Beyond the Prisoner’s Dilemma: the Social Dilemmas of Cybersecurity
dc.contributor.author | Schoenherr, Jordan Richard | |
dc.contributor.author | Thomson, Robert | |
dc.date.accessioned | 2024-10-01T16:51:33Z | |
dc.date.available | 2024-10-01T16:51:33Z | |
dc.date.issued | 2020-06 | |
dc.description.abstract | The Prisoner's Dilemma represents an ubiquitous approach to security modeling that emphasizes adversarial relationships between actors. Adopting this approach helps understand ambiguous relationships in information domains. Despite the fact that some actors might adopt these frames, the Prisoner's Dilemma reflects only one of many possible social dilemmas. In this paper, we outline a computational approach to cybersecurity based on Interdependence Theory. Interdependence Theory provides a means to decompose payoff matrices into social influence components based on the amount of control actors and partners have in a situation. It additionally accounts for joint control that develops from the mutual decisions of both players. By focusing on two-person, two-option games, this approach can model many different social situations that reflect nor-mal and anomalous network activity. | |
dc.description.sponsorship | Army Cyber Institute BS&L EECS | |
dc.identifier.citation | J. R. Schoenherr and R. Thomson, "Beyond the Prisoner’s Dilemma: the Social Dilemmas of Cybersecurity," 2020 International Conference on Cyber Situational Awareness, Data Analytics and Assessment (CyberSA), Dublin, Ireland, 2020, pp. 1-7, doi: 10.1109/CyberSA49311.2020.9139644. | |
dc.identifier.doi | 10.1109/cybersa49311.2020.9139644 | |
dc.identifier.uri | https://ieeexplore.ieee.org/document/9139644 | |
dc.identifier.uri | https://hdl.handle.net/20.500.14216/1556 | |
dc.publisher | IEEE | |
dc.relation.ispartof | 2020 International Conference on Cyber Situational Awareness, Data Analytics and Assessment (CyberSA) | |
dc.subject | computer security | |
dc.subject | games | |
dc.subject | social dilemma | |
dc.title | Beyond the Prisoner’s Dilemma: the Social Dilemmas of Cybersecurity | |
dc.type | Conference presentations, papers, posters | |
local.USMAemail | robert.thomson@westpoint.edu | |
local.peerReviewed | Yes | |
oaire.citation.volume | 15 |
Files
Original bundle
1 - 1 of 1
Loading...
- Name:
- Beyond PD_Cyber2020_IEEE (100620)_FINAL.pdf
- Size:
- 400.59 KB
- Format:
- Adobe Portable Document Format