Overt information operations during peacetime

dc.contributor.author Tekir, Selma
dc.date.accessioned 2017-03-27T06:54:23Z
dc.date.available 2017-03-27T06:54:23Z
dc.date.issued 2012
dc.description 11th European Conference on Information Warfare and Security 2012, ECIW 2012; Laval; France; 5 July 2012 through 6 July 2012 en_US
dc.description.abstract Information superiority is the most critical asset in war making. It directly addresses the perception of the opponent and in the long term the will of him to act. Sun Tzu's classical text states this fact by the concept of deception as the basis of all warfare. The success in warfare then is dependent on being aware of what's happening, accurately realizing the context. This is the intelligence function in broad terms and mostly open source intelligence as it provides the context. Competitive intelligence is based mainly on open sources and day by day the open source share in the intelligence product is increasing. Present diversified open sources & services represent a methodology shift in war. The two preceding ways have been overt physical acts against military targets in wartime and covert information operations conducted throughout peacetime against even nonmilitary targets respectively. The present methodology must be overt (open) information operations during peacetime. This coincides with a metaphor change as well. It proposes a transformation from a war metaphor into a game metaphor in which there are some playing rules. In fact, the existence of such rules helps in drawing the boundary of the field of competitive intelligence and thus making it a profession. Game metaphor is safer to adopt than war as it's easier to take responsibility in public disclosure scenarios in this case. By following this metaphor, you continue to stay in the boundary of legitimate competition. In other terms, you make a conscious preference in terms of war intensities by choosing to avoid the more intense war forms limited conflict, and actual warfare respectively. Finally, this preference is in accordance with the fundamental point of the Sun Tzu's entire argument: The vision of victory without fighting. To summarize, open source domination in the competitive intelligence lays the ground for the game metaphor that represents a transformation in warfare. The apparent outcome is overt information operations during peacetime. It emerges as the most important tool to fight against deception, thus success in information warfare in the contemporary world. en_US
dc.identifier.citation Tekir, S. (2012). Overt information operations during peacetime. Paper presented at the 11th European Conference on Information Warfare and Security 2012 (ECIW 2012) Laval, France, July 5-6 (pp.272-276). Red Hook, NY: Curran. en_US
dc.identifier.isbn 9781622765379
dc.identifier.scopus 2-s2.0-84873133126
dc.identifier.uri https://hdl.handle.net/11147/5140
dc.language.iso en en_US
dc.publisher Curran Associates en_US
dc.relation.ispartof 11th European Conference on Information Warfare and Security 2012, ECIW 2012 en_US
dc.rights info:eu-repo/semantics/openAccess en_US
dc.subject Competitive intelligence en_US
dc.subject Ethics en_US
dc.subject Information operations en_US
dc.subject Information warfare en_US
dc.subject Open sources en_US
dc.title Overt information operations during peacetime en_US
dc.type Conference Object en_US
dspace.entity.type Publication
gdc.author.id Tekir, Selma
gdc.author.institutional Tekir, Selma
gdc.coar.access open access
gdc.coar.type text::conference output
gdc.description.department İzmir Institute of Technology. Computer Engineering en_US
gdc.description.endpage 276 en_US
gdc.description.publicationcategory Konferans Öğesi - Uluslararası - Kurum Öğretim Elemanı en_US
gdc.description.scopusquality N/A
gdc.description.startpage 272 en_US
gdc.description.wosquality N/A
gdc.identifier.wos WOS:000308223300034
gdc.index.type WoS
gdc.index.type Scopus
gdc.scopus.citedcount 0
gdc.wos.citedcount 0
relation.isAuthorOfPublication.latestForDiscovery 57639474-3954-4f77-a84c-db8a079648a8
relation.isOrgUnitOfPublication.latestForDiscovery 9af2b05f-28ac-4014-8abe-a4dfe192da5e

Files

Original bundle

Now showing 1 - 1 of 1
Loading...
Name:
5140.pdf
Size:
246.87 KB
Format:
Adobe Portable Document Format
Description:
Conference Paper

License bundle

Now showing 1 - 1 of 1
Loading...
Name:
license.txt
Size:
1.71 KB
Format:
Item-specific license agreed upon to submission
Description: