EconPapers    
Economics at your fingertips  
 

Corporate cyber smearing and the use of game theory in management decision-making

James Ram

International Journal of Management and Decision Making, 2011, vol. 11, issue 5/6, 379-386

Abstract: It has been well established that most people become defensive when they perceive to be on the receiving end of an offence. A common demonstration with a physical analogy to this psychological phenomenon is by pushing on a person's outstretched hand and observing that the person pushes back in response. Taken in more real-world situations, businesses take actions in response to perceived attacks – but rather than pushing back, there are other options with potentially better outcomes. Decision technologies are helpful in management decision-making about attack vectors. A significant amount of work has gone into technical approaches to dealing with cyber attacks, but few have been studied relative to predicting cyber harassment. We propose how game theory might be used for such purposes.

Keywords: game theory; organisational security; security policies; corporate cyber smearing; defensive reactions; business responses; perceived attacks; pushing back; decision technologies; attack vectors; cyber attacks; management; decision making; cyber harassment; corporations; internet; world wide web. (search for similar items in EconPapers)
Date: 2011
References: Add references at CitEc
Citations:

Downloads: (external link)
http://www.inderscience.com/link.php?id=43410 (text/html)
Access to full text is restricted to subscribers.

Related works:
This item may be available elsewhere in EconPapers: Search for items with the same title.

Export reference: BibTeX RIS (EndNote, ProCite, RefMan) HTML/Text

Persistent link: https://EconPapers.repec.org/RePEc:ids:ijmdma:v:11:y:2011:i:5/6:p:379-386

Access Statistics for this article

More articles in International Journal of Management and Decision Making from Inderscience Enterprises Ltd
Bibliographic data for series maintained by Sarah Parker ().

 
Page updated 2025-03-19
Handle: RePEc:ids:ijmdma:v:11:y:2011:i:5/6:p:379-386