-
2
-
-
0347005214
-
Introduction to information warfare
-
in Schwartau, W. (Ed.) 2nd ed., Thunder’s Mouth Press, New York, NY
-
Alger, J.I. (1996), “Introduction to information warfare”, in Schwartau, W. (Ed.), Information Warfare, Cyberterrorism: Protecting your Personal Security in the Information Age, 2nd ed., Thunder’s Mouth Press, New York, NY, pp. 8-14.
-
(1996)
Information Warfare, Cyberterrorism: Protecting your Personal Security in the Information Age
, pp. 8-14
-
-
Alger, J.I.1
-
3
-
-
0004146178
-
-
RAND, Santa Monica, CA
-
Arquila, J. and Ronfeldt, D. (1996), The Advent of Netwar, RAND, Santa Monica, CA.
-
(1996)
The Advent of Netwar
-
-
Arquila, J.1
Ronfeldt, D.2
-
4
-
-
0003560913
-
-
Special Anniversary Edition with Foreword, 1999, Basic Books, New York, NY
-
Bell, D. (1973), The Coming of Post-industrial Society: A Venture in Social Forecasting, Special Anniversary Edition with Foreword, 1999, Basic Books, New York, NY.
-
(1973)
The Coming of Post-industrial Society: A Venture in Social Forecasting
-
-
Bell, D.1
-
5
-
-
33748605277
-
Computer security – an end state?
-
Bellovin, S.M. (2001), “Computer security – an end state?”, Communications of the ACM, Vol. 44 No. 3, pp. 131-2.
-
(2001)
Communications of the ACM
, vol.44
, Issue.3
, pp. 131-132
-
-
Bellovin, S.M.1
-
6
-
-
84899295590
-
Information warfare: time to prepare
-
a available at:
-
Berkowitz, B. (2000a), “Information warfare: time to prepare”, Issues in Science & Technology Online, Winter, available at: http://www.nap.edu/issues/17.2/berkowitz.htm
-
(2000)
Issues in Science & Technology Online
, vol.Winter
-
-
Berkowitz, B.1
-
7
-
-
84937326640
-
War logs on
-
b
-
Berkowitz, B.D. (2000b), “War logs on”, Foreign Affairs, Vol. 79 No. 3, pp. 8-12.
-
(2000)
Foreign Affairs
, vol.79
, Issue.3
, pp. 8-12
-
-
Berkowitz, B.D.1
-
8
-
-
0344008584
-
-
Butterworth Heinemann, Boston, MA
-
Boni, W. and Kovacich, G.L. (2000), Netspionage: The Global Threat to Information, Butterworth Heinemann, Boston, MA.
-
(2000)
Netspionage: The Global Threat to Information
-
-
Boni, W.1
Kovacich, G.L.2
-
9
-
-
0031673674
-
Catapults and grappling hooks: the tools and techniques of information warfare
-
Boulanger, A. (1998), “Catapults and grappling hooks: the tools and techniques of information warfare”, IBM Systems Journal, Vol. 37 No. 1, pp. 106-14.
-
(1998)
IBM Systems Journal
, vol.37
, Issue.1
, pp. 106-114
-
-
Boulanger, A.1
-
10
-
-
0009332651
-
Extremism and the Internet
-
The British Library, London
-
Brophy, P., Craven, J. and Fisher, S. (1999), “Extremism and the Internet”, British Library Research & Innovation Report 145, The British Library, London.
-
(1999)
British Library Research & Innovation Report 145
-
-
Brophy, P.1
Craven, J.2
Fisher, S.3
-
11
-
-
0032342807
-
Community without propinquity revisited: communication technology and the transformation of the urban public sphere
-
Calhoun, C. (1998), “Community without propinquity revisited: communication technology and the transformation of the urban public sphere”, Sociological Inquiry, Vol. 68, pp. 373-97.
-
(1998)
Sociological Inquiry
, vol.68
, pp. 373-397
-
-
Calhoun, C.1
-
12
-
-
0012704777
-
-
AFCEA International Press, Fairfax, VA
-
Campen, A.D., Dearth, D.H. and Goodden, R.T. (Eds), (1996), Cyberwar: Security, Strategy and Conflict in the Information Age, AFCEA International Press, Fairfax, VA.
-
(1996)
Cyberwar: Security, Strategy and Conflict in the Information Age
-
-
Campen, A.D.1
Dearth, D.H.2
Goodden, R.T.3
-
14
-
-
0039456088
-
Internet privacy concerns confirm the case for intervention
-
Clarke, R. (1999), “Internet privacy concerns confirm the case for intervention”, Communications of the ACM, Vol. 42 No. 2, pp. 60-7.
-
(1999)
Communications of the ACM
, vol.42
, Issue.2
, pp. 60-67
-
-
Clarke, R.1
-
15
-
-
0012716505
-
Strategic intelligence and networked business
-
a
-
Cronin, B. (2000a), “Strategic intelligence and networked business”, Journal of Information Science, Vol. 26 No. 4, pp. 131-6.
-
(2000)
Journal of Information Science
, vol.26
, Issue.4
, pp. 131-136
-
-
Cronin, B.1
-
16
-
-
0002595025
-
Raising the intelligence stakes: corporate information warfare and strategic surprise
-
b
-
Cronin, B. and Crawford, H. (1999b), “Raising the intelligence stakes: corporate information warfare and strategic surprise”, Competitive Intelligence Review, Vol. 10 No. 3, pp. 58-66.
-
(1999)
Competitive Intelligence Review
, vol.10
, Issue.3
, pp. 58-66
-
-
Cronin, B.1
Crawford, H.2
-
17
-
-
0033212218
-
Information warfare: its application in military and civilian contexts
-
Cronin, B. and Crawford, H. (1999), “Information warfare: its application in military and civilian contexts”, The Information Society, Vol. 15 No. 4, pp. 257-63.
-
(1999)
The Information Society
, vol.15
, Issue.4
, pp. 257-263
-
-
Cronin, B.1
Crawford, H.2
-
18
-
-
85032109735
-
Out to get you
-
97
-
Crush, P. (2000), “Out to get you”, Management Today, November, pp. 94-95, 97.
-
(2000)
Management Today
, vol.November
, pp. 94-95
-
-
Crush, P.1
-
19
-
-
0035981393
-
Intelligence, information technology and information warfare
-
in Cronin, B. (Ed.) Information Today Inc./ASIST (in press) Medford, NJ
-
Davies, P.H.J. (2001), “Intelligence, information technology and information warfare”, in Cronin, B. (Ed.), Annual Review of Information Science & Technology, Information Today Inc./ASIST (in press), Vol. 36. Medford, NJ.
-
(2001)
Annual Review of Information Science & Technology
, vol.36
-
-
Davies, P.H.J.1
-
22
-
-
84937188751
-
Hiding crimes in cyberspace
-
Denning, D.E. and Baugh, W.E. (1999), “Hiding crimes in cyberspace”, Information, Communication & Society, Vol. 2 No. 3, pp. 251-76.
-
(1999)
Information, Communication & Society
, vol.2
, Issue.3
, pp. 251-276
-
-
Denning, D.E.1
Baugh, W.E.2
-
24
-
-
84897106023
-
Social movement networks virtual and real
-
Diani, M. (2000), “Social movement networks virtual and real”, Information, Communication & Society, Vol. 3 No. 3, pp. 386-401.
-
(2000)
Information, Communication & Society
, vol.3
, Issue.3
, pp. 386-401
-
-
Diani, M.1
-
25
-
-
77949715066
-
You have been misinformed –Now what?: Attacking dangerous data
-
24, 26-30
-
Ebbinghouse, C. (2001), “You have been misinformed –Now what?: Attacking dangerous data”, Searcher, April, pp. 20, 22, 24, 26-30.
-
(2001)
Searcher
, vol.April
, pp. 20-22
-
-
Ebbinghouse, C.1
-
26
-
-
85032112445
-
Anti-torture.net
-
Ellis, C. (2001), “Anti-torture.net”, Wired, Vol. 9 No. 2, p. 80.
-
(2001)
Wired
, vol.9
, Issue.2
, pp. 80
-
-
Ellis, C.1
-
27
-
-
85032092540
-
Information zones
-
Fallows, J. (2001), “Information zones”, The Industry Standard, 9 April, pp. 32-3.
-
(2001)
The Industry Standard
, vol.9 April
, pp. 32-33
-
-
Fallows, J.1
-
29
-
-
0002008118
-
You could get raped: the inside story of one young woman’s terrifying ordeal at the hands of a cyberstalker
-
Foote, D. (1999), “You could get raped: the inside story of one young woman’s terrifying ordeal at the hands of a cyberstalker”, Newsweek, 8 February, pp. 64-5.
-
(1999)
Newsweek
, vol.8 February
, pp. 64-65
-
-
Foote, D.1
-
30
-
-
0347005207
-
Tampon terrorism
-
Fumento, M. (1999), “Tampon terrorism”, Forbes, 17 May, pp. 170, 172.
-
(1999)
Forbes
, vol.17 May
, pp. 170-172
-
-
Fumento, M.1
-
31
-
-
85032132778
-
Boeing’s big move
-
43, 45, 47
-
Gates, D. (2001), “Boeing’s big move”, The Industry Standard, 2 April, pp. 40-41, 43, 45, 47.
-
(2001)
The Industry Standard
, vol.2 April
, pp. 40-41
-
-
Gates, D.1
-
32
-
-
0034257531
-
The ethics of hacktivism
-
Goodrum, A. and Manion, M. (2000), “The ethics of hacktivism”, Journal of Information Ethics, Vol. 9 No. 2, pp. 51-9.
-
(2000)
Journal of Information Ethics
, vol.9
, Issue.2
, pp. 51-59
-
-
Goodrum, A.1
Manion, M.2
-
34
-
-
0009452834
-
Intelligence and the problem of strategic surprise
-
in Dearth, D.H. and Goodden, R.T. (Eds) 2nd ed., US Army War College/ Defense Intelligence Agency, Washington, DC
-
Handel, M.I. (1995), Intelligence and the problem of strategic surprise, in Dearth, D.H. and Goodden, R.T. (Eds), Strategic Intelligence: Theory and Application, 2nd ed., US Army War College/ Defense Intelligence Agency, Washington, DC, pp. 213-61.
-
(1995)
Strategic Intelligence: Theory and Application
, pp. 213-261
-
-
Handel, M.I.1
-
35
-
-
0034257304
-
Flexible infections: computer viruses, human bodies, nation-states, evolutionary capitalism
-
Helmreich, S. (2000), “Flexible infections: computer viruses, human bodies, nation-states, evolutionary capitalism”, Science, Technology, & Human Values, Vol. 25 No. 4, pp. 472-91.
-
(2000)
Science, Technology, & Human Values
, vol.25
, Issue.4
, pp. 472-491
-
-
Helmreich, S.1
-
37
-
-
85007792208
-
Where hath our intelligence been?”, The Revolution in Military Affairs
-
Herman, M. (1998), “Where hath our intelligence been?”, The Revolution in Military Affairs, RUSI Journal, Vol. 143 No. 6, pp. 62-8.
-
(1998)
RUSI Journal
, vol.143
, Issue.6
, pp. 62-68
-
-
Herman, M.1
-
38
-
-
0006839294
-
-
see the 11 December issue for an extended assessment of information security issues.
-
The Industry Standard (2001), see the 11 December issue for an extended assessment of information security issues.
-
(2001)
The Industry Standard
-
-
-
40
-
-
0346219537
-
-
National Defense University, Washington, DC
-
Johnson, S.E. and Libicki, M.C. (1996), Dominant Battlespace Knowledge, National Defense University, Washington, DC.
-
(1996)
Dominant Battlespace Knowledge
-
-
Johnson, S.E.1
Libicki, M.C.2
-
41
-
-
0009841933
-
-
available at:
-
Joint Information Systems Committee (2001), Developing an Information Security Policy, available at: http://www.nacic.gov/reports/fy00.htm
-
(2001)
Developing an Information Security Policy
-
-
-
42
-
-
0345744194
-
-
quoted in Thrasher R.D. (compiler) available at:
-
King, K. (1996), quoted in Thrasher R.D. (compiler), Information Warfare Delphi: Raw Results, available at: http:/all.net/books/iw/delphi/top.html
-
(1996)
Information Warfare Delphi: Raw Results
-
-
King, K.1
-
43
-
-
0009378890
-
Murder by Internet
-
266-71.
-
Kirsner, S. (1998), “Murder by Internet”, Wired, Vol. 6 No. 12, pp. 210-16, 266-71.
-
(1998)
Wired
, vol.6
, Issue.12
, pp. 210-216
-
-
Kirsner, S.1
-
44
-
-
0002408995
-
Postmodern terrorism
-
Laqueur, W. (1996), “Postmodern terrorism”, Foreign Affairs, Vol. 75 No. 5, pp. 24-36.
-
(1996)
Foreign Affairs
, vol.75
, Issue.5
, pp. 24-36
-
-
Laqueur, W.1
-
45
-
-
0004497725
-
Hunting the hackers
-
Levy, S. and Stone, B. (2000), “Hunting the hackers”, Newsweek, 21 February, pp. 38-44.
-
(2000)
Newsweek
, vol.21 February
, pp. 38-44
-
-
Levy, S.1
Stone, B.2
-
46
-
-
0004053345
-
-
National Defense University, Institute for National Strategic Studies, Washington, DC
-
Libicki, M.C. (1995), What is Information Warfare? National Defense University, Institute for National Strategic Studies, Washington, DC.
-
(1995)
What is Information Warfare?
-
-
Libicki, M.C.1
-
47
-
-
0009332652
-
Competitive intelligence: preparing for the information war
-
McCrohan, K.F. (1998), “Competitive intelligence: preparing for the information war”, Long Range Planning, Vol. 31 No. 4, pp. 586-93.
-
(1998)
Long Range Planning
, vol.31
, Issue.4
, pp. 586-593
-
-
McCrohan, K.F.1
-
48
-
-
85032088420
-
Hacking in the Holy land
-
Machlis, A. (2000), “Hacking in the Holy land”, The Industry Standard, 20 November, pp. 124-5.
-
(2000)
The Industry Standard
, vol.20 November
, pp. 124-125
-
-
Machlis, A.1
-
49
-
-
0344891953
-
Defamation havens
-
available at:
-
Martin, B. (2000), “Defamation havens”, First Monday, Vol. 5 No. 3, available at: http://firstmonday.org/issues/issue5_3/martin/
-
(2000)
First Monday
, vol.5
, Issue.3
-
-
Martin, B.1
-
50
-
-
0009373436
-
How hackers break in … and how they are caught
-
Meinel, C.P. (1998), “How hackers break in … and how they are caught”, Scientific American, October, pp. 98-105.
-
(1998)
Scientific American
, vol.October
, pp. 98-105
-
-
Meinel, C.P.1
-
51
-
-
0003813389
-
-
RAND, Santa Monica, CA
-
Molander, R.C., Riddile, A.S. and Wilson, P.A. (1996), Strategic Information Warfare: a New Face of War, RAND, Santa Monica, CA.
-
(1996)
Strategic Information Warfare: a New Face of War
-
-
Molander, R.C.1
Riddile, A.S.2
Wilson, P.A.3
-
52
-
-
85032122499
-
Hackers lack skill and can’t be trusted
-
Murphy, B. (2001), “Hackers lack skill and can’t be trusted”, Internet Week, 26 March, p. 31.
-
(2001)
Internet Week
, vol.26 March
, pp. 31
-
-
Murphy, B.1
-
57
-
-
85032110495
-
The IW threat from sub-state groups: an interdisciplinary approach
-
paper presented at the Third International Symposium, on Command and Control Research and Technology, Institute for National Strategic Studies-National Defense University, 17-20 June
-
Rathmell, A., Overill, R., Valeri, L. and Gearson, J. (1997), “The IW threat from sub-state groups: an interdisciplinary approach”, paper presented at the Third International Symposium, on Command and Control Research and Technology, Institute for National Strategic Studies-National Defense University, 17-20 June.
-
(1997)
-
-
Rathmell, A.1
Overill, R.2
Valeri, L.3
Gearson, J.4
-
58
-
-
52549127012
-
Recruitment by extremist groups on the Internet
-
available at:
-
Ray, B. and Marsh, G.E. II (2001), “Recruitment by extremist groups on the Internet”, First Monday, Vol. 6 No. 2, available at: http://firstmonday.org/issues/issue6_2/ray/index.html
-
(2001)
First Monday
, vol.6
, Issue.2
-
-
Ray, B.1
Marsh, G.E.2
-
59
-
-
0032148585
-
Critical infrastructure: interlinked and vulnerable
-
available at:
-
Robinson, C.P., Woodward, J.B. and Varnado, S.G. (1998), “Critical infrastructure: interlinked and vulnerable”, Issues in Science and Technology Online, Fall, available at: http://www.nap.edu/issues/15.1/robins.htm
-
(1998)
Issues in Science and Technology Online
, vol.Fall
-
-
Robinson, C.P.1
Woodward, J.B.2
Varnado, S.G.3
-
60
-
-
85032119224
-
-
quoted in 25 December- 1 January
-
Saffo, P. (2000), quoted in Newsweek, 25 December- 1 January, p. 101.
-
(2000)
Newsweek
, pp. 101
-
-
Saffo, P.1
-
61
-
-
85032109321
-
All over the board!
-
Schapiro, M. (2001), “All over the board!”, The Industry Standard-Grok, February-March, 110-15.
-
(2001)
The Industry Standard-Grok
, vol.February-March
, pp. 110-115
-
-
Schapiro, M.1
-
62
-
-
85032094885
-
Hackers 3, Microsoft 0
-
27 November-4 December
-
Schneier, B. (2000), “Hackers 3, Microsoft 0”, The Industry Standard, 27 November-4 December, p. 106.
-
(2000)
The Industry Standard
, pp. 106
-
-
Schneier, B.1
-
63
-
-
0004137326
-
-
2nd ed., Thunder’s Mouth Press, New York, NY
-
Schwartau, W. (1996), Information Warfare, Cyberterrorism: Protecting your Personal Security in the Electronic Age, 2nd ed., Thunder’s Mouth Press, New York, NY, pp. 27-42.
-
(1996)
Information Warfare, Cyberterrorism: Protecting your Personal Security in the Electronic Age
, pp. 27-42
-
-
Schwartau, W.1
-
64
-
-
85032131184
-
Inside the Electronic Disturbance Theater’s battle with the Pentagon
-
available at:
-
Schwartau, W. (1999), “Inside the Electronic Disturbance Theater’s battle with the Pentagon”, Network World, January, p. 11, available at: http://features.idg.net/crd_edt_64560.html
-
(1999)
Network World
, vol.January
, pp. 11
-
-
Schwartau, W.1
-
65
-
-
0032148572
-
An electronic Pearl Harbor? Not likely
-
available at:
-
Smith, G. (1998), “An electronic Pearl Harbor? Not likely”, Issues in Science and Technology Online, Fall, available at: http://www.nap.edu/issues/15.1/smith.htm
-
(1998)
Issues in Science and Technology Online
, vol.Fall
-
-
Smith, G.1
-
66
-
-
85032109628
-
Teaching evaluation or cyberstalking?
-
Snyder, M. (2000), “Teaching evaluation or cyberstalking?”, Academe, July-August, p. 71.
-
(2000)
Academe
, vol.July-August
, pp. 71
-
-
Snyder, M.1
-
67
-
-
85032125491
-
-
Special issue: Netwar across the spectrum of conflict
-
Studies in Conflict & Terrorism (1999), Special issue: Netwar across the spectrum of conflict, Vol. 22 No. 3.
-
(1999)
Studies in Conflict & Terrorism
, vol.22
, Issue.3
-
-
-
68
-
-
0004282642
-
-
Princeton University Press, Princeton, NJ
-
Sunstein, C. (2001), Republic.com. Princeton University Press, Princeton, NJ.
-
(2001)
Republic.com
-
-
Sunstein, C.1
-
69
-
-
0009332653
-
Neo-cortical warfare: the acme of skill?
-
Szafranski, R. (1994), “Neo-cortical warfare: the acme of skill?”, Military Review, November, pp. 41-55.
-
(1994)
Military Review
, vol.November
, pp. 41-55
-
-
Szafranski, R.1
-
70
-
-
0003801986
-
-
Little Brown, New York, NY
-
Toffler, A. and Toffler, H. (1993), War and Anti-war: Survival at the Dawn of the 21st Century, Little Brown, New York, NY.
-
(1993)
War and Anti-war: Survival at the Dawn of the 21st Century
-
-
Toffler, A.1
Toffler, H.2
-
71
-
-
85032077345
-
The Electronic Frontier: The Challenge of Unlawful Conduct Involving the Use of the Internet
-
available at:
-
US Department of Justice (2000), “The Electronic Frontier: The Challenge of Unlawful Conduct Involving the Use of the Internet”, A Report of the President’s Working Group on Unlawful Conduct on the Internet, available at: http://www.usdoj.gov/criminal/cybercrime/unlawful.htm
-
(2000)
A Report of the President’s Working Group on Unlawful Conduct on the Internet
-
-
-
72
-
-
85032105931
-
FBI warns infrastructure vulnerable to cyber-attacks
-
Vise, D.A. (2001), “FBI warns infrastructure vulnerable to cyber-attacks”, The Washington Post, 20 March.
-
(2001)
The Washington Post
, vol.20 March
-
-
Vise, D.A.1
-
73
-
-
0009332654
-
The enterprise strikes back
-
Yasin, R. (1998), “The enterprise strikes back”, Internet Week, 7 December, pp. 1, 78.
-
(1998)
Internet Week
, vol.7 December
, pp. 1-78
-
-
Yasin, R.1
-
74
-
-
85032087628
-
Tools stunt DoS attacks
-
Yasin, R. (2000), “Tools stunt DoS attacks”, Internet Week, 5 February, pp. 1, 58.
-
(2000)
Internet Week
, vol.5 February
, pp. 1-58
-
-
Yasin, R.1
-
75
-
-
0003953184
-
-
Touchstone Books, New York, NY
-
Haffner, K. and Markoff, J. (1995), Cyberpunk: Outlaws and Hackers on the Computer Frontier, Touchstone Books, New York, NY.
-
(1995)
Cyberpunk: Outlaws and Hackers on the Computer Frontier
-
-
Haffner, K.1
Markoff, J.2
-
77
-
-
84986107019
-
An information warfare SIIOP
-
in Schwartau, W. 2nd ed., Thunder’s Mouth Press, New York, NY
-
Szafranski, R. (1996), “An information warfare SIIOP”, in Schwartau, W., Information Warfare. Cyberterrorism: Protecting your Personal Security in the Electronic Age, 2nd ed., Thunder’s Mouth Press, New York, NY, pp. 115-25.
-
(1996)
Information Warfare. Cyberterrorism: Protecting your Personal Security in the Electronic Age
, pp. 115-125
-
-
Szafranski, R.1
|