Title: Cyber conflict at the intersection of information operations
Abstract:Despite a clear awareness of the issue of information warfare and shifting doctrines of information operations, scholars have generally failed to empirically examine the shape and context of actual cy...Despite a clear awareness of the issue of information warfare and shifting doctrines of information operations, scholars have generally failed to empirically examine the shape and context of actual cyber-enabled information operations. Cyber adjunct actions might be the most impactful, but they are surely the minority in the system since Information Operations can be a low-tech operation used to influence an adversary. Cyber actions in this context are done out of the shadows and in the public because they are often meant to reassure a concerned public and demonstrate to the opposition that they have credible capabilities to strike back. The World Anti-Doping Agency report placed the organization firmly in the crosshairs of Russia’s cyber capabilities. Espionage, or manipulative cyber strategy, comes in two forms: short-term espionage is the theft of information and the immediate usage of that information for strategic gain.Read More
Publication Year: 2020
Publication Date: 2020-07-21
Language: en
Type: book-chapter
Indexed In: ['crossref']
Access and Citation
Cited By Count: 4
AI Researcher Chatbot
Get quick answers to your questions about the article from our AI researcher chatbot