Please use this identifier to cite or link to this item: https://hdl.handle.net/11147/5140
Full metadata record
DC FieldValueLanguage
dc.contributor.authorTekir, Selma-
dc.date.accessioned2017-03-27T06:54:23Z-
dc.date.available2017-03-27T06:54:23Z-
dc.date.issued2012-
dc.identifier.citationTekir, S. (2012). Overt information operations during peacetime. Paper presented at the 11th European Conference on Information Warfare and Security 2012 (ECIW 2012) Laval, France, July 5-6 (pp.272-276). Red Hook, NY: Curran.en_US
dc.identifier.isbn9781622765379-
dc.identifier.urihttp://hdl.handle.net/11147/5140-
dc.description11th European Conference on Information Warfare and Security 2012, ECIW 2012; Laval; France; 5 July 2012 through 6 July 2012en_US
dc.description.abstractInformation superiority is the most critical asset in war making. It directly addresses the perception of the opponent and in the long term the will of him to act. Sun Tzu's classical text states this fact by the concept of deception as the basis of all warfare. The success in warfare then is dependent on being aware of what's happening, accurately realizing the context. This is the intelligence function in broad terms and mostly open source intelligence as it provides the context. Competitive intelligence is based mainly on open sources and day by day the open source share in the intelligence product is increasing. Present diversified open sources & services represent a methodology shift in war. The two preceding ways have been overt physical acts against military targets in wartime and covert information operations conducted throughout peacetime against even nonmilitary targets respectively. The present methodology must be overt (open) information operations during peacetime. This coincides with a metaphor change as well. It proposes a transformation from a war metaphor into a game metaphor in which there are some playing rules. In fact, the existence of such rules helps in drawing the boundary of the field of competitive intelligence and thus making it a profession. Game metaphor is safer to adopt than war as it's easier to take responsibility in public disclosure scenarios in this case. By following this metaphor, you continue to stay in the boundary of legitimate competition. In other terms, you make a conscious preference in terms of war intensities by choosing to avoid the more intense war forms limited conflict, and actual warfare respectively. Finally, this preference is in accordance with the fundamental point of the Sun Tzu's entire argument: The vision of victory without fighting. To summarize, open source domination in the competitive intelligence lays the ground for the game metaphor that represents a transformation in warfare. The apparent outcome is overt information operations during peacetime. It emerges as the most important tool to fight against deception, thus success in information warfare in the contemporary world.en_US
dc.language.isoenen_US
dc.publisherCurran Associatesen_US
dc.relation.ispartof11th European Conference on Information Warfare and Security 2012, ECIW 2012en_US
dc.rightsinfo:eu-repo/semantics/openAccessen_US
dc.subjectCompetitive intelligenceen_US
dc.subjectEthicsen_US
dc.subjectInformation operationsen_US
dc.subjectInformation warfareen_US
dc.subjectOpen sourcesen_US
dc.titleOvert information operations during peacetimeen_US
dc.typeConference Objecten_US
dc.authoridTekir, Selmaen_US
dc.institutionauthorTekir, Selma-
dc.departmentİzmir Institute of Technology. Computer Engineeringen_US
dc.identifier.startpage272en_US
dc.identifier.endpage276en_US
dc.identifier.wosWOS:000308223300034en_US
dc.identifier.scopus2-s2.0-84873133126en_US
dc.relation.publicationcategoryKonferans Öğesi - Uluslararası - Kurum Öğretim Elemanıen_US
dc.identifier.wosqualityN/A-
dc.identifier.scopusqualityN/A-
item.fulltextWith Fulltext-
item.grantfulltextopen-
item.languageiso639-1en-
item.openairecristypehttp://purl.org/coar/resource_type/c_18cf-
item.cerifentitytypePublications-
item.openairetypeConference Object-
crisitem.author.dept03.04. Department of Computer Engineering-
Appears in Collections:Computer Engineering / Bilgisayar Mühendisliği
Scopus İndeksli Yayınlar Koleksiyonu / Scopus Indexed Publications Collection
WoS İndeksli Yayınlar Koleksiyonu / WoS Indexed Publications Collection
Files in This Item:
File Description SizeFormat 
5140.pdfConference Paper246.87 kBAdobe PDFThumbnail
View/Open
Show simple item record



CORE Recommender

Page view(s)

338
checked on Nov 18, 2024

Download(s)

106
checked on Nov 18, 2024

Google ScholarTM

Check




Altmetric


Items in GCRIS Repository are protected by copyright, with all rights reserved, unless otherwise indicated.