Difference between revisions of "Information warfare"

From IS Theory
Jump to navigation Jump to search
 
(7 intermediate revisions by the same user not shown)
Line 7: Line 7:
 
*Actors, offensive operations, defensive operations
 
*Actors, offensive operations, defensive operations
 
==Concise description of theory==
 
==Concise description of theory==
*The theory of information warfare explains and integrates operations involving a diverse collection of actors and media within a single framework. The theory is centered on the value of information resources and on "win-lose" operations that affect that value. Offensive and defensive information warfare is expressed in terms of actors, targets, methods, technologies, outcomes, policies, and laws. Information warfare can target or exploit any type of information medium--physical environments, print and storage media, broadcast media, telecommunications, and computers and computer networks.
+
*The theory of information warfare explains and integrates operations involving a diverse collection of actors and media within a single framework. The theory is centered on the value of information resources that hold information and on "win-lose" operations that affect that value. Offensive and defensive information warfare is expressed in terms of actors, targets, methods, technologies, outcomes, policies, and laws. Information warfare can target or exploit any type of information resources--physical environments, print and storage media, broadcast media, telecommunications, and computers and computer networks.
 
==Diagram/schematic of theory==
 
==Diagram/schematic of theory==
 
==Originating author(s)==
 
==Originating author(s)==
 
*Dorothy Elizabeth Robling Denning
 
*Dorothy Elizabeth Robling Denning
 
==Seminal articles==
 
==Seminal articles==
*Denning, D. E. R. (1999). Information warfare and security (8th ed.). MA, USA: ACM Press Books.
+
*Denning, D. E. (1999). Information warfare and security (8th ed.). MA, USA: ACM Press Books.
 
==Originating area==
 
==Originating area==
*Organisation theory, military strategy
+
*Computer science
 
==Level of analysis==
 
==Level of analysis==
 
*Organisation
 
*Organisation
 
==Links to WWW sites describing theory==
 
==Links to WWW sites describing theory==
*
+
*N/A
 
==Links from this theory to other theories==
 
==Links from this theory to other theories==
*
+
*N/A
 
==IS articles that use the theory==
 
==IS articles that use the theory==
*
+
*Brumley, L., Kopp, C., & Korb, K. B. (2012). Cutting Through the Tangled Web: An Information-Theoretic Perspective on Information Warfare. Air Power Australia Analyses, 9(2), 1.
 +
*Dollens, J. T. (2002). Computer System Self-Defense Through Object Self/Non-Self Recognition (Doctoral dissertation, Nova Southeastern University).
 +
*Horne, C. A., Ahmad, A., & Maynard, S. B. (2016). A theory on information security. Paper presented at the The 27th Australasian Conference on Information Systems, Wollongong, Australia.
 +
*Thompson P., Cybenko G., Giani A. (2004) Cognitive Hacking. In: Camp L.J., Lewis S. (eds) Economics of Information Security. Advances in Information Security, vol 12. Springer, Boston, MA.
 +
==External links==
 +
*https://en.wikipedia.org/wiki/Dorothy_E._Denning
 +
*http://faculty.nps.edu/dedennin/
 
==Contributor(s)==
 
==Contributor(s)==
*Craig A. Horne
+
*Craig Horne
 
==Date last updated==
 
==Date last updated==
 
*27 July 2018
 
*27 July 2018
 
Please feel free to make modifications to this site. In order to do so, you must register.
 
Please feel free to make modifications to this site. In order to do so, you must register.

Latest revision as of 11:14, 31 July 2018

Acronym

  • N/A

Alternate name(s)

Main dependent construct(s)/factor(s)

  • Information resources

Main independent construct(s)/factor(s)

  • Actors, offensive operations, defensive operations

Concise description of theory

  • The theory of information warfare explains and integrates operations involving a diverse collection of actors and media within a single framework. The theory is centered on the value of information resources that hold information and on "win-lose" operations that affect that value. Offensive and defensive information warfare is expressed in terms of actors, targets, methods, technologies, outcomes, policies, and laws. Information warfare can target or exploit any type of information resources--physical environments, print and storage media, broadcast media, telecommunications, and computers and computer networks.

Diagram/schematic of theory

Originating author(s)

  • Dorothy Elizabeth Robling Denning

Seminal articles

  • Denning, D. E. (1999). Information warfare and security (8th ed.). MA, USA: ACM Press Books.

Originating area

  • Computer science

Level of analysis

  • Organisation

Links to WWW sites describing theory

  • N/A

Links from this theory to other theories

  • N/A

IS articles that use the theory

  • Brumley, L., Kopp, C., & Korb, K. B. (2012). Cutting Through the Tangled Web: An Information-Theoretic Perspective on Information Warfare. Air Power Australia Analyses, 9(2), 1.
  • Dollens, J. T. (2002). Computer System Self-Defense Through Object Self/Non-Self Recognition (Doctoral dissertation, Nova Southeastern University).
  • Horne, C. A., Ahmad, A., & Maynard, S. B. (2016). A theory on information security. Paper presented at the The 27th Australasian Conference on Information Systems, Wollongong, Australia.
  • Thompson P., Cybenko G., Giani A. (2004) Cognitive Hacking. In: Camp L.J., Lewis S. (eds) Economics of Information Security. Advances in Information Security, vol 12. Springer, Boston, MA.

External links

Contributor(s)

  • Craig Horne

Date last updated

  • 27 July 2018

Please feel free to make modifications to this site. In order to do so, you must register.