Russell C. Thomas

Russell C. Thomas
  • George Mason University

About

12
Publications
8,135
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
67
Citations
Current institution
George Mason University

Publications

Publications (12)
Chapter
Full-text available
Institutions are the ‘rules of the game’ that give structure and meaning to social life. Institutional innovation is a long and complex social process, and is much less well understood than technological innovation. In this chapter, we explore how an engineering approach to the process of institutional innovation might influence the trajectory or r...
Article
Full-text available
Turchin et al. (1) use an agent-based model (ABM) to evaluate the hypothesis “…that the diffusion of horse-related military technologies from the steppe-sown interface to the rest of Afroeurasia results in a characteristic spatiotemporal pattern of spread of intense forms of warfare, leading to macrostate forms of political organization.” Because o...
Article
Full-text available
This report proposes a formal version of Boisot's Information Space (I-space) framework and Social Learning Cycle (SLC) theory to support research in social learning in innovation communities, broadly defined. The benefit of a formal framework is that it will enable more systematic empirical research and also computer modeling.
Article
This paper proposes an analysis framework and model for estimating the impact of information security breach episodes. Previous methods either lack empirical grounding or are not sufficiently rigorous, general or flexible. There has also been no consistent model that serves theoretical and empirical research, and also professional practice. The pro...
Conference Paper
Full-text available
This paper presents the results of computational experiments on the effects of social influence on individual and systemic behavior of situated cognitive agents in a product-consumer environment. Paired experiments were performed with identical initial conditions to compare social agents with non-social agents. Experiment results show that social a...
Conference Paper
Full-text available
Information security is often called an 'arms race', but little is known about the co-evolutionary dynamics of innovation. To facilitate such research, we define two formal methods that can be executed by computational agents in a multi-agent system. First, we formalize the definition of capabilities and business models as a 'viable system'. We gen...
Conference Paper
Full-text available
Information security has been commonly viewed as a rivalry between attackers and defenders, and it has been popularly described as an evolutionary arms race where each side has incentives to continually create new innovations to overcome the opponent’s capabilities. In doing so, neither side gains a lasting advantage (i.e. the Red Queen effect). Fr...
Article
Full-text available
This is an extended abstract of the presentation of the same title for the Cyber Security and Information Intelligence Research Workshop, 2009.
Thesis
Full-text available
Many problems in cyber trust exist at least partially because the people and institutions involved are not properly motivated to solve them. The incentives are often perverse, misaligned, or missing. By improving economic, social, and personal incentives, cyber trust can be significantly improved. The incentive-based approach is based on modern ent...
Article
Full-text available
Traditional return on investment analysis techniques like discounted cash flow (DCF) and net present value (NPV) fall short of providing adequate decision support in today’s turbulent environment. New techniques, grouped under the concept called “business value analysis” (BVA), show promise. These techniques include intellectual capital, real optio...

Questions

Question (1)
Question
the DGS is an adaptation of Holland's Learning Classifier System with Tagged Urns and some additional structure. I'm interested in using it to model socio-technical systems related to information security, privacy, confidentiality, homeland defense, etc. Please share references to published papers or working papers, if possible. I will be coding in Mathematica for prototype, then in Java (or maybe Python) for production.

Network

Cited By