Rights Contact Login For More Details
- Wiley
More About This Title Information Warfare
- English
English
- English
English
Daniel Ventre is an engineer for CNRS, a researcher for CESDIP, and in charge of courses at the ESSEC Business School. He is the author of a number of articles and works, in France and abroad, on the themes of cyberwar, information warfare, cyberconflict, cybersecurity and cyberdefense.
- English
English
Abbreviations xi
Introduction xvii
Chapter 1 The United States 1
1.1 Information warfare in the 1990s 1
1.2 Information warfare in the 2000s 19
1.3 Other important concepts and reflections 23
1.4 Loss of information control 44
1.5 American concerns 50
Chapter 2 China 53
2.1 The concept of "information warfare": a genesis 54
2.2 The American perspective on Chinese information warfare, modernization and informatization of the PLA 71
2.3 Relations between Beijing and Taipei 102
Chapter 3 India 109
3.1 Entry into information society 109
3.2 Information warfare: development and adoption of the doctrine 112
3.3 Understanding attacks against Indian cyberspace 124
3.4 Indian hackers 132
Chapter 4 Japan 133
4.1 Japanese cyberspace flaws 133
4.2 The challenges of cyberspace security 146
4.3 Information warfare: a specific Japanese approach? 150
Chapter 5 Russia 155
5.1 Estonia–Russia: information warfare? 155
5.2 Doctrines and components of the "information warfare" concept 161
5.3 Potential players of information warfare 171
5.4 The Russia–Georgia conflict: new information warfare? 173
Chapter 6 Singapore 191
6.1 Regional and global economic ambition 191
6.2 Challenges to security 193
6.3 Cyberspace and national security 194
6.4 Singapore armed forces in the information age 200
6.5 Players in information warfare 202
6.6 International cooperation and cyberspace protection 205
Chapter 7 Identifying Aggressors and Acts of Aggression 209
7.1 Statistical data 214
7.2 Attacks against personal information and information warfare 224
7.3 Classification of CNA type aggressions 241
7.4 The players in CNA type aggressions 244
7.5 One weapon amongst others: the virus 250
7.6 Understanding the possible strategies of attackers 252
Chapter 8 An Information Warfare Law? 279
8.1 Warfare and the law 280
8.2 Engaging in and conducting a war 281
8.3 Protecting combatants and non combatants 282
8.4 The challenges of information warfare for international law 284
Conclusion 287
Bibliography 293
Index 301