Skip to search
Skip to main content
Search in
Keyword
Title (keyword)
Author (keyword)
Subject (keyword)
Title starts with
Subject (browse)
Author (browse)
Author (sorted by title)
Call number (browse)
search for
Search
Advanced Search
Bookmarks
(
0
)
Princeton University Library Catalog
Start over
Cite
Send
to
SMS
Email
Printer
Bookmark
Information operations matters : best practices / Leigh Armistead.
Author
Armistead, Leigh, 1962-
[Browse]
Format
Book
Language
English
Εdition
1st ed.
Published/Created
Washington, D.C. : Potomac Books, c2010.
Description
xi, 153 p. : ill. ; 23 cm.
Availability
Copies in the Library
Location
Call Number
Status
Location Service
Notes
ReCAP - Remote Storage
U163 .A698 2010
Browse related items
Request
Details
Subject(s)
Information warfare
—
United States
[Browse]
Network-centric operations (Military science)
—
United States
[Browse]
United States
—
Military policy
[Browse]
Summary note
Introduced in 1998 by Department of Defense, the concept of information operations (IO) proposed to revolutionize ways in which warfare, diplomacy, and business were conducted. However, this transformation has not come to fruition. Two large gaps remain: between policy and theory, and between funding needs of IO initiatives and actual funds the federal bureaucracy is willing to provide to support these operations. These two discrepancies are central to the overall discussions of Information Operations Matters. Leigh Armistead explains why these gaps exist and suggests ways to close them. Also in discussing best practices in IO, he clarifies how key agencies of the U.S. government can use the inherent power of information to better conduct future strategic communication campaigns. Information Operations Matters presents a more pragmatic approach to IO, recommending that IO policy be made surrounding usable concepts, definitions, theories, and capabilities that are attainable with the resources available. To meet threats of the future as well as those facing us today, Armistead argues, it is necessary to use this new area of operations to the greatest extent possible--Publisher's description.
Bibliographic references
Includes bibliographical references and index.
Action note
Committed to retain in perpetuity — ReCAP Shared Collection (HUL)
Contents
Introduction
Chapter 1 : Understanding the problem. Information operations
Emerging IO theory
The day-to-day reality of how IO is conducted by the United States
The relevance of IO in the broader strategic theory.
Chapter 2 : A theoretical review of information operations in the United States. Theoretical constructs
International relations theories : How thely compare to IO
Liberalism
Realism
Alternate international relations theories
Definitions of power, information, and IO : changing views of power
Soft power
Power in the information age.
Chapter 3 : The development of IO. The role of information in warfare
The role of information in government organizations
Understanding information operations
IO development in the United States
Historical IO case studies : From Hiroshima to the Berlin Wall, The Cold War Era
The revolution in military affairs and the global war on terrorism
Translating power into outcomes, Kosovo (1999).
Chapter 4: Recent changes to IO. Policy changes : the information operations roadmap
Critical infrastructure protection
Computer network defense
Defensive IO policy that led to the creation of the Department of Homeland Security
U.S. IO policy : Problems and successes : U.S. critical infrastructure protection policies prior to 9/11
PDD-68, "International Public Information"
IO organizational changes in the U.S. government : U.S. critical infrastructure protection policies after 9/11
The effects of 9/11 on IO organizations
Summary.
Chapter 5: IO applicability to theory and practice. Why does IO matter?
Why is there no overall strategic theory in the United States for IO? : Does military doctrine equal IO strategic theory?
Why is the State Department not issuing strategic guidance?
Is information operations the best term? : Problems with the use of IO as a term
The need for taxonomy
Why is the top-down approach to IO not working in the U.S. government? : Is the revolution in military affairs / diplomatic affairs an answer?
Why is the State Department failing in its public diplomacy role?
Why is there no rhyme or reason to the IO training and education curricula? : Can lessons be learned from the information assurance community?
Issues that still exist with developing commonality with respect to the IO training and education situation.
Chapter 6 : Key findings in this book. Suggestions for improvement based on the soft system methodologly and literature review : A plan to develop an overarching IO theory
A model to establish a taxonomy and set of definitions for IO
An analysis of which approaches and processes work best to support IO
Develop an international standards effort with respect to IO training and education
Areas for future research
Conclusion.
Show 41 more Contents items
Other title(s)
Project Muse UPCC books
ISBN
9781597974363 (pbk. : alk. paper)
1597974366 (pbk. : alk. paper)
LCCN
^^2010007938
OCLC
551197490
RCP
H - S
Statement on language in description
Princeton University Library aims to describe library materials in a manner that is respectful to the individuals and communities who create, use, and are represented in the collections we manage.
Read more...
Ask a Question
Suggest a Correction
Report Harmful Language
Supplementary Information
Other versions
Information operations matters : best practices / Leigh Armistead.
id
9961451223506421