منابع مشابه
Rethinking Defensive Information Warfare
Although the origins of information warfare lie in the defense of critical computer systems, defensive information warfare (DIW) per se has advanced little beyond an information assurance model. Information assurance is an integral part of any military organization’s operations, but it falls far short of meeting the needs for robust defense of critical command-and-control (C2) computer networks...
متن کاملInformation Warfare and Deception
This paper examines the history of the phenomenon of Information Warfare and the increasingly dominant role that deception is taking within its framework. The concept of information warfare began as a technology oriented tactic to gain information dominance by superior command and control. This soon developed into a realization of the power of information as both a ‘weapon’ as well as a ‘target...
متن کاملSurviving Information Warfare Attacks
T he past few years have seen governmental, military, and commercial organizations widely adopt Web-based commercial tech nologies because of their convenience, ease of use, and ability to take advantage of rapid advances in the commercial market. With this increas ing reliance on internetworked computer resources comes an increasing vulnerability to information warfare. Although it can range...
متن کاملEthics and Information Warfare
War forms an integral part of the history of mankind, alternately driving civilization forward, then imperiling it. A natural ambivalence toward war has thus developed, with its acceptance as a necessary evil tempered by vigorous, sustained efforts to control its frequency and intensity. Thus, from the dawn of the recorded history of conflict, attempts have been made to craft an ethical approac...
متن کاملIntegrated Network Electronic Warfare: China's New Concept of Information Warfare
* Colonel Deepak Sharma is a Research Fellow at the Institute for Defence Studies and Analyses, New Delhi. The People's Liberation Army (PLA) considers active offence to be the most important requirement for information warfare to destroy or disrupt an adversary's capability to receive and process data. Launched mainly by remote combat and covert methods, the PLA could employ information warfar...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Topoi
سال: 2014
ISSN: 0167-7411,1572-8749
DOI: 10.1007/s11245-014-9245-8