首页> 外文期刊>Journal of Information Warfare >Terrorist Use of Information Operations
【24h】

Terrorist Use of Information Operations

机译:恐怖分子利用情报行动

获取原文
获取原文并翻译 | 示例
       

摘要

It is our contention that many terrorist organizations have a profound understanding of the information environment and have the ability to manipulate information to achieve their objectives, inherently viewing operations through an IO lens. To provide insight into how terrorist organizations use Information Operations, to exploit the information environment, we evaluate tactical and strategic examples of terrorist operations using an IO lens based on DoD IO doctrine. This analysis illustrates that terrorists use IO, and that terrorist organizations are naturally linked to the information environment by their nature.
机译:我们认为,许多恐怖组织对信息环境有深刻的了解,并具有操纵信息以实现其目标的能力,可以通过IO镜头固有地查看操作。为了深入了解恐怖组织如何利用信息作战,以利用信息环境,我们使用基于DoD IO学说的IO镜头评估了恐怖行动的战术和战略实例。该分析表明,恐怖分子使用IO,并且恐怖组织自然而然地与信息环境相关联。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号