Spelling suggestions: "subject:"forminformation warfare"" "subject:"forminformation carfare""
21 |
Towards the development of a defensive cyber damage and mission impact methodologyFortson, Larry W., January 1900 (has links)
Thesis (M.S.)--Air Force Institute of Technology, 2007. / AFIT/GIR/ENV/07-M9. Title from title page of PDF document (viewed on: Nov. 29, 2007). "March 2007." Includes bibliographical references (leaves 226-237).
|
22 |
Who networks? The social psychology of virtual communities /Kinniburgh, James B. January 2004 (has links) (PDF)
Thesis (M.S. in Defense Analysis)--Naval Postgraduate School, June 2004. / Thesis advisor(s): Dorothy Denning. Includes bibliographical references (p. 125-130). Also available online.
|
23 |
Confronting cyberterrorism with cyber deception /Tan, Kheng Lee Gregory. January 2003 (has links) (PDF)
Thesis (M.S. in Computer Science)--Naval Postgraduate School, December 2003. / Thesis advisor(s): Neil C. Rowe, Dorothy E. Denning. Includes bibliographical references (p. 63-70). Also available online.
|
24 |
A terrorist approach to information operations /Earl, Robert S. Emery, Norman E. January 2003 (has links) (PDF)
Thesis (M.S. in Defense Analysis)--Naval Postgraduate School, June 2003. / Thesis advisor(s): Dorothy Denning, Raymond Buettner. Includes bibliographical references (p. 141-148). Also available online.
|
25 |
Information warfare, cyber-terrorism and community valuesMoore, Joe Wesley January 2002 (has links)
Information Warfare involves the attack and defense of information and information systems, both in time of armed conflict and in operations short of war. While information technology provides the promise of a new class of less lethal military instruments, it also presents vulnerabilities occasioned by widespread dependence on an increasingly complex and interconnected global information infrastructure. These vulnerabilities, when exploited by those who would target civilians in order to inspire widespread fear in hopes of accomplishing a political agenda, can be understood as cyber-terrorism. / As information warfare techniques evolve, those employing them should look to several relevant sources for normative guidance. Relevant, internationally shared values can be found in international custom, the U.N. Charter, treaties dealing with the subject of "cybercrime," those governing the communication media likely to be utilized by information warriors, UNGA Resolutions and those treaties and customary norms that make up the Law of Armed Conflict.
|
26 |
The special operations : cyberspace nexus /Benoit, Marcel L. January 2008 (has links)
Thesis (M.S.)--School of Advanced Air and Space Studies, 2008. / "June 2008." Vita. Includes bibliographical references (l. 73-77). Also available via the Internet.
|
27 |
China's development of asymmetric warfare and the security of Taiwan, Republic of China /Jinn, Guo-Woei. January 2004 (has links) (PDF)
Thesis (M.S. in Defense Analysis)--Naval Postgraduate School, Dec. 2004. / Thesis Advisor(s): Lyman Miller. Includes bibliographical references (p. 79-85). Also available online.
|
28 |
Evaluation of the Littoral Combat Ship (LCS) and SPARTAN SCOUT as Information Operations (IO) assets /Bromley, Joseph M. January 2005 (has links) (PDF)
Thesis (M.S. in Information Systems and Operations)--Naval Postgraduate School, March 2005. / Thesis Advisor(s): Michael T. McMaster. Includes bibliographical references (p. 59-62) Also available online.
|
29 |
The principles of war valid yesterday, today, and tomorrow /Harrelson, Lonnie R. January 2005 (has links) (PDF)
Thesis (M.S. in Joint Campaign Planning and Strategy)--Joint Forces Staff College, Joint Advanced Warfighting School, 2005. / "25 May 05." Electronic version of original print document. Includes bibliographical references (p. 77-80).
|
30 |
FORCEnet an analysis of the Trident Warrior 2003 exerciseLagana, John P. 09 1900 (has links)
Approved for public release; distribution is unlimited / Since the country has moved into the Information Age, the military forces have been moving towards network based operations. The rapid expansion of the internet and information technology (IT) has led to the emerging theory of Network- Centric Warfare (NCW). The Naval Services instantiation of NCW is FORCEnet. "FORCEnet is the "glue" that binds together Sea Strike, Sea Shield, and Sea Basing. It is the operational construct and architectural framework for naval warfare in the Information Age, integrating warriors, sensors, command and control, platforms, and weapons into a networked, distributed combat force. FORCEnet will provide the architecture to increase substantially combat capabilities through aligned and integrated systems, functions, and missions. Sea Power 21 is a comprehensive attempt to address the ramifications of the Information Age revolution. The framework of the Sea Power 21 vision is composed of the following elements: Sea Basing, Sea Shield and Sea Strike. The enabler of this vision or the "glue" that holds it all together is FORCEnet. FORCEnet is "the operational construct and architectural framework of naval warfare in the information age that integrates Warriors, sensors, networks, command and control, platforms, and weapons into a networked, distributed combat force that is scaleable across all levels of conflict from seabed to space and sea to land." The Trident Warrior 03 exercise was then developed as a means to measure its success and to acquire data from which future exercises can be measured against. FORCEnet is still in its infancy and many people have different views on what exactly it is and how it should be implemented to achieve those goals. The intent of this thesis was not to answer those questions per se, but provide a realistic analysis of what worked during the TW03 exercise and what did not. This should provide a baseline for further Trident Warrior exercises so as to avoid the same mistakes in the future. The military has a ways to go before it can fully realize a truly networked-centric armed forces, but TW03 was the beginning and the lessons learned from it will pay dividends in realizing that fully networked goal. / Major, United States Marine Corps
|
Page generated in 0.0911 seconds