AZERBAIJAN NATIONAL ACADEMY OF SCIENCES
ON SOME MODELS OF THE INFORMATION WAR
Irada Y. Alakbarova

The article provides comments about certain terms in connection with the information war, demostrates the goals and objectives of the information war. some models used in information warfare are analyzed. (pp. 41-47)

Keywords:information attack, critical infrastructure, models of information warfare, psychological effect, cyberwar
References
  • Расторгуев С.П. Математические модели в информационном противоборстве. Москва. Экзистенциальная математика, 2014, 260 c.
  • Rona T. P. Weapon Systems and Information War // Boeing Aerospace Co., 1976, pp. 14.
  • Ələkbərova İ.Y. İnformasiya müharibəsi texnologiyalarının analizi və təsnifatı // İnformasiya cəmiyyəti problemləri, 2010, №2, s. 80–91.
  • Libicki M., What is Information Warfare? // National Defense University. ACIS, 1995, pp. 3
  • Arguilla J.,  Ronfeldt D.,  Cyberwar is coming! // Comparative Strategy, 1993, 12, no 2, pp. 141–165.
  • Kopp C. Shannon, Hypergames and Information Warfare // Journal of Information Warfare, 2002, vol. 2, no 2, pp. 108–118.
  • Moteff J., Parfomack P. Critical infrastructure and key assets: Definition and identification. CRS Report for Congress, 2004, http://www.fas.org/ sgp/crs/RL32631.pdf
  • Алекперова И.Я., Comparative analysis of information attacks in Internet //   Информационные технологии и компьютерная инженерия, 2010, №3 (19), с. 81–87.
  • Brett N., Manoj S. M. Relevance of information warfare models to critical infrastructure protection // Journal of Military Studies, 2011, 39, no 2, pp. 99–122.
  • Shannon C. E. A Mathematical Theory of Communication // The Bell System Technical Journal, 1948, vol. 27, no 3, pp. 379–423.
  • PoiselA. Information Warfare and Electronic Warfare Systems, Boston: Artech House, 2013, 414 p.
  • Kopp C. The four strategies of information warfare and their applications // IO Journal, 2010, vol. 1, no 4, p. 28–33.
  • Waltz K.N. International politics is not foreign policy // Security Studies, 1996, vol. 6, no. 1, p. 54–57
  • Hutchinson W. Warren M. The law and cyber terrorism // Journal of information warfare, 2003, vol. 2, no. 2, pp. 27-32.
  • Pfeeger P.C., Pfleeger S.L. Security in computing, 4rd edition. Upper Saddle River, NJ: Prentice Hall, 2007, 846 p.
  • Ventre Information Warfare, Wiley-ISTE, 2009, 320 p.
  • Cox L.V. Planning for psychological operations a proposal. The Research Department. Air Command and Staff College, 1997, 91 p.
  • Brett N., Manoj S.M. The Information Warfare Life Cycle Model // Journal of Information Management, 2011, 13, no 1, pp. 11–20.