Published:  August 9, 2014

Games People Play Behavior and Security

This issue looks at the attempts to apply game theory to various aspects of security situations. Also, the explosive growth in the use of instant messaging has resulted in an increased risk to sensitive and personal information and safety due to the influx of cybercrimes. Cyber forensic techniques are needed to assist cybercrime decision support tools in collecting and analyzing digital evidence and assisting in identifying cyber criminal suspects. Finally, this issue proposes a risk-management framework Behavioral Economics of Cyberspace Operations for hardening Cyberspace Operations with the Behavioral Economics models of cognitive biases in judgment and decision making.

In This Issue

Filter by Technical Focus Areas

By default, only content within your selected technical focus areas is displayed throughout the site. You can update your technical focus areas in your profile or temporarily filter the content here.

Toward Realistic Modeling Criteria of Games in Internet Security

There have been various attempts to apply game theory to various aspects of security situations. This paper is particularly interested in security as relates to computers and the Internet. While there have been varying levels…

Cyber Profiling: Using Instant Messaging Author Writeprints for Cybercrime Investigations

The explosive growth in the use of instant messaging (IM) communication in both personal and professional environments has resulted in an increased risk to proprietary, sensitive, and personal information and safety due to the influx…

BECO: Behavioral Economics of Cyberspace Operations

This paper proposes a risk-management framework Behavioral Economics of Cyberspace Operations (BECO) for hardening Cyberspace Operations (CO) with the Behavioral Economics (BE) models of cognitive biases in judgment and decision-making. In applying BE to CO,…