Academia.eduAcademia.edu

Information Warfare

description1,625 papers
group16,803 followers
lightbulbAbout this topic
Information Warfare refers to the strategic use of information and communication technologies to gain a competitive advantage over adversaries. It encompasses tactics such as misinformation, cyber attacks, and psychological operations aimed at influencing public perception, disrupting decision-making processes, and undermining the credibility of opponents.
lightbulbAbout this topic
Information Warfare refers to the strategic use of information and communication technologies to gain a competitive advantage over adversaries. It encompasses tactics such as misinformation, cyber attacks, and psychological operations aimed at influencing public perception, disrupting decision-making processes, and undermining the credibility of opponents.

Key research themes

1. How can ethical frameworks address the challenges posed by evolving forms of Information Warfare?

This research theme examines the ethical implications and philosophical foundations related to Information Warfare (IW), exploring how traditional Just War Theory adapts to cyber and information domains, the moral status of emerging technologies like autonomous weapons, and alternative normative approaches to regulating IW. The matter is critical as IW reshapes the understanding of warfare, often blurring the lines between combatants and civilians, and demands clarity on legitimate conduct and policy development.

Key finding: The paper articulates that IW is not merely an evolution of warfighting techniques but fundamentally alters the concept of war itself by enabling potentially bloodless, cost-effective engagements that challenge classical... Read more
Key finding: This article characterizes cognitive warfare as a strategic effort to alter the population’s thinking and behavior through disinformation and computational propaganda. It differentiates cognitive warfare from traditional... Read more
Key finding: This paper advances the understanding of cognitive warfare as a driver for weaponizing human cognition through media saturation, algorithmic infrastructures, and emotional manipulation. It deploys socio-cultural and ethical... Read more
Key finding: This study empirically demonstrates how cognitive-emotional warfare operates through agenda-setting, framing, engineered consent, and microtargeting to manipulate political behavior. Employing mixed qualitative-quantitative... Read more

2. What are effective systemic and technological approaches to managing Information Warfare operations and responses?

This theme focuses on the design, implementation, and evaluation of frameworks and models for the management, detection, and mitigation of information operations and IW-related threats. It includes systems engineering perspectives, the integration of AI and machine learning for operational advantage, and adaptive defense mechanisms. Understanding how to operationalize information warfare both offensively and defensively, and how to counter misinformation and cyber threats technologically, is essential for national security and strategic resilience.

Key finding: This study develops a referential, system-process model for effectively managing information warfare by integrating management and quality science methodologies with security science perspectives. Using concepts such as... Read more
Key finding: Introducing AMSiC, this paper presents an AI-driven adaptive framework that synthesizes game theory, dynamic system modeling, network analysis, and machine learning for decision-making in informational chaos. It... Read more
Key finding: This paper proposes the Omega (Ω) Module within the Kestlerian Framework as an epistemic immune system for real-time detection and quantification of cognitive and narrative threats posed by disinformation campaigns. It... Read more

3. How do algorithms, AI technologies, and digital platforms transform Information Warfare and influence democratic societies?

This theme examines the intersection of AI-driven technologies, digital platform architectures, and information warfare tactics, focusing on how algorithmic governance, data exploitation, and machine learning transform the information environment. It explores the sociopolitical consequences of digital manipulation, including algorithmic populism, cognitive-emotional polarization, weaponization of social media, and the challenges to epistemic integrity. Insights from these works inform strategies to safeguard democratic processes and construct transparent, accountable digital ecosystems.

Key finding: The article details how algorithmic amplification and psychological tactics combine in digital media platforms to engender political polarization, emotional resonance, false consensus, and spiral of silence phenomena. Through... Read more
Key finding: This paper defines algorithmic populism as a digitally mediated communicative relationship fostering extremist political discourse amplified by non-neutral algorithms that prioritize engagement over truth. It elucidates how... Read more
Key finding: Employing combined natural language processing and discourse analytic methods, this study reveals how media texts use framing, emotional tone, and linguistic manipulation to shape public perception and political orientation.... Read more
Key finding: This essay synthesizes media ecology and psychoanalytic theory to demonstrate the smartphone’s role as a cognitive warfare instrument that subtly erodes individual autonomy via algorithmic feed engineering. It conceptualizes... Read more
Key finding: Expanding on Merlyna Lim's concept, this paper argues that algorithmic enclaves function as global symbolic power infrastructures shaping political polarization, identity fragmentation, and narrative control at diplomatic... Read more

All papers in Information Warfare

In this essay I have highlighted a number of areas that are of concern and give us reason to remain vigilant and prepared to act quickly, collectively and clearly - and always with consideration of the core values of democracy, which it... more
L’Union européenne face au MAGA et au technocapitalisme disruptif : quand les valeurs ne suffisent plus À l’ère de la disruption géopolitique et technologique, l’Union européenne se retrouve dépassée par les dynamiques du pouvoir brut —... more
This article delves into the protection of economic and social rights in Central and Eastern Europe from the United Nations (UN) human rights protection system perspective. We analyse the extent to which the broad inclusion of economic... more
Generating credible deterrence in the Indo-Pacific is premised upon the ability of the US and its allies/partners to act collectively and operate together effectively. Whilst this is important across all natures of operations, this... more
Este artigo aborda a guerra cognitiva digital sob uma ótica tático-operacional, focada nas implicações para as Forças Armadas e nas medidas práticas de detecção, prevenção e resposta. Parte-se da premissa de que Tecnologias da Informação... more
This study examines the interplay between cyberspace and traditional foreign policy, addressing two key questions: (1) How does cyberspace influence foreign policy decision-making? and (2) What framework can integrate factors from real... more
Executive Summary The war launched by the Russian Federation against Ukraine has caused the most severe geopolitical rupture in Europe since 1945, bringing high-intensity conventional confrontation back to the forefront and testing the... more
The paper critically surveys the role of the information component of national power (ICNP) in Australian national security policy. The paper commences with a review of the post-Cold War global security environment and the implications of... more
Cet article est un hommage, un coup de chapeau à cette ONG Bellingcat dont les enquêteurs ont déjà effectué un travail d’enquête remarquable en Open source sur les guerres de Syrie et d’Ukraine mais aussi sur l’élimination des opposants à... more
This thesis examines the concept of winning hearts and minds from a historical analysis to a contemporary framework. The literature on the concept fell short of success to implement the practice of winning hearts and minds. The concept... more
The article reveals the specific features of using artificial intelligence technologies in modern information wars and conceptualises the political phenomenon of «smart polemos». Within the framework of the new concept of «smart polemos»,... more
In their hybrid actions against Poland, Russian intelligence services have been known to carry out various acts of sabotage. Due to the increase in immigration to Poland of the population from the post-Soviet area, it has become a... more
This week, European Commission President Ursula von der Leyen unveiled her latest flagship initiative: a bold push to “strengthen EU democratic resilience,” backed by a new centre dedicated to the cause. But there’s one glaring problem:... more
The study covers ten Central and Eastern European countries, four of which belong to the Visegrad Group (the Czech Republic, Hungary, Poland, Slovakia) and six to the Eastern Partnership (Armenia, Azerbaijan, Belarus, Georgia, Moldova,... more
This paper proposes the G⁰–G³ framework to characterize overlapping regimes of global power and argues that the contemporary shift is best captured as a transition from G²⁺—institutional globalization under strain—to G³, where symbolic... more
Critical questions (CQs) generation for argumentative texts is a key task to promote critical thinking and counter misinformation. In this paper, we present a two-step approach for CQs generation that i) uses a large language model (LLM)... more
In the digital age, information warfare and digital diplomacy have become pivotal in shaping national security. This research investigates the role of the Inter-Services Public Relations (ISPR) of Pakistan in utilizing digital media for... more
Fordow' is the name of a village located in the mountainous Qom province in North-West Iran. It is also the site of a former nuclear enrichment plant which is likely to become familiar among students of international law. On the 22 of... more
With the rise of social media, disinformation has become an important instrument in information warfare at the state level. The article aimed to determine the dominant directions of the Russian Federation's disinformation and propaganda... more
El paradigma de la seguridad y el conflicto ha experimentado una transformación irreversible. La superioridad militar ya no se mide únicamente por la capacidad de ejercer fuerza en los dominios físicos tradicionales (tierra, mar, aire,... more
Established in 1927 and reconstituted in 1949 after the founding of the People's Republic of China (PRC), the People's Liberation Army (PLA) is the armed wing of China's ruling party, the Chinese Communist Party (CCP). The CCP controls... more
The use of deception to achieve advantage in conflict and competition is as old as civilisation. But recent technological advances – particularly those relating to social media – have empowered deception-based stratagems to a... more
The second Gulf War will become synonymous with the emergence of fully-fledged information warfare where the military-entertainment complex has so influenced strategic and logistic possibilities that it becomes apparent that the war was... more
Vortrag von Schoresch Davoodi auf den Tübinger Tagen der digitalen Freiheit 2025 Über die Tübinger Tage der digitalen Freiheit Die Tübinger Tage der digitalen Freiheit (TDF) sind ein offenes Chaos-Community-Event. Das Event richtet sich... more
Freely accessible at: https://www.globalpolicyjournal.com/blog/21/08/2025/countering-weaponized-interdependence-co-optive-interdependence This article investigates to what extent China’s Belt and Road Initiative could be seen as a... more
This article delves into the intricate interplay between artificial intelligence (AI) and information warfare during the Ukraine War, exploring the evolution of strategies and technologies that have reshaped the dynamics of modern... more
The 21st-century international system functions according to a poorly understood logic. This lack of clarity does not stem from excessive complexity but from its fundamentally new nature. Our inherited intellectual frameworks are no... more
Cyber technology represents digital military capability with the purpose of causing damage to the military strength and the social infrastructure of a potential enemy. War using conventional weapons may be preceded by or combined with a... more
“Bilişsel Savaş ve Anlatı Saldırıları Sözlüğü, literatüre dağınık kavramları sistematik bir çerçevede toplayarak, saldırı türleri ile savunma mekanizmaları arasındaki ilişkileri görünür kılan ilk bütüncül referans haritasını kazandırır.”
A guerra russo-ucraniana, intensificada a partir de fevereiro de 2022, em decorrência da invasão territorial em larga escala da Ucrânia por forças militares russas, assinala um evento referencial na dinâmica geopolítica global do século... more
This study examines how a communist agent of influence, Pham Xuan An, shaped Western media narratives from within Time magazine during the Vietnam War, and what that means for contemporary information warfare. Using mixed methods and... more
The advent of anti-radiation missiles (ARMs) marked a transformative moment in aerial warfare, as these weapons specifically target radar emissions to suppress or destroy an adversary’s air defense systems. Designed to home in on... more
Paper was written for class during academic studies. Abstract: The evolution of warfare has turned into an unpredictable landscape where asymmetrical tactics dominate strategies exploiting vulnerabilities of stronger adversaries by... more
Author: Oksana Kyrylova Transformations in the TV space of Ukraine: unification of TV channels of all media groups in the joint "United News" information air.
The 47th President of the United States of America, Donald Trump, announced to end the war in Ukraine in 100 days, after his pledge in the US presidential election to end it even in hours. These thin rhetorics play foul both to the... more
This introduction to a groundbreaking volume on media and communication technology in the Russia-Ukraine War presents one of the most detailed and systematic theoretical reflections to date on the development of digital war since 2022. It... more
Throughout history, victory in war has rarely gone to the largest or most powerful. Instead, success favors those who adapt to terrain, technology, and changing conditions. This situation created a timeless dynamic, which could be called... more
A cross-eye jammer based on a phase-conjugating (PC) retrodirective array is proposed. Such PC cross-eye jammers eliminate the delay inherent in traditional Van-Atta (VA) cross-eye jammers and induce errors in radars that use the same... more
The effect of platform skin return on retrodirective cross-eye jamming is analysed, allowing the parameters of a cross-eye jammer in the presence of skin return to be determined. The inherently unknown phase of the platform skin return is... more
A cross-eye jammer based on a phase-conjugating (PC) retrodirective array is proposed. Such PC cross-eye jammers eliminate the delay inherent in traditional Van-Atta (VA) cross-eye jammers and induce errors in radars that use the same... more
The effect of platform skin return on retrodirective cross-eye jamming is analysed, allowing the parameters of a cross-eye jammer in the presence of skin return to be determined. The inherently unknown phase of the platform skin return is... more
Shannon's Information Theory provides a robust and quantifiable model for explaining the fundamental paradigm of Information Warfare. This paper reviews the four canonical strategies of Information Warfare, in the context of... more
This paper reviews the four canonical strategies of Information Warfare and asserts that Information Warfare is an artifact of evolution in biological systems: the use of Information Warfare techniques by organisms aids survival in a... more
Wireless ad-hoc networks are vulnerable partly due to the absence of a clear physical boundary. A simple yet robust network layer security protocol has been proposed previously for Suburban Ad-Hoc Networks. It secures network layer... more
Download research papers for free!