Modelling Information Warfare as a Game

ABSTRACT

Game theory is one of the possible ways to study information warfare with mathematical models. This paper presents four example games which illustrate the different requirements for an effective playing strategy in information warfare. These games study, how a bold playing strategy can lead to domination, how a mixed playing strategy can reduce domination, how it can be useful to play a dominating strategy only part of the time, and how excessive domination can lead to rebels where all playing parties lose. This paper also describes meta-strategies whose goal is to modify the perceived costs and conditions of a game. This kind of perception management is closely related to the Observe-Orient-Decide-Act (OODA) loop.


AUTHORS

Command, Control and Communication Systems, National Defence College, Helsinki
Finland

Jorma Jormakka is professor of command, control and communication systems in the National Defence College, Finland. He passed his Ph.D. in mathematics 1988 and since 1987 has been working in telecommunications in many research and development units in industry, research institutes and academic positions, including professorships of telecommunications in Helsinki University of Technology and Lappeenranta University of Technology. His current research current work focuses on military networks, network security, netwarfare and use of networks on a battlefield as a technical part of information warfare.

Communications Laboratory, Helsinki University of Technology, Helsinki
Finland

Jarmo Mölsä is a research scientist and a Ph.D. student at the Communications Laboratory of the Helsinki University of Technology in Finland. His Ph.D. concerns information security and denial of service attacks in the Internet. Before starting the Ph.D. work he worked in research institutes for 16 years. In addition to technical aspects of information security, his research interests include organizational and psychological issues in security.

Journal of Information Warfare

The definitive publication for the best and latest research and analysis on information warfare, information operations, and cyber crime. Available in traditional hard copy or online.

Quick Links

View the latest issue of JIW.

Latest Edition

Purchase a subscription to JIW.

Subscribe

Keywords

A

AI
APT

C

C2
C2S
CDX
CIA
CIP
CPS

D

DNS
DoD
DoS

I

IA
ICS

M

P

PDA

S

SOA

X

XRY

Quill Logo

The definitive publication for the best and latest research and analysis on information warfare, information operations, and cyber crime. Available in traditional hard copy or online.

SUBSCRIBE NOW

Get in touch

Registered Agent and Mailing Address

  • Journal of Information Warfare
  •  ArmisteadTEC
  • Dr Leigh Armistead, President
  • 1624 Wakefield Drive
  • Virginia Beach, VA 23455

 757.510.4574

 JIW@ArmisteadTec.com