Please use this identifier to cite or link to this item:
https://hdl.handle.net/11147/5140
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Tekir, Selma | - |
dc.date.accessioned | 2017-03-27T06:54:23Z | - |
dc.date.available | 2017-03-27T06:54:23Z | - |
dc.date.issued | 2012 | - |
dc.identifier.citation | Tekir, S. (2012). Overt information operations during peacetime. Paper presented at the 11th European Conference on Information Warfare and Security 2012 (ECIW 2012) Laval, France, July 5-6 (pp.272-276). Red Hook, NY: Curran. | en_US |
dc.identifier.isbn | 9781622765379 | - |
dc.identifier.uri | http://hdl.handle.net/11147/5140 | - |
dc.description | 11th European Conference on Information Warfare and Security 2012, ECIW 2012; Laval; France; 5 July 2012 through 6 July 2012 | en_US |
dc.description.abstract | Information superiority is the most critical asset in war making. It directly addresses the perception of the opponent and in the long term the will of him to act. Sun Tzu's classical text states this fact by the concept of deception as the basis of all warfare. The success in warfare then is dependent on being aware of what's happening, accurately realizing the context. This is the intelligence function in broad terms and mostly open source intelligence as it provides the context. Competitive intelligence is based mainly on open sources and day by day the open source share in the intelligence product is increasing. Present diversified open sources & services represent a methodology shift in war. The two preceding ways have been overt physical acts against military targets in wartime and covert information operations conducted throughout peacetime against even nonmilitary targets respectively. The present methodology must be overt (open) information operations during peacetime. This coincides with a metaphor change as well. It proposes a transformation from a war metaphor into a game metaphor in which there are some playing rules. In fact, the existence of such rules helps in drawing the boundary of the field of competitive intelligence and thus making it a profession. Game metaphor is safer to adopt than war as it's easier to take responsibility in public disclosure scenarios in this case. By following this metaphor, you continue to stay in the boundary of legitimate competition. In other terms, you make a conscious preference in terms of war intensities by choosing to avoid the more intense war forms limited conflict, and actual warfare respectively. Finally, this preference is in accordance with the fundamental point of the Sun Tzu's entire argument: The vision of victory without fighting. To summarize, open source domination in the competitive intelligence lays the ground for the game metaphor that represents a transformation in warfare. The apparent outcome is overt information operations during peacetime. It emerges as the most important tool to fight against deception, thus success in information warfare in the contemporary world. | en_US |
dc.language.iso | en | en_US |
dc.publisher | Curran Associates | en_US |
dc.relation.ispartof | 11th European Conference on Information Warfare and Security 2012, ECIW 2012 | en_US |
dc.rights | info:eu-repo/semantics/openAccess | en_US |
dc.subject | Competitive intelligence | en_US |
dc.subject | Ethics | en_US |
dc.subject | Information operations | en_US |
dc.subject | Information warfare | en_US |
dc.subject | Open sources | en_US |
dc.title | Overt information operations during peacetime | en_US |
dc.type | Conference Object | en_US |
dc.authorid | Tekir, Selma | en_US |
dc.institutionauthor | Tekir, Selma | - |
dc.department | İzmir Institute of Technology. Computer Engineering | en_US |
dc.identifier.startpage | 272 | en_US |
dc.identifier.endpage | 276 | en_US |
dc.identifier.wos | WOS:000308223300034 | en_US |
dc.identifier.scopus | 2-s2.0-84873133126 | en_US |
dc.relation.publicationcategory | Konferans Öğesi - Uluslararası - Kurum Öğretim Elemanı | en_US |
dc.identifier.wosquality | N/A | - |
dc.identifier.scopusquality | N/A | - |
item.fulltext | With Fulltext | - |
item.grantfulltext | open | - |
item.languageiso639-1 | en | - |
item.openairecristype | http://purl.org/coar/resource_type/c_18cf | - |
item.cerifentitytype | Publications | - |
item.openairetype | Conference Object | - |
crisitem.author.dept | 03.04. Department of Computer Engineering | - |
Appears in Collections: | Computer Engineering / Bilgisayar Mühendisliği Scopus İndeksli Yayınlar Koleksiyonu / Scopus Indexed Publications Collection WoS İndeksli Yayınlar Koleksiyonu / WoS Indexed Publications Collection |
CORE Recommender
Page view(s)
338
checked on Nov 18, 2024
Download(s)
106
checked on Nov 18, 2024
Google ScholarTM
Check
Altmetric
Items in GCRIS Repository are protected by copyright, with all rights reserved, unless otherwise indicated.