Access the full text.
Sign up today, get DeepDyve free for 14 days.
R. Molander, P. Wilson (1996)
Strategic information warfare: a new face of war
P. Singer (2018)
Winning the war of words: information warfare in Afghanistan
J. Nye (2018)
How will new cybersecurity norms develop?
D. Ventre (2009)
Information Warfare
H. Farrell (2017)
Analysis | don’t believe what Putin is saying about, ’patriotic’ Russian hackers
(2016)
Comprehensive assistance package for Ukraine
P. Singer, E. Brooking (2018)
What Clausewitz can teach us about war on social media
L. Shen (2018)
Why Facebook suddenly shed $35 billion in value
E. Braw (2018)
How to deal with Russian information warfare? Ask Sweden’s subhunters
(2018)
UN General Assembly – First Committee – Disarmament and International Security
M. Galeotti (2014)
The ’Gerasimov doctrine’ and Russian non-linear war
M. Galeotti (2017)
Russia is punching above its weight
H. Lin, P. Rosenzweig (2018)
Information warfare and cybersecurity are different, related and important
R. Mackey (2014)
Information Warfare – Military History – Oxford Bibliographies – Obo
D. Byers (2017)
Facebook estimates 126 million people were served content from Russia-linked pages
S. Pifer (2016)
Watch out for little green men
J. Zambri (2018)
Why Chinghis Khan matters: reflections on the Mongol way of intelligence
(2010)
War and international humanitarian law
K. Pomeranz (2018)
On China and North Korea: the strength of weakness and the limits of power
G. Keeley (2018)
Combatting Russian information warfare – in the Baltics
J. Nye (2017)
Deterrence and Dissuasion in CyberspaceInternational Security, 41
Daniel Pinkston (2017)
Inter-Korean Rivalry in the Cyber Domain: The North Korean Cyber Threat in the Sŏn’gun EraGeorgetown Journal of International Affairs, 17
G. Miller, A. Entous (2017)
Obama’s secret struggle to punish Russia for Putin’s election assault
(2018)
Overview
A. Abramson (2017)
Vladimir Putin: Russia never interfered in 2016 election
(2018)
Foreign agents registration act
N. Badshah (2018)
Facebook to contact 87 million users affected by data breach
T. Kang (2018)
North Korea’s influence operations, revealed
Information warfare (IW) is a novel and poorly understood threat to the international community, which may be used more commonly as a foreign policy tool in the future. By identifying the key components of modern IW, this paper seeks to formulate policy recommendations for how best to deal with this new threat. The general overview of the topic that this paper provides contributes to current efforts to develop strategies to counter IW operations around the world.Design/methodology/approachThe goal of this paper is to break down the components of modern IW and provide policy recommendations for domestic and international governance on the issue. These recommendations will be based in part of historical initiatives to counter IW and existing literature on cyber governance. Central to the framework used to analyze the cases of Russian and North Korean IW operations are the seven defining features of “strategic” IW established by a 1996 RAND Corporation report, modified to incorporate the importance of cyberspace to cases of IW in the modern day.FindingsModern IW presents a new, multifaceted threat to states. Because of the value of IW as a tool by weaker states to counter stronger ones and the weakness of existing legal and normative frameworks, use of IW can be expected to be increasingly common. States can take action to promote international governance on the issue and develop policy frameworks for protecting themselves against IW.Practical implicationsIW has historically been a very tricky tactic to define and identify. By analyzing IW’s basic features, this paper provides a framework for breaking down IW into its component parts, which reveals valuable policy implications. Preventative efforts against IW can help restore trust to global information networks and lower the risk of conflict.Originality/valueFormal scholarship on modern IW and related subjects is lacking in comparison with higher visibility threats. Increased awareness of this issue, especially amongst civilian leaders, can augment global efforts to counter IW.
foresight – Emerald Publishing
Published: Sep 5, 2019
Keywords: Internet; Information media; Cybersecurity; Private sector organizations; Information warfare; Legal frameworks
Read and print from thousands of top scholarly journals.
Already have an account? Log in
Bookmark this article. You can see your Bookmarks on your DeepDyve Library.
To save an article, log in first, or sign up for a DeepDyve account if you don’t already have one.
Copy and paste the desired citation format or use the link below to download a file formatted for EndNote
Access the full text.
Sign up today, get DeepDyve free for 14 days.
All DeepDyve websites use cookies to improve your online experience. They were placed on your computer when you launched this website. You can change your cookie settings through your browser.