dc.creator |
Lior Tabansky |
|
dc.creator |
Isaac Ben-Israel |
|
dc.date |
2011-12-01T00:00:00Z |
|
dc.date.accessioned |
2015-07-20T20:09:22Z |
|
dc.date.available |
2015-07-20T20:09:22Z |
|
dc.identifier |
2307-793X |
|
dc.identifier |
2307-8634 |
|
dc.identifier |
https://doaj.org/article/4cf4f644ec1a464794c20ca12b512678 |
|
dc.identifier.uri |
http://evidence.thinkportal.org/handle/123456789/8938 |
|
dc.identifier.uri |
https://doaj.org/article/4cf4f644ec1a464794c20ca12b512678 |
|
dc.description |
Much of the driving force behind computer development has been derived from military applications. Following new possibilities, thinking about the effect of technological change on defense issues has also progressed. In addition, the information age, which continues to develop rapidly, along with advances in computer communications and the penetration of computers into every area of life, has given rise to cyberspace. These developments challenge existing perceptions and force reconsideration of basic concepts. Developments in electronics and computers since World War II have affected a broad range of fields and created the “information age.” This article focuses on interrelationships among information technology, the information age, and security. More specifically, it aims to contribute to a discussion of the national security issues stemming from the development of information technology. A basic theoretical understanding of the information age is essential in order to consider cyber security issues. This article relies on ideas by philosopher Karl Popper, futurists Alvin and Heidi Toffler, and economist Paul Romer to illuminate the characteristics of the information age and to clarify the issues that emerge when technological development interfaces with national security. It analyzes the current characteristics of cyberspace, and discusses the implications for national security questions. It then reviews the field known as information warfare and focuses on the totally new phenomenon of computer warfare in cyberspace. The article then reviews cyber weapons and methods of warfare, discusses defense, attack, and deterrence, and presents key issues in the cyber defense realm. It appears that in order to maintain security and peace, a multidisciplinary assessment of the new issues and challenges is required. |
|
dc.language |
English |
|
dc.publisher |
Institute for National Security Studies |
|
dc.relation |
http://d26e8pvoto2x3r.cloudfront.net/uploadimages/import/(file)1333532835.pdf |
|
dc.relation |
https://doaj.org/toc/2307-793X |
|
dc.relation |
https://doaj.org/toc/2307-8634 |
|
dc.rights |
CC BY |
|
dc.source |
Military and Strategic Affairs, Vol 3, Iss 3, Pp 21-37 (2011) |
|
dc.subject |
theory |
|
dc.subject |
Alvin Toffler |
|
dc.subject |
Heidi Toffler |
|
dc.subject |
Third Wave warfare |
|
dc.subject |
Karl Popper |
|
dc.subject |
Paul Popper |
|
dc.subject |
Paul Romer |
|
dc.subject |
warfare |
|
dc.subject |
conventional warfare |
|
dc.subject |
information warfare |
|
dc.subject |
cyberspace |
|
dc.subject |
computer |
|
dc.subject |
traditional attack |
|
dc.subject |
Military Science |
|
dc.subject |
U |
|
dc.subject |
DOAJ:Military Science |
|
dc.subject |
DOAJ:Technology and Engineering |
|
dc.subject |
Military Science |
|
dc.subject |
U |
|
dc.subject |
DOAJ:Military Science |
|
dc.subject |
DOAJ:Technology and Engineering |
|
dc.subject |
Military Science |
|
dc.subject |
U |
|
dc.subject |
Military Science |
|
dc.subject |
U |
|
dc.subject |
Military Science |
|
dc.subject |
U |
|
dc.title |
An Interdisciplinary Look at Security Challenges in the Information Age |
|
dc.type |
Article |
|