BEC: Applying Behavioral Economics to Harden Cyberspace
This article describes several cybersecurity innovations. First, it proposes to integrate behavioral economics’ findings of biases in judgment and decision-making…
CSIAC collects and publishes articles related to our technical focus areas on the web to share with the DoD community.
This article describes several cybersecurity innovations. First, it proposes to integrate behavioral economics’ findings of biases in judgment and decision-making…
Using a representative example from something as simple as calendar synchronization, the unintended consequences of moving too quickly into the…
It can be difficult to navigate your way around the field of knowledge management (KM). Whether you are just starting…
The explosive growth in the use of instant messaging (IM) communication in both personal and professional environments has resulted in…
This paper proposes a risk-management framework Behavioral Economics of Cyberspace Operations (BECO) for hardening Cyberspace Operations (CO) with the Behavioral…
There have been various attempts to apply game theory to various aspects of security situations. This paper is particularly interested…
Modeling and Simulation (M&S) users who require complex M&S typically do not have a long lifecycle for an experiment, analysis…
The U.S. Army’s Night Vision and Electronic Sensors Directorate (NVESD) Modeling and Simulation Division (MSD) provides sensors acquisition engineering and…
If you protect a luscious, valuable, amazingly tempting data object, the probability of its being stolen is 1. It’s as…
“The continued development and proliferation of information technologies will substantially change the conduct of military operations. These changes in the…
Today defense, intelligence and civilian agencies are focused on cyber security challenges. Early results seem conflicting. While media reports are…
A search at your favorite news aggregator for keywords such as “malware,” “computer virus,” or “data breach” will return results…