Relationships between Cyberspace Operations and Information Operations
AbstractToday thanks to the wireless networking technologies and social networks, the inter-pretation of cyberspace has expanded. According to the three-layered structure of cyberspace, not only logical effects can be induced in this domain, e.g. by malwares, but physical and cognitive effects also appear in the physical and cyber-persona lay-ers, e.g. electronic jamming the wireless communications of network or influencing and manipulating users. This approach provides an opportunity to interpret cyberspace operations in a more complex way and to apply integrated technical and cognitive information capabilities that exploit each others effects. Accordingly, this study pre-sents an expanded interpretation of cyberspace, a novel and complex approach to cyberspace operations, as well as the information capabilities that can be used in these operations.
Number of Internet of Things (IoT) Connected Devices Worldwide in 2018, 2025 and 2030 [online]. January 2021 [viewed 2021-01-27]. Available from: https://www.statista.com/statistics/802690/worldwide-connected-devices-by-access-technology/
FULLER, J.R. The 4 Stages of an IoT Architecture [online]. May 2016 [viewed 2021-01-29] Available from: https://techbeacon.com/4-stages-iot-architecture
Forecast Number of Mobile 5G Subscriptions Worldwide by Region from 2019 to 2026 [online]. January 2021 [viewed 2021-01-17]. Available from: https://www.statista.com/statistics/760275/5g-mobile-subscriptions-worldwide/
DARPA Wants to Militarise the IoT [online]. [viewed 2021-01-21]. Available from: https://internetofbusiness.com/darpa-wants-militarise-iot/
Military Applications of Internet of Things [online]. NATO Science and Technolo-gy Organization, 2016 [viewed 2021-01-21]. Available from: https://www.sto.nato.int/Lists/test1/activitydetails.aspx?ID=16536
RELIA, S. Cyber Warfare: Its Implications on National Security. New Delhi: Vij Books India, 2015. ISBN 978-93-84464-82-0.
Overview of Cybersecurity [online]. April 2008 [viewed 2020-12-06]. Available from: https://www.itu.int/rec/dologin_pub.asp?lang=e&id=T-REC-X.1205-200804-I!!PDF-E&type=items
DoD Dictionary of Military and Associated Terms [online]. June 2020 [viewed 2020-12-06]. Available from: http://www.jcs.mil/Portals/36/Documents/Doctrine/pubs/dictionary.pdf
KE X., Q. YI and Y. KUN. A Tutorial on Internet of Things: From A Heterogeneous Network Integration Perspective. IEEE Network, 2016, 30(2), pp. 102-108. DOI 10.1109/MNET.2016.7437031.
Cyberspace and Electronic Warfare Operations [online]. April 2017 [viewed 2020-12-06] Available from: https://fas.org/irp/doddir/army/fm3-12.pdf
Cyberspace Operations [online]. June 2018 [viewed 2020-12-06]. Available from: https://www.jcs.mil/Portals/36/Documents/Doctrine/pubs/jp3_12.pdf
PORCHE III, I.R., C. PAUL, C.C. SERENA, C.P. CLARKE, E.-E. JOHNSON and D. HERRICK. Tactical Cyber. Building a Strategy for Cyber Support to Corps and Below. Santa Monica: RAND, 2017. ISBN 978-0-8330-9608-1.
Cyber Primer [online]. 2nd ed. Swindon: Ministry of Defence, 2016 [viewed 2020-12-06]. Available from: https://assets.publishing.service.gov.uk/government/uploads/system/uploads/attachment_data/file/549291/20160720-Cyber_Primer_ed_2_secured.pdf
Aspects and Pillars of Cyber Security [online]. [viewed 2020-12-06]. Available from: https://www.usna.edu/CyberDept/sy110/calendar.php?type=class&event=2
Terms & Definitions of Interest for DoD Counterintelligence Professionals [online]. May 2011 [viewed 2020-12-06]. Available from: https://www.dni.gov/files/NCSC/documents/ci/CI_Glossary.pdf
Joint Doctrine Note 2/13 Information Superiority [online]. Swindon: Ministry of Defence, 2013. [viewed 2020-12-05]. Available from: https://assets.publishing.ser-vice.gov.uk/government/uploads/system/uploads/attachment_data/file/819814/archive_doctrine_uk_info_superiority_jdn_2_13.pdf
HAIG, Zs. Information Operations in the Cyberspace (in Hungarian). Budapest: Dialog Campus, 2018. ISBN 978-615-5945-04-5.
LIPOVSKY, R. and A. CHEREPANOV. Black Energy Trojan Strikes Again: At-tacks Ukrainian Electric Power Industry [online]. January 2016 [viewed 2020-12-06]. Available from: https://www.welivesecurity.com/2016/01/04/blackenergy-trojan-strikes-again-attacks-ukrainian-electric-power-industry/
How to Cite
Authors who publish with this journal agree to the following terms:
1. Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
2. Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
3. Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work.
Users can use, reuse and build upon the material published in the journal for any purpose, even commercially.