Winning the Hardware Software Game Winning the Hardware-Software Game - 2nd Edition

Using Game Theory to Optimize the Pace of New Technology Adoption
  • How do you encourage speedier adoption of your product or service?
  • How do you increase the value your product or service creates for your customers?
  • How do you extract more of the value created by your product or service for yourself?

Read more...

Latest Comments

  • Anonymous said More
    Clearly, phones, and subsequently mobile... Friday, 15 September 2017

The Trump Administration's most recent proposal to prevent terrorists from entering the country is to undertake "extreme vetting" in the form of disclosing contacts on their mobile phones, social-media passwords and financial records, and answering probing questions about their ideology.

This brings to mind the nature of the more general Terrorist Screening Game, in which The Government establishes rules and procedures for Screeners to follow in an attempt to weed out Terrorists from Non-Terrorist Visitors and Immigrants into the country.

This analyzes examines the objectives of players in the Terrorist Screening Game and considers relevant questions and issues.

players

Players

A. The People or Potential Victims of Terrorists Attacks

Two potential objectives of The People are

  • To feel safe from terrorist activity
  • To have a low probability of being the victim of a terrorist attack

B. The Government

The Government establishes rules and procedures to be used by screeners (both physical and informational) of visitors and immigrants into the country. The Government may have any of several objectives:

  • To make The People feel safe from terrorist activity
  • To decrease the probability of terrorist attacks
  • To increase the size and power of The Government

The Government must be able to come up with rules and procedures that

  • Can scale
  • Can be implemented by the average Joe (i.e., not require particular expertise)

For The Government to be able to establish rules and procedures to be used by screeners, it must be able to distinguish Terrorist from Non-Terrorist Visitors and Immigrants.

C. Physical (TSA) and informational (Customs) Screeners

Screeners apply the rules and procedures established by the Government to screen all (Terrorist and Non-Terrorist) Visitors and Immigrants to the country.

D. Terrorists

Terrorists have two main objectives:

  • To evade detection as Terrorists and enter the country
  • To terrorize The People

E. Non-Terrorist Visitors and Immigrants to the Country

 

Points to Ponder

• What physical or informational characteristics distinguish Terrorists from Non-Terrorist Visitors and Immigrants?

          Since Terrorists want to evade detection, they will try to hide characteristics that distinguish them from Non-Terrorist Visitors and Immigrants.

          Some distinguishing characteristics of Terrorists include:

Who they associate with (other terrorists)

Who they communicate with (send and receive info)

Places they visit (real and virtual)

Possessions (e.g., weapons or bomb-making materials)

Actions they take

Known names/aliases

• Given the distinguishing characteristics, what rules and procedures can the Government use for screening that will satisfy the objectives of The People?

Make them feel safe

Minimize probability of terrorist attacks

Make people feel safe but not actually increase their safety

• What rules and procedures can the Government use for screening that will satisfy the objectives of The People and at the same time minimize the inconvenience to Non-Terrorist Visitors and Immigrants?

• Clearly, there is a tension between thoroughness and/or effectiveness and inconvenience to Non-Terrorist Visitors and Immigrants.

This becomes more difficult to achieve over time as Terrorists learn to better mimic Non-Terrorist Visitors and Immigrants

• What rules and procedures can the Government use for screening that will satisfy the objectives of The Government?

To increase the size and power of The Government

And make The People feel safe

And minimize the probability of terrorist attacks

• What factors limit Government’s ability to act?

Non-discrimination/profiling

Limited resources

Bureaucracy

Potential to act covertly limited

Actions must be scalable

Actions must be able to be implemented by average people

• If there were no limitations on government, how could it minimize probability of terrorism?

More Blogs

Playing the Sexual Harassment & Misbehavior Game

08-12-2017 - Hits:697 - Ruth Fisher - avatar Ruth Fisher

Definition of Sexual Harassment Scenarios in the Sexual Harassment & Misbehavior Game Cost to Firms of Sexual Harassment & Misbehavior The Sexual Harassment & Misbehavior Game Musings about the Game Outcomes of the Model   The scourge of the day is sexual harassment. There’s nothing new about sexual harassment. It has always existed. What has changed is the...

Read more

Playing the Restaurant Delivery Game

07-11-2017 - Hits:546 - Ruth Fisher - avatar Ruth Fisher

Remember when restaurant delivery options included Domino’s, Pizza Hut, or Papa John’s? No longer! These pizza restaurants still have a majority share of the restaurant delivery market. However, GrubHub, Eat24, DoorDash, UberEats, and other restaurant delivery platforms are expanding users’ choices beyond just pizza. This analysis examines the Restaurant Delivery Game:...

Read more

Playing the Platform Game

08-10-2017 - Hits:734 - Ruth Fisher - avatar Ruth Fisher

The purpose of this analysis is to better understand the dynamics of internet platforms. The analysis considers the three basic types of platforms: Vendors (WalMart, Apple, Pandora, etc.) Social Media (Facebook, LinkedIn, YouTube, etc.) Matchmakers (eBay, Uber, etc.) And will seek to address such issues as Who are the different players in each type of...

Read more

Overview of Technology System Dynamics

25-09-2017 - Hits:739 - Ruth Fisher - avatar Ruth Fisher

This is a presentation I’m preparing for “Tech Startup Conference: Artificial Intelligence” being held on September 26, 2017. 1. Issues Covered Adoption of New Technology Systems: What does it take for new technologies to become successfully adopted in the marketplace? Why do some technologies become adopted while others do not? Value Creation: How...

Read more

Persuasion Technologies in the Digital Age: The Good, The Bad, and the Ugly

05-09-2017 - Hits:1160 - Ruth Fisher - avatar Ruth Fisher

Persuasion technologies include methods and techniques derived from behavioral psychology and behavioral economics used to shape the choices people make. The favorable environment for using such methods, enabled by people’s increasing use of computers and smartphones, has led to the proliferation of their use by software developers. Like any technology, persuasion...

Read more

How Have Retail Sales Changed Over the Last 25 Years?

18-08-2017 - Hits:354 - Ruth Fisher - avatar Ruth Fisher

This brief analysis examines how retail sales have changed over the past 25 years, both in size and distribution. As seen in Figure 1, total retail sales have grown by 2.7% - 2.8% per year, excluding the short drop in spending during the Financial Crisis (2007 – 2009). Figure 1  

Read more

Playing the Amazon Monopoly Game

28-07-2017 - Hits:602 - Ruth Fisher - avatar Ruth Fisher

Amazon Ecosystem Components Amazon Segments Amazon Sales, Income, and Margins Amazon Methods of Competition Anti-Trust Issues   Amazon is leaving a large pile of battered companies in its wake as it increasingly steals sales away from traditional bricks and mortar companies and decimates their market shares. Some of the better-known victims include: Barnes & Noble (books)...

Read more

Do We Shape Technology, or Does Technology Shape Us?

25-07-2017 - Hits:650 - Ruth Fisher - avatar Ruth Fisher

I have always thought about technology as a tool that we develop and improve and customize and adapt to use to help us do whatever it is we want to do faster and easier and better. In other words, we shape and control technology. However, recently I’ve come to realize that...

Read more