A Postmodern Theory of Cyberterrorism: Game Theory
نویسنده
چکیده
This article may be used for research, teaching and private study purposes. Any substantial or systematic reproduction, redistribution , reselling , loan or sub-licensing, systematic supply or distribution in any form to anyone is expressly forbidden. The publisher does not give any warranty express or implied or make any representation that the contents will be complete or accurate or up to date. The accuracy of any instructions, formulae and drug doses should be independently verified with primary sources. The publisher shall not be liable for any loss, actions, claims, proceedings, demand or costs or damages whatsoever or howsoever caused arising directly or indirectly in connection with or arising out of the use of this material. ABSTRACT This article analyzes how the battle between computer security experts and cyberterrorists can be explained through game theory. This article is important because it not only applies game theory to the study of cyberter-rorism, which has been rarely done so far, but it also breaks new ground by intersecting the game theoretical model with another theory, social network theory. An important thesis of this analysis is that under the principles of game theory, each player is assumed to be rational; all players wish the outcome to be as positive or rewarding as possible. Another key argument is that game theory is a postmodern theory; against opponents who wage attacks in a postmodern fashion, conventional strategies lead nowhere. The cyberterrorist and the cyber forensics expert not only engage in real-time game play but also use tactics that are not conceivable in conventional conflict.
منابع مشابه
Investigation of Game Between Cells in Occurrence of Genetic Mutations Using Evolutionary Game Theory
In this paper, two games that play a role in creating a cancer tumor and suppression are studied using evolutionary game theory and its different modes are analyzed. The first game is the competition between a cancer cell and a healthy cell to receive food through the blood. In the second game, the interaction between the two oncogenes Ras and Myc is examined for cellular deformation
متن کاملMulti Responses Optimization Through Game Theory Approach
In this paper, a new approach based on game theory has been proposed to multi responses problem optimization. Game theory is a useful tool for decision making in the conflict of interests between intelligent players in order to select the best joint strategy for them through selecting the best joint desirability. Present research uses the game theory approach via definition of each response as ...
متن کاملCooperative network flow problem with pricing decisions and allocation of benefits: A game theory approach
Several real problems in telecommunication, transportation, and distribution industries can be well analyzed by network flow models. In revenue management, pricing plays a primary role which increases the profit generated from a limited supply of assets. Pricing decision directly affects the amount of service or product demand. Hence, in traditional maximum flow problem, we assume that the dema...
متن کاملA New Method in Bankruptcy Assessment Using DEA Game Theory
One of the most important economic concepts is evaluation and bankruptcy prediction. Financial events, which an organization could be, exposed to serious risks and it goes bankruptcy. Therefore, prediction and assessment bankruptcy enable organizations that to be familiar the financial risks and resolve their financial deficiencies. So in this paper, we discuss one of the most important economi...
متن کاملA game theory approach to the Iranian forest industry raw material market
Dynamic game theory is applied to analyze the timber market in northern Iran as a duopsony. The Nash equilibrium and the dynamic properties of the system based on marginal adjustments are determined. When timber is sold, the different mills use mixed strategies to give sealed bids. It is found that the decision probability combination of the different mills follow a special form of attractor an...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- Information Security Journal: A Global Perspective
دوره 18 شماره
صفحات -
تاریخ انتشار 2009