Difference between revisions of "Information warfare"
Jump to navigation
Jump to search
Line 10: | Line 10: | ||
==Diagram/schematic of theory== | ==Diagram/schematic of theory== | ||
==Originating author(s)== | ==Originating author(s)== | ||
− | *Dorothy | + | *Dorothy Elizabeth Robling Denning |
==Seminal articles== | ==Seminal articles== | ||
*Denning, D. E. R. (1999). Information warfare and security (Vol. 4): Addison-Wesley Reading MA. | *Denning, D. E. R. (1999). Information warfare and security (Vol. 4): Addison-Wesley Reading MA. |
Revision as of 07:39, 27 July 2018
Acronym
- N/A
Alternate name(s)
Main dependent construct(s)/factor(s)
Main independent construct(s)/factor(s)
Concise description of theory
- The theory of information warfare explains and integrates operations involving a diverse collection of actors and media within a single framework. The theory is centered on the value of information resources and on "win-lose" operations that affect that value. Offensive and defensive information warfare is expressed in terms of actors, targets, methods, technologies, outcomes, policies, and laws. Information warfare can target or exploit any type of information medium--physical environments, print and storage media, broadcast media, telecommunications, and computers and computer networks.
Diagram/schematic of theory
Originating author(s)
- Dorothy Elizabeth Robling Denning
Seminal articles
- Denning, D. E. R. (1999). Information warfare and security (Vol. 4): Addison-Wesley Reading MA.
Originating area
Level of analysis
Links to WWW sites describing theory
Links from this theory to other theories
IS articles that use the theory
Contributor(s)
- Craig A. Horne
Date last updated
- 27 July 2018
Please feel free to make modifications to this site. In order to do so, you must register.