The first electronic war is recognised with what Estonia experienced for three weeks in May 2007. Estonia claimed to be under attack, not in the traditional way, but the victim of a new form of combat – cyberwarfare that ought to be treated as an attack against the state. This incident became a warning for individuals and governments around the world in connection with cyber vulnerabilities and electronic warfare. Like other nations, Norway also possesses military activities/programs with respect to network based defence. As prerequisite for the concept of network based defence is a functional information infrastructure. Increased control and security of own military information and relative information superiority in relation to adversarie...
This rigorous thesis analyses use of information and information systems in military operations. The...
The information arena is today incorporated into all types of conflicts and offers, in addition to c...
The threat of possible cyber terrorism to critical infrastructures has brought cyber incidents to th...
The first electronic war is recognised with what Estonia experienced for three weeks in May 2007. Es...
Cyber warfare twenty-first century is becoming increasingly important and is becoming the fifth mili...
11th European Conference on Information Warfare and Security 2012, ECIW 2012; Laval; France; 5 July ...
The absence of previous research regarding Russia´s use of information warfare has not been able to ...
The government’s cyber defense effort is a growing concern in the Norwegian security landscape. The ...
Threat actors conduct offensive cyberspace operations for many purposes, such as espionage, to destr...
This study examines the role of military support to civil authorities in the event of a national cyb...
In accordance with the EU Network and Information Security directive (NIS directive), the Swedish go...
The new information society has revolutionised almost the entire world. But the new technique does n...
Den accelererande teknikutvecklingen tillsammans med den ökade digitaliseringen av samhället har för...
The paper explores the notion of cyber attack as a concept for understanding modern conflicts. It st...
Information systems have been used in all parts of our world and with the help of information system...
This rigorous thesis analyses use of information and information systems in military operations. The...
The information arena is today incorporated into all types of conflicts and offers, in addition to c...
The threat of possible cyber terrorism to critical infrastructures has brought cyber incidents to th...
The first electronic war is recognised with what Estonia experienced for three weeks in May 2007. Es...
Cyber warfare twenty-first century is becoming increasingly important and is becoming the fifth mili...
11th European Conference on Information Warfare and Security 2012, ECIW 2012; Laval; France; 5 July ...
The absence of previous research regarding Russia´s use of information warfare has not been able to ...
The government’s cyber defense effort is a growing concern in the Norwegian security landscape. The ...
Threat actors conduct offensive cyberspace operations for many purposes, such as espionage, to destr...
This study examines the role of military support to civil authorities in the event of a national cyb...
In accordance with the EU Network and Information Security directive (NIS directive), the Swedish go...
The new information society has revolutionised almost the entire world. But the new technique does n...
Den accelererande teknikutvecklingen tillsammans med den ökade digitaliseringen av samhället har för...
The paper explores the notion of cyber attack as a concept for understanding modern conflicts. It st...
Information systems have been used in all parts of our world and with the help of information system...
This rigorous thesis analyses use of information and information systems in military operations. The...
The information arena is today incorporated into all types of conflicts and offers, in addition to c...
The threat of possible cyber terrorism to critical infrastructures has brought cyber incidents to th...