Search Results

1 - 10 of 96 items :

  • Political Science x
Clear All
A Two Person Zero Sum Game Oriented to Integration of Objectives

References Arslan S. (2006). Game Theory Approach In Telecommunications Networks. Gazi University Institute of Science and Technology, Ph.D Thesis, 43. Bellmann R.E. and Zadeh L.A. (1970). Decision making in a fuzzy environment. Management Sciences, 17: 141-164. Brown G., Kline J., Thomas A., Washburn A. and Wood K. (2011). A game theoretic model for defense of an oceanic bastion against submarine. Military Operation Research 16(4):25-40 Cantwell G.L. (2003). Can Two Person Zero Sum Game Theory

Open access
Predictors of Gaming Behavior among Military Peacekeepers – Exploring the Role of Boredom and Loneliness in Relation to Gaming Problems

; Hoge et al. 2004 ; Milliken et al. 2007 ; Wilk et al. 2010 ). Although excessive drinking after homecoming has been documented in a wide range of studies (e.g., Burnett-Zeigler et al. 2011 ; Hoge et al. 2004 ; Wilk et al. 2010 ), few, if any, studies have investigated the relationship between homecoming and other addictions. Gaming addiction can be defined as “excessive and compulsive use of computer or videogames that result in social and/or emotional problems; despite these problems, the gamer is unable to control this excessive use” ( Lemmens et al. 2009

Open access
Party Patronage and State Politicisation in The Post- Communist Countries of Central and Eastern Europe: A Game Theory Approach

’Dwyer, Conor. 2006. Runaway State-Building: Patronage Politics and Democratic Development . Baltimore: The John Hopkins University Press. OECD / SIGMA. 2003. Lithuania: Public Service and the Administrative Framework Assessment . OECD / SIGMA. Osborne, Martin J. 2004. An Introduction to Game Theory . Oxford: Oxford University Press. Ostrom, Elinor. 2011. “Background on the Institutional Analysis and Development Framework”. The Policy Studies Journal 39(1), 7 - 27. Ostrom, Elinor. 2005. Understanding

Open access
A Cyber Threat Model of a Nation Cyber Infrastructure Based on Goel-Okumoto Port Approach

References Barron, E. (2013). Game Theory, an Introduction, Second Edition, ch. 3., John Wiley & Sons, Inc. Heriyanto, T., & Allen, L. (2014). Kali Linux: Assuring Security by Penetration Testing, Birmingham: Packt Publishing. Min Xie Yuan-Shun Dai, & K.-L. Poh. (2004). Computing System Reliability Models and Analysis, Kluwer Academic Publishers, 101-104. Moga, H., & Boşcoianu, M. (2015). Massive Cyber-attacks Patterns Implemented with BDI Agents, 6th International Conference on Aerospace

Open access
It’s Getting Personal: Personalisation of political campaigns in four Prague districts during the 2018 Czech Senate elections

debates. Information, Communication & Society 18 (4): 390–406. Gerodimos, Roman – Justinussen, Jakup (2015): Obama’s 2012 Facebook Campaign: Political Communication in the Age of the Like Button. Journal of Information Technology & Politics 12 (2): 113–132. Grusell, Marie – Nord, Lars (2016): Setting the Trend or Changing the Game? Professionalization and Digitalization of Election Campaigns in Sweden. Journal of Political Marketing, published online 17 October 2016. Gunn, Sara Enli – Skogerbø, Eli (2013): Personalized campaigns in party

Open access
The European Union: Stability Despite Challenges

Governance in the Context of the Global Crisis, Praha: Nakladatelství Oeconomica. Coy, P.; Matlack, C. & Meyer, H. (2014), ‘The New Great Game: Why Ukraine Matters to So Many Other Nations,’ Bloomberg Businessweek, 27 February 2014. Retrieved from http://www.businessweek.com/articles/2014-02-27/the-newgreat-game-why-ukraine-matters-to-so-many-other-nations [accessed Sep 2014] Hallen, J. (2014), ‘Break Ukraine in Two,’ Forbes, 5 March 2014. Retrieved from http://www.forbes.com/sites/jayhallen/2014/03/05/break-ukraine-in-two/ [accessed Sep

Open access
Catalan brinkmanship tool for political rivalry in Spain

Abstract

The aim of this article is to analyze the independence activities undertaken by the Catalan government in the context of the brinkmanship strategy and the assumptions of game theory based on “the game of chicken”. It allows us to put the issue of Catalan’s claims in a different context than to refer to political, historical or cultural grounds for self-determination. By adopting this approach to the problem and putting it in the field of political competition at central and national level, it is possible to expose the elements that treat the whole problem as a political game, rather than a real endeavor to reach a consensus between the parties and finally solve the problem. In addition, from the point of view of party interests, it is beneficial that the problem of Catalan independence, absorbing much public attention, continues to function in the political sphere and in the consciousness of the people.

Open access
About Applications of the Fixed Point Theory

Abstract

The fixed point theory is essential to various theoretical and applied fields, such as variational and linear inequalities, the approximation theory, nonlinear analysis, integral and differential equations and inclusions, the dynamic systems theory, mathematics of fractals, mathematical economics (game theory, equilibrium problems, and optimisation problems) and mathematical modelling. This paper presents a few benchmarks regarding the applications of the fixed point theory. This paper also debates if the results of the fixed point theory can be applied to the mathematical modelling of quality.

Open access
Computer-Based Simulation Games in Public Administration Education

- 422. Fasli, M. and M. Michalakopoulos. 2006. “Learning Th rough Game-like Simulations.” Innovation in Teaching and Learning in Information and Computer Sciences 5(2), 1 - 11. Faria, A. J. 1986. “A Survey of the Use of Business Games in Academia and Business.” Simulation & Games 18(2), 207 - 224. Grummel, J. A. 2003. “Using Simulation to Teach Decision-Making within the Policy Process.” PS: Political Science and Politics 36(4), 787 - 789. Harding, C., S. Garrett and S. Wang. 2015. “Game-Playing and

Open access
The West’s Debt to Lithuania/ Lithuania’s Challenge to the West

Abstract

The present strategic disarray of the western democracies is both a by-product of the West’s failure to grasp the moral-cultural dimension of the end-game of the Cold War and a reflection of the crisis of civilizational morale that has beset western Europe in recent decades. Thus it is important to revisit the distinctive character of the Revolution of 1989/1991 in central and eastern Europe and the former Soviet Union. That dramatic transition in European politics was born from many factors, including the re-armament of the West under the leadership of U.S. President Ronald Reagan. But the political Revolution of 1989/1991 was also the result of a revolution of conscience in central and eastern Europe, in which the reclamation of national identity and culture eventually gave rise to “soft power” tools of resistance that the hard power typically deployed by communist regimes in the face of dissent could not match. Lithuania, which embodied the oft-ignored truth that a tenacious national culture can, over time, produce democratic political change, is thus in a position to remind the West that freedom is never free; that the dignity of the human person, human rights, and the rule of law must be affirmed culturally by a robust civil society if they are to be defended politically and militarily; and that moral relativism is an insecure foundation on which to build, sustain, or defend the institutions of democratic self-governance.

Open access