This issue looks at the attempts to apply game theory to various aspects of security situations. Also, the explosive growth in the use of instant messaging has resulted in an increased risk to sensitive and personal information and safety due to the influx of cybercrimes. Cyber forensic techniques are needed to assist cybercrime decision support tools in collecting and analyzing digital evidence and assisting in identifying cyber criminal suspects. Finally, this issue proposes a risk-management framework Behavioral Economics of Cyberspace Operations for hardening Cyberspace Operations with the Behavioral Economics models of cognitive biases in judgment and decision making.
Articles In This Issue
Toward Realistic Modeling Criteria of Games in Internet Security
There have been various attempts to apply game theory to various aspects of security situations. This paper is particularly interested in security as relates to computers and the Internet. While there have been varying levels of success in describing different aspects of security in game-theoretic terms, there has been little success in describing the problem on a large scale that would be appropriate for making decisions about enterprise or Internet security policy decisions. This report attempts to provide such a description.Cyber Profiling: Using Instant Messaging Author Writeprints for Cybercrime Investigations
The explosive growth in the use of instant messaging (IM) communication in both personal and professional environments has resulted in an increased risk to proprietary, sensitive, and personal information and safety due to the influx of IM-assisted cybercrimes, such as phishing, social engineering, threatening, cyber bullying, hate speech and crimes, child exploitation, sexual harassment, and illegal sales and distribution of software. IM-assisted cybercrimes are continuing to make the news with child exploitation, cyber bullying, and scamming leading last month’s headlines. Instant messaging’s anonymity and use of virtual identities hinders social accountability and presents a critical challenge for cybercrime investigation. Cyber forensic techniques are needed to assist cybercrime decision support tools in collecting and analyzing digital evidence, discovering characteristics about the cyber criminal, and assisting in identifying cyber criminal suspects.BECO: Behavioral Economics of Cyberspace Operations
This paper proposes a risk-management framework Behavioral Economics of Cyberspace Operations (BECO) for hardening Cyberspace Operations (CO) with the Behavioral Economics (BE) models of cognitive biases in judgment and decision-making. In applying BE to CO, BECO augments a common assumption of a rational cyber warrior with more realistic expressions of human behavior in cyberspace. While the current development of the cyber workforce emphasizes education and training, BECO addresses typical conditions under which rational decision-making fails and knowledge is neglected. The BECO framework encompasses a full set of cyber actors, including attackers, defenders, and users on the friendly and adversary sides, across the full CO spectrum in space and time, and offers a structured approach to the cognitive bias mitigation.