Beyond the Prisoner’s Dilemma: the Social Dilemmas of Cybersecurity

dc.contributor.authorSchoenherr, Jordan Richard
dc.contributor.authorThomson, Robert
dc.date.accessioned2024-10-01T16:51:33Z
dc.date.available2024-10-01T16:51:33Z
dc.date.issued2020-06
dc.description.abstractThe Prisoner's Dilemma represents an ubiquitous approach to security modeling that emphasizes adversarial relationships between actors. Adopting this approach helps understand ambiguous relationships in information domains. Despite the fact that some actors might adopt these frames, the Prisoner's Dilemma reflects only one of many possible social dilemmas. In this paper, we outline a computational approach to cybersecurity based on Interdependence Theory. Interdependence Theory provides a means to decompose payoff matrices into social influence components based on the amount of control actors and partners have in a situation. It additionally accounts for joint control that develops from the mutual decisions of both players. By focusing on two-person, two-option games, this approach can model many different social situations that reflect nor-mal and anomalous network activity.
dc.description.sponsorshipArmy Cyber Institute BS&L EECS
dc.identifier.citationJ. R. Schoenherr and R. Thomson, "Beyond the Prisoner’s Dilemma: the Social Dilemmas of Cybersecurity," 2020 International Conference on Cyber Situational Awareness, Data Analytics and Assessment (CyberSA), Dublin, Ireland, 2020, pp. 1-7, doi: 10.1109/CyberSA49311.2020.9139644.
dc.identifier.doi10.1109/cybersa49311.2020.9139644
dc.identifier.urihttps://ieeexplore.ieee.org/document/9139644
dc.identifier.urihttps://hdl.handle.net/20.500.14216/1556
dc.publisherIEEE
dc.relation.ispartof2020 International Conference on Cyber Situational Awareness, Data Analytics and Assessment (CyberSA)
dc.subjectcomputer security
dc.subjectgames
dc.subjectsocial dilemma
dc.titleBeyond the Prisoner’s Dilemma: the Social Dilemmas of Cybersecurity
dc.typeConference presentations, papers, posters
local.USMAemailrobert.thomson@westpoint.edu
local.peerReviewedYes
oaire.citation.volume15

Files

Original bundle

Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
Beyond PD_Cyber2020_IEEE (100620)_FINAL.pdf
Size:
400.59 KB
Format:
Adobe Portable Document Format