Winning the Hardware Software Game book Winning the Hardware-Software Game

Using Game Theory to Optimize the Pace of New Technology Adoption

Innovators of new technology systems requiring users to combine both hardware and software components often face delays in adoption of their new systems.  Users will not buy the hardware until enough software or content is available, while at the same time software providers will not provide content until enough users have adopted the new system.  This book examines the dynamics of this adoption process and provides methods for optimizing the pace of adoption of new technology systems.     Read more...

The Trump Administration's most recent proposal to prevent terrorists from entering the country is to undertake "extreme vetting" in the form of disclosing contacts on their mobile phones, social-media passwords and financial records, and answering probing questions about their ideology.

This brings to mind the nature of the more general Terrorist Screening Game, in which The Government establishes rules and procedures for Screeners to follow in an attempt to weed out Terrorists from Non-Terrorist Visitors and Immigrants into the country.

This analyzes examines the objectives of players in the Terrorist Screening Game and considers relevant questions and issues.

players

Players

A. The People or Potential Victims of Terrorists Attacks

Two potential objectives of The People are

  • To feel safe from terrorist activity
  • To have a low probability of being the victim of a terrorist attack

B. The Government

The Government establishes rules and procedures to be used by screeners (both physical and informational) of visitors and immigrants into the country. The Government may have any of several objectives:

  • To make The People feel safe from terrorist activity
  • To decrease the probability of terrorist attacks
  • To increase the size and power of The Government

The Government must be able to come up with rules and procedures that

  • Can scale
  • Can be implemented by the average Joe (i.e., not require particular expertise)

For The Government to be able to establish rules and procedures to be used by screeners, it must be able to distinguish Terrorist from Non-Terrorist Visitors and Immigrants.

C. Physical (TSA) and informational (Customs) Screeners

Screeners apply the rules and procedures established by the Government to screen all (Terrorist and Non-Terrorist) Visitors and Immigrants to the country.

D. Terrorists

Terrorists have two main objectives:

  • To evade detection as Terrorists and enter the country
  • To terrorize The People

E. Non-Terrorist Visitors and Immigrants to the Country

 

Points to Ponder

• What physical or informational characteristics distinguish Terrorists from Non-Terrorist Visitors and Immigrants?

          Since Terrorists want to evade detection, they will try to hide characteristics that distinguish them from Non-Terrorist Visitors and Immigrants.

          Some distinguishing characteristics of Terrorists include:

Who they associate with (other terrorists)

Who they communicate with (send and receive info)

Places they visit (real and virtual)

Possessions (e.g., weapons or bomb-making materials)

Actions they take

Known names/aliases

• Given the distinguishing characteristics, what rules and procedures can the Government use for screening that will satisfy the objectives of The People?

Make them feel safe

Minimize probability of terrorist attacks

Make people feel safe but not actually increase their safety

• What rules and procedures can the Government use for screening that will satisfy the objectives of The People and at the same time minimize the inconvenience to Non-Terrorist Visitors and Immigrants?

• Clearly, there is a tension between thoroughness and/or effectiveness and inconvenience to Non-Terrorist Visitors and Immigrants.

This becomes more difficult to achieve over time as Terrorists learn to better mimic Non-Terrorist Visitors and Immigrants

• What rules and procedures can the Government use for screening that will satisfy the objectives of The Government?

To increase the size and power of The Government

And make The People feel safe

And minimize the probability of terrorist attacks

• What factors limit Government’s ability to act?

Non-discrimination/profiling

Limited resources

Bureaucracy

Potential to act covertly limited

Actions must be scalable

Actions must be able to be implemented by average people

• If there were no limitations on government, how could it minimize probability of terrorism?

More Blogs

Considerations for a Single-Payer Healthcare System in the US

06-07-2017 - Hits:99 - Ruth Fisher - avatar Ruth Fisher

This analysis considers how the US healthcare system would change if we were to transition from the current multi-payer system to a single-payer system. The analysis first presents facts that will be important in considering what a single-payer system might look like. Then, given these facts, the analysis considers specific...

Read more

Playing the Dynamic Pricing Game

06-07-2017 - Hits:66 - Ruth Fisher - avatar Ruth Fisher

Price discrimination may be defined as selling the same thing to different people for different prices. Price discrimination can take many forms, such as volume discounts, price premiums, or market segmentation. Suppliers regularly use many different forms of price discrimination, which people generally don’t object to. Some suppliers use dynamic pricing, a sub-category...

Read more

Playing the Yelp Ratings Game

05-05-2017 - Hits:212 - Ruth Fisher - avatar Ruth Fisher

The Yelp Controversy Yelp is a social media site that hosts information about local businesses and lets customers post ratings and reviews about their experiences with those businesses. Yelp uses a proprietary algorithm to sort through posted reviews and filter out those that might be fake or inauthentic. Reviews that do...

Read more

Description of the Terrorist Screening Game

09-04-2017 - Hits:247 - Ruth Fisher - avatar Ruth Fisher

The Trump Administration's most recent proposal to prevent terrorists from entering the country is to undertake "extreme vetting" in the form of disclosing contacts on their mobile phones, social-media passwords and financial records, and answering probing questions about their ideology. This brings to mind the nature of the more general Terrorist...

Read more

How Do We Conquer Fake News?

01-03-2017 - Hits:391 - Ruth Fisher - avatar Ruth Fisher

“Fake News” has become one of the big afflictions of our times. I just Googled the phrase “fake news,” and it generated 174 million hits. No one seems to know anymore whether or not any reported information is true and/or accurate. This has led people to question the truth of...

Read more

The Future of Jobs

25-02-2017 - Hits:363 - Ruth Fisher - avatar Ruth Fisher

The future of jobs is a serious concern. The most popular opinion I’ve seen is that the answer is more education. Consider, though, that we are in a period in which historically high levels of the population have some amount of postsecondary education. Yet, less than half the population (about 42%)...

Read more

Playing the Trump Import Tax Game

31-01-2017 - Hits:419 - Ruth Fisher - avatar Ruth Fisher

Description of Players Complications for Import Tax Other Issues     One of Donald Trump’s more salient campaign promises was a promise “to bring back jobs to fading steel towns and former manufacturing areas.” To promote the create of more jobs in the US, Trump has proposed •  Tax cuts for the middle class and businesses; • ...

Read more

Changes Over Time in Employment by Firm Size

08-01-2017 - Hits:417 - Ruth Fisher - avatar Ruth Fisher

The BLS provides data on US employment by firm size. These data include information by size class (number of employees) for the following elements: Job Gains Total Expansions Openings Job Losses Total Contractions Closings The US Census provides data on total employment by firm size. This analysis employs these two data sets to analyze how job gains, losses, and total...

Read more