Modelling Information Warfare as a Game
ABSTRACT
Game theory is one of the possible ways to study information warfare with mathematical models. This paper presents four example games which illustrate the different requirements for an effective playing strategy in information warfare. These games study, how a bold playing strategy can lead to domination, how a mixed playing strategy can reduce domination, how it can be useful to play a dominating strategy only part of the time, and how excessive domination can lead to rebels where all playing parties lose. This paper also describes meta-strategies whose goal is to modify the perceived costs and conditions of a game. This kind of perception management is closely related to the Observe-Orient-Decide-Act (OODA) loop.
AUTHORS
Command, Control and Communication Systems, National Defence College, Helsinki
Finland
Jorma Jormakka is professor of command, control and communication systems in the National Defence College, Finland. He passed his Ph.D. in mathematics 1988 and since 1987 has been working in telecommunications in many research and development units in industry, research institutes and academic positions, including professorships of telecommunications in Helsinki University of Technology and Lappeenranta University of Technology. His current research current work focuses on military networks, network security, netwarfare and use of networks on a battlefield as a technical part of information warfare.
Communications Laboratory, Helsinki University of Technology, Helsinki
Finland
Jarmo Mölsä is a research scientist and a Ph.D. student at the Communications Laboratory of the Helsinki University of Technology in Finland. His Ph.D. concerns information security and denial of service attacks in the Internet. Before starting the Ph.D. work he worked in research institutes for 16 years. In addition to technical aspects of information security, his research interests include organizational and psychological issues in security.
Published In
Keywords
Journal of Information Warfare
The definitive publication for the best and latest research and analysis on information warfare, information operations, and cyber crime. Available in traditional hard copy or online.
Quick Links
Archive