Military Deception in the Information Age

نویسندگان

چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

What Is Deception? What Is Military Deception?

DECEPTION All warfare is based upon deception. Deception, the employment of trickery or guile, is equal parts art and science. It is typically defined as " causing another to believe what is not true; to mislead or ensnare " (Webster's, 1999). Deception aims to deliberately induce misperception in another. Deception is a deliberate enterprise; it is not the result of chance, nor the by-product ...

متن کامل

Identifying Information Security Risk Components in Military Hospitals in Iran

Background and Aim: Information systems are always at risk of information theft, information change, and interruptions in service delivery. Therefore, the present study was conducted to develop a model for identifying information security risk in military hospitals in Iran. Methods: This study was a qualitative content analysis conducted in military hospitals in Iran in 2019. The sample consist...

متن کامل

Information Warfare and Deception

This paper examines the history of the phenomenon of Information Warfare and the increasingly dominant role that deception is taking within its framework. The concept of information warfare began as a technology oriented tactic to gain information dominance by superior command and control. This soon developed into a realization of the power of information as both a ‘weapon’ as well as a ‘target...

متن کامل

Information asymmetry and deception

Situations such as an entrepreneur overstating a project's value, or a superior choosing to under or overstate the gains from a project to a subordinate are common and may result in acts of deception. In this paper we modify the standard investment game in the economics literature to study the nature of deception. In this game a trustor (investor) can send a given amount of money to a trustee (...

متن کامل

Deception Detection: Study of Information Manipulation through Electronic Identity Theft – Email Forgery in the U.s Military Thesis

Computer users have depended on email communication since its advent. This dependency has created an increased level of system trust within email systems. Individuals can verify where an email came from and who sent the email by simply looking at the senders’ email address. The sender’s email address can be hidden from unsuspecting individuals who do not know how to verify an email address and ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Vojenské rozhledy

سال: 2013

ISSN: 1210-3292

DOI: 10.3849/2336-2995.22.2013.01.160-164