275
Views
1
CrossRef citations to date
0
Altmetric
Original Articles

Information warfare and sub‐state actors: An organisational approach

Pages 488-503 | Published online: 25 Feb 2009

References

  • Ahvenainen , A. ‘Views on IW’ . SMI Information Warfare Conference . March 26–7 1998 , London.
  • Alberts , D. and Gzerwinski , T.J. , eds. 1997 . Complexity, Global Politics and National Security , Washington, DC : National Defense University .
  • Arquilla , J. and Ronfeldt , D. 1997a . “ ‘Cyberwar is Coming’ ” . In In Athena's Camp: Preparing for Conflict in the Information Age , Edited by: Arquilla , J. and Ronfeldt , D. 23 – 60 . Santa Monica, CA : RAND .
  • _____ . 1997b . “ ‘Information, Power and Grand Strategy: In Athena's Camp — Section I,’ ” . In In Athena's Camp: Preparing for Conflict in the Information Age , Edited by: Arquilla , J. and Ronfeldt , D. 141 – 71 . Santa Monica, CA : RAND .
  • Blank , S. 1997 . “ ‘Preparing for the Next War: Reflections on the Revolution in Military Affairs’ ” . In In Athena's Camp: Preparing for Conflict in the Information Age , Edited by: Arquilla , J. and Ronfeldt , D. 61 – 77 . Santa Monica, CA : RAND .
  • Bureau for International Narcotics and Law Enforcement Affairs . March 1998 . International Narcotics Control Strategy Report (1997) , March , US Department of State . http://www.state.gov/www/global/narcotics__law/1997_narc_report/index.html
  • Campbell , M. 1998 . ‘Britain Fights US in Cyber Wargame’ . Sunday Times , 7 June 1998
  • Clinton , W. 1998 . ‘Clinton Outlines Cyberthreat Plan’ . CNET News.com , 22 May 1998
  • Czerwinski , T.J. 1998 . Coping with the Bounds: Speculations on Nonlinearity in Military Affairs , Washington, DC : National Defense University .
  • DERA . ‘Cyber Terrorist Threats to the UK’ . Conference on Britain and the Revolution in Military Affairs . 25–26 June . University of Hull . 1998
  • Emmett , P. , Corcoran , M. , Ferbrache , D. and Macintosh , J. June 1997 . An Analysis of the Military and Policy Context of Information Warfare , DERA Report CIS3/58/8/5 June ,
  • ERRI . 1997 . ‘Colombian Officials Uncover Drug Cartel Communications Center’ . 31 May 1997, http://www.emergency.com
  • Evers , S. 1997 . ‘Pentagon Wants NSA to Build “Threat”; Database’ . Jane's Defence Weekly , 29 October : 11 1997,
  • Farrell , T. 1996 . ‘Figuring Out Fighting Organisations: The New Organisational Analysis in Strategic Studies’ . Journal of Strategic Studies , 19 ( 1 ) : 122 – 35 .
  • Fitzgerald , M. ‘Russian Views on Electronic and Information Warfare’ . Proceedings of the 3rd International Command and Control Research and Technology Symposiurn . Washington, DC. pp. 126 – 63 . National Defense University .
  • FOA . Swedish—European Workshop on Information Warfare and National and International Security Challenges in the Information Age . 4–26 September . Sweden : FOA . 1997
  • Freedman , L. 1998 . The Revolution in Strategic Affairs , Adelphi Paper 318 London : ISS .
  • Gass , N. and Romet , T. 1998 . “ ‘A Framework for Modelling the Threat of Information Operations and the Infrastructure of a Country’ ” . In Cyberwar 2 , Edited by: Campen , A. and Dearth , D. 345 – 58 . Fairfax, VA : AFCEA .
  • Gray , C. 1986 . Nuclear Strategy and National Style , London : Hamilton Press .
  • Junas , G. 1995 . ‘Angry White Guys with Guns: The Rise of the Citizen Militias’ . Covert Action Quarterly , 23 April 1995, http://nwcitizen.com/publicgood/reports/angryguy.htm
  • Kruyer , P. ‘Recent Developments in Organised Crime’ . Proceedings of InfoWarCon 1997 . May 8–9 1997 , Brussels.
  • Kuehl , D. 1997 . ‘Defining Information Power’ . Strategic Forum , 115 June
  • Kyl , J. 1998 . ‘Military Computer Hackers Eluded Identification for Four Days During February Gulf Tensions’ . press release, 10 June 1998, http://www.emergency.com
  • Malhotra , Y. 1996 . Organizational Learning and Learning Organizations: An Overview http://www.brint.com/papers/orglrng.htm
  • Miles , R.H. 1996 . Corporate Comeback: The Story of Renewal and Transformation at National Semiconductor , Jossey‐Bass Publishers .
  • Molander , R.C. , Riddile , A.S. and Wilson , P. 1996 . Strategic Information Warfare: A New Face of War , Washington, DC : RAND .
  • Office of the Undersecretary of Defense for Acquisition and Technology . November 1996 . Defense Science hoard Task Force on Information Warfare — Defense , November , Washington, DC : Department of Defense .
  • PCCIP (Presidential Commission on Critical Infrastructure Protection) . 1997 . Critical Foundations: Protecting America's Infrastructures , Washington, DC : Government Printing Office .
  • Pillsbury , M. , ed. 1997 . Chinese Views of Future Warfare , Washington, DC : National Defense University .
  • Powell , W.W. and DiMaggio , P.J. , eds. 1991 . The New Institutionalism in Organizational Analysis , Chicago, IL : University of Chicago Press .
  • Rathmell , A. 1997a . ‘Netwar in the Gulf . Jane's Intelligence Review , 9 ( 1 ) January : 29 – 32 .
  • _____ . 1997b . ‘Cyberterrorism: The Shape of Future Conflict?’ . RUSI Journal , 142 ( 5 ) October : 40 – 5 .
  • _____ . 1998 . “ ‘Assessing the IW Capability of Sub‐state Groups’ ” . In Cyberwar 2 , Edited by: Campen , A. and Dearth , D. 295 – 312 . Fairfax, VA : AFCEA .
  • 1998 . RebelWars Spread to Cyberspace, . Reuters , 30 March 1998
  • Ronfeldt , D. 1996 . Tribes, Institutions, Markets, Networks: A Framework About Societal Evolution , Santa Monica, CA : RAND, P‐7967 .
  • Schwartau , W. 1996 . Information Warfare, , 2nd edn , New York : Thunder's Mouth Press .
  • Soo Hoo , K. , Goodman , S. and Greenberg , L. 1997 . ‘Information Technology and the Terrorist Threat’ . Survival , 39 ( 3 ) Autumn : 135 – 55 .
  • Sterling , B. 1992 . The Hacker Crackdown: Law and Disorder on the Electronic Frontier http://www.farcaster.com/sterling/contents.html
  • Swinburne , P. 1998 . ‘Countering Computer Crime’ . Intelligence and International Security , 3 February lecture to ICSA seminar series 1998.
  • Taylor , P. 1997 . Them and Us’ . Computer Underground Digest , 9 ( 59 ) 27 July 1997), http://www‐swiss.ai.mit.edu/6805/articles/taylor‐them‐and‐us.txt
  • Tyrrell , P. ‘The Business of Integrity’ . Proceedings of InfoWarCon 1997 . May 8–9 1997 , Brussels.
  • White House . 22 May 1998 . The Clinton Administration's Policy on Critical Infrastructure Protection: Presidential Decision Directive 63 , (White Paper) 22 May , 1998
  • Williams , P. 1994 . Transnational Criminal Organisations and International Security’ . Survival , 36 ( 1 ) Spring : 96 – 113 .

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.