170 research outputs found

    Naval Strategy and National Security

    Get PDF

    Fortune Favours the Bold: An Agent-Based Model Reveals Adaptive Advantages of Overconfidence in War

    Get PDF
    Overconfidence has long been considered a cause of war. Like other decision-making biases, overconfidence seems detrimental because it increases the frequency and costs of fighting. However, evolutionary biologists have proposed that overconfidence may also confer adaptive advantages: increasing ambition, resolve, persistence, bluffing opponents, and winning net payoffs from risky opportunities despite occasional failures. We report the results of an agent-based model of inter-state conflict, which allows us to evaluate the performance of different strategies in competition with each other. Counter-intuitively, we find that overconfident states predominate in the population at the expense of unbiased or underconfident states. Overconfident states win because: (1) they are more likely to accumulate resources from frequent attempts at conquest; (2) they are more likely to gang up on weak states, forcing victims to split their defences; and (3) when the decision threshold for attacking requires an overwhelming asymmetry of power, unbiased and underconfident states shirk many conflicts they are actually likely to win. These “adaptive advantages” of overconfidence may, via selection effects, learning, or evolved psychology, have spread and become entrenched among modern states, organizations and decision-makers. This would help to explain the frequent association of overconfidence and war, even if it no longer brings benefits today

    Reviews

    Full text link

    On the Probability of Predicting and Mapping Traditional Warfare Measurements to the Cyber Warfare Domain

    Full text link
    Part 3: Peace, War, Cyber-Security and ICTInternational audienceCyber warfare is a contentious topic, with no agreement on whether this is a real possibility or an unrealistic extension of the physical battlefield. This article will not debate the validity and legality of the concept of cyber warfare, but will assume its existence based on prior research. To that end the article will examine research available on traditional warfare causes, elements and measurement techniques. This is done to examine the possibility of mapping traditional warfare measurements to cyber warfare. This article aims to provide evidence towards the probability of predicting and mapping traditional warfare measurements to the cyber warfare domain. Currently the only way of cyber warfare measurement is located in traditional information security techniques, but these measurements often do not adequately describe the extent of the cyber domain. Therefore, this paper aims to identify a set of criteria to aid in the prediction of cyber warfare probability
    • 

    corecore