• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 55
  • 12
  • 4
  • 2
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • Tagged with
  • 96
  • 96
  • 25
  • 19
  • 15
  • 15
  • 14
  • 14
  • 13
  • 12
  • 11
  • 10
  • 10
  • 9
  • 9
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
11

From sticks and stones to zeros and ones the development of computer network operations as an element of warfare : a study of the Palestinian-Israeli cyberconflict and what the United States can learn from the "Interfada"

Wrona, Jacqueline-Marie Wilson. 09 1900 (has links)
The Palestinian-Israeli Cyberconflict erupted in 2000, when Israeli hackers crippled the prime website of Hezbollah by mobilizing pro-Israeli supporters to "bomb" the site with automated floods of electronic mail. In retaliation, Hezbollah rallied pro-Arab supporters for a counter-attack, which soon downed the main Israeli government website and the Israeli Foreign Ministry site. Attacks involving website defacements, denial-of-service, viruses, and Trojan horses occurred by both parties for a span of months, effectively shutting down websites, disrupting Internet service and e-commerce. A study and analysis of the utilization and effects of Computer Network Operations (CNO) between pro-Israeli and pro-Palestinian actors during the al-Aqsa Intifada may highlight current trends in warfare, support the notion that information may level the battlefield, and provide the United States with the means to better protect itself against such attacks in the future. This thesis seeks to collect, classify, analyze, define, and resolve IO/IW; the utilization and effects of CNO during the Al-Aqsa Intifada, and how such analysis can be applied to United States national security.
12

Information warfare targeting : people and processes /

Wang, Kenny NMN. January 2003 (has links) (PDF)
Thesis (M.S. in Systems Engineering)--Naval Postgraduate School, December 2003. / Thesis advisor(s): Dan C. Boger, Raymond Buettner. Includes bibliographical references (p. 49-52). Also available online.
13

Toward an understanding of People's Liberation Army information warfare doctrine /

Tavenner, Carson. January 2000 (has links)
Thesis (M.A.)--University of Washington, 2000. / Includes bibliographical references (p. 104-106). Also available via the Internet.
14

Win the war of ideas a national information architecture /

Kelly, Todd C. January 2006 (has links) (PDF)
Thesis (M.S. in Joint Campaign Planning and Strategy)--Joint Forces Staff College, Joint Advanced Warfighting School, 2006. / "31 May 2006." Electronic version of original print document. Includes bibliographical references.
15

Organizing information operations for the third wave

Risner, Clark H. January 2005 (has links) (PDF)
Thesis (M.S. in Joint Campaign Planning and Strategy)--Joint Forces Staff College, Joint Advanced Warfighting School, 2005. / "13 May 05." Electronic version of original print document. Includes bibliographical references (p. 72-74).
16

Evaluating the claims of network centric warfare

Thomas, Jeffrey Alexander 12 1900 (has links)
Human Systems Integration Report / In response to technological advances, Network Centric Warfare (NCW) emerged as a theory to leverage the technology available in todayâ s world. Advocates of NCW claim that technology will improve information sharing by â â µrobustly networking a forceâ , thereby improving mission effectiveness. This study proposes a methodology with which to test the first tenet of NCW: a robustly networked force improves information sharing. Lessons learned from Human Systems Integration (HSI) demonstrate that in order to improve mission effectiveness, characteristics of both the human and the technology must be considered. As such, the impact of human characteristics and traits on mission effectiveness, as measured by individual and team performance, are assessed using a computer simulation, C3Fire. Results at the individual level suggest that persons scoring high on extraversion and low on pessimism perform better than those scoring low on extraversion and high on pessimism. In contrast, at the team level, homogenous teams as measured by optimism-pessimism perform worse than diverse teams. Results of this thesis provide a methodology with which to examine NCWâ s claims in a laboratory setting. Preliminary evidence demonstrates the need to consider human characteristics and traits in the design and composition of network teams.
17

An analysis of China's information technology strategies and their implications for US national security / An analysis of China's information technology strategies and their implications for US national security Republic of China

Tsai, Wen-Hsiang. 06 1900 (has links)
In the past decades, China's military modernization and economy fast development has increasingly attracted international attention, especially the United States. In addition, the PLA has begun to study the revolution in the military affairs (RMA) by focusing on asymmetric warfare capabilities under high-tech conditions. China definitely believes that asymmetric warfare operations have the advantage of creating a more smart attack style to avoid directly facing U.S. powerful military strength. In summary, asymmetric warfare operations are considered by the PLA as a kind of warfare that combined both the thinking of China's classic military strategist Sun Tzu "using the inferior to defeat the superior" and the demand of the modern information technology such as IW applications. In face of China's development of asymmetric warfare capabilities, the United States must deeply think about how to deal with the threat from China's asymmetric warfare operations, which is gradually becoming the superpower in the world.
18

Terrorist approach to information operations

Emery, Norman E., Earl, Robert S. 06 1900 (has links)
Approved for public release; distribution is unlimited / This thesis provides insight into how terrorist organizations exploit the information environment to achieve their objectives. The study establishes an analytical IO framework, by integrating US military doctrine with a fundamental approach to IO theory. The framework proves useful in examining the IO tools terrorists have assembled and how they implement them to influence their target audiences. The thesis shows that terrorists are, indeed, naturally linked to the information environment by their nature and strategy. Generally speaking, all terrorists employ IO tactically to enhance their operations. However, many organizations have a profound understanding of the information environment and also have the ability to manipulate information to achieve their objectives. Since, terrorist organizations are militarily weaker than the states they face and cannot rely on physical attacks to accomplish their goals, they must adopt an information strategy to achieve their objectives. This thesis emphasizes three primary conclusions: first terrorist conduct violent attacks in the physical environment to enable operations in the information environment. Second, terrorist integrate offensive and defensive IO to survive and appear legitimate to potential supporters and to the state. Finally, terrorists intentionally target four different audiences: opposing, uncommitted, sympathetic, and active to influence their perceptions. / Major, United States Army
19

Redefining attack: taking the offensive against networks

Michael, Robert J., Staples, Zachary H. 03 1900 (has links)
Approved for public release; distribution is unlimited / This thesis done in cooperation with the MOVES Institute / The Information Age empowers individuals, and affords small groups an opportunity to attack states' interests with an increasing variety of tactics and great anonymity. Current strategies to prevail against these emerging threats are inherently defensive, relying on potential adversaries to commit mistakes and engage in detectable behavior. While defensive strategies are a critical component of a complete solution set, they cede initiative to the adversary. Moreover, reactive measures are not suited to quickly suppress adversary networks through force. To address this shortfall in strategic planning, the science of networks is rapidly making clear that natural systems built over time with preferential attachment form scale-free networks. These networks are naturally resilient to failure and random attack, but carry inherent vulnerabilities in their highly connected hubs. Taking the offensive against networks is therefore an exercise in discovering and attacking such hubs. To find these hub vulnerabilities in network adversaries, this thesis proposes a strategy called Stimulus Based Discovery, which leads to rapid network mapping and then systematically improves the accuracy and validity of this map while simultaneously degrading an adversary's network cohesion. Additionally, this thesis provides a model for experimenting with Stimulus Based Discovery in a Multi-Agent System. / Lieutenant, United States Navy
20

Information warfare, cyber-terrorism and community values

Moore, Joe Wesley January 2002 (has links)
No description available.

Page generated in 0.1183 seconds