The Game of Defense and Security

The Game of Defense and Security

Michael Barlow (University of New South Wales, Australia)
DOI: 10.4018/978-1-59140-640-2.ch006
OnDemand PDF Download:


This chapter covers the emerging area of the use of commercial off-the-shelf (COTS) computer games for military, defense and security purposes. A brief background is provided of the historic link between games and military simulation, together with the size and scope of the modern computer game industry. Considerable effort is dedicated to providing a representative sample of the various defense and security usages of COTS games. Examples of current usage are drawn from a range of nations including the United States (U.S.), Australia, Denmark, Singapore and Canada. Coverage is broken into the three chief application areas of training, experimentation and decision-support, with mention of other areas such as recruitment and education. The chapter highlights the benefits and risks of the use of COTS games for defense and security purposes, including cost, acceptance, immersion, fidelity, multi-player, accessibility and rapid technological advance. The chapter concludes with a discussion of challenges and key enablers to be achieved if COTS games are to obtain their true potential as tools for defense and security training, experimentation and decision-support. Aspects highlighted include the dichotomy between games for entertainment and “serious” applications; verification, validation and accreditation; collaboration between the games industry and defense; modifiability, interoperability; quantifying training transfer; and a range of technological challenges for the games themselves.

Complete Chapter List

Search this Book:
Table of Contents
Hussein A. Abbass, Daryl Essam
Chapter 1
Daryl Essam, Hussein A. Abbass
With the increase in the complexity of terrorism’s networks and activities, the advances in chemical and biological warfare, and the use of... Sample PDF
All Hazards Analysis: A Complexity Perspective
Chapter 2
Michael Barlow, Robert Cox
This chapter discusses the use of abstract multi-agent models of conflict — ABDs (Agent-Based Distillation) — for security and defense purposes. The... Sample PDF
Small & Simple: Application-Specific Multi-Agent Systems
Chapter 3
Ang Yang, Hussein A. Abbass, Ruhul Sarker
Red teaming is the process of studying a problem by anticipating adversary behaviors. When done in simulations, the behavior space is divided into... Sample PDF
How Hard Is It To Red Team?
Chapter 4
Anthony H. Dekker, Bernard Colbert
Events of the past few years have shown how today’s modern technological society is critically dependent on critical infrastructure networks such as... Sample PDF
Network Robustness for Critical Infrastructure Networks
Chapter 5
Ajith Abraham, Johnson Thomas
Computer security is defined as the protection of computing systems against threats to confidentiality, integrity and availability. An intrusion is... Sample PDF
Distributed Intrusion Detection Systems: A Computational Intelligence Approach
Chapter 6
Michael Barlow
This chapter covers the emerging area of the use of commercial off-the-shelf (COTS) computer games for military, defense and security purposes. A... Sample PDF
The Game of Defense and Security
Chapter 7
Katina Michael, Amelia Masters
Spurred by the recent escalation of terrorist attacks and their increasingly devastating outcomes, defense intelligence in the context of homeland... Sample PDF
Realized Applications of Positioning Technologies in Defense Intelligence
Chapter 8
Katina Michael, Amelia Masters
The adoption of positioning technologies to supplement, complement and function as defense intelligence applications has become widely accepted... Sample PDF
The Advancement of Positioning Technologies in Defense Intelligence
Chapter 9
Cecilia Andrews, Edward Lewis
“Counter-terrorism refers to the practices, tactics and strategies that governments, militaries and other groups adopt in order to fight terrorism.”... Sample PDF
Simulating Complexity-Based Ethics for Crucial Decision Making in Counter Terrorism
About the Authors