Font Size: a A A

Research On Information Deterrence And Its Exertion

Posted on:2008-04-08Degree:MasterType:Thesis
Country:ChinaCandidate:J W PengFull Text:PDF
GTID:2166360242472350Subject:Operational command
Abstract/Summary:PDF Full Text Request
As a totally new kind of deterrence in information age, information deterrence not only possesses an outstanding status in military area but also plays an important role in the areas of politics, economy, diplomacy, ideology and culture. All countries have attached more importance to the basic academic questions and exertion of information deterrence. USA taking the lead, western great powers are deepening the research into information deterrence and information deterrence has been tested by actual combat in the several recent local battles. For us in a developing country, we should further the research into information deterrence as early as possible to seek countermeasures.In the context of the new world military revolution and the current military preparations for fight of our army, applying such methods as analysis, induction, comparison, deduction and so on, the paper discusses the basic academic questions of information deterrence systematically. This part mainly consists of definitions, elements, means, classification and features of information deterrence. By analyzing some specific examples of information deterrence in such local battles as the Persian Gulf War, Kosovo War, Afghanistan War and Iraq War, the paper discusses the question of the exertion of information deterrence in detail. This part mainly consists of the golden rule, means, organization and command of exertion of information deterrence. Finally, on the basis of analyzing the position of our security environment and forecasting the trend of information deterrence, the paper finally puts forward such countermeasures as furthering academic research into information deterrence, quicken the invention of crucial technological equipment, improving deterrence ability of key units, attaching importance to information security and so on.
Keywords/Search Tags:Information Deterrence, Information Operation, Deterrence
PDF Full Text Request
Related items