Boon or Threat?

Tomes, Robert R.
June 2000
Naval War College Review;Summer2000, Vol. 53 Issue 3, p39
Academic Journal
Discusses the evolution of information warfare doctrine in the United States armed forces. Concept of information revolution; Dominance of information revolution in national security planning; Impact of information technology on the socioeconomic structure of the U.S.; Efforts to preserve and protect information systems.


Related Articles

  • 'Paralysis warfare': China's cyber focus is to cripple U.S. infrastructure.  // Geo-Strategy Direct;3/21/2012, p1 

    The article focuses on the report "Occupying the Information High Ground: Chinese Capabilities for Computer Network Operations and Cyber Espionage" released by the U.S.-China Economic and Security Commission on March 8, 2012. It says that the report shows that the cyber warfare capabilities of...

  • World Gone Cyber MAD. Crosston, Matthew D. // Strategic Studies Quarterly;Spring2011, Vol. 5 Issue 1, p100 

    This article examines the deterrent strategy of the U.S. government to counter strike the lethal cyberspace strategy among powerful countries in the world. It emphazises a covert offensive capability rather than overt is an error that compromises the effectiveness of the country's cyber...

  • The Risks of a Networked Military. Harknett, Richard J. // Orbis;Winter2000, Vol. 44 Issue 1, p127 

    Details the benefit of a restructured military of the United States through an information technology-driven revolution in military affairs (IT-RMA). Argument on technological advances in the ability to process, organize and disseminate information; What revolution creates; Wrong response to...

  • National security in the information age. Gompert, David C. // Naval War College Review;Autumn98, Vol. 51 Issue 4, p22 

    Discusses the impact of the information revolution to the national security of the United States. Benefits from the information revolution; Role of information technology to the progress of world politics; Elaboration on how information technology widened the gap between Western and Eastern...

  • Homeland Security's Spatial Advocates. Barnes, Scottie // Geospatial Solutions;Jan2003, Vol. 13 Issue 1, p10 

    Focuses on the use of geospatial technologies for homeland security in the U.S. Development of information technology infrastructure; Access of point for national geospatial datasets; Launch of innovative pilot projects.

  • Sorry, Phases Two and Three Are Off the Clock.  // Army Lawyer;Jan/Feb2002, Issue 349, p133 

    Reports the declassification of the national security information in the U.S. Management of the Total Army Personnel Command; Inclusion of the work requirements; Acquisition of the information technology.

  • Information insecurity. Peters, Katherine McIntire // Government Executive;Apr99, Vol. 31 Issue 4, p18 

    Comments on the significance of protecting government computer systems and information technology from hackers to the improvement of national security in the United States. Challenges facing efforts to protect the systems; Insider threat to information security; Solutions recommended. INSET:...

  • Information Warfare: Task Force XXI or Task Force Smith? Carver Jr., Curtis A. // Military Review;Sep-Nov98, Vol. 78 Issue 5, p26 

    Examines the potential for an informational disaster in the United States (US) by the exploration of cyberwar attacks and the threats posed by these attacks. Impact of technology on information warfare (IW); Reasons the US is susceptible to cyberwar attacks; Tools used in information warfare.

  • Achieving Information Superiority. Barwinczak, Patricia M. // Military Review;Sep-Nov98, Vol. 78 Issue 5, p36 

    Postulates that information technology will lead to a condition of sufficient equivalence with respect to the warfare capabilities of the United States (US) and its potential adversaries. National security implications of IT; Potential military utility of information operations; Impact of...


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics