Research Proposal on "Game of Deception Game Theory"

Research Proposal 15 pages (4172 words) Sources: 1+

[EXCERPT] . . . .

Game of Deception (Game Theory)

Developing a Game of Deception using Game Theory

Game theory is the theory of independent and interdependent decision making that is concerned with organizational decision making wherein the outcome involves the types of decisions made by two or more autonomous players, one of which may be nature itself, and in which no single decision-maker has complete control over the outcomes (Kelly, 2003). As this author points out, "Obviously, games like chess and bridge fall within the ambit of game theory, but so do many other social situations which are not commonly regarded as games in the everyday sense of the word" (Kelly, p. 1). Although game theory has been extended into a number of human endeavors in an effort to model real-world behaviors, its origins were focused on identifying theoretical solutions to the problems posed by uncertainty in games of chance (Schmidt, 2002). According to Edling (2002), the term "game theory" may be misleading for some observers because the techniques involved are essentially the same as those used to develop other decision-making scenarios. This author reports that, "Strictly speaking, game theory and decision theory are not that distinct; a decision is also said to be a game against nature, i.e., against an unintentional actor" (Edling, p. 197). Although game theory has been used for a wide range of industrial, sociological and environmental applications, historically, game theory has been used to model specific model military situations to identify superior alternatives (Schofield, 1999). Therefore, game theory provides researchers with a framework that allows the modeling of various decision making scenarios to
Continue scrolling to

download full paper
identify the superior course of action for each player which can consist of an outright "win" or, in the alternative, the minimization of potential negative outcomes.

Statement of the Problem

Following the collapse of the Soviet Union in the early 1990s and the terrorist attacks of September 11, 2001, some observers were heard to lament the passing of the "good old days of Communism" when the enemy was well-known and all of the actors were states with known geographic coordinates (Kelemen & Kostera, 2002). As one analyst team points out, "The abrupt ending of the Cold War has left a vacuum in our strategic thinking. Neither our institutions nor our ways of thinking about national strategy have kept pace with the stunning changes of recent history" (Summers & Morin, 1995, p. 343). By sharp contrast, today's threats are much more nebulous and uncertain, and adversaries continually seek to develop low-cost countermeasures to the high-cost technology being deployed by the United States in its ongoing war on terrorism as well as to prosecute conventional warfare. One such low-cost tactic that can diminish the effectiveness of high-technology weapons systems is persistent area denial. According to Davis and Shapiro (2003), "During the past several years, all of the [military] services have worried about the challenges of antiaccess and area denial, widely regarded as key ways in which future adversaries will seek to undermine U.S. conventional military dominance" (p. 42).

Moreover, terrorist organizations and other non-state actors have become increasingly sophisticated in their use of such low-cost countermeasures because their very survival depends on it. In this regard, Davis and Shapiro add that, "Understanding that they are now at much greater risk for attack, the groups have a powerful incentive to use their own forms of antiaccess and area-denial strategies to greatly complicate U.S. military operations against them, even if found" (p. 42). In this regard, Shen, Chen, Cruz, Kwan and Kruger (2007) note that, "In an adversarial military environment, it is important to efficiently and promptly predict the enemy's tactical intent from lower level spatial and temporal information" (p. 1). Fortunately, technological innovations have created a dynamic modern battlefield that is amenable to analysis using game theory. According to a recent study by Castanon, Pachter and Chandler (2004), "The problem of persistent area denial arises in military operations, where an aircraft in a patrol area is trying to prevent ground vehicles from moving into position and launching a missile. Ground vehicles are detected as they move, and the aircraft can choose to pursue the vehicle, and destroy it if it is determined to carry a missile" (p. 3364).

Of course, enemy ground vehicle operators will likely fail to cooperate with the interdiction team and will seek to avoid detection at all costs in order to fulfill their launch missions. In this regard, Castonon and his colleagues add that, "In order to increase the chance of successful attack, the ground vehicle may use diversionary tactics, such as sending decoy vehicles to force the aircraft to move away and examine the decoys, thus opening a safe launch window for the missile vehicle" (p. 3364). These researchers conceptualize the respective combatant's strategic decisions concerning when to use a decoy vs. A missile vehicle, and when the aircraft should leave its patrol station and when to pursue a vehicle by using a two-person zero-sum Markov game framework. According to Edling (2002), "The main tool for describing stochastic processes is the stationary Markov process, of which the Poison process and Brownian motion are variants (differential equations are used in constructing stochastic models as well as to model change in probability distributions)" (p. 197). The use of game theory for such military applications is certainly not new, but dates back to at least World War II and thereafter when concepts of zero-sum two-person games were used to evaluate weapons systems (Weintraub, 1992).

The approach advocated by Castonon et al. is also congruent with Shen and his colleagues (2007) who advise, "A Markov decision process (MDP) can effectively model the uncertainties in the noisy military environment" (p. 2). Likewise, a recent study by Blasch, Chen and Pham (2008) uses the Markov game theory to outline an approach that is capable of enhancing threat detection, validation, and mitigation for future situational awareness operations in outer space. The results of the study by Castonon and his associates determined that the use of decoys provided a distinct advantage to the adversary when the actions of the aircraft are observed; however, this advantage is removed if the aircraft can prevent the observation of its movements. These findings also represent the basis of the instant study, the purpose of which is described further below.

Purpose of Study

The purpose of the proposed study is to provide a the background and overview needed to confirm or refute the efficacy of a two-person zero-sum game approach to address the persistent area denial tactics described above using the methodological approach described further below.

Methodology

To accomplish the above-stated research purpose, the proposed study will use a mixed methodology consisting of a review of the relevant peer-reviewed, scholarly and governmental literature concerning game theory in general and its application on the battlefield in particular together with a series of sample vignettes illustrating its application in real-world settings. This mixed approach is highly congruent with a number of social researchers who emphasize the need to review what is already published to determine what is known in the literature. For instance, Fraenkel and Wallen (2001) report that, "Researchers usually dig into the literature to find out what has already been written about the topic they are interested in investigating. Both the opinions of experts in the field and other research studies are of interest. Such reading is referred to as a review of the literature" (p. 48). Likewise, Gratton and Jones (2003) emphasize that a review of the literature represents an essential starting point for almost all types of research projects today: "No matter how original you think the research question may be," they advise, "it is almost certain that your work will be building on the work of others. It is here that the review of such existing work is important" (Gratton & Jones, p. 51). A well conducted literature review will also succeed in identifying any existing gaps in the body of knowledge. In this regard, Gratton and Jones add that, "A literature review is the background to the research, where it is important to demonstrate a clear understanding of the relevant theories and concepts, the results of past research into the area, the types of methodologies and research designs employed in such research, and areas where the literature is deficient" (p. 51). Therefore, a review of the literature followed by a series of vignettes that illustrate the use of game theory to help decision-makers identify superior alternatives in a dynamic battlefield setting represents a viable and timely research approach.

Importance of Study

The importance of maintaining an accurate assessment of a battlefield and its combatants cannot be overstated; however, modern technology represents a two-edged sword for the U.S. military. For instance, according to Cruz and Schumacher (2007), "Pop-up threats usually appear or disappear randomly in a battle field. If the next pop-up threat locations could be predicted it would assist a search or attack team, such as in a persistent area denial (PAD) mission, in getting a team of unmanned air vehicles… READ MORE

Quoted Instructions for "Game of Deception Game Theory" Assignment:

We will pay $225.00 for the completion of this order.

Bibliography format or citation style: It should be of a proper research proposal which can be converted to a thesis document later.

*****

How to Reference "Game of Deception Game Theory" Research Proposal in a Bibliography

Game of Deception Game Theory.” A1-TermPaper.com, 2009, https://www.a1-termpaper.com/topics/essay/game-deception-theory/2080419. Accessed 26 Jun 2024.

Game of Deception Game Theory (2009). Retrieved from https://www.a1-termpaper.com/topics/essay/game-deception-theory/2080419
A1-TermPaper.com. (2009). Game of Deception Game Theory. [online] Available at: https://www.a1-termpaper.com/topics/essay/game-deception-theory/2080419 [Accessed 26 Jun, 2024].
”Game of Deception Game Theory” 2009. A1-TermPaper.com. https://www.a1-termpaper.com/topics/essay/game-deception-theory/2080419.
”Game of Deception Game Theory” A1-TermPaper.com, Last modified 2024. https://www.a1-termpaper.com/topics/essay/game-deception-theory/2080419.
[1] ”Game of Deception Game Theory”, A1-TermPaper.com, 2009. [Online]. Available: https://www.a1-termpaper.com/topics/essay/game-deception-theory/2080419. [Accessed: 26-Jun-2024].
1. Game of Deception Game Theory [Internet]. A1-TermPaper.com. 2009 [cited 26 June 2024]. Available from: https://www.a1-termpaper.com/topics/essay/game-deception-theory/2080419
1. Game of Deception Game Theory. A1-TermPaper.com. https://www.a1-termpaper.com/topics/essay/game-deception-theory/2080419. Published 2009. Accessed June 26, 2024.

Related Research Proposals:

Designing Good Deceptions in Defense of Information Systems Term Paper

Paper Icon

Designing Good Deceptions in Defense of Information Systems" by Neil C. Rowe

Although computer systems and their security procedures have become more sophisticated in recent years, so too have those… read more

Term Paper 3 pages (829 words) Sources: 1+ Topic: Computers / IT / Internet


Psycholinguistics and Threat Prediction Discussion Chapter

Paper Icon

Psycholinguistics and Threat Prediction: Analyzing the Words That Hurt

The purpose of the study is to conduct research into actual language and see what constitutes a presage of violence and… read more

Discussion Chapter 4 pages (1160 words) Sources: 4 Style: APA Topic: Language / Linguistics


Embedded Weapons of Mass Deception How the Media Failed to Cover War in Iraq Book Report

Paper Icon

Embedded: The Relationship Between Form and Theoretical Assumption in an Account of the Iraq War

Danny Schechter's book Embedded: Weapons of Mass Deception looks at the media coverage surrounding the… read more

Book Report 20 pages (6480 words) Sources: 20 Style: APA Topic: Journalism / Media / PR / News


George W. Bush Administration Policy on Syria Essay

Paper Icon

Syria

An Analysis of the U.S.-Syrian Conflict

This paper will analyze the G.W. Bush Administration's justification for conflict with Syria and show how the disparate reasons of internal organs within… read more

Essay 15 pages (4874 words) Sources: 15 Topic: Israel / Palestine / Arab World


Ethical Theory and Business Term Paper

Paper Icon

Social Responsibility

Two prehistoric men (corporate executives) go hunting for their families (corporate stockholders). It is cold, and animals are scarce. The men are competing for the little food that… read more

Term Paper 5 pages (1689 words) Sources: 4 Style: Chicago Topic: Business / Corporations / E-commerce


Wed, Jun 26, 2024

If you don't see the paper you need, we will write it for you!

Established in 1995
900,000 Orders Finished
100% Guaranteed Work
300 Words Per Page
Simple Ordering
100% Private & Secure

We can write a new, 100% unique paper!

Search Papers

Navigation

Do NOT follow this link or you will be banned from the site!