts away from the process underlying the interactions, which is one of our key focuses.

3. The model

3.1. Notations

We consider N the set of natural numbers and NN. The notation MN (resp. MN(R+)) denotes the set of N-dimensional square matrices with coefficients in R (resp. R+). For a given MMN, we write (M)i,j or mi,j, 1i,jN, to refer to its element in the ithrow and jthcolumn. Moreover, for any MMN, M denotes its Frobenius norm and for any matrix M and K in MN×MN, we write MK if mi,jki,j,i,j=1,,N. Additionally, the matrix I (resp. O) stands for the N-dimensional square identity (resp. null) matrix.

Similarly, for a N-dimensional column vector uRN, ui,1iN, refers to its element in the ithrow while u denotes its transpose and u its Euclidean norm. Additionally, for any u and v in RN×RN, we let uv if uivi,i=1,,N. We define similarly uv. For a function f:RR and a vector uRN, f(u) denotes the N-dimensional column vector with f(ui),1iN, as entries. Moreover, 1 is the N-dimensional column vector with one as entries.

We also consider diag(u), the N-dimensional square diagonal matrix with ui,1iN, as diagonal entries. Additionally, for the ithvector of the canonical basis of RN, ei,1iN, and any matrix MMN, we define the product operator

ei,M:=j=1Neji×mj,1,,j=1Neji×mj,N,

a N-dimensional row vector.

We define SN (resp. SN(R+)) as the subset of elements of MN (resp. MN(R+)) that are symmetric. We observe that SN is a real vector-space of dimension N(N+1)2 and we consider the basis formed by the matrices (B{i,j})1ijN such that bi,j{i,j}=bj,i{i,j}=1 and bk,{i,j}=0 for {k,}{i,j}. Accordingly, given a matrix DSN, we let d{j,k}:=dj,k+dk,j. Moreover, given USN, a differentiable function ϕ:UR, and D¯U, we denote by ϕd{i,j}(D¯) the partial derivative in the direction of B{i,j}, that is

ϕd{i,j}(D¯)ϕdi,j(D¯)+ϕdj,i(D¯),

where ϕdi,j(D¯) and ϕdj,i(D¯) denote the partial derivatives in the directions induced by the canonical basis of MN.

Finally, for a set B, we note Card(B) its cardinal and Bc the complementary set.

3.2. Model outline

We consider a finite set of agents, N={1,2,,N},N2, connected through a weighted and undirected network. The set of links is given by E{{i,j}i,jN} and their weights by the weighted adjacency matrix ASN(R+). In particular, for all iE, aii=0. The agents face the risk of shifting from a good/susceptible state to a bad/infected state. This transition occurs in continuous time through an epidemic process over the network. At time zero, a subset of agents idiosyncratically shifts to the infected state. Following this initial shock, infected agents contaminate their neighbours in the network with a probability that is proportional to the weight of the corresponding link. Infected agents remain so permanently and cannot revert to the susceptible state. As intimated in Section 2, this model is known as the SI model in the epidemiological literature (see, e.g., Pastor-Satorras et al., 2015). This model is simpler to analyse than more elaborate versions such as the SIS or SIR model. It nevertheless provides a relevant approximation of epidemic dynamics to analyse prophylactic behaviours “ex-ante“ (before contagion) as the network contagion paths are not modified, at short time-scales, by the possibility to revert to a susceptible/removed state. Furthermore, the SI model can be straightforwardly extended from the individual to an aggregate level (region or country). Indeed the transition from susceptible to infected can be defined as the first occurrence of contagion or the crossing of an epidemic threshold in the area under consideration whereas the transition from infected to susceptible or from infected to removed cannot be univocally defined at the aggregate level.

We consider a socio-economic setting in which strategic agents can invest in the network in order to reduce contagion rates. We are concerned with the characterisation of the equilibrium behaviour in this context, its relation to social efficiency, and the potential impacts of policy on these features. Such setting captures the behaviour of countries facing the global propagation of an epidemic as well as that of individuals facing its local propagation. It can also be applied to other socio-economic context such as the propagation of computer viruses (see, e.g., Pastor-Satorras and Vespignani, 2001) or the diffusion of innovation (see, e.g., Young, 2009).

In order to formally define the model, we first provide a detailed description of the epidemic dynamics and its approximation (see Section 3.3) and then introduce a representation of agents’ prophylactic behaviours (see Section 3.4).

3.3. Epidemic dynamics

Formally, an exact model of the dynamics of epidemic spreading in the SI framework is given by a continuous-time Markov chain (X(t))t0 with state–space X{0,1}N. A state ξX gives the infection status of all agents. The main variable of interest is the probability of contagion whose dynamics in the time interval [t,t+h] is given by

P(Xi(t+h)=1)=P(Xi(t)=1)+{ξXξi=0}P(Xi(t+h)=1X(t)=ξ)P(X(t)=ξ).

It is further assumed that the probability for node i to be infected by his (infected) neighbour j can be approximated for h small enough by βaj,ih where β is a unit contagion rate, and ai,j is the contagiousness of the network link {i,j}E. Thus, one has

P(Xi(t+h)=1)=P(Xi(t)=1)+{ξXξi=0}[1jN(1βaj,ihξj+o(h))]P(X(t)=ξ),

and equivalently

P(Xi(t+h)=1)=P(Xi(t)=1)+{ξXξi=0}jNβaj,ihξjP(X(t)=ξ)+o(h),

where o(h) is a generic term such that limh0|o(h)|h=0. In turn, this yields

P(Xi(t+h)=1)=P(Xi(t)=1)+jNβaj,ih{ξXξi=0}ξjP(X(t)=ξ)+o(h),

or equivalently

P(Xi(t+h)=1)=P(Xi(t)=1)+jNβaj,ihP(Xj(t)=1Xi(t)=0)+o(h). (3.1)

Eq. (3.1) characterises completely the evolution of the infection probability, as infected nodes remain so permanently. It highlights the role of the network in the contagion process and the possible heterogeneous contagiousness of different network links. In this respect, we make the following assumption about the network structure throughout the paper.

Assumption 3.3.1

The adjacency matrix ASN(R+) is irreducible and aperiodic.

The irreducibility assumption amounts to considering that every agent faces a risk of contagion as soon as at least one agent in the network is infected. Indeed, the network is then necessarily connected and the asymptotic behaviour of the Markov chain is trivial: there is an unstable steady state where none of the agent is infected and a unique stable steady state where all agents are contaminated.1 In the following, we shall actually consider that agents are concerned by the time at which they are likely to be infected rather than by their asymptotic infection status. Accordingly, we are concerned with the transient behaviour of the Markov chain. Yet, the number of states of the Markov chain increases exponentially with the number of nodes, and is neither analytically nor computationally tractable. Therefore, the conventional practice in epidemiological modelling is to consider a mean-field approximation of the infection rate. In particular, the N-intertwined model of Van Mieghem et al. (2009) considers the average behaviour over states for the infection probability. More precisely, the N-intertwined model assumes that the events {Xi(t)=0} and {Xj(t)=1} are independent for all i,jN and thus approximates Eq. (3.1) by

P(Xi(t+h)=1)=P(Xi(t)=1)+jNβaj,ihP(Xj(t)=1)P(Xi(t)=0)+o(h).

Using the fact that P[Xi(t)=1]+P[Xi(t)=0]=1, one gets

P(Xi(t+h)=1)P(Xi(t)=1)h=(1P(Xi(t)=1))jNβaj,iP(Xj(t)=1)+o(h)h.

Letting xi(t)P[Xi(t)=1] one gets as h tends towards 0,

xi(t)t=(1xi(t))βj=1Nai,jxj(t). (3.2)

Eq. (3.2) thus provides a deterministic approximation of the dynamics of the contagion probability xi(t) that takes into account the full network structure. It nevertheless disregards the positive correlation between the infection status of neighbouring nodes. This implies that Eq. (3.2) over-estimates the probability of contagion (see Van Mieghem et al., 2009).

Remark 3.1

Alternative mean-field approximations used in the literature are generally much coarser that the N-intertwined model considered here. Two common approaches are (i) to average over agents and focus on the (approximate) dynamics of the average probability of contagion or (ii) to average over agents with equal degree and focus on the (approximate) dynamics of the average probability of contagion for an agent of a given degree (see Pastor-Satorras et al., 2015 for an extensive review).

The non-linear equation (3.2) does not have an analytical solution. A common approach in the literature, used in particular to analyse the outbreak of an epidemic, is to assume xi(t) small enough to discard the factor (1xi(t)) and thus focus on the following linear equation

xi(t)t=βj=1Nai,jxj(t). (3.3)

However, this approximation grows exponentially towards +, whereas it is assumed to approximate a probability. In a recent contribution, Lee et al. (2019) provide a much better approximation of the solution of Eq. (3.2). More precisely, they define for all iN and tR+, yi(t)log(1xi(t)), and observe that x¯[x¯1,,x¯N] is a solution of the system defined by Eq. (3.2) with initial condition x(0)[x1(0),,xN(0)]x0, with at least one non-null element to avoid triviality, if and only if y¯[y¯1,,y¯N] is a solution of the system of equations defined for all iN by

yi(t)t=βjNai,j(1exp(yj(t))), (3.4)

with the corresponding initial condition. They then show that a tight upper bound to the solution of the system defined by Eq. (3.4) when x(0)=x01 is provided by

yˇ(t):=ln(1x0)+exp(βtAdiag(1x0))Idiag(1x0)1x0, (3.5)

and accordingly that xˇ(t):=1exp(yˇ(t)) is a tight upper bound to the solution x¯ of the system defined by Eq. (3.2) with initial condition x(0)=x0 in the sense that one has (see Lee et al. (2019, Theorem 5.1 and Corollary 5.2))

  • limt+xˇ(t)x(t)=0,

  • for any t0, x¯(t)xˇ(t)x~(t) where x~[x~1,,x~N] is the solution of the system defined by Eq. (3.3) with initial condition x(0)=x0.

Hence, xˇ provides an approximation of the probability of contagion that is asymptotically exact and more accurate than the standard linear approximation, even at short time scale.

3.4. Prophylactic behaviour

From now on, we shall consider that agents base their assessment of the dynamics of contagion on the approximated contagion probabilities xˇ associated to a given and fixed initial condition x(0)=x01, having at least one non-null element. In this sense, they make decisions on the basis of approximate information. This approach provides a consistent representation of the decision-making situation of actual agents which ought to base their decisions on similar approximations.

In this respect, we recall that in our SI setting, all agents eventually become infected. Thus, agents cannot base their decisions on their asymptotic infection status. Rather, they shall aim at delaying the growth rate of the epidemic. This is notably the strategy pursued by most countries during the recent COVID-19 pandemic. More precisely, we consider that agents consider a target date t¯, which can be interpreted as the planning horizon or the expected date of availability of a treatment, and aim at minimising the probability of contagion up to that date. We further assume, for sake of analytical tractability, that they have a logarithmic utility of the form

ui(xˇi(t¯))δilog(1xˇi(t¯)),iN,

where xˇi(t¯) is the approximate contagion probability given by Eq. (3.5) and δi0 is a subjective measure of the value of avoided contagion, or equivalently of the cost of contagion, for the agent i. One should note that the utility is non-positive and equal to a benchmark of zero if and only if there is no risk of contagion. In our setting, x0, β, and t¯ being fixed, Eq. (3.5) implies that the contagion probability is completely determined by the adjacency matrix A. The utility of agent iN can thus be expressed directly as

vi(A)δiei,exp(βt¯Adiag(1x0))diag(1x0)1x0, (3.6)

where the constant term ln(1x0)+diag(1x0)1x0 has been discarded to simplify the notations.

Eq. (3.6) highlights that, for a given admissible initial probability of contagion x0, the only lever that agents can use to reduce their contagion probability is the decrease of the contagiousness of the network, i.e. the decrease of the value of the coefficients of the adjacency matrix A. This is exactly the strategy put in place during the COVID-19 pandemic, at the local scale through social distancing measures, and at the global scale through travel restrictions and border shutdowns (see Colizza et al., 2006 for an analysis of the role of the global transport network in epidemic propagation). Formally, we consider a strategic game in which each agent can invest in the reduction of contagiousness of network links. We distinguish two alternative settings to account for potential constraints on agents’ actions:

  • In the global game, we assume that each agent can invest in the reduction of contagiousness of every network link. Therefore, the set of admissible strategy profiles is given by S(A):={(Di)iN(SN(R+))N:AiNDi0}.

  • In the local game, we assume that each agent can only invest in the links through which it is connected. Therefore, the set of admissible strategy profiles is given by K(A):={(Di)iNS(A):iN,k,jN,k,jidk,ji=0}.

Local games correspond to a setting where agents are individuals that limit their social interactions through individual and costly measures. On the other hand, global games apply to a more involved setting where agents are organisations (regions, countries) that have the ability to subsidise the investment of other agents in the reduction of contagiousness, either directly or indirectly.

Remark 3.2

Both S(A) and K(A) are non-empty, convex and compact sets.

The payoff function is defined in a similar fashion in both settings:

  • First, a strategy profile (Di)iN turns the adjacency matrix into AiNDi and thus yields to agent iN a utility
    Ui(Di,Di)vi(AiNDi)=δiei,expβt¯(AiNDi)diag(1x0)diag(1x0)1x0,
    where Di(Dj)jN,ji is the strategy profile of all agents but i.
  • Second, we consider that agents face a linear cost for their investment in the reduction of contagion. More precisely, for all iN, the cost associated to a strategy Di is given by
    Ri(Di)ρ1Di1=ρj,kNdj,ki,
    where ρ>0 is the cost parameter.
  • Overall, the payoff of agent iN given a strategy profile (Di)iN is given by
    Πi(Di,Di)Ui(Di,Di)Ri(Di)=δiei,expβt¯(AiNDi)diag(1x0)×diag(1x0)1x0ρ1Di1.

A few remarks are in order about the characteristics of the game. First, agents’ strategy sets are constrained by the choices of other players. Namely, given a strategy profile for the other players Di(SN(R+))N1, the set of admissible strategies for player i is Si(A,Di){DiSN(R+)(Di,Di)S(A)} (resp. Ki(A,Di){DiSN(R+)(Di,Di)K(A)}) in the global (resp. local) game. Although, it is not the most standard, this setting is comprehensively analysed in the literature (see, e.g., Rosen, 1965). Second, linear cost is a natural assumption in our framework. Indeed, the marginal cost paid to decrease the contagiousness of a link should not depend on the identity of the player investing. Third, the payoff function is always non-positive as it is the combination of both a utility and a cost that are always non-positive.

3.5. Nash Equilibrium

In the following, unless otherwise specified, we consider as implicitly given the utility weights δ[δ1,,δN], the time-horizon t¯, the unit contagion rate β, the initial contagion matrix A, the initial contagion probabilities x0, and the investment cost ρ. We then define the “local game“ L(δ,A,β,t¯,x0,ρ) as the game with strategy profiles in K(A) and payoff function Π and the “global game“ G(δ,A,β,t¯,x0,ρ) as the one with strategy profiles in S(A) and payoff function Π. As emphasised above, the game is defined on the basis of the approximated probability of contagion not on the “actual“ one, which is not computable.

In this setting, a Nash Equilibrium is defined as follows.

Definition 3.1 Nash Equilibrium —

  • An admissible set of strategies Dˇ:=(Dˇi)iNS(A) is a Nash Equilibrium for the global game if
    iN,DiSi(A,Dˇi),Πi(Dˇi,Dˇi)Πi(Di,Dˇi).
  • An admissible set of strategies D¯:=(D¯i)iNK(A) is a Nash Equilibrium for the local game if
    iN,DiKi(A,D¯i),Πi(D¯i,D¯i)Πi(Di,D¯i).

The existence of a Nash Equilibrium follows from standard arguments.

Theorem 3.1

There exists a Nash Equilibrium in both the local and global games.

Remark 3.3

In our setting, equilibrium is in general not unique as there might be indeterminacy on the identity of the players/neighbours which ought to invest in reducing the contagion of a link (see the discussion in Section 4.5).

3.6. Social optimum

The key concern, in the remaining of this paper, is the study of the efficiency of Nash Equilibrium. As commonly done in N-agent games, and in particular in network games, we define as Social Optimum, the outcome that maximises the equally-weighted sum of individual utilities.

Definition 3.2 Social Optimum —

An admissible set of strategies Dˆ:=(Dˆi)iNS(A) is a Social Optimum if

Dˆ=argmax(Di)iNS(A)iNΠiDi,Di.

Note that iNΠi(Di,Di) only depends on the value of iNDi. First, this implies that the notion of Social Optimum is the same in the local and global game. Indeed, it is straightforward to check that for every (Di)iNS(A), there exists (D~i)iNK(A) such that iND~i=iNDi. Second, given a matrix DSN(R+) such that DA, we shall let

Πˆ(D)iNvˆi(D)ρj,kNdj,k,

where vˆi:Dvi(AD), and, with a slight abuse of notation, state that Dˆ is a Social Optimum if it is such that Πˆ(D) is maximal over D(A){DSN(R+):DA}. The existence of a Social Optimum directly follows from the continuity of Πˆ and the compactness of D(A).

Theorem 3.2

There exists a Social Optimum in both the local and global games.

3.7. Price of anarchy

Since the 2020 COVID-19 pandemic, stringent policy measures have been enforced to contain epidemic spreading. In particular, the state of emergency has been proclaimed and we have witnessed a suspension of some of the civil liberties (e.g. freedom of assembly). A normative assessment of such policies requires a quantitative estimate of the inefficiency induced by individual behaviours. The PoA provides precisely such a metric (see, e.g., Papadimitriou, 2001, Nisan et al., 2007). It is defined as the ratio between the social welfare at the worst Nash Equilibrium and the one at the Social Optimum. Hence, in our setting, the PoA in the local and global games is defined as follows

PoALoc:=|Worst social welfare at a local Nash Equilibrium||Social welfare at a Social Optimum|, (3.7)
PoAGlo:=|Worst social welfare at a global Nash Equilibrium||Social welfare at a Social Optimum|. (3.8)

By construction, the PoA is greater or equal to 1 and equal to 1 only when all Nash Equilibria of the game are socially optimal. An increasing PoA corresponds to an increasing social inefficiency of individual behaviours at a Nash Equilibrium.

The PoA is standardly used in the computer science literature to assess the efficiency of network structures and protocols. Notably, Roughgarden and Tardos (2002) show that the PoA in routing games with linear congestion costs is bounded above by 43, while Fabrikant et al. (2003) show that the PoA is bounded independently of the number of players in network creation games. These and other related results indicate the relative efficiency of decentralised process in computer networks (see also Anshelevich et al., 2008 in this respect). The PoA has also been used in the epidemiological literature (see e.g. Hayel et al., 2014, Omic et al., 2009). In particular, Omic et al. (2009) consider a game where agents individually choose their curing strategy in an SIS epidemic context. They show that the PoA can be arbitrarily large and therefore argue for policy interventions in order to steer agents towards more socially efficient behaviours.

4. Characterisation of equilibrium and optimum

In this section, we provide a characterisation of equilibrium and social optimum as a function of network structure. To ease the exposition, we focus in the main text on the case where the initial contagion probability is equal across agents (whenever possible, the characterisation for arbitrary initial contagion probabilities x0 is provided in the Appendix and proofs in the Appendix are given for the general case). More precisely, we focus, unless otherwise specified on α-homogeneous games defined as follows:

Definition 4.1 α-Homogeneous Game —

A game is (α)-homogeneous if it is such that for all iN, x0i=α for some α(0,1). We will abusively write x0=α.

4.1. Characterisation of marginal utility via total communicability

As hinted by the dependency of the utility function on the exponential of the adjacency matrix (see Eq. (3.6)), the characterisation of optimal behaviours will be closely related to the notions of communicability and exponential centrality defined as follows.

Definition 4.2 Communicability —

Let X be the adjacency matrix of an undirected network over the set of nodes N.

  • The communicability between iN and jN is defined as
    Ci,j[X]exp(X)i,j=nN1n!Xi,jn.
  • The exponential centrality, or total communicability, of iN is defined as
    Ci[X]jNexp(X)i,j=jNnN1n!Xi,jn.
  • The subgraph centrality of iN is defined as
    Ci,i[X]exp(X)i,i=nN1n!Xi,in.

The notion of exponential centrality is widely used for the analysis of complex networks in natural sciences (see e.g. Estrada and Hatano, 2008, Benzi and Klymko, 2013 and references therein) and is very similar to that of Katz–Bonacich centrality (Katz, 1953, Bonacich, 1987), which is widely used in economics (see e.g. Ballester et al., 2006). In both cases, centrality is defined as a weighted sum of network paths leading to a node. Yet, while the Katz–Bonacich centrality is based on “exponential“ discounting of the length of paths for a parametric discount factor, exponential centrality uses a discounting scheme that increases more rapidly with path length and that is parameter free. It is also worth pointing out that for adjacency matrices of the form tX with tR+, i.e. adjacency matrices whose connectivity increases linearly in time (such as the ones considered here), it is known that for asymptotically large t, exponential centrality produces the same rankings as eigenvector centrality (see Theorem 5.1 in Benzi and Klymko, 2015).

The marginal utility induced by investments in the reduction of the contagiousness of a link can then be directly expressed in terms of communicability. Namely, one has.2

Lemma 4.1

For every iN , for any strategy profile (Di,Di)S(A) , and for all k,N ,

Ui(,Di)d{k,}i(Di)=Ui(,Di)dk,i(Di)+Ui(,Di)d,ki(Di)=δiαβt¯Ci,k[(1α)βt¯(AjNDj)]+Ci,[(1α)βt¯(AjNDj)] (4.1)

Furthermore, the marginal utility is non-negative and the map Πi(,Di) is concave on Si(A,Di) .

Let us first remark that, as the network of contagion is assumed undirected, investments in the link {k,}E induce, from the point of view of agent i, a reduction of contagiousness from k to i on the one hand and from to i on the other hand. More precisely, the marginal utility of investment in link {k,} for agent i is equal, up to the factor δiαβt¯, to the sum of communicability between i and k and between i and . In turn, the communicability depends on the initial structure of the contagion network A, the strategic investments in the reduction of contagiousness D, the unit contagion rate β, the time-horizon t¯, and the initial contagion probabilities α. Overall, the marginal impact of agents’ actions on contagiousness depends on the characteristics of the disease, measured through the initial contagion probability α and the diffusion rate β, the time horizon t¯ and the structure of the contagion network modified by the agents’ investments AjNDj.

4.2. Characterisation of equilibrium behaviour

From Lemma 4.1, one can straightforwardly deduce a differential characterisation of Nash Equilibria in both the local and global games, as reported in the following two propositions.

Proposition 4.1

A strategy profile D¯K(A) is a Nash Equilibrium of the local game L(δ,A,β,t¯,α,ρ) if and only if for all {k,}E , the following two conditions hold:

  • (1)
    One of the following alternative holds:
    • (a)
      ρ<maxi{k,}δiαβt¯Ci,k[(1α)βt¯(AjND¯j)]+Ci,[(1α)βt¯(AjND¯j)] and d¯{k,}k+d¯{k,}=a{k,} ,
    • (b)
      ρ>maxi{k,}δiαβt¯Ci,k[(1α)βt¯(AjND¯j)]+Ci,[(1α)βt¯(AjND¯j)] and d¯{k,}k=d¯{k,}=0 ,
    • (c)
      ρ=maxi{k,}δiαβt¯Ci,k[(1α)βt¯(AjND¯j)]+Ci,[(1α)βt¯(AjND¯j)] and d¯{k,}k+d¯{k,}[0,a{k,}] .
  • (2)
    For any iN , one has d¯{k,}i>0 only if
    δiαβt¯Ci,k[(1α)βt¯(AjNDj)]+Ci,[(1α)βt¯(AjNDj)]ρ.

Proposition 4.2

A strategy profile DˇS(A) is a Nash Equilibrium of the global game G(δ,A,β,t¯,α,ρ) if and only if for all {k,}E , the following two conditions hold:

  • (1)
    One of the following alternative holds:
    • (a)
      ρ<maxiNδiαβt¯Ci,k[(1α)βt¯(AjNDˇj)]+Ci,[(1α)βt¯(AjNDˇj)] and iNdˇ{k,}i=a{k,} ,
    • (b)
      ρ>maxiNδiαβt¯Ci,k[(1α)βt¯(AjNDˇj)]+Ci,[(1α)βt¯(AjNDˇj)] and iNdˇ{k,}i=0 ,
    • (c)
      ρ=maxiNδiαβt¯Ci,k[(1α)βt¯(AjNDˇj)]+Ci,[(1α)βt¯(AjNDˇj)] and iNdˇ{k,}i[0,a{k,}] .
  • (2)
    For any iN , one has dˇ{k,}i>0 only if
    δiαβt¯Ci,k[(1α)βt¯(AjNDˇj)]+Ci,[(1α)βt¯(AjNDˇj)]ρ.

The difference between Proposition 4.1, Proposition 4.2 stems from the fact that different sets of agents can invest in a given link: the agents at the edges of the link in the local case and all agents in the global case. Otherwise, their interpretation is similar. Equilibrium investment in a link is determined by the relationship between cost and communicability (or equivalently marginal utility). If the investment cost is large with respect to the communicability of the edges, there is no investment in the link. If the investment cost is smaller than the communicability from the edges to a player, there is full investment in the link, i.e. it is completely suppressed. Finally, there is the “interior“ case in which only the agents with the largest communicability to the edges invest in the link. They do so up to the point where the communicability is exactly proportional to the investment cost. The following definition highlights specific classes of equilibria in which investment behaviour is qualitatively similar across links.

Definition 4.3 Equilibrium Classification —

  • A Full Investment Equilibrium is an equilibrium that satisfies, for all {k,}E, case (a) of Proposition 4.1 (resp. 4.2).

  • A No Investment Equilibrium is an equilibrium that satisfies, for all {k,}E, case (b) of Proposition 4.1 (resp. 4.2).

  • An Interior Equilibrium is an equilibrium that satisfies, for all {k,}E, case (c) of Proposition 4.1 (resp. 4.2).

  • A local (resp. global) Homogeneous Interior Equilibrium is a special case of local (resp. global) Interior Equilibrium where, for each {k,}E, the marginal utilities of agents k, (resp. all agents) are equal.

We observe that in the case of a Full Investment Equilibrium or an Interior Equilibrium, there can be an indeterminacy on the identities of the agents that invest. Namely, let

E{k,}G(D)iNδiαβt¯Ci,k[(1α)βt¯(AjNDj)]+Ci,[(1α)βt¯(AjNDj)]ρ,

be the set of players susceptible to invest in the link {k,}E at an equilibrium D of the global game and

E{k,}L(D)i{k,}δiαβt¯Ci,k[(1α)βt¯(AjNDj)]+Ci,[(1α)βt¯(AjNDj)]ρ,

be the set of players susceptible to invest in the link {k,}E at an equilibrium D of the local game. Proposition 4.3, resulting from Proposition 4.14.2, highlights a form of substitutability of investments that arises at equilibrium.

Proposition 4.3

Let D be an equilibrium of the global game G(δ,A,β,t¯,α,ρ) (resp. local game L(δ,A,β,t¯,α,ρ) ). Assume that D~S(A) (resp. D~K(A) ) is such that for all {k,}E , one has:

  • (1)

    iNd~{k,}i=iNd{k,}i ,

  • (2)

    For any iN , d~{k,}i>0 only if iE{k,}G (resp. iE{k,}L ).

Then D~ is an equilibrium of the global (resp. local) game.

Hence, each player that has a large enough marginal utility is willing to invest in a link up to the equilibrium level independently of the actions of other players. This leads to indeterminacy on the allocation of investments (and thus of the related costs) among players that have a large enough marginal utility.

Remark 4.1

Consider the game G(δ,A,β,t¯,α,ρ) (resp. L(δ,A,β,t¯,α,ρ)) and its equilibrium D. We observe that, whenever for some i,j,k,N,

δiαβt¯Ci,k[(1α)βt¯(AhNDh)]+Ci,[(1α)βt¯(AhNDh)]
δjαβt¯Cj,k[(1α)βt¯(AhNDh)]+Cj,[(1α)βt¯(AhNDh)],

then jE{k,}G (resp. jE{k,}L) implies iE{k,}G (resp. iE{k,}L provided that i=k or ).

Finally, Proposition 4.14.3 imply that Full Investment Equilibria and Interior Equilibria have a notable property: they induce equilibria in each network that is more strongly connected than the equilibrium network (i.e. with a weight on each link higher than the one of the corresponding link in the equilibrium network). This property is formally stated in the following proposition.

Proposition 4.4

Let D be a Full Investment Equilibrium or an Interior Equilibrium of the global game G(δ,A,β,t¯,α,ρ) (resp. local game L(δ,A,β,t¯,α,ρ) ). Then for all A~AiNDi , any strategy profile D~S(A~) (resp. D~K(A~) ) such that iND~iiNDi+A~A is a Full Investment Equilibrium or an Interior Equilibrium of G(δ,A~,β,t¯,α,ρ) (resp. L(δ,A~,β,t¯,α,ρ) ). Moreover, both equilibria induce the same equilibrium network.

4.3. Characterisation of social optima

Using Lemma 4.1, one can provide a differential characterisation of social optima, as reported in the following proposition.

Proposition 4.5

A strategy profile DˆD(A) is a social optimum if and only if for all {k,}E , one of the following alternative holds:

  • (a)

    ρ<iNδiαβt¯Ci,k[(1α)βt¯(AjNDˆj)]+Ci,[(1α)βt¯(AjNDˆj)] and dˆ{k,}=a{k,l} ,

  • (b)

    ρ>iNδiαβt¯Ci,k[(1α)βt¯(AjNDˆj)]+Ci,[(1α)βt¯(AjNDˆj)] and dˆ{k,}=0 ,

  • (c)

    ρ=iNδiαβt¯Ci,k[(1α)βt¯(AjNDˆj)]+Ci,[(1α)βt¯(AjNDˆj)] and dˆ{k,}[0,a{k,l}] .

Hence at a Social Optimum, there is investment in a link only if the sum of marginal utilities induced by the investment is larger than or equal to the investment cost. If the cost is smaller than the sum of marginal utilities, then the link is completely suppressed (case (a)). On the other hand, if the solution is interior, then the level of investment is such that the sum of marginal utilities is exactly equal to the investment cost (case (c)). By analogy with the case of Nash Equilibria, we can then introduce the following specific classes of social optima.

Definition 4.4 Classification of Social Optima —

  • A Full Investment Optimum is an optimum that satisfies, for all {k,}E, case (a) of Proposition 4.5.

  • A No Investment Optimum is an optimum that satisfies, for all {k,}E, case (b) of Proposition 4.5.

  • An Interior Optimum is an optimum that satisfies, for all {k,}E, case (c) of Proposition 4.5.

A significant corollary of Proposition 4.5 is that in the case where δi is constant among agents, the social optimum can be completely characterised in terms of exponential centrality. Namely, one has the following.

Definition 4.5 δ-Homogeneous Game —

A game is δ-homogeneous if for all iN, δi=δ for some δ>0.

Corollary 4.1

A strategy profile DˆD(A) is a Social Optimum of a δ -Homogeneous Game if and only if for all {k,}E , one of the following alternative holds:

  • (a)

    ρ<δαβt¯Ck[(1α)βt¯(AjNDˆj)]+C[(1α)βt¯(AjNDˆj)] and dˆ{k,}=a{k,l} ,

  • (b)

    ρ>δαβt¯Ck[(1α)βt¯(AjNDˆj)]+C[(1α)βt¯(AjNDˆj)] and dˆ{k,}=0 ,

  • (c)

    ρ=δαβt¯Ck[(1α)βt¯(AjNDˆj)]+C[(1α)βt¯(AjNDˆj)] and dˆ{k,}[0,a{k,l}] .

Hence, at a social optimum, investment in link {k,} is determined by the relationship between investment cost and total communicability/exponential centrality. Links between nodes that have high exponential centrality ought to be completely severed (case a). Links between nodes that have low exponential centrality do not need to be altered (case b). Finally, at an interior optimum, investment in each link {k,} must be such that the sum of the exponential centrality of nodes k and is equal to ρ2δαβt¯.

The comparison between Proposition 4.5 on the one hand and Proposition 4.1, Proposition 4.2 on the other hand underlines the fact that investment in contagion reduction has all the features of a public good problem. At a Nash equilibrium, the investment level is determined by the marginal utility of a single agent (the one with the largest willingness to pay) while social efficiency requires the investment level to be determined by the sum of all marginal utilities. To quantify more precisely this inefficiency, Theorem 4.1, Theorem 4.2 provide a partial characterisation of the PoA in our setting.

4.4. Price of anarchy

In this section, we restrict our attention to complete networks in the following sense (for technical reasons related to the proofs).

Definition 4.6 Complete Network —

A network is complete if for all k,N,k, ak,>0.

To characterise the PoA, we build on the following relationships between utility and marginal utility that are straightforward consequences of Lemma 4.1 (and Lemma A.2 in the Appendix). Namely, the exponential form of the utility function induces the following relationships between marginal utility and utility.

Lemma 4.2

Consider an (α) -Homogeneous Game, and let MN . For every iN , and for any strategy profile (Di,Di)S(A) ,

k,NkorMUi(,Di)d{k,}i(Di)=2Card(M)δiβt¯α×kNexp(βt¯(1α)(AiNDi))i,k=2Card(M)βt¯(1α)Ui(,Di)(Di). (4.2)

Lemma 4.3

Consider an (α) -Homogeneous Game, and let MN . For every iN , and for any Social Optimum DD(A) ,

k,NkorMvˆi(D)d{k,}=2Card(M)βt¯(1α)vˆi(D). (4.3)

These relationships between marginal utility and utility allow to characterise the utility level prevailing at an equilibrium or at a social optimum using first-order conditions and therefrom to infer the following bounds on the price of anarchy.

Theorem 4.1

Consider a global α -Homogeneous Game G(δ,A,β,t¯,α,ρ) with a complete network such that the worst Nash equilibrium Dˇ is not a Full Investment Equilibrium and a social optimum Dˆ is not a Null Investment Optimum. Then

PoAGloN22βt¯(1α)+1iNDˇi1N2βt¯(1α)+1Dˆ1N+2βt¯(1α)N1A1.

The upper bound for PoALoc has a stronger dependence on the structure of the network.

Theorem 4.2

Assume N3 and consider a local α -Homogeneous Game L(δ,A,β,t¯,α,ρ) with a complete network such that the worst Nash Equilibrium D¯ is not a Full Investment Equilibrium and a Social Optimum Dˆ is not a Null Investment Optimum. Then

PoALoc12βt¯(1α)N2ρ+(N2)α(N1)iNKi(δi,A,D¯,D¯,β,t¯,α)+ρ1iND¯i1ρN2βt¯(1α)+1Dˆ1N+(N2)αN(N1)ρiNKi(δi,A,O,A,β,t¯,α)+2βt¯(1α)N1A1,

where for any adjacency matrix B and strategy profiles D,D ,

Ki(δi,B,D,D,β,t¯,α)δiβt¯kNkiCi,k[(1α)βt¯(AjNDj)]Ci,i[(1α)βt¯(AjNDj)].

In particular, for all i,kN,ki ,

0ρ+αδiβt¯Ci,k[(1α)βt¯(AjND¯j)]Ci,i[(1α)βt¯(AjND¯j)]2ραδiβt¯Ci,i[(1α)βt¯(AjND¯j)].

Theorem 4.1, Theorem 4.2 imply that the PoA grows at most linearly with the number of agents. Furthermore, Proposition 4.7 will show that one cannot improve upon this linear bound. These results are in strong contrast with those recalled in Section 3.7 for network and routing games in which the PoA is bounded independently of the number of agents. This emphasises the fact that in our setting, Nash equilibrium, can become extremely inefficient as the number of agents grow. In other words, an unbounded PoA strongly calls for policy interventions. These are investigated in detail in Section 5.

4.5. Equilibrium and optimum in stylised network structures

In this subsection, we highlight the impact of network structure on epidemic containment strategies by characterising equilibrium and social optimum for a set of stylised network structures.

Example 4.1

We first focus on a completely homogeneous network such that for all (i,j)N×N,ai,j=a for some a>0. We further consider that the game is α and δ homogeneous and that N3. The game is then symmetric and, using the non-emptiness, convexity and compactness properties of the strategy space as well as the continuity and concavity properties of the payoff, one can ensure there exists a symmetric equilibrium in both the local and global games (see Cheng et al. (2004, Theorem 3)). We shall show that equilibria for both games coincide and that, for ρ in an appropriate range, they are interior. Indeed, let DˇS(A), be a symmetric equilibrium of the global game. According to Eq. (4.1), one has for all i,k,N,

Ui(,Dˇi)d{k,}i(Dˇi)=δβt¯αCi,k(H)+Ci,(H)=δβt¯αexp(H)i,k+exp(H)i, (4.4)

where H is of the form

H:=0hhhhhh0
 with hβt¯(1α)(aiNdˇk,i),k,N,k. (4.5)

Using a Taylor expansion, one can prove that exp(H) is of the form

exp(H):=χ(h)χ(h)exp(h)χ(h)exp(h)χ(h)exp(h)χ(h)exp(h)χ(h)exp(h)χ(h)exp(h)χ(h),

where χ(h)1+k1ukk!, with (uk)kN{0} satisfying the following recursive system3

u1=0 and v1=huk=h(N1)vk1 and vk=h(N2)vk1+uk1 for k2.

As χ(h)>χ(h)exp(h), it follows from Eq. (4.4) that for all distinct elements i,k,N, one has

Ui(,Dˇi)d{i,}i(Dˇi)>Uk(,Dˇk)d{i,}k(Dˇk).

Using Proposition 4.2, this yields the following characterisation:

  • (1)

    The symmetric equilibrium is such that h=0, or equivalently iNDˇi=A, leading to χ(0)=1, if only if ρδβt¯α.

  • (2)

    The symmetric equilibrium is such that h=βt¯(1α)a, or equivalently iNDˇi=0 if and only if ρδβt¯αζ(βt¯(1α)a) where ζ(βt¯(1α)a)2χ(βt¯(1α)a)exp(βt¯(1α)a).

  • (3)

    The symmetric equilibrium is interior if and only if ρ(δβt¯α)1,ζ(βt¯(1α)a).

In the third case, the equilibrium is a local Homogeneous Interior Equilibrium, while, in the first two cases, there exists an equilibrium in local strategies that is equivalent to Dˇ in the sense of Proposition 4.3.

In view of Proposition 4.4, the equilibria put forward in Example 4.1 are also equilibria in games where the network is more strongly connected than in the example, even if the level of connectivity is not uniform among nodes. This defines a broader class of networks in which one can partially characterise equilibrium as follows.

Proposition 4.6

Consider an α and δ homogeneous game where there exists γ>0 such that for all k,N,k , ak,γ . Then, one has in both the local and global games:

  • (1)

    If ρ(δβt¯α)<ζ(βt¯(1α)γ) , there exists a Full Investment Equilibrium or an Interior Equilibrium.

  • (2)

    If, moreover ρ(δβt¯α)>1 , there exists an Interior Equilibrium.

Example 4.1 also implies that one cannot improve upon the linear upper bound on the PoA. Indeed, by concavity of Πˆ, we know the set of Social Optima is convex. Moreover, given the symmetry of the game, the set of Social Optima shall be invariant by permutation. Thus, the average of all socially optimal profiles is socially optimal and must be symmetric, i.e. of the form Dˆ such that:

Dˆ:=0dˆdˆdˆdˆdˆdˆ0, for some dˆ0.

The sum of utilities at such an optimum can be computed as above and one can then derive the following analytical expression for the price of anarchy.

Proposition 4.7

Consider the game given in Example 4.1 and assume that ρ(δβt¯α)2,ζ(βt¯(1α)a) , and let Dˇ (resp. Dˆ ) be the worst Nash Equilibrium (resp. a Social Optima). Then

PoAGlo=PoALoc=N2ρ2βt¯(1α)N(N2)δαexp(h)2(1α)+ρ1iNDˇi1Nρ2βt¯(1α)+ρ1Dˆ1N(N2)δβt¯αexp(h)ρ+2βt¯(1α)N1A1,

where h:=βt¯(1α)(aiNdˇk,i)>0 , for any k,N,k . In particular, ρδβt¯αexp(h)0 .

Example 4.2

A second salient class of examples (still in the class of α-Homogeneous Games) is that where the network consists in a series of fully connected clusters weakly linked to each other. More precisely, we consider a network with N=M×L nodes in which nodes in L{(1)M+1,,M} form the łth cluster in the sense that the adjacency matrix A is such that:

  • For all =0,,L1 and all i,jL one has ai,j=a,

  • For all k,{0,,L1}, one has aM+1,kM+1=a,

  • ai,j=0 otherwise.

Hence each cluster L is fully connected and is connected to other clusters through its “bridge“ node bM+1. We denote by B={b1,,bL} the set of bridge nodes.

Remark 4.2

In this setting, one can show (see proof in the Appendix) that there exist local equilibria D¯ that are ‘’symmetric” in the sense that:

  • Each non-bridge node iNB uses the same strategy which consists in investing δnn0 in its links towards non-bridge nodes in its cluster and δnb0 in its links towards the bridge node in its cluster (it is not connected to any other node).

  • Each bridge node jB uses the same strategy which consists in investing δbn0 in its links towards non-bridge nodes in its cluster and δbb0 in its links towards other bridge nodes.

In other words, D¯ is such that for all (i,j)N, one has

d¯i,j=δnnif (i,j)E(NB×NB)δnbif (i,j)E(NB×B)δbnif (i,j)E(B×NB)δbbif (i,j)E(B×B).

The equilibrium network H=AiND¯i then is of the form

hi,j=hnna2δnnif (i,j)E(NB×NB)hnbaδnbδbnif (i,j)E(NB×B)hbba2δbbif (i,j)E(B×B).

Let us then show that, if M3 and βt¯(1α) is sufficiently small, one must have hbbhbn. If hbn=0, this is trivial. Let us then consider the case where hbn>0. Assume, by contradiction, that hbb<hbn. This implies in particular hbb<a and thus using Proposition 4.1 that

ρδαβt¯Cb,b[(1α)βt¯H]+Cb,b[(1α)βt¯H], (4.6)

where, with a slight abuse of notation, Cb,b[(1α)βt¯H] denotes the subgraph centrality of an arbitrary bridge node and Cb,b[(1α)βt¯H] denotes the communicability between two arbitrary bridge nodes. These two quantities are independent of the bridge nodes under consideration given the symmetry properties of H.

Moreover hbb<hbn implies hbn>0 and thus using Proposition 4.1 one has

ρδαβt¯Cb,b[(1α)βt¯H]+Cb,n[(1α)βt¯H], (4.7)

where, with a slight abuse of notation, Cb,n[(1α)βt¯H] denotes the communicability between an arbitrary bridge node and a non-bridge node in its cluster, which is independent of the non-bridge node under consideration given the symmetry properties of H.

Combining Eqs. (4.6), (4.7) one gets

Cb,b[(1α)βt¯H]+Cb,b[(1α)βt¯H]Cb,b[(1α)βt¯H]+Cb,n[(1α)βt¯H],

and thus

Cb,b[(1α)βt¯H]Cb,n[(1α)βt¯H]. (4.8)

Now:

  • There is a single path of length 1 in H between b and b with weight hbb and a single path of length 1 in H between b and n with weight hbn>hbb.

  • There is no path of length 2 in H between b and b and there are M2 paths of length 2 between b and n with weight hbnhnn (these are paths going through another node in the cluster).

For βt¯(1α) sufficiently small one can discard paths of length 3 or more in the computation of Cb,b[(1α)βt¯H] and Cb,n[(1α)βt¯H]. Using hbb<hbn, the preceding then shows that there are strictly more paths of length 1 and 2 between b and n than between b and b. Thus, one has Cb,n[(1α)βt¯H]>Cb,b[(1α)βt¯H], which contradicts Eq. (4.8). Thus, one has shown by contradiction that hbbhbn. Hence, if the clusters are sufficiently large, i.e. M3, at a symmetric Nash equilibrium, there is more investment in the intra-cluster link than in the inter-cluster link. In other words, there is little investment made to prevent epidemic transmission across clusters.

With respect to social optimum, using the concavity of the payoff function and the symmetry properties of the game, it is straightforward to show that there exists a social optimum Dˆ with the same symmetry properties as the Nash Equilibrium D¯ above. Accordingly, there exist knn,knb,kbb[0,a] such that the socially optimal network is of the form

ki,j=knnif (i,j)E(NB×NB)knbif (i,j)E(NB×B)kbbif (i,j)E(B×B).

Let us then show that, if M3, L is sufficiently large, and βt¯(1α) is sufficiently small, one has kbbkbn. If kbb=0, this is trivial. Otherwise, assume kbb>kbn. This implies in particular kbb>0 and thus using Corollary 4.1 that

ρ2δαβt¯2Cb[(1α)βt¯K], (4.9)

where, with a slight abuse of notation, Cb[(1α)βt¯H] denotes the exponential centrality of an arbitrary bridge node, which is independent of the bridge nodes under consideration.

Moreover, kbb>kbn implies kbn<a and thus using Corollary 4.1 that

ρδαβt¯Cb[(1α)βt¯K]+Cn[(1α)βt¯K], (4.10)

where, with a slight abuse of notation, Cn[(1α)βt¯H] denotes the exponential centrality of an arbitrary non-bridge node, which is independent of the non-bridge node under consideration. Combining Eqs. (4.9), (4.10) one gets

Cb[(1α)βt¯K]+Cn[(1α)βt¯K]2Cb[(1α)βt¯K],

and thus

Cn[(1α)βt¯K]Cb[(1α)βt¯K]. (4.11)

Now:

  • The sum of paths of length 1 to b is (L1)kbb+(M1)knb. Indeed there are L1 path coming from other bridge nodes, M1 paths coming from its cluster.

  • The sum of paths of length 1 to n is knb+(M2)knn. Indeed there is one path coming from the bridge node and M2 paths coming from the non-bridge nodes in the cluster.

For βt¯(1α) sufficiently small one can discard paths of length 2 or more in the computation of Cn[(1α)βt¯H] and Cb[(1α)βt¯H]. Using kbb>kbn, the preceding then shows that, if L is sufficiently large, the sum of paths of length 1 to b is strictly greater than the sum of paths of length 1 to n. In turn, this implies that Cn[(1α)βt¯K]<Cb[(1α)βt¯K], which contradicts Eq. (4.11). Thus, one has shown by contradiction that kbbhbn. Hence, if there are sufficiently many clusters, i.e. if L is large enough, at a symmetric social optimum, there is more investment in the inter-cluster links than in the intra-cluster links.

Overall, this example highlights a major qualitative difference between local equilibrium and social optimum in a setting where the network is formed by a series of fully connected clusters linked by bridge nodes. At equilibrium, the reduction of contagiousness within a cluster is prioritised over the prevention of inter-cluster diffusion. At a social optimum, the reverse holds: the reduction of inter-cluster diffusion is prioritised over the prevention of intra-cluster diffusion.

5. Policy response

5.1. Uniform social distancing

Our previous results highlight the fact that individual strategic behaviours can lead to major inefficiencies in the containment of epidemic spreading. In particular, there may be complete free-riding of other players on the investment of the agent that is the most affected by the epidemic (Proposition 4.1, Proposition 4.2) and the inefficiency can scale up linearly with the number of agents (Theorem 4.1, Theorem 4.2 and Proposition 4.7). In other words, individual strategic behaviours can be highly inefficient in terms of social welfare as soon as there are a large number of agents involved. This is the case in real-world applications whether one considers epidemic spreading between individuals at the domestic scale or between countries at the global scale.

Against this backdrop, it is natural to search for a public policy response for the prevention of epidemic spreading. During the recent COVID-19 outbreak, a widespread policy response has been the implementation of social distancing measures that have reduced, in a uniform way, the scale of social interactions. Formally, we can define the social distancing policy at level κR+ as restricting social interactions to Q(A,κ)(ci,j)i,jN such that for all i,jN, ci,jκai,jkNai,k and thus jNci,j=κ. This amounts to using the strategy AQ(A,κ). The level κR+ must be such that AQ(A,κ)O. Hence, the social distancing policy amounts to bounding the level of social interactions of each agent to a fixed level. In practice, this has been implemented by massive restrictions on socio-economic activities such as interdiction of public gatherings, closing of schools and businesses, and travel restrictions. A formal analysis of this policy in our framework shows it can be socially efficient, at least if the initial contagion probability and the disutility are assumed to be uniform. Namely, it is optimal in the following sense.

Proposition 5.1

Consider an α and δ homogeneous game and assume that kNai,k>0 for all iN .

  • 1.

    If 2δβt¯αρ , then κ=0 is optimal and the optimal social distancing measure involves the suppression of every link.

  • 2.
    If 2δβt¯α<ρ , then for every ε>0 , there exists T¯>0 such that for t¯T¯ , one can find 2δβt¯α<ρ2δβt¯αexp(βt¯(1α)×miniNkNai,k) for which there exists an admissible κ>0 satisfying
    Πˆ(AQ(A,κ))maxDD(A)Πˆ(D)ε.

Hence, uniform reduction of social interactions appears as being an extremely efficient policy in our framework. This appears as a natural counterpart to existing results in the literature that emphasise the role of highly connected nodes, e.g., “super spreaders“, in epidemic propagation (see, e.g., Pastor-Satorras and Vespignani, 2001, Pastor-Satorras et al., 2015). Indeed uniform restriction of interactions necessarily leads to the fading of super-spreaders.

5.2. Global actions and the price of Autarky

Social distancing measures can be implemented at the domestic scale in order to reduce the propagation of epidemics between individuals. However, at the international scale, there is no authority entitled to implement such coercive measures. Furthermore, individual countries can take measures to reduce their interactions with other countries, e.g., border closures, but cannot directly reduce interactions between two other countries. They are thus, by default, in the framework of a local game. One could nevertheless consider schemes in which countries with a higher disutility from infection subsidise investments in other parts of the network to reduce global contagiousness. This would turn the problem into a global game. In order to compare outcomes in these two situations, we introduce the notion of PoK, which corresponds to the ratio between the social welfare at the worst equilibrium of the local game and at the best equilibrium of the global game.

PoK:=|Worst social welfare at a Nash Equilibrium of the local game||Best social welfare at a Nash Equilibrium of the global game|.

The PoK measures the welfare gains that can be induced by a policy that allows agents to invest in the reduction of contagiousness across the network. Such policies can notably be implemented through international cooperation frameworks. The policy induces welfare gains if PoK>1, i.e. if global equilibria are better than local ones. The policy is useless if PoK=1, i.e. if global and local equilibria coincide as in Example 4.1. The latter implies in particular that an increase in the set of admissible strategies does not necessarily induce an increase in social welfare. Sometimes it could even lead to more free riding.

In general, the value of the PoK is determined by the network structure and the individual disutilities associated to contagion, measured by the coefficients δi,iN. In particular, following the lines of the proofs of Theorem 4.14.2, one can provide an explicit lower bound on the PoK, as detailed in the theorem below.

Theorem 5.1

Consider an α -Homogeneous Game and a complete network with N3 . Assume that the local game L(δ,A,β,t¯,α,ρ) and global game G(δ,A,β,t¯,α,ρ) are such that: the worst local Nash Equilibrium D¯ is a Homogeneous Interior Equilibrium and the best global Nash Equilibrium Dˇ is not a Full Investment Equilibrium. Then (5.1) is given in Box I .

In particular, for all i,kN,ki ,

0ρ+αδiβt¯×Ci,k[(1α)βt¯(AjND¯j)]Ci,i[(1α)βt¯(AjND¯j)]=2ραδiβt¯Ci,i[(1α)βt¯(AjND¯j)]. (5.2)

Box I.

PoK1βt¯(1α)N(N1)ρ(N2)αiNδiβt¯Ci,i(1α)βt¯(AjND¯j)+ρ1iND¯i1ρN22βt¯(1α)+1iNDˇi1 (5.1)
Nβt¯(1α)N22βt¯(1α)+1A1

In the case of Example 4.1, the conditions of Theorem 5.1 are satisfied and PoK=1. More broadly, Eqs. (5.1)(5.2) highlight that the PoK increases when there exist agents iN with a large disutility of contagion δi that are highly connected to other nodes in the network, as measured by the communicability Ci,k(),i,kN,ki. A salient example is that where one of the agents has a much higher disutility of contagion than its peers. We thus intend to study this example and more specifically to consider the limit case where δ=δei for some iN, i.e. where the disutility of all other agents is negligible with respect to that of agent i. In this setting there is no indeterminacy on the agent that is investing and we can give a necessary condition for global strategies to dominate local ones. This is the aim of the following proposition.

Proposition 5.2

Consider an α -Homogeneous Game with a completely homogeneous network such that for all (i,j)N×N,ai,j=a for some a>0 . Assume that N3 and that there is a single iN such that δi>0 . We denote this game by L(δei,A,β,t¯,α,ρ) . If

δiβt¯α<ρ<δiβt¯αsinh(N1βt¯(1α)a)N1+cosh(N1βt¯(1α)a),

then one has:

  • (1)

    Any local equilibrium D¯ is a Homogeneous Interior Equilibrium and is such that D¯j=O , for all jN,ji , and d¯i,ki=d¯k,ii=h for all {i,k}E for some h[0,a] .

  • (2)
    Global strategies dominate local ones if and only if the parameters β,t¯,α , and a are such that
    sinh(N1βt¯(1α)(ah))>N1cosh(N1βt¯(1α)(ah)).

Hence, Proposition 5.2 provides a characterisation of network/contagion structure for which a policy/agreement that allows agents to invest in links across the network is welfare improving. In contrast with Example 4.1, it shows that such policy measures are particularly relevant when agents have heterogeneous disutilities from contagion. Hence, such policies of “subsidised containment“ can be seen as a second-best alternative to the “uniform containment“ policies considered in Proposition 5.1 when the latter are not socially acceptable because of the heterogeneity of preferences.

6. Conclusion

In this paper, we have investigated the prophylaxis of epidemic spreading from a normative point of view in a game-theoretic setting. Agents have the common objective to reduce the speed of propagation of an epidemic of the SI type through investments in the reduction of the contagiousness of network links. Despite this common objective, strategic behaviours and free-riding can lead to major inefficiencies. We have shown that the PoA can scale up linearly in our setting. This strongly calls for public intervention to reduce the speed of diffusion. In this respect, we have shown that a policy of uniform reduction of social interactions, akin to the social distancing measures enforced during the COVID-19 pandemic, can be ε-optimal in a wide range of networks. Such policies thus have strong normative foundations. Our results however assume that the cost of reducing interactions is uniform among agents. Further research is required to investigate to which extent one could relax this assumption. Indeed, it neglects the fact that certain actors might value more social interactions because of their economic, psychological, or social characteristics. Hence, the validity of this assumption strongly depends on the scope of the analysis: it is a much more benign approximation when the focus is on public health than in the case where economic and financial considerations ought to be taken into account. Additional results on the determination of the optimal level of social distancing would also be welcome. In practice, the level of social distancing has been determined according to policy decisions about the socially/economically acceptable rate of contagion, rather than inferred from individual preferences.

We have partly accounted for heterogeneity as far as the benefits of prophylaxis are concerned. In this respect, we have shown that allowing agents to subsidise investments in the reduction of contagiousness in distant parts of the network can be Pareto improving. This result calls for further research on the design of mechanisms to improve the efficiency of cooperation against epidemic spreading.

Finally, this preliminary paper does not account for the possibility of local virus elimination, through natural immunisation or vaccination. Individual strategies in this respect might strongly interact with network-based prophylactic strategies considered in this paper. This is of particular relevance in a context such as the one of the current COVID-19 pandemic, where availability of vaccines is likely to differ across locations. Further research is thus required to gain a broader understanding of individual and collective strategies when both social distancing and virus eradication can be, partially, implemented.

Declaration of Competing Interest

The authors declare that they have no known competing financial interests or personal relationships that could have appeared to influence the work reported in this paper.

Manuscript handled by Editor Aditya Goenka

Footnotes

Antoine Mandel acknowledges support from ITN ExSIDE European Union’s Horizon 2020 research and innovation programme under the Marie Sklodowska-Curie Grant Agreement No. 721846.

1

Stability must be understood in the sense that, for any initial non-null probability distribution, the limiting distribution of the Markov chain has full support on the full contamination state.

2

The notations for the partial derivatives of a symmetric matrix are given in Section 3.1.

3

This system has a closed-form solution that can be determined by elementary methods. However, its expression is too inconvenient to report it in full length here.

4

Proposition 4.3, Remark 4.1, Proposition 4.4 and discussions in between also extend to this case. We do not provide the details for sake of brevity.

Appendix.

A.1. Remark about notations

In the following to simplify notations, we use the contracted notation Ci,j(A,D,β,t¯,x0) instead of Ci,j(βt¯(AjNDj)diag(1x0))

A.2. Characterisation results for arbitrary initial contagion probabilities

The results of Section 4 on the characterisation of Nash equilibria and social optima extend to a setting with an arbitrary initial contagion probability vector. The proofs below are given in this extended setting in which our main results are stated as follows.4

Lemma A.1 Extension of Lemma 4.1

For every iN , for any strategy profile (Di,Di)S(A) , and for all k,N ,

Ui(,Di)d{k,}i(Di)=Ui(,Di)dk,i(Di)+Ui(,Di)d,ki(Di)=δiβt¯[Ci,k(A,D,β,t¯,x0)x0+Ci,(A,D,β,t¯,x0)x0k] (A.1)

and the marginal utility is non-negative. Moreover, the map Πi(,Di) is concave on Si(A,Di) .

Proposition A.1 Extension of Proposition 4.1

A strategy profile D¯K(A) is a Nash Equilibrium of the local game L(δ,A,β,t¯,x0,ρ) if and only if for all {k,}E , the following two conditions hold:

  • (1)
    One of the following alternative holds:
    • (a)
      ρ<maxi{k,}δiβt¯Ci,k(A,D¯,β,t¯,x0)x0+βt¯Ci,(A,D¯,β,t¯,x0)x0k and d¯{k,}k+d¯{k,}=a{k,} ,
    • (b)
      ρ>maxi{k,}δiβt¯Ci,k(A,D¯,β,t¯,x0)x0+βt¯Ci,(A,D¯,β,t¯,x0)x0k and d¯{k,}k=d¯{k,}=0 ,
    • (c)
      ρ=maxi{k,}δiβt¯Ci,k(A,D¯,β,t¯,x0)x0+βt¯Ci,(A,D¯,β,t¯,x0)x0k and d¯{k,}k+d¯{k,}[0,a{k,}] .
  • (2)
    For any iN , one has d¯{k,}i>0 only if
    δiβt¯Ci,k(A,D¯,β,t¯,x0)x0+βt¯Ci,(A,D¯,β,t¯,x0)x0kρ.

Proposition A.2 Extension of Proposition 4.2

A strategy profile DˇS(A) is a Nash Equilibrium of the global game G(δ,A,β,t¯,x0,ρ) if and only if for all {k,}E , the following two conditions hold:

  • (1)
    One of the following alternative holds:
    • (a)
      ρ<maxiNδiβt¯Ci,k(A,Dˇ,β,t¯,x0)x0+βt¯Ci,(A,Dˇ,β,t¯,x0)x0k and iNdˇ{k,}i=a{k,} ,
    • (b)
      ρ>maxiNδiβt¯Ci,k(A,Dˇ,β,t¯,x0)x0+βt¯Ci,(A,Dˇ,β,t¯,x0)x0k and iNdˇ{k,}i=0 ,
    • (c)
      ρ=maxiNδiβt¯Ci,k(A,Dˇ,β,t¯,x0)x0+βt¯Ci,(A,Dˇ,β,t¯,x0)x0k and iNdˇ{k,}i[0,a{k,}] .
  • (2)
    For any iN , one has dˇ{k,}i>0 only if
    δiβt¯Ci,k(A,Dˇ,β,t¯,x0)x0+βt¯Ci,(A,Dˇ,β,t¯,x0)x0kρ.

Proposition A.3 Extension of Proposition 4.5

A strategy profile DˆD(A) is a Social Optimum if and only if for all {k,}E , one of the following alternative holds:

  • (a)

    ρ<iNδiβt¯Ci,k(A,Dˆ,β,t¯,x0)x0+βt¯Ci,(A,Dˆ,β,t¯,x0)x0k and dˆ{k,}=a{k,l} ,

  • (b)

    ρ>iNδiβt¯Ci,k(A,Dˆ,β,t¯,x0)x0+βt¯Ci,(A,Dˆ,β,t¯,x0)x0k and dˆ{k,}=0 ,

  • (c)

    ρ=iNδiβt¯Ci,k(A,Dˆ,β,t¯,x0)x0+βt¯Ci,(A,Dˆ,β,t¯,x0)x0k and dˆ{k,}[0,a{k,l}] .

A.3. Proofs for Section 3.5

Proof of Theorem 3.1

We know from Remark 3.2 that the sets S(A) and K(A) of admissible strategies are compact and convex, and from Lemma 4.1 that the objective function Π is concave on Si(A,Di) and Ki(A,Di) with iN and Di(SN(R+))N1. Moreover, since Π is continuous in its arguments, we therefore conclude from Rosen (1965, Theorem 1) that a Nash Equilibrium exists.

A.4. Proofs for Section 4.1

Proof of Lemma 4.1

Let iN and (Di,Di) be a strategy profile in S(A). For k,N, one has

Ui(,Di)d{k,}i(Di)=δiei,βt¯exp(βt¯(AjN,jiDjDi)diag(1x0))(Iˆk,+Iˆ,k)x0,

where for any k,jN, Iˆk,j is the N-dimensional square matrix with null entries except on the kthrow and jthcolumn for which the entry is equal to one. This leads to Eq. (A.1). Moreover, for all k,,p,qN, we compute

Ui(,Di)dk,idp,qi(Di)=ei,(βt¯)2exp(βt¯(AjN,jiDjDi)diag(1x0))Iˆp,qdiag(1x0)Iˆk,x0=(βt¯)2exp(βt¯(AjN,jiDjDi)diag(1x0))i,p(1x0q)x0 if k=q0 otherwise.

Therefore the Hessian matrix of Ui(,Di) on Si(A,Di) is the matrix of a quadratic form that is negative semi-definite. The concavity property thus follows.

A.5. Proofs for Sections 4.24.3

Proof of Proposition 4.1

For 1iN, the optimisation programme for characterising the Nash Equilibria is written as

maxDiMNΠi(Di,D¯i) subject to: dk,i=d,ki,k,N,<k, (A.2)
dk,i=0,k,N,>k,k and i,dk,i0,k,N,>k,k or =i,(AD¯iDi)k,0,k,N,k. (A.3)

Applying the Karush–Kuhn–Tucker conditions, we obtain that D¯iKi(A,D¯i) is a solution if and only if, for any {k,}E, one of the following cases holds, assuming without loss of generality that Uk(,D¯k)d{k,}k(D¯k)U(,D¯)d{k,}(D¯):

  • (a)
    • (i)
      ρ<Uk(,D¯k)d{k,}k(D¯k) and d¯{k,}k+d¯{k,}=a{k,},
    • (ii)
      Uk(,D¯k)d{k,}k(D¯k)<ρ<U(,D¯)d{k,}(D¯) and d¯{k,}k=0, d¯{k,}=a{k,},
    • (iii)
      Uk(,D¯k)d{k,}k(D¯k)=ρ<U(,D¯)d{k,}(D¯) and d¯{k,}k[0,a{k,}], d¯{k,}=a{k,}d¯{k,}k,
  • (b)

    ρ>U(,D¯)d{k,}(D¯) and d¯{k,}k=d¯{k,}=0,

  • (c)
    • (i)
      Uk(,D¯k)d{k,}k(D¯k)<ρ=U(,D¯)d{k,}(D¯) and d¯{k,}k=0, d¯{k,}[0,a{k,}],
    • (ii)
      Uk(,D¯k)d{k,}k(D¯k)=ρ=U(,D¯)d{k,}(D¯) and 0d¯{k,}k+d¯{k,}a{k,}.

Proof of Proposition 4.2

For 1iN, the optimisation programme for characterising the Nash Equilibria is written as

maxDiMNΠi(Di,Dˇi) subject to: Condition (A.2)–(A.3),dk,i0,k,N,>k.

Applying the Karush–Kuhn–Tucker conditions, we obtain that DˇiSi(A,Dˇi) is a solution if and only if, for any {k,}E, one of the following cases holds:

  • (a)
    • (i)
      ρ<miniNUi(,Dˇi)d{k,}i(Dˇi) and qNdˇ{k,}q=a{k,},
    • (ii)
      there exists i,jN, such that Ui(,Dˇi)d{k,}i(Dˇi)<ρ<Uj(,Dˇj)d{k,}j(Dˇj) and dˇ{k,}q=0 for all qAi(Dˇ), qA¯j(Dˇ)dˇ{k,}q=a{k,}, where for a given h1,
      Ah(Dˇ):=1rN:Ur(,Dˇr)d{k,}r(Dˇr)Uh(,Dˇh)d{k,}h(Dˇh),
       and 
      A¯h(Dˇ):=1rN:Ur(,Dˇr)d{k,}r(Dˇr)Uh(,Dˇh)d{k,}h(Dˇh),
    • (iii)
      there exist i,jN, such that Ui(,Dˇi)d{k,}i(Dˇi)=ρ<Uj(,Dˇj)d{k,}j(Dˇj) and 0qAˆi(Dˇ)dˇ{k,}qa{k,}, dˇ{k,}q=0 for all qA¯i(Dˇ)c, qA¯j(Dˇ)dˇ{k,}q=a{k,}qAˆi(Dˇ)dˇ{k,}q, where for a given h1,
      Aˆh(Dˇ):=1rN:Ur(,Dˇr)d{k,}r(Dˇr)=Uh(,Dˇh)d{k,}h(Dˇh),
  • (b)

    ρ>maxiNUi(,Dˇi)d{k,}i(Dˇi) and qNdˇ{k,}q=0,

  • (c)

    there exist jN, such that ρ=Uj(,Dˇj)d{k,}j(Dˇj) and dˇ{k,}q=0 for all qA¯j(Dˇ)c, 0qAˆj(Dˇ)dˇ{k,}qa{k,}.

Proof of Proposition 4.5

For 1iN, the optimisation programme for characterising the Social Optima is written as

maxDMNΠˆ(D) subject to: dk,=d,k,k,N,<k,dk,0,k,N,>k,(AD)k,0,k,N,k.

The proof is then a straightforward adaptation of the proof of Proposition 4.1, Proposition 4.2.

A.6. Proofs for Section 4.4

We first note that we have an exact counterpart of Lemma 4.1 for the auxiliary utility function vˆi used in the definition of the social optimum. Namely, one has:

Lemma A.2

For every iN , for any Social Optimum DD(A) , and for all k,N , one has:

vˆi(D)d{k,}=δiαβt¯Ci,k[(1α)βt¯(AD)]+Ci,[(1α)βt¯(AD)]0.

Moreover, the map vˆi() is concave on D(A) .

We then proceed with the proofs of Theorem 4.1, Theorem 4.1.

Proof of Theorem 4.1

It follows from the assumption on Dˇ that for all iN,

k,NkUi(,Dˇi)d{k,}i(Dˇi)N(N1)ρ. (A.4)

Therefore appealing to Eq. (4.2) and Eq. (A.4), we obtain

iNΠi(Dˇi,Dˇi)=iNUi(Dˇi,Dˇi)ρ1iNDˇi1=12(N1)βt¯(1α)×iNk,NkUi(,Dˇi)d{k,}i(Dˇi)ρ1iNDˇi1ρN22βt¯(1α)+1iNDˇi1. (A.5)

Similarly, it follows from the assumption on Dˆ that it is such that for all k,N,k,

iNvˆi(Dˆ)d{k,}ρ. (A.6)

We deduce from Eq. (4.3) and Eq. (A.6),

Πˆ(Dˆ)=iNvˆi(Dˆ)ρ1Dˆ1=12(N1)βt¯(1α)iNk,Nkvˆi(Dˆ)d{k,}ρ1Dˆ1ρN2βt¯(1α)+1Dˆ1. (A.7)

Combining Eq. (A.5), (A.7) and using Eq. (3.8), we obtain the result.

Proof of Theorem 4.2

We know from Eq. (A.1) that for all i,k,N,

Ui(,D¯i)d{k,}i(D¯i)=αβt¯δi[Ci,k(A,D¯,β,t¯,x0)+Ci,(A,D¯,β,t¯,x0)]. (A.8)

Therefore, it follows from the assumption on D¯ that for all i,N,i,

Ui(,D¯i)d{i,}i(D¯i)=αδiβt¯[Ci,i(A,D¯,β,t¯,x0)+Ci,(A,D¯,β,t¯,x0)]ρ. (A.9)

Hence Eqs. (A.8)(A.9) give that for all distinct i,k,N,

Ui(,D¯i)d{k,}i(D¯i)ρ+αδiβt¯[Ci,k(A,D¯,β,t¯,x0)Ci,i(A,D¯,β,t¯,x0)] (A.10)
2[ραδiβt¯Ci,i(A,D¯,β,t¯,x0)]. (A.11)

We deduce from Eqs. (A.10)(A.11) that for all iN,

k,NkUi(,D¯i)d{k,}i(D¯i)=NiUi(,D¯i)d{i,}i(D¯i)+kNkiUi(,D¯i)d{k,i}i(D¯i)+k,Nkk,iUi(,D¯i)d{k,}i(D¯i)N(N1)ρ+(N2)αδiβt¯kN,ki(Ci,k()Ci,i())(A,D¯,β,t¯,x0)2(N1)[(N1)ρ(N2)αδiβt¯Ci,i(A,D¯,β,t¯,x0)]. (A.12)

In particular, we observe from the non-decreasing property of marginal utilities (recall Lemma 4.1), that for all iN,

ρ+αδiβt¯[Ci,k()Ci,i()](A,D¯,β,t¯,x0)0kN,ki, and ραδiβt¯Ci,i(A,D¯,β,t¯,x0)0.

Finally, after appealing to Eq. (4.2) and Eq. (A.12), we obtain

iNΠi(D¯i,D¯i)=iNUi(D¯i,D¯i)ρ1iND¯i1=12(N1)βt¯(1α)iNk,NkUi(,D¯i)d{k,}i(D¯i)ρ1iND¯i112βt¯(1α)N2ρ+(N2)α(N1)iNKi(δi,A,D¯,D¯,β,t¯,x0)ρ1iND¯i1.

Appealing to Eq. (A.7) and Eq. (3.7), the result follows.

A.7. Proofs for Section 4.5

Proof of Proposition 4.7

According to Example 4.1, under the holding assumptions, Dˇ is a local Homogeneous Interior Equilibrium which yields an equilibrium network of the form given by Identity (4.5). More precisely, for all distinct i,k,N,

Ui(,Dˇi)d{i,}i(Dˇi)=δβt¯α2χ(h)exp(h)=ρ and Ui(,Dˇi)d{k,}i(Dˇi)=ρδβt¯αexp(h).

In particular, it follows from the non-decreasing property of marginal utilities (recall Lemma 4.1) that ρδβt¯αexp(h)0. It is then straightforward to check that

iNΠi(Dˇi,Dˇi)=N2ρ2βt¯(1α)+N(N2)δαexp(h)2(1α)ρ1iNDˇi1.

On the other hand, one can assume without loss of generality that Dˆ is of the form (recall the discussion after Proposition 4.6)

Dˆ:=0dˆdˆdˆdˆdˆdˆ0, for some dˆ0.

The proof is thus concluded proceeding as in the proof of Theorem 4.1 to prove Eq. (A.7), and recalling Eq. (3.8).

Proof of Remark 4.2

We first restrict our attention to the setting where each agent is constrained to use the same action on each link to a neighbour of a given type (i.e. bridge or non-bridge). We denote the corresponding strategy space as Sb for a bridge node and Sn for a non-bridge node. Then, following Hefti (2017), we consider the mapping ϕ=(ϕb,ϕn)):Sb×SnSb×Sn, which associates to a pair of strategy (sb,sn) the best-response of bridge ϕb(sb,sn) and non-bridge ϕn(sb,sn) players, assuming that all bridge players play sb and all non-bridge players play sn. It is straightforward to check that one can apply Kakutani fixed-point theorem in this setting and thus find that ϕ has a fixed point (sb,sn). For a bridge player, sb is a best-response to the strategy profile induced by (sb,sn) in the game where its strategy space is Sb. Assume it is not a best-response in the original strategy space. Then, using the convexity of the best-response and the symmetry properties of the game, one can construct, via an appropriate convex-combination, a best-response that actually is in Sb. This yields a contradiction. Thus sb is a best-response in the original game. We show accordingly that the symmetric strategy profile induced by (sb,sn) is an equilibrium of the original game.

A.8. Proofs for Section 5

The proof of Proposition 5.1 relies on the following lemma that states that for large t¯ and homogeneous initial contagion probabilities, the utility can be approximated through the eigenvector centrality of the contagion network.

Lemma A.3

Consider an (α) -Homogeneous Game, and let DS(A) be such that AiNDi is irreducible and aperiodic. Let then μ1 denote the Perron–Frobenius eigenvalue of (AiNDi) , |μ1μ2| the spectral gap and v the normalised eigenvector associated to μ1 , corresponding to the eigenvector centrality of the network. One has

expβt¯(1α)(AiNDi)=1+O(exp(βt¯(1α)|μ1μ2|))exp(βt¯(1α)μ1)vv.

The proof of Lemma A.3 follows from the spectral decomposition of AiNDi and a direct application of the Perron–Frobenius theorem (see Lee et al. (2019, Appendix C) for details). We furthermore have the following remark.

Remark A.1

As A is irreducible and aperiodic, the condition iNdj,ki<aj,k for all j,kN such that aj,k>0, is sufficient for getting the irreducibility and aperiodicity of AiNDi.

The proof of Proposition 5.1 follows.

Proof of Proposition 5.1

Let us first remark that in the case where 2δβt¯αρ, one can check that Dˆ=A is a Social Optimum. This amounts to saying that Q(A,0) is optimal and thus allows to conclude. We now consider the case where 2δβt¯α<ρ. One can easily check that for every t¯>0 one can find 2δβt¯α<ρ2δβt¯αexp(βt¯(1α)×miniNkNai,k) such that there exists 0<κ¯miniNkNai,k satisfying

2δβt¯αexp(βt¯(1α)κ¯)=ρ. (A.13)

Let us then recall that for any κ0, and k,N,

Πˆd{k,}(AQ(A,κ))=iNδβt¯αexpβt¯(1α)Q(A,κ)i,k+iNδβt¯αexpβt¯(1α)Q(A,κ)i,ρ.

Now, it is straightforward to check that, for κ>0, the largest eigenvalue of Q(A,κ) is μ1κ. According to the Perron–Frobenius theorem, this largest eigenvalue is simple. Furthermore, the associated normalised eigenvector is v=(1N)1. Thus, applying Lemma A.3, one gets

expβt¯(1α)Q(A,κ)=exp(βt¯(1α)κ)V1+Oexp(β(1α)|μ1μ2|t¯),

where Vvv and μ2 denotes the second largest eigenvalue in module.

One shall then notice that for all i,jN, (V)i,j=1N, so that

Πˆd{k,}(AQ(A,κ))=2δβt¯αexp(βt¯(1α)κ)×1+Oexp(β(1α)|μ1μ2|t¯)ρ.

Noting that, all the other parameters being fixed, the spectral gap |μ1μ2|t¯ is increasing with respect to t¯ and κ, one can assume that for every ε>0, there exists T¯>0 such that for t¯T¯,

2δβt¯αexp(βt¯(1α)κ)1+Oexp(β(1α)|μ1μ2|t¯)2δβt¯αexp(βt¯(1α)κ)(1+ερA),

for all κ>0. Combining the latter with Eq. (A.13), one concludes that Q(A,κ¯) is an approximate critical point in the sense that for all {k,}E,

|Πˆd{k,}(AQ(A,κ¯))|εA. (A.14)

Furthermore, if Dˆ denotes the Social Optimum, one has by construction

AQ(A,κ¯)DˆA. (A.15)

Now, Πˆ being continuous and differentiable, one gets through the mean value theorem

|Πˆ(AQ(A,κ¯))Πˆ(Dˆ)||Πˆd{k,}(AQ(A,κ¯))|×AQ(A,κ¯)Dˆ,

leading, using Eqs. (A.14), (A.15), to the required result

|Πˆ(AQ(A,κ¯))Πˆ(Dˆ)|ε.

Proof of Proposition 5.2

We assume without loss of generality that i=1. By concavity of Π1 the set of local optima is convex. Moreover, given the asymmetry of the game (involving only player 1), the set of local optima shall be invariant by the permutation of nodes leaving node 1 invariant. Thus, the average of all locally optimal profiles is locally optimal. We let D¯ be such optimum. It is, in particular, such that there exists h[0,a] such that for all 1<jN,d¯1,j=d¯j,1=h. For 1jN, C1,j(A,D¯,β,t¯,x0) is of the form

δ1βt¯α(exp(H¯))1,j,

where H¯ is written as

H¯:=0μμμ0000μ000 with μβt¯(1α)(ah).

Using a Taylor expansion, we obtain that

(exp(H¯))1,1=k012k!(N1)kμ2k=cosh(N1μ),

while for 1<jN,

(exp(H¯))1,j=k01(2k+1)!(N1)kμ2k+1=sinh(N1μ)N1.

Hence, in view of the assumption on ρ, D¯ is a Homogeneous Interior Equilibrium. Moreover, global strategies dominate local ones if and only if for some 1<jN, C1,j(A,D¯,β,t¯,x0)>C1,1(A,D¯,β,t¯,x0) and thus if

sinh(N1μ)>N1cosh(N1μ).

References

  1. Acemoglu, D., Chernozhukov, V., Werning, I., Whinston, M.D., 2020. Optimal targeted lockdowns in a multi-group SIR model. NBER Working Paper, 27102.
  2. Allouch N. On the private provision of public goods on networks. J. Econom. Theory. 2015;157:527–552. [Google Scholar]
  3. Anshelevich E., Dasgupta A., Kleinberg J., Tardos E., Wexler T., Roughgarden T. The price of stability for network design with fair cost allocation. SIAM J. Comput. 2008;38(4):1602–1623. [Google Scholar]
  4. Ballester C., Calvó-Armengol A., Zenou Y. Who’s who in networks. Wanted: The key player. Econometrica. 2006;74(5):1403–1417. [Google Scholar]
  5. Bayham J., Kuminoff N.V., Gunn Q., Fenichel E.P. Measured voluntary avoidance behaviour during the 2009 a/H1n1 epidemic. Proc. R Soc. B. 2015;282(1818) doi: 10.1098/rspb.2015.0814. [DOI] [PMC free article] [PubMed] [Google Scholar]
  6. Benzi M., Klymko C. Total communicability as a centrality measure. J. Complex Netw. 2013;1(2):124–149. [Google Scholar]
  7. Benzi M., Klymko C. On the limiting behavior of parameter-dependent network centrality measures. SIAM J. Matrix Anal. Appl. 2015;36(2):686–706. [Google Scholar]
  8. Bonacich P. Power and centrality: A family of measures. Am. J. Sociol. 1987;92(5):1170–1182. [Google Scholar]
  9. Bramoullé Y., Kranton R. Public goods in networks. J. Econom. Theory. 2007;135(1):478–494. [Google Scholar]
  10. Bravard C., Charroin L., Touati C. Optimal design and defense of networks under link attacks. J. Math. Econom. 2017;68:62–79. [Google Scholar]
  11. Canright G.S., Engø-Monsen K. Spreading on networks: a topographic view. Complexus. 2006;3(1–3):131–146. [Google Scholar]
  12. Chakrabarti D., Wang Y., Wang C., Leskovec J., Faloutsos C. Epidemic thresholds in real networks. ACM Trans. Inf. Syst. Secur. 2008;10(4):1. [Google Scholar]
  13. Chen C., Tong H., Prakash B.A., Eliassi-Rad T., Faloutsos M., Faloutsos C. Eigen-optimization on large graphs by edge manipulation. ACM Trans. Knowl. Discov. Data. 2016;10(4):49. [Google Scholar]
  14. Chen C., Tong H., Prakash B.A., Tsourakakis C.E., Eliassi-Rad T., Faloutsos C., Chau D.H. Node immunization on large graphs: Theory and algorithms. IEEE Trans. Knowl. Data Eng. 2015;28(1):113–126. [Google Scholar]
  15. Cheng, S.-F., Reeves, D.M., Vorobeychik, Y., Wellman, M.P., 2004. Notes on equilibria in symmetric games. In: Proceedings of the 6th International Workshop on Game Theoretic and Decision Theoretic Agents GTDT 2004. 71-78. Research Collection School of Information Systems.
  16. Colizza V., Barrat A., Barthélemy M., Vespignani A. The role of the airline transportation network in the prediction and predictability of global epidemics. Proc. Natl. Acad. Sci. 2006;103(7):2015–2020. doi: 10.1073/pnas.0510525103. [DOI] [PMC free article] [PubMed] [Google Scholar]
  17. Draief M., Ganesh A., Massoulié L. Proceedings of the 1st International Conference on Performance Evaluation Methodologies and Tools. ACM; 2006. Thresholds for virus spread on networks; p. 51. [Google Scholar]
  18. Eichenbaum M.S., Rebelo S., Trabandt M. National Bureau of Economic Research; 2020. The Macroeconomics of Epidemics: Technical report. [Google Scholar]
  19. Elliott M., Golub B. A network approach to public goods. J. Political Econ. 2019;127(2):730–776. [Google Scholar]
  20. Estrada E., Hatano N. Communicability in complex networks. Phys. Rev. E. 2008;77(3) doi: 10.1103/PhysRevE.77.036111. [DOI] [PubMed] [Google Scholar]
  21. Estrada E., Higham D.J. Network properties revealed through matrix functions. SIAM Rev. 2010;52(4):696–714. [Google Scholar]
  22. Fabrikant, A., Luthra, A., Maneva, E., Papadimitriou, C.H., Shenker, S., 2003. On a network creation game. In: Proceedings of the Twenty-Second Annual Symposium on Principles of Distributed Computing, pp. 347–351.
  23. Farboodi M., Jarosch G., Shimer R. National Bureau of Economic Research; 2020. Internal and External Effects of Social Distancing in a Pandemic: Technical report. [Google Scholar]
  24. Ganesh A., Massoulié L., Towsley D. Proceedings IEEE 24th Annual Joint Conference of the IEEE COmputer and Communications Societies, vol. 2. IEEE; 2005. The effect of network topology on the spread of epidemics; pp. 1455–1466. [Google Scholar]
  25. Garibaldi P., Moen E.R., Pissarides C.A. Covid Economics Vetted and Real-Time Papers, CEPR. 2020. Modelling contacts and transitions in the SIR epidemics model. [Google Scholar]
  26. Geoffard P.-Y., Philipson T. Rational epidemics and their public control. Internat. Econom. Rev. 1996:603–624. [Google Scholar]
  27. Gersovitz M., Hammer J.S. The economical control of infectious diseases. Econ. J. 2004;114(492):1–27. [Google Scholar]
  28. Goenka A., Liu L. Infectious diseases and endogenous fluctuations. Econom. Theory. 2012;50(1):125–149. [Google Scholar]
  29. Goenka A., Liu L. Infectious diseases, human capital and economic growth. Econom. Theory. 2019:1–47. [Google Scholar]
  30. Goenka A., Liu L., Nguyen M.-H. Infectious diseases and economic growth. J. Math. Econom. 2014;50:34–53. [Google Scholar]
  31. Goyal S., Vigier A. Interaction, protection and epidemics. J. Public Econ. 2015;125:64–69. [Google Scholar]
  32. Hayel Y., Trajanovski S., Altman E., Wang H., Van Mieghem P. 53rd IEEE Conference on Decision and Control. IEEE; 2014. Complete game-theoretic characterization of SIS epidemics protection strategies; pp. 1179–1184. [Google Scholar]
  33. Hefti A. Equilibria in symmetric games: Theory and applications. Theor. Econ. 2017;12(3):979–1002. [Google Scholar]
  34. Holme P., Kim B.J., Yoon C.N., Han S.K. Attack vulnerability of complex networks. Phys. Rev. E. 2002;65(5) doi: 10.1103/PhysRevE.65.056109. [DOI] [PubMed] [Google Scholar]
  35. Jones C.J., Philippon T., Venkateswaran V. National Bureau of Economic Research; 2020. Optimal Mitigation Policies in a Pandemic: social Distancing and Working from Home: Technical report. [Google Scholar]
  36. Katz L. A new status index derived from sociometric analysis. Psychometrika. 1953;18(1):39–43. [Google Scholar]
  37. Kinateder M., Merlino L.P. Public goods in endogenous networks. Am. Econ. J. Microecon. 2017;9(3):187–212. [Google Scholar]
  38. Lee C.-H., Tenneti S., Eun D.Y. 2019. Transient dynamics of epidemic spreading and its mitigation on large networks. arXiv preprint arXiv:1903.00167. [Google Scholar]
  39. Mei W., Mohagheghi S., Zampieri S., Bullo F. On the dynamics of deterministic epidemic propagation over networks. Annu. Rev. Control. 2017;44:116–128. [Google Scholar]
  40. Newman M. Oxford university press; 2010. Networks: An Introduction. [Google Scholar]
  41. Nisan N., Roughgarden T., Tardos E., Vazirani V.V. Cambridge university press; 2007. Algorithmic Game Theory. [Google Scholar]
  42. Omic J., Orda A., Van Mieghem P. IEEE INFOCOM 2009. IEEE; 2009. Protecting against network infections: A game theoretic perspective; pp. 1485–1493. [Google Scholar]
  43. Papadimitriou C.H. International Colloquium on Automata, Languages, and Programming. Springer; 2001. Algorithms, games, and the internet; pp. 1–3. [Google Scholar]
  44. Pastor-Satorras R., Castellano C., Van Mieghem P., Vespignani A. Epidemic processes in complex networks. Rev. Modern Phys. 2015;87(3):925. [Google Scholar]
  45. Pastor-Satorras R., Vespignani A. Epidemic spreading in scale-free networks. Phys. Rev. Lett. 2001;86(14):3200. doi: 10.1103/PhysRevLett.86.3200. [DOI] [PubMed] [Google Scholar]
  46. Prakash B.A., Chakrabarti D., Valler N.C., Faloutsos M., Faloutsos C. Threshold conditions for arbitrary cascade models on arbitrary networks. Knowl. Inf. Syst. 2012;33(3):549–575. [Google Scholar]
  47. Preciado V.M., Zargham M., Enyioha C., Jadbabaie A., Pappas G. 52nd IEEE Conference on Decision and Control. IEEE; 2013. Optimal vaccine allocation to control epidemic outbreaks in arbitrary networks; pp. 7486–7491. [Google Scholar]
  48. Preciado V.M., Zargham M., Enyioha C., Jadbabaie A., Pappas G.J. Optimal resource allocation for network protection against spreading processes. IEEE Trans. Control. Netw. Syst. 2014;1(1):99–108. [Google Scholar]
  49. Rosen J.B. Existence and uniqueness of equilibrium points for concave N-person games. Econometrica. 1965;33(3):520–534. [Google Scholar]
  50. Roughgarden T., Tardos É. How bad is selfish routing? J. ACM. 2002;49(2):236–259. [Google Scholar]
  51. Ruhi N.A., Ahn H.J., Hassibi B. 2016. Analysis of exact and approximated epidemic models over complex networks. arXiv preprint arXiv:1609.09565. [Google Scholar]
  52. Saha S., Adiga A., Prakash B.A., Vullikanti A.K.S. Proceedings of the 2015 SIAM INternational Conference on Data Mining. SIAM; 2015. Approximation algorithms for reducing the spectral radius to control epidemic spread; pp. 568–576. [Google Scholar]
  53. Schneider C.M., Mihaljev T., Havlin S., Herrmann H.J. Suppressing epidemics with a limited amount of immunization units. Phys. Rev. E. 2011;84(6) doi: 10.1103/PhysRevE.84.061911. [DOI] [PubMed] [Google Scholar]
  54. Van Mieghem P. 2013. Decay towards the overall-healthy state in SIS epidemics on networks. arXiv preprint arXiv:1310.3980. [Google Scholar]
  55. Van Mieghem P. 2014. Exact Markovian SIR and SIS epidemics on networks and an upper bound for the epidemic threshold. arXiv preprint arXiv:1402.1731. [Google Scholar]
  56. Van Mieghem P., Omic J. Delft University of Technology; 2008. In-homogeneous Virus Spread in Networks: Technical report. [Google Scholar]
  57. Van Mieghem P., Omic J., Kooij R. Virus spread in networks. IEEE/ACM Trans. Netw. 2009;17(1):1–14. [Google Scholar]
  58. Van Mieghem P., Stevanović D., Kuipers F., Li C., Van De Bovenkamp R., Liu D., Wang H. Decreasing the spectral radius of a graph by link removals. Phys. Rev. E. 2011;84(1) doi: 10.1103/PhysRevE.84.016101. [DOI] [PubMed] [Google Scholar]
  59. Wang Y., Chakrabarti D., Wang C., Faloutsos C. 22nd International Symposium on Reliable Distributed Systems, 2003. Proceedings. IEEE; 2003. Epidemic spreading in real networks: An eigenvalue viewpoint; pp. 25–34. [Google Scholar]
  60. Young H.P. Innovation diffusion in heterogeneous populations: Contagion, social influence, and social learning. Am. Econ. Rev. 2009;99(5):1899–1924. [Google Scholar]

Articles from Journal of Mathematical Economics are provided here courtesy of Elsevier

RESOURCES