Winning the Hardware Software Game Winning the Hardware-Software Game - 2nd Edition

Using Game Theory to Optimize the Pace of New Technology Adoption
  • How do you encourage speedier adoption of your product or service?
  • How do you increase the value your product or service creates for your customers?
  • How do you extract more of the value created by your product or service for yourself?

Read more...

Latest Comments

  • Ron Giuntini said More
    As always a good read.
    I have always... Thursday, 25 January 2018
  • Anonymous said More
    Clearly, phones, and subsequently mobile... Friday, 15 September 2017

The Trump Administration's most recent proposal to prevent terrorists from entering the country is to undertake "extreme vetting" in the form of disclosing contacts on their mobile phones, social-media passwords and financial records, and answering probing questions about their ideology.

This brings to mind the nature of the more general Terrorist Screening Game, in which The Government establishes rules and procedures for Screeners to follow in an attempt to weed out Terrorists from Non-Terrorist Visitors and Immigrants into the country.

This analyzes examines the objectives of players in the Terrorist Screening Game and considers relevant questions and issues.

players

Players

A. The People or Potential Victims of Terrorists Attacks

Two potential objectives of The People are

  • To feel safe from terrorist activity
  • To have a low probability of being the victim of a terrorist attack

B. The Government

The Government establishes rules and procedures to be used by screeners (both physical and informational) of visitors and immigrants into the country. The Government may have any of several objectives:

  • To make The People feel safe from terrorist activity
  • To decrease the probability of terrorist attacks
  • To increase the size and power of The Government

The Government must be able to come up with rules and procedures that

  • Can scale
  • Can be implemented by the average Joe (i.e., not require particular expertise)

For The Government to be able to establish rules and procedures to be used by screeners, it must be able to distinguish Terrorist from Non-Terrorist Visitors and Immigrants.

C. Physical (TSA) and informational (Customs) Screeners

Screeners apply the rules and procedures established by the Government to screen all (Terrorist and Non-Terrorist) Visitors and Immigrants to the country.

D. Terrorists

Terrorists have two main objectives:

  • To evade detection as Terrorists and enter the country
  • To terrorize The People

E. Non-Terrorist Visitors and Immigrants to the Country

 

Points to Ponder

• What physical or informational characteristics distinguish Terrorists from Non-Terrorist Visitors and Immigrants?

          Since Terrorists want to evade detection, they will try to hide characteristics that distinguish them from Non-Terrorist Visitors and Immigrants.

          Some distinguishing characteristics of Terrorists include:

Who they associate with (other terrorists)

Who they communicate with (send and receive info)

Places they visit (real and virtual)

Possessions (e.g., weapons or bomb-making materials)

Actions they take

Known names/aliases

• Given the distinguishing characteristics, what rules and procedures can the Government use for screening that will satisfy the objectives of The People?

Make them feel safe

Minimize probability of terrorist attacks

Make people feel safe but not actually increase their safety

• What rules and procedures can the Government use for screening that will satisfy the objectives of The People and at the same time minimize the inconvenience to Non-Terrorist Visitors and Immigrants?

• Clearly, there is a tension between thoroughness and/or effectiveness and inconvenience to Non-Terrorist Visitors and Immigrants.

This becomes more difficult to achieve over time as Terrorists learn to better mimic Non-Terrorist Visitors and Immigrants

• What rules and procedures can the Government use for screening that will satisfy the objectives of The Government?

To increase the size and power of The Government

And make The People feel safe

And minimize the probability of terrorist attacks

• What factors limit Government’s ability to act?

Non-discrimination/profiling

Limited resources

Bureaucracy

Potential to act covertly limited

Actions must be scalable

Actions must be able to be implemented by average people

• If there were no limitations on government, how could it minimize probability of terrorism?

More Blogs

Playing the Public Roadways Game

03-05-2018 - Hits:578 - Ruth Fisher - avatar Ruth Fisher

Electric scooters (“e-scooters”) are one of the latest hot new tech toys on the scene. Several start-ups have unloaded thousands of rentable e-scooters onto the streets of major cities in the US. The scooters offer users a cheap and convenient way to travel short distances across town. These scooters are...

Read more

Discussion of the Mapping Apps Game

07-04-2018 - Hits:573 - Ruth Fisher - avatar Ruth Fisher

Mapping apps, such as Waze and Google Maps, have created enormous value for users by helping them get to where they’re going faster. As least initially, when few people were using mapping apps, the apps were particularly helpful for individual users in rerouting them around traffic problems. However, now that...

Read more

What Makes the Most Popular TED Talks So Popular?

19-03-2018 - Hits:720 - Ruth Fisher - avatar Ruth Fisher

Suppose a friend told you that he was planning on doing a TED Talk, and he asked your advice on how to make his talk one of the most popular TED Talks out there. What would you tell him? This is exactly the type of question Data Scientists seek to answer...

Read more

Playing the Used Technology Game

09-03-2018 - Hits:1386 - Ruth Fisher - avatar Ruth Fisher

Smartphone manufacturers, such as Apple and Samsung, have thrived for the past fifteen years using a specific business model that involves (i) Swiftly releasing next generation products that contain significant advancements over previous generations of products, and (ii) Selling next generation technologies at a premium. However, more recently, sales of used and refurbished...

Read more

Why Is So Difficult to Extract Value from Data?

16-02-2018 - Hits:981 - Ruth Fisher - avatar Ruth Fisher

This is a new idea I'm working on. I'd love to hear any feedback you might have.   We Collect and Analyze Data Why do we collect and analyze data? It informs us about (i) what happened in a given time and place and (ii) why (see Figure 1).  

Read more

The Future of Money

24-01-2018 - Hits:1413 - Ruth Fisher - avatar Ruth Fisher

Traditional currency systems are being assailed from several directions. Some propose digitizing national currencies as a means to decrease transaction costs, facilitate tracking, and discourage illicit uses of currency. Some suggest a single, global currency system is inevitable. Others propose creating non-government-backed forms of currency to eliminate the ability of...

Read more

Switching Costs: The Overlooked Obstacle to Change

18-01-2018 - Hits:760 - Ruth Fisher - avatar Ruth Fisher

Why do we adopt new technologies? Many people will be quick to respond, “Because they help us do things faster, easier, or better.” Pretty obvious. Well, then, why don’t people adopt new technology? Most people would probably say that people don’t adopt new technology either because the technology is too expensive or because people...

Read more

An Example of Game Theory in Risk Management

12-01-2018 - Hits:711 - Ruth Fisher - avatar Ruth Fisher

This analysis was co-authored with Norman Marks, CPA, CRMA and originally posted on his blog.   Many liked the post on Risk and Game Theory with Ruth Fisher (my co-author on the piece). We were asked for more, especially an example or two. As with the last post, I will set the stage and...

Read more