HYBRID GENESIS OF INFORMATION OPERATIONS IN CYBERSPACE
Abstract
Keywords
Full Text:
PDFReferences
Arquilla, J., Ronfeldt, D., (1995). Networks and Netwars-Comparative Strategy, Volume 12, Santa Monica, CA: Rand.
Barić S., (2010). „Vojne strategije i asimetrično ratovanje” [Military strategy and asimetric warfare], Nаtional Security and the Future, 4 (11), Zagreb.
Berzins, J., (October 11, 2016). Russia’s New Generation Warfare, http//www.thepotomacfoundation.org/The New Generation of Russian WarfareThe Potomac Foundation.htm
Bruzdzinski, J., (2004). Demystifying Shashoujian: China's “Assassin's Mace”, Civil-Military Change in China-Elites, Institutes, and Ideas after the 16th Party Congress, Strategic Studies Institute, U.S. Army War College.
Chekinov S.G., Bogdanov S.A., (2013). “The Nature and Content of a New-Generation War, Voyennamysl, No.4, October 2013. Retrieved from, http://www.eastviewpress.com/Files/MT_FROM%20THE%20CURRENT%20ISSUE_No. 4_2013.pdf
DOD- Department of Defense of US Government, (2007). Irregular Warfare (IW)-Joint Operating Concept (JOC), 2007, Washington, DC.
FMI- Federal Ministry of Interior (2011). Cyber Security Strategy for Germany. Retrieved from, http://www.cio.bund.de/.../css_engl_download.pdf?.
GAO-General Accounting Office (1998). Air Traffic Control: Weak Computer Security Practices Jeopardize Flight Safety. Retrieved from, www.gao.gov/archive/1998/ai98155.pdf.
Gerasimov, V., (2013). “The Value of Science in Foresight: New Challenges Require Rethinking on the Forms and Methods of Warfare,” Voroshilov General Staff Academy conference, reprinted in Military Industrial Kurier, (27 Feb. 2013). Retrieved from, http://vpknews. ru/sites/default/files/pdf/VPK_08_476.pdf .
Harmon, A., (April 1, 1999) : “Serbs’ Revenge: NATO Web Site Zapped“, New York Times.
Hart, L., (1954). "The Strategy of Indirect Approach", National War College Internet Archive.
Hathaway A., Crootof, R., (2012). ‘’Тhe law of cyber attack’’. California Law Review, Retrieved from, http://www.californialawreview.org/assets/pdfs/100-4/02-Hathaway.pdf.
Hoffman, F., (2007). Conflict in the 21st Century: The Rise of Hybrid Wars. Institute for Policy Studies Arlington, VA: Potomac.
Hollis, D., (2007). ‘’Why States Need an International Law for Information Operations’’, 11 Lewis & Clark L. Rev. 1023-1042. Retrieved from, http://www law.lclark.edu/live/files/9551-lcb114art7hollispdf.
Hubbard, Z., (1999). “Information Warfare in Kosovo“, Journal of Electronic Defense, November 1999, Vol. 22, No. 11.
Janczewski, L., Colarik, A., (2008). Cyber Warfare and Cyber Terrorism, Information Science Reference.
JCS-US Army Joint Chiefs of Staff (1998). Joint Pub 3-13: Joint Doctrine for Information Operations.
Larsen, A., (2000). Serbian Information Operations During Operation Allied Force, Air Command and Staff College, Air University, Maxwell Air Force Base, Alabama.
Liang, Q., Xiaosui, W., (1999). Unlimited Warfare. Bejing.
McCulloh, T., Johnson, R., (2016). Hybrid Warfare. JSOU, Tampa.
Miljković, М., (2012). „Ocene SAD o sposobnosti Narodno-oslobodilačke armije Kine (NOAK) za izvođenje sajber špijunaže” [US evaulation of capabilities of Chinese People’s Liberation Army (PLA) for implementation of Cyber espionage actions]. Vojno delo, Belgrad, Summer/2012.
Mitrović, M., (2017 a). "Hybrid warfare and asymmetric security threats".Vojno delo No 5/2017, Belgrade.
Mitrović, M., (2017 b). ‘’Hybrid Security Threats and Contemporary approach to National Security’’, Thematic Conference Proceedings of International Significance, International Conference ‘’Archibald Reiss Days’’, Academy of Criminal and Police Studies, Belgrade, Vol 1. p. 337-345.
Mitrović, M., (2017 c). ‘’Economic and energy aspects of a hybrid endangering of national security'', Vojno delo, No 6/2017: Belgrade.
Mitrović, M., (2018d). ‘’Public Diplomacy in paradigm of Hybrid conflict concept’’, Vojno delo No 2/2018.
Mulvenon, J., (1998). The PLA and Information Warfare- Mulverton, The People’s Liberation Army in the Information Age, RAND, Santa Monica.
Petrović, L., (2012). „Informaciona bezbednost – pravni, ekonomski i tehnički aspekt” [Information security-law, economu and technical aspects], Informaciona bezbednost 2012 – naučno-stručni skup, Beograd.
Reisdorff, N., (2003). Winning the hundred battles-China and asymmetric warfare. US Army Command and General Staff College, Forth Leavenworth.
Renz, B., Smith, H., (2016). Russia and Hybrid Warfare–Going beyond the Label. Finnish Prime Minister’s Office, Government’s analysis.
Retrieved from,
Sinkovski, S., (2005). „Informaciona bezbednost – komponenta nacionalne bezbednosti” [Information security-component of national security]. Vojno delo, 2/2005, Belgrad.
Thomas L.T., (1996). “Russian Views on Information-based Warfare“, Airpower Journal-Special Edition.
UK OCS-UK Office of Cyber Security (2009). Cyber Security Strategy of the United Kingdom. Retrieved from, http://www.official-documents.gov.uk/document/cm76/7642/7642.pdf.
UKG-United Kingdom Govermant (November 2011). Cyber Security Strategy, Protecting and promoting the UK in a digital world. Retrieved from, https://www.gov.uk/government/.../uk-cyber-security-strategy-final.pdf.
Watson, J., (2017). “Sun Tzu's Art of War - Chapter 3: Attack by Stratagem”. Retrieved from http://suntzusaid.com/book/3.
Zaitsev, A., (2014). Partisan Warfare: The modern army should know how to fight without front lines, MIC Media in English Translation, 3 September 2014. Retrieved from, http://www.vpk-news.ru/articles/21649.
DOI: https://doi.org/10.22190/TEME1804359M
Refbacks
- There are currently no refbacks.
© University of Niš, Serbia
Creative Commons licence CC BY-NC-ND
Print ISSN: 0353-7919
Online ISSN: 1820-7804