360,494 research outputs found

    Teoriogrowe modele bezpieczeństwa narodowego – podstawowe zagadnienia i przykłady

    Get PDF
    The article is a brief introduction to the use of game theory models in studies of national security. It is divided into four parts. The first part discusses basic theoretical issues, i.e. the division of game theory into analytical and behavioural, the concept of the rationality of players, the assumption that the rationality of players is common knowledge, the Nash equilibrium, Pareto efficiency and the classification of games. The second part briefly describes the evolution of game theory analyses in national security. Attention is drawn to the relationship between the development of game theory and military requirements. The third part provides an example of how game theory models can be used in national security studies. Trade relations, which adopt the schema of interactions of the prisoner’s dilemma, are discussed in detail. During the analysis, the general model of the prisoner’s dilemma, the initial game defining the problem under consideration, and its solutions in the form of an iterated game and metagame are presented. The entire discussion concludes with a summary. The analyses indicate the following advantages of the application of game theory models to the study of national security: 1) game theory models significantly simplify the analysed interactions, thus, allowing to penetrate the processes, bringing out features and relations which have hitherto escaped researchers; 2) the application of game theory models does not require researchers to be familiar with complex mathematical formalisms; 3) game theory models enable the identification of social dilemmas, i.e. situations where the short-term interests of an individual are at odds with the long-term interests of society

    Trees with an On-Line Degree Ramsey Number of Four

    Get PDF
    On-line Ramsey theory studies a graph-building game between two players. The player called Builder builds edges one at a time, and the player called Painter paints each new edge red or blue after it is built. The graph constructed is called the background graph. Builder's goal is to cause the background graph to contain a monochromatic copy of a given goal graph, and Painter's goal is to prevent this. In the S[subscript k]-game variant of the typical game, the background graph is constrained to have maximum degree no greater than k. The on-line degree Ramsey number [˚over R][subscript Δ](G) of a graph G is the minimum k such that Builder wins an S[subscript k]-game in which G is the goal graph. Butterfield et al. previously determined all graphs G satisfying [˚ over R][subscript Δ](G)≤3. We provide a complete classification of trees T satisfying [˚ over R][subscript Δ](T)=4.National Science Foundation (U.S.) (Grant DMS-0754106)United States. National Security Agency (Grant H98230-06-1-0013

    Optimal IS Security Investment: Cyber Terrorism vs. Common Hacking

    Get PDF
    Proper investment in information systems security can protect national critical information systems. This research compares the optimal investment decision for organizations to protect themselves from common hackers and from cyber terrorists. A two-stage stochastic game model is proposed to model cyber terrorism activities as well as common hacking activities. The results of our specific simulation indicate that an optimal investment exists for games such as cyber crimes, and that the potential maximum loss to organizations from cyber terrorism is about fifty times more than from common hackers. This research can also be generalized to other practical fields such as financial fraud prevention. To the best of our knowledge, our approach is a novel approach that combines economic theory, deterrence theory, and IS security to explore the cyber terrorism problem

    Computable Rationality, NUTS, and the Nuclear Leviathan

    Get PDF
    This paper explores how the Leviathan that projects power through nuclear arms exercises a unique nuclearized sovereignty. In the case of nuclear superpowers, this sovereignty extends to wielding the power to destroy human civilization as we know it across the globe. Nuclearized sovereignty depends on a hybrid form of power encompassing human decision-makers in a hierarchical chain of command, and all of the technical and computerized functions necessary to maintain command and control at every moment of the sovereign's existence: this sovereign power cannot sleep. This article analyzes how the form of rationality that informs this hybrid exercise of power historically developed to be computable. By definition, computable rationality must be able to function without any intelligible grasp of the context or the comprehensive significance of decision-making outcomes. Thus, maintaining nuclearized sovereignty necessarily must be able to execute momentous life and death decisions without the type of sentience we usually associate with ethical individual and collective decisions

    Model of cybersecurity means financing with the procedure of additional data obtaining by the protection side

    Get PDF
    The article describes the model of cybersecurity means financing strategies of the information object with incomplete information about the financial resources of the attacking side. The proposed model is the core of the module of the developed decision support system in the problems of choosing rational investing variants for information protection and cybersecurity of various information objects. The model allows to find financial solutions using the tools of the theory of multistep games with several terminal surfaces. The authors proposed an approach that allows information security management to make a preliminary assessment of strategies for financing the effective cybersecurity systems. The model is distinguished by the assumption that the protection side does not have complete information, both about the financing strategies of the attacking side, and about its financial resources state aimed at overcoming cybersecurity lines of the information object. At the same time, the protection side has the opportunity to obtain additional information by the part of its financial resources. This makes it possible for the protection side to obtain a positive result for itself in the case when it can not be received without this procedure. The solution was found using a mathematical apparatus of a nonlinear multistep quality game with several terminal surfaces with alternate moves. In order to verify the adequacy of the model there was implemented a multivariate computational experiment. The results of this experiment are described in the article. © 2005 - ongoing JATIT & LL

    Bad Data Injection Attack and Defense in Electricity Market using Game Theory Study

    Full text link
    Applications of cyber technologies improve the quality of monitoring and decision making in smart grid. These cyber technologies are vulnerable to malicious attacks, and compromising them can have serious technical and economical problems. This paper specifies the effect of compromising each measurement on the price of electricity, so that the attacker is able to change the prices in the desired direction (increasing or decreasing). Attacking and defending all measurements are impossible for the attacker and defender, respectively. This situation is modeled as a zero sum game between the attacker and defender. The game defines the proportion of times that the attacker and defender like to attack and defend different measurements, respectively. From the simulation results based on the PJM 5 Bus test system, we can show the effectiveness and properties of the studied game.Comment: To appear in IEEE Transactions on Smart Grid, Special Issue on Cyber, Physical, and System Security for Smart Gri
    corecore