Blog Posts Tagged with "Information Operations"

94ae16c30d35ee7345f3235dfb11113c

The 3-C Model

December 12, 2012 Added by:Joel Harding

Information Operations is changing from a focus on the former five components to ‘how’ IO works. What is lacking is a model. Without a model we can talk about IO in a general sense but there are no ways to divvy up what we do into logical divisions, dissuading useful discussions within our field...

Comments  (0)

94ae16c30d35ee7345f3235dfb11113c

How Best to Discuss a Whole of Nation Approach to Information Activities

November 12, 2012 Added by:Joel Harding

Now that IO has a new definition, there is no longer a clear cut way to divide up the parts. My friend and mentor, Dr. Dan Kuehl, invented a model I like to use, called the Three C model. ‘What we do’ can be divided into Connectivity, Content and Cognitive...

Comments  (0)

94ae16c30d35ee7345f3235dfb11113c

Cyber Security and Illegal Information Operations

December 13, 2011 Added by:Joel Harding

The Concept of Convention on International Information Security was released in 2011 by the Shanghai Cooperative Organization, consisting of China, Kazakhstan, Kyrgyzstan, Russia, Tajikistan, and Uzbekistan. This concept was floated to the UN as a construct for international cybersecurity...

Comments  (0)