807
views
0
recommends
+1 Recommend
1 collections
    4
    shares

      Studying business & IT? Drive your professional career forwards with BCS books - for a 20% discount click here: shop.bcs.org

      scite_
       
      • Record: found
      • Abstract: found
      • Conference Proceedings: found
      Is Open Access

      Protecting National Assets against Information Operations in Post-modern World

      Published
      proceedings-article
      Proceedings of the 2nd BCS International IT Conference 2014 (BCSIIT)
      BCS International IT Conference 2014
      9 - 10 March 2014
      Information operations, National defence, Cyber operations, Post-modern confrontations
      Bookmark

            Abstract

            Nations may defend their freedom of Information and availability of their Information and Communications Technology Services by either Isolation or Habituation, which are both applicable but require totally different structures, culture and governance. Information Operations are not only state level measures, but can be utilized at very low levels and by small entities. It requires multilevel preparations of defence executed together in public-private-voluntary sector alliance extending over national borders. Unlike conventional military operations information operations are ongoing at strategic, operational and tactical levels even in peace time.

            Content

            Author and article information

            Contributors
            Conference
            March 2014
            March 2014
            : 1-5
            Affiliations
            [0001]Aalto University

            Finland
            Article
            10.14236/ewic/BCSIIT2014.6
            10353f62-45e3-40ba-bb65-0a5ea736de0d
            © Juha K Mattila et al. Published by BCS Learning and Development Ltd. Proceedings of the 2nd BCS International IT Conference 2014, Abu Dhabi, United Arab Emirates

            This work is licensed under a Creative Commons Attribution 4.0 Unported License. To view a copy of this license, visit http://creativecommons.org/licenses/by/4.0/

            Proceedings of the 2nd BCS International IT Conference 2014
            BCSIIT
            2
            Abu Dhabi, United Arab Emirates
            9 - 10 March 2014
            Electronic Workshops in Computing (eWiC)
            BCS International IT Conference 2014
            History
            Product

            1477-9358 BCS Learning & Development

            Self URI (article page): https://www.scienceopen.com/hosted-document?doi=10.14236/ewic/BCSIIT2014.6
            Self URI (journal page): https://ewic.bcs.org/
            Categories
            Electronic Workshops in Computing

            Applied computer science,Computer science,Security & Cryptology,Graphics & Multimedia design,General computer science,Human-computer-interaction
            Post-modern confrontations,Cyber operations,National defence,Information operations

            Comments

            Comment on this article