Operational Security, Manipulation of Information, and Decision-Making in Network-Enabled Warfare

被引:0
作者
Siivonen, Petri
机构
来源
PROCEEDINGS OF THE 7TH EUROPEAN CONFERENCE ON INFORMATION WARFARE AND SECURITY | 2008年
关键词
Operational security; critical information; information manipulation; situation awareness; qualitative study;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The key points of operational security are to identify and protect critical information. When the critical information has been identified, the reliability and integrity of that information must be secured. In this paper, the key question is what kind of manipulation of information is possible and what kinds of challenges the idea of network-enabled warfare can bring to decision-making and leadership. The study is more philosophical than practical or technical. The results of this paper are based on qualitative study. This study addresses two models of collecting information. In the traditional model, information is filtered up from lower levels, with analysis before it is delivered to the next level. In the network model, information is delivered to storage (the network) by the sensors and different levels of staff have access to the information storage where they can get the information they need. The results of this study are based on a focused interview carried out in the Signal Regiment in Finland (2008). The interviewees were five communications and information officers, ranked between captain and lieutenant-colonel, who were familiar with the concept of network-enabled warfare. The random sample on which the conclusions of this study are based was quite homogeneous and small. As officers' educational background and experience can affect interpretations of the definitions of the subjects, the conclusions describe only the interviewees' conceptions of critical information, information manipulation, and leadership in modern warfare.
引用
收藏
页码:197 / 202
页数:6
相关论文
共 13 条
[1]  
Ahto S., 1975, HIST 2 WORLD WAR
[2]  
Halonen Kalevi, 2000, INFORM WAR OPERATION
[3]  
Joint Chiefs of Staff, 2006, US REV JOINT PUBL
[4]  
Kagan F.W, 2006, NATL SECURITY OU JUN
[5]  
Kuusisto Rauno, 2007, SCI WEAPON
[6]  
Mattila J, 2004, VERKOSTOITUMISEN HAA
[7]  
McCornack S.A, 1992, INFORM MANIPULATION
[8]  
Rantapelkonen J, 2006, SIMULOIMALLA VIRTUAA
[9]  
Rekkedal, 2006, NYKYAIKAINEN SOTATAI
[10]  
Siivonen P, 2008, PREFECT POLICE F PEC