The main methods of information warfare and information war as a phenomenon of modern international political process
The recent trends in the development of contemporary international relations have led to the transition from classical interstate military the confrontation to confrontation in the information sphere. Information weapons became A practical means of its implementation. However, the development of modern technology has made it accessible to a wider range of players and promotes their involvement in the protection of information and processes to achieve the benefits of information. The main purpose of the article is to analyse of the main ways of conducting practical information warfare and information warfare, as a fairly new phenomenon in international relations
Гриняев С. Н. Национальная информационная стратегия как основа внешней и внутренней политики США в 21 веке. Защита информации / С. Н. Гриняев // Конфидент. – № 5. – 2002. – С. 26-31; № 6. – 2002. – С. 12-22.
Цыганков В. Д. Психотронное оружие и безопасность России. Серия «Информатизация России на пороге ХХІ века» / В. Д. Цыганков, В. Н. Лопатин – М. : СИНТЕГ, 1999. – 152 с.
Юдін О. К. Інформаційна безпека держави / О. К. Юдін, В. М. Богуш. – К. : Консум, 2005. – 576 с.
Angell R. N. The Great Illusion : A Study of Relation of Military Power to National Advantages / R. N. Angell – London, 2010 – 672 р.
Garden T. The Technology Trap : Science and the Military. / T. Garden – McLean, VA : Brassey’s Defense Pubishers, 2009. – 238 р.
Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication of this work under the terms of a license Creative Commons Attribution License 4.0 International (CC BY 4.0).
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work.