Filters








74 Hits in 7.2 sec

A Socio-Technical Approach to Understanding Perceptions of Trustworthiness in Virtual Organizations [chapter]

Shuyuan Mary Ho
2009 Social Computing and Behavioral Modeling  
This paper presents a socio-technical study about perceptions of human trustworthiness as a key component for countering insider threats in virtual collaborative context.  ...  Four sets of experimental situations are created to test hypotheses.  ...  While data collection for the insider threats problem is a challenge, the "Leader's Dilemma" game creates and simulates this complicated situation in an online environment.  ... 
doi:10.1007/978-1-4419-0056-2_15 fatcat:gdexgm4lnfg47psjryrcb6ps6q

Game theoretical modelling of network/cybersecurity

Azhar Iqbal, Lachlan Gunn, Mingyu Guo, M. Ali Babar, Derek Abbott
2019 IEEE Access  
Game theory is an established branch of mathematics that offers a rich set of mathematical tools for multi-person strategic decision making that can be used to model the interactions of decision makers  ...  in security problems who compete for limited and shared resources.  ...  In a cyber attack when a NE is determined for a team of defenders, neither is left with any motivation to deviate unilaterally from it. 2) PRISONERS' DILEMMA The game of Prisoners' Dilemma (PD) [7]  ... 
doi:10.1109/access.2019.2948356 fatcat:s7kkibuduvh3nbfaved532x3jy

A Game-Theoretic Taxonomy and Survey of Defensive Deception for Cybersecurity and Privacy [article]

Jeffrey Pawlick, Edward Colbert, Quanyan Zhu
2019 arXiv   pre-print
In this paper, we survey 24 articles from 2008-2018 that use game theory to model defensive deception for cybersecurity and privacy.  ...  Our aims are to rigorously define types of defensive deception, to capture a snapshot of the state of the literature, to provide a menu of models which can be used for applied research, and to identify  ...  An attacker who may be located either outside or inside the network attempts to gain access. The network designer is able to place a limited number of IDS. The design problem is where to place them.  ... 
arXiv:1712.05441v3 fatcat:baizt74d2fg37flf57u6e6i25q

6. Applying game theory for adversarial risk analysis in chemical plants [chapter]

Laobing Zhang, Genserik Reniers, Genserik Reniers, Nima Khakzad, Pieter Van Gelder
2017 Security Risk Assessment  
Four models are proposed: i) DAMS -an agent-based modelling and simulation approach for assessing domino effects in chemical plants; ii) CPP game -a game theoretic model for single plant protection; iii  ...  Process plants usually store dangerous goods in large quantities, which may pose an important threat to themselves as well as to their surroundings.  ...  Hence, for cyber security new models are needed. Also, the exit procedure of an intrusion attack is not considered, which in case of a thief threat can be quite important.  ... 
doi:10.1515/9783110499087-006 fatcat:jya2tie5afgkhjde2q2o2ja4v4

Inadvertent escalation in the age of intelligence machines: A new model for nuclear risk in the digital age

James Johnson
2021 European Journal of International Security  
In this way, it addresses a gap in the literature about the strategic and theoretical implications of the AI-nuclear dilemma.  ...  It unpacks the psychological and cognitive features of escalation theorising (the security dilemma, the 'fog of war', and military doctrine and strategy) to examine whether and how the characteristics  ...  The authors would like to thank Matthew Bunn, Andrew Futter, Michael Smith, Benjamin Zala, and the anonymous reviewers for comments and feedback on the draft of this article.  ... 
doi:10.1017/eis.2021.23 fatcat:jpxa2bco7fg7bdfaj2mmxwfpbe

Digital innovation in platform-based ecosystems

Thierry Isckia, Mark de Reuver, Denis Lescop
2018 Proceedings of the 10th International Conference on Management of Digital EcoSystems - MEDES '18  
Creating a digital platform to leverage the potential of an ecosystem is recognized as an effective strategy to optimize innovation efforts in the digital era.  ...  We apply a life-cycle perspective, analyzing how the relationships between platform design, value creation and knowledge are dynamically aligned.  ...  In this case, the platform was designed as an engine for growth to full BizDev since the two groups were already on board.  ... 
doi:10.1145/3281375.3281377 dblp:conf/medes/IsckiaRL18 fatcat:mvberxwobjalpc3l6iby365uu4

The British Superpower, Irregular Warfare, and Military Honor

T.J. Linzy
2018 MCU Journal  
ARTICLE SUBMISSIONS The editors are looking for academic articles in the areas of international relations, geopolitical issues, national security and policy, and cyber security.  ...  To submit an article or to learn more about our submission guidelines, please email MCU_Press@usmcu.edu. BOOK REVIEWS Send an email with a brief description of your interests to MCU_Press@usmcu.edu.  ...  It is the story of an Algerian elite playing official politics as an insiders' game, even as fundamental structural tensions grow.  ... 
doi:10.21140/mcuj.2018090203 fatcat:u7vmp3qei5hahcjbhozat7muza

Survey on Unmanned Aerial Vehicle Networks: A Cyber Physical System Perspective [article]

Haijun Wang, Haitao Zhao, Jiao Zhang, Dongtang Ma, Jiaxun Li, Jibo Wei
2018 arXiv   pre-print
Therefore, the UAV network could be considered as a cyber physical system (CPS).  ...  , decision making to the final execution, which tightly integrates the cyber processes into the physical devices.  ...  In Section V, we further excavate the coupling effects and the cross-disciplinary issues between the cyber domain and the physical domain, as well as inside the cyber domain.  ... 
arXiv:1812.06821v1 fatcat:5b65dzzsunepnl5fzfvxsf442y

Can Cyberspace potentially harm democracy and world stability? [chapter]

Basie von Solms, University of Johannesburg
2019 Moral Issues in the Natural Sciences and Technologies  
) and 'Exploring meaningful nature experience connectedness with nature and the revitalization of transformative education for sustainability' (Matthew van Zyl).  ...  Acknowledgement I am deeply indebted to Paulu Joubert (2018) and Matthew van Zyl (2014) for access to their unpublished theses 'The forgotten experience: Human alienation from nature' (Pierre Joubert  ...  Greene et al. (2001) investigated what goes on in the brain when normal subjects are confronted with such dilemmas inside an fMRI.  ... 
doi:10.4102/aosis.2019.bk114.09 fatcat:gaub27xrsfaq7fsyya7lsne5gy

Research in Higher Education, Learning and Administration IQAC 2019

Dr.P S Aithal, Dr.Laveena D Mellow
2019 Zenodo  
WOMEN EDUCATION POLICIES FOR MINORITIES  ...  Systems from the threat.  ...  impact on a leader's ability and quality.  ... 
doi:10.5281/zenodo.3516884 fatcat:2uaoir5exve2vjtvmwncxwimra

Why a Special Journal about Corruption in Organization Now?

Agata Stachowicz-Stanusch, Łukasz Sułkowski
2010 Organization and Management  
core cadre for games structured around such ethical issues as the "Prisoner's Dilemma" (Gibson, 2003) .  ...  Cyber terrorism-crackers acting for their own ambition or political reasons or paid by terrorists.  ... 
doi:10.2478/v10166-010-0001-z fatcat:jxcxwn7jgbatliyeabyzbfwjxy

Leader Readiness in a Volatile, Uncertain, Complex, and Ambiguous Business Environment

Karen Rimita, Stephanie N Hoon, Robert Levasseur
2020 Journal of Social Change  
The key recommendations for practice are to inculcate VUCA-readiness and organizational resilience principles in line with this study's findings.  ...  The purpose of this hermeneutic phenomenological study was to explore the lived experiences of 15 Nigerian corporate executives about their VUCA business environment and the strategies they employed for  ...  Dilemma flipping: Dilemma flipping is the ability for leaders to have the readiness to turn threats posed in a VUCA world into opportunities (Johansen & Euchner, 2013) .  ... 
doi:10.5590/josc.2020.12.1.02 fatcat:26z3uybrgzeundifkiwsjsyu4a

Table of contents

2009 2009 17th Mediterranean Conference on Control and Automation  
This paper proposes an ant colony optimization algorithm for tuning fuzzy PID controllers. First, the design of typical Takagi-Sugeno (TS) fuzzy PID controllers is investigated.  ...  An Experimental setup simulates the master loops of Liquefied Petroleum Gases (LPG) subsystem in a refining petroleum industry.  ...  In this paper, an automatic system for classifying leukemia based on game theory is presented. The aim of this research is to apply game theory in order to classify leukemia into eight classes.  ... 
doi:10.1109/med.2009.5164498 fatcat:bi37lbkbhfaihj7lbc64vvplo4

Issue 29 Introduction: Computing the City

Armin Beverungen, Florian Sprenger
2017 Fibreculture Journal  
Barns recounts how over the last ten years urban informatics has begun to consider the city as an urban laboratory for practical experimentation with forms of computation; recognising the pervasive nature  ...  In this context, human life becomes an experiment for technological futures.  ...  Acknowledgements We would like to acknowledge the support of the Volkswagen Foundation for funding the workshop (as part of the Digital Cultures Research Lab in Lüneburg) out of which this issue emerged  ... 
doi:10.15307/fcj.29.212.2017 fatcat:zoqi2hu5frhyxfmdsmqktyrxiq

Zeitschriftenlese

2014 Medien & Kommunikationswissenschaft  
inside of an agenda."  ...  "Previous research has demonstrated a positive influence of cooperative video game play on participants' cooperative strategies (tit-for-tat behaviors) in a modified Prisoner's Dilemma task […] .  ...  Whereas the need for social approval did not show a significant effect on the probability of an honest answer when controlling for other variables, trait desirability did.  ... 
doi:10.5771/1615-634x-2014-4-687 fatcat:3s4ldzroqfatrfe2pgycsxcwbm
« Previous Showing results 1 — 15 out of 74 results