364
Views
9
CrossRef citations to date
0
Altmetric
Original Articles

Viewpoint: Information warfare: Hype or reality?

Pages 57-64 | Published online: 05 Feb 2008

References

  • 1998 . presentation at the international conference on “Information Technologies, Security, and Conflict Resolution,” . April 28–30 1998 , Moscow. The origin of this article is a
  • Fialka , John J. 1997 . War by Other Means: Economic Espionage in America , New York : W. W. Norton .
  • May 22 1998 . “The Clinton Administration's Policy on Critical Infrastructure Protection: Presidential Decision Directive 63,” . May 22 , <http://www.ciao.gov/63factsheet.html>.
  • Castells , Manuel . 1996 . The Rise of the Network Society , Maiden, MA, and Oxford : Blackwell .
  • Bell , Daniel . 1973 . The Coming of Post‐Industrial Society: A Venture in Social Forecasting , New York : Basic Books .
  • Rosenbloom , Richard S. and Spencer , William J. , eds. 1996 . Engines of Innovation: U.S. Industrial Research at the End of an Era , Cambridge, MA : Harvard Business School Press .
  • Eriksson , E. Anders . 1999 . “National and International Security in Network Society: The Need to Re‐Invent Military Innovation,” . Militært Tidsskrift , 128 March : 43
  • Alvin and Toffler , Heidi . 1993 . War and Anti‐War: Survival at the Dawn of the Twenty‐First Century , New York : Little, Brown and Company .
  • Arquilla , John and Ronfeldt , David , eds. 1997 . In Athena's Camp: Preparing for Conflict in the Information Age , Santa Monica, CA : RAND .
  • North , Douglass C. and Thomas , Robert Paul . 1973 . The Rise of the Western World: A New Economic History , London : Cambridge University Press .
  • <http://wl.250.telia.com/∼u25000104/vsockeng.html> (<http://wl.250.telia.com/∼u25000104/vsockeng.html>)
  • Arthur , W. Brian . 1996 . “Increasing Returns and the New World of Business,” . Harvard Business Review , 74 July‐August : 100
  • Graham , Bradley . 1998 . “US Studies New Threat: Cyber Attack,” . Washington Post , May 24 : Al
  • Vatis , Mike . 1999 . “The use of the Extranet to combat cyber attacks on national infrastructure,” . keynote address delivered to 3rd Annual SMi Conference on Information Warfare . March 10–11 1999 , London.
  • Arquilla , John and Ronfeldt , David . “Looking Ahead: Preparing for Information‐Age Conflict,” . In In Athena's Camp. Edited by: Arquilla and Ronfeldt .
  • Eriksson , E. Anders and Johansson , Malin . May 1999 . “IT‐relaterade hot i nätverkssamhället: förslag till en svensk proaktiv agenda,” ("IT Related Threats in Network Society: Proposal for a Swedish Proactive Agenda") ” . May , FOA Defence Analysis . mimeo
  • Molander , Roger C. , Riddile , Andrew S. and Wilson , Peter A. 1996 . Strategic Information Warfare: A New Face of War , Santa Monica, CA : RAND .
  • Eriksson , E. Anders , Johansson , Malin , Lewerentz , Birgitta and Mittermaier , Eva . March 1998 . “Information Warfare and National and International Security Challenges in the Information Age,” . March , FOA Defence Analysis . mimeo
  • Mussington , David A. , Wilson , Peter A. and Molander , Roger C. 1998 . Exploring Money Laundering Vulnerabilities through Emerging Cyberspace Technologies: A Caribbean‐Based Exercise , Santa Monica, CA : RAND .
  • The origin of this article is a presentation at the international conference on “Information Technologies, Security, and Conflict Resolution,” Moscow, April 28–30, 1998. I am indebted to the editors and two anonymous reviewers of The Nonproliferation Review and to Malin Johansson for very useful comments and assistance.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.