메뉴 건너뛰기




Volumn 50, Issue 6, 2001, Pages 279-295

Information warfare: Peering inside Pandora's postmodern box

Author keywords

Computer security; Information control; Security; Terrorism; War

Indexed keywords


EID: 85032070768     PISSN: 00242535     EISSN: None     Source Type: Journal    
DOI: 10.1108/EUM0000000005600     Document Type: Article
Times cited : (7)

References (77)
  • 5
    • 33748605277 scopus 로고    scopus 로고
    • Computer security – an end state?
    • Bellovin, S.M. (2001), “Computer security – an end state?”, Communications of the ACM, Vol. 44 No. 3, pp. 131-2.
    • (2001) Communications of the ACM , vol.44 , Issue.3 , pp. 131-132
    • Bellovin, S.M.1
  • 6
    • 84899295590 scopus 로고    scopus 로고
    • Information warfare: time to prepare
    • a available at:
    • Berkowitz, B. (2000a), “Information warfare: time to prepare”, Issues in Science & Technology Online, Winter, available at: http://www.nap.edu/issues/17.2/berkowitz.htm
    • (2000) Issues in Science & Technology Online , vol.Winter
    • Berkowitz, B.1
  • 7
    • 84937326640 scopus 로고    scopus 로고
    • War logs on
    • b
    • Berkowitz, B.D. (2000b), “War logs on”, Foreign Affairs, Vol. 79 No. 3, pp. 8-12.
    • (2000) Foreign Affairs , vol.79 , Issue.3 , pp. 8-12
    • Berkowitz, B.D.1
  • 9
    • 0031673674 scopus 로고    scopus 로고
    • Catapults and grappling hooks: the tools and techniques of information warfare
    • Boulanger, A. (1998), “Catapults and grappling hooks: the tools and techniques of information warfare”, IBM Systems Journal, Vol. 37 No. 1, pp. 106-14.
    • (1998) IBM Systems Journal , vol.37 , Issue.1 , pp. 106-114
    • Boulanger, A.1
  • 11
    • 0032342807 scopus 로고    scopus 로고
    • Community without propinquity revisited: communication technology and the transformation of the urban public sphere
    • Calhoun, C. (1998), “Community without propinquity revisited: communication technology and the transformation of the urban public sphere”, Sociological Inquiry, Vol. 68, pp. 373-97.
    • (1998) Sociological Inquiry , vol.68 , pp. 373-397
    • Calhoun, C.1
  • 14
    • 0039456088 scopus 로고    scopus 로고
    • Internet privacy concerns confirm the case for intervention
    • Clarke, R. (1999), “Internet privacy concerns confirm the case for intervention”, Communications of the ACM, Vol. 42 No. 2, pp. 60-7.
    • (1999) Communications of the ACM , vol.42 , Issue.2 , pp. 60-67
    • Clarke, R.1
  • 15
    • 0012716505 scopus 로고    scopus 로고
    • Strategic intelligence and networked business
    • a
    • Cronin, B. (2000a), “Strategic intelligence and networked business”, Journal of Information Science, Vol. 26 No. 4, pp. 131-6.
    • (2000) Journal of Information Science , vol.26 , Issue.4 , pp. 131-136
    • Cronin, B.1
  • 16
    • 0002595025 scopus 로고    scopus 로고
    • Raising the intelligence stakes: corporate information warfare and strategic surprise
    • b
    • Cronin, B. and Crawford, H. (1999b), “Raising the intelligence stakes: corporate information warfare and strategic surprise”, Competitive Intelligence Review, Vol. 10 No. 3, pp. 58-66.
    • (1999) Competitive Intelligence Review , vol.10 , Issue.3 , pp. 58-66
    • Cronin, B.1    Crawford, H.2
  • 17
    • 0033212218 scopus 로고    scopus 로고
    • Information warfare: its application in military and civilian contexts
    • Cronin, B. and Crawford, H. (1999), “Information warfare: its application in military and civilian contexts”, The Information Society, Vol. 15 No. 4, pp. 257-63.
    • (1999) The Information Society , vol.15 , Issue.4 , pp. 257-263
    • Cronin, B.1    Crawford, H.2
  • 18
    • 85032109735 scopus 로고    scopus 로고
    • Out to get you
    • 97
    • Crush, P. (2000), “Out to get you”, Management Today, November, pp. 94-95, 97.
    • (2000) Management Today , vol.November , pp. 94-95
    • Crush, P.1
  • 19
    • 0035981393 scopus 로고    scopus 로고
    • Intelligence, information technology and information warfare
    • in Cronin, B. (Ed.) Information Today Inc./ASIST (in press) Medford, NJ
    • Davies, P.H.J. (2001), “Intelligence, information technology and information warfare”, in Cronin, B. (Ed.), Annual Review of Information Science & Technology, Information Today Inc./ASIST (in press), Vol. 36. Medford, NJ.
    • (2001) Annual Review of Information Science & Technology , vol.36
    • Davies, P.H.J.1
  • 24
    • 84897106023 scopus 로고    scopus 로고
    • Social movement networks virtual and real
    • Diani, M. (2000), “Social movement networks virtual and real”, Information, Communication & Society, Vol. 3 No. 3, pp. 386-401.
    • (2000) Information, Communication & Society , vol.3 , Issue.3 , pp. 386-401
    • Diani, M.1
  • 25
    • 77949715066 scopus 로고    scopus 로고
    • You have been misinformed –Now what?: Attacking dangerous data
    • 24, 26-30
    • Ebbinghouse, C. (2001), “You have been misinformed –Now what?: Attacking dangerous data”, Searcher, April, pp. 20, 22, 24, 26-30.
    • (2001) Searcher , vol.April , pp. 20-22
    • Ebbinghouse, C.1
  • 26
    • 85032112445 scopus 로고    scopus 로고
    • Anti-torture.net
    • Ellis, C. (2001), “Anti-torture.net”, Wired, Vol. 9 No. 2, p. 80.
    • (2001) Wired , vol.9 , Issue.2 , pp. 80
    • Ellis, C.1
  • 27
    • 85032092540 scopus 로고    scopus 로고
    • Information zones
    • Fallows, J. (2001), “Information zones”, The Industry Standard, 9 April, pp. 32-3.
    • (2001) The Industry Standard , vol.9 April , pp. 32-33
    • Fallows, J.1
  • 29
    • 0002008118 scopus 로고    scopus 로고
    • You could get raped: the inside story of one young woman’s terrifying ordeal at the hands of a cyberstalker
    • Foote, D. (1999), “You could get raped: the inside story of one young woman’s terrifying ordeal at the hands of a cyberstalker”, Newsweek, 8 February, pp. 64-5.
    • (1999) Newsweek , vol.8 February , pp. 64-65
    • Foote, D.1
  • 30
    • 0347005207 scopus 로고    scopus 로고
    • Tampon terrorism
    • Fumento, M. (1999), “Tampon terrorism”, Forbes, 17 May, pp. 170, 172.
    • (1999) Forbes , vol.17 May , pp. 170-172
    • Fumento, M.1
  • 31
    • 85032132778 scopus 로고    scopus 로고
    • Boeing’s big move
    • 43, 45, 47
    • Gates, D. (2001), “Boeing’s big move”, The Industry Standard, 2 April, pp. 40-41, 43, 45, 47.
    • (2001) The Industry Standard , vol.2 April , pp. 40-41
    • Gates, D.1
  • 34
    • 0009452834 scopus 로고
    • Intelligence and the problem of strategic surprise
    • in Dearth, D.H. and Goodden, R.T. (Eds) 2nd ed., US Army War College/ Defense Intelligence Agency, Washington, DC
    • Handel, M.I. (1995), Intelligence and the problem of strategic surprise, in Dearth, D.H. and Goodden, R.T. (Eds), Strategic Intelligence: Theory and Application, 2nd ed., US Army War College/ Defense Intelligence Agency, Washington, DC, pp. 213-61.
    • (1995) Strategic Intelligence: Theory and Application , pp. 213-261
    • Handel, M.I.1
  • 35
    • 0034257304 scopus 로고    scopus 로고
    • Flexible infections: computer viruses, human bodies, nation-states, evolutionary capitalism
    • Helmreich, S. (2000), “Flexible infections: computer viruses, human bodies, nation-states, evolutionary capitalism”, Science, Technology, & Human Values, Vol. 25 No. 4, pp. 472-91.
    • (2000) Science, Technology, & Human Values , vol.25 , Issue.4 , pp. 472-491
    • Helmreich, S.1
  • 37
    • 85007792208 scopus 로고    scopus 로고
    • Where hath our intelligence been?”, The Revolution in Military Affairs
    • Herman, M. (1998), “Where hath our intelligence been?”, The Revolution in Military Affairs, RUSI Journal, Vol. 143 No. 6, pp. 62-8.
    • (1998) RUSI Journal , vol.143 , Issue.6 , pp. 62-68
    • Herman, M.1
  • 38
    • 0006839294 scopus 로고    scopus 로고
    • see the 11 December issue for an extended assessment of information security issues.
    • The Industry Standard (2001), see the 11 December issue for an extended assessment of information security issues.
    • (2001) The Industry Standard
  • 41
    • 0009841933 scopus 로고    scopus 로고
    • available at:
    • Joint Information Systems Committee (2001), Developing an Information Security Policy, available at: http://www.nacic.gov/reports/fy00.htm
    • (2001) Developing an Information Security Policy
  • 42
    • 0345744194 scopus 로고    scopus 로고
    • quoted in Thrasher R.D. (compiler) available at:
    • King, K. (1996), quoted in Thrasher R.D. (compiler), Information Warfare Delphi: Raw Results, available at: http:/all.net/books/iw/delphi/top.html
    • (1996) Information Warfare Delphi: Raw Results
    • King, K.1
  • 43
    • 0009378890 scopus 로고    scopus 로고
    • Murder by Internet
    • 266-71.
    • Kirsner, S. (1998), “Murder by Internet”, Wired, Vol. 6 No. 12, pp. 210-16, 266-71.
    • (1998) Wired , vol.6 , Issue.12 , pp. 210-216
    • Kirsner, S.1
  • 44
    • 0002408995 scopus 로고    scopus 로고
    • Postmodern terrorism
    • Laqueur, W. (1996), “Postmodern terrorism”, Foreign Affairs, Vol. 75 No. 5, pp. 24-36.
    • (1996) Foreign Affairs , vol.75 , Issue.5 , pp. 24-36
    • Laqueur, W.1
  • 45
    • 0004497725 scopus 로고    scopus 로고
    • Hunting the hackers
    • Levy, S. and Stone, B. (2000), “Hunting the hackers”, Newsweek, 21 February, pp. 38-44.
    • (2000) Newsweek , vol.21 February , pp. 38-44
    • Levy, S.1    Stone, B.2
  • 46
    • 0004053345 scopus 로고
    • National Defense University, Institute for National Strategic Studies, Washington, DC
    • Libicki, M.C. (1995), What is Information Warfare? National Defense University, Institute for National Strategic Studies, Washington, DC.
    • (1995) What is Information Warfare?
    • Libicki, M.C.1
  • 47
    • 0009332652 scopus 로고    scopus 로고
    • Competitive intelligence: preparing for the information war
    • McCrohan, K.F. (1998), “Competitive intelligence: preparing for the information war”, Long Range Planning, Vol. 31 No. 4, pp. 586-93.
    • (1998) Long Range Planning , vol.31 , Issue.4 , pp. 586-593
    • McCrohan, K.F.1
  • 48
    • 85032088420 scopus 로고    scopus 로고
    • Hacking in the Holy land
    • Machlis, A. (2000), “Hacking in the Holy land”, The Industry Standard, 20 November, pp. 124-5.
    • (2000) The Industry Standard , vol.20 November , pp. 124-125
    • Machlis, A.1
  • 49
    • 0344891953 scopus 로고    scopus 로고
    • Defamation havens
    • available at:
    • Martin, B. (2000), “Defamation havens”, First Monday, Vol. 5 No. 3, available at: http://firstmonday.org/issues/issue5_3/martin/
    • (2000) First Monday , vol.5 , Issue.3
    • Martin, B.1
  • 50
    • 0009373436 scopus 로고    scopus 로고
    • How hackers break in … and how they are caught
    • Meinel, C.P. (1998), “How hackers break in … and how they are caught”, Scientific American, October, pp. 98-105.
    • (1998) Scientific American , vol.October , pp. 98-105
    • Meinel, C.P.1
  • 52
    • 85032122499 scopus 로고    scopus 로고
    • Hackers lack skill and can’t be trusted
    • Murphy, B. (2001), “Hackers lack skill and can’t be trusted”, Internet Week, 26 March, p. 31.
    • (2001) Internet Week , vol.26 March , pp. 31
    • Murphy, B.1
  • 57
    • 85032110495 scopus 로고    scopus 로고
    • The IW threat from sub-state groups: an interdisciplinary approach
    • paper presented at the Third International Symposium, on Command and Control Research and Technology, Institute for National Strategic Studies-National Defense University, 17-20 June
    • Rathmell, A., Overill, R., Valeri, L. and Gearson, J. (1997), “The IW threat from sub-state groups: an interdisciplinary approach”, paper presented at the Third International Symposium, on Command and Control Research and Technology, Institute for National Strategic Studies-National Defense University, 17-20 June.
    • (1997)
    • Rathmell, A.1    Overill, R.2    Valeri, L.3    Gearson, J.4
  • 58
    • 52549127012 scopus 로고    scopus 로고
    • Recruitment by extremist groups on the Internet
    • available at:
    • Ray, B. and Marsh, G.E. II (2001), “Recruitment by extremist groups on the Internet”, First Monday, Vol. 6 No. 2, available at: http://firstmonday.org/issues/issue6_2/ray/index.html
    • (2001) First Monday , vol.6 , Issue.2
    • Ray, B.1    Marsh, G.E.2
  • 60
    • 85032119224 scopus 로고    scopus 로고
    • quoted in 25 December- 1 January
    • Saffo, P. (2000), quoted in Newsweek, 25 December- 1 January, p. 101.
    • (2000) Newsweek , pp. 101
    • Saffo, P.1
  • 61
    • 85032109321 scopus 로고    scopus 로고
    • All over the board!
    • Schapiro, M. (2001), “All over the board!”, The Industry Standard-Grok, February-March, 110-15.
    • (2001) The Industry Standard-Grok , vol.February-March , pp. 110-115
    • Schapiro, M.1
  • 62
    • 85032094885 scopus 로고    scopus 로고
    • Hackers 3, Microsoft 0
    • 27 November-4 December
    • Schneier, B. (2000), “Hackers 3, Microsoft 0”, The Industry Standard, 27 November-4 December, p. 106.
    • (2000) The Industry Standard , pp. 106
    • Schneier, B.1
  • 64
    • 85032131184 scopus 로고    scopus 로고
    • Inside the Electronic Disturbance Theater’s battle with the Pentagon
    • available at:
    • Schwartau, W. (1999), “Inside the Electronic Disturbance Theater’s battle with the Pentagon”, Network World, January, p. 11, available at: http://features.idg.net/crd_edt_64560.html
    • (1999) Network World , vol.January , pp. 11
    • Schwartau, W.1
  • 65
    • 0032148572 scopus 로고    scopus 로고
    • An electronic Pearl Harbor? Not likely
    • available at:
    • Smith, G. (1998), “An electronic Pearl Harbor? Not likely”, Issues in Science and Technology Online, Fall, available at: http://www.nap.edu/issues/15.1/smith.htm
    • (1998) Issues in Science and Technology Online , vol.Fall
    • Smith, G.1
  • 66
    • 85032109628 scopus 로고    scopus 로고
    • Teaching evaluation or cyberstalking?
    • Snyder, M. (2000), “Teaching evaluation or cyberstalking?”, Academe, July-August, p. 71.
    • (2000) Academe , vol.July-August , pp. 71
    • Snyder, M.1
  • 67
    • 85032125491 scopus 로고    scopus 로고
    • Special issue: Netwar across the spectrum of conflict
    • Studies in Conflict & Terrorism (1999), Special issue: Netwar across the spectrum of conflict, Vol. 22 No. 3.
    • (1999) Studies in Conflict & Terrorism , vol.22 , Issue.3
  • 68
    • 0004282642 scopus 로고    scopus 로고
    • Princeton University Press, Princeton, NJ
    • Sunstein, C. (2001), Republic.com. Princeton University Press, Princeton, NJ.
    • (2001) Republic.com
    • Sunstein, C.1
  • 69
    • 0009332653 scopus 로고
    • Neo-cortical warfare: the acme of skill?
    • Szafranski, R. (1994), “Neo-cortical warfare: the acme of skill?”, Military Review, November, pp. 41-55.
    • (1994) Military Review , vol.November , pp. 41-55
    • Szafranski, R.1
  • 71
    • 85032077345 scopus 로고    scopus 로고
    • The Electronic Frontier: The Challenge of Unlawful Conduct Involving the Use of the Internet
    • available at:
    • US Department of Justice (2000), “The Electronic Frontier: The Challenge of Unlawful Conduct Involving the Use of the Internet”, A Report of the President’s Working Group on Unlawful Conduct on the Internet, available at: http://www.usdoj.gov/criminal/cybercrime/unlawful.htm
    • (2000) A Report of the President’s Working Group on Unlawful Conduct on the Internet
  • 72
    • 85032105931 scopus 로고    scopus 로고
    • FBI warns infrastructure vulnerable to cyber-attacks
    • Vise, D.A. (2001), “FBI warns infrastructure vulnerable to cyber-attacks”, The Washington Post, 20 March.
    • (2001) The Washington Post , vol.20 March
    • Vise, D.A.1
  • 73
    • 0009332654 scopus 로고    scopus 로고
    • The enterprise strikes back
    • Yasin, R. (1998), “The enterprise strikes back”, Internet Week, 7 December, pp. 1, 78.
    • (1998) Internet Week , vol.7 December , pp. 1-78
    • Yasin, R.1
  • 74
    • 85032087628 scopus 로고    scopus 로고
    • Tools stunt DoS attacks
    • Yasin, R. (2000), “Tools stunt DoS attacks”, Internet Week, 5 February, pp. 1, 58.
    • (2000) Internet Week , vol.5 February , pp. 1-58
    • Yasin, R.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.