Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
  • 1
    ISBN: 9780833079190 , 0833083201
    Language: English
    Pages: 1 Online-Ressource (xxi, 88 pages)
    DDC: 303.6/2501
    Keywords: Terrorism ; Terrorism ; Insurgency ; Electronic books
    Abstract: Introduction -- Specifying the Model -- Implementation in a High-Level Language -- Looking Ahead to Exploratory Analysis Under Uncertainty -- Using the Model for Knowledge Elicitation, Discussion, and Diagnosis -- Appendix A: Primer on Factor Trees (a reprint) -- Appendix B: Verification and Validation -- Appendix C: Eliciting Factor Values -- Appendix D: Mathematics for "And" and "Or" Relationships
    URL: Volltext  (Kostenfrei)
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 2
    ISBN: 0833032356 , 9780833032355
    Language: English
    Pages: Online Ressource (xiv, 375 pages) , illustrations.
    Edition: Online-Ausg.
    Series Statement: MR MR-1382-OSD
    Parallel Title: Erscheint auch als Networks and netwars
    DDC: 303.625
    Keywords: Information warfare ; Cyberterrorism ; POLITICAL SCIENCE ; Terrorism ; Cyberterrorism ; Information warfare ; Internet ; Terrorisme ; Activisme ; POLITICAL SCIENCE ; Political Freedom & Security ; Terrorism ; Electronic books ; Electronic books
    Abstract: Netwar is the lower-intensity, societal-level counterpart to the editors' earlier, mostly military concept of cyberwar. This volume studies major instances of netwar that have occurred over the past several years--from Osama bin Laden's networked terrorists to the Battle of Seattle's social activists--and finds, among other things, that netwar works very well. Whether the protagonists are civil-society activists or uncivil-society criminals and terrorists, their netwars have generally been successful. Strategists and policymakers in Washington, and elsewhere, have already begun to discern the dark side of the netwar phenomenon, especially as manifested in terrorist and criminal organizations. In this volume, the editors and their colleagues examine various types of netwar, from the most violent to the most socially activist. In doing so, they find that, despite the variety, all networks that have been built for waging netwar may be analyzed in terms of a common analytic framework. There are five levels of theory and practice that matter--the technological, social, narrative, organizational, and doctrinal levels. A netwar actor must get all five right to be fully effective. The most potent netwarriors will not only be highly networked and have the capacity for mounting "swarming" attacks, they will also be held together by strong social ties, have secure communications technologies, and project a common story about why they are together and what they need to do. These will be the most serious adversaries. But even those networks that are weak on some levels may pose stiff challenges to their nation-state adversaries. With this in mind, it is necessary to go beyond just diagnosing the nature of the networked nonstate opponent in a given conflict. It will become crucial for governments and their military and law enforcement establishments to begin networking themselves
    Note: "Prepared for the Office of the Secretary of Defense. - Includes bibliographical references. - Description based on print version record
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. More information can be found here...