scholarly journals Learning Optimal Strategies to Commit To

Author(s):  
Binghui Peng ◽  
Weiran Shen ◽  
Pingzhong Tang ◽  
Song Zuo

Over the past decades, various theories and algorithms have been developed under the framework of Stackelberg games and part of these innovations have been fielded under the scenarios of national security defenses and wildlife protections. However, one of the remaining difficulties in the literature is that most of theoretical works assume full information of the payoff matrices, while in applications, the leader often has no prior knowledge about the follower’s payoff matrix, but may gain information about the follower’s utility function through repeated interactions. In this paper, we study the problem of learning the optimal leader strategy in Stackelberg (security) games and develop novel algorithms as well as new hardness results.

2020 ◽  
Vol 20 (3) ◽  
pp. 7-52
Author(s):  
Miroslav Tuđman

The author gives an overview of the history of National Security and the Future (NSF). The first editorial board accepted a clear vision and mission of the NSF. That is why the NSF had to react to the political circumstances in which the journal has operated for 20 years. In the first period, international circumstances and the policy of detuđmanization directly influenced the choice of topics and papers published in the journal. For the past five years, the NSF has paid particular attention to the security of national and European critical infrastructure. A total of 257 texts were published on more than 8,000 pages and authored by 134 authors from 25 countries. The NSF has published studies on historical forgery, information operations, production of "fake news" and contributions to the theory and methodology of intelligence activities.


2012 ◽  
Vol 71 (1) ◽  
pp. 121-125
Author(s):  
John Whittier Treat

I begin my rejoinder to Timothy Brook and Michael Shin by reiterating the important question with which Brook ends his piece. “[W]hen Hamid Karzai's government falls in Afghanistan, or Nouri al-Maliki's does in Iraq, who then will be the nation's heroes and who the collaborators?” Questions such as this and other present-day conundrums (including the choices I make living in a national security state) were certainly on my mind when I began thinking about collaboration during the Second World War and particularly within the Japanese empire. The line between then and now is direct and short for me. Timothy Brook himself has been the target of an internet smear campaign assailing his work on Chinese collaboration for purportedly preparing an alibi for American mischief in Iraq and Afghanistan. Paramount among my own thoughts was always: what would I do, were I faced with the choices a Yi Kwang-su, a Liang Hongzhi or a Wang Jingwei was? It seems an irresistible reflex to me that we place ourselves in the position of those in the past who wagered and lost, and rehearse their calculations as our own: judgment of their decisions is as inevitable as it is necessary. The question is not if we will judge—to refuse risks our claims to moral agency—it is how. Timothy Brook, whether he once declined or now hesitates, indeed does make ethical judgments (he is on the record, for example, against advocating “collaboration as a morally positive or politically advisable course” [2008]), and indeed he should. That we have not come to similar conclusions only points to our missing consensus on a moral calculus, and not to the lack of an imperative to possess one.


Author(s):  
Jameel Jaffer

The legal, political, and technological developments of the past twenty years have rendered us more reliant on whistleblowers even as the developments have made whistleblowing more difficult and more hazardous. To promote informed public debate about national security and to preserve the connection between democratic consent and government policy in this sphere, we should extend legal protection, in some circumstances, to government insiders who responsibly disclose official secrets without authorization. Affording leakers a “public value” defense against prosecution would have benefits beyond those usually cited. It would, among other things, reduce the disincentive to socially beneficial leaks, lend legitimacy to Espionage Act prosecutions, more closely align our legal regime with widely shared intuitions about moral responsibility, and restore the courts to an appropriately central role in protecting the public’s access to an essential channel of information.


1969 ◽  
Vol 29 (2) ◽  
pp. 467-473 ◽  
Author(s):  
Israel Lieblich ◽  
Amia Lieblich

5 experiments were conducted in an attempt to produce a shift in the decision pattern in a forced-choice arithmetical estimation task. The expected shift was related to a change in the payoff matrix attached to the possible outcomes of the decision. The experiments varied in the amount of payoff, clarity of the explanation of the payoff matrix, difficulty of the task, feedback after decision and the length of decision time. None of these manipulations produced the expected rational shift. The role of payoff matrices in decisions in tasks involving skill is discussed.


2016 ◽  
Vol 13 (2) ◽  
pp. 219-229 ◽  
Author(s):  
Kyle R. Brady

Abstract The ideation and execution of American homeland security has substantially evolved over the past fifteen years from a vague statement of principles to a very concrete, professional, and institutionalized field, with a cabinet-level department associated with various aspects of its practice. However, homeland security in the United States – defined as the protection of citizens, property, and interests beginning at international borders and expanding inward – is not yet fully developed or even secure in its own roles. As the evolution of both the theory and the practice continues, an important principle – analogous to one in the field of national security – must be sufficiently addressed and acted upon: the physical act of protecting sovereign territory.


1951 ◽  
Vol 44 (5) ◽  
pp. 338-339

The events of the past few months have reminded us of similar ones which took place in the late thirties and the early forties. During that period it was necessary to enlist the cooperation of mathematics teachers in every part of the country. Today, the need for such assistance is even greater.


Subject Deepfake technology. Significance The US Senate on October 24 passed an act that requires the Department of Homeland Security to publish a yearly report on how ‘deepfake’ technology may be used to harm national security. Deepfakes are believable digital videos, audios or photos created using artificial intelligence (AI) to portray a person saying or doing something that the person never said or did, or portraying an event as real that never took place. The level of sophistication of this technology has leapfrogged over the past two years, raising a wide spectrum of concerns. Impacts A market for anti-deepfake verification technologies will emerge. Lawmakers will need to define the lines between art/entertainment and malicious deepfakes. Upcoming elections will be impacted by the existence of this technology.


1992 ◽  
Vol 22 (3) ◽  
pp. 259-272 ◽  
Author(s):  
Thomas R. Williams ◽  
Earl C. Butterfield

This article reviews previous research on advance organizers, introductory text adjuncts intended to provide the reader of expository text with a meaningful context within which to process unfamiliar, or difficult, new information. Research conducted during the past thirty years well documents the fact that advance organizers do, indeed, inspire significant increases in comprehension among readers whose prior knowledge “subsumers” are inadequate to provide a necessary assimilative context. One issue on which theorists yet disagree, however, is the efficacy of advance organizers in facilitating the acquisition of subordinate text detail, or facts. Definitional inconsistencies and methodological deficiencies in previous research have clouded this issue. Subsequently in this journal, Part II of this article will present the results of two empirical studies that resolve these methodological problems and specifically address the question of the effects of advance organizers on the acquisition of text detail.


Sign in / Sign up

Export Citation Format

Share Document