Search the World's Largest Database of Information Science & Technology Terms & Definitions
InfInfoScipedia LogoScipedia
A Free Service of IGI Global Publishing House
Below please find a list of definitions for the term that
you selected from multiple scholarly research resources.

What is Information Warfare

World Politics and the Challenges for International Security
Attacks on an adversary’s telecommunications and computer networks to degrade the technological systems vital to its defense and economic well-being.
Published in Chapter:
Terrorist Psychology and Its Impact on International Security
Ketevan Chakhava (International Black Sea University, Georgia)
Copyright: © 2022 |Pages: 21
DOI: 10.4018/978-1-7998-9586-2.ch007
Abstract
Terrorism is a policy based on the systematic use of terror. Despite the legal force of the term “terrorism,” its definition up to the present time remains ambiguous. But experts agree that the best definition of terrorism is the achievement of political, ideological, economic, and religious goals by violent means. Synonyms of the word “terror” are the words “violence” and “intimidation.” This term became widespread in various countries after the “Age of Terror” during the Great French Revolution. During the discussion about terrorism, one of the main directions of this phenomenon represents terrorist psychology. Thus, in the chapter, the main attention is paid to the psychological aspects of terrorism, including the determination of the main types of terrorism and the psychological characteristics of the terrorists and terrorist groups.
Full Text Chapter Download: US $37.50 Add to Cart
More Results
The Ethics of Deception in Cyberspace
Warfare attacking computers and networks, usually by software exploits.
Full Text Chapter Download: US $37.50 Add to Cart
Information-Cyberspace Operations in Real-World Politics
Attacks on an adversary’s telecommunications and computer networks to degrade the technological systems vital to its defense and economic well-being.
Full Text Chapter Download: US $37.50 Add to Cart
The Danger Social Media Poses to National Sovereignty and Global Security
In a global information environment, this represents a conflict promulgated by the consistent and prolonged spreading of knowingly false information in order to achieve a political, military or other objective. Information warfare has been used in many world conflicts to keep populations aligned with the desires of al specific faction.
Full Text Chapter Download: US $37.50 Add to Cart
War in Ukraine and US: Russian Information Warfare – A Comparative Analysis
Any action to Deny, Exploit, Corrupt, or Destroy the enemy's information and its functions; protecting ourselves against those actions and exploiting our military information functions.
Full Text Chapter Download: US $37.50 Add to Cart
Cyber Intelligence and Security: State of the Art
It is a concept involving the battlespace use and management of information and communication technology (ICT) in pursuit of a competitive advantage over an opponent (Wikipedia). It is an emerging asymmetric threat that forces us to innovate our security approach.
Full Text Chapter Download: US $37.50 Add to Cart
Global Security and Political Problems of the 21st Century
Attacks on an adversary’s telecommunications and computer networks to degrade the technological systems vital to its defense and economic well-being.
Full Text Chapter Download: US $37.50 Add to Cart
Origin of Cyber Warfare and How the Espionage Changed: A Historical Overview
It is a concept involving the battlespace use and management of information and communication technology (ICT) in pursuit of a competitive advantage over an opponent. It is an emerging asymmetric threat that forces us to innovate our security approach.
Full Text Chapter Download: US $37.50 Add to Cart
From Pen and Paper to Pixels: Challenges and Opportunities of Digital Diplomacy
This term describes the use of information and misinformation as a tool to influence public opinion, policy decisions, and diplomatic relations. It involves the deliberate spreading of false or misleading information to weaken an adversary’s position or enhance one’s own strategic interests.
Full Text Chapter Download: US $37.50 Add to Cart
Problems of Terrorism in the Modern World
Attacks on an adversary’s telecommunications and computer networks to degrade the technological systems vital to its defense and economic well-being.
Full Text Chapter Download: US $37.50 Add to Cart
eContent Pro Discount Banner
InfoSci OnDemandECP Editorial ServicesAGOSR