Information operations matters : best practices / Leigh Armistead.

Author
Armistead, Leigh, 1962- [Browse]
Format
Book
Language
English
Εdition
1st ed.
Published/​Created
Washington, D.C. : Potomac Books, c2010.
Description
xi, 153 p. : ill. ; 23 cm.

Availability

Copies in the Library

Location Call Number Status Location Service Notes
ReCAP - Remote StorageU163 .A698 2010 Browse related items Request

    Details

    Subject(s)
    Summary note
    Introduced in 1998 by Department of Defense, the concept of information operations (IO) proposed to revolutionize ways in which warfare, diplomacy, and business were conducted. However, this transformation has not come to fruition. Two large gaps remain: between policy and theory, and between funding needs of IO initiatives and actual funds the federal bureaucracy is willing to provide to support these operations. These two discrepancies are central to the overall discussions of Information Operations Matters. Leigh Armistead explains why these gaps exist and suggests ways to close them. Also in discussing best practices in IO, he clarifies how key agencies of the U.S. government can use the inherent power of information to better conduct future strategic communication campaigns. Information Operations Matters presents a more pragmatic approach to IO, recommending that IO policy be made surrounding usable concepts, definitions, theories, and capabilities that are attainable with the resources available. To meet threats of the future as well as those facing us today, Armistead argues, it is necessary to use this new area of operations to the greatest extent possible--Publisher's description.
    Bibliographic references
    Includes bibliographical references and index.
    Action note
    Committed to retain in perpetuity — ReCAP Shared Collection (HUL)
    Contents
    • Introduction
    • Chapter 1 : Understanding the problem. Information operations
    • Emerging IO theory
    • The day-to-day reality of how IO is conducted by the United States
    • The relevance of IO in the broader strategic theory.
    • Chapter 2 : A theoretical review of information operations in the United States. Theoretical constructs
    • International relations theories : How thely compare to IO
    • Liberalism
    • Realism
    • Alternate international relations theories
    • Definitions of power, information, and IO : changing views of power
    • Soft power
    • Power in the information age.
    • Chapter 3 : The development of IO. The role of information in warfare
    • The role of information in government organizations
    • Understanding information operations
    • IO development in the United States
    • Historical IO case studies : From Hiroshima to the Berlin Wall, The Cold War Era
    • The revolution in military affairs and the global war on terrorism
    • Translating power into outcomes, Kosovo (1999).
    • Chapter 4: Recent changes to IO. Policy changes : the information operations roadmap
    • Critical infrastructure protection
    • Computer network defense
    • Defensive IO policy that led to the creation of the Department of Homeland Security
    • U.S. IO policy : Problems and successes : U.S. critical infrastructure protection policies prior to 9/11
    • PDD-68, "International Public Information"
    • IO organizational changes in the U.S. government : U.S. critical infrastructure protection policies after 9/11
    • The effects of 9/11 on IO organizations
    • Summary.
    • Chapter 5: IO applicability to theory and practice. Why does IO matter?
    • Why is there no overall strategic theory in the United States for IO? : Does military doctrine equal IO strategic theory?
    • Why is the State Department not issuing strategic guidance?
    • Is information operations the best term? : Problems with the use of IO as a term
    • The need for taxonomy
    • Why is the top-down approach to IO not working in the U.S. government? : Is the revolution in military affairs / diplomatic affairs an answer?
    • Why is the State Department failing in its public diplomacy role?
    • Why is there no rhyme or reason to the IO training and education curricula? : Can lessons be learned from the information assurance community?
    • Issues that still exist with developing commonality with respect to the IO training and education situation.
    • Chapter 6 : Key findings in this book. Suggestions for improvement based on the soft system methodologly and literature review : A plan to develop an overarching IO theory
    • A model to establish a taxonomy and set of definitions for IO
    • An analysis of which approaches and processes work best to support IO
    • Develop an international standards effort with respect to IO training and education
    • Areas for future research
    • Conclusion.
    Other title(s)
    Project Muse UPCC books
    ISBN
    • 9781597974363 (pbk. : alk. paper)
    • 1597974366 (pbk. : alk. paper)
    LCCN
    ^^2010007938
    OCLC
    551197490
    RCP
    H - S
    Statement on language in description
    Princeton University Library aims to describe library materials in a manner that is respectful to the individuals and communities who create, use, and are represented in the collections we manage. Read more...

    Supplementary Information