an email newsletter released every 3 weeks highlighting the latest articles, events, technical inquiries, and voices from the community
Summer 2014: Volume 2 Issue 2

Published: August 9, 2014
Games People Play Behavior and Security
This issue looks at the attempts to apply game theory to various aspects of security situations. Also, the explosive growth in the use of instant messaging has resulted in an increased risk to sensitive and personal information and safety due to the influx of cybercrimes. Cyber forensic techniques are needed to assist cybercrime decision support tools in collecting and analyzing digital evidence and assisting in identifying cyber criminal suspects. Finally, this issue proposes a risk-management framework Behavioral Economics of Cyberspace Operations for hardening Cyberspace Operations with the Behavioral Economics models of cognitive biases in judgment and decision making.
In This Issue
Toward Realistic Modeling Criteria of Games in Internet Security
There have been various attempts to apply game theory to various aspects of security situations. This paper is particularly interested in security as relates to computers and the Internet. While there have been varying levels…
Cyber Profiling: Using Instant Messaging Author Writeprints for Cybercrime Investigations
The explosive growth in the use of instant messaging (IM) communication in both personal and professional environments has resulted in an increased risk to proprietary, sensitive, and personal information and safety due to the influx…
BECO: Behavioral Economics of Cyberspace Operations
This paper proposes a risk-management framework Behavioral Economics of Cyberspace Operations (BECO) for hardening Cyberspace Operations (CO) with the Behavioral Economics (BE) models of cognitive biases in judgment and decision-making. In applying BE to CO,…