Collaborative governance of cyber violence: A two-phase, multi-scenario four-party evolutionary game and SBI1I2R public opinion dissemination
- URL: http://arxiv.org/abs/2506.19704v1
- Date: Tue, 24 Jun 2025 15:13:45 GMT
- Title: Collaborative governance of cyber violence: A two-phase, multi-scenario four-party evolutionary game and SBI1I2R public opinion dissemination
- Authors: Xiaoting Yang, Wei Lv, Ting Yang, Bart Baesens,
- Abstract summary: This study integrates micro- and macro-level perspectives to propose a two-stage, multi-scenario governance mechanism for cyber violence.<n>In the first phase, a multi-scenario evolutionary game model with four parties involved in cyber violence was developed based on evolutionary game theory.<n>In the second phase, the role of bystanders was introduced by integrating communication dynamics theory, and emotional factors were considered alongside game strategies.
- Score: 2.330360131103641
- License: http://creativecommons.org/licenses/by-nc-nd/4.0/
- Abstract: Cyber violence severely disrupts public order in both cyberspace and the real world. Existing studies have gradually advocated collaborative governance but rely on macro-level theoretical analyses. This study integrates micro- and macro-level perspectives to propose a two-stage, multi-scenario governance mechanism for cyber violence. In the first phase, a multi-scenario evolutionary game model with four parties involved in cyber violence was developed based on evolutionary game theory. Matlab simulations show that under strong government regulation, moderate levels of punishment implemented by the government against the online media that adopt misguidance strategies can achieve the most desirable stable state. In the second phase, the role of bystanders was introduced by integrating communication dynamics theory, and emotional factors were considered alongside game strategies. This led to the development of a new SBI1I2R model for public opinion dissemination in cyber violence. Netlogo simulations found that increasing the "correct guidance" strategy by the online media reduces the influence of cyber violence supporters and the time it takes for their nodes to drop to zero, but does not significantly shorten the time for the peak to occur. Comparatively, collaborative intervention between the online media and the government was most effective in curbing public opinion, followed by the government's independent "strong regulation." Relying solely on the online media's "correct guidance" produced the weakest effect. Finally, this mechanism was applied to a case study, and a multi-stage, multi-scenario analysis based on life cycle theory enhanced its practical applicability.
Related papers
- DynamiX: Large-Scale Dynamic Social Network Simulator [101.65679342680542]
DynamiX is a novel large-scale social network simulator dedicated to dynamic social network modeling.<n>For opinion leaders, we propose an information-stream-based link prediction method recommending potential users with similar stances.<n>For ordinary users, we construct an inequality-oriented behavior decision-making module.
arXiv Detail & Related papers (2025-07-26T12:13:30Z) - When Autonomy Goes Rogue: Preparing for Risks of Multi-Agent Collusion in Social Systems [78.04679174291329]
We introduce a proof-of-concept to simulate the risks of malicious multi-agent systems (MAS)<n>We apply this framework to two high-risk fields: misinformation spread and e-commerce fraud.<n>Our findings show that decentralized systems are more effective at carrying out malicious actions than centralized ones.
arXiv Detail & Related papers (2025-07-19T15:17:30Z) - Exposing the Impact of GenAI for Cybercrime: An Investigation into the Dark Side [1.0613539657019528]
generative AI models have sparked significant debate over safety, ethical risks, and dual-use concerns.<n>This paper provides empirical evidence regarding generative AI's association with malicious internet-related activities and cybercrime.
arXiv Detail & Related papers (2025-05-29T17:57:01Z) - Media and responsible AI governance: a game-theoretic and LLM analysis [61.132523071109354]
This paper investigates the interplay between AI developers, regulators, users, and the media in fostering trustworthy AI systems.<n>Using evolutionary game theory and large language models (LLMs), we model the strategic interactions among these actors under different regulatory regimes.
arXiv Detail & Related papers (2025-03-12T21:39:38Z) - Hype, Sustainability, and the Price of the Bigger-is-Better Paradigm in AI [67.58673784790375]
We argue that the 'bigger is better' AI paradigm is not only fragile scientifically, but comes with undesirable consequences.<n>First, it is not sustainable, as, despite efficiency improvements, its compute demands increase faster than model performance.<n>Second, it implies focusing on certain problems at the expense of others, leaving aside important applications, e.g. health, education, or the climate.
arXiv Detail & Related papers (2024-09-21T14:43:54Z) - Foundations of Cyber Resilience: The Confluence of Game, Control, and Learning Theories [15.764094200832071]
Cyber resilience focuses on preparation, response, and recovery from cyber threats that are challenging to prevent.
Game theory, control theory, and learning theories are three major pillars for the design of cyber resilience mechanisms.
This chapter presents various theoretical paradigms, including dynamic asymmetric games, moving horizon control, conjectural learning, and meta-learning.
arXiv Detail & Related papers (2024-04-01T16:02:21Z) - Designing an attack-defense game: how to increase robustness of
financial transaction models via a competition [69.08339915577206]
Given the escalating risks of malicious attacks in the finance sector, understanding adversarial strategies and robust defense mechanisms for machine learning models is critical.
We aim to investigate the current state and dynamics of adversarial attacks and defenses for neural network models that use sequential financial data as the input.
We have designed a competition that allows realistic and detailed investigation of problems in modern financial transaction data.
The participants compete directly against each other, so possible attacks and defenses are examined in close-to-real-life conditions.
arXiv Detail & Related papers (2023-08-22T12:53:09Z) - Attacks in Adversarial Machine Learning: A Systematic Survey from the
Life-cycle Perspective [69.25513235556635]
Adversarial machine learning (AML) studies the adversarial phenomenon of machine learning, which may make inconsistent or unexpected predictions with humans.
Some paradigms have been recently developed to explore this adversarial phenomenon occurring at different stages of a machine learning system.
We propose a unified mathematical framework to covering existing attack paradigms.
arXiv Detail & Related papers (2023-02-19T02:12:21Z) - When Cyber Aggression Prediction Meets BERT on Social Media [1.0323063834827415]
We put forward the prediction model for cyber aggression based on the cutting-edge deep learning algorithm.
We elaborate cyber aggression on three dimensions: social exclusion, malicious humour, and guilt induction.
This study offers a solid theoretical model for cyber aggression prediction.
arXiv Detail & Related papers (2023-01-05T02:26:45Z) - Fixed Points in Cyber Space: Rethinking Optimal Evasion Attacks in the
Age of AI-NIDS [70.60975663021952]
We study blackbox adversarial attacks on network classifiers.
We argue that attacker-defender fixed points are themselves general-sum games with complex phase transitions.
We show that a continual learning approach is required to study attacker-defender dynamics.
arXiv Detail & Related papers (2021-11-23T23:42:16Z) - Beyond kinetic harm and towards a dynamic conceptualization of
cyberterrorism [0.0]
After more than two decades of discussion, the concept of cyberterrorism remains plagued by confusion.
This article presents the result of an integrative review which maps the development of the term and situates the communities that have shaped the debate.
arXiv Detail & Related papers (2020-12-16T16:23:11Z) - Revisiting Strategic Cyberwar Theory Reaching Decisive Strategic Outcome [0.0]
This article will present a theory, strategic cyberwar theory, that states that the utility of strategic cyberwar is tied to the likelihood of institutional instability in the targeted nation.
In an ideal scenario, the cyber attacks are systematically attacking the targeted adversary institutions triggering the dormant entropy embedded in a nation with weak institutions.
The current alternative to strategic cyberwar theory is to unsystematically attack the adversary with cyber attacks where exploitation opportunities occur, which is likely to degrade parts of the information infrastructure, but it will not reach any strategic goals.
arXiv Detail & Related papers (2020-07-16T20:44:43Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.