scholarly journals Novel Interpretation of Information Operations in Today’s Changed Operational Environment

2020 ◽  
Vol 25 (2) ◽  
pp. 93-102
Author(s):  
Zsolt Haig

AbstractThe study presents a novel interpretation of information operations due to changes of military operations and operational environment. It analyses the concepts of information operations of NATO and the great powers. Based on these, it creates a comprehensive definition of information operations and categorizes their capabilities. The paper presents the interaction between the technical and cognitive capabilities of information operations and the role and weight of these capabilities in traditional military operations and during the 4th generation military operations in a civilian environment.

2018 ◽  
Vol 50 (4) ◽  
pp. 25-34 ◽  
Author(s):  
Eduard A. Manziuk ◽  
Alexander V. Barmak ◽  
Yuriy V. Krak ◽  
Veda S. Kasianiuk

2018 ◽  
Vol 28 (6) ◽  
pp. 1855-1864
Author(s):  
Olga Zoric ◽  
Katarina Jonev ◽  
Ivan Rancic

The author starts from the informational dimension of the operational environment in a strategic reality and deal with the problem of defining informational power from the theoretical and practical aspect of information warfare.The deliberations in the work are aimed to initiate a procedure for auditing of the security documents in order to create a legal basis for the operationalization of the content of information security, as one of the aspects of integral security of the Republic of Serbia. The paper deals with the conceptual determinations and importance of information, information warfare and information operations, as well as the content of information warfare, pointing out the strategic and doctrinal definitions of the information warfare of the United States of America, the Russian Federation and the Republic of Serbia. It is necessary to accurately and objectively observe world achievements in the field of national security and the relation of the most powerful world powers to the problem of information warfare. Based on a comparative analysis of world trends and the state of the theoretical and practical aspects of information security of the Republic of Serbia, the focus is on work, where measures are proposed to improve the security function in the fourth unit of work.


2019 ◽  
Vol 17 (3) ◽  
pp. 65-77
Author(s):  
Martin Dahl

When the political camp centred on the Law and Justice party (PiS) came to power in 2015, it led to a change in priorities in Polish foreign policy. The Three Seas Initiative (TSI), understood as closer cooperation between eastern states of the European Union in the area between the Baltic, Adriatic, and Black seas, has become a new instrument of foreign policy. The initiative demonstrates the growing importance of Central and Eastern Europe in the global game of great powers. The region has become a subject of rivalry, not only between the United States and Russia but also China. Therefore, the main objective of this article is to try to describe the importance of the region to Germany and how Germany’s stance on the TSI has evolved. The article consists of three parts, an introduction to the issues, the genesis of the TSI, and the definition of goals set by the states participating in this initiative, as well as analysis of the German stance towards the initiative since its development in 2015. The theories of geopolitics and neorealism are used as the theoretical basis for the analysis.


Author(s):  
Roman V. Belavkin ◽  
Panos M. Pardalos ◽  
Jose C. Principe ◽  
Ruslan L. Stratonovich

2016 ◽  
Vol 18 (1) ◽  
Author(s):  
Adeniji K. Adesemowo ◽  
Rossouw Von Solms ◽  
Reinhard A. Botha

Background: With the evolution of data, via information into knowledge and beyond, intangible information assets (seen as an integral part of IT assets in this article) increasingly come to fore. A contemporary issue facing organisations in the knowledge economy and beyond is how best to safeguard and derive optimum value from their evolving information assets. A well-known fact is that risk exists because there is the possibility of threats to an asset. Likewise, no assets equals no risk. Although a large body of work is addressing threat models, the nature of the assets of the knowledge economy and beyond has not been well researched.Objectives: To investigate the definition of information assets across a number of financial, risk and information technology standards, frameworks and regulations, in order to ascertain whether a coherent definition exists across the board. If there is none (or limited), then propose a workable definition that is apt for the knowledge economy and beyond.Method: Qualitative thematic content analysis and a comparative study based on four main themes (Assets, Types of Asset, Information, and Information Assets). This then serves as a basis for argumentation schemes that lead to a proposed re-definition. The qualitative research approach assists us to address the concern of the incoherent definition of information and information assets across the board.Results: Contrary to expectations, the research study found the current definition to be incoherent. When the asset to be controlled is not properly defined and understood, it stands the risk of not being identified properly. This implies that the effectiveness, efficiency, reliability of internal control, and compliance with the applicable legislation and regulations would not be appropriate. This article highlights the need for a fundamental shift in how information assets (valuable, but unvalued organisational intangible assets) are being viewed and treated, especially with regard to information risk and internal controls.Conclusion: This article has identified a major defect in most standards, frameworks, and regulations dealing with regard to the safeguarding and management of information assets (and IT assets). It has established from the review carried out that information assets have not been properly defined across the board. Beyond this significant finding, it was further shown that the principle of risk (assessment) across the board requires the identification of the asset that needs to be controlled. A starting point, then, is a coherent definition (as proposed) for the information asset in itself. Therefore, proper definition across the board might assists in proper identification that could result in appropriate control and graceful handling of the end-of-life disposal.Keywords: infonomics; information asset; information risk; internal control; reputation loss


2001 ◽  
Vol 49 ◽  
pp. 105-125 ◽  
Author(s):  
Ruth Garrett Millikan

‘According to informational semantics, if it's necessary that a creature can't distinguish Xs from Ys, it follows that the creature can't have a concept that applies to Xs but not Ys.’ (Fodor, 1994, p. 32)There is, indeed, a form of informational semantics that has this verificationist implication. The original definition of information given in Dretske'sKnowledge and the Flow of Information(1981, hereafter KFI), when employed as a base for a theory of intentional representation or ‘content,’ has this implication. I will argue that, in fact, most of what an animal needs to know about its environment is not available as natural information of this kind. It is true, I believe, that there is one fundamental kind of perception that depends on this kind of natural information, but more sophisticated forms of inner representation do not. It is unclear, however, exactly what ‘natural information’ is supposed to mean, certainly in Fodor's, and even in Dretske's writing. In many places, Dretske seems to employ a softer notion than the one he originally defines. I will propose a softer view of natural information that is, I believe, at least hinted at by Dretske, and show that it does not have verificationist consequences. According to this soft informational semantics, a creature can perfectly well have a representation of Xs without being able to discriminate Xs from Ys.


Author(s):  
Volodymyr Kotsyuruba ◽  
Ruslan Cherevko

At the current stage of the reformation of the Armed Forces of Ukraine in the context of the operation of the United Nations (Anti-Terrorist Operation (ATO)), there was a need to increase the effectiveness of the use of troops without increasing the cost of the resource. In the context of increasing capabilities of the armies of the leading countries in the world to investigate and defeat the forces of the opposite side, the problem of maintaining and restoring combat capability in the course of hostilities is very acute. One of the important components that determines combat capability is the maneuverability of the control points (PU). In the course of the defense, the problem of increasing the survivability of the PU system is important because the forces of the opposite side, with the onset of aggression, will try, first of all, to dismantle the PU using modern means of defeat and the massive use of high-precision weapons (WTZ), as well as aircraft and artillery strikes, electronic information and information fight, the use of sabotage and reconnaissance groups and tactical airborne troops to disrupt the control of defending troops. Important importance of the ability to timely carry out maneuver (organized movement) of PU and its elements into a new area in the preparation and in the course of military operations. The traditional approach to ensuring the survivability of PU does not allow to ensure the proper stability of their functioning. There is an objective necessity in the development of such a mathematical model of maneuverability, which in its characteristics would meet the dynamically increasing requirements of the control system of troops in the difficult conditions of projected operations. To ensure the quality management of military units, various measures to ensure the survivability of PU are considered. The article outlines approaches to the definition of indicators of estimation of maneuverability of PU and methods of their calculation. The research is carried out in modern conditions of combat operations, taking into account the movement of the line of the combat collision of the parties and the disclosure of the PU to the enemy's intelligence.


2020 ◽  
Vol 79 (4) ◽  
pp. 32-38
Author(s):  
І. Д. Казанчук ◽  
В. П. Яценко

Based on the analysis of scientific concepts and legal principles the author has provided the definition of information security, provision of information security in Ukraine and has characterized its components. The current state of legal regulation of the organization and activity of cyberpolice units of the National Police of Ukraine has been analyzed. Particular attention has been paid to the legal analysis of the tasks, functions and structure of the Cyberpolice Department of the National Police of Ukraine. Special attention has been drawn to certain shortcomings of Ukrainian legislation in the field of ensuring information security by the police, its compliance with the norms and standards of international law. Taking into account the specifics of the tasks, the author has provided characteristics of the functions of cyberpolice units in the information sphere, which should be divided according to the purpose into: 1) basic (external), which are focused on law enforcement and preventive aspects; 2) auxiliary (intrasystem), which are focused on promoting the implementation of basic functions, the introduction of appropriate management mechanisms within the system. It has been stated that the modern system of ensuring information security and cybersecurity in Ukraine should be one effective system, consisting of such mandatory components as legal, educational and technical. It has been concluded that in order to improve the legal principles for the organization and activities of cyberpolice units of the National Police in the field of ensuring information security and counteracting cyber threats, first of all, it is necessary to optimize the organizational structure of cyberpolice, reasonably distribute the functions (powers) between cyberpolice units and other subjects combating cyber threats in Ukraine, to create appropriate conditions for reaching a qualitatively new level of interaction between them and coordination of their activities in the field of ensuring information security in modern conditions.


Sign in / Sign up

Export Citation Format

Share Document