Skip to main content

A Game-Transformation-Based Framework to Understand Initial Conditions and Outcomes in the Context of Cyber-Enabled Influence Operations (CIOs)

  • Conference paper
  • First Online:
Social, Cultural, and Behavioral Modeling (SBP-BRiMS 2020)

Abstract

A hybrid methodology that combines qualitative and quantitative analytical techniques is discussed in the context of Cyber-enabled Influence Operations (CIOs). Beginning with primary inputs from detailed qualitative analyses of political, economic, social, technological, and legal ground realities, our Game-Transformation-based Framework uses 2 × 2 games - with ordinal rankings of preferences as payoffs - to attain a macro-level perspective. Using the periodic table of 2 × 2 games, we show how payoff swaps, which represent shifts in ground realities, can change the nature of the game and therefore the resulting equilibrium. Our framework’s exploration of various permutations, that hypothetical changes in input might lead to, can be used by analysts and policymakers to reverse-engineer favorable scenarios. The framework is useful for scenario planning as it allows for both detailed micro-level analyses and strategic macro-level analyses.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Holt, T.J., Stonhouse, M., Freilich, J., Chermak, S.M.: Examining ideologically motivated cyberattacks performed by far-left groups. Terrorism Polit. Violence 1–22 (2019)

    Google Scholar 

  2. Lin, H.S., Kerr, J.: On cyber-enabled information/influence warfare and manipulation. SSRN, August 2017

    Google Scholar 

  3. NATO News. https://www.nato.int/cps/en/natohq/news_168435.htm?selectedLocale=en. Accessed 28 Feb 2020

  4. DeCanio, S.J., Fremstad, A.: Game theory and climate diplomacy. Ecol. Econ. 85, 177–187 (2013)

    Article  Google Scholar 

  5. Rowe, N.C.: The attribution of cyber warfare. In: Cyber Warfare, pp. 75–86. Routledge (2015)

    Google Scholar 

  6. Shackelford, S.: From nuclear war to net war: analogizing cyber attacks in international law. Berkley J. Int. Law (BJIL) 25(3), 198 (2009)

    Google Scholar 

  7. Green, J.A.: The regulation of cyber warfare under the jus ad bellum. In: Cyber Warfare: A Multidisciplinary Analysis, pp. 96–124 (2015)

    Google Scholar 

  8. Sklerov, M.J.: Solving the dilemma of sate responses to cyberattacks: a justification for the use of active defenses against states who neglect their duty to prevent. Mil. L. Rev. 201, 6–8 (2009)

    Google Scholar 

  9. Barrett, S.: Environment & Statecraft: The Strategy of Environmental Treaty-Making. Oxford University Press, Oxford (2003)

    Book  Google Scholar 

  10. Stein, A.A.: Why Nations Cooperate: Circumstance and Choice in International Relations. Cornell University Press, Ithaca (1990)

    Google Scholar 

  11. Ouenniche, J., Boukouras, A., Rajabi, M.: An ordinal game theory approach to the analysis and selection of partners in public–private partnership projects. J. Optim. Theory Appl. 169(1), 314–343 (2016)

    Article  MathSciNet  Google Scholar 

  12. Whyte, C., Mazanec, B.: Understanding Cyber Warfare: Politics, Policy and Strategy. Routledge, Abingdon (2018)

    Book  Google Scholar 

  13. Robinson, D., Goforth, D.: The Topology of the 2 × 2 Games: A New Periodic Table. Routledge, New York (2005)

    Google Scholar 

  14. Fisher, L.: Presidential War Power. University Press of Kansas, Lawrence (2013). https://muse.jhu.edu/book/39876

  15. Bechtel, G.G.: The societal impact of economic anxiety. J. Data Sci. 10, 693–710 (2012)

    Google Scholar 

  16. Bruns, B.: Escaping prisoner’s dilemmas: from discord to harmony in the landscape of 2x2 games. arXiv preprint arXiv:1206.1880 (2012)

Download references

Acknowledgments

This material, in part, is based on research sponsored by the Office of the Assistant Secretary of Defense for Research and Engineering (OASD (R&E)) under agreement number FAB750-15-2-0120. The U.S. Government is authorized to reproduce and distribute reprints for Governmental purposes notwithstanding any copyright notation thereon. The views and conclusions contained herein are those of the authors and should not be interpreted as necessarily representing the official policies or endorsements, either expressed or implied, of the Office of the Assistant Secretary of Defense for Research and Engineering (OASD (R&E)) or the U.S. Government.

This material, in part, is based on research sponsored by the NATO Innovation Hub under ODURF Project Number 600225-01. The views and conclusions contained herein are those of the authors and should not be interpreted as necessarily representing the official policies or endorsements, either expressed or implied, of the NATO Innovation Hub or of any other NATO entity.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Girish Sreevatsan Nandakumar .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Nandakumar, G.S., Padilla, J. (2020). A Game-Transformation-Based Framework to Understand Initial Conditions and Outcomes in the Context of Cyber-Enabled Influence Operations (CIOs). In: Thomson, R., Bisgin, H., Dancy, C., Hyder, A., Hussain, M. (eds) Social, Cultural, and Behavioral Modeling. SBP-BRiMS 2020. Lecture Notes in Computer Science(), vol 12268. Springer, Cham. https://doi.org/10.1007/978-3-030-61255-9_28

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-61255-9_28

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-61254-2

  • Online ISBN: 978-3-030-61255-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics