{"title":"网络空间作战与信息作战的关系","authors":"Zsolt Haig","doi":"10.3849/aimt.01466","DOIUrl":null,"url":null,"abstract":"Today thanks to the wireless networking technologies and social networks, the inter-pretation of cyberspace has expanded. According to the three-layered structure of cyberspace, not only logical effects can be induced in this domain, e.g. by malwares, but physical and cognitive effects also appear in the physical and cyber-persona lay-ers, e.g. electronic jamming the wireless communications of network or influencing and manipulating users. This approach provides an opportunity to interpret cyberspace operations in a more complex way and to apply integrated technical and cognitive information capabilities that exploit each others effects. Accordingly, this study pre-sents an expanded interpretation of cyberspace, a novel and complex approach to cyberspace operations, as well as the information capabilities that can be used in these operations.","PeriodicalId":39125,"journal":{"name":"Advances in Military Technology","volume":" ","pages":""},"PeriodicalIF":0.0000,"publicationDate":"2021-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Relationships between Cyberspace Operations and Information Operations\",\"authors\":\"Zsolt Haig\",\"doi\":\"10.3849/aimt.01466\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Today thanks to the wireless networking technologies and social networks, the inter-pretation of cyberspace has expanded. According to the three-layered structure of cyberspace, not only logical effects can be induced in this domain, e.g. by malwares, but physical and cognitive effects also appear in the physical and cyber-persona lay-ers, e.g. electronic jamming the wireless communications of network or influencing and manipulating users. This approach provides an opportunity to interpret cyberspace operations in a more complex way and to apply integrated technical and cognitive information capabilities that exploit each others effects. Accordingly, this study pre-sents an expanded interpretation of cyberspace, a novel and complex approach to cyberspace operations, as well as the information capabilities that can be used in these operations.\",\"PeriodicalId\":39125,\"journal\":{\"name\":\"Advances in Military Technology\",\"volume\":\" \",\"pages\":\"\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2021-06-30\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Advances in Military Technology\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.3849/aimt.01466\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q4\",\"JCRName\":\"Engineering\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Advances in Military Technology","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.3849/aimt.01466","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q4","JCRName":"Engineering","Score":null,"Total":0}
Relationships between Cyberspace Operations and Information Operations
Today thanks to the wireless networking technologies and social networks, the inter-pretation of cyberspace has expanded. According to the three-layered structure of cyberspace, not only logical effects can be induced in this domain, e.g. by malwares, but physical and cognitive effects also appear in the physical and cyber-persona lay-ers, e.g. electronic jamming the wireless communications of network or influencing and manipulating users. This approach provides an opportunity to interpret cyberspace operations in a more complex way and to apply integrated technical and cognitive information capabilities that exploit each others effects. Accordingly, this study pre-sents an expanded interpretation of cyberspace, a novel and complex approach to cyberspace operations, as well as the information capabilities that can be used in these operations.